HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

surveillance

Drone Strikes And The All Seeing Eye Of Surveillance [video]

Press For Truth
February 6, 2013

The American government has declared themselves judge jury and executioner when ordering targeted assassinations with bombings from predator drones. At the same time new technologies are being developed to increase the capabilities of the Orwellian surveillance grid.

CIA operating drone base in Saudi Arabia, US media reveal:
http://www.bbc.co.uk/news/world-middl…

Blimps to bolster Washington’s air shield in test:
http://news.yahoo.com/blimps-bolster-…

ARGUS – long-range high def surveillance sensor:
http://www.youtube.com/watch?v=0p4BQ1…

Get updates like this everyday and support independent media by joining Press For Truth TV: http://pressfortruth.tv/register/
We rely on you the viewer to help us continue to do this work. With your help I can continue to make videos and documentary films for youtube in an effort to raise awareness all over the world. Please support independent media by joining Press For Truth TV!

As a Press For Truth TV subscriber you’ll have full access to the site’s features and content including Daily Video Blogs on current news from the PFT perspective and High Quality Downloads of all Press For Truth Films, Music and Special Reports! Subscribe to Press For Truth TV:
http://pressfortruth.tv/register/

For more information visit:
http://pressfortruth.tv/

You can also support Press For Truth and help us continue to do this work by donating or becoming a sponsor at pressfortruth.ca
http://www.pressfortruth.ca/donatebec…

http://www.facebook.com/PressForTruth
http://www.youtube.com/weavingspider
https://twitter.com/PressForTruth
http://twitter.com/#!/DanDicksPFT

http://pressfortruth.ca/


Obama Declares Global Cyberwar

by Stephen Lendman
Global Research
February 6, 2013

Throughout his tenure, Obama governed lawlessly for the monied interests that own him. He’s waged no-holds-barred war on humanity.

Strategy includes homeland tyranny, fear-mongering, saber rattling, hot wars, proxy ones, drone ones, domestic political ones, geopolitical ones, financial ones, anti-populist ones, sanctions, subversion, sabotage, targeted assassinations, mass murder, cyberwar, and more.

In May 2009, Obama prioritized cybersecurity. He called cyber-threats “one of the most serious economic and national security challenges we face as a nation.”

“America’s economic prosperity in the 21st century will depend on cybersecurity.”

He ordered a top-to-bottom review. A Cyberspace Policy Review report followed. He waged cyberwar on Iran. He did so cooperatively with Israel.

In spring 2010, Iranian intelligence discovered Stuxnet malware contamination. The computer virus infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.

Israel was blamed. Washington was involved. Had the facility gone online infected, Iran’s entire electrical power grid could have been shut down.

A more destructive virus called Flame malware is known. Internet security experts say it’s 20 times more harmful than Stuxnet. Iran’s military-industrial complex is targeted. So is its nuclear program. Maximum disruption is planned.

Obama supports draconian cybersecurity bills. Passage threatens constitutional freedoms.

Targeted assassinations eliminate America’s enemies. Lawless domestic spying is policy. So is warrantless wiretapping. Americans are as vulnerable as others.

Obama’s waging war on humanity. He’s doing it multiple ways. Last October, he signed an executive order. It expanded military authority. It authorized cyberattacks. It redefined defense. Doing so lawlessly legitimizes aggression.

In November, Presidential Policy Directive 20 followed. It’s secret. It set guidelines for confronting cyberspace threats.

Last fall, Defense Secretary Leon Panetta warned of a “cyber Pearl Harbor.” It could “cause physical destruction and loss of life,” he said. It could “paralyze and shock the nation and create a new profound sense of vulnerability.”

US officials never lack for hyperbole. Fear-mongering is longstanding policy. So are Big Lies, false flags, and other pretexts for wars, other military actions, and disruptive ones.

Cyberwar capability adds to America’s arsenal. Preemption adds another dirty tactic.

In early February, US media reports headlined stepped-up cyberwar. Preemption is prioritized. Nation states, organizations, and individuals are fair game.

US Cyber Command (USCYBERCOM) has full operational control. It’s a cyber hit squad. It’s part of the US Strategic Command.

It’s based at Fort Meade, MD. General Keith Alexander serves as National Security Agency (NSA) director and US Cyber Command head.

The New York Times cited a secret legal review. It affords Obama sweeping preemptive cyberattack powers.

It permits him “to order a preemptive strike if the United States detects (allegedly) credible evidence of a major digital attack looming from abroad.”

His word alone is policy. Corroborating evidence isn’t needed. Efforts to protect classified and proprietary information are increasing.

The Washington Post said wireless and technology giants are battling over a plan to create super Wi-Fi networks.

The Wall Street Journal said Google, Microsoft and Amazon are competing to control cloud computing business.

The Christian Science Monitor said preemptive cyberwar entered America’s arsenal. It “nugded up along side other” approved tactics and techniques.

New policies govern how intelligence agencies work. They’ve been unrestrained before. They’ll have greater powers now.

The New York Times said they’ll be able to “carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war.”

Rules of engagement are classified. Effectively there are none. Cyber-warriors are freewheeling. They’re unrestrained.

They’ll operate anywhere globally. China is a target of choice. It’s America’s main economic and geopolitical competitor.

An unnamed US official said new cyberwar strategy is “far more aggressive than anything” used or recommended before. The gloves are off. Anything goes.

Major disruptions can occur without firing a shot. Military and/or civilian power grids can be crippled. So can financial systems and communications networks.

Another unnamed US official said cyberweapons are so powerful that “they should be unleashed only by” presidential order. Exceptions would be tactical strikes.

Examples include disabling command and control as well as ground radar ahead of conventional strikes. At the same time, most cyberoperations are presidential prerogatives.

Expect Obama to take full advantage. Extrajudicial operations are prioritized. Rule of law principles are spurned. Operational procedures have been in development for over two years.

They’re headlined now. They coming out when cyberattacks more often target US companies and critical infrastructure. An unnamed US power station was crippled for weeks.

The New York Times, Washington Post, and Wall Street Journal reported cyberattacks. Obama prioritizes preemption. Doing so has no legal standing. Self-defense alone is justified. Acting on suspicions without evidence is aggression.

New rules serve Washington. Lawyers get marching orders. They’re well paid to subvert accepted legal standards. Doing so doesn’t change them.

What constitutes “reasonable and proportionate force” resides in the eye of the aggressor. New guidelines exclude the Pentagon from defending US companies or individuals without presidential authority.

Doing so is Homeland Security’s prerogative. The FBI has investigatory authority. Cybersecurity legislation remains stalled in Congress. Expect stepped up efforts for passage.

Doing so will more greatly comprise freedom. Full-blown tyranny approaches. It’s a hair’s breadth away. Whistleblowers are targeted. Dissent is endangered.

There’s no place to hide. Big Brother’s expanding exponentially. Cyber-preemption adds greater police state power.

On February 3, a Washington Post editorial headlined “Cyberwar, out of the shadows,” saying:

US Cyber Command is expanding exponentially. Doing so “is indicative of how conflict is moving toward center stage for the military, a domain similar to land, sea, air and outer space.”

It’s heading America toward unchallenged dominance.

In May 2000, the Pentagon’s Joint Vision 2020 called for “full spectrum dominance” over all land, surface and sub-surface sea, air, space, electromagnetic spectrum and information systems with enough overwhelming power to fight and win global wars against any adversary.

Doing so includes nuclear weapons use preemptively. Non-nuclear countries and adversaries are fair game.

Cyber Command includes:

(1) “Combat mission forces” cooperatively with military units.

(2) “Protection forces” to defend Pentagon networks.

(3) “National mission forces” to head off threats to critical infrastructure. They’ll operate outside America. They’ll function anywhere if authorized. They’ll strike US adversaries preemptively.

Targeting cuts both ways. Incoming attacks can precede or follow US ones. Secrecy is prioritized but compromised. Spies have clever ways of doing it.

Rules of engagement aren’t clear. Public information is limited. Sunlight is the best disinfectant. Policy need generous doses.

“If conflict in cyberspace is underway,” said the Post, “then it is important to sustain support for the resources and decisions to fight it, and that will require more candor.”

Expect little forthcoming from the most secretive administration in US history. Obama’s first term prioritized homeland repression and lawless aggression. Imagine what he has in mind for term two.

Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net. 

His new book is titled “Banker Occupation: Waging Financial War on Humanity.”

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour

http://www.dailycensored.com/obama-declares-global-cyberwar/

Articles by: Stephen Lendman

Related content:

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible for any inaccurate or incorrect statement in this article. The Center of Research on Globalization grants permission to cross-post original Global Research articles on community internet sites as long as the text & title are not modified. The source and the author’s copyright must be displayed. For publication of Global Research articles in print or other forms including commercial internet sites, contact: publications@globalresearch.ca

www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.

For media inquiries: publications@globalresearch.ca


New Glasses Block Facial Recognition Cameras from Identifying You [video]

Mark Dice
January 22, 2013

New privacy products are being developed to fight back against Big Brother, and they involve glasses that thwart facial recognition scanners.

http://www.Facebook.com/MarkDice
http://www.Twitter.com/MarkDice


U.S.-Canada Harmonizing Border Security and Immigration Measures

by Dana Gabriel
Be Your Own Leader

February 4, 2013

The U.S. and Canada have made significant progress in advancing the Beyond the Border deal and continue to implement various perimeter security initiatives. Without much fanfare, they have signed an immigration agreement that would allow them to share biographic and at a later date, biometric information. As part of a North American security perimeter, both countries are further harmonizing border security and immigration measures. Canada is further taking on U.S. security priorities and this could include a bigger role in the war on terrorism.

It’s been over a year since Prime Minister Stephen Harper and President Barack Obama announced the Beyond the Border and the Regulatory Cooperation Council action plans. On December 14, 2012, the U.S. and Canada issued the Beyond the Border implementation report that highlights the objectives that were achieved over the past year and the work that has yet to be done. It explained that moving forward, “Key future initiatives include harmonizing our trusted trader programs, making significant infrastructure investments at our key land border crossings, fully implementing an entry/exit program at the land border, expanding preclearance operations to the land, rail, and marine domains.” The report also acknowledged challenges facing the Next-Generation pilot project which would permit teams of cross-designated officers to operate on both sides of the border. It was originally scheduled to begin last summer. While steady progress has been made, a lot more work is needed to meet the goals of the Beyond the Border action plan. Over the next several years, other aspects of the deal will be phased-in incrementally with specific deliverables due this year, in 2014 and also in 2015.

Another important facet of the economic and security perimeter agreement is the U.S.-Canada Regulatory Cooperation Council (RCC). A progress report to the leaders outlines accomplishments made in aligning regulations in the areas of agriculture and food, transportation, the environment, health and personal care products, workplace chemicals, as well as nanotechnology. This includes cooperation on pilot projects, scientific and technical collaborations and harmonized testing procedures. RCC working groups have developed detailed work plans for the various initiatives with objectives that will be implemented over the next couple of years. In Canada, some fear that deepening regulatory integration with the U.S. could weaken and erode any independent regulatory capacity. This could lead to a race to the bottom with respect to regulatory standards.

In December of last year, the U.S. and Canada signed the Immigration Information Sharing Treaty which is tied to the Beyond the Border deal. Citizenship, Immigration and Multiculturalism Minister Jason Kenney stated that the, “agreement builds on our countries’ mutual efforts to protect our common borders and the surrounding perimeter, through improved screening of immigrants and visitors.” He went on to say, “Enhanced information sharing of foreign nationals will protect the safety and security of Canadians by helping us prevent terrorists, violent criminals, and others, who pose a risk, from entering Canada or the United States.” Under the treaty, Canada and the U.S. will share biographic information from third country nationals who apply for a visa, a travel permit or claim asylum. In 2014, it will also include the sharing of biometric information. There are privacy concerns on how far-reaching the data collected will be shared. This threatens the sovereignty of Canada with regards to retaining control over information at its own borders.

On December 28, 2012, President Obama signed into law, the Countering Iran in the Western Hemisphere Act which is designed to curb Iran’s presence and activity in the region. The bill calls on the Department of Homeland Security to work with Canada and Mexico, “to address resources, technology, and infrastructure to create a secure United States border and strengthen the ability of the United States and its allies to prevent operatives from Iran, the IRGC, its Qods Force, Hezbollah, or any other terrorist organization from entering the United States.” Julie Carmichael, spokeswoman for Public Safety Minister Vic Toews discussed Canada’s efforts to counter any perceived hostility from Iran in the Americas. She is quoted in the Globe and Mail as saying, “We continually assess threats while co-operating with international partners, including the U.S., to address threats to our common security.” Carmichael added, “The Beyond the Border Action Plan as announced by Prime Minister Harper and President Obama provides a framework to identify threats before they reach North America.” Under the perimeter security deal, Canada is further aligning itself with U.S. foreign policy interests and could be expected to play a greater role in the global war on terror.

Through the Beyond the Border agreement, the U.S. and Canada are deepening economic and security integration which is laying the foundation for a North American security perimeter. Both countries are also engaged in the Trans-Pacific Partnership negotiations with Mexico and other member nations. This is part of efforts to create a free trade area of the Asia-Pacific and could be used to update and expand NAFTA. Another key priority for U.S.-Canada relations is North America’s energy future. President Obama is expected to make a final decision on the Keystone XL pipeline sometime this year. Meanwhile, there is growing environmental opposition to the proposed project which would carry oil from western Canada to the Texas gulf coast.

Related articles by Dana Gabriel:
Merging U.S.-Canada Arctic Foreign Policy
U.S.-Canada Integrated Cybersecurity Agenda
Shaping the Future of North American Integration
Taking the U.S.-Canada Partnership to the Next Level

Dana Gabriel is an activist and independent researcher. He writes about trade, globalization, sovereignty, security, as well as other issues. Contact: beyourownleader@hotmail.com Visit his blog at Be Your Own Leader


Google Glasses Beam Sound Into Your Skull without Headphones [video]

Mark Dice
January 26, 2013

Google patented a technology for their Google Glasses that beam sounds into your skull without using headphones. Google Glasses are expected to be released by the end of this year or in 2014.

http://www.Facebook.com/MarkDice
http://www.Twitter.com/MarkDice


The Internet Wired Directly Into Your Brain: Neural Interfaces [video]

Mark Dice
January 1, 2013

The plan is to have the internet wired directly into your brain and offer humans the ability to be trans-humanist cybernetic Gods.

http://www.Facebook.com/MarkDice
http://www.Twitter.com/MarkDice

Check out The Illuminati: Facts & Fiction in paperback on Amazon.com, or e-book on Kindle, iBooks, Nook, or Google Play. http://www.amazon.com/Illuminati-Facts-Fiction-Mark-Dice/dp/0967346657/ref=sr…


Jailed for Tweet: Activist given 2 yrs for ‘criticizing’ Kuwait ruler [video]

Russia Today
January 8, 2013

A Kuwaiti court has sentenced a youth activist for allegedly defaming the country’s ruling emir on Twitter. The opposition tweeter is the second person to fall foul of a recent government crackdown on social networking sites in Kuwait. READ MORE: http://on.rt.com/6siif3

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Google+ http://plus.google.com/+RT