Saturday, April 28, 2012

Google-Twitter Cave to International Censorship Pressure

Google-Twitter. Cave to Lnational Censorship Pressure

bibliotecapleyades.net | Feb 3rd 2012


by Eric Blair


Google and Twitter have been under great pressure to censor content on their platforms from several countries.

Twitter has been blamed for stoking revolutionary and protest uprisings around the world, assuredly sparking concerns in all leaders who seek to hold onto power. Meanwhile, Google has already succumbed to censorship demands in China, as well as individual YouTube removal requests from various nations.

Most recently, in America, Chairman of the Homeland Security Committee, Senator Joe Lieberman, sent a letter to Google requesting that they censor violent content on their Blogger platform. Lieberman also made a similar request to Twitter, that they deactivate accounts that tweet anti-West content.

Although Lieberman's requests have yet to be fulfilled, Google and Twitter have both recently announced their willingness to remove content based on censorship laws in individual nations.

Google announced that its Blogger platform will now be accessed at different 'country-specific URLs'.

"For example, if you're in Australia and viewing [blogname].blogspot.com, you might be redirected [blogname].blogspot.com.au," Google wrote on their blog.

Google said the change in the blogspot addresses will provide,

"greater flexibility in complying with valid removal requests pursuant to local law," adding that "by utilizing ccTLDs, content removals can be managed on a per country basis, which will limit their impact to the smallest number of readers.

Content removed due to a specific country’s law will only be removed from the relevant ccTLD."

Google admits this change will negatively affect the search engine results of blogs because of the dilution by multiple domain names hosting duplicate content on them:

"Hosting duplicate content on different domains can affect search results, but we are making every effort to minimize any negative consequences of hosting Blogspot content on multiple domains."

Google claimed that blogs hosted by Blogger with custom domains would not be affected.

Twitter is also accused of being an 'agent of censor' since they announced similar tactics to comply with censorship laws of different nations:

As we continue to grow internationally, we will enter countries that have different ideas about the contours of freedom of expression. Some differ so much from our ideas that we will not be able to exist there.

Others are similar but, for historical or cultural reasons, restrict certain types of content, such as France or Germany, which ban pro-Nazi content.

Twitter's announcement sparked immediate outrage, while Google's has slipped under the radar until now.

Like Google, Twitter said that it will not remove tweets completely; rather they'll be "withheld" from users in a country that demanded the removal with a "valid and applicable legal request."

Withheld tweets will be visible to users in countries outside the area that made the censorship request.

Although it seems to make sense that international Web companies should abide by local laws if they wish to do business there, try telling that to Egyptian activist Mahmoud Salem who tweeted,

"This is very bad news," later adding, "Is it safe to say that (hash)Twitter is selling us out?"

Aden Fine, a staff attorney with the ACLU, told Wired,

"The countries that engage in censorship are precisely the ones in which open and neutral social media platforms are most critical," before adding a plea to Twitter.

“We hope Twitter will think carefully before acceding to any specific requests by those governments to censor content simply because they want to interfere with their citizens’ access to information and ideas.”

A regular staunch defender of Internet freedom across borders, Cindy Cohn, the legal director the Electronic Frontier Foundation, told Wired,

“I think Twitter is telling us some unfortunate truths.”

Cohn said Twitter was at least being transparent. Facebook, for example, also regularly removes content for a variety of reasons to comport with local laws, too.

She added that Twitter’s announcement underscores the need for anti-censoring technologies like Tor, which reroutes IP addresses as a workaround to a country’s censorship tactics.

“Rather than shoot the messenger, we need to put focus on to make sure we have really robust anti-censorship technologies people can use,” Cohn concluded.

Yet, perhaps freedom of expression should not be governed by private companies whose service is to promote free communication.

And perhaps Internet free speech should be an enforceable global human right. As obvious as that may seem for rights activists, that's exactly the opposite direction the global community is heading, led by the United States:


What Is ACTA?
by 1TheRevolutionIsNow
January 18, 2012
from YouTube Website

ACTA - 'The Anti-Counterfeiting Trade Agreement' is a proposed plurilateral agreement for the purpose of establishing international standards

on intellectual property rights enforcement.

ACTA would establish a new international legal framework that would create its "own governing body outside existing international institutions" such as - the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO)

or the United Nations.

See Video:


These announcements are setting the precedent that it's okay to censor the Internet if there are laws that say it's alright.

Consequently, the U.S. Congress has put forward multiple such bills seeking tighter control of the Internet. Once they become law, these Internet juggernauts have proven that they will blindly adhere to the dictatorial censorship commands of any nation's request.

It doesn't seem to matter to them that laws are just words on a paper, but freedom of information and speech is a right and censorship is just plain wrong.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_internet103.htm

Shared from Read It Later

 אל

Friday, April 27, 2012

Google-Twitter Cave to International Censorship Pressure

Google-Twitter Cave to International Censorship Pressure

bibliotecapleyades.net | Feb 3rd 2012


by Eric Blair


Google and Twitter have been under great pressure to censor content on their platforms from several countries.

Twitter has been blamed for stoking revolutionary and protest uprisings around the world, assuredly sparking concerns in all leaders who seek to hold onto power. Meanwhile, Google has already succumbed to censorship demands in China, as well as individual YouTube removal requests from various nations.

Most recently, in America, Chairman of the Homeland Security Committee, Senator Joe Lieberman, sent a letter to Google requesting that they censor violent content on their Blogger platform. Lieberman also made a similar request to Twitter, that they deactivate accounts that tweet anti-West content.

Although Lieberman's requests have yet to be fulfilled, Google and Twitter have both recently announced their willingness to remove content based on censorship laws in individual nations.

Google announced that its Blogger platform will now be accessed at different 'country-specific URLs'.

"For example, if you're in Australia and viewing [blogname].blogspot.com, you might be redirected [blogname].blogspot.com.au," Google wrote on their blog.

Google said the change in the blogspot addresses will provide,

"greater flexibility in complying with valid removal requests pursuant to local law," adding that "by utilizing ccTLDs, content removals can be managed on a per country basis, which will limit their impact to the smallest number of readers.

Content removed due to a specific country’s law will only be removed from the relevant ccTLD."

Google admits this change will negatively affect the search engine results of blogs because of the dilution by multiple domain names hosting duplicate content on them:

"Hosting duplicate content on different domains can affect search results, but we are making every effort to minimize any negative consequences of hosting Blogspot content on multiple domains."

Google claimed that blogs hosted by Blogger with custom domains would not be affected.

Twitter is also accused of being an 'agent of censor' since they announced similar tactics to comply with censorship laws of different nations:

As we continue to grow internationally, we will enter countries that have different ideas about the contours of freedom of expression. Some differ so much from our ideas that we will not be able to exist there.

Others are similar but, for historical or cultural reasons, restrict certain types of content, such as France or Germany, which ban pro-Nazi content.

Twitter's announcement sparked immediate outrage, while Google's has slipped under the radar until now.

Like Google, Twitter said that it will not remove tweets completely; rather they'll be "withheld" from users in a country that demanded the removal with a "valid and applicable legal request."

Withheld tweets will be visible to users in countries outside the area that made the censorship request.

Although it seems to make sense that international Web companies should abide by local laws if they wish to do business there, try telling that to Egyptian activist Mahmoud Salem who tweeted,

"This is very bad news," later adding, "Is it safe to say that (hash)Twitter is selling us out?"

Aden Fine, a staff attorney with the ACLU, told Wired,

"The countries that engage in censorship are precisely the ones in which open and neutral social media platforms are most critical," before adding a plea to Twitter.

“We hope Twitter will think carefully before acceding to any specific requests by those governments to censor content simply because they want to interfere with their citizens’ access to information and ideas.”

A regular staunch defender of Internet freedom across borders, Cindy Cohn, the legal director the Electronic Frontier Foundation, told Wired,

“I think Twitter is telling us some unfortunate truths.”

Cohn said Twitter was at least being transparent. Facebook, for example, also regularly removes content for a variety of reasons to comport with local laws, too.

She added that Twitter’s announcement underscores the need for anti-censoring technologies like Tor, which reroutes IP addresses as a workaround to a country’s censorship tactics.

“Rather than shoot the messenger, we need to put focus on to make sure we have really robust anti-censorship technologies people can use,” Cohn concluded.

Yet, perhaps freedom of expression should not be governed by private companies whose service is to promote free communication.

And perhaps Internet free speech should be an enforceable global human right. As obvious as that may seem for rights activists, that's exactly the opposite direction the global community is heading, led by the United States:


What Is ACTA?
by 1TheRevolutionIsNow
January 18, 2012
from YouTube Website

ACTA - 'The Anti-Counterfeiting Trade Agreement' is a proposed plurilateral agreement for the purpose of establishing international standards

on intellectual property rights enforcement.

ACTA would establish a new international legal framework that would create its "own governing body outside existing international institutions" such as - the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO)

or the United Nations.

See Video:


These announcements are setting the precedent that it's okay to censor the Internet if there are laws that say it's alright.

Consequently, the U.S. Congress has put forward multiple such bills seeking tighter control of the Internet. Once they become law, these Internet juggernauts have proven that they will blindly adhere to the dictatorial censorship commands of any nation's request.

It doesn't seem to matter to them that laws are just words on a paper, but freedom of information and speech is a right and censorship is just plain wrong.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_internet103.htm

Shared from Read It Later

 אל

FBI Wants New App to Wiretap The Internet - 'Scraping' Social Network Postings Including Facebook and Twitter

FBI Wants New App to Wiretap The Internet : 'Scraping' Social Network Postings Including Facebook and Twitter

bibliotecapleyades.net | Jan 26th 2012

by Common Dreams staff

from CommonDreams Website


The FBI's Strategic Information and Operations Center (SOIC) posted a 'Request for Information (RFI)' online last week seeking companies to build a social network monitoring system for the FBI.

The 12-page document (.pdf) spells out what the bureau wants from such a system and invites potential contractors to reply by February 10, 2012.

It says the application should provide information about possible domestic and global threats superimposed onto maps "using mash-up technology".

It says the application should collect "open source" information and have the ability to:

  • Provide an automated search and scrape capability of social networks including Facebook and Twitter.

  • Allow users to create new keyword searches.

  • Display different levels of threats as alerts on maps, possibly using color coding to distinguish priority. Google Maps 3D and Yahoo Maps are listed among the "preferred" mapping options.

  • Plot a wide range of domestic and global terror data.

  • Immediately translate foreign language tweets into English.

It notes that agents need to,

"locate bad actors... and analyze their movements, vulnerabilities, limitations, and possible adverse actions".

It also states that the bureau will use social media to create "pattern-of-life matrices" - presumably logs of targets' daily routines - that will aid law enforcement in planning operations.

New Scientist magazine reports today:

The US Federal Bureau of Investigation has quietly released details of plans to continuously monitor the global output of Facebook, Twitter and other social networks, offering a rare glimpse into an activity that the FBI and other government agencies are reluctant to discuss publicly.

The plans show that the bureau believes it can use information pulled from social media sites to better respond to crises, and maybe even to foresee them. [...]

The use of the term "publicly available" suggests that Facebook and Twitter may be able to exempt themselves from the monitoring by making their posts private. But the desire of the US government to watch everyone may still have an unwelcome impact, warns Jennifer Lynch at the Electronic Frontier Foundation, a San Francisco-based advocacy group.

Lynch says that many people post to social media in the expectation that only their friends and followers are reading, which gives them "the sense of freedom to say what they want without worrying too much about recourse," says Lynch.

"But these tools that mine open source data and presumably store it for a very long time, do away with that kind of privacy. I worry about the effect of that on free speech in the US".

"These tools that mine open source data and presumably store it for a very long time, do away with that kind of privacy. I worry about the effect of that on free speech in the US"

- Jennifer Lynch

Electronic Frontier Foundation

The BBC reports:

The FBI issued the request three weeks after the US Department of Homeland Security released a separate report into the privacy implications of monitoring social media websites.

It justified the principle of using information that users have provided and not opted to make private.

"Information posted to social media websites is publicly accessible and voluntarily generated. Thus the opportunity not to provide information exists prior to the informational post by the user," it says.[...]

The London-based campaign group, Privacy International, said it was worried about the consequences of such activities.

"Social networks are about connecting people with other people - if one person is the target of police monitoring, there will be a dragnet effect in which dozens, even hundreds, of innocent users also come under surveillance," said Gus Hosein, the group's executive director.

"It is not necessarily the case that the more information law enforcement officers have, the safer we will be.

"Police may well find themselves overwhelmed by a flood of personal information, information that is precious to those it concerns but useless for the purposes of crime prevention."

"Social networks are about connecting people with other people - if one person is the target of police monitoring, there will be a dragnet effect in which dozens, even hundreds, of innocent users also come under surveillance"

- Gus Hosein

Privacy International

The Fierce Government website reports on 'refining raw social media into intelligence gold':

The notion that the future can be predicted by trends expressed in collective social media output is one that has gained increased currency in academic writing.

A January analysis (.pdf) published by the Rand Corp. of tweets using the #IranElection hashtag during 2009 and early 2010 found a correlation between appearance of swear words and protests.

The study also found a shift that indicated the protest movement was losing momentum when swearing shifted from curses at the Iranian President Mahmoud Ahmadinejad to curses at an opposition figure.

A March 2011 paper published in the Journal of Computational Science (Twitter Mood Predicts The Stock Market) also posited that movements of the Dow Jones Industrial Average could be predicted to an accuracy of 86.7 percent by changes of national mood reflected in Tweets.

According to The Economist, British hedge fund Derwent Capital Markets has licensed the algorithm to guide the investments of a $41 million fund.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_internet100.htm

Shared from Read It Later

 אל

Feds Order YouTube To Remove Video For Containing "Government Criticism"

Feds Order YouTube To Remove Video For Containing "Government Criticism"

bibliotecapleyades.net | Oct 26th 2011

from PrisonPlanet Website

The number of takedown orders received by Google from authorities based in the United States rose dramatically over the past year, with demands to remove information, including videos containing “government criticism,” increasing by 70 per cent.

“In the US, Google received 757 takedown requests across its sites and services, up 70 per cent from the second half of last year,” reports technology website V3.co.uk.

“US authorities also called for the removal of 113 videos from YouTube, including several documenting alleged police brutality which Google refused to take down.”

The figures are revealed in Google’s newly released transparency report, which also details how the number of “user data requests” by US authorities increased by 29 per cent compared to the last reporting period.

The reason listed for the removal of a You Tube video in one instance is “government criticism”.

The exact identity or content of the video is not divulged. The report states that the removal requests pertaining to “police brutality” were done on the grounds of “defamation” and are included in that separate category, meaning the takedown order on the grounds of “government criticism” was made by the “executive,” i.e. the federal government.

The report does not indicate whether or not You Tube complied with the removal request, but it did comply with 63 per cent of the total requests made.

The number of “Items requested to be removed” by US authorities was almost seven-fold the number requested to be removed by Chinese authorities, a country much maligned for its Internet censorship policies.

As we have previously documented, Google-owned You Tube has complied with thousands of requests worldwide to remove political protest videos that are clearly not in violation of any copyright or national security interests and do not constitute defamation.

One such example was You Tube’s compliance with a request from the British government to censor footage of the British Constitution Group’s Lawful Rebellion protest, during which they attempted to civilly arrest Judge Michael Peake at Birkenhead county court.

When viewers in the UK attempted to watch videos of the protest, they were met with the message,

“This content is not available in your country due to a government removal request.”

Indeed, the latest figures show that takedown requests on behalf of British authorities have also skyrocketed by 71 per cent, including 44 removal orders in the first half of this year which came directly from the UK government, one of which was the Birkenhead protest footage.

In Britain, a total of 135 videos were removed from You Tube on the grounds of “national security” and 43 web search results were also blacklisted by government decree.

These figures illustrate how governments, particularly the United States and Britain, are getting more aggressive in pushing for web censorship as the state increasingly tries to strangle the last bastion of true free speech, the Internet, as authorities simultaneously try to advance draconian cybersecurity measures that would hand them complete control over the world wide web.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_internet88.htm

Shared from Read It Later

 אל

Doomsday For The Internet As We Know It?

Doomsday For The Internet As We Know It?

bibliotecapleyades.net | Feb 6th 2006

by Paul Joseph Watson

from PrisonPlanet Website


Several developments that are coming to the fore indicate a noticeable advance towards a government regulated, taxed and controlled system that spells doomsday for the Internet as we know it.

The first steps in a move to charge for every e mail sent have already been taken. Under the pretext of eliminating spam, Bill Gates and other industry chieftains have proposed Internet users buy credit stamps which denote how many e mails they will be able to send.

This of course is the death knell for political newsletters and mailing lists.

The New York Times reports that,

"America Online and Yahoo, two of the world's largest providers of e-mail accounts, are about to start using a system that gives preferential treatment to messages from companies that pay from 1/4 of a cent to a penny each to have them delivered. The senders must promise to contact only people who have agreed to receive their messages, or risk being blocked entirely."

The end game is a system similar to China, whereby no websites even mildly critical of the government will be authorized.

The Pentagon admitted that they would engage in psychological warfare and cyber attacks on 'enemy' Internet websites in an attempt to shut them down. The fact that the NSA surveillance program spied on 5,000 Americans tells us that the enemy is the alternative media and that it will be targeted for elimination. Court cases are pending after the Bush administration demanded the Google search terms of American citizens.

The first wave will simply attempt to price people out of using the conventional Internet and force people over to Internet 2, a state regulated hub where permission will need to be obtained directly from an FCC or government bureau to set up a website.

The original Internet will then be turned into a mass surveillance database and marketing tool.

The Nation magazine reported last week,

"Verizon, Comcast, Bell South and other communications giants are developing strategies that would track and store information on our every move in cyberspace in a vast data-collection and marketing system, the scope of which could rival the National Security Agency. According to white papers now being circulated in the cable, telephone and telecommunications industries, those with the deepest pockets - corporations, special-interest groups and major advertisers - would get preferred treatment.

Content from these providers would have first priority on our computer and television screens, while information seen as undesirable, such as peer-to-peer communications, could be relegated to a slow lane or simply shut out."

We see a move to demonize the Internet and tar its reputation. AOL is running ads equating Internet users with terrorists. In the next few years we may see a staged Internet shutdown which is blamed on cyber terrorists.

For the aspiring dictator, the Internet is a dangerous tool that has been seized by the enemy. We have come a long way since 1969, when the ARPANET was created solely for US government use. The Internet is freedom's best friend and the bane of control freaks.

Its eradication is one of the short term goals of those that seek to centralize power and subjugate the world under a global surveillance panopticon prison.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_internet06.htm

Shared from Read It Later

 אל

Crypto Wars! - Obama Wants New Law to Wiretap The Internet

Crypto Wars! : Obama Wants New Law to Wiretap The Internet

bibliotecapleyades.net | Oct 3rd 2010


from Antifascist-Calling Website

In a reprise of the crypto wars of the 1990s, the U.S. secret state is mounting an offensive that would force telecommunication companies to redesign their systems and information networks to more easily facilitate internet spying.

Touted as a simple technical "fix" that would "modernize" existing legislation for wiretaps, government security officials will demand that telecommunication firms and internet service providers provide law enforcement with backdoors that would enable them to bypass built-in encryption and security features of electronic communications.

With the Obama administration rivaling, even surpassing antidemocratic moves by the Bush regime to monitor and surveil the private communications of the American people, The New York Times reported last week that,

"federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet."

Following closely on the heels of FBI raids on antiwar and international solidarity activists, the "change" administration now wants Congress to require all providers who enable communications,

"to be technically capable of complying if served with a wiretap order."

Times' reporter Charlie Savage informs us that the administration will demand that software and communication providers build backdoors accessible to law enforcement and intelligence agencies, thus enabling spooks trolling,

"encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct 'peer to peer' messaging like Skype" the means "to intercept and unscramble encrypted messages."

Calling new legislative strictures a "reasonable" and "necessary" tool for law enforcement that will,

"prevent the erosion of their investigative powers," FBI mouthpiece, general counsel Valerie E. Caproni, told the Times, "We're talking about lawfully authorized intercepts."

Really?

Caproni's assertion that the Bureau and spy shops such as the National Security Agency are not interested in "expanding authority" but rather "preserving our ability to execute our existing authority in order to protect the public safety and national security," is a thin tissue of lies lacking credibility.

In fact, the state's "existing authority" to spy upon private communications under the USA Patriot Act and assorted National Security, and Homeland Security Presidential Directives (NSPD/HSPD) in areas as such as,

...have led to the creation of overly broad and highly classified programs regarded as "state secrets" under Obama.

As written many times, most recently in August (August 12, 2010 - "Obama Demands Access to Internet Records, in Secret, and Without Court Review"), since his 2009 inauguration President Obama has done nothing to reverse this trend.

Indeed, he has taken further steps through the Comprehensive National Cybersecurity Initiative (CNCI), a highly-sanitized version of NSPD 54/HSPD 23, to ensure that the "President's Surveillance Program" (PSP) launched by Bush remains a permanent feature of daily life in the United States.

In a widely circulated report last year, the inspectors general from five federal agencies, including,

...noted that following advice from the Office of Legal Counsel under torture-enablers Jay Bybee and John C. Yoo,

"the President authorized the NSA to undertake a number of new, highly classified intelligence activities" that went far beyond warrantless wiretapping in their scope, encompassing additional unspecified "activities" that have never been disclosed to the public.

What were once regarded by Democrats and their ever-shrinking base of acolytes, cheerleaders and toadies as unspeakable crimes when carried out by Republican knuckle-draggers, are now regarded as "forward thinking," even "visionary" policies when floated by the faux "progressive" occupying the Oval Office.

And with "homegrown terrorism" and "cybersecurity" high priorities on the administration's to-do list, White House changelings and their friends from the previous regime are pulling out all the stops.

Last week, speaking at a Washington, D.C. "Ideas Forum," former Director of National Intelligence Mike McConnell, currently a top executive with the spooky Booz Allen Hamilton private security corp, said that cybersecurity is the "wolf at the door" and that a "large-scale" cyberattack,

"could impact the global economy 'an order of magnitude surpassing' the attacks of September 11," The Atlantic reported.

McConnell and former Bushist Homeland Security Adviser, Frances Fragos Townsend, the current chairwoman of the Intelligence and National Security Alliance (INSA), a D.C. lobby shop catering to security and intelligence grifters, urged the Obama administration to transform,

"how it defends against cyberattacks," claiming that the secret state, "lack[s] the organizational ability and authorization to prevent and respond to cybersecurity threats."

Their prescription? Let NSA pit bulls off the leash, of course!

Townsend said that,

"the real capability in this government is in the National Security Agency."

True enough as far as it goes, however Townsend mendaciously asserted that NSA is legally forbidden from domestic spying, not that it prevented her former boss from standing up NSA's internal surveillance apparatus through programs such as STELLAR WIND and PINWALE, the agency's domestic email interception program.

Both Townsend and McConnell claim that the "laws haven't kept up" with the alleged threat posed by a cyberattack and urged the administration to give the NSA even more authority to operate domestically.

No mention was made by liberal interventionist-friendly Atlantic reporter Max Fisher that McConnell's firm has reaped multiyear contracts worth billions for their classified cybersecurity work for the secret state.

Hardly slouches themselves when it comes to electronic eavesdropping, the FBI is seeking to expand their already-formidable capabilities through their "Going Dark" program.

As Antifascist Calling previously reported (May 17, 2009), the Bureau sought - and received - $233.9 billion in FY 2010 for the development of a new advanced electronic surveillance program.

ABC News first disclosed the program last year, and reported that,

"the term 'Going Dark' does not refer to a specific capability, but is a program name for the part of the FBI, Operational Technology Division's (OTD) lawful interception program which is shared with other law enforcement agencies."

According to ABC,

"the term applies to the research and development of new tools, technical support and training initiatives."

The New York Times reported last week that OTD spent $9.75 million last year "helping communications companies" develop "interception capabilities" for the Bureau.


Administration Hypocrisy

The administration's push for more control is all the more ironic considering that the U.S. State Department according to Reuters, said in August it was "disappointed" that,

"the United Arab Emirates planned to cut off key BlackBerry services, noting the Gulf nation was setting a dangerous precedent in limiting freedom of information."

As The Washington Post told us at the time, UAE securocrats claimed that,

"it will block key features on BlackBerry smartphones because the devices operate beyond the government's ability to monitor."

Citing - what else! - "national security concerns," the measure "could" be motivated "in part" by state fears that "the messaging system might be exploited by" - wait! - "terrorists or other criminals who cannot be monitored by local authorities."

That regional beacon of 'democracy,' Saudi Arabia, said it would follow suit.

In response, State Department shill P.J. Crowley said that the United States is,

"committed to promoting the free flow of information. We think it's integral to an innovative economy."

With a straight face, Crowley told a State Department news briefing,

"It's about what we think is an important element of democracy, human rights and freedom of information and the flow of information in the 21st century."

"We think it sets a dangerous precedent," he said. "You should be opening up societies to these new technologies that have the opportunity to empower people rather than looking to see how you can restrict certain technologies."

Pointing out the Obama regime's hypocrisy, Yousef Otaiba, the UAE Ambassador to the United States counteracted and said it was Crowley's comments that were,

"disappointing" and that they "contradict the U.S. government's own approach to telecommunication regulation."

"Importantly," Otaiba said, "the UAE requires the same compliance as the U.S. for the very same reasons: to protect national security and to assist in law enforcement."

The BBC informed us in July that Emirate officials are concerned that the encrypted software and networks used by Research in Motion, BlackBerry's parent company,

"make it difficult for governments to monitor communications."

Although this is precisely the autocratic mindset that rules the roost here in the heimat, corporate media report identical moves by the U.S. government with nary a critical word, failing to point out the disconnect between administration rhetoric and ubiquitous "facts on the ground."

Among the proposals being considered by the administration, the Times reports that officials "are coalescing" around several "likely requirements" that include the following:

"Communications services that encrypt messages must have a way to unscramble them."

U.S. law will apply to overseas businesses, not just domestic firms.

The Times avers that,

"Foreign-based providers that do business inside the United States must install a domestic office capable of performing intercepts."

And finally, a kiss of death for privacy rights,

"Developers of software that enables peer-to-peer communication must redesign their service to allow interception."

Firms that fail to comply,

"would face fines or some other penalty."

The Times neglected to tell us however, what penalties await software developers or individual users who have the temerity to design - or avail themselves - of systems that bypass backdoors mandated by the secret state.


An Electronic Police State

Far from being an "enhanced security feature," the administration's proposal for peer-to-peer snooping would be a boon to hackers, thieves and other miscreants who routinely breech and exploit whatever "firewall" grifting firms and their political allies devise to "keep us safe."

In fact, as computer security and privacy researchers Christopher Soghoian and Sid Stamm revealed in their paper, Certified Lies - Detecting and Defeating Government Interception Attacks Against SSL, secret state agencies have already compromised the Secure Socket Layer certification process (SSL, the tiny lock that appears during supposedly "secure," encrypted online transactions), and do so routinely.

In March, Soghoian and Stamm introduced the public to,

"a new attack, the compelled certificate creation attack, in which government agencies compel a certificate authority to issue false SSL certificates that are then used by intelligence agencies to covertly intercept and hijack individuals' secure Web-based communications."

The intrepid researchers provided "alarming evidence" suggesting "this attack is in active use," and that a niche security firm, Packet Forensics, is already marketing "extremely small, covert surveillance devices for networks" to government agencies.

It now appears that the Obama administration will soon be seeking legislative authority from Congress that legalizes surreptitious snooping by security officials and a coterie of outsourced contractors who grow fat subverting our privacy rights.

Commenting on the administration's proposal in a recent post, Soghoian points out that when wiretap reporting requirements were amended in 2000, similar arguments were made that strong encryption would "harm national security."

Congress inserted language that compelled secret state agencies like the FBI to,

"include statistics on the number of intercept orders in which encryption was encountered and whether such encryption prevented law enforcement from obtaining the plain text of communications intercepted pursuant to such order."

It didn't.

However in a replay of the crypto wars of the 1990s, FBI general counsel Caproni brushed off breech of privacy concerns and told the Times that service providers,

"can promise strong encryption. They just need to figure out how they can provide us plain text."

Senator Patrick Leahy (D-VT) argued a decade ago that,

"compiling the statistics would be a 'far more reliable basis than anecdotal evidence on which to assess law enforcement needs and make sensible policy in this area'."

"Since then," Soghoian writes, "the Administrative Office of the US Courts has compiled an annual wiretap report, which reveals that encryption is simply not frequently encountered during wiretaps, and when it is, it never stops the government from collecting the evidence they need."

In light of statistical evidence provided by the government itself, demands that communications' providers cough-up their customers' private data to unaccountable government snoops is quintessentially a political decision, and not, as mendaciously claimed, a "law enforcement" let alone a "national security" problem.

In fact, while police and intelligence agencies,

"look through thousands of individuals' email communications, search engine requests or private, online photo albums each year," they don't "obtain wiretap orders to intercept that data in real time. Instead," Soghoian tells us "[they] simply wait a few minutes, and then obtain what they want after the fact as a stored communication under 18 USC 2703," the Stored Communications Act.

"Unfortunately," Soghoian avers, "while we have a pretty good idea about how many wiretaps law enforcement agencies obtain each year, we have no idea how many times they go to email, search engine and cloud computing providers to compel them to disclose their customers' communications and other private data."

Therefore,

"we find ourselves in the same situation as 12 years ago, where law enforcement officials were making anecdotal claims for which no evidence existed to prove, or disprove them."

As security expert Bruce Schneier pointed out, while the,

"proposal may seem extreme... it's not unique." Averring that sinister snooping laws were "formerly reserved for totalitarian countries," Schneier writes "this wholesale surveillance of citizens has moved into the democratic world as well."

Citing moves by Sweden, Canada and Britain to hand,

"their police new powers of internet surveillance" compelling "communications system providers to redesign products and services they sell," securocrats, as is their wont, are lusting after the capacity to transform all aspects of daily life into "actionable intelligence."

On top of this, as Schneier and others such as Cryptohippie and Quintessenz have revealed, so-called democratic states, not just usual suspects like China (whose "Golden Shield" was designed by Western firms, after all),

"are passing data retention laws, forcing companies to retain customer data in case they might need to be investigated later."

In their 2010 report, The Electronic Police State, Cryptohippie informed us that data retention,

"is criminal evidence, ready for use in a trial, and that "it is gathered universally ('preventively') and only later organized for use in prosecutions."

How does such a system work? What are the essential characteristics that differentiate an Electronic Police State from previous forms of oppressive governance?

Cryptohippie avers:

"In an Electronic Police State, every surveillance camera recording, every email sent, every Internet site surfed, every post made, every check written, every credit card swipe, every cell phone ping... are all criminal evidence, and all are held in searchable databases. The individual can be prosecuted whenever the government wishes."

As the World Socialist Web Site points out, the proposal by the Obama regime,

"goes far beyond anything envisioned by the Bush administration."

While the White House claims that new legislation is needed to combat "crime" and "terrorism," socialist critic Patrick Martin writes that,

"the Obama administration has defined 'terrorism' so widely that the term now covers a vast array of constitutionally protected forms of political opposition to the policies of the US government, including speaking, writing, political demonstrations, even the filing of legal briefs."

Just ask activists raided last month by FBI bully-boys in Minneapolis and Chicago!

The American Civil Liberties Union denounced the proposal and called on Congress to reject calls "to make the Internet wiretap ready."

ACLU Legislative Counsel Christopher Calabrese derided the move, saying:

"Under the guise of a technical fix, the government looks to be taking one more step toward conducting easy dragnet collection of Americans' most private communications."

Clamping Down on the Freedom of Information Act

Entreaties by civil libertarians however, are likely to fall on deaf ears in the Democratic-controlled Congress.

In a clear sign that the Obama administration is moving to clamp down further on the free flow of information even as they seek access to all of ours', Politico reported that the Office of the Director of National Intelligence (ODNI),

"appears to be on the verge of prevailing in an attempt to put some information it receives from other intelligence agencies beyond the reach of Freedom of Information Act requests."

National Counterterrorism Center Director Michael Leiter pushed through an onerous section to Intelligence Authorization Act legislation that exempts so-called "operational files" from four secret state agencies,

...from FOIA requests.

Apparently the American people, long the targets of illegal driftnet spying by the intelligence and security apparatus, will soon find another door slammed shut, even as the administration claims sweeping new powers, including the right to assassinate American citizens deemed "terrorists," in secret and without due process, anywhere on the planet.

And they call this transparency...

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_internet69.htm

Shared from Read It Later

 אל

Big Brother - Obama Demands Access to Internet Records, in Secret, and Without Court Review

Big Brother : Obama Demands Access to Internet Records, in Secret, and Without Court Review

by Tom Burghardt, bibliotecapleyades.net
August 13th 2010

from GlobalResearch Website

The Obama administration is seeking authority from Congress that would compel internet service providers (ISPs) to turn over records of an individual's internet activity for use in secretive FBI probes.

In another instance where Americans are urged to trust their political minders, The Washington Post reported last month that,

"the administration wants to add just four words - 'electronic communication transactional records' - to a list of items that the law says the FBI may demand without a judge's approval."

Under cover of coughing-up information deemed relevant to espionage or terrorism investigations, proposed changes to the Electronic Communications Privacy Act (ECPA) would greatly expand the volume of private records that can be seized through National Security Letters (NSLs).

Constitution-shredding letters de cachet, NSLs are administrative subpoenas that can be executed by agencies such as the FBI, CIA or Defense Department, solely on the say so of supervisory agents.

The noxious warrants are not subject to court review, nor can a recipient even disclose they have received one. Because of their secretive nature, they are extremely difficult to challenge.

Issued by unaccountable Executive Branch agents hiding behind a façade of top secret classifications and much-ballyhooed "sources and methods," NSLs clearly violate our constitutional rights.

The fourth amendment unambiguously states:

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

However, in "new normal" America constitutional guarantees and civil rights are mere technicalities, cynical propaganda exercises jettisoned under the flimsiest of pretexts:

the endless "War on Terror" where the corporate state's praetorian guards work the "dark side."

Once served, firms such as telecommunication providers, banks, credit card companies, airlines, health insurers, video rental services, even booksellers and libraries, are compelled to turn over what the secret state deem relevant records on targets of FBI fishing expeditions.

If burdensome NSL restrictions are breeched for any reason, that person can be fined or even jailed if gag orders built into the draconian USA Patriot Act are violated.

However, even the Patriot Act's abysmally lowered threshold for seizing private records specify that NSLs cannot be issued,

"solely on the basis of activities protected by the first amendment of the Constitution of the United States."

Despite these loose standards, congressional investigators, journalists and civil liberties watchdogs found that the FBI violated the rules of the road, such as they are, thousands of times. Between 2003-2006, the Bureau issued 192,499 NSLs, according to current estimates, the FBI continues to hand out tens of thousands more each year.

According to a May 2009 Justice Department letter sent to the House and Senate Judiciary Committees,

"in 2007, the FBI made 16,804 NSL requests" and followed-up the next year by issuing some, "24,744 NSL requests ... to 7,225 United States persons."

The Justice Department's Office of the Inspector General (OIG) issued a 2007 report which concluded that the Bureau had systematically abused the process and exceeded their authority.

A follow-up report published by the OIG in January found that serious civil liberties breeches continue under President Obama.

This is hardly surprising given the track record of the Obama administration.


"Reform," Obama-Style

The latest White House proposal would hand the secret state unprecedented access to the personal communications of every American. What Bushist war criminals did secretly, Obama intends to do openly and with the blessings of a supine Congress.

As constitutional scholar Glenn Greenwald points out,

"not only has Obama... blocked any reforms, he has taken multiple steps to further expand unaccountable and unchecked surveillance power."

Nowhere is this more apparent than by administration moves to "reform" ECPA.

While the Justice Department claims their newly sought authority does not include "'content' of email or other Internet communications," this is so much eyewash to deceive the public.

In fact, the addition of so-called transactional records to the volume of files that the state can arbitrarily seize, would hand the government access to a limitless cache of email addresses, dates and times they were sent and received, and a literal snap-shot on demand of what any user looks at or searches when they log onto the internet.

As I have pointed out before, most recently last month when I described the National Security Agency's PERFECT CITIZEN program, the roll-out of privacy-killing deep-packet inspection software developed by NSA already has the ability to read and catalogue the content of email messages flowing across private telecommunications networks.

Former Bushist Homeland Security official, Stewart A. Baker, applauded the proposal and told the Post,

"it'll be faster and easier to get the data." Baker touts the rule change as a splendid way for ISPs to hand over "a lot more information to the FBI in response to an NSL."

While the Post claims "many internet service providers" have "resisted the government's demands to turn over electronic records," this is a rank mendacity.

A "senior administration official," speaking anonymously of course, told the Post that "most" ISPs already "turn over such data." Of course they do, and at a premium price!

Internet security analyst Christopher Soghoian has documented that just one firm, Sprint Nextel, routinely turned over their customer's geolocation data to law enforcement agencies and even built them a secure web portal to do so, eight million times in a single year!

Soghoian wrote last year that,

"government agents routinely obtain customer records from these firms, detailing the telephone numbers dialed, text messages, emails and instant messages sent, web pages browsed, the queries submitted to search engines, and of course, huge amounts of geolocation data, detailing exactly where an individual was located at a particular date and time."

As a public service, the secrecy-shredding web site Cryptome has published dozens of so-called compliance guides for law enforcement issued by a plethora of telecoms and ISPs.

Readers are urged to peruse Yahoo's manual for a taste of what these grifters hand over.

While the administration argues that "electronic communication transactional records" are the "same as" phone records that the Bureau can obtain with an NSL, seizing such records reveal far more about a person's life, and political views, than a list of disaggregated phone numbers. This is precisely why the FBI wants unlimited access to this data.

Along with racial and religious profiling, the Bureau would be handed the means to build a political profile on anyone they deem an "extremist."

That "senior administration official" cited by the Post claims that access to a citizen's web history,

"allows us to intercede in plots earlier than we would if our hands were tied and we were unable to get this data in a way that was quick and efficient."

Perhaps our "change" administration has forgotten a simple historical fact: police states are efficient.

The value of privacy in a republic, including whom one communicates with or where one's interests lie, form the core values of a democratic order; principles sorely lacking in our "new normal" Orwellian order!

In a small but significant victory, the ACLU announced this week that,

"the FBI has partially lifted a gag it imposed on American Civil Liberties Union client Nicholas Merrill in 2004 that prevented him from disclosing to anyone that he received a national security letter (NSL) demanding private customer records."

In a statement to reporters, Merrill said:

"Internet users do not give up their privacy rights when they log on, and the FBI should not have the power to secretly demand that ISPs turn over constitutionally protected information about their users without a court order. I hope my successful challenge to the FBI's NSL gag power will empower others who may have received NSLs to speak out."

Despite this narrow ruling, the FBI intends to soldier on and the Obama administration is hell-bent on giving the Bureau even more power to operate in the dark.

Commenting on the Merrill case, The Washington Post reported FBI spokesperson Mike Kortan claimed that NSL,

"secrecy is often essential to the successful conduct of counterterrorism and counterintelligence investigations" and that public disclosure "may pose serious risks to the investigation itself and to other national security interests."

Those "other" interests, apparently, do not extend to the right to express one's views freely, particularly when they collide with the criminal policies of the secret state.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_bigbrother27.htm

Shared from Read It Later

 אל

The Philadelphia Project Murder

The Philadelphia Experiment Murder: Parallel Universes and the Physics of Insanity

by Alexandra Bruce, bibliotecapleyades.net
November 30th -0001

However, Preston is much more together as a personality than Allende was and is also available for dialogue. He is also a scientific genius. Like Dr. Jessup, I also encounter strange coincidences or patterns of what we call “synchronicity.” But, unlike Dr. Jessup, the coincidences I discover are not disturbing. I take these coincidences and use them like chess pieces to discover new facets and connections in an attempt to explain what is going on. A whole new genre of literature has thus been created which has turned into “,” and the eternal quest to discover the secrets of time and the universe itself. This book, , which is based upon the murder of Phil Schneider, is an important piece of literature in this regard.

I have referred to the death of Phil Schneider as the second “Philadelphia Experiment Murder” because his life is inextricably connected to this incident and the quantum potential that it represents to all of humanity. In a bigger sense, the “Philadelphia Experiment Murder” also refers to efforts by some to literally “murder” the legend or story itself and thus cut off mankind’s reach to an expanded reality and consciousness of itself. Most importantly, it should be recognized that Phil Schneider died as a martyr for the cause of truth.

His life and efforts to expose the truth should never be forgotten.

The word “turtle” derives from “tortoise” which means “tortus” (twisted). Webster’s New World Dictionary gives a hypoethetic derivation of the Latin tortus as being derived from Late Greek tartarouchos, evil demon, originally controlling Tartarus.

Although I was personally very well aware of the outrageousness and implications of Phil’s death, time and circumstances did not allow me to engage in a personal investigation of the matter. This responsibility was placed in the hands of Alexandra Bruce, a very capable researcher and writer who has more than a little acumen for this type of research.

I first met Alexandra many years ago at a lecture in Manhattan. When she told me her surname, I inquired if she was aware of the particular nature of that name’s Scottish heritage. I was, of course, referring to King Robert I “the Bruce”, whose army defeated the English in the Battle of Bannockburn, winning the independence of Scotland. Those of you who are familiar with my earlier work will remember that the Stewart family are the guardians of the Stone of Scone and by that reason, are the rightful heirs to the throne of the British Isles. The purpose of the Jacobite rebellion was to restore the Stewarts to that throne.

Looking further into Scottish history, I discovered that the legitimacy of the Stewart Clan’s claim was due to Walter Stewart’s marriage to Marjorie Bruce, daughter of Robert the Bruce.

Walter had commanded the left wing of the Scots army at Bannockburn and had been knighted by Bruce on the battlefield. The son of Marjorie and Walter Stewart, Robert II ascended to throne of Scotland, after her brother, King David II died in 1371. The Scottish crown was thereby passed to the Stewart Clan. Alexandra’s uncle, Duncan Bruce has been the North American representative for the Chief of the Bruce clan, Lord Elgin, for over two decades.

A multi-cultural and multilingual individual, Alexandra attended Brown University after growing up in the United States and Brazil. At Brown, she was befriended by John F. Kennedy Jr. and was also a good friend of his wife, Carolyn Bessette. She grew up surrounded by the trappings of wealth and the so-called beautiful people. While this might sound either impressive or pretentious (depending on your viewpoint), Alexandra would be the first to tell you of the dark side of privilege. She has observed how the mind control tentacles of MK-Ultra are a multigenerational labyrinth that reach into the most powerful families in the world, as well as the celebrated and famous.

Upon graduating from Brown, Alexandra founded her own film production company and became a leading producer of “rap” music videos in the early days of that musical genre. In addition to working in the film industry, she is a multitalented individual who has experienced various adventures and misadventures. Currently, she works as an executive at a Long Island investment firm. The Philadelphia Experiment is her first book, and I think you will find it a very good one that not only maintains the intrigue of past books of mine but opens up new territory.

Of more importance, is that it exposes the horrendous injustice of a murdered man and his efforts to expose the truth.

Peter Moon

December 2000

CHAPTER ONE

Original Page: http://www.bibliotecapleyades.net/montauk/esp_filadelfia_6.htm

Shared from Read It Later

 אל

The Illuminati versus Chinese Secret Societies - Exopolitical Implications of a Covert Global Depopulation Policy & Staged Extraterrestrial Invasion

The Illuminati versus Chinese Secret Societies - Exopolitical Implications of a Covert Global Depopulation Policy & Staged Extraterrestrial Invasion

bibliotecapleyades.net | Jul 16th 2007 


by Michael E. Salla, Ph.D
Kona, Hawaii
07/16/07
from Exopolitics Website

Spanish version

Recently, Benjamin Fulford, a former bureau chief for Forbes Magazine in Japan, has come forward to reveal deep splits within the global power structures that control international finance, religious institutions and geo-politics.

Fulford argues that these splits have grown so severe that unless a covert policy for significant global depopulation through contrived means is immediately abandoned, that there will be harsh consequences for those seeking to implement such a policy.

Fulford has publicly taken on the role of spokesperson for what he claims are Chinese secret societies opposed to global depopulation policies that specifically target the Asian population. He has recently come out with public warnings on behalf of these secret societies on a popular radio show where he was interviewed on July 5.

Fulford's claims and warnings to supporters of a covert global depopulation program are so startling that they could easily be dismissed as wild conjecture and neurotic conspiracy theory. There are however a number of reasons why his claims should not be simply dismissed and be considered on their merits.

  1. First, the quality of Fulford's journalistic investigations and professional background do not indicate he is someone prone to exaggeration and making unsubstantiated claims. Many of his articles with Forbes Magazine were and continue to be essential reading for Western businessmen desiring to invest or conduct business in Japan.

  2. Second, he has interviewed people in very senior positions in Japan over the last decade including seven Prime Ministers, captains of industry, security police and leading figures in the Japanese underworld. So he does have access to the shadowy underworld figures he claims have approached him to take on the issue of a covert global depopulation program.

  3. Finally, while a Canadian by nationality, Fulford has spent 20 years studying and working in Japan, speaks the Japanese language fluently, and understands Japanese culture and public policy making process very well. He therefore qualifies as a westerner very sympathetic to Asian values and could act as a spokesperson for a powerful organization with deeply embedded networks in Japanese society.

All this suggests that Fulford's claims need to be considered on their merits.

Fulford traces the origins of the powerful elites responsible for the alleged covert global depopulation program to the leading banking families in Europe and North America. Due to their historical association with Freemasonry he refers to these elite banking families as comprising the modern day 'Illuminati' whose history can be traced all the way back to ancient Babylon (see The History Of The Illuminati - How the Celtic Peoples Were Enslaved by Babylonian Tyrants).

Fulford argues that a faction of the Illuminati centered around the Rockefeller family is intent on a radical global depopulation plan through a contrived war on terror, artificially created pandemics, and environmental disasters produced through advanced eco-weapons.

In contrast, another branch of the Illuminati centered around the European based Rothschild family has distanced itself from such a plan as evidenced in broad European opposition to the Iraq war. (See The Secret Race to Control Iraq's Extraterrestrial Heritage).

Most significantly from an exopolitical perspective, Fulford claims that there is an attempt to produce a global Armageddon with a contrived extraterrestrial enemy that will wipe out a significant proportion of humanity. According to Fulford, this would leave survivors so traumatized that they would be easily manipulated by the Illuminati.

A number of whistleblowers including the late Werner Von Braun have argued that a covert plan exists to fabricate an extraterrestrial enemy to justify a new global war.

Fulford claims that it was his investigation into artificially created pandemics that targeted Asians in a covert effort to reduce their overall population to 500 million that triggered the attention of Chinese secret societies. He claims that the SARS virus and the avian flu virus (H5N1) are the first in a series of artificially created viruses that specifically target the Asian genome.

Disturbed by the possibility that a covert global depopulation policy that targeted Asians was underway, secret Chinese societies based in Taiwan contacted Fulford to offer him their protection and recruited him to be their spokesperson.

Fulford contends that the effort to reduce the Asian population is a result of deeply entrenched racism and cultural chauvinism among Illuminati members who historically are centered in Europe and North America.

Assuming that Fulford is correct that a depopulation program targeted at Asians is underway, it is worth exploring a number of exopolitical factors for why such a policy might have been implemented by Illuminati members, and the role of the Rockefeller family in such a policy.

  1. First, the covert policy allegedly aims to reduce the current population of Asia from approximately 3.7 billion (over 56% of the global population) to 500 million people. One of the major reasons why new energy technologies and extraterrestrial disclosure have not occurred is that this would level the geo-political playing field very quickly. Cheap inexpensive energy that could be produced in-house would rapidly transform major population centers like China (1.3 billion) and India (1.1 billion).

    These and other Asian nations that currently struggle to feed and provide jobs for all citizens, would be transformed into flourishing financial powerhouses where their citizenry's full productive capacities could be utilized. Such a development would transform the way global financial structures are dominated from capital intensive industries in North America/Europe to information intensive industries in China/India, etc.

  2. Second, not only would there be an erosion of Illuminati power and prestige due to its loss of control over global financial institutions, but there would also be widespread diffusion of technological capacities. This would significantly erode U.S. hegemony in the research and development of advanced technologies. This is especially important when it comes to the secret reverse engineering of extraterrestrial technologies which is dominated by the US military industrial complex.

    The Illuminati provide significant financial resources and global networks to ensure that the US gets the lion's share of extraterrestrial technologies recovered world wide and secretly relocated to the US. Much of this is achieved by maintaining present global dependence on fossil fuel consumption, and preventing alternative energy sources being developed.

  3. Third, there is the possibility that a staged extraterrestrial invasion can be conducted to deceive the global population into surrendering civil liberties and political rights. This would enable the passage of draconian national security laws which would monitor and control the behavior and thoughts of the global citizenry. The development of a global national security system would ensure the control of elites who might fear that the official disclosure of extraterrestrial life would lead to a loss of governmental and covert Illuminati control over the global population. The collapse of governmental authority was an important factor cited by the 1960 Brookings Institute Report into the consequences of the general public learning of the existence of extraterrestrial life.

  4. Fourth, the role played by the Rockefeller family in the development of US policies concerning extraterrestrial technologies and life cannot be underestimated. It was the intervention of both Nelson and David Rockefeller that was critical in persuading President Dwight Eisenhower to relinquish direct executive presidential control over extraterrestrial related projects. A corporatized military structure that was run by an appointed committee, Majestic-12 Special Studies Group, that was outside the normal governmental oversight process was instead created.

    The Rockefellers were able to ensure that through their control of organizations such as the Council of Foreign Relations and key personnel such as Dr Henry Kissinger, that they would play a substantial role in directing covert policies on extraterrestrial affairs (see Failure of Power Politics as a Strategic Response to the Extraterrestrial Presence). Most importantly, the Rockefellers have been the leading proponents of a global secrecy program concerning extraterrestrial life with the exception of a few family members such as Laurence Rockefeller (see E.T. Politics in the Clinton White House).

How much credence should be given to Fulford's radical claims?

Certainly his professional background and access to senior political, financial and cultural figures in Japan can be verified.

He has also published a recent book detailing at greater length his claims and providing evidence to substantiate the existence of a covert depopulation program that specifically targets Asians. As far as him being a spokesperson for Chinese secret societies vehemently opposed to such a depopulation program, that is harder to verify.

Nevertheless, his work for Forbes Magazine gave him privileged access with key figures and forces in the Japanese economy which almost certainly included the Japanese underworld. This makes it very plausible that he is familiar with and could have been easily approached by Chinese secret societies as he claims. Significantly an Australian expert in reverse speech analysis tested Fulford's speech patterns during his July 5 radio interview and concluded that he was not lying and that the reverse speech patterns are congruent with his claims (see The Warnings of Benjamin Fulford).

Perhaps most credence for Fulford's claims come from the revelations of filmmaker Aaron Russo who claims to have befriended a leading member of the Rockefeller family, Nick Rockefeller.

According to Russo, Rockefeller admitted that 911 was in inside job, that the war on terror was contrived to convince the global population to submit to draconian national security laws such as microchipping, that leading banking families intended to maintain strict control, and that a depopulation program to cull the global population by at least 50% was underway.

While investigations have just begun to determine the accuracy of Fulford's radical claims, the exopolitical implications of a struggle between Asian and North American/European secret societies can be expected to be very significant.

If Fulford is accurate in his main claim concerning the determination and ability of Chinese secret societies to target banking elites involved in a global depopulation policy, then it becomes clear Asian secret societies can severely disrupt any contrived global depopulation program by the North American branch of the Illuminati. This would ensure that in a post-disclosure world the full productive capacities of China and other Asian nations would not be significantly diminished.

The frustration of plans to covertly depopulate strategic regions of the planet such as Asia, would inevitably lead to a major realignment of financial and political power on the planet.

More significantly, the power and influence of the Rockefeller family in repressing information concerning extraterrestrial life and technology would be significantly diminished.

This would significantly accelerate the timing of official disclosure concerning extraterrestrial life. Most importantly, it would influence the way in which disclosure was made and thereby lead to the failure of efforts to present extraterrestrials as a new security threat justifying advanced space weapons or to stage a fake extraterrestrial invasion (see Using Space Weapons Against Extraterrestrial Civilizations).

This would consequently lead to the release of suppressed technologies and alternative energy sources that are used by extraterrestrial civilizations. Extraterrestrial disclosure would prove very beneficial to Asian economies which have the bulk of the world's population and stand to benefit most from distribution of alternative energy sources.

Just as the regular U.S. military is not happy with continued suppression of advanced extraterrestrial technologies (which is why so many military personnel have been safely able to come forward - see The Disclosure Project), so too secret societies in China, and other Asian nations are not happy with the current non-disclosure program.

Furthermore, there appears to be a genuine split between North American and European branches of the Illuminati (elite banking families) over global depopulation policies.

That makes for a powerful alliance of pro-disclosure interests that must greatly worry members of the increasingly isolated North American based Illuminati and Majestic-12 Group that has historically played a leading role in repressing information concerning extraterrestrial life and technology.

Original Page: http://www.bibliotecapleyades.net/sociopolitica/sociopol_chinesesecretsocieties04.htm

Shared from Read It Later

 אל

Fight The New World Order with Global Non Compliance

The New World Order - Novus Ordo Mundi 

Espa�ol

- An Imperial Strategy For a New World Order - The Origins of World War III

- 'Barack Obama Advocates World Government' - Suggests The Renowned Financial Times

- Bush's New World Order - The Meaning Behind The Words

Espa�ol
Espa�ol
Espa�ol

- El Falso Terror - El Camino a La Dictadura

Espa�ol
Espa�ol
Espa�ol
Espa�ol

- El Plan de La �lite Para un Nuevo Orden Social Mundial

Espa�ol
Espa�ol

- �Es un Golpe Militar Estadounidense la �ltima, la Mejor y la �nica Esperanza del Mundo?

- False Flag Operations - Main File

- From Democracy to Plutocracy - The United States of Corporate America

- Globalization - The Octopus of the New World Order - Main File

- Global Militarism - Main File

Espa�ol

- House Of Theosophy Seminar - Reveals Plans For Last Stages Of New World Order

- How The New World Order Is Being Plotted In Secret - Good Government?

- "I, Witch" New World Order Organization

Espa�ol

- Juego de Cartas Illuminati de Steve Jackson - Editado en 1995

- New World Order in Their Own Words - Quotations From The Final Solutionists of The New World Order

- New World Order - The Final Solution - Humanty's Greatest Challenge - Fear or Love

Espa�ol

- Peaceful Revolution - Push Back, Refuse, Non-Cooperation

- Phil Schneider vs. The New World Order - from "The Dulce Book"

- Rockefeller Internationalism - Main File

Espa�ol
Espa�ol

- Sin Precedentes...

- The Bushes and The New World Order - Main File

- The Bush Impeachment Movement - Main File

- The Committee of 300 - Main File

- The House of Rothschild - Main File

- The New World Order - from George Bush: The Unauthorized Biography

- The North America Union - Main File

- The Rise of The Fourth Reich in America - Project Camelot Interviews Jim Marrs

- The Secret History of America's Capital - Washington D.C. - Main File

- The Thule Society and The New World Order (NWO)

- Towards The New World Order With The Men Who Count The Votes - Connecting The Dots

- Two Faces of The Same Coin - Las Dos Caras de La Misma Moneda - Obama-McCain Pres. Candidates of Global Elite

- Vatican-Pope and The New World Order - Main File

- Wars and Rumors of Wars - The Next Stage of The NWO Great Plan - Part 1

- 'War on Terror' - Main File

- Who Really Runs The World - An overview of what's behind the "New World Order"�


Espa�ol

- 33 Conspiracy Theories That Turned Out To Be True - What Every Person Should Know...

- Activists Go Face To Face With Evil As Rockefeller Confronted - 'We Are Change' Group Ask Arch-Elitist Why...

Espa�ol

- American Laws Most Americans Don't Know! - But Should Know!

- An Octopus Named Wackenhut - Main File

- Beyond The Arab Spring, The European Winter - Hungary Becomes Third European State to Suspend Democracy

- Blackwater - War Mercenaries Inc. - The Privatization of War - Main File

- Blue Beam - The Uncovert Project - Main File

- Bohemian Grove - Main File

- Bush Senior and Jeb Commanded to Sign Off In White House - It Took Them Ten Days to Fix Up a Photo-Op to...

- Conspiracy Theories - White Paper by Cass R. Sunstein

- Creating the "Domestic Surveillance State" - How America's Wars Are Systematically Destroying Our Liberties

Espa�ol

- Declaraci�n Conjunta Sobre Wikileaks - ONU y CIDH

Espa�ol

- El Colapso de La Econom�a Estadounidense - Apocal�pticas Predicciones Para USA

Espa�ol

- �El Fin de La Internet? - Main File

Espa�ol

- El Fin Del Capitalismo - Seg�n Wallerstein

- El Jaque Mate - Informaciones Para Materializar Un Mundo Nuevo

Espa�ol
Espa�ol

- El Proyecto Matriz - Presentacion Multimedia

Espa�ol

- El Sistema Se Autodestruye - Se�ales del Apocalipsis

Espa�ol

- El Sol Sat�nico - Lucifer 2000

- EndGame - JuegoFinal - Main File

- EndGame of The New World Order - The Revealing

Espa�ol

- Enga�ando al Mundo Con Fotograf�as - Los Muertos en Georgia y Osetia

Espa�ol

- �Est� Usted Disfrutando� de Las Falsas Olimpiadas?

Espa�ol

- FEMA - Federal Emergency Management Agency - Main File

Espa�ol
Espa�ol

- Global Gridlock - How the US Military-Industrial Complex Seeks to Contain and Control the Earth and Its Eco-System

Espa�ol

- Guerra Clim�tica - Las Armas del Gobierno Mundial

Espa�ol

- Guerra Fr�a Psicol�gica - Las Ciencias de La Dominaci�n Mundial

Espa�ol

- Guerra y Mentira - El Control Pol�tico y Militar De Nuestras Sociedades

- How To Run The World - Mega-Diplomacy - The New World Order

Espa�ol

- �Increible?... No Tanto... - Administracion Bush Financia Programa Nuclear de Iran

- In Effect, There Is Virtually No Candidate - The 2008 U.S. Elections

- Influenza - Virus H1N1 - Unintentional Contamination or Bioterrorism? - Main File

Espa�ol

- Informes de Inteligencia Imaginan "Dise�ando Seres Humanos" Con Habilidades �nicas, Bajo R�gimen de...

- Ingenieros del Shock - Investigaci�n y Desarrollo

- Initiation Into The Incunabula - The Occult Technology of Power

- Interview With Putin... Banned - Read It Here!

- Is The World Too Big to Fail? - The Contours of Global Order

- Joint Statement on Wikileaks - UN and IACHR

Espa�ol
Espa�ol

- La Misi�n Anglosajona - La Tercera Guerra Mundial y El Legado del Nuevo Mundo

Espa�ol

- La Primera Prueba del Shock - Dolores de Parto

Espa�ol

- Law Suit Against 4 US Presidents and 4 UK Prime Ministers - For War Crimes, Crimes Against Humanity and Genocide...

Espa�ol

- Lucis (Lucifer) Trust - Main File

- Manipulating Matter - The Scientific Dictatorship as A Project in The Reconfiguration of Reality

- May 1995 Lecture given by Phil Schneider - about secret underground bases, the Greys, the New World...

- NASCO - Ron Paul Is "Confused" About NAFTA Superhighway - Road giants Use Semantics to Whitewash Lynchpin of...

Espa�ol

- No Puedo Con Obama...

- NWO Global Economic Dictatorship Exposed - The Trillion-Dollar Lawsuit That Could End Financial Tyranny - Ben. Fulford Interview

- Obama - A "New" Sociopolitical Era? - Main File

- Obama's War - Why is The Largest Military Machine on The Planet Unable to Defeat The Resistance in Afghanistan

- Old Religious Hegemony, NWO - Jesus to the Palestinians: "Love One Another" / God to the Jews: "Get Rid of the Arabs"

- Patriot Act - H.R. 3162 - Received October 24, 2001

- Police Brutality in The USA - Americans Too Are Oppressed

- Putin's Winning Hand - Once The Atlantic Alliance is Shattered, America's Lifeline to The World is Kaput

- Querella de Irak en Espa�a Presentado Contra 4 Presidentes de EE.UU. y 4 Primeros Ministros del R.Unido

- Secret Societies That Threaten to Take Over America - Rise of 4th Reich

Espa�ol

- �Se Est� Planificando Ya La III Guerra Mundial?

- Sensitivity International - Network for World Control

- Spies For Hire - Who's Who in Intelligence Contactors

- State Terrorism and The New World Order - "Man's Stupidity Has No Bounds"

- Supplanting The United States Constitution - War, National Emergency and "Continuity of Government"

- The 9-11 Events - Main File

- The Anglo-Saxon Mission - The Third World War and The Inheritance of the New World

- The Anglo Saxon Mission - The Timeline - Letter from a Whistleblower�

- The Big Picture Behind North American Integration - Elites Plan For Regional Rule Under One-World Government

- The Bilderbergers and The New World Disorder - Lawmakers Finally Get Earful About Global Government

- The Demon-cratic Cryptocracy "Puppet Show" Book - How the New World Order Cult Communicates & Operates

- The Experiment - The True History of The Darkness and of The Light

- The Final Destruction of The Middle Class - The Great 2008 Transfer of Wealth

- The Financial New World Order - Towards a Global Currency and World Government

- The First Bricks in A New World Order - Gordon Brown Speech at G-20, 2009

- The First Earth Battalion - Dare to Think the Unthinkable, Ideas and Ideals for Soldiers Everywhere

- The Georgia Guidestones - Main File

- The Master File - "Rebellion in Heaven" unto Present and Future Time - Revelation of Awareness - P.Shockley as Interpreter

- The Microwave RFID Panopticon - Corp-State Lifetime Monitoring, Health/Civil Implications

- The New Age Movement - Main File

- The Plan to Disappear Canada - 'Deep integration' Comes Out of The Shadows

- The Report From Iron Mountain - Main File

- The Satanic Sun - Lucifer 2000

- The Story Behind "Changing Images of Man" - Scientists On Acid

- The World-Rule Conspiracy - The Destruction of Your Nation

- Top UN-Secret - What Would Happen if A Society of Counterfeiters Ruled The World?

- Towards The New World Order With The Men Who Count The Votes - Connecting The Dots

- Transmission About The New World Order - Cathy O'Brien, MKULTRA, Project Monarch, and more...

- True Stories of Violation - Border Patrol (100 Miles From The Border)

Espa�ol

- U.S. Government Spy Program - Main Core, PROMIS and The Shadow Government

- U.S. Sponsored "Democracy" in Colombia - Political Assassinations, Poverty and Neoliberalism

Espa�ol

- Viajeros del Tiempo - Nazi Jehovitas - Una Historia Corta

Espa�ol

- Vuelve La Era de Los Politbur�s - Comit� Central

- War in The Caucasus is As Much the Product of An American Imperial Drive as Local Conflicts - Russian Aggression

- Whose War? - A Neoconservative Clique Seeks to Ensnare Our Country In A Series of Wars That Are Not in America's Int...

- Why Was President Obama Gifted The Nobel Peace Prize? - The Answer to The Burning Question Du Jour

- Wisconsin Report - Dr. Beter Audio Letters - Main File

- Zeitgeist - Main File


- The Cost of Building and Operating Empire (USA)

- What Was Discussed At a Closed Session of The U.S. House of Representatives? - The End of An 'Empire'...


Multimedia:

- Invisible Empire - A New World Order Defined


- Global Warfare USA - The World is The Pentagon's Oyster - US Military Operations in All Major Regions of The World

- Project for The New American Century (PNAC) - All About Them

- Rebuilding America's Defenses - Strategy, Forces and Resources For a New Century


Multimedia:

- El Nuevo Siglo Americano - Un Film de Massimo Mazzucco

- Il Nuovo Secolo Americano - Un Film di Massimo Mazzucco


- 1984 - by George Orwell (Eric Blair)

- 1984 - Espa�ol - por George Orwell

- America's Secret Establishment - by Antony Sutton

- America's Subversion - The Enemy Within - New World Order, Illuminati's One World Government - by Sonny Ren� Stermole

- America's "War on Terrorism" - by Michel Chossudovsky

- Animal Farm - by George Orwell

- Behold a Pale Horse - by Milton William Cooper

- Brave New World - by Aldous Huxley

- Brave New World Revisited - by Aldous Huxley

- Changing Images 2000 - Integral Approaches to Re-Imagining and Re-Making Ourselves and the World - by Thomas J. Hurley

- Changing Images of Man - by Joseph Cambell, Duane Elgin, Willis Harman, Arthur Hastings, O. W. Markley, Floyd Matson ...

- Code Red - The Coming Destruction of America 2004 - by David Booth

Espa�ol

- Los Dossier del Gobierno Mundial - La Trama Oculta para Dominar a la Humanidad - por Anne Givaudan

- El Nuevo Orden Mundial - G�nesis y Desarrollo del Capitalismo Moderno - por Mart�n Lozano

- Final Warning - A History of The New World Order - by David Rivera

- Global Tyranny... Step by Step - The United Nations and the Emerging New World Order - by William F. Jasper

- Kissinger - The Secret Side of The Secretary of State - by Gary Allen

Espa�ol

- La Exteriorizaci�n De La Jerarqu�a - por Djwhal Khul a traves de Alice A. Bailey

- La Granja de Los Animales - por George Orwell

- Las Sociedades Secretas y Su Poder en El Siglo XX - por Jan Van Helsing

- Los Dossier del Gobierno Mundial - La Trama Oculta para Dominar a la Humanidad - por Anne Givaudan

- Matrix of Power - How The World Has Been Controlled By Powerful People Without Your Knowledge - by Jordan Maxwell

Espa�ol

- Nadie Se Atreve A Llamarle Conspiraci�n - por Gary Allen y Larry Abraham

- None Dare Call It Conspiracy - by Gary Allen and Larry Abraham

- Order Out of Chaos - Elite Sponsored Terrorism and the New World Order - by Paul Joseph Watson

- Politics and The English Language - by George Orwell (Eric Blair)

Espa�ol

- Razones de Estado - por Chester Swann

- Rule by Secrecy - by Jim Marrs

- Secret Societies and Their Power in The 20th Century - by Jan Van Helsing

- The Anglo-American Establishment - by Carroll Quigley

- The Externalization of The Hierarchy - by Djwhal Khul through Alice A. Bailey

- The Impact of Science on Society - by Bertrand Russell

- The Last Circle - by Carol Marshall

- The New World Order - by H.G. Wells

- The Open Conspiracy - by H.G. Wells

- The Police State Road Map - by Michael Nield

- The Secret Destiny of America - by Manly P. Hall

- The Secret Side of History - Mystery Babylon and The New World Order - by Dee Zahner

- The Shape of Things to Come - by H.G. Wells

- The World Order - A Study in the Hegemony of Parasitism - by Eustace Mullins


- 9-11 Octopus - New World Order

- Adi�s a Las Libertades - Taking Liberties (Since 1997)

- Agenda "Esoterica" - Esoteric Agenda

- A Jewish Defector Warns America - Benjamin Freedman Speech 1961 - An Alternate Look at WW-1 and WW-2

- A Political Road Movie - 'South of The Border'

- Aquarius - La Era del Mal - �Un An�lisis Religioso o Propaganda Religiosa?

- Aquarius - The Age of Evil - A Religious Analysis or Religious Propaganda?

- Cim�tica - La Continuation de Agenda Esot�rica

- Cosmic Vampires - Perverse Masonic Initiations of The NWO - With David Icke

- De La Libertad Americana al Fascismo - America Freedom to Fascism

- Destrozando La Democracia - Hacking Democracy

- Dick Cheney and David Rockefeller on The Council of Americas - 2002

- El Fin de Los Estados Unidos - Naomi Wolf

- El Llamado - The Calling

- El Proyecto Matriz #124 - Miguel Rx - El Nuevo Orden Mundial y T�

- El Proyecto Matriz - Presentacion Multimedia

- Endgame - Blueprint for Global Enslavement - with Alex Jones - Subtitulos en Espa�ol

- Essential Knowledge For A Wall Street Protestor - David Icke

- Europe in 'The Net"... - Scandalous and Terrifying - New World Order Propaganda

- Eustace Mullins Tells It Like It Is - About The New World Order

- Fall of The Republic - The Presidency of Barack H. Obama

- Freedom of Speech - Stories From The Edge of Free Speech

- Guerra Clim�tica - Programa "ESO ES IMPOSIBLE" del Canal History

- Juego Final - Plan de Esclavitud Global - Endgame - Blueprint For Global Enslavement

- Kymatica - The Sequel to Esoteric Agenda

- Martial Law - 9/11 Rise of the Police State - by Alex Jones

- Message For The Uniforms and Dark Suits - David Icke

- "New World Order" - The Movie (2009)

- NWO About to Nuke The World With WW3 - URGENT BEN FULFORD MESSAGE

- Operaciones Con Bandera Falsa - False Flag Operations

- Problem-Reaction-Solution - David Icke

- Ring of Power - The Empire of "The City" - World Superstate

- Statism is Dead - True News

- Terror Storm - Final Cut - by Alex Jones

- The Big Picture Final Cut - An Expose of the New World Order

- The Calling - Expose of The New World Order

- The End of America - Naomi Wolf

- The North American Union - Rockefeller's Unions - Expose The New World Order!

- The "Police State" Trilogy - by Alex Jones

- The Power of Nightmares - The Rise of The Politics of Fear

- "The Ripple Effect" - Londres 7 de Julio de 2005

- The Rise of The Fourth Reich in America - Project Camelot Interviews Jim Marrs

- The Rise of The Politics of Fear - The Power of Nightmares

- The Shock Doctrine - Naomi Klein

- The Trilateral Commission - Analysis by Patrick Wood

- Un Film de Realidades Politicas - 'Al Sur de La Frontera'

- U.S. Helping Fund Iran Nukes - Lou Dobbs

- U.S. Quest for Global Dominance - Superpower - The Film

- War and Globalization - The Truth Behind September 11 (9/11)

- WARNING ALERT - New NWO Mass Depopulation Agenda - Google Georgia Guidestones Eugenics TransHumanism

- What The NWO Doesn't Want You to Know About - Kevin Trudeau on Alex Jones TV

- Will It Be World Government? - Adrian Salbuchi


- A Ponerological Profile - Henry Kissinger - Main File

- Brotherhoods and Secret Societies - Main File

- CIA - The Central Intelligence Agency - Main File

- Council on Foreign Relations member of The Shadow Government - Main File

- Denver International Airport and its Murals - Main File

- Depopulation of Planet Earth - Main File

- 'Dr. Jekyll' or 'Mr. Hyde' - Which is FEMA?

- Echelon - La Red - Main File

- False Flag Operations - Operaciones de Bandera Falsa - Main File

- Merovingios - Los Reyes Perdidos - Main File

- Noam Chomsky - Contra el Nuevo Orden Mundial - Main File

- Ponerology - The Science of Evil - Main File

- The Actual Iran Case - The Beginning of World War III? - Main File

- The Bilderberg Group - Main File

- The Club of Rome - Main File

- The Dark History of The Vatican - Main File

- The Federal Reserve Bank - Main File

- The Illuminati - Main File

- The Majestic Project / MJ-12 - Main File

- The Order of the Skull & Bones - Main File

- The Protocols of the Learned Elders of Zion - Main File

- The Secret Government - Main File

- The Sovereign Military Order of Malta - Main File

- The Story of The Committee of 300 - Main File

- The Trilateral Commission - Main File

- The United Nations - The Ultimate Delusion - Main File

- The William Cooper Files - Main File


- Eisenhower's 1954 Meeting With Extraterrestrials - The Fiftieth Anniversary of First Contact? - Main File

- Political Management of the Extraterrestrial Presence The Challenge to Democracy and...

- The Biggest Secret - The Book

- The Blue Brethren - Main File

- Un Informe Sobre los Motivos y Actividades de Razas Extraterrestres - Una Tipolog�a de Las M�s Significativas Razas...

- White (Solar) Brotherhood - Main File

Original Page: http://www.bibliotecapleyades.net/esp_sociopol_nwo.htm

Shared from Read It Later

 אל