Washington Spies on NATO; Other Allies
Strategic Culture.org | 18.05.2014
Implants are inserted by NSA into targeted computer systems and network devices through what the NSA calls «supply-chain interdiction». Equipment is intercepted between the manufacturer and the end-user. At a secret facility called a «load station», devices called «beacons» are inserted clandestinely into a device’s hardware. These pre-positioned access points permit later access by NSA into «hard target» networks around the world.
NSA names its strategic partners in its «collect-it-all», codenamed ASPHALT operations, around the world. These are AT&T, EDS, Qwest, H-P, Motorola, Cisco, Qualcomm, Oracle, Intel, IBM, Microsoft, and Verizon. In all, over 80 «major global corporations» support NSA’s worldwide collection efforts. With corporate cooperation, NSA captures Internet data from seven «international choke point» access sites in the continental United States. Their cover names are Breckenridge, Tahoe, and Sun Valley on the U.S. West Coast; Whistler in the South; and Killington, Coppermountain, and Maverick on the East Coast.
Read full article.
American Vets May Become American Guerrillas When the SHTF in the USA
Despite what seems like an endless parade of stories about federal government stupidity and malfeasance repetitively emerging over years and decades, there are a few in government who have brains, who think and connect the dots, at least in connection to the ever enlarging presence of American veterans who know tactics and strategy and how to make and use weapons. Such thinkers have, as part of their responsibility to look after the interests of their elite 1% masters, surely recognized, in light of the developments mentioned in this article, the threat American veterans trained in warfare may represent to their elite master’s interests as the economy implodes due to their master’s machinations:
“In an interview with Fox 59, a Morgan County, Indiana Police Sergeant admits that the increasing militarization of domestic police departments is partly to deal with returning veterans who are now seen as a homegrown terror threat. Sgt. Dan Downing of the Morgan County Sheriff’s Department states, “When I first started we really didn’t have the violence that we see today,” adding, “The weaponry is totally different now that it was in the beginning of my career, plus, you have a lot of people who are coming out of the military that have the ability and knowledge to build IEDs and to defeat law enforcement techniques…Indiana seems to be a major trial balloon for the militarization of law enforcement given that the Indiana National Guard has also just purchased two military UH-72 Lakota helicopters
which will also be used by local police and the DHS for “homeland security missions”. Downing’s claim that armored tanks are necessary to deal with violent crime doesn’t jive with actual statistics which suggest that violent crime is in fact on the decrease
School closed, actors used: Robbie Parker, entertainer, exposed
by Jim Fetzer and Victoria Muramoto
“In the end, that’s what this election is about. Do we participate in a politics of cynicism or a politics of hope?”–Barack Obama
As I have previously explained (“Sandy Hook Elementary School: closed in 2008, a stage in 2012″), the school appears to have been non-operational during at least the four years prior to the events of 14 December 2012.
There is lots of confirming evidence, with or without the Wayback Machine’s indirect proof–that if there was no internet activity on specific days, probably there was none during the interval within which they fall–that confirms it had been closed.
In addition to not being compliant with the requirements of the Americans with Disabilities Act (ADA), video footage shows that it was being used as a storage facility, where even The Newtown Bee reported that it was laden with asbestos and other bio-hazards. No student should have been there.
More proof it had been abandoned
Glenn Greenwald: how the NSA tampers with US-made internet routers
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
NSA Bugged Foreign-Bound Networking Equipment