In post-9/11 America, mere words can get you thrown in jail with a felony terrorism charge poised to ruin your life and confine you to a cage for years on end.
Sandy Hook has amplified the insanity.
Brain Davis, disabled man from Iowa, made the mistake of telling his physical therapist that he believes security at his grand daughter’s school is lacking. Now he is in the slammer charged with felony threat of terrorism.
According to the people who ratted out David to the cops, he threatened to storm the school and shoot people. “I never said that I would go in there and do something to those kids.” Davis told WHO TV 13 in Des Moines. “I said anybody, any one person could go in there. Anybody.”
The leviathan national security state and its engorged under belly of bureaucrats, judges, prosecutors and redundancy of increasingly sadistic cops needs victims like Mr. Davis to justify its existence.
Source: Kurt Nimmo
On Wednesday, Richard Silverstein, who specializes in reporting on the Israeli national security state, posted a leaked document revealing details on the Israeli plan to strike Iran.
“In the past few days, I received an Israeli briefing document outlining Israel’s war plans against Iran. The document was passed to me by a high-level Israeli source who received it from an IDF officer,” Silverstein writes. “The reason they leaked it is to expose the arguments and plans advanced by the Bibi-Barak two-headed warrior. Neither the IDF leaker, my source, nor virtually any senior military or intelligence officer wants this war.”
Silverstein believes the high-tech attack planned for Iran “could turn into a protracted, bloody conflict closer to the nine-year Iran-Iraq War” instead of something akin to the short-lived invasion of Iraq declared successful with Bush’s scripted “mission accomplished” braggadocio on the deck of the USS Lincoln.
From the document:
The Israeli attack will open with a coordinated strike, including an unprecedented cyber-attack which will totally paralyze the Iranian regime and its ability to know what is happening within its borders. The internet, telephones, radio and television, communications satellites, and fiber optic cables leading to and from critical installations—including underground missile bases at Khorramabad and Isfahan—will be taken out of action. The electrical grid throughout Iran will be paralyzed and transformer stations will absorb severe damage from carbon fiber munitions which are finer than a human hair, causing electrical short circuits whose repair requires their complete removal. This would be a Sisyphean task in light of cluster munitions which would be dropped, some time-delayed and some remote-activated through the use of a satellite signal.
A barrage of tens of ballistic missiles would be launched from Israel toward Iran. 300km ballistic missiles would be launched from Israeli submarines in the vicinity of the Persian Gulf. The missiles would not be armed with unconventional warheads [WMD], but rather with high-explosive ordnance equipped with reinforced tips designed specially to penetrate hardened targets.
The missiles will strike their targets—some exploding above ground like those striking the nuclear reactor at Arak–which is intended to produce plutonium and tritium—and the nearby heavy water production facility; the nuclear fuel production facilities at Isfahan and facilities for enriching uranium-hexaflouride. Others would explode under-ground, as at the Fordo facility.
A barrage of hundreds of cruise missiles will pound command and control systems, research and development facilities, and the residences of senior personnel in the nuclear and missile development apparatus. Intelligence gathered over years will be utilized to completely decapitate Iran’s professional and command ranks in these fields.
After the first wave of attacks, which will be timed to the second, the “Blue and White” radar satellite, whose systems enable us to perform an evaluation of the level of damage done to the various targets, will pass over Iran. Only after rapidly decrypting the satellite’s data, will the information be transferred directly to war planes making their way covertly toward Iran. These IAF planes will be armed with electronic warfare gear previously unknown to the wider public, not even revealed to our U.S. ally. This equipment will render Israeli aircraft invisible. Those Israeli war planes which participate in the attack will damage a short-list of targets which require further assault.
Among the targets approved for attack—Shihab 3 and Sejil ballistic missile silos, storage tanks for chemical components of rocket fuel, industrial facilities for producing missile control systems, centrifuge production plants and more.
Others have speculated that Israel will also produce an EMP that will send Iran back to the Stone Age. “If Israel chooses one of its Jericho III missiles to detonate a single EMP warhead at high altitude over north central Iran, there will be with no blast or radiation effects on the ground,” writes Joe Tuzara for Arutz Sheva, the ultra-religious Zionist media network.
Coupled with cyber-attacks, Iranians would not know it happened except for a massive shutdown of the electric power grid, oil refineries and a transportation gridlock. Food supply would be exhausted and communication would be largely impossible, leading to economic collapse. Similarly, the uranium enrichment centrifuges in Fordo, Natanz and widely scattered elsewhere, would freeze for decades.
Iran’s response to an EMP attack would be futile and uncannily tragic. Before the elite Qods force could mine the Strait of Hormuz and wreak havoc to Arab Gulf states oil refineries, the Fifth Fleet and U.S. military installations, Iran’s administrative-industrial-military complex infrastructures would have been laid to waste without the ruling clerical regime knowing about it.
Such dire scenarios are predicated on the fiction that Iran has a nuclear program and plans to nuke Israel at the first possible opportunity. A number of intelligence agencies (including Israeli intelligence) and analysts inside and outside the United States have concluded that Iran does not have an active nuclear program and is at best years away from developing one.
“The United States, European allies and even Israel generally agree on three things about Iran’s nuclear program: Tehran does not have a bomb, has not decided to build one, and is probably years away from having a deliverable nuclear warhead,” Reuters reported in March.
If this is the case, why are Israel and the United States so keen to attack Iran? For the same reason the United States attacked Iraq twice – not to take out the threat of Saddam Hussein and his nuclear weapons and weapons of mass destruction – threats grotesquely manufactured by a gaggle of neocons – but to completely destroy Iran’s civilian infrastructure and turn the country into a shattered third world backwater not capable of challenging Israeli hegemony or opposing the designs of the United States in the region.
Source: Kurt Nimmo
General Keith Alexander, the NSA boss, wants the government to centralize the internet and force users to use a system analogous to EZ Pass.
EZ Pass is an RFID transponder system used for toll collection on roads, bridges, and tunnels in the United States.
“What we need for cybersecurity is something analogous to that,” Alexander told the annual Def Con computer hacking conference in Las Vegas.. “Think of us as the EZ Pass on the highway.”
“When you go down the highway, and you go down the EZ Pass lane, what you’re doing is sending that code. That system is not looking in your car, reading the e-mail, or intercepting anything, it’s just getting that code,” he said.
In other words, the government should vet all users with a checkpoint. “All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,” said Alexander.
The super secret cryptologic intelligence agency wouldn’t track and scrutinize your behavior on the internet, according to Alexander. The EZ Pass “system is not looking in your car, reading the e-mail, or intercepting anything, it’s just getting that code,” he insisted.
EZ Pass, however, does not simply “get the code” and allow access to the highway. It trades “a bit of privacy for a load of convenience,” the New York Times pointed out in 2005.
The NSA’s latest scheme to track and trace the online behavior of Americans – despite Alexander’s assertions to the contrary – is part of a long history of poking into the private affairs of Americans.
Following Truman’s executive order creating the super-secret intelligence agency in 1952 as an instrument of the national security state, the NSA launched Operation Shamrock. The secret operation illegally intercepted the telegrams of Americans without a search warrant and the telecoms of the day fully cooperated, according to L. Britt Snider, a congressional investigator who uncovered Shamrock.
A few months after the 9/11 attacks, then president Bush “secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials,” the New York Times reported in 2005.
NSA officialdom attempted to portray the warrantless searches as “a sea change” and new territory for the agency – insisting that all previous searches were conducted on overseas communications – despite Operation Shamrock and the distinct possibility the agency has engaged in likewise activity over its 60 year history.
In order to convert a decentralized internet into a massive centralized surveillance and tracking system, the government will have to sell us on the largely bogus threat of cyber attacks and the over-hyped prospect of “dirty numbers” shutting down power grids and the computer networks that run America’s infrastructure.
Infowars.com has covered this mythical threat in detail, revealing that in fact critical infrastructure is not connected to the internet and the threat posed by hackers (who may or may not be government operatives) is largely an issue for under-protected government and corporate networks.
Alexander peddled his scripted propaganda line in February when he told the Wall Street Journal that the hacktavist collective Anonymous may soon have the capability to take down the power grid in the United States through a cyberattack. Techies up to speed on the technology, however, dismissed Alexander’s propaganda as absurd.
Jerry Brito, senior research fellow with the Mercatus Center at George Mason University, told SecurityNewsDaily that while Anonymous is capable of defacing websites and engaging in disruptive denial of service attacks, it would take the resources of government to knock out networks. As an example, consider the United States and Israel taking down Iran’s nuclear infrastructure with finely honed malware.
The government and its super-secret intelligence agencies will not rest until they convert the internet – in fact, the entire telecommunications system – into a real-time surveillance and tracking tool.
Unfortunately, we are but one manufactured false flag event away from that possibility becoming a reality.
Source: Richard Silverstein
At first blush, this story may not appear terribly relevant to national security blogs, democracy or human rights, but here me out.
It concerns a 24 year-old British citizen whose website has acted as a go-between for other sites which allegedly infringe music and movie copyrights of U.S. entertainment companies. Richard O’Dwyer ran the site, TVShack.net, which linked to others accused of online piracy. Instead of going after the pirate sites (or in addition to it), the Justice Department decided that because O’Dwyer earned money from his site ($230,000 over two years), that he too was guilty of copyright infringement.
I find this the most bizarre interpretation of copyright law imaginable. It would be one thing if O’Dwyer had acted as a middle-man for a serious crime, but to link to another website that allegedly violates U.S. copyright law? How is that aiding and abetting? Not to mention extraditing a UK citizen to the U.S. to prosecute him for this? For linking? Where do they plan to put him when they get him: Guantanamo?
Here’s where this case gets really sticky: if they want to go after someone for linking to sites engaged in illegality, why not go even farther? Why not prosecute U.S. bloggers for linking to jihadi websites, even academics or specialists who study Islamists professionally? Don’t think this is far-fetched either. An Israeli lawyer publicly suggested that Israeli bloggers linking to this website when I break a gag order or expose an Israeli security secret are themselves guilty of violating Israeli law. I think the guy is a dunderheaded ass. But there are now plenty such people in the Israeli Knesset and security agencies. They’d be more than happy to introduce such legislation if it burnished their ultranationalist credentials.
This is how the cold, clammy hand of the national security state imposes itself on public discourse. And don’t make the mistake of thinking that Israel is sui generis and it can’t happen here. The current U.S. administration has made it abundantly clear that if anything it wants to outdo its predecessor in flexing its national security muscles. There are few protections left in place if you’ve violated the unwritten commandments used by Obama’s national security apparatus. You could end up dead if you’re a U.S. citizen in Yemen; or in prison if you’re viewed as aiding and abetting terror, even just by linking to it.
To be clear, the neither the U.S. nor Israel have so far sought to criminalize linking. But they’ve criminalized just about everything else and this can’t be too far behind.
Republicans in Congress are already contemplating criminalizing the practice of journalism as Israel has just done in light of Uri Blau’s plea deal. Under their plans, if a journalist publishes a story based on sources who offer secret government documents, the journalist would go to jail. Not to mention that if the government wants to discover who the source was, it could dragoon the journalist into court or prison to find out. In my case, if the feds hadn’t known that Shamai Leibowitz was leaking secret documents to me, they could’ve taken me before a grand jury and tried to compel me to talk. If I hadn’t, they could jail me for contempt.
Source: Kurt Nimmo
The Department of Homeland Security and the national security state are determined to convert the nation’s airports into Gestapo zones where citizens are subjected to the latest high-tech surveillance technology.
The latest example: the CIA’s technology front group, In-Q-Tel, has subcontracted with a cutting edge company to develop a molecular-level scanner that Homeland Security plans to install in airports.
“Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body, clothes, and luggage with a new laser-based molecular scanner fired from 164 feet (50 meters) away,” reports Gizmodo. “From traces of drugs or gun powder on your clothes to what you had for breakfast to the adrenaline level in your body—agents will be able to get any information they want without even touching you.”
The new system is ten million times faster and one million times more sensitive than the current naked body porno scanners the TSA uses. Because of its range, the device can be used on everybody who enters or leaves an airport – and, as Janet Napolitano has promised, at the local mall, sports stadium and hotel.
In fact, the system developed by Genia Photonics is so effective it can allegedly detect cancer cells and record other spectroscopic information. Once implemented, it will undoubtedly trickle down to law enforcement the same way drones have. Imagine cops using “suspicionless checkpoints” and discovering with the help of this new technology that you had a martini last night or smoked marijuana at the Christmas party last year. It will be a boon for the prison-industrial complex in the United States, now hosting the largest prison population in the world.
Gizmodo notes that the laser will be a perfect tool for the cops and will serve as an ideal pre-crime unit in squad cars: Since “it’s extremely portable, will this technology extend beyond the airport or border crossings and into police cars, with officers looking for people on the street with increased levels of adrenaline in their system to detain in order to prevent potential violent outbursts? And will your car be scanned at stoplights for any trace amounts of suspicious substances?”
According to Genia Photonics and Tara O’Toole of Homeland Security, the technology will be “transition-ready… in the next 12 to 24 months.”
That does not mean it will be installed within two years in cop cruisers and at entry points at the local mall or restaurant. It does mean that the CIA and the government are working at breakneck speed to turn America into a nightmarish high-tech prison that makes anything imagined by George Orwell pale in comparison.
Married with a crop of new technologies under development by the Pentagon – roachbots, humanoid robots, quarter-sized kilobots, and DARPA-developed cyborg insects – our impending Brave New World will indeed be unlike anything we have witnessed before and will closely resemble Philip K. Dick’s The Minority Report dystopia, only tenfold.
Source: Kurt Nimmo
Last week’s passage of CISPA in the House was helped along by the so-called House Tea Party Caucus.
In reality, this caucus is nothing more than a gaggle of state-worshiping and war-mongering Republicans who hate the Constitution as much as their colleagues in crime on the other side of the aisle hate it, but for different reasons.
In fact, Dems were generally trepidatious when it came to CISPA, while Republicans were nearly orgasmic in their support, mostly due to their post September 11 brainwashing and Fox News indoctrination.
According to math completed byPatrick Cahalan, “88% of the overall GOP members (casting a vote) voted yea, 23% of the Dems (casting a vote) voted yea, and 71% of the Tea Party (casting a vote) voted yea (Paul and Pence didn’t cast a vote).”
This works out to be 44 of the 66 members of the House Tea Party Caucus who voted to trash the Bill of Rights. Before Sarah Palin and the Koch brothers, the Tea Party was about the Constiituion. Now it is about reliqiushing our right to be left alone to the NSA, CIA, FBI and the national security state.
“The Tea Party may be the small government wing of the Republican Party, but when it comes to national security suddenly limiting the state becomes far less critical,” writes Erik Kain of Forbes.
Kain’s comment assumes that the Borgified Tea Party actually stands for small government. Instead it stands for whatever the establishment Republican Party tells it to stand for, including destroying what remains of the Constitution.
The original Tea Party was transformed from the inside out. In retrospect, it is amazing how easy the process was.
Establishment Republicans inserted a few operatives in key places and spread around filthy lucre. Front organizations were established that claimed exclusivity and these dummy organizations were pushed by the corporate media as the heart and soul of the Tea Party movement. The founding constitutionalists were exiled and replaced with mindless cheerleaders who support endless wars against phantom enemies and the implementation of a police state in the name of national security.
It’s odd that this reality is not understood by writers at Forbes or practically anywhere else in the corporate media for that matter.
CISPA is possible because we have sold our founding principles down the river for a mess of fetid pottage. If we ultimately end up with the bone-crushing fascism found in places like Nazi Germany or Pinochet’s Chile, it will be due to our inability to comprehend the truth and look beyond the illusion presented by the establishment.
Source: Kurt Nimmo
Asawin Suebsaeng, who is an editorial fellow at Mother Jones, seems to have a problem understanding the Constitution and the national security state. He takes the political “right” to task for warning about theNational Defense Resources Preparedness executive order signed by Obama earlier this month. This particular EO is no big deal and if you really want to place blame, place it on Harry Truman, Suebsaeng writes.
He’s right about Truman. TheNational Security Act of 1947 was passed by Congress and signed into law by president Truman. It has allowed the Pentagon and the CIA to encroach on our civil liberties ever since. It created a national security establishment that has issued a number of unconstitutional executive orders. Mr. Suebsaeng mentions these in passing. It enabled the military-industrial complex president Dwight D. Eisenhower warned about in his farewell address in 1961.
Both the national security state and the military-industrial complex (which are actually inseparable) experienced a renaissance following the engineered demise of the Soviet Union, the supposed (and endlessly celebrated) end of the Cold War and the attacks of September 11, 2001. Eisenhower warned that the “potential for the disastrous rise of misplaced power exists and will persist” and this is precisely what happened prior to and following his speech.
Suebsaeng tells us the National Defense Resources Preparedness EO is not unique and it is basically a rerun of executive orders by Bill Clinton, George W. Bush, and Dwight Eisenhower. “It’s your standard government readiness policy – nothing particularly exciting or groundbreaking,” he writes without delving into what a “readiness policy” is and what it means for a nation that is supposedly a republic based on the Constitution.
“Manufacturing a far-fetched conspiracy out of something so routine is a distraction,” Suebsaeng complains in what we can only conclude is ignorance of the issue and a knee-jerk reaction in defense of Obama, who many liberals still blindly follow despite the obvious fact he is a teleprompter reading stooge little different than his predecessor.
The National Defense Resources Preparedness EO and most of the FEMA EOs before it almost completely eviscerate due process (explicitly stated in the Fifth Amendment with a heritage going back to the Magna Carta). The EOs sprouting from the Defense Production Act of 1950 allowing the government to mobilize national resources in the event of “national emergencies” set the stage for a complete government takeover and the implementation of martial law and confiscate private property.
Reading the EOs make this abundantly clear despite the arguments of apologists like Mr. Suebsaeng, who dismisses legitimate concerns about egregious violations of the Constitution as the “right’s latest phony freak-out about Obama’s wielding of executive power.”
Supposed liberals usually only complain about abuses of executive power when so-called conservatives are in the White House. They routinely give Democrat presidents a blank check to attack the Constitution and the Bill of Rights. For them, the Constitution is a partisan football.
If Mr. Suebsaeng were a fair and impartial observer instead of a Democrat apologist for maximum state power over the individual, he would mention that presidents regardless of party affiliation have repeatedly violated the Constitution – from Abraham Lincoln to Woodrow Wilson to Bush and Obama.
The commentary of Sean Hannity, Pamela Geller, the Daily Paul, Reason and Alex Jones – all excoriated as right-wing nuts and extremists by Suebsaeng – come in a distant second to the in-your-face derogation of the Constitution and the Bill of Rights given the nod by Mother Jones’ editorial fellow.