Vault 7: CIA Hacking Tools Revealed


Ed. Note: Me thinks it’s time for the residents of the US wake-up and unite to entirely dismantle the CIA and re-purpose some of their tech for positive purposes. Like monitoring our public servants, corporate structures and military industrial complex to ensure they’re SERVING the public good. Blessings, {~A~}

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

 

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

 

Examples

 

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

 

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE. 

Frequently Asked Questions

 

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

 

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

 

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

 

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

 

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

 

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

 

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

 

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

 

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

 

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

 

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

 

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

 

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/https://wikileaks.org/ciav7p1/

Wow | New airport checkpoint shocks travelers! | “Orwellian” MrMBB333


Yet another security checkpoint for travelers LEAVING America. After going through this new “security” point, passengers were stunned, didn’t even want to talk about it.
https://fee.org/articles/welcome-aboa…

Max Igan ~ The World According to Trump


Max Igan – Surviving the Matrix – Episode 283 – American Voice Radio, Febuary 3rd, 2017 – http://thecrowhouse.com
Support The Crowhouse: https://www.patreon.com/maxigan?ty=h
Bitcoin: 1NPsKQ2d23aWqqwqQ2qfgMv19XyMPmYh7K
https://steemit.com/@maxigan

Universal Law/sovereign law trumps all others.

1. No man or woman, in or out of government shall initiate force, threat of force or fraud against my life and property and, any and all contracts Im a party to not giving full disclosure to me whether signed by me or not are void at my discretion.

2. I may use force in self-defense against anyone that violates Law

3. There shall be no exceptions to Law 1 and 2.

When the tyrant has disposed of foreign enemies by conquest or treaty and there is nothing to fear from them, then he is always stirring up some war or other, in order that the people may require a leader. – Plato

“I would rather have questions that can’t be answered than answers that can’t be questioned.” – Richard Feynman

NEW EXECUTIVE ORDER/CHECK MATE? ~ BPEarthWatch


Note: I hereby remove any tacit consent, given by covert or overt means, on any timestream or dimension, that I may have given to the system of domination and control to rule over these realms by controlling or placing restrictions on the flow of information over the internet through tyrannical Orwellian tactics that threaten the physical, mental or spiritual well-being, or sovereignty of myself, or any other human BEing. And so mote it be.

Our Website, http://www.BPEarthWatch.Com
White House Link https://www.whitehouse.gov/the-press-…

Cops Are FINALLY Being Sued For ILLEGALLY Spraying Standing Rock Protesters With Water In Freezing Temperatures


December 10, 2016 10:44 pm by Jafari Tishomingo

fotonoticia_20161121174300_800

An Excessive Force lawsuit was filed against the Morton Country Sheriff for the gruesome events that took place during a November 20 bridge attack on Water Protectors at DAPL, but the Sheriff’s office continues to assault people claiming the Sheriff simply didn’t know that the lawsuit had been filed.

Why didn’t Sheriff Kyle Kirchmeier know about the lawsuit?

Because he used his power of office to refuse being served with the paperwork. According to a motion brought before Judge Daniel Hovland, “Although he was present in his office, Sheriff Kirchmeier did not make himself available for personal service. On the morning of December 1, the Morton County States Attorney accepted service on behalf of Sheriff Kirchmeier.”

Here is a clear example of law enforcement using their power to manipulate the law for their own benefit. While this may be a shocking piece of information for some people, Water Protectors at DAPL are not surprised at all. To Natives, this is just another example on a long, long list of atrocities and lies from the US Government.

The lawsuit names not only the Morton County Sheriff but also Mandan Police Chief Jason Ziegler. You may remember Ziegler from his snarky comments defending the use of force against protestors. “It was effective, wasn’t it? We can use whatever force is necessary to maintain peace. When they are throwing rocks, burning logs, shooting slingshots with projectiles at our officers, that would fall under what we would call less lethal, same things as rubber bullets, which doesn’t hurt as much.”

Water Protectors are throwing rocks, and law enforcement disproportionally retaliates with all sorts of “Non-lethal” ordinances such as water cannons, lead-filled beanbags, and explosive teargas grenades. According to Ziegler, it’s ok because “it was effective, wasn’t it?”

It is deeply disturbing to know that in the eyes of law enforcement, we’re still living in a time when outright state-funded violence is the go-to method for resolving conflicts.

 It really is “pitchfork and torches time in America,” like Milwaukee Sheriff David A Clarke said in October.

Ole Dammegård: Message to military & Police (with Dutch subs)


English spoken/Dutch subs: Ole Dammegård speaks directly to police officers and people from the military, an important message! NL: Ole Dammegård spreekt rechtstreeks tot militairen en politiemensen, een belangrijke boodschap! See also: ENGLISH: http://www.cooperatiedevrijemedia.nl/… DUTCH: http://www.cooperatiedevrijemedia.nl/…
Website Ole: http://www.lightonconspiracies.com

Pokémon Go, the CIA, “Totalitarianism” and the Future of Surveillance


Courtesy of Aletho News 7/29/16

By Steven MacMillan – New Eastern Outlook – 29.07.2016

345345345345If anyone doubted that a percentage of the global population are akin to zombies, the incidents following the release of Pokémon Go have surely convinced you. Despite the game only being released in early July, we have already seen a man driving into a tree and a women getting locked in a graveyard whilst chasing these furry little creatures.

Pokémon describes the game on their website in the following way:

“Travel between the real world and the virtual world of Pokémon with Pokémon GO for iPhone and Android devices. With Pokémon GO, you’ll discover Pokémon in a whole new world—your own! Pokémon GO is built on Niantic’s Real World Gaming Platform and will use real locations to encourage players to search far and wide in the real world to discover Pokémon… In Pokémon GO, the real world will be the setting!”

Pokémon Go, Google, the State Department, the CIA and the DoD

The company behind Pokémon Go is a San Francisco software developer called Niantic, Inc, which was formed in 2010 as an internal startup at Google. The founder and current CEO of Niantic is John Hanke, a man who has connections both to the State Department and the CIA.

Before moving to San Francisco to study at the University of California, Hanke previously worked for the US State Department in Myanmar. Hanke also founded Keyhole, Inc in 2001, a company which specialized in geospatial data visualization applications. Google acquired the company in 2004, with many of the applications developed by Keyhole being instrumental in Google Maps and Earth. In 2003, the CIA’s venture-capitalist firm, In-Q-Tel, invested in Keyhole, with the CIA’s own website proudly detailing this investment:

“The CIA-assisted technology probably most familiar to you is one many of us use on a regular basis:  Google Earth. In February 2003, the CIA-funded venture-capitalist firm In-Q-Tel made a strategic investment in Keyhole, Inc., a pioneer of interactive 3-D earth visualization and creator of the groundbreaking rich-mapping EarthViewer 3D system. CIA worked closely with other Intelligence Community organizations to tailor Keyhole’s systems to meet their needs. The finished product transformed the way intelligence officers interacted with geographic information and earth imagery.”

One of the other intelligence organizations the CIA worked alongside was the National Geospatial-Intelligence Agency (NGA), which is partly under the control of the US Department of Defense (DoD).

So we have a somewhat enigmatic former State Department employee with connections to the CIA and the DoD, being the CEO of a company that created what seems to be a silly, harmless game. What’s going on?

Selling and Sharing Your Data

Like so many new technologies in our digital age, Pokémon Go is constantly gathering information on the user and then openly admitting that they will share this data with anyone who wants it.

As James Corbett pointed out in his article titled: The CIA’s ‘Pokémon Go’ App is Doing What the Patriot Act Can’t, the privacy policy of the app states that Niantic will share all the information they gather (which is a lot) with the state and private organizations:

“We cooperate with government and law enforcement officials or private parties to enforce and comply with the law. We may disclose any information about you (or your authorized child) that is in our possession or control to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate.”

Corbett also details how the game requires the user to give excessive access to Niantic/CIA/NGA/DoD (including access to the users Google account and camera).

Oliver Stone on PG: “Totalitarianism” and a “New Level of Invasion”

Speaking at this year’s Comic-Con, Oliver Stone – the award winning filmmaker and director of the new film on Edward Snowden – had some very insightful views on the new craze and the growing business of data-mining. As Vulture magazine reported in a recent article, Stone denounced the game as a “new level of invasion” and a new form of “totalitarianism:”

“I’m hearing about it too; it’s a new level of invasion. Once the government had been hounded by Snowden, of course the corporations went into encryption, because they had to for survival, right? But the search for profits is enormous. Nobody has ever seen, in the history of the world, something like Google – ever! It’s the fastest-growing business ever, and they have invested huge amounts of money into what surveillance is; which is data-mining.”

Stone continues:

“They’re data-mining every person in this room for information as to what you’re buying, what it is you like, and above all, your behavior. Pokémon Go kicks into that. It’s everywhere. It’s what some people callsurveillance capitalism; it’s the newest stage. You’ll see a new form of, frankly, a robot society, where they will know how you want to behave and they will make the mockup that matches how you behave and feed you. It’s what they call totalitarianism.”

Predicting Human Behavior

It is interesting that Stone doesn’t just warn about the commercial aspect of data-mining, but the fact that the more data governments and private corporations collect on the citizens of the world, the easier it becomes to predict their behavior. It is not just Stone that is warning about this reality however. At the start of last year, the UK governments own surveillance commissioner, Tony Porter, revealed how data obtained from CCTV cameras can be used to “predict behavior.”

As we progress through the 21st century and more advanced algorithmic systems are developed to process the tsunami of data, intelligence agencies and governments will increasingly be able to predict (and manipulate) the behavior of their populations and the populations of foreign countries. We are already far along this path, will the trajectory for the future heading straight towards levels of surveillance far beyond even what George Orwell envisaged; with the fight for digital privacy being a major battleground in this century for those who value freedom.

Pokémon Go looks more like a Trojan horse of the CIA and the wider intelligence-security-data-mining-Big-Brother complex, than just a silly, innocent game.  With all these connections to the State Department, the CIA and the DoD, no wonder some countries are reportedly considering banning the game.

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

2012 The Awakening is supported by donations and the generosity of readers who honor the “energetic exchange for value” principle. If you find value in the material posted here and are financially comfortable, will you consider pledging a small monthly sum to help keep this blog afloat? Currently I’ve fallen way behind on my bills, have run up against unexpected expenses and am really struggling to make ends meet – so even the smallest donation are highly valued, appreciated and will go a long way toward helping. 

You can also lend your support by purchasing goods thru the merchant affiliate programs links provided below.

Also, I’d like to thank subscribers and everyone who’s ever donated in the past, to express my gratitude for your generosity, thoughtfulness & support!

Mahalo nui, Annette

If links are dead, please contact me at { ascendingstarseed at gmail dot com }.

AFFILIATE PROGRAMS

SD Bullion

  • Friday, June 30 Silver Prices Burst Through Critical Resistance
    Jumping Nearly 7%
  • Up over $2 in Two Days
  • Just Pennies From $20/oz
  • Buy silver rounds for 49cents over spot while sale and supply’s lasts

Learn more here: Get the best deals on clearance items while supplies last at SDBullion.com!

NuMANNA The Industry Standard in Storable Food:

  • Standard Buckets are GMO-Free
  • Contain no: Aspartame, High Fructose Corn Syrup, Autolyzed Yeast Extract, Chemical Preservatives or Soy.
  • No Gluten Buckets contain no Wheat ingredients.

Learn more here: numanna.com/awakening

 

AquaNui Home Water Distillers

  • AquaNui home water distillers are made for the family who wants to drink the purest water available.
  • With over 45 years of experience, we offer the best counter-top water distiller around.
  • Your AquaNui distiller for water will protect you and your family from harmful contaminants like arsenic, chlorine, lead, mercury, pesticides and nitrates. In addition to that, it removes bacteria, viruses and any biologicals.

www.MyAquaNui.com
Water Made Wonderful

The Droplet Blog

Zen and now Zen Gardner talks to Ole Dammegard – 29 March 2016


Problem. Reaction. Solution. (Brussels Edition) ~ Corbett Report


SHOW NOTES: https://www.corbettreport.com/?p=18241

The dust has barely settled on the site of the Brussels bomb blasts and already the EUreaucrats are salivating about the prospect of a pan-European intelligence agency. Join James for today’s Thought for the Day as he explains the latest example of how the authoritarians take more control after every major terror event.

Social Engineering 101 ~ Corbett Report Extras


SHOW NOTES and MP3: https://www.corbettreport.com/?p=4868

Your habits, your opinions, your thoughts and routines: what could be more personal than these? But what if your thoughts are not your own? Join us this week on The Corbett Report as we expose the social engineering agenda, from the bigger bigger picture to the nitty gritty detail.

Max Igan: The Storm Has Come


Max Igan – Surviving the Matrix – Episode 250 – AVR – Feb 12th, 2016
http://thecrowhouse.com
http://fullcircleproject.net

Sage Of Quay Radio – Jordan Maxwell – The Law Is Not King (Jan 2016)


Tonight Jordan Maxwell returns to the show.

For more than 50 years, Jordan continues as a preeminent researcher and independent scholar in the field of occult and religious philosophy. He served for three-and-a-half years as the Religion Editor of Truth Seeker Magazine, America’s oldest Freethought Journal which was established in 1873) His work exploring the hidden foundations of Western religions and secret societies has captivated the attention of critical thinkers from around the world.

He has conducted dozens of intensive seminars; hosted his own radio talk shows; appeared on more than 600 radio shows; and has written, produced and appeared in numerous television shows and documentaries – all devoted to understanding ancient religions and their pervasive influence on the world today.

His work on the subject of secret societies and their symbols, has fascinated his world wide audience for decades.

For this discussion Jordan will talk to us about the influence of religion on the societies and cultures of the world, the corporate governance which encapsulates our lives and then finish up with how the Abrahamic religions originated from Hindu mythos.

Jordon’s website is jordanmaxwellshow.com and a highly recommended section of his website is Jordan’s Research Society where for a $30 subscription, you will have access to a plethora of Jordan’s private research documents.

Jordan’s Website:
https://jordanmaxwellshow.com/

Jordan’s Research Society
https://jordanmaxwellresearch.is/

Sage of Quay Blog: http://sageofquayradio.blogspot.com/

DISCLAIMER and TERMS
The views and opinions expressed by any guest featured on The Sage of Quay Radio Hour are those of the guest and do not necessarily reflect the opinions or views of the host Mike Williams or of the The Sage of Quay Radio Hour as a whole.

All content provided on The Sage of Quay Radio Hour is for informational purposes only. We make no representations as to the accuracy or completeness of any information discussed or presented during the show or found by following any link mentioned in the broadcast or in the show notes.

All Sage of Quay Radio Hour shows and interviews are copyrighted. No portion of this presentation or any Sage of Quay Radio Hour show may be used, reproduced, altered or uploaded in part or whole without the expressed written consent of Mike Williams.

Any and all images used in this video or any other Sage of Quay Radio Hour presentation are considered to be in the public domain, free to use, royalty free material we have licensed or in compliance with the Fair Use Clause contained within the Copyright Act (17 US Code § 107). If by chance this is not the case and you are the rightful owner please contact us at sageofquay@aol.com.

The song ‘Truth’ and ‘Free’ is from Mike’s album Leaving Dystopia http://www.laboroflovemusic.com/

© 2012 M. Williams – All Rights Reserved

Michael Tsarion: Paris, Islam, Zionism & The Red Papacy (Part 1 & 2)


Submitted by Karen, mahalo!

*See Links Below* In this Episode we take a very fascinating and in-depth look at the real matrix of power that operates in the world behind the scenes in relation to whats happening in the Middle East, the recent Paris attacks, Geo-Politics, Media, Religion, Zionsim, the Ottoman Empire, the Jesuits, the Red Papacy, the Nazis, the Royals, Black Lodge Masonry, Templarism, the unconscious mind, Psychology and more. We even touch briefly on this recent flat earth meme and the return of other medieval and pre-medieval ideas and why its being pushed at this time in particular.

Part 1

Part 2

Max Igan ~ A Storm is Coming


Max Igan – Surviving the Matrix – Episode 246 – AVR – Dec 05, 2015
http://thecrowhouse.com
http://fullcircleproject.net

Anna von Reitz – The Birth Certificate — The Evidence of the Crime Against Your Life


Reblogged from followingworldchange.com

images

http://mainerepublicemailalert.com/2015/10/21/the-birth-certificate-the-evidence-of-the-crime-against-your-life/

Posted on

I have been asked to summarize this issue many times, so here it is in the proverbial nutshell.
.
The problem is that privately owned for-profit corporations under contract to provide government services have misrepresented themselves as the government and used that presumed position of public trust to defraud us, enslave us, and levy false claims against us and our assets in the foreign jurisdiction of international commerce.
.

The misuse and abuse of “birth certificates” and their misrepresentation as “voluntary private contracts” has led to the literal enslavement of hundreds of millions of people worldwide almost a hundred years after slavery was universally outlawed. These issues of economic slavery and “slavery via corporate proxy” must be addressed and the mechanisms used to promote this abuse must be dismantled.

The registration of live births in America and throughout the former British Empire, most of Europe, and Japan is used not to simply record the birth of babies, but to name commercial “vessels” after those babies. These proxy entities may be variously constructed as estate trusts, foreign situs trusts, or even public transmitting utilities—- the creators of these incorporated entities named after living children then operate these corporations and accrue debts that they false charge against the living people using the deceitfully similar name as a means to defraud the victims. This is a bunko crime known as “personage”—knowingly “mistaking on purpose” a living man for a corporation using the same or similar name— for example, mistaking a man named “James Clarence Penny” for the retail department store doing business as “JC PENNY”.

The corollary crime routinely practiced by attorneys and barristers is known as “barratry”—knowingly bringing charges against this corporate proxies “as if” they were the same as the living people they are named after, and addressing those same people as defendents in civil and criminal actions. This is the tip of the iceberg of the harm that is routinely done to living people via the misuse of incorporated proxy entities merely named after them. It is a venal institutionalized fraud scheme that must be recognized for what it is and attacked by every peaceful and determined means possible.

When my son was born I was presented with the paperwork that all new Mothers are coerced to sign. When I refused I was bluntly told by two menacing interns and a Catholic Nun that I either signed or my son would be kept in State custody and I would not be allowed to take him home. Please bear in mind that I was a successful 40 year old married career woman with no criminal record, no addiction problems, no history of mental illness. There was and is no possible excuse for the way I and millions of other American women are treated and the extortion used to secure an inequitable, involuntary, and unconscionable “public” commercial interest in our babies as a chattel properties being bonded and used as collateral to finance the “public debt” of these private governmental services corporations pretending to be the American government.

Those responsible were and are criminals engaged in press-ganging land assets into the international jurisdiction of the sea, inland piracy, enslavement, human trafficking, unlawful conversion, extortion, racketeering, armed robbery, kidnapping, commercial fraud, and conspiracy against The Constitution for the United States of America. Every single person involved in this needs to be charged and arrested and thrown in jail without further delay, but the police are employed by the same privately owned and operated corporations that are benefitting themselves from these gross abuses.

That is, the police forces that we depend upon to enforce the Public Law are operating instead as private commercial mercenaries, not as public peacekeeping officers at all. The foxes are indeed guarding the hen houses of America, a circumstance that again requires awareness and action by the body politic to resolve.

As I have explained, the organizations we are dealing with are governmental services corporations—- not our lawful government. They are merely claiming to “represent” our government in the absence of our actual government, which is owed to us, and which must be provided by us. This addresses the heart of what “self-government” means.

Every living American has more civil authority on the land jurisdiction of the Continental United States than the entire Federal United States government. It’s time that we exercised that inherent power and put an end to this gross criminality, fraud, and usurpation by our “public servants”.

The historical facts and timeline progression of how we got into this mess is fully explained in “You Know Something Is Wrong When…..An American Affidavit of Probable Cause”, available on Amazon. com.

FBI Pleads “Stop Filming Police! It’s Making Them Look Bad!” ~ Corbett Report


SHOW NOTES: https://www.corbettreport.com/?p=16768

For the first time in decades, violent crime is back on the rise in major urban centers across America. What’s the problem? Fed-induced recession driving people into desperate poverty? Media-hyped race baiting inciting social discord? The militarization of police and tightening of the police state noose? No, it’s smartphone cameras that are the culprit according to FBI director James Comey. James Corbett breaks down the propaganda and reminds you why the police are so scared of cameras.

Norway’s police haven’t killed a single person in nearly 10 years


shutterstock_246237466-800x430

http://wearechange.org/norways-police-havent-killed-a-single-person-in-nearly-10-years/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+wrc+%28We+Are+Change%29

(RAWSTORY) Police in Norway hardly ever use their guns, a new report released by the Scandinavian country’s government shows. In fact, it’s been almost 10 years since law enforcement shot and killed someone, in 2006.

Perhaps the most telling instance was when terrorist Anders Breivik opened fire in 2011 and killed 77 people in Utoya and Oslo. Authorities fired back at him, all right, but only a single time. In 2014, officers drew their guns 42 times, but they fired just two shots while on duty. No one was hurt in either of those instances.

Considering that police officers in the United States have killed more than 600 people this year alone, the report certainly is eye-opening. Of course, law enforcement officials in the United States face greater threats of violence while on duty.

Guns are not central to police activity in Norway, which is one reason why the law enforcement shooting rates are so low. As in Britain, police in Norway typically patrol while unarmed and only bear arms in extenuating situations.

In the past, experts have said that reevaluating U.S. law enforcement tactics–specifically having less of an emphasis on force and making face-to-face interactions more common–could help cut the shooting rates there, at least in the short term. A more complicated issue is the relative lack of trust in police officers in the U.S.

Sociologist Guðmundur Oddsson, speaking to Tech Insider, said Norwegians’ higher sense of trust in law enforcement was perhaps one of the reasons for the country’s low gun violence rates. “Trust is an extremely powerful mechanism of informal social control. In smaller, more ethnically homogeneous countries like Norway, building that trust is easy. People feel a sense of togetherness for many reasons, including the fact that most people look similar and hold similar beliefs,” he said.

http://www.rawstory.com/2015/08/norways-police-havent-killed-a-single-person-in-nearly-10-years/

Drivers, Beware: The Costly, Deadly Dangers Of Traffic Stops In The American Police State ~ ZeroHedge


 

Tyler Durden's picture

Submitted by John Whitehead via The Rutherford Institute,

“The Fourth Amendment was designed to stand between us and arbitrary governmental authority. For all practical purposes, that shield has been shattered, leaving our liberty and personal integrity subject to the whim of every cop on the beat, trooper on the highway and jail official. The framers would be appalled.”—Herman Schwartz, The Nation

Trying to predict the outcome of any encounter with the police is a bit like playing Russian roulette: most of the time you will emerge relatively unscathed, although decidedly poorer and less secure about your rights, but there’s always the chance that an encounter will turn deadly.

The odds weren’t in Walter L. Scott’s favor. Reportedly pulled over for a broken taillight, Scott—unarmed—ran away from the police officer, who pursued and shot him from behind, first with a Taser, then with a gun. Scott was struck five times, “three times in the back, once in the upper buttocks and once in the ear — with at least one bullet entering his heart.”

Samuel Dubose, also unarmed, was pulled over for a missing front license plate. He was reportedly shot in the head after a brief struggle in which his car began rolling forward.

Levar Jones was stopped for a seatbelt offense, just as he was getting out of his car to enter a convenience store. Directed to show his license, Jones leaned into his car to get his wallet, only to be shot four times by the “fearful” officer. Jones was also unarmed.

Bobby Canipe was pulled over for having an expired registration. When the 70-year-old reached into the back of his truck for his walking cane, the officer fired several shots at him, hitting him once in the abdomen.

Dontrell Stevens was stopped “for not bicycling properly.” The officer pursuing him “thought the way Stephens rode his bike was suspicious. He thought the way Stephens got off his bike was suspicious.” Four seconds later, sheriff’s deputy Adams Lin shot Stephens four times as he pulled out a black object from his waistband. The object was his cell phone. Stephens was unarmed.

If there is any lesson to be learned from these “routine” traffic stops, it is that drivers should beware.

At a time when police can do no wrong—at least in the eyes of the courts, police unions and politicians dependent on their votes—and a “fear” for officer safety is used to justify all manner of police misconduct, “we the people” are at a severe disadvantage.

According to the Justice Department, the most common reason for a citizen to come into contact with the police is being a driver in a traffic stop. On average, one in 10 Americans gets pulled over by police. Black drivers are 31 percent more likely to be pulled over than white drivers, or about 23 percent more likely than Hispanic drivers. As the Washington Post concludes, “‘Driving while black’ is, indeed, a measurable phenomenon.”

As Sandra Bland learned the hard way, the reason for a traffic stop no longer matters. Bland, who was pulled over for allegedly failing to use her turn signal, was arrested after refusing to comply with the police officer’s order to extinguish her cigarette and exit her vehicle. The encounter escalated, with the officer threatening to “light” Bland up with his taser. Three days later, Bland was found dead in her jail cell.

You’re doing all of this for a failure to signal?” Bland asked as she got out of her car, after having been yelled at and threatened repeatedly. Had she only known, drivers have been pulled over for far less. Indeed, police officers have been given free range to pull anyone over for a variety of reasons.

This approach to traffic stops (what I would call “blank check policing,” in which the police get to call all of the shots) has resulted in drivers being stopped for windows that are too heavily tinted, for driving too fast, driving too slow, failing to maintain speed, following too closely, improper lane changes, distracted driving, screeching a car’s tires, and leaving a parked car door open for too long.

Motorists can also be stopped by police for driving near a bar or on a road that has large amounts of drunk driving, driving a certain make of car (Mercedes, Grand Prix and Hummers are among the most ticketed vehicles), having anything dangling from the rearview mirror (air fresheners, handicap parking permits, troll transponders or rosaries), and displaying pro-police bumper stickers.

Incredibly, a federal appeals court actually ruled unanimously in 2014 that acne scars and driving with a stiff upright posture are reasonable grounds for being pulled over. More recently, the Fifth Circuit Court of Appeals ruled that driving a vehicle that has a couple air fresheners, rosaries and pro-police bumper stickers at 2 MPH over the speed limit is suspicious, meriting a traffic stop.

Unfortunately for drivers, not only have traffic stops become potentially deadly encounters, they have also turned into a profitable form of highway robbery for the police departments involved.

As The Washington Post reports, traffic stops for minor infractions such as speeding or equipment violations are increasingly used as a pretext for officers to seize cash from drivers.” Relying on federal and state asset forfeiture laws, police set up “stings” on public roads that enable them to stop drivers for a variety of so-called “suspicious” behavior, search their vehicles and seize anything of value that could be suspected of being connected to criminal activity. Since 2001, police have seized $2.5 billion from people who were not charged with a crime and without a warrant being issued.

“In case after case,” notes The Washington Post, “highway interdictors appeared to follow a similar script. Police set up what amounted to rolling checkpoints on busy highways and pulled over motorists for minor violations, such as following too closely or improper signaling. They quickly issued warnings or tickets. They studied drivers for signs of nervousness, including pulsing carotid arteries, clenched jaws and perspiration. They also looked for supposed ‘indicators’ of criminal activity, which can include such things as trash on the floor of a vehicle, abundant energy drinks or air fresheners hanging from rearview mirrors.”

If you’re starting to feel somewhat overwhelmed, intimidated and fearful for your life and your property, you should be. Never before have “we the people” been so seemingly defenseless in the face of police misconduct, lacking advocates in the courts and in the legislatures.

So how do you survive a police encounter with your life and wallet intact?

The courts have already given police the green light to pull anyone over for a variety of reasons. In an 8-1 ruling in Heien v. North Carolina, the U.S. Supreme Court affirmed that police officers can pull someone over based on a “reasonable” but mistaken belief about the law.

Of course, what’s reasonable to agents of the police state may be completely unreasonable to the populace. Nevertheless, the moment those lights start flashing and that siren goes off, we’re all in the same boat: we must pull over.

However, it’s what happens after you’ve been pulled over that’s critical. Survival is the key.

Technically, you have the right to remain silent (beyond the basic requirement to identify yourself and show your registration). You have the right to refuse to have your vehicle searched. You have the right to film your interaction with police. You have the right to ask to leave. You also have the right to resist an unlawful order such as a police officer directing you to extinguish your cigarette, put away your phone or stop recording them.

However, as Bland learned the hard way, there is a price for asserting one’s rights. “Faced with an authority figure unwilling to de-escalate the situation, Bland refused to be bullied or intimidated,” writes Boston Globe contributor Renee Graham. “She understood her rights, but for African-Americans in encounters with police, the appalling price for asserting even the most basic rights can be their lives.”

So if you don’t want to get probed, poked, pinched, tasered, tackled, searched, seized, stripped, manhandled, arrested, shot, or killed, don’t say, do or even suggest anything that even hints of noncompliance when it comes to interactions with police.

One police officer advised that if you feel as if you’re being treated unfairly, comply anyhow and contest it in court later. Similarly, black parents, advising their kids on how to deal with police, tell them to just obey the officer’s orders. “The goal,” as one parent pointed out, “is to stay alive.”

It seems that “comply or die” has become the new maxim for the American police state.

Then again, not even compliance is a guarantee of safety anymore. “Police are specialists in violence,” warns Kristian Williams, who has written extensively on the phenomenon of police militarization and brutality. “They are armed, trained, and authorized to use force. With varying degrees of subtlety, this colors their every action. Like the possibility of arrest, the threat of violence is implicit in every police encounter. Violence, as well as the law, is what they represent.”

In other words, in the American police state, “we the people” are at the mercy of law enforcement officers who have almost absolute discretion to decide who is a threat, what constitutes resistance, and how harshly they can deal with the citizens they were appointed to “serve and protect.”

As I point out in my book Battlefield America: The War on the American People, this mindset that any challenge to police authority is a threat that needs to be “neutralized” is a dangerous one that is part of a greater nationwide trend that sets the police beyond the reach of the Fourth Amendment. Moreover, when police officers are allowed to operate under the assumption that their word is law and that there is no room for any form of disagreement or even question, that serves to chill the First Amendment’s assurances of free speech, free assembly and the right to petition the government for a redress of grievances.

Frankly, it doesn’t matter whether it’s a casual “show your ID” request on a boardwalk, a stop-and-frisk search on a city street, or a traffic stop for speeding or just to check your insurance. If you feel like you can’t walk away from a police encounter of your own volition—and more often than not you can’t, especially when you’re being confronted by someone armed to the hilt with all manner of militarized weaponry and gear—then for all intents and purposes, you’re under arrest from the moment a cop stops you.

Sad, isn’t it, how quickly we have gone from a nation of laws—where the least among us had just as much right to be treated with dignity and respect as the next person (in principle, at least)—to a nation of law enforcers (revenue collectors with weapons) who treat us all like suspects and criminals?

Clearly, the language of freedom is no longer the common tongue spoken by the citizenry and their government. With the government having shifted into a language of force, “we the people” have been reduced to suspects in a surveillance state, criminals in a police state, and enemy combatants in a military empire.

http://www.zerohedge.com/news/2015-07-28/drivers-beware-costly-deadly-dangers-traffic-stops-american-police-state

3-Year-Old London Child Deemed “Extremist”; Placed In Government Reeducation Program


Note: Tyler Durden: “The United Kingdom has gone batshit crazy.”

Couldn’t have said it better myself! Stunning degree of psychopathy on behalf of British officials, absolutely unbelievable. Of course, over here in the U.S. we drug kids into subordination and indoctrination, where toddlers are prescribed prozac to control a variety of “mental disorders”.

What’s the difference between locking a kid up behind bars, or making them prisoners in their own minds?

Blessings, {~A~}

Tyler Durden's picture

Submitted by Mike Krieger via Liberty Blitzkrieg blog,

The United Kingdom has gone batshit crazy. There’s simply no other way to put it. I warned about Britain’s “war on toddler terrorists” earlier this year in the post: The War on Toddler Terrorists – Britain Wants to Force Nursery School Teachers to Identify “Extremist” Children. Here’s an excerpt:

Nursery school staff and registered childminders must report toddlers at risk of becoming terrorists, under counter-terrorism measures proposed by the Government.

The directive is contained in a 39-page consultation document issued by the Home Office in a bid to bolster its Prevent anti-terrorism plan.

The document accompanies the Counter-Terrorism and Security Bill, currently before parliament. It identifies nurseries and early years childcare providers, along with schools and universities, as having a duty “to prevent people being drawn into terrorism”.

Never fear good citizens of Great Britain. While your government actively does everything in its power to protect criminal financial oligarchs and powerful pedophiles, her majesty draws the line at toddler thought crime. We learn from the Independent:

A three-year-old child from London is one of hundreds of young people in the capital who have been tipped as potential future radicals and extremists.

As reported by the Evening Standard, 1,069 people have been put in the government’s anti-extremism ‘Channel’ process, the de-radicalization program at the heart of the Government’s ‘Prevent’ strategy.

The three-year-old in the program is from the borough of Tower Hamlets, and was a member of a family group that had been showing suspect behavior.

Since September 2014, 400 under 18s, including teenagers and children, have been referred to the scheme.

The fact that this story broke on the same day that chairman of the UK’s Lords Privileges and Conduct Committee, Lord John Sewel, was caught on video snorting cocaine off the breast of a prostitute with a £5 note, is simply priceless. You just can’t make this stuff up.

From the BBC:

Lord Sewel is facing a police inquiry after quitting as House of Lords deputy speaker over a video allegedly showing him taking drugs with prostitutes.

The footage showed him snorting powder from a woman’s breasts with a £5 note.

In the footage, Lord Sewel, who is married, also discusses the Lords’ allowances system.

As chairman of committees, the crossbench peer also chaired the privileges and conduct committee, and was responsible for enforcing standards in the Lords.

Lord Sewel served as a minister in the Scotland office under Tony Blair’s Labour government.

Tony Blair, why am I not surprised:

Screen Shot 2015-07-27 at 11.48.13 AM

He has been a member of the Lords since 1996, and is a former senior vice principal of the University of Aberdeen.

Here’s a clip, in the event you’re interested:

 

The UK government is so far gone that it insists on protecting the public from toddlers, rather than protecting toddlers from powerful sexual predators. In case you need a reminder:

In Great Britain, Powerful Pedophiles are Seemingly Everywhere and Totally Above the Law

In Great Britain, Protecting Pedophile Politicians is a Matter of “National Security”

Former BBC Host “Sir” Jimmy Savile Exposed as Major Player in Massive Pedophile Ring

http://www.zerohedge.com/news/2015-07-28/3-year-old-london-child-deemed-extremist-placed-government-reeducation-program

New definition of extremist: ‘Anybody who challenges the established order’


Note: American’s better wake-up to the smell of tyranny, the same thing is happening in the U.S., only more covertly.

Demonstrators from Occupy London protest. © Luke MacGregor
There is a worrying and dangerous tendency in the UK to label as extremists anybody who poses a challenge and who wants to protest against the unfair economic system that exists in the UK, journalist and broadcaster Neil Clark told RT.

City of London police have been attacked for pigeonholing an anti-capitalist group, alongside Al-Qaeda and IRA. An anti-terror presentation for nursery and school staff featured a picture of the Occupy London campaign alongside images from the 7/7 London bombings in 2005 and an IRA attack in 1996. The anti-inequality group was also categorized as an example of domestic extremism.

RT: As we’ve heard London police have placed movements like the Occupy London movement alongside international terrorist groups. What are your thoughts on calling movements like these extremist?

Neil Clark: I think this all fits in with what’s been happening here in Britain because the government has got this new so-called ‘counter extremism initiative.’ They want to bring in a bill and… their definition of ‘extremism’ is deliberately designed to bring in people who challenge the established order. Of course it’s not just simply about terrorists; it’s about anybody who criticizes the capitalist system, anybody who poses any kind of challenge, and anybody who wants to protest against the existing very unfair economic system that we’ve got in Britain. This is worrying, this is dangerous.

I think we’ve got the biggest threat to our civil liberties in Britain at the moment under this government of David Cameron that we’ve had for many, many years – over 100 years certainly. I remember Cameron a few weeks ago made a very sinister speech when he said that for too long we’ve been a passively tolerant society [and] we’ve got to change that. And he said that in the past people who were not causing trouble would be left alone, and we’ve got to change that – I think it’s very sinister, really, because he is trying to clamp down on legitimate dissent.

RT: Why do you think the intention of the authorities was here?

NC: It’s very clear that what the intention of the authorities is to try to group together anyone who challenges the established order, and to group them all together as terrorists and extremists. So anybody who has any kind of dissenting views that wants to change our economic and political system will be equated with and put together with the most appalling terrorist groups like Al-Qaeda. This is all deliberate, it is all what it’s meant to do is meant to frighten people into conforming. And who wants to be equated with Al-Qaeda, let’s face it? But what they are doing, the authorities, are trying to use this anti-extremism agenda to really try to clamp down on legitimate dissent, legitimate protest, because the aim is, as I said, quite clearly is to group all these people together: ‘Occupy London,’ Al-Qaeda, terrorists, they all are the same, they all are extremists people, animal rights people…

RT: Does labeling of this kind have any impact on individuals and groups that disagree with government policies?

NC: I think lawful campaign groups will be absolutely incensed by this because we are in a very, very dangerous position here in Britain – our civil liberties are threatened in a way they have not been threatened for hundreds of years, probably. David Cameron in that very sinister speech said that he thinks that we’ve been passively tolerant society for too long…

One of the repercussions of that is that the legitimate groups who don’t like the way that country is run, who don’t like our very oligarchal ‘bankocracy’ system of government, who, for example want direct democracy, environmental campaigners, animal rights campaigners- all these people are not happy with the way things are. They were quite rightly being sensed that they are being bracketed with groups like Al-Qaeda. I think there is going to be a huge backlash to this, and that is the question of everybody who is dissenter drawing together now and saying: “Look, we’re not going to put up with this. We’ve got legitimate rights, we’ve got our concerns about the way the country is going, and we’re not going to allow ourselves to be branded extremists simply because we disagree with Mr. David Cameron.”

© Peter Nicholls

RT: Why are the authorities wary of protest movements? After all, they have a legitimate right to their opinion…

NC: Yes, I think that the City of London police has been accused in the past of not doing enough against the criminals in the City, the corrupt ‘banksters’, the financial crooks if you like of the City of London, and instead focus the attention on the petty crimes. You’re more likely to be arrested in the City of London for pick-pocketing than you are for doing a bank fraud worth millions of pounds. So I think that for the City of London police this is very regrettable. And they can’t just say they didn’t know what they were doing. The Occupy movement was very popular, the people made a legitimate statement against the kind of hardcore capitalist system that operates now in Britain. I think it’s a shame on the City of London police for doing this because their job is to be catching criminals and focusing on big criminals, not on trying to smear and put together legitimate protest groups with the most awful terrorist groups like Al-Qaeda.

RT: Can civil disobedience ever be linked to terrorism?

NC: They are doing that. I think the word ‘extremist’ is a very subjective term. The way that the British politics has gone over the last 30 years is that for anybody who holds the sort of what used to be a mainstream in the 1960-70’s in Britain, and I do: mixed economy, a fairer society, anti-war positions. Anybody who holds these views now is at risk of being labeled an extremist. We’ve gone so far to the neo-liberal right in this country; the neo-conservative takeover of power, the neo-conservative and neo-liberals that they brand anybody who doesn’t agree with their agenda as extremists.

The irony is that the biggest extremists are the British government at the moment. They are the ones who have been backing terrorists in Syria who they call rebels; they are the ones who have enabled and facilitated the rise of ISIS with their Middle East policies – these are the real extremists. They are the people who are pursuing extremist economic policies, extremist foreign policies, and they have the audacity to label people who want a more democratic Britain, to get back to the kind of fairer society that we had in the 1960’s and 1970’s in this country. They have the nerve to label these people as extremists, so it’s quite Orwellian. It is beyond George Orwell where you’ve got the moderates- other people who are being labeled as extremists. And the real extremists are the people in power at the moment in Britain.

‘The real terrorists are not those in tents’

Matthew Varnham, Occupy London’s legal advisor, suggests the UK government is labeling the movement as anti-social behavior just because it doesn’t fulfill their criteria of what they would like to see as protest.

RT: As we’ve heard City of London police have placed the movement you represent alongside international terrorist groups. What are your thoughts on being called an extremist?

Matthew Varnham: The fact is that being labeled an extremist is nothing new. In 2011, we were labeled ‘domestic extremists’ through the City of London’s terrorism and extremism update. London’s mayor, Boris Johnson, also referred to the protest as a ‘boil’ that needs to be removed. So it’s nothing new but it does disturb me that the City of London and the police would see a peaceful protest and a movement as something akin to terrorism. I find it particularly sickening that the movement was pictured next to 7/7 [London tube and bus bombings] and I would call on the commissioner, for example, to explain why those two images were next to each other.

RT: It’s been revealed that the mayor spent nearly £2 million pounds on policing a similar movement – Occupy Democracy. Was there any need to spend so much on policing dozens of protestors?

MV: That particular protest was held outside parliament in the run-up to the General Election and it was the most recent iteration of the Occupy movement. The policing of that protest was absolute and people were prevented from protesting on the square. That decision to close the square itself is actually open to a legal challenge currently being taken to the courts. What it does show is that a government – be it in the City of London, Square Mile or elsewhere – who is adamant that the rights of people who object to them are not going to be hurt. The real terrorists are not those in tents but are certainly the corporate and financial world… climate change, the melting ice caps… and high tuition fees. These are some of the things that Occupy was right about in 2011; its other things like that that they are raising now and the real terrorism are those who are introducing policies that prevent those view from being expressed.

RT: Does labeling of this kind have any impact on individuals and groups that disagree with government policies?

MV: The government is… looking at the issue of protesting the wrong way. It’s labeling it as anti-social behavior just by fact; it doesn’t fulfill their criteria of what they would like to see as protest. Protest isn’t going to fit in a particular box, it’s going to be messy and loud; it’s going to have an element of disruption. And the government increasingly can’t handle that.

*The following is a partial transcript of a press release sent out by Occupy London on July 21, 2015: Charges against 12 Occupy Democracy protesters were dropped [July 20] in the first two trials relating to the peaceful pro-democracy group’s occupation of Parliament Square in October 2014. Charges included refusing to comply with a direction to leave and for being in possession of a prohibited article, namely tarpaulin. A further trial relating to charges of aggravated trespass was dropped previously.

http://www.rt.com/op-edge/310290-occupy-london-extremism-uk/