HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

internet

VIDEO — Kristov Atlas interview, pt. 2 – “Anonymous Bitcoin, Cryptography, and Online Safety” – #204 – Gnostic Media

Gnostic Media
Jul 2, 2014

GM_204

[click here for part 1]

This episode is part 2 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It’s being released on Wednesday, July 2, 2014, and was recorded yesterday on Tuesday, July 1, 2014.

Kristov Atlas is a network security and privacy researcher who studies crypto-currencies. He is the author of Anonymous Bitcoin: How to Keep Your Ƀ All to Yourself, a practical guide to maximizing financial privacy with Bitcoin. Kristov is also a correspondent for the World Crypto Network, appearing regularly on the the weekly roundtable show “The Bitcoin Group”, and host of “Dark News”, a show about un-censorship technologies.


References to this episode
:

Anonymous Bitcoin
book:
http://anonymousbitcoinbook.com

Dark News Show:
https://twitter.com/darknewsshow

Tor Project:
https://www.torproject.org

I2P Network:
https://geti2p.net/en/

Tails Linux
https://tails.boum.org

Send Bitcoin donations for this episode to:
12EQTDMzU5mxtEd8ZfyrHrxABZi3jtaCCo

Please make other forms of donations here:
http://www.gnosticmedia.com/donate/

Donations. This episode is brought to you by:

Joseph
Tresor
Barry
David
Joseph
Salman

This episode is video only.

 


Thought Crime: Mozilla CEO Forced to Resign by LGBT Lobby Over ‘Opinion’ on Gay Marriage

[Apr 4, 2014]
21st Century Wire
says…

Our forefathers warned us to beware of mob rule.

Mozilla announced yesterday that its co-founder Brendan Eich (photo, left) is stepping down as CEO following LGBT lobby protests over his support for California’s Proposition 8 ballot measure that outlawed same-sex, or ‘gay’ marriages in that state (the measure was later deemed unconstitutional following a federal court appeal).

Most mainstream media outlets are attributing his resignation to a boycott announcement by popular online dating site, OkCupid.com, who urged its users not to access their dating site through Mozilla’s Firefox browser, but to use Microsoft’s Internet Explorer or Google’s Chrome instead. But there’s a bit more to the story than this…

The internal storm began to brew when two gay software developers decided to launch a boycott of Firefox in protest against Eich’s new CEO appointment.

This appears to have snowballed into a full-blown feud within Mozilla over Eich’s personal views – which appear to have run contrary to those of Mozilla Chairwoman Mitchell Baker, who then fired what looks to be the deadly PR round on March 29, when she first blogged that “Mozilla supports equality for all, explicitly including LGBT equality and marriage equality.”

Prior to resigning, CEO Eich clearly stated his position to the Guardian on Wednesday this week, “There’s a difference here between the company, the foundation, as an employer and an entity, versus the project and community at large, which is not under any constraints to agree on LGBT equality or any other thing that is not central to the mission or the Mozilla manifesto.”

Baker responded on Thursday stating, “We have employees with a wide diversity of views. Our culture of openness extends to encouraging staff and community to share their beliefs and opinions in public.”

The only problem here is that Ms. Baker doesn’t seem to want to include Brendan Eich in her culture of ‘sharing beliefs and opinions’.

Baker then goes on the explain why Mozilla Corp forced Eich out, and how it is ultimately accountable to its ‘communitarians‘. She explains, “This is meant to distinguish Mozilla from most organizations and hold us to a higher standard. But this time we failed to listen, to engage, and to be guided by our community.”

She then added, “Mozilla prides itself on being held to a different standard and, this past week, we didn’t live up to it”. “We know why people are hurt and angry, and they are right: it’s because we haven’t stayed true to ourselves.”

“We didn’t act like you’d expect Mozilla to act. We didn’t move fast enough to engage with people once the controversy started. We’re sorry. We must do better.”
At little over dramatic maybe, but it’s indicative of a US online tech industry seemingly dominated by a liberal herd. The polarity seems subtle at first glance, but the rifts are there: driving a Toyota Prius is considered virtuous, while Tweeting a conservative quip can trigger a firestorm.

Clearly, Eich and Baker’s differences could not be resolved, making for a very toxic working environment. What’s irrefutable here is that Baker chose to undermine her executive colleague in a very public manner, as Baker used her position to push her feud with Eich into the public domain, enabling her to then leverage additional support from the LGBT lobby as a result.

In a corporate setting, this precedent certainly opens the door to abuse. This scenario could be used by any employee of any company who feels they have unaddressed grievances – not just ideological ones, but personal ones – against a senior colleague, and then draw in a third party, like an LGBT lobby, in order to settle a personal score and assist in removing someone from an organisation. This creates a false “consensus”, followed by a tidal wave of online “campaigns” (see image, left) and petitions – where an innocent person can quickly be convicted in a Kangaroos Court of minority public opinion, underpinned by the highly spurious, if not dubious justification of “protecting the “ethos of the company”.

Eich is also one of the creators of the computer language known as Javascript, and has been widely recognised as one of the single most important contributors to the modern free internet.

What exactly Eich’s personal views on Prop 8 have to do with the ‘ethos’ of Mozilla is not clear. Mozilla’s Firefox browser was created by the Mozilla Foundation in 2003, a non-profit organization who supports the open source project run by Mozilla Corp. The mission of the non-profit is “putting individuals in control online.” The CEO’s personal opinions on hot social issues do not come into play at all with the functionality of Firefox, nor should they.

Ruling in Divided America

America has never been more divided along radical political lines as it is today. In many ways, a divided society suits the establishment in its will to rule with no emerging opposition to it. Radical activist groups play a key role in maintaining this vacuum of social solidarity. The age of social media means that, with a snap of the finger, special interest mobs can swarm corporations and individuals. Mobs rule by fear. It’s time to coin a new term: social racketeering.

It’s worth pointing out the obvious problem here – that in 2008, the Proposition 8 Gay Marriage Ban actually passed in 2008 in California with the majority of voters backing the measure, and in a state with a population of 35 million.

So are the millions of Californians – like Brendan Eich, who voted for, or supported the gay marriage ban also “guilty” of this same thought crime, or crime of opinion? Should each voter, and person who wrote out a cheque to campaign for Proposition 8 be identified and perhaps hunted down, and forced to resign from their jobs? If all men and women are created equal, then why not exact the mob’s punishment on everyone classified as guilty by the LGBT lobby? Wouldn’t that be more fair?

The LGBT lobby’s answer to that question would of course be something along the lines of: “We are not targeting everyone who supported Prop 8, only the high profile people (in order to make an example out of them).” This kind of reply is a nicely spun version of, “We hope by publicly toppling Eich, this will serve to intimidate others from opposing the lobby’s will in future.”

This kind of ‘razor blade’ politiking has the following objectives: ruin the man, his career and his future – because he opposed your own social views. In this toxic social environment, ‘activism’ (as some still like to refer to it) has been weaponised.

In a country which purports to champion its citizens’ rights of freedom of speech, expression and more importantly – freedom of opinion, this disturbing trend of minority activist lobbies bullying individuals into submission because of their personal views (clearly the case with Brendan Eich) is simply a mob prosecution of ‘thought crime’, which any radical pragmatist, given the chance, would easily upgrade to ‘hate crime’. Is this Social racketeering, or cultural Marxism? Take your pick. Both are a step backwards, and are highly undesirable conditions in a truly egalitarian and free society.

The Slippery Slope of Tyranny

Uncomfortable to some as it might be, in the United States of America, it is not illegal, nor should it viewed as ‘undesirable’, for an individual to voice one’s opposition – for or against – any state or federal law. The dangers of enabling such a mob tyranny to single out individuals who are not guilty of any real crime are obvious – by crushing support or dissent for any one law, the mob is greasing a slippery slope towards the elimination of not only freedom of speech and beliefs, but dissent for any unconstitutional law. In the long run, this might empower the state over the individual. This might be a hard concept for some to grapple with who only see this issue a small victory nudging forward, but not to anyone with any foresight. Viewed in isolation, gang tackling a person out of his job today may not seem like much, but think about what the next step will look like – a digressive ‘Lord of the Flies’ society where the mobs determine who is innocent and who is guilty – and whether or not any actual crime is committed does not even factor in. Some will argue that we are already there.

Most certainly, gay rights, along with other minority rights of race minorities, disabled minorities, homeless persons, and religious minorities – should be defended. However, there exists a fine line between defending one’s rights and attacking one’s perceived political opponents. The latter is wrong, especially when conducted at the hands of an aggressive, politicized mob.

The fundamental concept which the LGBT ‘collective’ (lobby) do not understand, or are unable to grasp, is basic game theory, where an offensive strategy has consequences. Although it may seem politically vogue today, by exerting radical ‘communitarianism‘ influence through the deployment of fear, intimidation and harassment – any radical minority may in fact be sowing the seeds of their own demise, and society’s too, in the long run. History shows us that such counter-revolutionary movements, especially ultra-conservative ones – are swift and brutal. The only protection against this, is by guarding the inherent rights which we all share, even if that means defending the rights of those whom you may ideologically disagree with.

Targeting individuals and depriving them of their fundamental right to work, expression of a personal opinion, or even disagreement with the lobby, is merely aiding the acceleration of the erosion of universal rights for all citizens, including LGBT ones. Once those rights are gone, they are gone for everyone, and no one will have universal protection under the law, or a ‘Bill of Rights’.

After the LGBT lobby has finished its social cull of its alleged ideological opponents, then a new mob – whether it’s the establishment, or another radical conservative, or religious mob – will set its sights on the LGBT community.

In a free and fair America, LGBT activists should defend Brendan Eich’s right to have an opinion. That would be real tolerance. Anything else is cheap knockoff – phony freedom.

READ MORE LGBT NEWS AT: 21st Century Wire LGBT Files

-


600 million Apple devices contain secret backdoors, researcher claims — video included

Friends of Syria
Jul 26, 2014

000_gyi0060073312.si

A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

Reuters / David Gray

Reuters / David Gray

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”

Source


PODCAST — Kristov Atlas interview, pt. 1 – “Anonymous Bitcoin, Cryptography, and Online Safety” – #203

Gnostic Media
June 25, 2014

GM_203
This episode is part 1 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It’s being released on Wednesday, June 25, 2014, and was recorded yesterday on Tuesday, June 24, 2014.

Kristov Atlas is a network security and privacy researcher who studies crypto-currencies. He is the author of Anonymous Bitcoin: How to Keep Your Ƀ All to Yourself, a practical guide to maximizing financial privacy with Bitcoin. Kristov is also a correspondent for the World Crypto Network, appearing regularly on the the weekly roundtable show “The Bitcoin Group”, and host of “Dark News”, a show about un-censorship technologies.

References to this episode
:

Anonymous Bitcoin
book:
http://anonymousbitcoinbook.com

Dark News Show:
https://twitter.com/darknewsshow

Tor Project:
https://www.torproject.org

I2P Network:
https://geti2p.net/en/

Dark Wallet:
https://darkwallet.unsystem.net

Dark Wallet in the News:
https://www.indiegogo.com/projects/bitcoin-dark-wallet
http://www.wired.com/2014/04/dark-wallet/
http://onpoint.wbur.org/2014/05/06/bitcoin-dark-money-dark-wallet

Panopticlick:
https://panopticlick.eff.org

Blockchain.info:
https://blockchain.info

Taint Analysis:
https://blockchain.info/taint/1dice6GV5Rz2iaifPvX7RMjfhaNPC8SXH

Bitcoin Fog:
http://www.bitcoinfog.com

Tails Linux (for next week’s episode)
https://tails.boum.org

Send Bitcoin donations for this episode to:
12EQTDMzU5mxtEd8ZfyrHrxABZi3jtaCCo

Please make other forms of donations here:
http://www.gnosticmedia.com/donate/

Donations. This episode is brought to you by:

Paul
zdravko
Bill
James
Brandon
Barry
Mark
Jeremy
Tino
Steve

BTC:
1K8NfoB… x2

Video version:

Audio only:

Podcast: Play in new window | Download (Duration: 1:21:10 — 74.6MB) | Embed


Pre-army Israeli teens tweet: Death to all Arabs

Scott.net


PODCAST — Joshua Blakeney Interviews Arthur Topham: “Arrested for Opposing Zionist Genocides”

The Real Deal
Dec 2013

For more on this episode of The Real Deal read this Veterans Today article by Joshua Blakeney: http://www.veteranstoday.com/2013/12/…


MUST WATCH DOCUMENTARY — “Trance-Formation” — Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering

PEREXUSREX
Nov 24, 2012

[HD-version]

OUTSTANDING VIDEO . . .
Genetic Modification of all Life!!! New Documentary Film
Enslavement of the human race
This is part of the Endgame but not all . . .MUST WATCH
The State of our World

‘Trans Formation’ By Max Igan

Geoengineering

Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering -Film

Chemtrails

The latest film by Max Igan, one of the greatest humans to ever walk this planet. This man deserves his rightful place in the history books, right next to the greatest minds of all time. http://thecrowhouse.com/home.html

Max Igan’s YouTube Channel:
http://www.youtube.com/user/aodscarec…

TO SUPPORT:
http://thecrowhouse.com/home.html [Max Igan's Website]

Category:
Education

Electromagnitism and Chemtrails

Transhumanism is – http://www.wordwebonline.com/search.p…

Tags:
Trans Humanism genetic modification of all life nano technology. HAARP nanotechnology nano transformation trans formation humanism is. Nanoparticles nanotech what is nanotechnology. Future technology transformation


Facebook manipulated users’ moods in secret experiment

There are on average 1,500 possible stories that could show up on users’ news feeds. Source: Getty Images

by Andrew Griffin
The Independent
Jun 29, 2014

Facebook manipulated the emotions of hundreds of thousands of its users, and found that they would pass on happy or sad emotions, it has said. The experiment, for which researchers did not gain specific consent, has provoked criticism from users with privacy and ethical concerns.

For one week in 2012, Facebook skewed nearly 700,000 users’ news feeds to either be happier or sadder than normal. The experiment found that after the experiment was over users tended to post positive or negative comments according to the skew that was given to their news feed.

Read more: Facebook responds to users’ outrage

The research has provoked distress because of the manipulation involved.

Studies of real world networks show that what the researchers call ‘emotional contagion’ can be transferred through networks. But researchers say that the study is the first evidence that the effect can happen without direct interaction or nonverbal clues.

Anyone who used the English version of Facebook automatically qualified for the experiment, the results of which were published earlier this month.  Researchers analysed the words used in posts to automatically decide whether they were likely to be positive or negative, and shifted them up or down according to which group users fell into.

It found that emotions spread across the network, and that friends tended to respond more to negative posts. Users who were exposed to more emotional posts of either type tended to withdraw from posting themselves.

[...CONTINUE READING THIS ARTICLE]

[related: Facebook Tinkers With Users’ Emotions in News Feed Experiment, Stirring Outcry]

[hat tip: Neil Sanders and The Truther Girls]


PODCAST/VIDEO– Interview 856 – The Beard World Order roundtable on “Meta-Conspiracy”

The Corbett Report
Apr 9, 2014

via TracesOfReality.com:

Welcome to The Beard World Order: On today’s episode Tom, James, and Guillermo take on “meta-conspiracy” and the “conspiracy to inject conspiracy.”

Do the infiltration and subversion tactics of the NSA and private intelligence contractors present a unique challenge for activists and the alternative media in the 21st century? Are “sockpuppets” and other disinfo exploits any different than the decades old COINTELPRO? What is cognitive infiltration, and how has it already succeeded in invading our minds? Have privacy norms (#aftersex) been irreversibly altered? Is there any hope left for humanity? And why would the Department of Defense be involved in the making of Ernest Goes to Camp?

Your answers to these questions, beards, beards, yeah, and more.

Enjoy.

Contact Guillermo, James, and Tom with questions, comments, and suggestions for future topics to be discussed on the show.

For a High Quality audio download of this episode, click here (right-click, and save-as).

Show Notes:

Beard World Order: Episode 01 – Uncorking Conspiracy

Wired: Why You Should Embrace Surveillance, Not Fight It

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

Americans say they’re shopping less online. Blame the NSA.

Many say NSA news changed their behavior

How Did Snowden Change Search Behavior? New Research Shows, More Than You Might Think

Beyond Snowden: Don’t Coddle the National Security State; Smash It

Border Patrol Throw Political Bone to Civil Libertarians; Will We Fetch?

TOR Radio: Drug Culture, Bodycams, and Romanticizing the Republic

The Corbett Report: Solutions: Sousveillance (video)

ClandesTime episode 025 – Fun with FOIA

Complete list of DOD-assisted movies

The House’s NSA bill could allow more spying than ever. You call this reform?

The #aftersex selfie is a betrayal of intimacy

Bearded bands and facial hair appreciation clubs: the hairy-faced trend is back

U.S. government sues Philadelphia schools over beard policy

Beard transplants (video)


NSA Whistleblower: Snowden Never Had Access to the “Juiciest” Intelligence Documents

Global Research
June 9, 2014

Washington’s Blog 7 June 2014

nsa

NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping.

Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:

He says the NSA started spying on President Obama when he was a candidate for Senate:

Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this.

Washington’s Blog called Tice to find out more about what he saw when he was at NSA.

RUSSELL TICE: We now know that NSA was wiretapping [Senator] Frank Church and another Senator.  [That has been confirmed.]

And that got out by accident. All the information the NSA had back then – and probably many other senators and important people too, back in the 70s – they shredded and they destroyed all of that evidence.  As much as they could find, they destroyed it all. By accident, something popped up 40 years later.

And, in fact, they were asked 40 years ago whether NSA had bugged Congress. And, of course, they lied. They lied through their teeth.

NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance

WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.]

Does Snowden even have documents which contain the information which you’ve seen?

RUSSELL TICE:  The answer is no.

WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?

RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?

Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing?

They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.]

Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” – Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way.

I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.

Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS.

And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance].

ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks.

These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]

It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency.

When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up.

There was no such thing beforehand. It was made up … to try to placate the American people.

The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of.

So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.

Snowden’s Failure To Understand the Most Important Documents

RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG.

The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at.

But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there.

I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.

Cheney Was Running the Show

WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive].

Is that right … and if so, how do you know that?

RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington.

WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means?

RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.

NSA Is Spying On CONTENT as Well as Metadata

WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata?

RUSSELL TICE: Of course it is. Of course. [Background. But see this.]

NSA Spying On Journalists, Congress, Admirals, Lawyers …

RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such.

I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state.

Or an Admiral and his wife, and his kids and his staffers …

The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else.

These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.

Snowden and Greenwald’s Whistleblowing Was Done In the Right Way

RUSSELL TICE: If Mr. Snowden would have had access to VRK, ECI, SAP, STO (and a few others that I will not mention here), and he released them en masse to the press, I would volunteer to shoot him as a traitor myself.

But this is not what he did.

He gave up JWICS info that he insisted be vetted for sources and methods, and true damage to national security. Mr. Greenwald and company should be congratulated on the restraint that they have shown with the JWICS documentation that they have in hand via Mr. Snowden.

Postscript: When Tice started blowing the whistle on NSA mass surveillance in the early 2000s, the NSA all of a sudden decided that Tice was “crazy”. As Tice told us:

For many years, I was the only NSA whistleblower in public.

And what they did is call me in – 9 months after my routine psychological evaluation – which I passed with flying colors, like every other one I’ve had in my entire career, passed with flying colors.

They called me in for an “emergency” psychological evaluation, and they declared me nuts.

I am a fairly good judge of character, and I found Tice to be humorous, self-deprecating in a healthy and light-hearted way, and consistent on the facts. Tice talked about how he was a pretty darn good football player in junior college, but no star athlete. He talked about how one reporter tried to make him out to be James Bond with leading man looks, and he thought that was ridiculous. We shared some normal “guy talk” about women. Tice has a little anger at the way the NSA tried to whitewash the mass surveillance that he uncovered (wouldn’t you be?), but he wasn’t enraged or over-the-top. Tice is also a patriotic American, not a subversive. Specifically, we spent a long time talking about the importance of the Constitution and the rule of law. In other words, Tice seems “oriented to reality”, completely sane, normal, ethical and bright to me.

And the following facts are more important than my personal impression:

Given the way that the NSA has been repeatedly caught in lies about its surveillance programs – and the way that it has attacked whisteblowers – I believe Tice over the NSA.


PODCAST/VIDEO — Anarchast Ep 126 Karl Gray: A Bitcoin Hedge Fund!

Anarchast
May 22, 2014

Jeff Interviews Karl Gray of Bitcoin Capital, topics include: the decentralization f power structures as evinced by the Bitcoin blockchain, early adoption, Bitcoin, freedom, StartJoin and the founding of the Bitcoin Capital Hedge Fund.

To view this edition of Anarchast, click on the YouTube video below or to listen, click here for the .mp3. To be notified of future Anarchast episodes, enter your email in the box on the right, subscribe to our RSS feed, subscribe to our YouTube channel or subscribe to our iTunes Podcasts.

You can view the video on YouTube at the following URL: http://youtu.be/KGMykiAOgKY or click on the video below:

Anarchast Ep 126 Karl Gray: A Bitcoin Hedge Fund!


Follow

Get every new post delivered to your Inbox.

Join 839 other followers