What's new

The SNOWDEN Saga continues...

Stoner4Life

Medicinal Advocate
ICMag Donor
Veteran
1's and 0's in the bank are a double edge sword. On hand gold, silver, and minimal paper is another story.

"she wrote, the police continue to ignore "requests made by San Diego 6 News for the police report, 9/11 call, autopsy, bomb squad and toxicology reports, or make the Mercedes available for inspection." The police department's reluctance to comply with Dvorak's requests "only fuels conjecture," she added. Dvorak recently received the 911 calls, which she suspects the LAPD may have given her to defy federal officials who are covering up the investigation, and says she's enlisted the help of Judicial Watch, a conservative legal watchdog group funded by billionaire media mogul Richard Mellon Scaife, as she continues to file public records requests with local and federal agencies."

From your linked article.

:joint:


we already know it's her 1st Amendment right to lie (or speculate) through her teeth which she's been doing regularly, don't blame because she's a fucking nut job.......



Dvorak said:
Last month, for example, the Independent, a major British newspaper, picked up Dvorak's report claiming that Hastings' body "was cremated and it wasn't the request of the family…in fact, the family wanted Michael's body to go home." But on Tuesday, veteran journalist Russ Baker dispelled the myth on his news site WhoWhatWhy by talking to a family member who confirmed that the cremation was done at the family's request. Dvorak later removed the passage saying Hastings' family wanted his body to "go home," but her story still hints at a cover-up, calling the cremation a "macabre twist."

also from my linked article, so what's the point Hydro, this bitch is a frigging liar. She's proved 100% wrong and yet she continues to torture the Hastings family.

I believe she's lying about the inability to procure documents, this 100% patently FALSE claim assures her that her audience of gullible idiots continues to believe in a conspiracy.


Face it!!! It ain't news until you wrap it in a bullshit conspiracy theory, aside from that there's a formerly paranoid journalist dead by his own hand.

I keep saying accident but I've gotta consider suicide as well.
 

Hank Hemp

Active member
Veteran
I always think who taught ol Uncle Sugar about spying? The GD Europeans that's who. Hell before WW2 we didn't even have a spy outfit of no kind. Maybe a little MI but barely that. We would be much better off if we had not got involved in Europe's tribal wars. It's the lizard people's fault anyway.
 

MrDanky

Member
i will stay with my gut on this one.... hastings had all eyes on him... he was considered a terrorist...he was involved with LOTS of reporting to take down US leaders...similar to poitras, scahill, greenwald etc... the gov did a good job at wiping him out... i mean REALLY good especially if the lifetime stoner isn't buying it!
 

MrDanky

Member
It%27s_Now_Clear_That_Edward-14d4593ee6885329d2a6d823e0d3931c
 

MrDanky

Member
Snowden wants to help German probe, testify in US

Moscow (AFP) - Intelligence leaker Edward Snowden is ready to assist a German probe into US spying on Chancellor Angela Merkel but also wants to talk directly to the US Congress, a German lawmaker who met the fugitive said Friday.

Snowden had late on Thursday met German Green party lawmaker Hans-Christian Stroebele at an undisclosed location in Moscow to discuss his revelations that Washington for years monitored Merkel's mobile phone, which has caused an uproar in Europe.

On his return to Germany, Stroebele published a letter from Snowden and said the American was ready to testify to the US Congress to shed light on "possibly serious offences".

The former National Security Agency (NSA) contractor, who began work at an undisclosed Russian Internet firm on Friday, was granted asylum in Russia in August to the fury of the United States, where he faces trial on charges under the Espionage Act.

In the letter, a copy of which was posted on Stroebele's website, Snowden said he was prepared to provide details of US spying to Germany and he was "heartened" by the global response to his leaks despite the unrelenting US pressure.

"I hope that when the difficulties of this humanitarian situation have been resolved, I will be able to cooperate in the responsible finding of fact regarding reports in the media, particularly in regard to the truth and authenticity of documents," he wrote.

"I look forward to speaking with you in your country when the situation is resolved."

Speaking to reporters in Berlin on Friday after his return from Moscow, Stroebele said that the American also wanted to testify in front of the US Congress.

"He said first up he would prefer to lay the facts on the table in front of the US Congress, in front of a committee of the US Congress and explain," he said in English.

"Mr Snowden didn't appear to me as anti-American or an enemy of America or some such, but quite the opposite."

The letter was addressed to the German government, the Bundestag lower house of parliament and the federal public prosecutor, Stroebele's office said.

'Snowden will not go to Germany'

Snowden's Russian lawyer Anatoly Kucherena said his client would not be able to travel to Germany for security reasons but was willing to help with the probe.

"Snowden will not go to Germany. This is not possible because he has no right to cross Russian borders," Kucherena told the popular Echo Moscow radio.

"If he does that, he can lose temporary asylum."

But the Kremlin-friendly lawyer added: "Within the framework of international agreements Snowden can give testimony in Russia but this should be decided by the German authorities."

Media reports based on Snowden's disclosures of mass US surveillance -- including eavesdropping on nearly three dozen foreign leaders -- have strained Washington's ties with key allies.

German Interior Minister Hans-Peter Friedrich said on Friday that the government would like to speak to Snowden.

Kremlin spokesman Dmitry Peskov declined to comment on Snowden's contacts with Germans.

'He received many job offers'

Snowden spent more than a month in the transit zone of a Moscow airport before receiving a year-long temporary asylum in August after exposing the massive surveillance by the NSA.

President Vladimir Putin has said Snowden was welcome to stay in Russia as long as he did not harm US interests.

Security expert Pavel Felgenhauer suggested Russian security services were likely to control Snowden's access to foreign officials.

"Security services and the Kremlin will decide what he can and cannot say publicly."

Also Friday, Snowden began providing IT support for an unnamed Russian Internet company, Kucherena told AFP, refusing to say whether he would be working from home.

"It's a security issue."

Kucherena added that Snowden had had many job offers. "He is hugely popular in our country."

One of those offers came from the country's top social network VKontakte (In Touch), after Snowden won asylum in Russia.

But the company on Friday refused to say whether Snowden was now working for them. "We do not comment on this information," VKontakte spokesman Georgy Lobushkin told AFP.

Two other major Russian Internet companies, Mail.ru Group and Yandex, have earlier said they have not hired Snowden.

http://news.yahoo.com/snowden-meet-german-prosecutors-russia-100100115.html

600x832_0111-letter-snowden.jpg
 

Crusader Rabbit

Active member
Veteran
Nice shot of the shape of his left ear and nose profile. It's bad news for him every time he's photographed. It adds to the data set that makes him an easier mark for photo recognition software.
 

idiit

Active member
Veteran
Revealed: The REAL Reason Snowden Leaked Spying Documents
Posted on November 2, 2013 by WashingtonsBlog
What Inspired Snowden to Speak Out?

Similarly, Snowden’s courage is inspiring others…

As ABC News notes, Snowden’s American lawyer – Jessica Radback of the Government Accountability Project – says that Snowden has inspired new NSA whistleblowers:

Several more current and former National Security Agency insiders, inspired by American fugitive Edward Snowden, have come forward as whistleblowers with details of the shadowy agency’s operations, according to an attorney at a whistleblower protection organization.

“I think the government hopes to chill speech by employees in the national security and intelligence fields, especially those at the NSA and CIA, but the unintended consequence is [that] more and more whistleblowers are coming through the doors of the Government Accountability Project (GAP),” said Jesselyn Radack, referring to the organization where she works as the National Security and Human Rights Director. “I think courage is contagious, and we see more and more people from the NSA coming through our door after Snowden made these revelations.”

***

The legal threats and high-level condemnation haven’t kept others from coming forward with new information, Radack said.

^^ http://www.washingtonsblog.com/2013/11/revealed-the-real-reason-snowden-leaked-spying-documents.html

chick with a dick has more balls.....

i am actually upbeat about the "imminent fall of the dark cabal".

the visible part of a groundswell tsunami starts with a ripple.
 

idiit

Active member
Veteran
The 10 Commandments of Government

I Generally speaking, government always grows -- it never shrinks- whether times are good or bad.

II In each area it purports to "assist", government attempts to replace individual decision-making with central planning.

III In order to implement its grand central plans and solidify its power, government must take from one citizen to give to another; this is, in effect, lawful theft.

IV No matter how many times central planning fails, the self-appointed masterminds in government assert that "this time is different" and that with only a few tweaks and more money, their delusional plans will succeed.

V Because it uses funds confiscated from taxpayers, self-restraint is no obstacle to government's ambitions.

VI Its fundamental misunderstanding of human nature notwithstanding, government must claim to grant "rights", which require it steal the labors of one citizen to give to another (such as food, shelter, employment, and health care).

VII No matter how widespread the harm it causes, government will never provide an honest and historical accounting -- a report card -- of its failures.

VIII As more individuals and families are harmed by the failures of central planning, government must find suitable scapegoats, must lie to do so, and therefore must also repress dissent.

IX In order to build its network of redistribution and grow a culture of dependency on its services, government must inevitably undermine the family unit, religion, and the notion of God-given rights in order to cow, bribe, or intimidate its citizens.

X As government grows ever more powerful, it must also become increasingly oppressive through compulsion and force. To do otherwise would mean government must shrink, and this it cannot do.

http://directorblue.blogspot.com/2013/11/the-10-commandments-of-government.html

“Five percent of the people think;
ten percent of the people think they think;
and the other eighty-five percent would rather die than think.”
- Thomas Edison

who are they to govern us ?

the answer as to who/what they are is a very scary answer.
 

MrDanky

Member
funny pic i came across..... tells 1000 words easily .... if you are up on your shit you know whats going on here ...

20131102_LDP003_0.jpg
 

Lone Wolf

Well-known member
Veteran
who's the cock eater clicking not helpful?

some unintelligent coward who would rather click a button then explain themselves.

yeah im talking to YOU, vagina.
 

Hydrosun

I love my life
Veteran
who's the cock eater clicking not helpful?

some unintelligent coward who would rather click a button then explain themselves.

yeah im talking to YOU, vagina.

Try some government paid coward trying to sway opinion, but too dense to convey any meaningful argument against cannabis freedom or PRIVACY.

FUCK THE US GOVERNMENT.

:joint:
 

Lone Wolf

Well-known member
Veteran
Silicon Valley Nerds Seek Revenge on NSA Spies With Coding

Silicon Valley Nerds Seek Revenge on NSA Spies With Coding

http://www.bloomberg.com/news/2013-...n-nsa-spies-with-super-coding.html?cmpid=yhoo

Google Inc., Facebook Inc. and Yahoo! Inc. are fighting back against the National Security Agency by using harder-to-crack code to shield their networks and online customer data from unauthorized U.S. spying.

The companies, burned by disclosures they’ve cooperated with U.S. surveillance programs, are protecting user e-mail and social-media posts with strengthened encryption that the U.S. government says won’t be easily broken until 2030.

While the NSA may find ways around the barriers, the companies say they have to assure users their online connections are secure and data can’t be grabbed when transmitted over fiber-optic networks or digitally stored.

Microsoft Corp. is convinced it must “invest in protecting customers’ information from a wide range of threats, which if the allegations are true, include governments,” Matt Thomlinson, general manager of trustworthy computing, said in an e-mail. He didn’t provide details.
Internet companies including Google, Yahoo, Facebook, Microsoft and Apple Inc. are trying to distance themselves from news reports that they gave the agency data on electronic communications of Americans and foreigners or have lax security.

While the companies are trying to prevent the NSA from gaining unauthorized access to their data, they say they comply with legal court orders compelling them to provide the government information.
The NSA has tapped fiber-optic cables abroad in order to siphon off data from Google and Yahoo, circumvented or cracked encryption, and covertly introduced weaknesses and back doors into coding, according to reports in the Washington Post, the New York Times and the U.K.’s Guardian newspaper based on documents leaked by former NSA contractor Edward Snowden.

Game On

Companies are fighting back primarily by using increasingly complex encryption, which scrambles data using a mathematical formula that can be decoded only with a special digital key. The idea is to protect sensitive information like e-mails, Internet searches and digital calls.
Google has accelerated efforts to encrypt information flowing between its data centers, doubled the length of its digital keys and implemented measures to detect fraudulent certificates for verifying the authenticity of websites, according to a statement from the Mountain View, California-based company.

NSA spy programs have “the great potential for doing serious damage to the competitiveness” of U.S. companies, Richard Salgado, Google’s director of law enforcement and information security, told a Senate subcommittee Nov. 13.
“It’s very important that the users of our services understand that we are stewards of their data, we hold it responsibly, we treat it with respect,” Salgado said. “We’ve already seen impacts on the businesses.”

Government Threat

Google, Yahoo and Facebook generated $44.4 billion in advertising revenue so far in 2013 in part by mining users’ private data, according to Bloomberg Industries.

An Aug. 14 analysis by Forrester Research Inc. analyst James Staten found the U.S. cloud computing industry could lose as much as $180 billion by 2016 due to the spying disclosures.

Yahoo will make encrypted connections standard by January for all its Mail users with 2048-bit digital keys, Sarah Meron, a spokeswoman for the Sunnyvale, California-based company, said in an e-mail.
Facebook, in addition to moving toward 2048-bit encryption keys, is accelerating a tactic known as “perfect forward secrecy” that prevents the NSA from deciphering the communications of users if it obtains a security code, Jodi Seth, a company spokeswoman, said in an e-mail.

Slow Adoption

While Google has led the industry in adopting security practices, “many of its competitors have been slow to follow,” Christopher Soghoian, principal technologist for the American Civil Liberties Union’s speech, privacy and technology project, said in e-mail.

“Yahoo is waiting until 2014 to do what Google did in 2010,” he said. “The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans.”
The National Institute of Standards and Technology has determined that known computing power won’t be able to break 2048-bit encryption until at least 2030.

Agencies like the NSA use stronger encryption, said Bruce Schneier, a fellow at the Berkman Center for Internet and Society at Harvard Law School.

Schneier recommends companies encrypt everything even though the NSA can often defeat it by, among other tactics, installing malicious software on computers to steal the security keys that unlock encryption codes.

Backdoor Grab

“The NSA has turned the Internet into a giant surveillance platform,” Schneier, a computer security and privacy specialist, said in a phone interview.

The companies may not be moving fast enough in a cat-and-mouse game with the NSA, said Kurt Opsahl, senior staff attorney for the San Francisco-based digital rights group Electronic Frontier Foundation.
“The NSA is one of the largest, most powerful, well-funded intelligence agencies in the world,” Opsahl said in a phone interview. “While the government has been misusing its legal authorities to require a set of data at the front door, the NSA has been sneaking in the back door to grab all the data.”

The NSA collects “the communications of targets of foreign intelligence value, irrespective of the provider that carriers them,” the agency said in an Oct. 31 statement.

‘Political Problem’

The U.S. uses “every intelligence tool available” to intercept electronic communications of suspected terrorists relying on “the very same social networking sites, encryption tools and other security features” as innocent Americans, Director of National Intelligence James Clapper said in an Oct. 4 statement.

Encryption isn’t foolproof. The NSA can use hacking attacks to obtain security keys or compel companies to hand them over with court orders, said Jonas Falck, chief executive officer and co-founder of Halon Security Inc., a network security company with U.S. headquarters in San Francisco.

Companies like Google also introduce security vulnerabilities when they decrypt data to analyze user trends for advertising purposes, Falck said in a phone interview. Google spokeswoman Niki Fenwick said the company declined to respond to this concern.

Companies have different levels of encryption, which mean electronic communications sent between them may not be protected from starting point to end point, Opsahl said.

Encrypting data can, at the least, make it harder for the NSA to gain unauthorized access to information, forcing the agency to pick targets or come out of the shadows and go before a court to obtain it legally, Opsahl said.

The other thing companies can do is lobby Congress to change the law to restrict what the NSA is able to do, according to Schneier.
“There is a technology component, but primarily this is a political problem,” Schneier said.


(i tried separating the copy and paste the best i could, it was more of a hassle then i wanted to deal with but i feel the need to share as much info as possible.NSA topic seems to be fizzling out way too much around here)
 

MrDanky

Member
The newest leak to add to the Snowden Saga....

The newest leak to add to the Snowden Saga....

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers'

http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html

WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority.

The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues.

Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”

original.jpg



The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration.

"Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday.

Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said.

"Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."

None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are.

Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them."

Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.

In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts."

In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads.

The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots.

Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.

The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable."

According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues.

An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.

One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause."

The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified.

The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.

While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others.

Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs.

Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."

James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history."

That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said.

Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."

Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist."

"The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.


Arguments for which radicalizers are being targeted:


original.jpg


Where the report was sent:

original.jpg


Intelligence gleaned from electronic surveillance:

original.jpg








:moon:
 

MrDanky

Member
here is the rest of the report.... only could hot link so many pics in last post... here are two pics... on original report they were last....


original.jpg


original.jpg



....the shit i go through to inform you guys... man i tell ya!
 

Latest posts

Latest posts

Top