VIDEO — What Iranians want from next president
PressTV
June 16, 2013
What Iranians want from next president
The new president in Iran will take office in a few weeks and naturally will make some changes both in domestic and international policies. Experts believe the new administration should be seen by other countries as a chance for resetting ties with Iran. Ordinary people say, under any circumstances Iran must keep its principle and at the same time efforts must be made to remove or ease the unilateral sanctions of the west. Meanwhile, other experts believe improving relations with the international community could help Iran’s economy see better days.
Ehsane Keyvani, Press TV, Tehran
Follow our Facebook on: https://www.facebook.com/presstv
Follow our Twitter on: http://twitter.com/presstv
Follow our Tumblr on: http://presstvchannel.tumblr.com
Turkey Protests: Government Targets Doctors Who Treated Injured Demonstrators
Doctors who treated protesters wounded in clashes with riot police in Turkey are to be investigated by the government in a move likely to inflame tensions further.
By Timur Moon
IBTimes
June 17, 2013
The Health Ministry had demanded a list of the names of all doctors who treated demonstrators from the Turkish Medical Association (TBB), the association said on Friday 14 June.
The TBB estimates that 7,500 people have been injured in the unrest, the overwhelming number suffering from teargas exposure.
The association said it was ordered to “immediately” give up the names of medical workers and their patients, but had vowed not to co-operate.
“We were notified that an investigation has been launched into the improvised clinics that treated the protesters,” said Osman Öztürk of the TBB.
The authorities also signalled they would take steps to close down media outlets that broadcast images of demonstrations last week.
Turkey’s state television regulator shut down one channel that offered continuous live coverage of the protests. Hayat TV went off air “for broadcasting from abroad without a licence”, the Radio and Television Supreme Council said.
On Tuesday, the regulator fined Hayat TV and three stations that ran extensive coverage of the protests for “encouraging people to violence”.
On Friday night, the BBC suspended its partnership with NTV after the private channel refused to air the Turkish version of the World Agenda programme.
However, the government was forced to back down on plans to redevelop Gezi park in Istanbul, which sparked the protests last month. Police were criticised for the heavy-handedness of their response to the initial protests.
Recep Tayyip Erdogan, the prime minister, agreed to abide by a court decision on his plan to uproot Gezi Park. He said he would hold a referendum if the court rules in favour of it.
“If judiciary in the end allows the project we’ll still apply the public vote,” he said. “It won’t be a military barracks but a city museum – 80% of trees will be within the city museum, the rest will be planted around the complex.”
Taksim Solidarity, one group representing the protesters, hailed the move as “positive”.
The government also turned its sights on Twitter, demanding the company set up a local division as “they receive advertising revenue without paying a penny in tax”.
Police have arrested a number of people who are accused of stirring up protests by posting messages on the site, including information on the position of police lines.
Related Articles You Might Like:
- Turkey’s Taksim Square Drenched in Blood as 900 Protesters Are Arrested (Extremely Graphic …
- Turkey: Protesters Drive Bulldozer to Prime Minister Erdogan’s Office (Video)
- Photos: Turkey Media Shows Cooking, Pet Shows as 1+ Million Protest
- Activists in Turkey Present Their List of Demands
- Turkish Police Arrest Dozens of Social Media Users For Posting About Protests
- Istanbul’s Skies ‘Filled with Teargas’ as Thousands of Police Storm Square
- Timeline of Events in Turkey: Police Escalate Attacks, Including on Healthcare Workers and Doctors
- Police to Consider Protesters in Istanbul’s Taksim Square “Terrorists”
Canada Being Assimilated Into a U.S. Dominated North American Security Perimeter
by Dana Gabriel
BE YOUR OWN LEADER
June 17, 2013
Canada’s prime minister recently addressed the CFR, a globalist think tank who have been a driving force behind the push towards deeper North American integration. The U.S. and Canada are now further advancing this agenda through the Beyond the Border agreement. Both countries are increasing bilateral border transportation and infrastructure coordination. This includes a common approach to border management, security and control. They are also integrating an information sharing system that would be used to track everyone crossing the U.S.-Canada border and entering or leaving the continent. Without much fanfare and seemingly little resistance, Canada is being assimilated into a U.S. dominated North American security perimeter.
In May, the Conservative government highlighted the benefits of the U.S.-Canada Beyond the Border action plan which was announced back in 2011. The deal, “focuses on addressing security threats at the earliest point possible and facilitating the lawful movement of people, goods, and services into Canada and the United States, and creates a long-term partnership to improve the management of our shared border.” The goal is to further increase, “security, economic competitiveness and prosperity through numerous measures, including reducing border wait times and improving infrastructure at key crossings to speed up legitimate trade and travel.” The Beyond the Border Executive Steering Committee recently met to discuss the objectives that have already been achieved and the work that still needs to be done. Another important facet of the economic and security perimeter agreement is the Regulatory Cooperation Council action plan. A stakeholder dialogue session is planned for June 20, which will review its implementation progress and will seek further input regarding the next stage of U.S.-Canada regulatory integration.
Last month, the Canada Border Services Agency (CBSA) and the Department of Homeland Security (DHS) released a joint report on the findings of Phase I of the Entry/Exit Information System. The program included collecting and exchanging biographic information at four selected land border ports of entry. In a news release, U.S. Customs and Border Protection (CBP) Acting Commissioner Thomas Winkowski stated that, “The results of Phase I demonstrate the capacity of the United States and Canada to increase information sharing capabilities.” He added, “This kind of cooperation epitomizes the Beyond the Border Action Plan.” The next phase of the entry/exit initiative is set to begin at the end of this month. It will involve exchanging the data collected from third-country nationals and permanent residents of Canada and the U. S. at all common ports of entry. Both countries are further merging databases and are expanding surveillance and intelligence gathering operations. In 2014, they will also start sharing biometric information at the border. This will further advance the creation of a North America security perimeter where all travellers will be tracked and traced in real time.
As part of the commitment made under the Beyond the Border deal, both countries have announced the Border Infrastructure Investment Plan which was, “developed to establish a mutual understanding of recent, ongoing and potential border infrastructure investments. It outlines the approach that Canada and the United States will take to coordinate plans for physical infrastructure upgrades.” In June 2012, Canada reached an agreement with the State of Michigan to build a second bridge between Detroit and Windsor, Ontario. This was followed by a presidential permit issued in April of this year that officially paved the way for construction of the project. A U.S. State Department press release explained that, “Consistent with the bilateral Beyond the Border Initiative, this permit contributes to ensuring that our border infrastructure supports increased competitiveness, job creation, and broad-based prosperity in the United States and Canada.” It went on to say that the new bridge, “will help to meet future capacity requirements in a critical travel corridor, promote cross-border trade and commerce, and advance our vital bilateral relationship with Canada.”
In March, DHS Secretary Janet Napolitano and Canada’s Minister of Public Safety Vic Toews signed a memorandum of understanding which established a truck cargo pre-inspection pilot project. The joint undertaking is another component of the Beyond the Border agreement and would shift inspections and clearances away from the actual border crossing. The first phase, “will test the concept of conducting U.S. CBP primary cargo inspection in Canada, and will be implemented at the Pacific Highway crossing between Surrey, British Columbia and Blaine, Washington.” The second phase, “will further test how pre-inspection could enhance border efficiency and reduce wait times to facilitate legitimate trade and travel, and will be implemented at the Peace Bridge crossing between Fort Erie, Ontario and Buffalo, New York.” The perimeter security deal is laying the foundation for a future U.S.-Canada binational organization that would jointly manage and control the border.
The CBSA is also testing additional technology at the Morses Line, Quebec and Piney, Manitoba ports of entry. Under the remote traveller pilot project, people entering either location after regular hours of service, “will be processed by a border services officer located at a remote processing centre through a two-way audio and one-way video kiosk. Cameras will be installed to provide the officer with the ability to see the traveller and the vehicle.” The program which could later be expanded to other areas , “is part of the Small and Remote Ports of Entry Initiative, one of the deliverables under the Beyond the Border Action Plan.” NAUNEWZ pointed out that, “Although a lot of this technology is already installed and being utilized in limited ways at most of the main Canada-U.S. border crossing points, these smaller border crossings are ideal testing grounds for their ‘no borders’/NAU agenda.”
On May 16, Canadian Prime Minister Stephen Harper participated in question and answer session before the Council on Foreign Relations (CFR). The conversation centered around economic growth, foreign investment and the role of the G20 with regards to global governance. Other issues focused on Canada-U.S. relations. Harper lobbied for approval of the controversial Keystone XL pipeline which would carry oil from western Canada to the Texas gulf coast. He dismissed environmental issues associated with the project and argued that it would be a step towards North American energy independence. The Obama administration is expected to make a final decision on the pipeline sometime this year. Harper also acknowledged the Beyond the Border and the Regulatory Cooperation Council action plans. He blamed sovereignty concerns and the continued negativity surrounding NAFTA as the main obstacles to even deeper continental integration. Prime Minister Harper used his audition in front of the CFR as an opportunity to demonstrate to the U.S. political and corporate elite that he is committed to defending the interests of big business and further pushing plans for a North American Union (NAU).
The Beyond the Border action plan is the most significant step forward in U.S.-Canada cooperation since NAFTA. It provides the framework for future North American integration. When fully implemented, the agreement can be expanded and updated. So far, the agenda has quietly slipped under the radar. By incrementally incorporating various pilot projects and excluding Mexico from the process, it has managed to avoid the controversy of past initiatives. The perimeter security deal is being sold as vital to improving the flow of trade and travel across the border. In order to appease U.S. fears, Canada has made numerous concessions with no guarantees that it will lessen border restrictions. As part of a North American security perimeter, Canada will always be at the mercy of any new U.S. security measures, regardless of the dangers they may pose to privacy and civil liberties.
Related articles by Dana Gabriel:
U.S.-Canada Harmonizing Border Security and Immigration Measures
Taking the U.S.-Canada Partnership to the Next Level
Merging U.S.-Canada Arctic Foreign Policy
The Return of ACTA: U.S. Dictating Canada’s Intellectual Property Laws
Dana Gabriel is an activist and independent researcher. He writes about trade, globalization, sovereignty, security, as well as other issues. Contact: beyourownleader@hotmail.com Visit his blog at Be Your Own Leader
West committed atrocities not Syria government: Chossudovsky
CounterPsyOps
June 10, 2013
Press TV has conducted an interview with Michel Chossudovsky, Center for Research on Globalization, Montreal, on the back of UN concern for the Syrian war spilling over into other countries.
The following is an approximate transcript of the interview.
Press TV: The UN is warning of an explosion in the Middle East if the war on Syria continues. The question is what has the UN itself done to prevent the war from exacerbating?
Chossudovsky: First of all, that statement was made by the head of the United Nations High Commission for Refugees. And the statement says that if the fighting doesn’t stop… the fighting is going to stop because the terrorists have been defeated
And essentially if Western powers put a moratorium on their support to these al-Qaeda affiliated rebels, the war is over – at least, the ground war is over. Recent developments suggest and confirm that the country is under the control of the Syrian government. The rebel forces have been defeated in al-Qusayr and they’ve also been defeated in other parts of the country.
The question of humanitarian aid has to be, from my standpoint, addressed because, who are the protagonists for humanitarian aid, so-called humanitarian aid? Precisely the countries, which supported these rebel terrorists.
And I think what we should be raising at this stage is that it is well established that this war was waged by the United States, NATO and Israel with the support of the [Persian] Gulf states Qatar and Saudi Arabia in particular and that under international law what is now required is war reparations.
So I would say let us put the humanitarian dimension aside and focus on the billions and billions of dollars of war reparations, which are due to the Syrian government as a result of the legal support of these terrorist formations in Syria, which constitute essentially the ground forces – the foot soldiers of the Western military alliance.
Press TV: The recent victory in Qusayr and the recent revelation that Israeli-made weapons were seized from Syrian insurgents – What impact will this have on the dynamics of the conflict?
Chossudovsky: We’ve known from day one that Israel has supported al-Qaeda. And we also know that Israel has channeled weapons and logistic support to the rebels in the areas surrounding the occupied areas of the Golan Heights and in fact Israel even established a hospital facility for the al-Qaeda rebels and was bussing them back and forth, taking the wounded to the hospital and then sending them back to the war theatre.
Israel was involved in acts of aggression against a sovereign state together with NATO, particularly Turkey, Britain, France, the United States. French and British Special Forces, SAS forces, MI6 and CIA agents were involved – We know it because it’s documented. Who is training the rebels in chemical weapons? The Western military alliance.
Minister Laurent Fabius of France comes out – and it’s the typical sort of weapons of mass destruction saga accusing the government of using chemical weapons against civilians when in fact CNN confirms that Western forces are training the rebels in the use of chemical weapons; when the Turkish police arrests al-Qaeda rebels – it just happened a week or so ago.
So we know that all this is fabrications whereby the Western military alliance is accusing the government of committing atrocities, which they themselves have committed.
What we must now tackle at an intentional level is war reparations. The war is over unless of course the West decides to continue this war e.g. with a no-fly zone. That would be an extremely dangerous option at this stage because Syria has an advanced air defense system.
The S-300 is in place; it has been building up over the past 18 months; there are other elements of air defense; and it would be very unwise for the Western military alliance to impose a no-fly zone, which would immediately be subject to some kind of response.
So that is the background. This war has reached a point of transition if there is no intervention on the part of the Western military alliance, the war is over.
SC / HGH
VIDEO — Ciara’s Illuminati Baphomet Blouse
Mar Dice
June 15, 2013
Singer Ciara is attempting to make a comeback by wearing an ugly Baphomet Illuminati blouse since it’s the “in” thing in the music industry today.
Subscribe to http://www.YouTube.com/MarkDice
http://www.Facebook.com/MarkDice
http://www.Twitter.com/MarkDice
Check out The Illuminati: Facts & Fiction in paperback on Amazon.com, or e-book on Kindle, iBooks, Nook, or Google Play. http://www.amazon.com/Illuminati-Fact…
Mark Dice is a media analyst, political activist, and author who, in an entertaining and educational way, gets people to question our celebrity obsessed culture, and the role the mainstream media and elite secret societies play in shaping our lives. Check out Mark’s books in paperback on Amazon.com or e-book on Kindle, iBooks, Nook, or Google Play.
Mark frequently stirs up controversy from his commentaries, protests, and boycotts, and has repeatedly been featured in major media outlets around the world.
Several of Mark’s YouTube videos have gone viral, earning him a mention on ABC’s The View, Fox News’ O’Reilly Factor, CNN, Drudge Report, Infowars, TMZ, and other mainstream media outlets. Mark has also been featured in (or attacked in) the New York Post’s Page Six, Rolling Stone Magazine, USA Today, The New York Daily News, and in major papers in Pakistan and Iran.
Mark Dice appears in several documentary films including Invisible Empire, The 9/11 Chronicles, and has been featured on the History Channel’s Decoded, Conspiracy Theory with Jesse Ventura, the Sundance Channel’s Love/Lust: Secret Societies and more.
He enjoys enlightening zombies, as he calls them, (ignorant people) about the mass media’s effect on our culture, pointing out Big Brother’s prying eyes, and exposing elite secret societies along with scumbag politicians and their corrupt political agendas. You can support Mark’s work by sending a PayPal donation to Donate@MarkDice.com or by using the Donate link on MarkDice.com.
The term “fighting the New World Order” is used by Mark to describe some of his activities, and refers to his and others’ resistance and opposition (The Resistance) to the overall system of political corruption, illegal wars, elite secret societies, mainstream media, Big Brother and privacy issues; as well as various economic and social issues.
Dice and his supporters sometimes refer to being “awake” or “enlightened” and see their knowledge of these topics as part of their own personal Resistance to the corrupt New World Order. This Resistance involves self-improvement, self-sufficiency, personal responsibility and spiritual growth.
Mark Dice is the author of several books on current events, secret societies and conspiracies, including his newest book, Big Brother: The Orwellian Nightmare Come True which is available on Amazon.com, Kindle, Nook, Google Play and iBooks. While much of Mark’s work confirms the existence and continued operation of the Illuminati today, he is also dedicated to debunking conspiracy theories and hoaxes and separating the facts from the fiction; hence the “Facts & Fiction” subtitle for several of his books. He has a bachelor’s degree in communication from California State University.
If you have an iPad or Android tablet, then you can get his books in the iBooks or Google Play store for only $6.99 or $7.99. Or you can get paperback copies from Amazon.com too if you prefer a physical book. They are not available in stores. A lot of work and research went into them and they’ll save you countless hours of web surfing or YouTube watching in your search for pieces of the puzzle. Your support also funds more of Mark’s videos and other operations. Equipment, software, travel, and the props all cost money, so by purchasing his paperback books and e-books, you are helping The Resistance continue and your help is greatly appreciated. Be sure to subscribe to Mark’s YouTube channel, and look him up on Facebook, and Twitter. http://www.YouTube.com/MarkDice http://www.Facebook.com/MarkDice http://www.Twitter.com/MarkDice http://www.MarkDice.com
7 Powerful Ways to Maintain Your Privacy and Integrity Online
by Eliot Estep
Activist Post
June 13, 2013
The recent NSA leaks from whistleblower Ed Snowden have publicly confirmed that digital privacy does not exist. The federal government and intelligence agencies have direct server access to the world’s most popular sites and services including Facebook, Google, Microsoft, Apple, and more. This means that all of your data when using these services including Skype, YouTube, etc has been compromised and can be used against you whenever strategically necessary.
Always remember, you are being recorded and monitored regardless of whether you have done anything wrong or not. This includes your emails, Internet activity, searches, banking activity, passwords, etc. Basically everything to build a complete profile about who you are, how you think, how you live, etc. This is very powerful data gathering and the goal of the intelligence agencies is nothing less than Total Information Awareness to be used to control and manage populations.
For these reasons, I have compiled some helpful tips to help you maintain your privacy and integrity when using the Internet. These are by no means comprehensive, but they can be quite useful and give you some semblance of peace when browsing.
If you use Google, Bing, Yahoo, etc. then everything you search is logged to your IP address and is used to build a comprehensive profile about all your online activity. This means that the government literally has the ability to know everything you’ve been interested in, how you type (thus, how you think), and much more. Protect your searches!
2. Consider using an Anonymizer such as Tor to protect your identity. Tor prevents anyone from learning your location, browsing habits, and is an extremely effective tool against network surveillance and traffic analysis. Tor is essentially a network of virtual tunnels run by volunteers that allows your real IP address to remain hidden and undetectable when browsing the Internet. It is used by whistleblowers, hackers, and all those who value anonymity. You can also use it to access sites that your ISP has blocked or banned. Keep in mind, if you use Tor to access personally-identifying sites like Facebook then you pretty much lose your ability to remain anonymous. Learn more about this powerful software and please use it responsibly! To get started quickly, please download the Tor Browser Bundle. Using this software wisely and effectively will likely require changing your browsing habits, so be aware of this.
4. Use a firewall and a secure wireless connection. Protecting your inbound and outbound network traffic is essential. There are many free software options available for this. I cannot guarantee the integrity of these programs, but I personally recommend Little Snitch for Mac users. It appears that Outpost may be a good alternative for Windows. The key is to be able to see what services/sites are trying to send/receive data over your connection. The more stringent your firewall rules are, the better. Keep your computer clean by using some kind of anti-spam/spyware software and minimize your use of highly sketchy sites.
5. Delete your cookies regularly and log out of Facebook when you are not actively using it. Almost every time you visit a site, you download a cookie from that site, which is often used to track and collect data about you, the sites you visit, etc. Therefore, deleting cookies and temporary Internet files from your browser frequently is necessary. I recommend CCleaner as an effective way to do this. Most people leave a Facebook tab open and continue browsing, not realizing that every page that has a “Like” button actively logs and tracks their online activity. Facebook collects all your browsing data and then sells it to third parties, including passing it onto intelligence agencies. Therefore, when you are not actively using Facebook, be sure to log out! Why should they know everything you’re up to online?
6. Cover up or disconnect your webcam when you are not using it. Did you know that your webcam can be secretly activated without you being aware of it? Hackers and intelligence agencies have the ability to do this, so effective countermeasures must be taken here. This can be done WITHOUT the indicator light coming on, so you won’t even know that you are being watched or recorded. This is why I recommend taping over or covering up your webcam when you’re not using it. Why take the risk? Do you really want the government to have the ability to spy on you while you are in your bedroom? The same thing can be done on cellphone cameras/microphones, so be aware of that too. The only way your phone cannot be used to track/record you is if the battery is taken out, which is another reason why many new smartphones come with non-removable batteries these days.
7. Learn to use secure email services like HushMail or encrypted email. Communicating using email is vital and part of our everyday lives. If we use services like Gmail, Hotmail, or Yahoo, those services are not secure and are compromised. Therefore, switching over to a secure service such as Hushmail can be valuable. Or learn how to use Pretty Good Privacy (PGP), which is a way to send encrypted email and files that only a trusted third party can open and view. Essentially, PGP uses public-private key cryptography, where you will give out your public key to trusted recipients. Messages can only be decrypted by using your special private key file (that you keep safe) and the sender’s public key. You can even encrypt files so that only a specific person can open them. Learning to use PGP requires some technical knowledge but can be very useful for those who want to communicate securely and is well worth learning, in my opinion. Please see this tutorial or this video to get started. There are some excellent YouTube videos that can really help out with this.
***************************
Be smart about how you communicate online. If you take no precautionary measures, then you should assume that your communications are being recorded and monitored at all times. Do not discuss illegal or secret activities on Facebook or through Skype or Gmail. Ultimately, we should be greatly decreasing our use of these compromised services altogether! Be aware of what you type and consider their ramifications if ever made public. We must exercise great discretion and discernment when it comes to our online activities now. The methods listed above are by no means comprehensive and are just a small way to boost your privacy. If you have other privacy tips, please mention them here in the comments for all to see and benefit from. In the end, it is all up to the user to do their part in maintaining their online integrity. Safe browsing my friends!
Eliot Estep: We are all divine beings of love at our core! I AM a genuine truth-seeker dedicated to living a life of joy, peace, and abundance. I value integrity, freedom, and creative self-expression above all. It is a privilege to be here during this time of great change. Let us prepare. Main areas of research: conspiracies, global affairs, extraterrestrials, spiritual advancement + Sun: ♏ + Moon: ♎ + Ascendant: ♋ + This article first appeared at Collective Evolution.
EVENT — March Against Drones – MAD
via March Against Drones – MAD
Are you MAD? If so, march with us at the White House on 9/11 in Washington, DC. If you can’t make it, get MAD wherever you are! To join the event, go to: http://tinyurl.com/TheMarchAgainstDrones



