Proof that the NSA Has Backdoors in Every Software & Hardware Package in the World

ku-xlarge

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald For the New York Times: Nicole Perlroth, Scott Shane For ProPublica: Jeff Larson The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. What’s New Here The NSA has secretly and successfully worked to break many types of encryption, the widely used technology that is supposed to make it impossible to read intercepted communications. Referring to the NSA’s efforts, a 2010 British document stated: “Vast amounts of encrypted Internet data are now exploitable.” Another British memo said: “Those not already briefed were gobsmacked!” The NSA has worked with American and foreign tech companies to introduce weaknesses into commercial encryption products, allowing backdoor access to data that users believe is secure. The NSA has deliberately weakened the international encryption standards adopted by developers around the globe. Documents BULLRUN Briefing Sheet from GCHQ SIGINT Enabling Project Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated. The N.S.A. hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world. “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.” When the British analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, “those not already briefed were gobsmacked!” An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year. In recent months, the documents disclosed by Mr. Snowden have described the N.S.A.’s broad reach in scooping up vast amounts of communications around the world. The encryption documents now show, in striking detail, how the agency works to ensure that it is actually able to read the information it collects. The agency’s success in defeating many of the privacy protections offered by encryption does not change the rules that prohibit the deliberate targeting of Americans’ e-mails or phone calls without a warrant. But it shows that the agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features. The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be at serious risk, agency officials say. Just in recent weeks, the Obama administration has called on the intelligence agencies for details of communications by Qaeda leaders about a terrorist plot and of Syrian officials’ messages about the chemical weapons attack outside Damascus. If such communications can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work. But some experts say the N.S.A.’s campaign to bypass and weaken communications security may have serious unintended consequences. They say the agency is working at cross-purposes with its other major mission, apart from eavesdropping: ensuring the security of American communications. Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL, virtual private networks, or VPNs, and the protection used on fourth generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network. For at least three years, one document says, GCHQ, almost certainly in close collaboration with the N.S.A., has been looking for ways into protected traffic of the most popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. “The risk is that when you build a back door into systems, you’re not the only one to exploit it,” said Matthew D. Green, a cryptography researcher at Johns Hopkins University. “Those back doors could work against U.S. communications, too.” Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information. “The intelligence community has worried about ‘going dark’ forever, but today they are conducting instant, total invasion of privacy with limited effort,” he said. “This is the golden age of spying.” A Vital Capability The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus primarily on GCHQ but include thousands either from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of Americans and others. The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted. The documents make clear that the N.S.A. considers its ability to decrypt information a vital capability, one in which it competes with China, Russia and other intelligence powers. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” a 2007 document said. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of American Civil War battles. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century. Unlike some classified information that can be parceled out on a strict “need to know” basis, one document makes clear that with Bullrun, “there will be NO ‘need to know.’ ” Only a small cadre of trusted contractors were allowed to join Bullrun. It does not appear that Mr. Snowden was among them, but he nonetheless managed to obtain dozens of classified documents referring to the program’s capabilities, methods and sources. Ties to Internet Companies When the N.S.A. was founded, encryption was an obscure technology used mainly by diplomats and military officers. Over the last 20 years, with the rise of the Internet, it has become ubiquitous. Even novices can tell that their exchanges are being automatically encrypted when a tiny padlock appears next to the Web address on their computer screen. Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware. According to an intelligence budget document leaked by Mr. Snowden, the N.S.A. spends more than $250 million a year on its Sigint Enabling Project, which “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.” Sigint is the abbreviation for signals intelligence, the technical term for electronic eavesdropping. By this year, the Sigint Enabling Project had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by surreptitiously exploiting existing security flaws, according to the documents. The agency also expected to gain full unencrypted access to an unnamed major Internet phone call and text service; to a Middle Eastern Internet service; and to the communications of three foreign governments. In one case, after the government learned that a foreign intelligence target had ordered new computer hardware, the American manufacturer agreed to insert a back door into the product before it was shipped, someone familiar with the request told The Times. The 2013 N.S.A. budget request highlights “partnerships with major telecommunications carriers to shape the global network to benefit other collection accesses” — that is, to allow more eavesdropping. At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service. Microsoft asserted that it had merely complied with “lawful demands” of the government, and in some cases, the collaboration was clearly coerced. Executives who refuse to comply with secret court orders can face fines or jail time. N.S.A. documents show that the agency maintains an internal database of encryption keys for specific commercial products, called a Key Provisioning Service, which can automatically decode many messages. If the necessary key is not in the collection, a request goes to the separate Key Recovery Service, which tries to obtain it. How keys are acquired is shrouded in secrecy, but independent cryptographers say many are probably collected by hacking into companies’ computer servers, where they are stored. To keep such methods secret, the N.S.A. shares decrypted messages with other agencies only if the keys could have been acquired through legal means. “Approval to release to non-Sigint agencies,” a GCHQ document says, “will depend on there being a proven non-Sigint method of acquiring keys.” Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology, the United States’ encryption standards body, and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says. Even agency programs ostensibly intended to guard American communications are sometimes used to weaken protections. The N.S.A.’s Commercial Solutions Center, for instance, invites the makers of encryption technologies to present their products and services to the agency with the goal of improving American cybersecurity. But a top-secret N.S.A. document suggests that the agency’s hacking division uses that same program to develop and “leverage sensitive, cooperative relationships with specific industry partners” to insert vulnerabilities into Internet security products. A Way Around By introducing such back doors, the N.S.A. has surreptitiously accomplished what it had failed to do in the open. Two decades ago, officials grew concerned about the spread of strong encryption software like Pretty Good Privacy, or P.G.P., designed by a programmer named Phil Zimmermann. The Clinton administration fought back by proposing the Clipper Chip, which would have effectively neutered digital encryption by ensuring that the N.S.A. always had the key. That proposal met a broad backlash from an unlikely coalition that included political opposites like Senator John Ashcroft, the Missouri Republican, and Senator John Kerry, the Massachusetts Democrat, as well as the televangelist Pat Robertson, Silicon Valley executives and the American Civil Liberties Union. All argued that the Clipper would kill not only the Fourth Amendment, but also America’s global edge in technology. By 1996, the White House backed down. But soon the N.S.A. began trying to anticipate and thwart encryption tools before they became mainstream. “Every new technology required new expertise in exploiting it, as soon as possible,” one classified document says. Each novel encryption effort generated anxiety. When Mr. Zimmermann introduced the Zfone, an encrypted phone technology, N.S.A. analysts circulated the announcement in an e-mail titled “This can’t be good.” But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government’s nuclear department and another’s Internet service by cracking the virtual private networks that protected them. By 2010, the Edgehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300. But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum. But the agency was concerned that it could lose the advantage it had worked so long to gain, if the mere “fact of” decryption became widely known. “These capabilities are among the Sigint community’s most fragile, and the inadvertent disclosure of the simple ‘fact of’ could alert the adversary and result in immediate loss of the capability,” a GCHQ document outlining the Bullrun program warned. Corporate Pushback Since Mr. Snowden’s disclosures ignited criticism of overreach and privacy infringements by the N.S.A., American technology companies have faced scrutiny from customers and the public over what some see as too cozy a relationship with the government. In response, some companies have begun to push back against what they describe as government bullying. Google, Yahoo and Facebook have pressed for permission to reveal more about the government’s secret requests for cooperation. One small e-mail encryption company, Lavabit, shut down rather than comply with the agency’s demands for what it considered confidential customer information; another, Silent Circle, ended its e-mail service rather than face similar demands. In effect, facing the N.S.A.’s relentless advance, the companies surrendered. Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.” Update (9/6): Statement from the Office of the Director of National Intelligence: It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption. Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that. While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news. Indeed, NSA’s public website states that its mission includes leading “the U.S. Government in cryptology … in order to gain a decision advantage for the Nation and our allies.” The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity. Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.

Miranda Warning

Obama Call’s for “Pearl Harbor 2″ – US Naval Ship’s Off Syria Setup for Suicide Mission – Syria will Unleash Sunburn Missiles and Wipeout US Mediterrean Fleet Igniting WWIII Obama’s Only Hope to Save the USA

sunburn

Russian Super Sunburn SS-N-26 ONYX Missiles make the US Navy Obsolete & a US Attack on Syria Suicidal, Therefore Our USA Ships sitting offshore Syria are Pawn’s, and the servicemen will all die in a cruel attempt to ignite WWIII and get Europe into AmeriKKKa’s “LAST WAR”.

Ever wonder why the US and Israel go on and on threatening to bomb Iran, Syria, or Russia?? but never do? I have. The answer is simple enough. In accordance with a directive from Super Secret Russian Technology “Star Fleet” now defuses all nuclear weapons which makes the threat of a joint US Israeli nuclear annihilation of Syria and Iran just so much hot air.

The second reason is even more embarrassing for the US because it evidences that the huge US Navy is now as militarily obsolete as Hannibal’s elephants, and much more dangerous to man.

The entire US Naval fleet are just sitting ducks waiting to die. Flying at Mach-7 these Russian Sunburn missiles can vaporize any ship at sea by kinetic energy alone.

Thus given the fire-power of Syria, then it can only be assumed that Obama has placed the US Navy and Marines in a suicide situation, a pretext for WWIII. As the ONLY way the USA can survive the coming collapse of the US Petro-Dollar is to kick the can down the road by starting a New World War. We know that the USA knew the Japanese were going to bomb pearl harbor, but we left the ships in place to justify interning Japanese american’s and stealing their wealth. Sound familiar? US Military Intelligence knows that they’re ship’s can be annihilated, so why are servicemen being placed in harms way? There can be no other reason that to justify a huge naval loss, same that the USA played last time their economy collapsed Post Depression 1942.

Had there not been WWII and justification to attack and rob Japan, then the USA would have reverted to a Plantation Colony. Today the US government is bankrupt, and thus it is imperative to create WWIII and NULL&VOID all the debt incurred during 60 years of insane spending.

Worked in 1942 and it may work again, then it may not, but the USA has nothing to lose in this poker hand where all players die.

An ACT of WAR – So the WWIII Internet War’s Begin – Let it be known that Little ‘Lava-Bit’ was the incendiary force to Start Internet USA WWIII

The government strikes again, but finds yet another American willing to fight. Applause is not enough!

9 August 2013

Summary:  As the Second Republic fades away, the Constitution abandoned, the government grows more powerful and bolder. As we see in its latest strike against Edward Snowden. But this time something strange happened. They came up against yet another American. A real American, willing to fight for the Republic against the government even at great personal cost. Don’t treat this as a spectator sport, with yourself as a consumer of news. Write your representatives. If you can, support the organizations on the front lines.

Lavabit

“Indeed, the safest road to Hell is the gradual one – the gentle slope, soft underfoot, without sudden turnings, without milestones, without signposts.”
The Screwtape Letters, C. S. Lewis, Chapter 12 (1959)

Contents

  1. The Empire strikes at Lavabit
  2. About Lavabit
  3. About National Security Letters
  4. What was the Liberty Tree?
  5. For More Information

(1)  The Empire strikes at Lavabit

Lavabit was founded circa 2004 by Dallas programmers to provide (from their Features page) “a priceless level of security, particularly for customers that use e-mail to exchange sensitive information.”  They claim to have 350 thousand clients, reportedly one was Edward Snowden. Lavabit appears to have been served with a National Security Letter by the US government. Unlike the big telecom companies, however, Lavabit took the high road.  The Founders cheer!  Their home page now reads:

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States.

Sincerely,
Ladar Levison, Owner and Operator, Lavabit LLC

Defending the constitution is expensive! Help us by donating to the Lavabit Legal Defense Fund here.

Lavabit deserves our support!

(2)  About Lavabit

From Wired:

LIberty Tree

Let’s watch while they cut it down!

 

.

Based in Texas, Lavabit attracted attention last month when NSA leaker Edward Snowden used an email account with the service to invite human rights workers and lawyers to a press conference in the Moscow airport where he was then confined. A PGP crypto key apparently registered by Snowden with a Lavabit address suggests he’s favored the service since January 2010 — well before he became the most important whistleblower in a generation.

… Reading between the lines, it’s reasonable to assume Levison has been fighting either a National Security Letter seeking customer information — which comes by default with a gag order — or a full-blown search or eavesdropping warrant. Court records show that, in June, Lavabit complied with a routine search warrant targeting a child pornography suspect in a federal case in Maryland. That suggests that Levison isn’t a privacy absolutist. Whatever compelled him to shut down now must have been exceptional.

… Lavabit has 350,000 users who aren’t Edward Snowden, and some are decidedly unhappy with Levison’s decision, judging by a flood of angry comments posted to Lavabit’s Facebook page this afternoon.

“Too bad that I payed some years in advance to keep up the good work that now turns out to be terminated without any warning,” wrote one user. “I relied on this service which is basic for my private as professional online communication and have no idea how to migrate mails and recover mails being sent that never reached me in the past 18 hours.”

“I have my Steam account and EVERYTHING on Lavabit,” wrote another. “Please have the servers running so that we can migrate our services.”

“How am I supposed to migrate?” a third user added. “Some services require a confirmation sent to the old email address to be able to switch. I can’t believe this. I just switched to Lavabit only a couple of weeks ago to get away from Hotmail snooping my shit.”

A minority of commenters were more supportive.

“Holy shit, you guys are crying over your Steam accounts. Just change your email to something else. Lavabit either had to roll over for the government, compromising our privacy, or shut down service. Be happy Ladar shut it down instead of rolling over.”

(3)  About National Security Letters

(a)  From the website of the Electronic Frontier Foundation (“defending your rights in the digital world”):

Of all the dangerous government surveillance powers that were expanded by the USA PATRIOT Act the National Security Letter (NSL) power under 18 U.S.C. § 2709 as expanded by PATRIOT Section 505 is one of the most frightening and invasive. These letters served on communications service providers like phone companies and ISPs allow the FBI to secretly demand data about ordinary American citizens’ private communications and Internet activity without any meaningful oversight or prior judicial review. Recipients of NSLs are subject to a gag order that forbids them from ever revealing the letters’ existence to their coworkers to their friends or even to their family members much less the public.

Donate to the EFF here!

(b) What It’s Like to Get a National-Security Letter“, The New Yorker, 28 June 2013

In the summer of 2011, while he was fighting an indictment for alleged computer crimes, Aaron Swartz, an information activist, read Kafka’s “The Trial” and commented on it at his Web site.

A deep and magnificent work. I’d not really read much Kafka before and had grown up led to believe that it was a paranoid and hyperbolic work, dystopian fiction in the style of George Orwell. Yet I read it and found it was precisely accurate—every single detail perfectly mirrored my own experience. This isn’t fiction, but documentary.

His words came back to me in force last week when I spoke with Brewster Kahle, the founder of the nonprofit Internet Archive, perhaps the greatest of our digital libraries, and of the Wayback Machine, which allows you to browse an archive of the Web that reaches back to 1996. He is one of very few people in the United States who can talk about receiving a national-security letter. These letters are one of the ways government agencies, in particular the F.B.I., can demand data from organizations in matters related to national security. They do not require prior approval from a judge, only the assertion that the information demanded is relevant to a national-security investigation. Recipients of a national-security letter typically are not allowed to disclose it.

Kahle’s experience has new purchase in light of recent stories of secret courts and mass surveillance; the machinery of our government seems to have taken on an irrational life of its own. We live in a surreal world in which a “transparent” government insists on the need for secret courts; our President prosecutes whistle-blowers and maintains a secret “kill list”; and private information is collected in secret and stored indefinitely by intelligence agencies.

(c)  Google’s “Transparency Report“, listing orders to them from the US government.

(d)  Articles by the American Civil Liberties Union about National Security Letters. Donate to the ACLU here.

(4) What was the Liberty Tree?

The Liberty Tree (1646–1775) was an elm tree that stood in near Boston Common, providing a rallying point for the rebellion of the American colonies. In the years that followed, almost every American town had its own Liberty Tree, a living symbol of people’s support for the resistance to tyranny.  {paraphrased from Wikipedia}

“They who would give up essential liberty to purchase a little temporary safety deserve neither liberty or safety.”
— From the title page of An Historical review of the Constitution and Government of Pennsylvania (1759); written by Richard Jackson and published by Benjamin Franklin

(5)  For More Information

A few of the posts discussing our gradual loss of rights:

Posts about Edward Snowden:

  1. The Empire Strikes Back: The Demonization of Snowden Begins, 15 June 2013
  2. America’s courtiers rush to defend the government – from us, 22 June 2013
  3. Thoreau reminds us about one of the few tools we have to control the government, 24 June 2013 — About civil disobedience
  4. Will a wave of leakers undercut America’s national security?, 8 July 2013

Keeping yourself out of the EYE of the NSA – Like the Retired NSA People do abroad – Here we will explain exactly what the NSA looks for in Targets

Somene asked me about why I don’t watch video on the internet … ok

Nope sorry I don’t view VIDEO on the internet,

I’m a wild&crazy guy, but I have strict limits on what I do on the internet, my limits include plain vanilly HTML, and text, and few jpgs,

I NEVER do youtube, … my opinion is that if I wanted to watch the tilly (tv), then I should go kill myself,… talking heads, … not a thanks,

So much bullshit, I use this avast virus detection cuz I think its best, and notice that its ‘sandbox’ that I don’t use, uses ‘chrome’(google) I mean what the fuck, what’s the point of a sandbox if its wrapped by the worst spy-wear on the planet?? Nope I only use a version of firefox where I have the source code, its stripped down for only static read html,

Not that I’m paranoid and I have nothing to hide, … its just that I don’t want some fucking asshole sending my hard-disk to heaven.
Same as the fuck spyware like google or adobe(flash) youtube,… not so much that want to spy on me but more that they want to steal my bandwidth to send my hard-disk to there server farms.

None of these company’s can get enough data, that why google will give the new GLASSES away for free, which turns everyone into a data collection device, … ditto for the new GOOGLE-CHROME-CAST if you use it you turn your TV into a data collection device, because you give it your password to your WIFI, and IP security enable, the new stuff about reconfiguring the WIFI-ROUTER to be used as an inhouse X-RAY scanner to keep track of location of all warm-bodys in those also can be enabled.

I mean there will come a time that it will smart to have a sign on your house that says “PLEASE REMOVE ALL GOOGLE DEVICE BEFORE ENTERING MY HOUSE”

Given that I live in a place that most people could never spend their money on such hardware, … all this is really bad for some like myself because it makes me stick out like a sore thumb being the only using such service on or near my island.

It’s easy to get 3G hell I can get 3G anywhere in ASIA for $5/month anonymous,… that’s the easy part, but if your doing some strange in a place where nobody else does anything such then you bring up and NSA gaydar, one of my ex-nsa buddy’s make me take the battery out of my phone miles from his house, … just because he doesn’t want them to know that ‘white guy’ goes to this house, his filipino wife has a phone and its her name, … fine, … but if he had a phone, then the nsa would know that a white-guy goes to that address and then the HOUSE automatically put in a list in a 3rd world country.

Ok, now this all goes back to youtube, its owned by google, and everytime you go to youtube and watch a movie all your locale goes to the nsa,

Like ALL my NSA friends say ‘We’re NOT watching YOU, we’re watching PATTERNS of MOVEMENT”

You all really need to understand NSA think, … nobody is watching an individual, they’re watching who goes to and from location, …

This all goes back to cold war with russians, the NSA guys learned early on that if you plotted the migration geese you would know there was an alert, a call, where they were forming and everything it gave you heads up on all MIL activity.

Now same-same if a group ‘gun nuts’ gets together at a house, .. then all their cell phones become microphones, … this is the algorithm of activation.

**

If you have no cell phone or computer use at your home, and you prevent other, then your home becomes invisible to the system.

That’s how all my spooks live.

***

I think that’s why the cops are now photo-graphing car plates all the time, just another way to track movement. I ride a bike and live in a place with no cameras.

***

The system is loaded against the people, if you play on the net and carry a cell phone, and go to the wrong house,then you go on the list of ‘interest’ forever, and once they know you have something worth stealing then you’ll get a visit, and your good shit will be gone forever.

You have been fore-warned.

***

For law enforcement, I’m not writing this as law breaker, I’m not writing this to advocate breaking the law. I’m simply writing this how to explain to people how to avoid a ‘knock and talk’ where a bunch of assholes kick your door in a 5am in black armed to the teeth and rob your house and molest your wife and family and hog-tie them for hours, and then apologize, …

No thanks … That’s why I thinks its good to stay OFF the SPY GAY DAR

SHTF: Here we Tell You Exactly When the US Government Will Collapse

‘Collapse’ will ONLY come when there is NO food for the mass of ass ( US PUBLIK),

Given that 1/2 of ASS in the USA are on food-stamps, this could continue forever,

It will ONLY end when the US PETRO DOLLAR is worthless, then the US government cannot pull paper dollars out of its ass and import food abroad, … until then NORMALCY will continue.

Rome went from gold to lead coin ( MONEY ) in 500 years USA went from GOLD to paper  in 40 years, … NO paper in history lasts on average more than 27 years, ..

The USA has beat all odd’s for FAR TOO LONG,… BUT these things take a LONG TIME TO UNFOLD.

EVEN CHINA dumping their $2Trillion US in TBILLS by buying GOLD was said to take 15 years a few years ago, .. this year they bought 1,000 tons of GOLD. It’s still years off until they have liquidated that worthless paper into real value.

Pragmatically, at the top we are ALL diverisified we hold euros,yen,aud,cny,sgd,chf in equal amounts an USD thus nobody at the top really gives a fuck who goes down, …

The USA is a paper – tiger, to the world. OBAMA and his people are FULL of SHIT.

SO there you have it so long the US gubmint can feed its people for FREE it can live on.

ROME had the SAME problem, once the money became worthless the farmers quit sending the wheat to ROME, then there was no bread, in about 500 AD Rome Collapsed because there was no food.

Given that the CIA forces pussy,oil,cocaine to be traded in US DOLLARS, this value abroad the green back could last forever.
Given that the NSA spy’s on the world and knows where everybody hides their drugs, gold, cash, banking, and all valuables, they can pass this data to FBI, DIA, DHS, TSA, and local cop shop, and they can rob any body any time they want, any where in the world.

Even in INDIA or CHINA the USA can rob, by NSA simply sharing data with local’s cops  in that country, and promising a KEEP in the action.

The USA MAFIA could keep going for a long time, … so long as they can print free paper money and turn that into food stamps to keep all the USA ASS on the couch watching TV and eating micky’d.

In Egypt and everywhere else, folks ONLY hit the street because they had no food. So long as the USA can keep belly’s full of SHIT, the USA PONZI can go for another generation.

Ever Wonder Why BATF is under US-TREASURY? Do you Understand that the US-MILITARY’s SOLE Purpose is to BACK the US TREASURY

I remember well back in the 1980’s I used to go to SOF every year in VEGAS, I think the year was 1988,

Secord and North were giving a talk in one of the rooms, anybody could go in and listen, but they check everybody for cameras and recorders,

In the room Secord was asked “how much money did you make”,… he laughed and Said “MILLIONS”,

He made millions of US dollars selling stinger missiles to Afghan using Nicaragua cocaine dollars from Mena, Arkansas.

Everybody in the room smiled.

SOF is soldier-of-fortune, I used to go every year to teach knife fighting as at that time I was a escrima(flipino knife fighting expert), so I could teach or at least show advanced technique to folks who had never seen a what a real knife fighter can do. You know the term ‘leather neck’ came from the fact that in the early 1900’s in the Philippines that a single MORO warrior with a machete could kill a dozen marines by cutting their heads off before they could zip up their trousers. So the MARINES were issued COLT-45’s and Leather around their necks and that brought parity. My point is that a trained Filipino knife fighting man is one of the most advanced killing methodology’s ever developed, a very worthwhile past-time, should dis-arming ameriKKKa come about.

There was no doubt to anyone that the entire USA mission is to monopolize DRUG money, OIL money, prostitution, gambling, and its all to maintain the US dollar reserve status. SO LONG as the entire world black-market uses the US dollar then everything is fine.

The US MIL has been operating 100% with the US treasury since 1932, ever wonder why BATF is under treasury? It’s because the US-DOLLAR is kept in power by the GUN.

Want to Understand the USA Government? Me thinks you cannot handle the truth

Look at EGYPT today a CIVIL-WAR, and SYRIA… WHY? Because of the CIA ( FACEBOOK,GOOGLE), but why were people pissed? They have no food, … why? Because the US-dollar has forced food prices up, in poor regions folks were already spending 90% on food, so when food price went up 100% ( twice ) in a few months ( courtesy of Bernanke QE ), then now folks have LESS TO EAT. So they’re mad, … then give all the kids access to FACEBOOK & GOOGLE and you have a mess.

Why not here in USA? Well 1/2 of the USA is now on FOOD-STAMPS, … that’s why. Take away the free food for 1/2 the USA public and things would go south in a few days.

On morsi ( last weeks fairly elected president of Egypt ) let’s just say one thing, he was supported by the muslims, and Assad ( egypts last president, USA sock-puppet ) was supported by the USA,

Last time the free elections elected a muslim in that part of the world was Algeria what 10 or 20 years ago, and their was a CIA coup very quick to re-install a non-muslim government.

Enough said,

The only MUSLIM government that I know of in the middle-east is Iran,

Did the CIA ( google, facebook ) engineer ‘arab spring’ hell yes, but occupy-wall-street also came out of a vancouver-bc group with DEEP cia connections.

With regards to SYRIA there is only one issue and its called the PIPELINE, back in the 1950′s the USA paid for a pipeline from KIRKUK(IRAQ) to Israel, to move oil, but the muslims always destroyed that pipeline, now that the USA owns IRAQ, they need to own SYRIA in order to safely move their OIL to the EURO market, all of this is ONLY to force the world to stay on the dollar.

He who controls, OIL, GOLD, DRUGS and PUSSY, decides who controls the reserve-currency, he who controls the reserve currency, gets to print money (power) from nothing.

ALL anti-muslim rhetoric is about the US-DOLLAR, and its hegemony on the world,

ONLY one thing brought down IRAQ,LIBYA, .. IRAN, SYRIA, … is because they threatened to GO OFF THE DOLLAR. They ALL demanded GOLD for their OIL, and if you do that you will bring the WRATH god ( obama ) down upon your children. ( DRONES )

Bin-Laden ( CIA USA trained engineer ) was smart, he knew that if the DOLLAR can be destroyed, then the USA is toast. So muslims are doing all they can to take the dollar down and USA supremacy as well.

USA brought bin-laden to power, and then bin-laden turned on his USA mafia don’s ( the USA is a MAFIA FASCIST government ), for 20 years bin-laden went free-lance, and finally the mob tracked him down and killed him, but it doesn’t matter, he educated 1,000’s of young men world-wide to carry on his dream,.. the De-stabilization of USA hegemony.

It’s coming to USA sooner than you may think, most in the USA don’t have a fucking clue, or care, but the world’s POOR do care if their daughter’s have to sell their pussy to stranger’s to get money for food.

So long as their is injustice anywhere there is injustice everywhere. The USA (MAFIA) has had a license-to-kill, and rape&rob worldwide for 50+ years, and the world is slowly uniting to oppose the USA MAFIA.

Sadly for those remaining the USA, you daughters will have to sell their pussy to cops, soldiers ( those with money ), in order to feed the family’s of those who don’t work for government in the USA ( DHS, FBI, CIA, NSA ), … basically the future of the USA is you either work government your your a sex worker.

In time the parasites of the USA will tire of the new paradigm and they too will shake their shackles, … but by then nobody will care or pity the USA and entire world will say “THEY ALL HAD IT COMING”.