Archive for the ‘CIA’ Category

Advertisements

WikiLeaks is under attack by several governments, including our own, for releasing public interest information embarrassing to our National Security State. It’s people are followed and believe their lives are in danger, its web site has been hacked, and WikiLeaks is being threatened, with the official newspaper of the empire, the New York Times, telling us “To the list of the enemies threatening the security of the United States, the Pentagon has added WikiLeaks.org. Liberty Underground

News c/o Liberty Underground

Whistleblower Web site WikiLeaks is planning to release a video that reveals what it’s calling a Pentagon ‘cover-up’ of an incident in which numerous civilians and journalists were murdered in an airstrike, according to a recent media advisory.The video will be released on April 5 at theNational Press Club, the group said,” begins a piece at Raw Story this morning.

WikiLeaks calls itself “The People’s Intelligence Agency,” putting out information citizens need to know to make democracy work, information hidden from them by their governments.

WikiLeaks is under attack by several governments, including our own, for releasing public interest information embarrassing to our National Security State. It’s people are followed and believe their lives are in danger, its web site has been hacked, and WikiLeaks is being threatened, with the official newspaper of the empire, the New York Times, telling us “To the list of the enemies threatening the security of the United States, the Pentagon has added WikiLeaks.org.”

c/o Salon.com, Glenn Greenwald

A newly leaked CIA report prepared earlier this month (.pdf) analyzes how the U.S. Government can best manipulate public opinion in Germany and France — in order to ensure that those countries continue to fight in Afghanistan. The Report celebrates the fact that the governments of those two nations continue to fight the war in defiance of overwhelming public opinion which opposes it — so much for all the recent veneration of “consent of the governed” — and it notes that this is possible due to lack of interest among their citizenry: “Public Apathy Enables Leaders to Ignore Voters,” proclaims the title of one section.

But the Report also cites the “fall of the Dutch Government over its troop commitment to Afghanistan” and worries that — particularly if the “bloody summer in Afghanistan” that many predict takes place — what happened to the Dutch will spread as a result of the “fragility of European support” for the war. As the truly creepy Report title puts it, the CIA’s concern is: “Why Counting on Apathy May Not Be Enough” ::: View Complete Article Here:::

BTC – As Americans we are prone to getting dizzy, lost, in what I have deemed “the toilet of distractions”. Today news crows are invested with the incests of D.C.’s culture of deceit and secrecy. Paying attention is almost not worth it if you watch TV or read conventional news.

It is important to have some education on the nature of the work in American intelligence agencies.

The two following films shed essential light on the real problems with some of the intelligence processes. They will help anyone understand surveillance, national security, secrecy and the way our Congress has become drafted or seduced into an “in” club.

The “closed door” briefings that the CIA and other intelligence agencies regularly commence with, force secrecy on our top officials. Some of whom may actually NEED to speak up on behalf of their constituencies or even possibly self preservation.

Whatever your opinion is of the nature of modern conspiracy; secrecy seems to be consistent with abuses of power.

Below are 2 films to examine what the US government has done on the auspices of “national security”.

[Great big thanks to friends Frank Dorrell and Kimberly Johnson]


What I’ve Learned About U.S. Foreign Policy

http://video.google.com/googleplayer.swf?docid=-6171375275571061709&hl=en&fs=true

ALSO WATCH: Secrets of the CIA

Five courageous former CIA agents reveal deep secrets of the CIA (45 min)

http://personalgrowthcourses.net/video/secrets_cia

c/o Presstv.ir [CLG]


European Union governments have given in to the pressure and appear set to make a last-minute agreement with the United States to allow its intelligence agencies to monitor bank accounts and transactions across the bloc.

Actually, the EU has been clandestinely allowing US intelligence agencies to have access to these financial records since 2001, allegedly to fight terrorism.

However, EU citizens were outraged when this invasion of privacy was revealed in 2006.

Now, however, interior ministers and security officials of the 27-member bloc are going to meet on November 30 to make a decision on legally allowing the United States to have access to bank data across the EU.

According to Spiegel Online, the EU interior ministers gradually succumbed to the “massive” pressure exerted by US Secretary of State Hillary Clinton and US ambassadors in Europe, who pressed governments like door-to-door salespeople.

“They pulled out all the moral and political stops,” one EU foreign minister quipped.

Germany was initially opposed to the agreement but came around this week, and a recalcitrant Austria, one of the last holdouts, followed suit.

German Interior Minister Thomas de Maizière, who is from the new coalition government, told German Justice Minister Sabine Leutheusser-Schnarrenberg, who belongs to the liberal Free Democratic Party (FDP), that he would not block the US proposal in Brussels.

There will not be a German “no” vote, but instead, he will simply abstain, Spiegel Online reported.

In what many Europeans say is a surreptitious move, the final decision on the issue is going to be made one day before the Lisbon Treaty comes into effect on December 1, since the treaty would allow the European Parliament to have a say in the matter. :::MORE HERE:::

CIA Targeting BlogJourno? Yep.

America’s spy agencies want to read your blog posts, keep track of your Twitter updates — even check out your book reviews on Amazon.

In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using ”open source intelligence” — information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.

Visible crawls over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, online forums, Flickr, YouTube, Twitter and Amazon. (It doesn’t touch closed social networks, like Facebook, at the moment.) Customers get customized, real-time feeds of what’s being said on these sites, based on a series of keywords.

“That’s kind of the basic step — get in and monitor,” says company senior vice president Blake Cahill.

Then Visible “scores” each post, labeling it as positive or negative, mixed or neutral. It examines how influential a conversation or an author is. (”Trying to determine who really matters,” as Cahill puts it.) Finally, Visible gives users a chance to tag posts, forward them to colleagues and allow them to response through a web interface.

In-Q-Tel says it wants Visible to keep track of foreign social media, and give spooks “early-warning detection on how issues are playing internationally,” spokesperson Donald Tighe tells Danger Room.

Of course, such a tool can also be pointed inward, at domestic bloggers or tweeters. Visible already keeps tabs on web 2.0 sites for Dell, AT&T and Verizon. For Microsoft, the company is monitoring the buzz on its Windows 7 rollout. For Spam-maker Hormel, Visible is tracking animal-right activists’ online campaigns against the company.

“Anything that is out in the open is fair game for collection,” says Steven Aftergood, who tracks intelligence issues at the Federation of American Scientists. But “even if information is openly gathered by intelligence agencies it would still be problematic if it were used for unauthorized domestic investigations or operations. Intelligence agencies or employees might be tempted to use the tools at their disposal to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. That is not permissible even if all of the information in question is technically ‘open source.’ :::MORE HERE:::

This up from the Courage Campaign:


Hi,

Have you heard that one of President Bush’s torture advisors is now a federal judge in California?

In August 2002, Judge Jay Bybee wrote a horrific memo enabling the torture of detainees — including waterboarding — at Guantanamo Bay. In 2003, he was confirmed to a seat on the important Ninth Circuit Federal Court of Appeals in San Francisco. Instead of sitting on the federal bench, he must be held accountable for his role in the unspeakable crimes that took place at Guantanamo Bay under President Bush.

The Courage Campaign is helping a diverse group of California progressive activists who are working to pass a resolution at this Friday’s California Democratic Party convention demanding that the U.S. House of Representatives begin impeachment proceedings against Judge Jay Bybee. This resolution is the first step in holding Judge Bybee accountable for what he has done. 

Will you join me in signing your name as a supporter of impeaching Judge Jay Bybee and urge your friends to do the same?:

http://www.couragecampaign.org/ImpeachBybee