Jump to content

Theme© by Fisana
 

Photo

NSA's Dirty Work Exposed

NSA

  • Please log in to reply
347 replies to this topic

#1 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 19 December 2013 - 07:22 AM

“These Programs Were Never About Terrorism: They’re About Economic Spying, Social Control, and Diplomatic Manipulation. They’re About Power” -  Edward Snowden.

These Programs Were Never About Terrorism

The NSA started mass spying on Americans before 9/11 … and various excuses have been used over the years.

The NSA was already spying on American Senators and prominent Americans who spoke out against the Vietnam War more than 40 years ago.

The NSA has also been conducting industrial espionage for many decades.

There is no evidence that mass surveillance has prevented a single terrorist attack. And see this confirming opinion by a federal judge. On the contrary, top counter-terror experts say that mass spying actually hurts U.S. counter-terror efforts (more here and here).

If NSA spying were really focused on terrorism, our allies and companies wouldn’t be fighting back so hard against it.

 

Economic Spying

The NSA conducts widespread industrial espionage on our allies, such as the World Bank, International Monetary Fund, United Nations, the Vatican and the Pope, France, the leaders of Germany, Brazil and Mexico, the European Union, the European Parliament, the G20 summit, and at least 35 world leaders.

That has nothing to do with terrorism. Indeed, a confidential government memo admits that the spying didn’t help prevent terrorism:

The memo acknowledges that eavesdropping on the numbers had produced “little reportable intelligence”.

The NSA is also spying on the biggest financial payments systems such as VISA and Swift.

In a slide leaked by Edward Snowden, “economic” was one of the main justifications for spying.

The top U.S. spy’s justification for such financial spying is:

    “We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.”

(Top financial experts say that the NSA and other intelligence agencies are also using the information to profit from this inside information. And the NSA wants to ramp up its spying on Wall Street … to “protect” it.)


Diplomatic Manipulation

Spying on allies such as the United Nations, European Union, the European Parliament, the G20 summit, the Vatican and the Pope, and at least 35 world leaders is obviously at least partially aimed at gaining advantage in diplomatic negotiations.

Indeed, the United States Trade Representative is one of the “customers” of NSA data.


Social Control

History shows that mass spying is always focused on crushing dissent… not on keeping us safe.

High-level American government officials have warned for 40 years that mass surveillance would lead to tyranny.   They’ve warned that the government is using information gained through mass surveillance in order to go after anyone they take a dislike to.

A lieutenant colonel for the Stasi East German’s – based upon his experience – agrees. And German Chancellor Angela Merkel – who grew up in Stasi Germany – says the NSA is exactly the same.  Indeed, top American constitutional experts say that the Obama and Bush administration are not only worse than Nixon … but worse than the Stasi East Germans. They also say that NSA spying is exactly the type of oppression that the Founding Fathers launched the Revolutionary War to stop. And see this.

The NSA tracks users’ porn … to discredit them … just like J. Edgar Hoover did in the bad old days of the FBI.  The NSA shares this information with a host of other agencies, such as the Departments of Justice and Commerce and the Drug Enforcement Administration.

(Indeed – as previously reported – all of the information gained by the NSA through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes. The agencies are instructed to intentionally “launder” the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges.)


TechDirt points out:

    In one case, a guy was targeted for claiming that “the U.S. brought the 9/11 attacks upon itself” — an argument that plenty of respectable people have made.

    The lack of any terrorist connection is actually, stunningly, used against these individuals, as one NSA document notes that since they don’t communicate with terrorists it’s worse because it suggests “that the target audience includes individuals who do not yet hold extremist views but who are susceptible to the extremist message.”


A high-level NSA whistleblower says that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, high-ranked generals, Colin Powell and other State Department personnel, and many other top officials.

http://www.washingto...eyre-power.html


Edited by Zharkov, 19 December 2013 - 07:26 AM.

  • 0

#2 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 19 December 2013 - 07:31 AM

Former top NSA official: 'We are now in a police state'

(Zero Hedge) Bill Binney is the high-level NSA executive who created the agency’s mass surveillance program for digital information. A 32-year NSA veteran widely regarded as a “legend” within the agency, Binney was the senior technical director within the agency and managed thousands of NSA employees.

Binney has been interviewed by virtually all of the mainstream media, including CBS, ABC, CNN, New York Times, USA Today, Fox News, PBS and many others.

Last year, Binney held his thumb and forefinger close together, and said: We are, like, that far from a turnkey totalitarian state.

But today, Binney told Washington’s Blog that the
U.S. has already become a police state.

By way of background, the government is spying on virtually everything we do.

All of the information  gained by the NSA through spying is then shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes. The agencies are instructed to intentionally “launder” the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges.

This is a bigger deal than you may realize, as legal experts say that there are so many federal and state laws in the United States, that no one can keep track of them all … and everyone violates laws every day without even knowing it.


The NSA also ships Americans’ most confidential, sensitive information to foreign countries like Israel, the UK and other countries … so they can “unmask” the information and give it back to the NSA … or use it for their own purposes.

    This is a total corruption of the justice system not only in our country but around the world. This is a totalitarian process – it means we are now in a police state.


http://www.zerohedge...police-stateā€
 


  • 0

#3 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 19 December 2013 - 07:48 PM

Former CIA Head: Snowden “Should Be Hanged By The Neck Until He Is Dead”
      
Steve Watson
Infowars.com

In a statement that conjures images of the middle ages, former CIA chief and all round globalist neocon James Woolsey said on live TV Tuesday that NSA whistleblower Edward Snowden should be
hanged for treason.

“He should be prosecuted for treason. If convicted by a jury of his peers,
he should be hanged by his neck until he is dead.” said Woolsey in an interview with Fox News.

The conversation surrounded Snowden’s offer to help Brazil investigate NSA surveillance of its people in return for asylum. US officials have also suggested providing an amnesty for Snowden to the US in return for an agreement to end the intelligence leaks.

“I think giving him amnesty is idiotic,” Woolsey, a prominent Council on Foreign Relations insider, noted.

Woolsey has previously refused to be drawn on the documented role of the spy state in controlling and manipulating the lives of the American people, opting instead to play dumb on programs such as ‘Operation Mockingbird’, the CIA’s historically established program to control and influence the media.

Woolsey’s latest comments echo those of fellow arch-neocon, Former U.S. ambassador to the United Nations John Bolton, who said this week that Snowden should
“swing from a tall oak tree” as punishment for exposing NSA spying.

http://www.infowars....til-he-is-dead/


Government Using NSA to Change Amount in Bank Accounts, Warns Panel
Americans at risk of enforced Cyprus-style bail-in


http://www.infowars....ts-warns-panel/


  • 0

#4 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 20 December 2013 - 12:57 AM

Seven House Republicans are calling for the Justice Department to open a criminal investigation into whether Director of National Intelligence James Clapper lied to Congress.

http://thehill.com/b...-czar-for-lying


  • 0

#5 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 21 December 2013 - 06:55 PM

NDAA 2014

Yesterday the 2014 National Defense Authorization Act was fast-tracked through the Senate, with no time for discussion or amendments.  And you know, its Christmastime, so they just passed it so that they could recess for the holidays. The new version of the NDAA has already been quietly passed by the House of Representatives.

It authorizes massive spending, including $527 billion in base defense spending for the current fiscal year, funding for the war in Afghanistan, and funding for nuclear weapons programs.

The indefinite detention allowed by the original NDAA is still here, and it’s actually worse now, because there are provisions that will make it easier for the government to target those who disagree.  Section 1071 outlines the creation of the “Conflict Records Research Center”, where the unconstitutionally obtained information that the NSA has collected is compiled and shared with the Department of Defense.  The information, called in the wording  “captured records,” can be anything from your phone records, emails, browsing history or posts on social media sites.

The New American reports in detail on the expansion of powers:


    For two years, the NDAA included provisions that purported to authorize the president of the United States to deploy the U.S. military to apprehend and indefinitely detain any person (including an American citizen) who he believes “represent[s] an enduring security threat to the United States.”

    Such an immense grant of power is not only unconscionable, but unconstitutional, as well.

    Regardless of promises to the contrary made every year since 2011 by President Obama, the language of the NDAA places every citizen of the United States within the universe of potential “covered persons.”
Any American could one day find himself or herself branded a “belligerent” and thus subject to the complete confiscation of his or her constitutional civil liberties and to nearly never-ending incarceration in a military prison.

    Finally, there is in the NDAA for 2014 a frightening fusion of the federal government’s constant surveillance of innocent Americans and the assistance it will give to justifying the indefinite detention of anyone labeled an enemy of the regime.

    Section 1071 of the version of the 2014 NDAA approved by the House and Senate committees this week expands on the scope of surveillance established by the Patriot Act and the Authorization for the Use of Military Force (AUMF).

    Section 1071(a) authorizes the secretary of defense to “establish a center to be known as the ‘Conflict Records Research Center.’” According to the text of the latest version of the NDAA, the center’s task would be to compile a “digital research database including translations and to facilitate research and analysis of records captured from countries, organizations, and individuals, now or once hostile to the United States.”

    In order to accomplish the center’s purpose, the secretary of defense will create an information exchange in cooperation with the director of national intelligence.


    Key to the functioning of this information exchange will be the collection of “captured records.” Section 1071(g)(1), defines a captured record as “a document, audio file, video file, or other material captured during combat operations from countries, organizations, or individuals, now or once hostile to the United States.”


    When read in conjunction with the provision of the AUMF that left the War on Terror open-ended and the prior NDAAs’ classification of the United States as a battleground in that unconstitutional war, and you’ve got a powerful combination that can knock out the entire Bill of Rights.

    Finally, when all the foregoing is couched within the context of the revelations regarding the dragnet surveillance programs of the NSA, it becomes evident that anyone’s phone records, e-mail messages, browsing history, text messages, and social media posts could qualify as a “captured record.”

    After being seized by the NSA (or some other federal surveillance apparatus), the materials would be processed by the Conflict Records Research Center created by this bill. This center’s massive database of electronic information and its collaboration with the NSA converts the United States into a constantly monitored holding cell and all its citizens and residents into suspects. All, of course, in the name of the security of the homeland.

One thing that was omitted is the amendment on the prosecution of sexual assaults in the military.  So, we can all be locked up indefinitely for crimes that haven’t been proven, but they don’t care so much if military members continue to rape other military members.

Under the new and “improved” NDAA, I’m a belligerent for writing this, and you’re a belligerent for reading this.  God help you if you email someone about it or share it on Facebook.
   And have a Merry Christmas!

 

http://intellihub.co...to-obamas-desk/
 


  • 0

#6 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 23 December 2013 - 02:35 PM

National Security Adviser Susan Rice dismissed any possibility that former NSA contractor Edward Snowden would be granted amnesty, saying he doesn’t “deserve” it.

“We don’t think that Snowden deserves amnesty. We believe he should come back, he should be sent back, and he should have his (illusory) day in (our Kangaroo) court,” Rice said in an interview with CBS’s “60 Minutes” that aired Sunday.


http://www.politico....nsa-101468.html

===================================================================

 

Susan Rice and Obama know that Snowden will cease to expose them for what they are,  the minute he crosses the Russian border.    If Snowden isn't killed in an "unfortunate accident" in an airliner, he will be "found" hanging in his government holding cell like so many others.

 

Let Obama and his advisors turn themselves in first, for crimes against humanity, crimes against America, and plain vanilla-flavored murders they committed through the CIA and their drone program.    Let's have a criminal indictment of Obama, a real trial, and prison before we talk about Snowden.

 

Here's what she means by "trial" :   A federal judge employed by the federal government presiding over a jury of current and former tax-dodging federal employees living in Washington, D.C. or their relatives and friends, all of whom will vote to convict in order to please a federal government that had been taken over completely by incredibly wealthy domestic and foreign globalists.


Edited by Zharkov, 23 December 2013 - 03:17 PM.

  • 0

#7 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 23 December 2013 - 03:26 PM

“These Programs Were Never About Terrorism: They’re About Economic Spying, Social Control, and Diplomatic Manipulation. They’re About Power” -  Edward Snowden.

 

SNOWDEN WAS RIGHT...again!

 

New armored tank for town police sparks fear, war of words

  • printer_famfamfam.gif youtube.png podcast.png pptv.png twitter.png facebook.png cart.png

Joe Saunders
bizpacreview.com
December 23, 2013

 

A war of words has broken out over police force in California getting a new armored vehicle built more for a state of war than patrolling in the Golden State.

 

The Salinas Police Department recently issued a news release proudly announcing the arrival of the armored truck built to survive minefield explosionswhich it got compliments of federal taxpayers as part of a program to convert military equipment to law-enforcement use.

califmwrap1222-300x211.jpg

Critics took to the police department’s Facebook page to ask exactly why a city of 150,000 on the northern California coast really needs a vehicle designed for battlefield use. It’s more likely to be used against its own citizens, they said..

 

“That vehicle is made for war. Do not use my safety to justify that vehicle,” one wrote. “The Salinas Police Department is just a bunch of cowards that want to use that vehicle as intimidation and to terrorize the citizens of this city.”

 

‘To stop gang members?” another wrote. “Hmmm gang members don’t riot in mass numbers. It’s right in front of our faces and we don’t see it. Why would the ARMY!!! give something like that for FREE!!! Let’s think for once people.”

Police Chief Kelly McMillin said he doesn’t understand the problem.

 

“I knew this was going to come up,” he said in an interview with the Salinas Californian. “It’s the militarization-of-the-police issue. People are like, ‘Why do you need this?’”

He said it’s not what the department has, it’s what it does that’s the point.

 

“An allegation that we are militarizing has to be that we were patrolling the streets in platoons in greater numbers, that we were setting up checkpoints and searching people in and out of neighborhoods,” he told the interviewer.

The Salinas PD isn’t doing any of that, he said.

 

Maybe not. And maybe it never will under Kelly McMillin. But that’s not the point, and it’s hard to believe McMillin and the reporter from the Salinas Californian don’t know that.

 

This country only two months ago saw rangers for the National Park Service – National Park rangers, for God’s sake – turn into a bunch of storm troopers keeping World War II vets out of their own monument, and visitors from “recreating” at Yosemite.

 

And Chief McMillin doesn’t understand why citizens don’t trust the government with ever-greater weaponry in the hands of a “civilian” police force?

 

Just ask the commenters on the Salinas Californian article:

 

“It could be used to deliver a whole bunch of shut the hell up to the citizens of this fair town,” one wrote.

Another agreed.

 

“And Obama said we don’t need military weapons in hands of citizens”

 

http://www.infowars....r-war-of-words/


Edited by Zharkov, 24 December 2013 - 07:32 PM.

  • 0

#8 bishadi

bishadi

    Registered User

  • Members
  • PipPipPip
  • 9522 posts

Posted 23 December 2013 - 09:01 PM

Its very interesting in this area, this is going to be at this point an experiment and an important one, because where security is concerned law enforcement or security we normally dont depend on the private sector. We really view that as an inherently governmental function.

We dont depend, or outsource, our national defense to the private sector. We dont depend or outsource our intelligence gathering capability to the private sector.
 
 
That is a quote of Janet Napolitano in June 2013, just before getting the boot.
 
cont- from artcle ---------------"In her keynote address Napolitano obviously forgot that we all know the NSA has been partnering with private industry for quite some time now in order to watch American citizens. It is pretty painful to have someone in charge of homeland security that has absolutely no experience in law enforcement or military."

http://townhall.com/...ut-nsa-n1624585


Snowden ....
  • 0

#9 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 24 December 2013 - 07:29 PM

"Together we can ... remind the government that if it really wants to know how we feel, asking is always cheaper than spying." -  Edward Snowden


  • 0

#10 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 25 December 2013 - 03:59 PM

According to one document in Snowden’s cache, the agency’s Special Source Operations group, which as early as 2006 was said to be ingesting “one Library of Congress every 14.4 seconds,” had an official seal that might have been parody: an eagle with all the world’s cables in its grasp.

Each year, NSA systems collected hundreds of millions of e-mail address books, hundreds of billions of cellphone location records and trillions of domestic call logs.

Most of that data, by definition and intent, belonged to ordinary people suspected of nothing. But
vast new storage capacity and processing tools enabled the NSA to use the information to map human relationships on a planetary scale.

“It’s the deception of the government that’s revealed,” Snowden said, noting that the Obama administration offered false public assurances after the initial reports about NSA surveillance in Germany “The U.S. government said: ‘We follow German laws in Germany. We never target German citizens.’ And then the story comes out and it’s: ‘What are you talking about? You’re spying on the chancellor.’ You just lied to the entire country, in front of Congress.”

Microsoft general counsel Brad Smith took to his company’s blog and
called the NSA an “advanced persistent threat” — the worst of all fighting words in U.S. cybersecurity circles, generally reserved for Chinese state-sponsored hackers and sophisticated criminal enterprises.

The FISA court, Snowden said, “is authorizing general warrants for the entire country’s metadata.”


“The last time that happened, we fought a war over it,” he said.

http://www.washingto...6b8d_story.html

 

=================================================================

Universal wire-tapping is Anti-American.  

It's subversive activity by our government.

Why?   Because NSA spying on America subverts our Constitution and U.S. laws.

 

U.S. federal officials should be prosecuted in every country for violating the entire world's right to privacy.   They've violated German law, French law, Brazilian law, pick a country and they've violated their laws.    Any prosecutor can file charges against them in almost any country.   U.S. intelligence officials and the Congressional Oversight Committee do not have diplomatic immunity.   They do not work for the U.S. Foreign Service or State Department.


Edited by Zharkov, 25 December 2013 - 04:05 PM.

  • 0

#11 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 30 December 2013 - 07:16 AM

NSA:    NATIONAL SOCIALIST AUTOEROTICS

(Stealing Other People's Data Really Turns Them On)

LONDON (AP) -- A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.

Der Spiegel's revelations relate to a division of the NSA known as
Tailored Access Operations, or TAO, which is painted as an elite team of hackers specializing in stealing data from the toughest of targets.

Citing internal NSA documents, the magazine said Sunday that TAO's mission was "Getting the ungettable," and quoted an unnamed intelligence official as saying that TAO had gathered "some of the most significant intelligence our country has ever seen."

Der Spiegel said TAO had a catalog of high-tech gadgets for particularly hard-to-crack cases, including computer monitor cables specially modified to record what is being typed across the screen, USB sticks secretly fitted with radio transmitters to broadcast stolen data over the airwaves, and fake base stations intended to intercept mobile phone signals on the go.

The NSA doesn't just rely on James Bond-style spy gear, the magazine said. Some of the attacks described by Der Spiegel exploit weaknesses in the architecture of the Internet to deliver
malicious software to specific computers. Others take advantage of weaknesses in hardware or software distributed by some of the world's leading information technology companies, including Cisco Systems, Inc. and China's Huawei Technologies Ltd., the magazine reported.

Der Spiegel cited a 2008 mail order catalog-style list of vulnerabilities that NSA spies could exploit from companies such as Irvine, California-based Western Digital Corp. or Round Rock, Texas-based Dell Inc. The magazine said that suggested the agency was "compromising the technology and products of American companies."

Old-fashioned methods get a mention too. Der Spiegel said that if the NSA tracked a target ordering a new computer or other electronic accessories, TAO could tap its allies in the FBI and the CIA,
intercept the hardware in transit, and take it to a secret workshop where it could be discretely fitted with espionage software before being sent on its way.

Intercepting computer equipment in such a way is among the NSA's "most productive operations," and has helped harvest intelligence from around the world, one document cited by Der Spiegel stated.

One of the most striking reported revelations concerned the NSA's alleged
ability to spy on Microsoft Corp.'s crash reports, familiar to many users of the Windows operating system as the dialogue box which pops up when a game freezes or a Word document dies. The reporting system is intended to help Microsoft engineers improve their products and fix bugs, but Der Spiegel said the NSA was also sifting through the reports to help spies break into machines running Windows. One NSA document cited by the magazine appeared to poke fun at Microsoft's expense, replacing the software giant's standard error report message with the words: "This information may be intercepted by a foreign sigint (signals intelligence) system to gather detailed information and better exploit your machine."

Microsoft said that information sent by customers about technical issues in such a manner is limited.

"Microsoft does not provide any government with direct or unfettered access to our customer's data," a company representative said in an email Sunday. "We would have significant concerns if the allegations about government actions are true."

Microsoft is one of several U.S. firms that have demanded more transparency from the NSA - and worked to bolster their security - in the wake of the revelations of former intelligence worker Edward Snowden, whose disclosures have ignited an international debate over privacy and surveillance.

Der Spiegel did not explicitly say where its cache NSA documents had come from, although the magazine has previously published a series of stories based on documents leaked by Snowden, and one of Snowden's key contacts - American documentary filmmaker Laura Poitras - was listed among the article's six authors.

No one was immediately available at Der Spiegel to clarify whether Snowden was the source for the latest story.


http://hosted.ap.org...-12-29-13-01-13


  • 0

#12 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 30 December 2013 - 03:02 PM

Who is NSA targeting?

In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn't budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle.

Fault for the error lay with the United States' foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA's radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

It was thanks to the garage door opener episode that
Texans learned just how far the NSA's work had encroached upon their daily lives.

For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city.

...it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks.  
The unit... has "access to our very hardest targets."

TAO (Tailored Access Operations) would have to acquire "pervasive, persistent access on the global network."   An internal description of TAO's responsibilities makes clear that aggressive attacks are an explicit part of the unit's tasks. In other words, the NSA's hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries -- nearly everywhere in the world. In 2010, it conducted 279 operations worldwide.

Indeed, TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry's BES email servers, which until then were believed to be securely encrypted. Achieving this last goal required a "sustained TAO operation," one document states.

This TAO unit is born of the Internet -- created in 1997, a time when not even 2 percent of the world's population had Internet access and no one had yet thought of Facebook, YouTube or Twitter. From the time the first TAO employees moved into offices at NSA headquarters in Fort Meade, Maryland, the unit was housed in a separate wing, set apart from the rest of the agency. Their task was clear from the beginning -- to work around the clock to find ways to hack into global communications traffic.


Their job is breaking into, manipulating and exploiting computer networks.

There are now TAO units in Wahiawa, Hawaii; Fort Gordon, Georgia; at the NSA's outpost at Buckley Air Force Base, near Denver, Colorado; at its headquarters in Fort Meade; and, of course, in San Antonio.

One trail also leads to Germany. According to a document dating from 2010 that lists the "Lead TAO Liaisons" domestically and abroad as well as names, email addresses and the number for their "Secure Phone," a liaison office is located near Frankfurt -- the European Security Operations Center (ESOC) at the so-called "Dagger Complex" at a US military compound in the Griesheim suburb of Darmstadt.

But it is the growth of the unit's Texas branch that has been uniquely impressive, the top secret documents reviewed by SPIEGEL show. These documents reveal that in 2008, the Texas Cryptologic Center employed fewer than 60 TAO specialists. By 2015, the number is projected to grow to 270 employees. In addition, there are another 85 specialists in the "Requirements & Targeting" division (up from 13 specialists in 2008). The number of software developers is expected to increase from the 2008 level of three to 38 in 2015. The San Antonio office handles attacks against targets in the Middle East, Cuba, Venezuela and Colombia, not to mention Mexico, just 200 kilometers (124 miles) away, where the government has fallen into the NSA's crosshairs.


Operation WHITE TAMALE

Mexico's Secretariat of Public Security, which was folded into the new National Security Commission at the beginning of 2013, was responsible at the time for the country's police, counterterrorism, prison system and border police

The TAO workers selected systems administrators and telecommunications engineers at the Mexican agency as their targets, thus marking the start of what the unit dubbed Operation WHITE TAMALE.   (Actually one word, but for foreign visitors it makes more sense to show it as two words - Z)

Workers at NSA's target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets.
As a first step, TAO penetrated the target officials' email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data.

Soon the NSA spies had knowledge of the agency's servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies' structures, including video surveillance. It appears the operation continued for years...

The technical term for this type of activity is "Computer Network Exploitation" (CNE). The goal here is to "subvert endpoint devices," according to an internal NSA presentation...

The presentation goes on to list nearly all the types of devices that run our digital lives -- "servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc." SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country's critical infrastructure.

The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran's nuclear program, and successfully so. The country's nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran's uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable.


Having Fun at Microsoft's Expense (and everyone's expense as well!)

One example of the sheer creativity with which the TAO spies approach their work can be seen in a hacking method they use that exploits the error-proneness of Microsoft's Windows. Every user of the operating system is familiar with the annoying window that occasionally pops up on screen when an internal problem is detected, an automatic message that prompts the user to report the bug to the manufacturer and to restart the program. These crash reports offer TAO specialists a welcome opportunity to spy on computers.

When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft.
An internal presentation suggests it is NSA's powerful XKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic.

The automated crash reports are a "neat way" to gain "passive access" to a machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.

Although the method appears to have little importance in practical terms, the NSA's agents still seem to enjoy it because it allows them to have a bit of a laugh at the expense of the Seattle-based software giant.

One of the hackers' key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They've bestowed their spying tools with illustrious monikers like "ANGRY NEIGHBOR," "HOWLERMONKEY" or "WATERWITCH." These names may sound cute, but the tools they describe are both aggressive and effective.

According to details in Washington's current budget plan for the US intelligence services,
around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these "implants" are conducted by TAO teams via the Internet.

Increasing Sophistication

Until just a few years ago, NSA agents relied on the same methods employed by cyber criminals to conduct these implants on computers. They sent targeted attack emails disguised as spam containing links directing users to virus-infected websites. With sufficient knowledge of an Internet browser's security holes -- Microsoft's Internet Explorer, for example, is especially popular with the NSA hackers -- all that is needed to plant NSA malware on a person's computer is for that individual to open a website that has been specially crafted to compromise the user's computer. Spamming has one key drawback though: It doesn't work very often.

Nevertheless, TAO has dramatically improved the tools at its disposal. It maintains a sophisticated toolbox known internally by the name "QUANTUMTHEORY." "Certain QUANTUM missions have a success rate of as high as 80%, where spam is less than 1%," one internal NSA presentation states.

A comprehensive internal presentation titled "QUANTUM CAPABILITIES," which SPIEGEL has viewed, lists virtually
every popular Internet service provider as a target, including Facebook, Yahoo, Twitter and YouTube. "NSA QUANTUM has the greatest success against Yahoo, Facebook and static IP addresses," it states. The presentation also notes that the NSA has been unable to employ this method to target users of Google services. Apparently, that can only be done by Britain's GCHQ intelligence service, which has acquired QUANTUM tools from the NSA.

A favored tool of intelligence service hackers is "QUANTUMINSERT."
GCHQ workers used this method to attack the computers of employees at partly government-held Belgian telecommunications company Belgacom, in order to use their computers to penetrate even further into the company's networks. The NSA, meanwhile, used the same technology to target high-ranking members of the Organization of the Petroleum Exporting Countries (OPEC) at the organization's Vienna headquarters. In both cases, the trans-Atlantic spying consortium gained unhindered access to valuable economic data using these tools.

The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely.

Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID.

This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer.

The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.


Tapping Undersea Cables

At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors.

One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.

The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."

It appears the government hackers succeeded here once again using the QUANTUMINSERT method.

The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues.

But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.


Spying Traditions Live On

To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.

Responding to a query from SPIEGEL, NSA officials issued a statement saying, "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies." The statement added that TAO's "work is centered on computer network exploitation in support of foreign intelligence collection." The officials said they would not discuss specific allegations regarding TAO's mission.

Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.

Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain
access to networks "around the world."

See entire article:
http://www.spiegel.d...s-a-940969.html

 

Also:

NSA intercepting laptops bought online to install spy malware
http://intellihub.co...ll-spy-malware/

 

=====================================================================================================

The goal of targetting terrorists is understandable, but this kind of spying has no connection to terrorism.

It also began decades before 9/11.

The activities described above are ILLEGAL in every country including the U.S.

The U.N. Declaration of Human Rights prohibits this gross invasion of privacy.

The U.S. Constitution prohibits these activities inside the U.S.

Any prosecutor in any affected country can bring criminal charges against NSA officials for this.

Time will tell if they have the courage to do so.


 


Edited by Zharkov, 30 December 2013 - 04:27 PM.

  • 0

#13 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 30 December 2013 - 03:13 PM

Memo to NSA:

 

What goes around, comes around.  

You are watching us, THEY are watching YOU.

Some of you will be going to prison - it's only a matter of time.

You may be arrested in another country where you vacation or spend time.

Decide on which side of the razor wire fence you want to be and do the right thing.

And stop sending me links to click on.

It is illegal to hack U.S. computers.

 

"...a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone.

The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: "DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to
remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."

"...now everyone knows that their iPhone is nothing but a gateway for the NSA to peruse everyone's "private" data at will. Which, incidentally, is not news, and was revealed when we showed how the
"NSA Mocks Apple's "Zombie" Customers..."

 

http://www.zerohedge...ng-dropout-jeep

 

===================================================================================================

NSA:  NEO-STASI AGENCY

 

Government officials should know that NSA can plant child porn on their laptop and when "their" files are discovered, they are finished.    NSA can blackmail adulterers, homosexuals, judges, legislators, anyone, because they've got a listening post in every politician's office.

 

NSA officials, their staff and employees are also under NSA surveillance by special units tasked to identify potential whistleblowers, double agents, and disgruntled workers.   Enjoy your neo-Stasi environment, NSA!  


Edited by Zharkov, 30 December 2013 - 08:55 PM.

  • 0

#14 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 30 December 2013 - 08:46 PM

GOVERNMENT OFFICIALS UNDER SURVEILLANCE BY NSA.

 

WASHINGTON — The personal e-mail account of a State Department whis­tle­­blower was hacked, and four years worth of messages — some detailing alleged wrongdoing at the agency — were deleted, The Post has learned.

The computer attack targeted the Gmail account of Diplomatic Security Service criminal investigator Richard Higbie, his lawyer, Cary Schulman, confirmed.


“They took all of his e-mails and then they deleted them all,” said Schulman. He said that he could not prove who was responsible for the hack job, but said the attack was “sophisticated” and called the targeting of Higbie “alarming.”

“Obviously, somebody is not happy with something he’s doing and wanted to get that information and also cause him an inability in the future to have ready access to that,” Schulman said.

The e-mails included evidence about
misconduct by top officials at the department, communications with other potential whistleblowers there, and correspondence with members of Congress who are investigating the allegations, Schulman said.

Schulman said, “We feel like we’re in a movie. It’s nuts. It makes us wonder . . . . maybe we’ve got something we don’t even realize or maybe they’re worried about something.”


http://nypost.com/20...hacked-deleted/


  • 0

#15 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 31 December 2013 - 12:46 AM

NSA is "Even worse than your worst nightmares."

A well-known privacy advocate has given the public an unusually explicit peek into the intelligence world's tool box, pulling back the curtain on the National Security Agency's arsenal of high-tech spy gear.

Independent journalist and security expert Jacob Appelbaum on Monday told a hacker conference in Germany that the NSA could turn iPhones into eavesdropping tools and use radar wave devices to harvest electronic information from computer even if they weren't online.

Appelbaum told hundreds of computer experts gathered at Hamburg's Chaos Communications Conference that his revelations about the NSA's capabilities "are even worse than your worst nightmares."

"What I am going to show you today is wrist-slittingly depressing," he said.

Even though in the past six months there have been an unprecedented level of public scrutiny of the NSA and its methods, Appelbaum's claims — supported by what appeared to be internal NSA slideshows — still caused a stir.

One of the slides described how the
NSA can plant malicious software onto Apple Inc.'s iPhone, giving American intelligence agents the ability to turn the popular smartphone into a pocket-sized spy.

Another slide showcased a futuristic-sounding device described as a "portable continuous wave generator," a remote controlled device which — when paired with tiny electronic implants — can bounce invisible waves of energy off keyboards and monitors to see what is being typed even if the target device isn't connected to the Internet.

A third slide showcased a piece of equipment called NIGHTSTAND, which can tamper with wireless Internet connections
from up to 8 miles away.

http://www.newsmax.c...12/30/id/544431


  • 0

#16 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 31 December 2013 - 02:27 AM

NSA’s spy gear: ANT is a secret weapon that hacks electronics worldwide
by Joshua Cook

From Samsung smartphones to Dell computers, Americans are being tracked by the NSA via electronic spy gear. Last week Snowden warned Americans in a Christmas message that big brother is watching. “We have sensors in our pockets that track us everywhere we go,” he said. Now Snowden has leaked the document that proves his claim.

One of the documents Snowden has reportedly leaked is a product catalog for spies and hackers at the NSA.


NSA hacks THE WORLD
According to SPIEGEL, “a product catalog reveals that an NSA division called ANT (Access Network Technology) has burrowed its way into nearly all the security architecture made by the major players in the industry - including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.”

The article claims that ANT specialists at the NSA’s department for Tailored Access Operations can remotely access, monitor, and manipulate data in electronics around the world. Electronic devices that cannot be attacked via the internet are intercepted and manually bugged. In some cases, the NSA actually intercepts packages to put “backdoors” in electronics.

SPIEGEL explains, “These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox.
And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.”

http://benswann.com/...onics-worldwide


  • 0

#17 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 31 December 2013 - 02:57 PM

With the huge flow of the world's data flooding into the NSA, most of it useless, it can be accurate to say that the American government is now certifiably insane.  

 

Paranoia prevails in Washington.  

 

They are afraid of the voters, afraid of independent thought, afraid of losing power, afraid of threats, jokes, whistleblowers, cartoons, journalists, practically everyone is the enemy in D.C. - except them, and they carefully watch each other to be sure they are not mistaken about their comrades.

 

The time will come when they will begin to viciously attack each other for a perceived lack of loyalty, and for talking too much, for laughing at the wrong jokes, for meeting the wrong people.

 

Globalists are building prisons for their children.  

They arm militias for their overthrow.

They buy bullets for their own executions.

They will exterminate each other.

And history will write that they did this to themselves.


  • 0

#18 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 31 December 2013 - 04:13 PM

    1) The tracking of financial transactions within America has been documented for years.

In 2008, the Wall Street Journal reported on “so-called ‘black programs’ whose existence is undisclosed.” Many of them “began years before the 9/11 attacks but have since been given greater reach. Among them, current and former intelligence officials say, is a longstanding Treasury Department program to collect individual financial data including wire transfers and credit-card transactions.” If one government agency has the data, then they all do.

    2) In 2006, when NSA was discovered using SWIFT data, there was a political uproar in the EU; the U.S. agreed to safeguards and to limit its surveillance in exchange for access. Agreements from the NSA are apparently worthless as the back door access continues.

    3) What the NSA says varies from moment to moment, person to person. For example, the agency has repeatedly denied that its surveillance is conducted to commercially benefit American companies. Nevertheless, Bloomberg (September 9th, 2013) reported on the NSA surveillance of Brazil’s state-controlled oil company, Petrobras. Documents released by Snowden included a 2012 NSA slide show presentation “that explained the agency’s capability to penetrate private networks of companies such as Petrobras….One slide in the presentation listed “economic” as an intention for spying.”


http://intellihub.co...-bank-accounts/


  • 0

#19 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 02 January 2014 - 02:50 PM

MEMO FROM THE AMERICAN PEOPLE:

 

"When someone reveals that government officials have routinely and deliberately broken the law, that person should not face life in prison at the hands of the same government." - N.Y. Times

http://www.newsmax.c...01/02/id/544775


  • 0

#20 Zharkov

Zharkov

    Registered User

  • Members
  • PipPipPip
  • 36413 posts

Posted 03 January 2014 - 02:31 PM

The big question is, WHY?

 

Who benefits from NSA snooping and how?

 

Perhaps it is done so "they" can get away with the money?

 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

 

1) Politicians believe there are no consequences for destroying our liberty...

Stimulus and response. That's the easiest way of summing this up. When politicians steal, and there are no consequences, they're going to keep stealing.

Cyprus proved this point handily. The government froze bank accounts for everyone in the country (of course, the big bosses got their money out in time). And yet, there was no violent revolution in the streets. People just accepted it.

Poland nationalized pensions. Argentina imposed severe capital controls. The French are taxing everything under the sun. The US government was caught red-handed spying on... everyone.

And yet, there have been ZERO consequences. Citizens have been trained like caged animals to simply roll over and acquiesce. I imagine the politicians are thinking, "Holy Cow! I can't believe we just got away with that..."

It only reinforces their behavior. With each destructive act, they become more bold, more brazen in dismantling our liberties, confident that they can continue to act with total impunity.


2) ...Central bankers and economists believe there are no consequences to printing money...

The Fed expanded its balance sheet by $1.1 TRILLION in 2013, a whopping 38.5%. Nobody seems to mind. The stock market surged to all-time highs, the bond market remained stable, and everyone pronounced the 'recovery' was in.

I attended a dinner a few months ago where Ben Bernanke himself touted how much his quantitative easing had helped US economic conditions.

They really believe in what they are doing. They really believe that conjuring endless quantities of money out of thin air is the path to prosperity.

Not to mention, our modern society awards its most esteemed prizes for intellectual achievement to the likes of idiot savants like Paul Krugman who tell us that the Fed should be printing even MORE money. And people listen to him.

So we can only expect Ben "I can raise interest rates in 15 minutes" Bernanke, and his heir apparent Janet Yellen, to give us more of the same.


3) ...Investors think there are no consequences to deficits, or debasement...

In 2013, headlines like "the US deficit is only $700 billion" were actually considered good news.

And markets have given all of these fiascos a pass-- from the government shutdown to record-shattering debt levels to downgrades by the rating agencies. AA became the new AAA in 2013.

Nobody cares that the US government 'borrowed' a record amount of money from the Social Security Trust Fund. Or that they spent a record amount just to pay interest on the debt at a time when interest rates are at all-time lows.

Rather, they just keep investing... without a single thought to the possible risks. The fear of missing the big boom is greater than the fear of losing money. But then again, it's not their money at risk. It's yours.


4)  ...But Joe Six-Pack knows this is all crap.

In 2013, the collective net worth of the 300 richest people in the world grew to $3.7 trillion, 16.5% higher than 2012. Corporate profits were also at record levels.

Fortune 500s, the super-rich, rich, and even upper middle class have largely been beneficiaries of the central bank induced asset bubble.

But everyone else is getting hammered by inflation... watching their savings and livelihoods melt away before their very eyes.

A report from the US Census Bureau this year showed that median household income has declined for five straight years. And those living in poverty, using food stamps, or receiving unemployment benefits remained at record high levels in 2013.

Meanwhile, the wealth gap has grown to its largest since 1929-- the year of that fateful financial collapse.

It's time for a reality check: something is wrong with this picture.

We've become desensitized to everything. "Unprecedented" monetary policy. Record debts. Massive wealth gap. Government surveillance. Theft. Deceit. Inflation.

We've become so accustomed to getting screwed, it's just par for the course now. We sit quietly and wait for the next round of beatings, shrugging it all off as the new normal.

This isn't normal. This is not how a free society is supposed to function.

A free society does not spy on its own people, threaten them with drone assassination, and award an unelected banking elite with supreme authority to rob purchasing power from the masses in favor of a bubbly stock market.

And despite the conventional wisdom, this is not a consequence-free environment.


History is full of examples of entire nations that reached their breaking points... shouting from the rooftops: "I'm mad as hell! And I'm not going to take it anymore!"

2013 already saw violent unrest in some of the most stable countries in the world like Singapore and Sweden, all underpinned by absolute disgust for the status quo.

Whether today or tomorrow, this year or next, there will be a reckoning. The system is far too broken to repair, it must be reset.

It's simply absurd to look at the situation objectively and presume this status quo can continue indefinitely... that this time is different... that we're somehow special and immune to universal principles.

This is not some prediction for doom and gloom. Far from it.

It's actually a message of optimism. For the sooner these crackpot criminal politicians and their central banking ilk are stricken from power, the better off we'll all be.

Unfortunately there's going to be quite a bit of turmoil to get there.

Here's to 2014. It's going to be a hell of a year.

 
 
Simon Black
Senior Editor, SovereignMan.com

  • 0





Also tagged with one or more of these keywords: NSA

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Copyright © 2020 Pravda.Ru