Ole Dammegard | The Vegas Shooting: Inconsistencies & Strange Symbolism


In a rush this week, we have Ole Dammegard back to break down the latest tragedy, the Route 91 Harvest Festival shooting. Of course, because of Ole’s continued work dissecting false flags and terror events, he is one of the first to recognize elements at play that seem to follow the same template – a template that suggests these are highly planned and coordinated events, rather than the work of random, unmotivated, lone attackers. Our deepest sympathies to anyone who has experienced pain and loss due to such an event. To me, digging deeper into things that seem suspicious and inconsistent with media reports, is the best and most honorable thing we can do, short of going back in time. I know if I died in one of these situations, the last thing I’d want is for it to be a false flag situation that isn’t properly investigated. That said, what you’re getting here is a conversation about elements that don’t seem to add up, or contain strange symbolism/foreshadowing. We also discuss the major alternative theories and motivations. This is largely a synthesis of what we’re seeing so far, all alleged, and not everything can be fully vetted at this time. All we can do is examine it, and try our best to seek the truth. This isn’t fear porn. This isn’t capitalizing on a tragedy. Ole’s website: https://www.lightonconspiracies.com/

Advertisements

Ohio Reporter Shot Without Warning For Photographing Routine Traffic Stop


In one of the more bizarre stories to hit national news this week, an Ohio sheriff’s deputy is under investigation for shooting a local reporter who innocently set up a camera and tripod on a public sidewalk to document a routine traffic stop. What’s more is the shooting took place in a small town where “everyone knows everybody” and the police officer and victim were actually friends.

Ohio based New Carlisle News reports that its own photographer was shot in the incident which occurred Monday night:

Andy Grimm was shot by a Clark County deputy Monday evening. Andy had left the office around 10:00 p.m. to take pictures of lightning. There was a traffic stop on Main Street near Studebaker’s Restaurant, but Andy was not the subject of the stop. He had his camera and tripod in his hands and Deputy Jake Shaw apparently mistook it for a weapon and fired, striking Andy in the side. He was rushed to Miami Valley Hospital for surgery. He is expected to recover from his wounds.


Image source: New Carlisle News

Body camera video released by the Clark County Sheriff’s Office shows Deputy Jake Shaw shoot Grimm. The shooting sequence begins at 3:20 in as the officer is checking info inside the police car on speeder he pulls over.

In an unexpected twist, the wounded cameraman is now pleading for the officer to keep his job. Grimm told local reporters, “I know Jake. I like Jake. I don’t want him to lose his job over this,” in reference to the sheriff’s deputy that shot him.

The victim’s father, Dale Grimm, told The Washington Post that his son “got out, parked under a light in plain view of the deputy, with a press pass around his neck. He was setting up his camera, and he heard pops.” Sheriff’s deputy Jake Shaw reportedly gave no warning before firing.

The case has been turned over to the the Ohio state attorney general’s Bureau of Criminal Division. While it’s entirely possible that there’s much more here than what’s being reported – for example, there could have been some kind of personal dispute between the friends – the strange incident is part of a growing list of “shoot first, ask questions later” incidents which display an increasingly militarized and trigger-happy mentality by local and state police.

As we reported last week in The Alarming Militarization of American Police, it is deeply disturbing that the federal government currently seeks to pass on military hardware to local and state authorities which continue to display lack of judgement as well as over the top tactics while dealing with routine local civilian matters. Local police forces should never operate like the Pentagon, but it appears we’re headed down precisely that path:

President Donald Trump has signed an executive order clearing the way for local police in America to receive military gear such as grenade launchers, high-calibre weapons, and armored vehicles. Trump and the DOJ have just reversed former President Barack Obama’s restrictions that allows local police departments to receive surplus military equipment.

…Let’s not kid ourselves, America by the day is turning into a police state where power through police force is the objective. The citizens of the police state may experience restrictions on social or financial mobility, or even on their freedom to express or communicate alternative political views.

No, the sheriff’s deputy who possibly mistook a simple camera and tripod on a small-town street for a mounted assault rifle should not keep his job – he is an absolute danger to society. But could we imagine if such police made regular use of mounted 50-caliber machine guns and grenade launchers?

http://www.zerohedge.com/news/2017-09-06/ohio-reporter-shot-without-warning-photographing-routine-traffic-stop

On internet privacy, be very afraid


‘Surveillance is the business model of the internet,’ Berkman and Belfer fellow says

August 24, 2017
071117_Schneier_2835_605

In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.

In fact, internet users in the United States have fewer privacy protections than those in other countries. In April, Congress voted to allow internet service providers to collect and sell their customers’ browsing data. By contrast, the European Union hit Google this summer with a $2.7 billion antitrust fine.

To assess the internet landscape, the Gazette interviewed cybersecurity expert Bruce Schneier, a fellow with the Berkman Klein Center for Internet & Society and the Belfer Center for Science and International Affairs at Harvard Kennedy School. Schneier talked about government and corporate surveillance, and about what concerned users can do to protect their privacy.

GAZETTE: After whistleblower Edward Snowden’s revelations concerning the National Security Agency’s (NSA) mass surveillance operation in 2013, how much has the government landscape in this field changed?

SCHNEIER: Snowden’s revelations made people aware of what was happening, but little changed as a result. The USA Freedom Act resulted in some minor changes in one particular government data-collection program. The NSA’s data collection hasn’t changed; the laws limiting what the NSA can do haven’t changed; the technology that permits them to do it hasn’t changed. It’s pretty much the same.

GAZETTE: Should consumers be alarmed by this?

SCHNEIER: People should be alarmed, both as consumers and as citizens. But today, what we care about is very dependent on what is in the news at the moment, and right now surveillance is not in the news. It was not an issue in the 2016 election, and by and large isn’t something that legislators are willing to make a stand on. Snowden told his story, Congress passed a new law in response, and people moved on.

Graphic by Rebecca Coleman/Harvard Staff

GAZETTE: What about corporate surveillance? How pervasive is it?

SCHNEIER: Surveillance is the business model of the internet. Everyone is under constant surveillance by many companies, ranging from social networks like Facebook to cellphone providers. This data is collected, compiled, analyzed, and used to try to sell us stuff. Personalized advertising is how these companies make money, and is why so much of the internet is free to users. We’re the product, not the customer.

GAZETTE: Should they be stopped?

SCHNEIER: That’s a philosophical question. Personally, I think that in many cases the answer is yes. It’s a question of how much manipulation we allow in our society. Right now, the answer is basically anything goes. It wasn’t always this way. In the 1970s, Congress passed a law to make a particular form of subliminal advertising illegal because it was believed to be morally wrong. That advertising technique is child’s play compared to the kind of personalized manipulation that companies do today. The legal question is whether this kind of cyber-manipulation is an unfair and deceptive business practice, and, if so, can the Federal Trade Commission step in and prohibit a lot of these practices.

GAZETTE: Why doesn’t the commission do that? Why is this intrusion happening, and nobody does anything about it?

SCHNEIER: We’re living in a world of low government effectiveness, and there the prevailing neo-liberal idea is that companies should be free to do what they want. Our system is optimized for companies that do everything that is legal to maximize profits, with little nod to morality. Shoshana Zuboff, professor at the Harvard Business School, invented the term “surveillance capitalism” to describe what’s happening. It’s very profitable, and it feeds off the natural property of computers to produce data about what they are doing. For example, cellphones need to know where everyone is so they can deliver phone calls. As a result, they are ubiquitous surveillance devices beyond the wildest dreams of Cold War East Germany.

GAZETTE: But Google and Facebook face more restrictions in Europe than in the United States. Why is that?

SCHNEIER: Europe has more stringent privacy regulations than the United States. In general, Americans tend to mistrust government and trust corporations. Europeans tend to trust government and mistrust corporations. The result is that there are more controls over government surveillance in the U.S. than in Europe. On the other hand, Europe constrains its corporations to a much greater degree than the U.S. does. U.S. law has a hands-off way of treating internet companies. Computerized systems, for example, are exempt from many normal product-liability laws. This was originally done out of the fear of stifling innovation.

“Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.”
               —Bruce Schneier,cybersecurity expert

GAZETTE: It seems that U.S. customers are resigned to the idea of giving up their privacy in exchange for using Google and Facebook for free. What’s your view on this?

SCHNEIER: The survey data is mixed. Consumers are concerned about their privacy and don’t like companies knowing their intimate secrets. But they feel powerless and are often resigned to the privacy invasions because they don’t have any real choice. People need to own credit cards, carry cellphones, and have email addresses and social media accounts. That’s what it takes to be a fully functioning human being in the early 21st century. This is why we need the government to step in.

GAZETTE: You’re one of the most well-known cybersecurity experts in the world. What do you do to protect your privacy online?

SCHNEIER: I don’t have any secret techniques. I do the same things everyone else does, and I make the same tradeoffs that everybody else does. I bank online. I shop online. I carry a cellphone, and it’s always turned on. I use credit cards and have airline frequent flier accounts. Perhaps the weirdest thing about my internet behavior is that I’m not on any social media platforms. That might make me a freak, but honestly it’s good for my productivity. In general, security experts aren’t paranoid; we just have a better understanding of the trade-offs we’re doing. Like everybody else, we regularly give up privacy for convenience. We just do it knowingly and consciously.

GAZETTE: What else do you do to protect your privacy online? Do you use encryption for your email?

SCHNEIER: I have come to the conclusion that email is fundamentally insecurable. If I want to have a secure online conversation, I use an encrypted chat application like Signal. By and large, email security is out of our control. For example, I don’t use Gmail because I don’t want Google having all my email. But last time I checked, Google has half of my email because you all use Gmail.

GAZETTE: What does Google know about you?

SCHNEIER: Google’s not saying because they know it would freak people out. But think about it, Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.

GAZETTE: Is Google the “Big Brother?”

SCHNEIER: “Big Brother” in the Orwellian sense meant big government. That’s not Google, and that’s not even the NSA. What we have is many “Little Brothers”: Google, Facebook, Verizon, etc. They have enormous amounts of data on everybody, and they want to monetize it. They don’t want to respect your privacy.

GAZETTE: In your book “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World,” you recommend a few strategies for people to protect their privacy online. Which one is the most effective?

SCHNEIER: Unfortunately, we live in a world where most of our data is out of our control. It’s in the cloud, stored by companies that may not have our best interests at heart. So, while there are technical strategies people can employ to protect their privacy, they’re mostly around the edges. The best recommendation I have for people is to get involved in the political process. The best thing we can do as consumers and citizens is to make this a political issue. Force our legislators to change the rules.

Opting out doesn’t work. It’s nonsense to tell people not to carry a credit card or not to have an email address. And “buyer beware” is putting too much onus on the individual. People don’t test their food for pathogens or their airlines for safety. The government does it. But the government has failed in protecting consumers from internet companies and social media giants. But this will come around. The only effective way to control big corporations is through big government. My hope is that technologists also get involved in the political process — in government, in think-tanks, universities, and so on. That’s where the real change will happen. I tend to be short-term pessimistic and long-term optimistic. I don’t think this will do society in. This is not the first time we’ve seen technological changes that threaten to undermine society, and it won’t be the last.

This interview has been edited for length and clarity.

 

https://news.harvard.edu/gazette/story/2017/08/when-it-comes-to-internet-privacy-be-very-afraid-analyst-suggests/

Oregon Officials Threaten To Seize 2,000 Acre Organic Farm, Spray It With Roundup ~ ZeroHedge


 Note: Need anymore proof America is a fascist state where Democracy is simply an illusion? Did you know the word Government broken down in Latin means:

Govern means to control

Ment means the mind.

It’s no wonder they stopped teaching Latin in public schools half a century ago. Enough said

Love and blessings {~A~}

Tyler Durden's picture

Authored by Mike Shedlock via MishTalk.com,

Sherman County Oregon believes the 2,000 acre Azure Farms is not doing enough to control Canada Thistle, a noxious weed. In this case, not doing enough means not spraying weeds with herbicides.

To remedy the alleged problem, the county proposes seizing the farm and spraying everything with Roundup and other herbicides. Azure Farms is certified organic. Of course, organic farms cannot by definition use herbicides, so the farm would be forced out of business by the county government.

Adding insult to injury, the county would place a lien on the property forcing it to pay for the herbicides.

Details of the proposed takeover can be found at Keep Azure Farm Organic

An Organic Farm Under Threat

Azure Farms is a working, Certified Organic farm located in Moro, Central Oregon, in Sherman County. It has been Certified Organic for about 18 years. The farm produces almost all the organic wheat, field peas, barley, Einkorn, and beef for Azure Standard.

Sherman County is changing the interpretation of its statutory code from controlling noxious weeds to eradicating noxious weeds. These weeds include Morning Glory, Canada Thistle, and Whitetop, all of which have been on the farm for many years, but that only toxic chemicals will eradicate.

Organic farming methods – at least as far as we know today – can only control noxious weeds—it is very difficult to eradicate them.

What’s Happening?

Sherman County may be issuing a Court Order on May 22, 2017, to quarantine Azure Farms and possibly to spray the whole farm with poisonous herbicides, contaminating them with Milestone, Escort and Roundup herbicides.

This will destroy all the efforts Azure Farms has made for years to produce the very cleanest and healthiest food humanly possible. About 2,000 organic acres would be impacted; that is about 2.8 times the size of the City of London, England, and 1.5 times the size of the city center of Philadelphia that could be sprayed with noxious, toxic, polluting herbicides.

The county would then put a lien on the farm to pay for the expense of the labor and chemicals used.

Take Action Now

If you are concerned about where your food comes from, enjoy Organic and non-GMO food grown in the United States, and support organic farmers, contact Sherman County Court before May 22, 2017 (and preferably before May 17 when the next court discussion will be held).

Contact info:

  1. Via email at lhernandez@co.sherman.or.us or…
  2. Call Lauren at 541-565-3416.

Raise your voice and speak up for you and your families and communities.

This proposed action is completely unreasonable and would destroy an organic farm and pollute a massive area. If enough voices that benefit from organic produce speak up, the county will understand that there are people that care about their food NOT containing toxic chemicals. And if the supporters of healthy food can have a louder voice than the supporters of toxic chemicals, every politician will listen. PLEASE take action today and share this message. Overwhelm the Sherman County representatives with your voice.

Sincerely,

Nathan Stelzer
Azure Farm Manager

Agricultural Scientist Responds

Alos consider Will There be Mandatory Herbicide Spraying on Organic Farms in Sherman County, Oregon? by Charles Benbrook, PhD.

He sent a letter to Lauren Hernandez (email above).

Dear Ms. Hernandez et al:

I live in Wallowa County. I learned today of the recent, dramatic change in the Sherman County noxious weed control program and the plan to forcibly spray a 2,000-acre organic farm in the county.

Over a long career, I have studied herbicide use and efficacy, public and private weed control efforts, the linkages between herbicide use and the emergence and spread of resistant weeds, and the public health and environmental impacts of herbicide use and other weed management strategies.

I served for six years, along with fellow Oregonian Barry Bushue, past-president of the Oregon Farm Bureau, on the USDA’s AC 21 Agricultural Biotechnology Advisory Committee. Issues arising from herbicide use were a frequent topic of discussion during our Committee’s deliberations.

I have published multiple scientific papers in peer-reviewed journals on glyphosate, its human health risks, and the impact of genetically engineered crops on overall herbicide use and the spread of resistant weeds. In a separate email, I will forward you copies of my published research relevant to the use of herbicides, and glyphosate in particular.

The notion that Sherman County can eradicate noxious weeds by blanket herbicide spraying is deeply misguided. I cannot imagine a single, reputable university weed scientist in the State supporting the idea that an herbicide-based noxious weed eradication program would work (i.e., eradicate the target weeds) in Oregon, or any other state.

There is near-universal agreement in the weed science community nationwide, and surely as well in the PNW, that over-reliance on glyphosate (Roundup) over the last two decades has created multiple, new noxious weeds posing serious economic, environmental, and public health threats.

In fact, over 120 million acres of cultivated cropland in the U.S. is now infested with one or more glyphosate-resistant weed (for details, see http://cehn-healthykids.org/herbicide-use/resistant-weeds/).

The majority of glyphosate-resistant weeds are in the Southeast and Midwest, where routine, year-after-year planting of Roundup Ready crops has led to heavy and continuous selection pressure on weed populations, pressure that over three-to-six years typically leads to the evolution of genetically resistant weed phenotypes, that can then take off, spreading across tens of millions of acres in just a few years.

Ask any farmer in Georgia, or Iowa, or Arkansas whether they would call “noxious” the glyphosate-resistant kochia, Palmer amaranth, Johnson grass, marestail, or any of a dozen other glyphosate-resistant weeds in their fields.

It is virtually certain that an herbicide-based attempt to eradicate noxious weeds in Sherman County would fail. It would also be extremely costly, and would pose hard-to-predict collateral damage on non-target plants from drift, and on human health and the environment. But even worse, it would also, almost certainly, accelerate the emergence and spread of a host of weeds resistant to the herbicides used in the program. …

if Sherman County is serious about weed eradication, it will have to mandate widespread spraying countywide, and not just on organic farms, and not just for one year. The public reaction will be swift, strong, and build in ferocity. It will likely lead to civil actions of the sort that can trigger substantial, unforeseen costs and consequences. I am surely not the only citizen of the State that recalls the tragic events last year in Malheur County.

Plus, I guarantee you that the County, the herbicide applicators, and the manufacturers of the herbicides applied, under force of law on organic or other farms, will face a torrent of litigation seeking compensatory damages for loss of reputation, health risks, and the loss of premium markets and prices.

I have followed litigation of this sort for decades, and have served as an expert witness in several herbicide-related cases. While it is obviously premature to start contemplating the precise legal theories and statutes that will form the crux of future litigation, the County should develop a realistic estimate of the legal costs likely to arise in the wake of this strategy, if acted upon, so that the County Commissioners can alert the public upfront regarding how they will raise the funds needed to deal with the costs of near-inevitable litigation.

If you have any questions, please do not hesitate to call me.

Sincerely,

Charles Benbrook, PhD

Troy, Oregon

Canada Thistles in Sherman County

Ther above image from Eddmaps.

Even if someone thought this action would eradicate the weeds, it would have to be applied to the entire county if not the entire state. Then what? The nation?

Farmer vs Farmer

I always want to know the other side of the story.

In this case, the story is farmer vs farmer. Neighboring wheat growers say weeds spreading from Azure Farms threaten their crops.

Capital Press reports County May Press for Quarantine of an Organic Farm.

Local wheat farmers say weeds spreading from Azure Farms, on the outskirts of Moro in north central Oregon, cost them money in the form of additional herbicide control. Most critically, growers of certified wheat seed say their crops will be worthless if contaminated by Rush Skeleton Weed, Canada Thistle, Morning Glory and White Top spreading from the farm.

Spraying the weeds with Milestone or other herbicides, however, would cause the farm to lose organic certification for three years. Azure Standard, which operates Azure Farms, is a major distributor of organic products.

Sherman County gave the farm until May 22 to respond with a weed management plan. If not, the county will ask the Oregon Department of Agriculture to quarantine the farm.

The issue has blown up on social media.

The manager of Azure Farms, Nathan Stelzer, urged supporters to “Overwhelm the Sherman County representatives with your voice.” A video posted on the farm website called for people to express their outrage reportedly has resulted in hundreds of phone calls and thousands of emails to county officials.

The issue may come to a head Wednesday when the county’s Board of Commissioners takes up the issue. The county is expecting such a crowd that it moved the session from the courthouse to the Sherman County School gym, 65912 High School Loop, Moro, at 4 p.m.

“The school gym is the only site in Sherman County big enough to hold the expected crowd and we received permission to use the gym only if we delayed our meeting until after the students are dismissed,” Commissioner Tom McCoy said in an email.

Wheat farmer Bryan Cranston, who grows certified seed next to Azure Farms, said its weed problems have gotten progressively worse over the years. Cranston said he spoke to Selzer and told him, “I don’t drift chemicals on you, I’d appreciate it if weeds don’t drift on me.”

Cranston said he told Selzer, “I grow seed wheat to garner more out of the market, you grow organic to garner more out of the market — we have a lot in common here.”

But he added, “You’re messing me up.”

The county warned that it would spray if the farm didn’t, and the cost for multiple surveys throughout the growing season would be billed to the farm as a lien on its property taxes.

Asher said the county could help identify weed, recommend control methods and herbicide products, and had a spray crew for hire if necessary.

David Stelzer said Azure is attempting to improve its ground through crop rotation and “companion planting” of various crops.

“Bio-diversity, a few weeds in the field, does not make a bad farmer,” he said.

Responding to comments he said have been made about the farm, he said it is not affiliated with a religion although they are a “family a faith.” He said Azure properly pays its taxes and provides a $6 million payroll. He said the farm’s wheat yields nearly meet the county average and is of high quality. Eventually, organic farming methods will be “dominant,” he said.

Both Sides

That’s both sides of the farming story.

But there is a medical issue as well. Some patients claim Roundup gave us cancer as EPA official helped the company.

Questions

  1. Are the increased used of herbicides on neighboring farms caused by Roundup resistant plants or seeds from the organic farm?
  2. Is Azure Farms responsible for blown seeds?
  3. Realistically, how far do these seeds blow? Miles? Thousands of acres?
  4. Is the remedy a lawsuit against Azure Farms by other farmers or action by the County?
  5. Is it possible to create a buffer zone of some sort?
  6. Is Roundup a carcinogen?

Whether or not you buy and eat organic foods, the proposed action (property seizure)  is extremely controversial, and it likely will not do much about the weeds either.

Widespread overuse of herbicides (I admit I use them on my lawn and garden), has created Roundup resistant weeds that are near impossible to get rid of.

Thistle is one weed I have a very difficult time with myself.  Some plants turn brown in a day or two, but thistles stay green for quite a long time even if they wilt and look sick.

I sprayed thistles four times over the course of a week this year hoping to get rid of them.

Action

If you care to voice an opinion, you can do it here: lhernandez@co.sherman.or.us

I recommend being polite.

My opinion: Spraying will not work. More importantly, the proposed county action of property seizure steps well over the bounds of reasonableness.

 

http://www.zerohedge.com/news/2017-05-16/oregon-officials-threaten-seize-2000-acre-organic-farm-spray-it-roundup

Freedom of The Press or Freedom to Suppress [PART 1 & 2]


PART 1: The echo chamber effect is at an all time high as the new world media conglomerate pushes back against those who are waking up. The echo chamber effect is the relentless “propping up” of your own beliefs with the goal to perpetually disunite the masses and prevent us from seeing the powers that be behind the curtain.

It is no coincidence that the corptocracy pushes world culture towards its own ends. In furtherance of its agenda of total control – we now live in a time where propaganda of US citizens is legal – what news is real?

So many events have serious questions surrounding them – from mass shootings to pizzagate – how can we place faith in the corproratocracy’s cultural media machine?

 

PART2: The 25 Goals of the Illuminati refer to the construction of the one world government and the subjudication of the global citizenry through corruption, immorality, and total control. We know the unholy alliance between the government and the world’s largest financial institutions have created the corptocracy – is there an even darker agenda than just global control?

The evidence of depopulation, the control of the media, and the abuse of youth by the elite – is the fake news phenomena a counter attack to the recent investigations into the global social control paradigm and the evil its leaders do?

Vault 7: CIA Hacking Tools Revealed


Ed. Note: Me thinks it’s time for the residents of the US wake-up and unite to entirely dismantle the CIA and re-purpose some of their tech for positive purposes. Like monitoring our public servants, corporate structures and military industrial complex to ensure they’re SERVING the public good. Blessings, {~A~}

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

 

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

 

Examples

 

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

 

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE. 

Frequently Asked Questions

 

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

 

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

 

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

 

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

 

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

 

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

 

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

 

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

 

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

 

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

 

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

 

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

 

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/https://wikileaks.org/ciav7p1/

Wow | New airport checkpoint shocks travelers! | “Orwellian” MrMBB333


Yet another security checkpoint for travelers LEAVING America. After going through this new “security” point, passengers were stunned, didn’t even want to talk about it.
https://fee.org/articles/welcome-aboa…

Max Igan ~ The World According to Trump


Max Igan – Surviving the Matrix – Episode 283 – American Voice Radio, Febuary 3rd, 2017 – http://thecrowhouse.com
Support The Crowhouse: https://www.patreon.com/maxigan?ty=h
Bitcoin: 1NPsKQ2d23aWqqwqQ2qfgMv19XyMPmYh7K
https://steemit.com/@maxigan

Universal Law/sovereign law trumps all others.

1. No man or woman, in or out of government shall initiate force, threat of force or fraud against my life and property and, any and all contracts Im a party to not giving full disclosure to me whether signed by me or not are void at my discretion.

2. I may use force in self-defense against anyone that violates Law

3. There shall be no exceptions to Law 1 and 2.

When the tyrant has disposed of foreign enemies by conquest or treaty and there is nothing to fear from them, then he is always stirring up some war or other, in order that the people may require a leader. – Plato

“I would rather have questions that can’t be answered than answers that can’t be questioned.” – Richard Feynman

NEW EXECUTIVE ORDER/CHECK MATE? ~ BPEarthWatch


Note: I hereby remove any tacit consent, given by covert or overt means, on any timestream or dimension, that I may have given to the system of domination and control to rule over these realms by controlling or placing restrictions on the flow of information over the internet through tyrannical Orwellian tactics that threaten the physical, mental or spiritual well-being, or sovereignty of myself, or any other human BEing. And so mote it be.

Our Website, http://www.BPEarthWatch.Com
White House Link https://www.whitehouse.gov/the-press-…

Cops Are FINALLY Being Sued For ILLEGALLY Spraying Standing Rock Protesters With Water In Freezing Temperatures


December 10, 2016 10:44 pm by Jafari Tishomingo

fotonoticia_20161121174300_800

An Excessive Force lawsuit was filed against the Morton Country Sheriff for the gruesome events that took place during a November 20 bridge attack on Water Protectors at DAPL, but the Sheriff’s office continues to assault people claiming the Sheriff simply didn’t know that the lawsuit had been filed.

Why didn’t Sheriff Kyle Kirchmeier know about the lawsuit?

Because he used his power of office to refuse being served with the paperwork. According to a motion brought before Judge Daniel Hovland, “Although he was present in his office, Sheriff Kirchmeier did not make himself available for personal service. On the morning of December 1, the Morton County States Attorney accepted service on behalf of Sheriff Kirchmeier.”

Here is a clear example of law enforcement using their power to manipulate the law for their own benefit. While this may be a shocking piece of information for some people, Water Protectors at DAPL are not surprised at all. To Natives, this is just another example on a long, long list of atrocities and lies from the US Government.

The lawsuit names not only the Morton County Sheriff but also Mandan Police Chief Jason Ziegler. You may remember Ziegler from his snarky comments defending the use of force against protestors. “It was effective, wasn’t it? We can use whatever force is necessary to maintain peace. When they are throwing rocks, burning logs, shooting slingshots with projectiles at our officers, that would fall under what we would call less lethal, same things as rubber bullets, which doesn’t hurt as much.”

Water Protectors are throwing rocks, and law enforcement disproportionally retaliates with all sorts of “Non-lethal” ordinances such as water cannons, lead-filled beanbags, and explosive teargas grenades. According to Ziegler, it’s ok because “it was effective, wasn’t it?”

It is deeply disturbing to know that in the eyes of law enforcement, we’re still living in a time when outright state-funded violence is the go-to method for resolving conflicts.

 It really is “pitchfork and torches time in America,” like Milwaukee Sheriff David A Clarke said in October.

Ole Dammegård: Message to military & Police (with Dutch subs)


English spoken/Dutch subs: Ole Dammegård speaks directly to police officers and people from the military, an important message! NL: Ole Dammegård spreekt rechtstreeks tot militairen en politiemensen, een belangrijke boodschap! See also: ENGLISH: http://www.cooperatiedevrijemedia.nl/… DUTCH: http://www.cooperatiedevrijemedia.nl/…
Website Ole: http://www.lightonconspiracies.com

Pokémon Go, the CIA, “Totalitarianism” and the Future of Surveillance


Courtesy of Aletho News 7/29/16

By Steven MacMillan – New Eastern Outlook – 29.07.2016

345345345345If anyone doubted that a percentage of the global population are akin to zombies, the incidents following the release of Pokémon Go have surely convinced you. Despite the game only being released in early July, we have already seen a man driving into a tree and a women getting locked in a graveyard whilst chasing these furry little creatures.

Pokémon describes the game on their website in the following way:

“Travel between the real world and the virtual world of Pokémon with Pokémon GO for iPhone and Android devices. With Pokémon GO, you’ll discover Pokémon in a whole new world—your own! Pokémon GO is built on Niantic’s Real World Gaming Platform and will use real locations to encourage players to search far and wide in the real world to discover Pokémon… In Pokémon GO, the real world will be the setting!”

Pokémon Go, Google, the State Department, the CIA and the DoD

The company behind Pokémon Go is a San Francisco software developer called Niantic, Inc, which was formed in 2010 as an internal startup at Google. The founder and current CEO of Niantic is John Hanke, a man who has connections both to the State Department and the CIA.

Before moving to San Francisco to study at the University of California, Hanke previously worked for the US State Department in Myanmar. Hanke also founded Keyhole, Inc in 2001, a company which specialized in geospatial data visualization applications. Google acquired the company in 2004, with many of the applications developed by Keyhole being instrumental in Google Maps and Earth. In 2003, the CIA’s venture-capitalist firm, In-Q-Tel, invested in Keyhole, with the CIA’s own website proudly detailing this investment:

“The CIA-assisted technology probably most familiar to you is one many of us use on a regular basis:  Google Earth. In February 2003, the CIA-funded venture-capitalist firm In-Q-Tel made a strategic investment in Keyhole, Inc., a pioneer of interactive 3-D earth visualization and creator of the groundbreaking rich-mapping EarthViewer 3D system. CIA worked closely with other Intelligence Community organizations to tailor Keyhole’s systems to meet their needs. The finished product transformed the way intelligence officers interacted with geographic information and earth imagery.”

One of the other intelligence organizations the CIA worked alongside was the National Geospatial-Intelligence Agency (NGA), which is partly under the control of the US Department of Defense (DoD).

So we have a somewhat enigmatic former State Department employee with connections to the CIA and the DoD, being the CEO of a company that created what seems to be a silly, harmless game. What’s going on?

Selling and Sharing Your Data

Like so many new technologies in our digital age, Pokémon Go is constantly gathering information on the user and then openly admitting that they will share this data with anyone who wants it.

As James Corbett pointed out in his article titled: The CIA’s ‘Pokémon Go’ App is Doing What the Patriot Act Can’t, the privacy policy of the app states that Niantic will share all the information they gather (which is a lot) with the state and private organizations:

“We cooperate with government and law enforcement officials or private parties to enforce and comply with the law. We may disclose any information about you (or your authorized child) that is in our possession or control to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate.”

Corbett also details how the game requires the user to give excessive access to Niantic/CIA/NGA/DoD (including access to the users Google account and camera).

Oliver Stone on PG: “Totalitarianism” and a “New Level of Invasion”

Speaking at this year’s Comic-Con, Oliver Stone – the award winning filmmaker and director of the new film on Edward Snowden – had some very insightful views on the new craze and the growing business of data-mining. As Vulture magazine reported in a recent article, Stone denounced the game as a “new level of invasion” and a new form of “totalitarianism:”

“I’m hearing about it too; it’s a new level of invasion. Once the government had been hounded by Snowden, of course the corporations went into encryption, because they had to for survival, right? But the search for profits is enormous. Nobody has ever seen, in the history of the world, something like Google – ever! It’s the fastest-growing business ever, and they have invested huge amounts of money into what surveillance is; which is data-mining.”

Stone continues:

“They’re data-mining every person in this room for information as to what you’re buying, what it is you like, and above all, your behavior. Pokémon Go kicks into that. It’s everywhere. It’s what some people callsurveillance capitalism; it’s the newest stage. You’ll see a new form of, frankly, a robot society, where they will know how you want to behave and they will make the mockup that matches how you behave and feed you. It’s what they call totalitarianism.”

Predicting Human Behavior

It is interesting that Stone doesn’t just warn about the commercial aspect of data-mining, but the fact that the more data governments and private corporations collect on the citizens of the world, the easier it becomes to predict their behavior. It is not just Stone that is warning about this reality however. At the start of last year, the UK governments own surveillance commissioner, Tony Porter, revealed how data obtained from CCTV cameras can be used to “predict behavior.”

As we progress through the 21st century and more advanced algorithmic systems are developed to process the tsunami of data, intelligence agencies and governments will increasingly be able to predict (and manipulate) the behavior of their populations and the populations of foreign countries. We are already far along this path, will the trajectory for the future heading straight towards levels of surveillance far beyond even what George Orwell envisaged; with the fight for digital privacy being a major battleground in this century for those who value freedom.

Pokémon Go looks more like a Trojan horse of the CIA and the wider intelligence-security-data-mining-Big-Brother complex, than just a silly, innocent game.  With all these connections to the State Department, the CIA and the DoD, no wonder some countries are reportedly considering banning the game.

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

2012 The Awakening is supported by donations and the generosity of readers who honor the “energetic exchange for value” principle. If you find value in the material posted here and are financially comfortable, will you consider pledging a small monthly sum to help keep this blog afloat? Currently I’ve fallen way behind on my bills, have run up against unexpected expenses and am really struggling to make ends meet – so even the smallest donation are highly valued, appreciated and will go a long way toward helping. 

You can also lend your support by purchasing goods thru the merchant affiliate programs links provided below.

Also, I’d like to thank subscribers and everyone who’s ever donated in the past, to express my gratitude for your generosity, thoughtfulness & support!

Mahalo nui, Annette

If links are dead, please contact me at { ascendingstarseed at gmail dot com }.

AFFILIATE PROGRAMS

SD Bullion

  • Friday, June 30 Silver Prices Burst Through Critical Resistance
    Jumping Nearly 7%
  • Up over $2 in Two Days
  • Just Pennies From $20/oz
  • Buy silver rounds for 49cents over spot while sale and supply’s lasts

Learn more here: Get the best deals on clearance items while supplies last at SDBullion.com!

NuMANNA The Industry Standard in Storable Food:

  • Standard Buckets are GMO-Free
  • Contain no: Aspartame, High Fructose Corn Syrup, Autolyzed Yeast Extract, Chemical Preservatives or Soy.
  • No Gluten Buckets contain no Wheat ingredients.

Learn more here: numanna.com/awakening

 

AquaNui Home Water Distillers

  • AquaNui home water distillers are made for the family who wants to drink the purest water available.
  • With over 45 years of experience, we offer the best counter-top water distiller around.
  • Your AquaNui distiller for water will protect you and your family from harmful contaminants like arsenic, chlorine, lead, mercury, pesticides and nitrates. In addition to that, it removes bacteria, viruses and any biologicals.

www.MyAquaNui.com
Water Made Wonderful

The Droplet Blog

Zen and now Zen Gardner talks to Ole Dammegard – 29 March 2016


Problem. Reaction. Solution. (Brussels Edition) ~ Corbett Report


SHOW NOTES: https://www.corbettreport.com/?p=18241

The dust has barely settled on the site of the Brussels bomb blasts and already the EUreaucrats are salivating about the prospect of a pan-European intelligence agency. Join James for today’s Thought for the Day as he explains the latest example of how the authoritarians take more control after every major terror event.

Social Engineering 101 ~ Corbett Report Extras


SHOW NOTES and MP3: https://www.corbettreport.com/?p=4868

Your habits, your opinions, your thoughts and routines: what could be more personal than these? But what if your thoughts are not your own? Join us this week on The Corbett Report as we expose the social engineering agenda, from the bigger bigger picture to the nitty gritty detail.

Max Igan: The Storm Has Come


Max Igan – Surviving the Matrix – Episode 250 – AVR – Feb 12th, 2016
http://thecrowhouse.com
http://fullcircleproject.net

Sage Of Quay Radio – Jordan Maxwell – The Law Is Not King (Jan 2016)


Tonight Jordan Maxwell returns to the show.

For more than 50 years, Jordan continues as a preeminent researcher and independent scholar in the field of occult and religious philosophy. He served for three-and-a-half years as the Religion Editor of Truth Seeker Magazine, America’s oldest Freethought Journal which was established in 1873) His work exploring the hidden foundations of Western religions and secret societies has captivated the attention of critical thinkers from around the world.

He has conducted dozens of intensive seminars; hosted his own radio talk shows; appeared on more than 600 radio shows; and has written, produced and appeared in numerous television shows and documentaries – all devoted to understanding ancient religions and their pervasive influence on the world today.

His work on the subject of secret societies and their symbols, has fascinated his world wide audience for decades.

For this discussion Jordan will talk to us about the influence of religion on the societies and cultures of the world, the corporate governance which encapsulates our lives and then finish up with how the Abrahamic religions originated from Hindu mythos.

Jordon’s website is jordanmaxwellshow.com and a highly recommended section of his website is Jordan’s Research Society where for a $30 subscription, you will have access to a plethora of Jordan’s private research documents.

Jordan’s Website:
https://jordanmaxwellshow.com/

Jordan’s Research Society
https://jordanmaxwellresearch.is/

Sage of Quay Blog: http://sageofquayradio.blogspot.com/

DISCLAIMER and TERMS
The views and opinions expressed by any guest featured on The Sage of Quay Radio Hour are those of the guest and do not necessarily reflect the opinions or views of the host Mike Williams or of the The Sage of Quay Radio Hour as a whole.

All content provided on The Sage of Quay Radio Hour is for informational purposes only. We make no representations as to the accuracy or completeness of any information discussed or presented during the show or found by following any link mentioned in the broadcast or in the show notes.

All Sage of Quay Radio Hour shows and interviews are copyrighted. No portion of this presentation or any Sage of Quay Radio Hour show may be used, reproduced, altered or uploaded in part or whole without the expressed written consent of Mike Williams.

Any and all images used in this video or any other Sage of Quay Radio Hour presentation are considered to be in the public domain, free to use, royalty free material we have licensed or in compliance with the Fair Use Clause contained within the Copyright Act (17 US Code § 107). If by chance this is not the case and you are the rightful owner please contact us at sageofquay@aol.com.

The song ‘Truth’ and ‘Free’ is from Mike’s album Leaving Dystopia http://www.laboroflovemusic.com/

© 2012 M. Williams – All Rights Reserved

Michael Tsarion: Paris, Islam, Zionism & The Red Papacy (Part 1 & 2)


Submitted by Karen, mahalo!

*See Links Below* In this Episode we take a very fascinating and in-depth look at the real matrix of power that operates in the world behind the scenes in relation to whats happening in the Middle East, the recent Paris attacks, Geo-Politics, Media, Religion, Zionsim, the Ottoman Empire, the Jesuits, the Red Papacy, the Nazis, the Royals, Black Lodge Masonry, Templarism, the unconscious mind, Psychology and more. We even touch briefly on this recent flat earth meme and the return of other medieval and pre-medieval ideas and why its being pushed at this time in particular.

Part 1

Part 2

Max Igan ~ A Storm is Coming


Max Igan – Surviving the Matrix – Episode 246 – AVR – Dec 05, 2015
http://thecrowhouse.com
http://fullcircleproject.net

Anna von Reitz – The Birth Certificate — The Evidence of the Crime Against Your Life


Reblogged from followingworldchange.com

images

http://mainerepublicemailalert.com/2015/10/21/the-birth-certificate-the-evidence-of-the-crime-against-your-life/

Posted on

I have been asked to summarize this issue many times, so here it is in the proverbial nutshell.
.
The problem is that privately owned for-profit corporations under contract to provide government services have misrepresented themselves as the government and used that presumed position of public trust to defraud us, enslave us, and levy false claims against us and our assets in the foreign jurisdiction of international commerce.
.

The misuse and abuse of “birth certificates” and their misrepresentation as “voluntary private contracts” has led to the literal enslavement of hundreds of millions of people worldwide almost a hundred years after slavery was universally outlawed. These issues of economic slavery and “slavery via corporate proxy” must be addressed and the mechanisms used to promote this abuse must be dismantled.

The registration of live births in America and throughout the former British Empire, most of Europe, and Japan is used not to simply record the birth of babies, but to name commercial “vessels” after those babies. These proxy entities may be variously constructed as estate trusts, foreign situs trusts, or even public transmitting utilities—- the creators of these incorporated entities named after living children then operate these corporations and accrue debts that they false charge against the living people using the deceitfully similar name as a means to defraud the victims. This is a bunko crime known as “personage”—knowingly “mistaking on purpose” a living man for a corporation using the same or similar name— for example, mistaking a man named “James Clarence Penny” for the retail department store doing business as “JC PENNY”.

The corollary crime routinely practiced by attorneys and barristers is known as “barratry”—knowingly bringing charges against this corporate proxies “as if” they were the same as the living people they are named after, and addressing those same people as defendents in civil and criminal actions. This is the tip of the iceberg of the harm that is routinely done to living people via the misuse of incorporated proxy entities merely named after them. It is a venal institutionalized fraud scheme that must be recognized for what it is and attacked by every peaceful and determined means possible.

When my son was born I was presented with the paperwork that all new Mothers are coerced to sign. When I refused I was bluntly told by two menacing interns and a Catholic Nun that I either signed or my son would be kept in State custody and I would not be allowed to take him home. Please bear in mind that I was a successful 40 year old married career woman with no criminal record, no addiction problems, no history of mental illness. There was and is no possible excuse for the way I and millions of other American women are treated and the extortion used to secure an inequitable, involuntary, and unconscionable “public” commercial interest in our babies as a chattel properties being bonded and used as collateral to finance the “public debt” of these private governmental services corporations pretending to be the American government.

Those responsible were and are criminals engaged in press-ganging land assets into the international jurisdiction of the sea, inland piracy, enslavement, human trafficking, unlawful conversion, extortion, racketeering, armed robbery, kidnapping, commercial fraud, and conspiracy against The Constitution for the United States of America. Every single person involved in this needs to be charged and arrested and thrown in jail without further delay, but the police are employed by the same privately owned and operated corporations that are benefitting themselves from these gross abuses.

That is, the police forces that we depend upon to enforce the Public Law are operating instead as private commercial mercenaries, not as public peacekeeping officers at all. The foxes are indeed guarding the hen houses of America, a circumstance that again requires awareness and action by the body politic to resolve.

As I have explained, the organizations we are dealing with are governmental services corporations—- not our lawful government. They are merely claiming to “represent” our government in the absence of our actual government, which is owed to us, and which must be provided by us. This addresses the heart of what “self-government” means.

Every living American has more civil authority on the land jurisdiction of the Continental United States than the entire Federal United States government. It’s time that we exercised that inherent power and put an end to this gross criminality, fraud, and usurpation by our “public servants”.

The historical facts and timeline progression of how we got into this mess is fully explained in “You Know Something Is Wrong When…..An American Affidavit of Probable Cause”, available on Amazon. com.

%d bloggers like this: