Owl: Israel’s Missile Defense is Failing — Media Avoiding the Story

Who?  Who?

Who? Who?

Some significant information here most mainstream is ignoring — Hamas / Iran now have the edge.

“Paper Dome” and Israeli/US propaganda

“For more on the rockets now used by Hamas and Hezbollah, Robert Siegel speaks with Ted Postol, a professor of science, technology and national security policy at the Massachusetts Institute of Technology. Postol also comments on Israel’s pursuit of an upgraded defense system.

Continue reading

Berto Jongman: CYBER – 10 Ways to Kill the Internet — and Information-Sharing Analysis Centers (ISAC)

Berto Jongman

Berto Jongman

The bad with the good.

The Plan to Kill the Internet Uncovered

10 ways web freedom is being butchered worldwide.

LIST ONLY:

Click on Image to Enlarge

Click on Image to Enlarge

1) The Death of Net Neutrality
2) Intelligence Agencies are Manipulating the Internet With Deliberate Disinformation
3) Governments are Paying Trolls to Sway Public Opinion
4) Mainstream News Websites are Killing Comment Sections
5) The Obama Administration’s “Cognitive Infiltration” of the Internet
6) False Flag Cybersecurity Attacks as a Pretext to Increase Web Regulation
7) Fairness Doctrine for the Internet
8) Homeland Security’s Internet Kill Switch
9) New Taxes and Regulations Set to Stifle Communication & Sales on the Web
10) SOPA, CISPA & The FBI’s Internet Backdoor

Read full article with elaboration and links.

ISACs: Let the Sharing Begin

A while back, I wrote about the value of information sharing, and the role of ISACs (Information Sharing and Analysis Centers) – see “The Bad Guys Are Winning: Information Sharing And Asymmetric Advantage.” I’m a huge fan of this model for sharing information about cyber threats.

A shining example of an effective ISAC is the Financial Services ISAC (FS-ISAC), but one of the lurking questions about their work is whether they are violating any anti-trust regulations in the US. Having worked with them, it was my opinion that they weren’t doing anything that felt like anti-trust, but I’m not a legal expert.  By the way – the ICS-ISAC, which deals with Industrial Control Systems, recently showed its value in an attack on the US Utility Control System infrastructure.

 

Read full article.

Wayne Madsen: NSA Spies on US Allies — With Direct Witting Assistance of AT&T, EDS, Qwest, H-P, Motorola, Cisco, Qualcomm, Oracle, Intel, IBM, Microsoft, and Verizon

Wayne Madsen

Wayne Madsen

Washington Spies on NATO; Other Allies

Wayne MADSEN

Strategic Culture.org | 18.05.2014

EXTRACT

Implants are inserted by NSA into targeted computer systems and network devices through what the NSA calls «supply-chain interdiction». Equipment is intercepted between the manufacturer and the end-user. At a secret facility called a «load station», devices called «beacons» are inserted clandestinely into a device’s hardware. These pre-positioned access points permit later access by NSA into «hard target» networks around the world.

NSA names its strategic partners in its «collect-it-all», codenamed ASPHALT operations, around the world. These are AT&T, EDS, Qwest, H-P, Motorola, Cisco, Qualcomm, Oracle, Intel, IBM, Microsoft, and Verizon. In all, over 80 «major global corporations» support NSA’s worldwide collection efforts. With corporate cooperation, NSA captures Internet data from seven «international choke point» access sites in the continental United States. Their cover names are Breckenridge, Tahoe, and Sun Valley on the U.S. West Coast; Whistler in the South; and Killington, Coppermountain, and Maverick on the East Coast.

Read full article.

Continue reading

American Veterans May Become American Guerrillas — Police Planning & Arming Against US Veterans

Who?  Who?

Who? Who?

American Vets May Become American Guerrillas When the SHTF in the USA

Despite what seems like an endless parade of stories about federal government stupidity and malfeasance repetitively emerging over years and decades, there are a few in government who have brains, who think and connect the dots, at least in connection to the ever enlarging presence of American veterans who know tactics and strategy and how to make and use weapons. Such thinkers have, as part of their responsibility to look after the interests of their elite 1% masters, surely recognized, in light of the developments mentioned in this article, the threat American veterans trained in warfare may represent to their elite master’s interests as the economy implodes due to their master’s machinations:
“In an interview with Fox 59, a Morgan County, Indiana Police Sergeant admits that the increasing militarization of domestic police departments is partly to deal with returning veterans who are now seen as a homegrown terror threat. Sgt. Dan Downing of the Morgan County Sheriff’s Department states, “When I first started we really didn’t have the violence that we see today,” adding, “The weaponry is totally different now that it was in the beginning of my career, plus, you have a lot of people who are coming out of the military that have the ability and knowledge to build IEDs and to defeat law enforcement techniques…Indiana seems to be a major trial balloon for the militarization of law enforcement given that the Indiana National Guard has also just purchased two military UH-72 Lakota helicopters which will also be used by local police and the DHS for “homeland security missions”. Downing’s claim that armored tanks are necessary to deal with violent crime doesn’t jive with actual statistics which suggest that violent crime is in fact on the decrease.

Continue reading