Berto Jongman: The Intelligence Services Are The Real Conspiracy Theorists – The Case For The Iraq War Proves It

Berto Jongman

Berto Jongman

The Intelligence Services Are The Real Conspiracy Theorists

The Case For The Iraq War Proves It

David Shaylor

NeonNettle, 20 June 2014

David Shaylor

David Shaylor

David Shayler is a former intelligence officer with MI5, the UK’s domestic security service.  In 1997, he blew the whistle on MI6 funding Al Qaeda to assassinate Colonel Qadhafi of Libya.  He will be writing on intelligence and security issues, and Common Law as the solution to the world‘s problems.

Earlier this month, the prestigious US magazine Life became the latest mainstream publication to attack ‘conspiracy theorists’.  It cited the usual list of concerns – Agenda 21; chemtrails; weather manipulation; Obama’s birth certificate – dismissing conspiracy theorists as gun-totin’ right wing Christian extremists.

Hearteningly, the comments in response to the article proved that actually the thinking man in the street has seen through these kind of glib assertions on the part of journalists well-rewarded by the mainstream for their ignorance and inhumanity.

Read the rest of this entry »

Comments Off
Jun 23

Mongoose: Snowden on US IC Security – Non-Existent – NSA Has No Idea What I Took and Zero Control Over Its Files

Mongoose

Mongoose

NBC News Exclusive with Brian Williams: Inside the Mind of Edward Snowden

In a wide-ranging and revealing interview, Brian Williams talks with former NSA contractor Edward Snowden about the global impact and debate sparked by his revelations.

EXTRACT:

“I will say the 1.7 million documents figure that the intelligence community has been bandying—about—the director of N.S.A. himself, Keith Alexander said just a week ago in the Australian Financial Times, or Australian Financial Review I believe—that they have no idea what documents were taken at all. Their auditing was so poor, so negligent, that any private contractor, not even — an employee of the government, could walk into the N.S.A. building, take whatever they wanted, and walk out with it and they would never know. Now, I think that’s a problem. And I think that’s something that needs to be resolved, and people need to be held to account for, has it happened before? Could it happen again?”

Read full article with many video clips.

See Also:

The Government-Corporate Complex: Surveillance for the Money

Comments Off
May 30

Berto Jongman: NSA Tampering With US-Made Routers

Berto Jongman

Berto Jongman

Glenn Greenwald: how the NSA tampers with US-made internet routers

The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide

See Also:

NSA Bugged Foreign-Bound Networking Equipment

Comments Off
May 13

Berto Jongman: Post-Snowden NSA-Proof Phone?

Berto Jongman

Berto Jongman

In the post-Snowden world is it time to switch to NSA-proof phone?

Millions of us share our most personal feelings and most potentially damaging data through our smartphones. But isn’t it time to lock them down after last June’s revelations that the NSA collects data from phone calls, texts and emails of people all over the world? The developers of Blackphone, a new privacy-focused smartphone, say ‘yes.’

Toby Weir-Jones, the general manager of Blackphone, says the NSA’s digital surveillance has created a new demand for privacy, Newsweek reports. However, he says, “the wider market was not equipped to look for a solution.” Apple and Android phones, says Weir-Jones, are caught up in a battle over larger screen sizes, higher resolution and faster operating systems, while Blackphone is offering privacy.

Theoretically, experts say, the new device could provide considerable security for users trying to protect themselves from corporate spying and the countries with lesser surveillance programs than the US. Blackphone, which goes on presale February 24,can do texting, video, calling, searching, browsing, file storage and sharing — all shielded from the prying eyes of governments and hackers.

Read full article.

Comments Off
Feb 23