Bitcoins – Coins For the Cryptocracy

People all over the political spectrum are pushing bitcoins again.

I explained earlier why I felt you should avoid them. When I did, I withheld any reasoning except the most logical and self-evident.

Short version:

You can accomplish everything that bitcoins can achieve with good old cash. And you don’t need electricity, internet, computers, devices, and security software when you use cash.

Second, if governments hate cash for its secrecy, why are they ignoring or pushing cryptocurrencies, which are supposedly even more secretive?

Makes no sense, does it?

The problem with bitcoins is they provide a solution for what isn’t a problem.

Secrecy isn’t a problem.

Secrecy can be achieved as is, if you set your mind on it.

The real problem is that every increase in secrecy augments the power of the cryptocracy – the unholy alliance of the spy agencies, criminals, and criminal financial cartels.

These are the forces that actually control our lives.

The criminal ruling class loves bitcoin because they know they have the power to exploit it fully. The ordinary chump just thinks he does.

As for Satoshi Nakamto, there’s no such person. It’s a made-up name, even though it has a meaning. A sinister one that gives the game away.

Don’t let clever people fool you into thinking it’s a real person.

They are probably being compensated for saying so.

Remember, practically every political site of any size on the web is in bed with intelligence. When they are not, they get pruned regularly.

Just see what happened to me here.

Bitcoin comes out of Israeli cryptographic research. The details I don’t know, but that’s generally accurate.

It’s not about saving anyone. It’s about enacting the kabbalist’s vision on earth.

That vision demands that the Anglo-Judaic Western powers rule the world through decentralized systems.

Those who are pushing bitcoin are on board that agenda.

I am too busy recovering from the latest body-blow from the cryptocracy to spell it out better just now.

But I will get to it.

If you want to gamble, go ahead.

But if you adopt bitcoins because you think your life will become opaque to the powers-that-be, you might want to rethink that.

The only way to hide anything done on your computer is to turn it off, smash the hard drive into metal dust, and throw it into a nuclear waste site.

But even then, there are still the servers and the other fellows’ computers.

Not to mention advances in technology or mathematics that will turn bitcoins invulnerability into mush.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

BJP Behind Tamil Power Struggle

Hindustan Times has summarized 10 steps in the power struggle being waged between Sasikala Natarajan, former CM Jayalalithaa’s former confidante and current party secretary of the AIADMK (All India Anna DMK):

The power struggle can be summarised in the following 10 points:

1. Meditation and then revolt

Feb 7: Panneerselvam goes to Marina Beach in Chennai, and meditates for around 40 minutes at Jayalalithaa’s memorial. Says he was compelled to resign as CM and propose Sasikala’s name for the post of leader of the AIADMK legislature party.

I was forced to step down… Amma’s spirit told me that I should come out and tell the truth to the people.

[Lila: My previous post reported on the widespread use in current Tamil Nadu TV  (Sun TV serials) of occult symbols drawn from mother- goddess (Amma) worship, accompanied by imagery of lamias and snakes and references to divination, seances,  and black magic. Was this intended to reinforce the idea of the former TN chief minister as a goddess, whose departed spirit could then be appropriated by others for their own purposes? If so, who would profit from such a manipulation? Who has the power to insert such symbols into television? Would they be the owners of the channels in league with outside forces?

47% of Tamil viewers watch Sun TV and its sister channels, a result of the monopoly of distribution channels by the owner, Kalanidhi Maran, from the politically prominent family of Marans. Dayanidhi, Kala’s brother, is the Union Minister for Communications.  The Maran family controls of the DMK, one of the leading Tamil identity parties and rival to the splinter party AIADM.  Kala’s grand-uncle is former chief minister of TN Karunanidhi.

I posted evidence that the Gates Foundation, the Ford Foundation, and DARPA were some of the external forces behind the Tamil faces orchestrating the pro-Jallikattu protests that also played on Shaivite and Tamil symbols. I showed that the current BJP “Hindu nationalist” government of Modi is nothing more than a front for the Rothschild cabal, so presumably, this imagery can also be linked to them.]

Jayalalithaa told me to take over as CM when she was in hospital,” he says.

2. Sasikala sacks Panneerselvam as AIADMK treasurer, he asks banks to block party funds

Feb 7: After a meeting with party leaders, party announces that Sasikala has sacked Panneerselvam as AIADMK treasurer and replaced with Dindigul C Srinivasan, forest minister and No. 2 in the council of ministers.

After his sacking, Panneerselvam says, “I have carried forward the post of treasurer which was entrusted upon me by Amma and I think no one can take it away from me.” He writes to banks saying he was still the treasurer and no transactions should be done in party accounts without his assent.

3. Panneerselvam announces plan to probe Amma’s death, Sasikala parades MLAs

Feb 8: Panneerselvan says he personally does not have any suspicion on the death of Jayalalithaa, but that a commission of inquiry headed by a sitting Supreme Court judge will be set up to probe into the death.

“Doubts about Amma’s health still prevail. A probe commission will be set up… health queries regarding Amma have been raised in the recent past. It’s the duty of the state government to enquire. Recommended an enquiry commission,” he says.

Makes another major revelation, saying, “I had visited the hospital daily to enquire about Jayalalithaa’s health condition, but couldn’t meet her even once.”

[Lila: A comment under this article points out that this statement contradicts OPS’ previous assertion in Point 1 that Jaya had told him to take over while she was in Apollo Hospital. OPS is lying here.]

Feb 8: Sasikala parades 130-plus lawmakers in a show of strength to counter the rebellion.
4. Panneerselvan says Sasikala wants only to grab power to grab money

Feb 8: Panneerselvan says Sasikala “does not understand the situation” in Tamil Nadu. Gets support from another AIADMK leader, OP Pandian, who says Sasikala “only cares about money, money, money. She wants to grab power to get money.”

[Lila: OPS was a close friend of Shekhar Reddy, the sand-mining baron who was arrested during an income tax raid that recovered crores of allegedly unaccounted money in the form of the new Rs. 2000 notes, barely 25 days from the date that the banks began issuing them. Note that Reddy was on the board of the Tirumala Tirupati Devasthanams Trust, overseeing the 26 billion dollar annual income of the outfit in charge of the second-richest religious center in the world.  Reddy is said to be linked to the TN Chief Secretary Rama Mohana Rao, who was the target of a shocking, militarized raid by the IT department last year. At issue was crores of rupees from illegal sand-mining allegedly laundered through new notes into the construction industry and/or used to pay political supporters. ]

5. Panneerselvan promises to give due credit to Jayalalithaa’s niece Deepa Jayakumar

Feb 8: Panneerselvan promises to meet people in every part of the state. “I will prove my majority and lead the people,” he says. Adds that he will give Deepa (Jayalalithaa’s niece) “the respect she deserves”, and that he will ask her to join his camp.

[Lila: Deepa, Jaya’s niece, is backed by the BJP who pushed her forward to create divisions in Tamil politics, it is reported.]

6. Panneerselvan calls for party polls to elect general secretary

Feb 8: Calls for elections as per AIADMK rules for the post of general secretary, saying the party council has the power only to appoint a temporary general secretary.

7. Panneerselvan says may take back resignation if party wishes

Feb 8: Panneerselvam says he has never betrayed the party and may take back resignation as chief minister if the party so desires. “I have always followed Amma’s path. There has been no instance where I betrayed the party, while remaining in power or opposition,” he says.

8. Panneerselvam parades support of senior legislators, meets Governor

Feb 9: Panneerselvam says Sasikala “betrayed” a 2011 vow to her “mentor” Jayalalithaa by staking claim to form the government.

At a press conference, parades the support of senior legislator E Madhusudanan, who worked with Amma and her mentor MG Ramachandran for more than 50 years.

Reads out a letter Sasikala allegedly wrote to Jayalalithaa, seeking apology for her actions and promising not to seek any political position and use her influence.

Panneerselvam meets Governor C Vidyasagar Rao at Raj Bhavan, alleges most of the party MLAs were being held hostage in a resort outside Chennai and that police were not responding to complaints.

[Lila: Rao is a former  RSS functionary and one-time governor of Maharashtra, now acting governor of TN. He is seen as another proxy of the BJP, as he was also once Andhra state president of the BJP. He comes from the Velamma community from the leading Karimnagar family of northern Telengana. Former CPI (Communist Party of India) general secretary Rajeshwar Rao is his brother, as is Planning Commission member, Hanumantha Rao. Telengana was part of Andhra Pradesh until its secession, which Rao supported. Andhra is a prominent locus of Western and church influence. It is the state in which the fabulously wealthy Tirumala temple is located. Rao was educated at Osmania University, a hot-bed of leftist politics.]

9. Panneerselvam says will prove majority, Sasikala stakes claim to govt, visits Jaya memorial

Feb 9: Panneerselvam declines to reveal the number of legislators who were supporting him and says he will prove his strength on the floor of the house. Says party legislators will have the chance to vote as per their conscience and he would be able to prove his majority.

Feb 9: Sasikala visits Jayalalithaa’s memorial at Marina Beach, pays floral tributes to the late chief minister, before heading to Raj Bhavan to meet the Governor with a list of MLAs loyal to her

Sasikala stakes claim to form the government, while Panneerselvam says “dharma” will triumph.

10. Sasikala holds meeting with MLAs, sacks Madhusudanan, Panneerselvam lodges complaint

Feb 9: Sasikala holds meeting with AIADMK?MLAs loyal to her at Poes Garden residence. Reports also say she held a meeting via video link with MLAs kept at the Golden Bay Resorts

Feb 10: Sasikala dismisses E Madhusudanan from the party for backing Panneerselvam, and appoints KA Sengottaiyan as the party presidium chairman.

Feb 10: Panneerselvam lodges formal complaint with Governor on MLAs being held hostage in resort.

Feb 10: Governor Vidyasagar Rao sends report to Union home ministry, says “cannot call Sasikala to form the government now”, asks DGP to probe allegations that MLAs are being kept against their will at the resort.

 

The Sandy Foundation Of Tamil Politics

From Scroll.in, a fascinating look into the sand mafia that rules Tamil Nadu (and many other Indian states) and its impact on politics and the environment there:

However, people in villages see this money [Lila: from the sale of sand from dried up river beds] circulating. A part of it, they say, goes to local party workers. A farmer from a village near Karur claimed that “about Rs 1,000 from each unit is shared amongst the local party workers: Rs 25 to the person in the village, Rs 150 to the taluka head, Rs 350 to the district members, and so on.” This is echoed by both researchers and politicians like K Kaliyan of the Communist Party of India (Marxist).

Abhijit Sen, a former member of the erstwhile Planning Commission, said India’s political parties “maintain their party cadres predominantly through the construction sector”. In Punjab, people close to the ruling Akali Dal control both sand mining and stone crushing. In West Bengal, syndicates control urban infrastructure projects. Another part of this money, said the researcher, goes into fighting elections. Be it for campaigning or for paying voters in cash.

These questions – about money flowing from sand mining to AIADMK’s cadre and being used in elections – were listed in the questionnaires sent to Jayalalithaa, Venkataramanan and Arumugasamy. This article will be updated when they respond.

For now, Sen’s observation triggers a fresh question. If a ruling party depends on the mining of a mineral resource to maintain itself, what is the fallout?

What it all means

Some years ago, farmers from 12 villages in Ettayapuram Taluk of Tuticorin district decided to stop sand mining. Among other things, they seized earthmovers and trucks. In response, said an article by R Seenivasan, a PhD Candidate with the University of Westminster, the farmers “were slapped with criminal charges and branded as ‘extremists’ who take ‘law into their hands’. Many farmers were sent to jail for days and charged for ‘unlawful assembly, rioting, obstructing government work and officers,’ under various penal sections of the Indian penal code.”

This is a common refrain. The police similarly slapped cases on the women of Kalathur, a village on the Palar, when they protested last year against sand mining. When this reporter met V Chandrasekhar, who has been agitating against sand mining in Villupuram and Pondicherry, it was shortly after Jawaharlal Nehru University student leader Kanhaiya Kumar was beaten up in the Patiala House complex. “That happens every day here. The police is an instrument of the state. No one would dare go to the police here,” said Chandrasekhar.

This pattern, of siding with the miners and not with the locals, shows up in poor supervision of sand mining. As the PUCL study found, sand was being mined till almost a 10 metre depth in the Palar. It also shows in the state government’s support for sand mining over, say, environmental concerns.

Responding to a petition filed in the Madras High Court by the Cauvery Neervala Athara Pathukappu Sangam, a non-profit in Erode, the state government argued that sand mining doesn’t need an environment clearance since quarrying operations were carried out by the PWD scientifically.

When the court insisted on an environmental impact assessment, a lawyer in the Madurai court who fought against sand mining, told Scroll on the condition of anonymity, the state government rushed through an environmental clearance in just three months.

Scroll asked Jayalalitha, Rama Mohana Rao, Venkataramanan and Arumugasamy for their comment on the charges that the state government and the ruling party have acted in a manner which benefits sand miners and not local communities. There was no response.

The combined fallout of all this has not been pretty. As these quarries scour their way along Tamil Nadu’s rivers, the state’s water crisis is worsening. Groundwater levels, for instance, are collapsing across the state. That said, the ravages of sand mining go beyond ecological damage. The state’s villages and politics have been damaged as well.”

Infosys Foundation Chair Joins Tirumala Temple Trust

The chairman of the Infosys Foundation has joined the board of the largest and richest temple trust in India and the second-richest in the world.

From The Hindu:

The appointment of Infosys Foundation chairperson Sudha Narayana Murthy as a member of the Tirumala Tirupati Devasthanams Trust Board is being seen as an initiative that will bolster the image of the board.

The nomination of Ms. Murthy, a prolific writer, philanthropist, and member of public health care initiatives of the Gates Foundation, meets the long-standing demand that only iconic personalities with a religious bent of mind be nominated to the board.”

The Hindu piece doesn’t tell you exactly who Mrs. Narayana Murthy is. She is the wife of the Infosys co-founder, and Infosys is one of the leading business consulting and outsourcing companies in India.

Narayana Murthy, often regarded as the father of Indian IT, figured prominently in Thomas Friedman’s “The World Is Flat” (which I have trounced on several occasions). Murthy, a Kannada Madhwa Brahmin, may be an entrepreneur but he is a self-proclaimed socialist.

He, like fellow-globalist Nandan Nilakeni, the other co-founder of Infosys,  is also an ardent promoter of the digitilization and e-surveillance of India.

Nilekani heads the Unique Identification Authority of India (UIDAI) which, along with the RBI, is the driving force between the imposition of the national biometric ID card, Aadhar. His former boss, Narayan Murthy, formerly headed the National Payments Corporation (NPC), the umbrella outfit that covers all retail payment systems like merchant cards, ATMs, etc.

Nilekani is a Konkani Brahmin and second-generation Fabian Socialist:

His father worked as a general manager of Mysore and Minerva Mills and subscribed to Fabian Socialist ideals that influenced Nilekani in his early years.”

The Hindu article also doesn’t mention the significance of the Tirumala Tirupati Devasthanams (TTD).

They oversee the work of the second richest and most visited religious center in the world, taking in some 130 million rupees a month (about 13 crore rupees or nearly 2 million dollars). The trust earned 2600 crore rupees (26 billion dollars) last year.

The trust oversees not only the Tirumala temple in Andhra Pradesh, but Hindu temples all over the world. Besides this, it is involved in numberless charitable works and in the propagation and preservation of Hindu and Sanskrit classics.

Please note that enormous amounts of gold, silver, and other donations flow into the temple coffers regularly:

While gold alone is estimated to add up to one tonne a year in offerings, silver, diamond and other items also flow into the temple trust’s exchequer. “In the case of property deeds, due procedure is followed by the concerned department to transfer the title,” noted an official.”

and this:

The temple trust said in April that it had deposited 1,311 kg of gold with Punjab National Bank under India’s Gold Monetisation Scheme. The deposit apparently is under a three-year short-term programme that earns the trust an annual interest of 1.75 percent.

In a statement, the temple’s investment committee expressed satisfaction at the interest rates earned from its investment so far. Further, it sought a shorter investment time frame between one to three years for depositing its yearly turnout of gold. The temple trust may negotiate with banks that would offer higher interest rates.

The trust, which seeks gold, not cash, in interest on its gold deposits, has chosen the government’s monetisation scheme’s three year short-term programme primarily for that benefit. Evincing interest to plough in more gold as deposits, it has requested the Reserve Bank of India to extend the same for other gold monetisation programmes that range from medium to long terms.”

Sudha Narayana Murthy replaces mining baron Shekhar Reddy on the board. Reddy was arrested in December 2016, for allegedly laundering money.  A widely circulated picture showed him standing in front of the Tirupati temple with current chief minister O.P Paneerselvam.

 

 

Tamil Nadu Government Threatens Arrest Of Anti-Vaxxers

Times of India:

The state health department has threatened to initiate legal action against those sending panic messages advising people to boycott the coming massive measles-rubella vaccine drive in which nearly 1.8 crore children between 9 months and 15 years will be vaccinated in schools and primary health centres from February 6.

[Lila: around 237,000 children]

The department has the powers to persuade parents to vaccinate their children, said director of public health Dr K Kolandaisamy.

In the past one week, there has been a flood of messages on social media urging parents not to send their children for vaccination in schools and some suggest that they should not send their children to school on days scheduled for vaccinations……

“We are well within our powers even to arrest people who are a hindrance to the success of this scheme. We are working with the cybercrime team to track such panic messages. The scheme is being launched to eliminate the virus from the environment,” he said.”

 

Jallikattu Protests: Nachiket Mor & DARPA Links

A comment on this blog leads to new insight on what’s behind the huge, suspiciously well-organized pro-Jallikattu protests in Tamil Nadu in 2017:

Microsoft’s 2015  crowd mobilization report using mobile phone and social media in Tamil Nadu and Delhi.

That report was in turn based on earlier research summarized in a pdf entitled Vashishta-INTERACTIONS2015″

which concludes as follows:

“This paper presents the first crowd mobilization challenge conducted in India, a developing country context where effective social mobilization is broader and more inclusive than the rich country settings studied previously. We customized the design of the challenge to incorporate local languages and to enable participation at very low cost by anyone with access to a basic mobile phone. The challenge was successful in attracting broad participation, spanning 7,700 participants from all across India in less than a day.

While many participants utilized Internet technologies, we also found interesting usage
of SMS, voice, and face-to-face communications that offered benefits in the Indian context. Unlike previous social mobilization contests, participants relied primarily on their personal networks, and often recruited team members without offering any financial incentives. We synthesize our lessons learned as a set of recommendations to help
future crowd mobilization challenges extend their reach into low-income, offline envi-
ronments.”
These crowd mobilizations experiments came out of research begun by DARPA as early as 2009, when, as I’ve blogged repeatedly, a whole new generation of intelligence projects began, including Wikileaks.
DARPA (Defense Advanced Research Projects Agency) is now actually headed by an Indian:
Since then, DARPA—now headed by India-born Caltech alumna Arati  Prabhakar—has driven innovation using a small, nimble team of 200 persons and delivered to the world technology ranging from the internet to hand-held GPS systems and is now focused on fields as diverse as mathematics, synthetic biology, and neuro-technology. What is critical is that it “does not perform its engineering alchemy in isolation”.
The article quoted above laments that India, which delivers high quality space, engineering, and medical research at a fraction of the cost that the US does, still doesn’t have an equivalent to DARPA.
The problem with that, as the author doesn’t realize, is that the Indians at the helm of such agencies, including Mor and Prabhakar, are simply tools used by larger interests.
And likewise, any “Indian platform” like the posited INDRA, will only be a means by which India’s low-cost, high-power advances are stolen, culled, and otherwise used to profit the Western oligarchy, while ordinary Indians themselves will be enslaved by “their government” (or rather, the financial cabal for which the government now fronts) technologically.
This has already happened, with American partnerships and joint ventures being thrust on Indian universities and promoted to Indian students, ostensibly for bringing local institutions up  to international standards, but, in actual fact,  for IP theft.
Many of these recently developed institutions, like Vellore Institute of Technology,  receive enormous promotion from left-wing English language papers like the Hindu.
It would be a reasonable guess that, with student bodies drawn from neighboring countries, they will be infiltrated by Chinese, US, and other intelligence agents.
Meanwhile, Microsoft, as well as the Bill and Melinda Gates Foundation,  are behind the push toward “cashless” in India.
Gates had already been a big player in computer systems used in the public sector in the country, as well in so-called philanthropic efforts implementing the UN Millennium goals, the ultimate aim of which – even with the most benign interpretation –  is global population control.
Previous posts (see below) have shown the Gates/NWO  hand behind demonetization in India.
[Scroll down for the original  blog comment posted by Shanty Mathew and my notes]

 

PREVIOUS POSTS RELEVANT TO THE PRO-JALLIKATTU PROTESTS

  1. Tamil Spring Color Revolution, January 18, 2017
  2. Meet the People Behind Tamil People Power, MBP, January 22, 2017  [Quote:The website is dated 2017 and 4/7 of the members seem to be the same people behind the pro-Jallikattu movement, so one wonders if the BiCCI has a substantial presence outside this particular web-page and this particular issue.  Under the tab CAMPAIGNS, one finds a few tweets about Jallikattu and nothing more, which suggests that BiCCI is simply a PR effort intended to create the impression of a substantial Indian body behind pro-Jallikattu activism. I could be wrong, but the evidence so far suggests that a very worthy cause (the viability of Indian cattle breeds) is being used as a vehicle for Tamil identity politics intended either to revive the fortunes of the Tamil parties…..or to co-opt it for some other purpose…” end Quote]
  3. Pro-Jallikattu protests hijacked by violent groups, MBP, January 26, 2017

On Nachiket Mor and the Gates Foundation’s role in Demonetization:

4. Na(chiket) Mo(r) Hatao, Desh Bachao

COMMENT from Shanty Mathew at Inkstainedmind.blogspot.in.

“THIS MIGHT JUST BE SHEER COINCIDENCE… But in September 2015, Microsoft India released a report on how they experimented with “Crowd Mobilization” via mobile phone and social media in Tamil Nadu and Delhi. The experiment was modeled around work done earlier by DARPA (Defense Advanced Research Projects Agency. The report with its vague and amorphous objectives and conclusions is available here (pdf) http://preview.tinyurl.com/j75pq7u

Remember, Nachiket Mor Country Director of Bill & Melinda Gates Foundation India is from TN. (Btw, I want to thank you for bringing up that name.)

Lila: Thanks, and here is the post in which I brought it up.

As you can see, I have blogged about his connection to Aadhar as well.

I didn’t catch the Jallikattu link, but I knew the whole protest was a Rothschild creation, because of the links to the Ford Foundation, the appeal to a UN mandate,  the coordination with Trump’s inauguration, simultaneous appearance of world-wide anti-Trump feminist protests, and also the symbolism of the bull, in relation to Shiva-Shakti.]

COMMENT (continued)

Nachiket Mor, it would seem, is both omniscient, omnipresent, and yet invisible!!!

He was in the TAGUP Committee headed by Nanadan Nilekani which brought up the idea of monopolistic NIUs (National Information Utilities) to leverage Aadhaar. He was, of course, head of the RBI’s Mor Committee which brought out the report laid the roadmap for “cashless payment economy” in India. And he is currently sitting on the board of the RBI and as Director of BMGF.

It would be really interesting to know whose hands are up this sock puppet!”

Alleged Trump Sex Video: From 9-11, Grosvenor Gardens

An interesting factoid:

The infamous alleged fetish video involving Donald Trump and a Russian hotel bed in which the Obamas slept (details delicately withheld on our chaste blog) turns out to have been given to US intelligence officials by none other than Senator John McCain, whose own record is so dodgy it muddies the story even more.

We think the much bigger question than Obama’s bed is Trump’s. Who’s in it? How much in hock is he to Russia?

McCain, an alleged war-hero but documented fink,  was once a POW in Vietnam and, since I just watched “The Manchurian Candidate,” that raises all sorts of questions for me about his own motivations and agenda.

Second, the file on Trump was compiled by a 20 year veteran of MI6 (the British foreign intelligence service), Christopher Steele, who from 1990 until 2009 was also a spy in Russia.

2009 was the year a lot of intel operations, including that of Wikileaks, began operating.

So what did Mr. Steele do in 2009? He opened Orbis Business Intelligence, which compiled the video. Apparently, he was funded by Republican anti-Trump operatives.

Where is Orbis located?

At the commercial site of 9-11 Grosvenor Gardens in London.

Is this another Rothschild/NWO wink or merely coincidence?

If the former,  into which realm of reality, falsity, or some mixture of both, do we consign the video?

And who is  behind it?

Insane McCain, Trump himself, his handlers, the Russians, the financial cabal, the CIA, Mossad, the FSB? Or some combination of these?

And if this is an X-rated rerun of the Manchurian Candidate, with McCain as the brain-washed trigger-man, is it Mike Pence or Hillary Clinton, who is the intended beneficiary?

My bet is the latter.

 

List of NGO’s banned in India

From Karmayog.org:

Blacklisted NGOs

The 600 non-governmental organizations banned by the government up to March this year were funded by the Council for Advancement of People’s Action and Rural Technology, which works as a liaison between the government and NGOs. The council formulates projects and selects NGOs that can implement them. It also funds projects proposed by NGOs in different states, to take care of various development-related tasks. The blacklisted NGOs will not be allowed to start functioning again.

Andhra Pradesh (175), Bihar (123), Tamil Nadu(71), Uttar Pradesh (69) and Rajasthan (31) are the top five states where the blacklisted NGOs are based. Karnataka (22), West Bengal (21), Delhi(21), Haryana (20), Orissa (19) and Maharashtra (19) are in the top 10 states.

The full list of Blacklisted NGOs is at Map & State wise List of Blacklisted NGOs .”

I have a mixed to positive reaction to this. On one hand, a lot of NGO’s are certainly subversive agents of the globalist cabal.  I also question why they should direct government policies and projects.

On the other hand, a blanket banning of NGO’s seems to thrown the baby out with the bath-water.

Again, there is need for looking at things on a case-by-case basis, instead of going in for broad, sweeping policies that damage the good actors along with the bad.

In addition, top-down NGO’s seem to be a kind of contradiction in terms. The whole point of being non-governmental is missed when the NGOs act WITH the central government, rather than independently of them, or at least, only with local governments.

 

Forbes: DeMo Is Sickening, Bizarre, Immoral

Ucnews.in references Steve Forbes’ scathing denunciation of the immorality of demonetization, one of the few pieces in the media that gets to the nub of the matter: this is not about poor implementation or lack of foresight; this is about a fundamental violation of basic rights:

Steve Forbes, in a no-holds-barred column, has said: “What India has done to its money is sickening and immoral.” Well that’s just the title of the column.

Forbes has written, and it must be quoted: “India’s government perpetrated an unprecedented act that is not only damaging its economy and threatening destitution to countless millions of its already poor citizens but also breathtaking in its immorality.”

Further: “Not since India’s short-lived forced-sterilization program in the 1970s – this bout of Nazi-like eugenics was instituted to deal with the country’s ‘overpopulation’ – has the government engaged in something so immoral. It claims the move will fight corruption and tax evasion by allegedly flushing out illegal cash, crippling criminal enterprises and terrorists and force-marching India into a digitized credit system.”

“India is the most extreme and destructive example of the anti-cash fad currently sweeping governments and the economics profession. Countries are moving to ban high-denomination bills, citing the rationales trotted out by New Delhi. But there’s no misunderstanding what this is truly about: attacking your privacy and inflicting more government control over your life.”

“What India has done is commit a massive theft of people’s property without even the pretense of due process – a shocking move for a democratically elected government.”

Steve Forbes has not held back. He has said that by “further impoverishing the least fortunate among its population and undermining social trust, thereby poisoning politics and hurting future investment, India has immorally and unnecessarily harmed its people, while setting a dreadful example for the rest of the world”.

In other words, Forbes is saying that India has just demonstrated how it feels to commit a financial genocide with élan, turning the entire country into a laboratory of extremely unethical fiscal eugenics experiments, turning citizens to guinea pigs of monetary mayhem.

However, the cheerleaders of the prime minister are busy positing this as a global conspiracy against India, a concerted attempt to write off a move that is morally superior because ostensibly it would purge the country of wrongdoers such as black money hoarders and terrorists using counterfeit notes. Those claims have been razed to dust already.

But what is terrifying is the meekness expected of citizens en masse at present. Any Indian echoing Forbes, and there are many, would be branded as an anti-national.”

 

Gates Foundation: From Gvt Radar To RBI Policy Maker

Only last year, in May 2015, the Bill Gates Foundation was being investigated for discrepancies between its accounts and those of the Public Health Foundation of India (in Ahmedabad in Gujarat), a prominent institution in India.

This was part of the Indian government’s decision to put under the scanner a number of subversive NGOs, from the Ford Foundation to Greenpeace.

A little over a year, and the Gates Foundation now has its representative on the RBI board, giving the run around to senior board members and hurrying through an unprecedented cash ban on a scale that is gigantic.

What a transformation.

And what could have led to it?

 

 

Dieudonne Mocks Holocaust Inc., Not Holocaust

In this interview on Iranian TV, Dieudonne describes how he and his wife and children have been physically assaulted by Zionists for his satire.

None of that harassment has been reported widely. While the world has been forced to listen to endless nonsense about the faux-martyrdoms of operatives like Julian Assange and Edward Snowden, someone who really gets beaten up for his political views gets no sympathy.

The comedian also explains why breaking the  taboo against criticizing Zionism is indispensable to releasing the West from the psychic prison in which it lives.

He explains the difference between mocking the political and commercial manipulation of the Holocaust (which he admits to doing)

and mocking the Holocaust itself (which he denies doing).

He points out that in France, in recent  years, the Crucifixion has been forcibly and intentionally displaced by the Holocaust as a symbol deserving public veneration.

[See my post on Pope Francis and the Marc Chagall painting of Christ.]

Indeed, the increasing proliferation of laws supporting the inviolability of Holocaust history in France and elsewhere coincides with the increasing denigration and displacement of Christian symbols.

That displacement is nothing less than cultural imperialism.

Is one human race to replace divinity itself in the public consciousness of another?

If so, by whose will? At whose expense?

In another post I will explain why I still wonder if Dieudonne is yet another face of controlled opposition, but, in regard to the question of whether he is guilty of incitement, the answer is no.

One last point. He was convicted not of “inciting violence,” which is at least a crime, even if  he didn’t commit it.

No, he was charged with something quite different, nebulous, and trumped up “inciting hate.”

Quite apart from the astounding hypocrisy of  such a statement from the West – always boiling over with barbaric ‘two-minute-hates’ (here and here  for instance) directed at this or that unfortunate people who get in the way of its imperial ambitions –  what does inciting hate even mean?

Really, what does it mean?

 

 

 

 

Cops In Car Kill 12-yr-old Boy With Toy Gun

Further evidence of the trigger-happy state of the police in the US in this Raw Story report:

The family of a 12-year-old boy who was shot and killed while he was playing with a toy gun in a Cleveland park has released a report from a team of use-of-force experts who called the shooting “objectively unreasonable,” reports the Cleveland Plain Dealer.

Tamir Rice was playing by himself in a Cleveland park when two police officers were dispatched after receiving a report of “a male black sitting on a swing and pointing a gun at people.”

In surveillance video, the police cruiser can be seen roiling up to Rice with 26-year-old Cleveland cop Timothy Loehmann shooting Rice twice before the car even came to a halt.”

The new report stands in stark contrast to the previous three reports commissioned and released by Cuyahoga County Prosecutor Timothy J. McGinty, whom the Rice family has asked to step aside in the case.

According to Cleveland attorney Subodh Chandra and the New York law firm of Emery, Celli, Brinckerhoff & Abady, who compiled the new report, McGinty’s expert reports are “utterly biased and deeply flawed.”

Morning Of Paris Attack: Drill For Identical Scenario

PARIS, 2015

Before the Paris attacks of 11/13/15, there was a military drill in the morning, preparing for exactly what happened later on, in the evening.

Now consider the following:

CHARLESTON 2015

A federal active shooter drill was being conducted on the day Dylan Roof shot and killed 9 members of a historic black church in Charleston, South Carolina on 6/17/15.

BOSTON 2013

Officials were conducting a large-scale terrorist exercise right across the finish line of the marathon when the Boston Marathon bombing took place on 4/15/13.

OSLO 2011

A few hours before the mass shooting in Oslo by Anders Breivik on July 22, 2011 (7/22/11)  a police emergency squad drill for an identical scenario took place.

MADRID 2004

NATO carried out drills just before the  March 11, 2014 (3/11/14) Madrid train bombings took place.

NEW YORK 2001

The September 11, 2001 terrorist attacks (9-11) took place while a number of federal drills and other exercises were taking place.

These are not the only instances. A little digging reveals that the 7/7 London bombing, Sandy Hook, and many other disasters occurred at the same time drills were running.

True that there are lots of drills being run for all sorts of reasons at any given time, but the coincidence of shootings or bombings following drills that exactly or closely replicate them is a bit too much.

On the other hand, if you concede that these attacks might be staged… or stage-managed….then there is a plausible explanation – the drills provide cover for the government or for government-assisted contractors and operatives who can then blame them on convenient patsies.

Such false-flag terror, envisioned by P2OG and played out during Operation Gladio, is intended to fan the flames of popular anger in the right direction.

 

Paris Attacks Give Hollande Unprecedented Power

Foreign Policy.com:

President François Hollande declared the national emergency immediately after the Nov. 13 attacks. It allows police to break down doors and search houses without a warrant, break up assemblies and meetings, and impose curfews. The order also clears the way for military troops to be deployed to French streets. Since then, French security teams have aggressively raided apartments and houses to round up suspects and weaponry.

French authorities haven’t imposed a nationwide state of emergency since 1961, in the depths of the Algerian War, and the measure approved Friday expands an emergency law that was first drafted to empower Paris to put down the Algerian uprising. With the reform in hand, Hollande will spend the next three months with enormous executive power at his disposal.”

Police Dragnet Targets Muslims In Paris

The Bulletin:

All over France, from Toulouse in the south to Paris and beyond, the police have been breaking down doors, conducting searches without warrants, aggressively questioning residents, hauling suspects to police stations and putting others under house arrest.

The extraordinary steps are perfectly legal under the state of emergency decreed by the government after the attacks Nov. 13 in Paris that left 130 dead — a rare kind of mobilization that will continue. The French Parliament last week voted to extend the emergency for another three months, which means more warrantless searches, more interrogations, more people placed under house arrest.

There have been 1,072 police searches, 139 police interrogations, and 117 people have been placed in custody, the Interior Ministry said Monday. Those included a weekend raid on a restaurant selling halal burgers and Tex-Mex food in the Paris suburbs, where officers found nothing suspicious, after breaking down the doors.

Many of those being swept up are among the hundreds of French who have already been flagged as potential security threats in the notorious S-files of the security services.

The police are now free to pick up and interrogate suspects virtually at will.

 

US Issues World-Wide Travel Alert

The US State Department has issued a world-wide travel alert to US citizens, cautioning them about travel during the holiday season. The last previous alert was issued in December 2014:

The alert does not instruct Americans to avoid travel, but it does urge U.S. citizens to “exercise vigilance when in public places or using transportation.”

“Be aware of immediate surroundings and avoid large crowds or crowded places. Exercise particular caution during the holiday season and at holiday festivals or events,” the State Department said in the alert.

The department said that terrorist attacks remain likely as ISIS members return from Iraq and Syria.

It warned that “there is a continuing threat from unaffiliated persons planning attacks inspired by major terrorist organizations but conducted on an individual basis,” pointing specifically to large sporting events, theaters, open markets and airlines.”

Backlash Against Innocent Muslims

Shadowproof.com:

To be clear: the Islamic State, which claimed the attacks in Paris, is responsible for more Muslim deaths than western deaths. It has killed tens of thousands of Muslims for being “infidels” in the past couple of years. Nevertheless, anti-Muslim hysteria will likely soar to new levels in the aftermath of the attacks in Paris.

Police in Oklahoma shot a man after he called 911 and promised to shoot anyone who looked like a Muslim because of what happened in France. An Ethiopian Uber driver in North Carolina was punched in the head by a passenger, who thought the driver was Muslim. The passenger threatened to kill the driver and refused to believe he was not Muslim.

A Muslim family in Orlando, Florida, found a bullet in their garage door and believed it was retaliation for the attacks in Paris. Shots were fired at a mosque in Connecticut on November 15.

In Ontario in Canada, a mosque was set on fire in what authorities treated as an act of arson. In Toronto, a Muslim woman was robbed and attacked while picking her children up from school. Attackers called the woman a “terrorist” and told her to “go back” to her own country. And, in Calgary, someone broke into a mosque while worshipers were in the middle of a candlelight vigil for Paris and stole donation boxes and a computer.

In Glasgow and West Scotland, the Bishopbriggs Cultural Center, which is used as a mosque by the Muslim community, was set on fire.

On November 17, security removed three men and a woman of “Middle Eastern descent” on a Spirit Airlines flight after a passenger reported “suspicious activity.” One of the people removed had been watching a news report on their phone, which the passenger thought was a video from the Islamic State. The people removed were questioned and then allowed to return to the flight, which was headed to O’Hare International Airport in Chicago.

Two men were removed from a flight to Boston on November 16 after crew expressed concerns. One of the men was in an exit seat and “couldn’t speak English.” A K-9 unit was brought on board to sniff the airplane.

The Islamic Society of St. Petersburg and the Islamic Society of Pinellas County received phone calls from a man who made terroristic threats. The man, who said his name was Martin Schnitzler, claimed to have a “militia” that would come down and “firebomb” and shoo whoever was there in the head. “I don’t care if they’re (expletive) 2 years old or 100,” he added.”

State Surveillance Enters The Bedroom

UPDATE(Picture: George Lawler/metro.co.uk)

I just saw this picture of George Lawlor in a “V for Vendetta” mask.

Something clicked. This is an intelligence created story to sell that “consent app” ( see below).

It’s intelligence, just like the fracas over Halloween costumes at Yale.That’s why I made those posts private.

ORIGINAL POST

Read this and weep.

At the University of Warwick in the UK, George Lawlor, a nineteen-year-old male student with the aggressive demeanor of a ba-lamb,  is in trouble with feminists.

For not wanting to attend a “consent” work-shop intended to deter coercive sexual encounters, he has been harassed to the point that he wants to drop out of university.

Contemporary feminists of a certain sort believe that all men are potential rapists in need of training on how to comport themselves with women, hence the fury.

There does need to be discussion about sex on campus, but lecturing the men alone misses the point. Women also need some advice on how they should carry themselves in public….on why uncontrolled drinking has different impacts on men and women…. and on where they can go alone… and with whom.

Just maybe, the whole idea of mixed dorms needs to be revisited too... and how about limiting access to drugs, alcohol, and porn on campus?

Just lecturing the men seems to be a rather bigoted way of tackling the issue.

But, if that wasn’t bad enough, the article about Lawlor also cites a new “app” (software application) for sexual consent.

It lets potential sex partners  video record their consent before getting together.

That students seem to think this is a good idea tells you everything you need to know about campus today.

Everyone else knows that phone and computer technology is almost completely under government control, unless you consistently encrypt at a very high level. Even so, the equipment and operating systems themselves have enough entry-points for the government.

A “consent app” that records two people agreeing to have sex is as good as sending the agreement in the mail to the police.

As a matter of fact, that is the intended purpose of such agreements in the event of post-coital problems.

All these years, the left has been blaming those near-mythical ” Christian fundies” for dragging the government into the bedroom.

Now,  feminists have sent the police and courts a gold-embossed invitation to participate in people’s sex lives..… and people are cheering.

 

 

The Global Supra-National Climate Czar

From Catholicsm.org:

We close with a quote from Schellnhuber from his own study, published in the year 1998, and entitled “Geocybernetics: Controlling a Complex Dynamical System Under Uncertainty”; and which confirms Wippermann’s grave reservations and critical observations: “While the borders of nation states have become almost irrelevant to global economic players (for instance) after the end of the Cold War, human and natural rights are still confined and dominated by thousands of frontiers. This situation can only be overcome by giving up a good deal of national sovereignty and establishing a true regime of global governance. As a prerequisite, the rather symbolic parts and pieces of the UN system must be transformed into powerful supra-national institutions: allons corriger le futur!”

UK, France, On Verge Of Kafkaesque Police State

The Guardian sounds a warning about the acceleration of surveillance in the UK and France:

Two British MPs, Tom Watson and David Davis, crossed the party divide and with campaigning organisation Liberty, won a legal challenge against the rushed, undemocratic Data Retention and Investigatory Powers Act (Dripa), passed in July 2014.

The High Court found that Dripa was unlawful because it did not adequately ensure that access to, and use of, communications data (though not its collection) was limited to what was necessary, appropriate and proportionate for preventing and detecting serious crime.

The decision has been welcomed for, finally, recognising in the UK what a number of other countries and a slew of independent examiners have demanded: proper judicial oversight of a “general retention regime on a potentially massive scale”. Where it falls down, as do many of those reports, is in accepting, implicitly or explicitly, the euphemistic re-characterisation of mass surveillance as “bulk interception” or “bulk collection”, thus endorsing an incursion into our private lives, papers, thoughts and communications that has no precedent in the law of the land.
Advertisement

Disappointingly, however, the Dripa victory is likely short-lived. Immediately, the Home Office declared its disagreement with the High Court’s decision, pledging to appeal. And of course, the Conservative government has already made abundantly clear its intention to enact a single, comprehensive law – the so-called “snooper’s charter” – which many fear would unleash a tidal wave of surveillance at political and executive discretion.

This is where the other side of the channel comes in. Late on Thursday 23 July, in France’s highest constitutional body, the last safeguard of the rule of law fell, approving what is, by all measures, an intrusive, comprehensive, virtually-unchecked surveillance law.

A pipe-dream for two years, the French law gathered momentum in March this year in the wake of the Charlie Hebdo attack, and was put together in the French parliament under emergency procedures, drastically reducing discussion time and preventing any meaningful debate. The law was overwhelmingly approved by parliament in June and immediately referred to the constitutional council by nearly everyone who could do so, including François Hollande – the first time the president has deferred a law voted by parliament in the Fifth Republic.
France approves ‘Big Brother’ surveillance powers despite UN concern

The case also attracted an unheard of number of amicus briefs, many of which were made public, and most of which involved an impassioned cry about the unprecedented incursion on civil liberties that the law mandates.

And yet, despite this, the French council approved, with very few exceptions, a law that allows intelligence agencies to monitor phone calls and emails without prior judicial authorisation; to require internet service providers to install “black boxes” that filter all internet traffic, combing everyone’s metadata in order to identify deviant behaviours based on unknown parameters and provide access to the agencies; and to bug cars, homes and keyboards for images, sound and data.

All of this, of course, is discussed as being targeted at “suspected terrorists”. But all of it, equally and more significantly, touches us all; anyone and everyone who traverses the internet. The law’s goal is to improve the agencies’ tools for a large variety of vaguely stated purposes: terrorism, but also political surveillance, competitive intelligence for France’s major economic, industrial and scientific interests, the fight against organised crime, and goodness knows what else to come.”

4-Star General: US Dissidents Should Be Interned

From earlier this summer, comes a report that General Wesley Clark, a former NATO commander, has publicly demanded concentration camps for those Americans who are sufficiently disloyal:

The statements made by retired four-star general and former NATO commander Wesley Clark to MSNBC News last Friday in support of placing “radicalized” and “disloyal” Americans in World War II-style internment camps must be taken as an urgent warning by the working class.

Clark, America’s most prominent political general, was speaking not just for himself, but for powerful layers within the US military/intelligence apparatus and ruling oligarchy who fear the growth of social opposition and are preparing to defend their interests, no matter what the cost.

The event that prompted Clark’s televised remarks was the recent killing of four Marines and one sailor at an armed forces recruiting center in Chattanooga, Tennessee. Clark’s proposal for mass internment was advanced as a response to the so-called “self radicalized,” “lone wolf” phenomenon—labels that have been applied to a handful of terrorist incidents over the course of more than a decade. The vast majority of such “lone wolf” incidents have involved hapless and, in some cases, mentally disturbed individuals who were set up by FBI and police agent provocateurs.

If Clark’s proposal were implemented, such “sting” operations and subsequent frame-up trials could be dispensed with, as the “self-radicalized” were identified by their thoughts, statements or Internet postings and summarily thrown into concentration camps.

The scale of his proposed response is so disproportionate to the actual threat—which has claimed far fewer victims than mass shootings carried out by individuals who have shown no sign of being “radicalized”—that it is impossible not to conclude that there are deeper and hidden motives and processes at work.

If one takes Clark’s statements at their face value, the term “Orwellian” does not do them justice. “We have got to identify people who are most likely to be radicalized,” he said in his television interview. “We’ve got to cut this off at the beginning.” In other words, the massive and ongoing surveillance of the American population must be intensified to identify potential radicals and jail them based on their alleged thoughts or expressions.

“In World War II, if someone supported Nazi Germany at the expense of the United States, we didn’t say that was freedom of speech, we put him in a camp, they were prisoners of war,” he added.

Making the implications of his reasoning unmistakable, Clark continued: “If these people are radicalized and they don’t support the United States and they are disloyal to the United States, as a matter of principle, fine. It’s their right, and it’s our right and obligation to segregate them from the normal communityfor the duration of the conflict.”

And for how long would that be, General Clark?

Police State Hungary Arrives

From Politico.com:

According to a law passed by the Hungarian parliament last week and set to take effect on September 15, the Hungarian government may declare a “state of migration emergency” to cope with the thousands of refugees crossing the border. If, on average, more than 500 migrants seek asylum each day for a month, or if more than 1,600 migrants are in reception camps each day for a week, or if migrants riot or commit violent crimes anywhere in the country, a state of migration emergency can be invoked. The emergency can cover particular regions or the entire country. It would initially last for six months — and then be renewed if necessary……..

…….”Refugees’ asylum claims would be speedily processed because, under a law that came into effect on August 1, no refugee will be eligible for asylum if they have passed through a “safe country” before entering Hungary. Since Serbia and all EU states were declared safe under this law, the only way a refugee traveling by land could enter Hungary without passing through a safe state is if the refugee entered through Ukraine. And that’s not where these refugees are coming from.

Virtually every asylum application will now be denied; judges will not even get to the stage of assessing the merits of the refugees’ cases.”

……”The state of emergency scheduled for September 15 will eventually feature draconian military and police powers. Under a law working its way through parliament, a state of migration emergency will permit soldiers to be sent to guard the borders, fully armed. They will be authorized to use dogs, rubber bullets, tear gas and nets to apprehend migrants entering illegally. Deadly force can be used against the migrants if soldiers believe that their own lives are endangered. This law passed the Committee on Police and Defense on September 9 and is scheduled to pass in the parliament on September 22, taking effect immediately.”

….”To create a more permanent police state, the government has more laws waiting in the wings.

Under a draft law recently discovered by napi.hu (with the text of the laws linked at 444.hu), the Hungarian government will create, starting January 1, 2016, a national database with a file on every Hungarian citizen. The Center for Facial Profile Analysis will adapt the photograph on Hungarian citizens’ national identity cards for use with facial recognition technology. Each photograph will be tagged with a “connection code” that will link the biometric bits with a particular person. While the law does not authorize this information to be linked to other files containing personal data, it would be very easy to do so. This new database will be a permanent contribution to the security landscape in Hungary.”

Of course, the author, a Princeton U. professor fails to analyze the other side  – the refugee/migrant flows and the connivance of intelligence agencies from NATO countries in creating this sudden crisis.

If population flows are being used to create “color revolutions” in countries surely a country has a right to defend itself.

But the sad part is that both sides only further policies already anticipated and needed by the powers-that-be.

Thus Police State Hungary it will be.

Germany Reinstates Passport Checks At Border

Germany, as part of the Schengen regime of Europe, did not have passport checks at its borders, making it easy for EU residents and nationals to move freely among Schengen members.

With the influx of Syrian refugees, Merkel has now found the unassailable pretext to reintroduce checks at the Austrian border to prevent “chaos,” chaos that could entirely have been predicted…and probably was:

 Germany is to reinstate controls at the border with Austria as Europe’s top economy struggles to cope with a record influx of refugees, according to media reports Sunday.”

The prospect of European demographic decline coupled with an influx of  high-fertility Muslims from the surrounding regions has been the staple of European nationalist nightmares, from which the notion of Eurabia emerged – a Europe created by Franco-Islamic conspiracy that is hostile equally to the United States and to Israel, or rather, in some views, to Christianity and Judaism.

What is omitted from “Eurabian” style analysis is the rather obvious point that the version of “Christianity” that holds political center-stage in America today is one so thoroughly Judaized as to be a heresy that traditionalist Christians might consider worth opposing.

The same could be said of the liberal Judaism of American Jews, let alone the thoroughly anti-Christian secular spirit of  most cultural Jews and cultural Christians.

On the other side of the equation, “France” and  “Islam” too can be deconstructed:

They  too are golems of the Zionist entity.

As for Islamicization, the chances are much greater that enforced proximity of  Islamic immigrants to European native will give rise to further restraints on speech and thought.

Those restraints, combined with the dissolution of traditional mores, will create nihilism and moral ennui.

In the end, neither Muslim nor Christian will be profited…. nor even the ordinary religious Jew.

This deracinated Europe will only benefit the ruling Sanhedrin.

Eurabia?

If we had one hundredth of the frankness that we devote to sexual matters to give to politics, we would call it Eunuch-rabia.

 

Privacy Expert Questions Europe’s Migrant Crisis

Privacy Surgeon.com:

I’m starting to believe the so-called “migration crisis” facing Europe is little more than a tragic confidence trick. Worryingly, however, it involves dangerous consequences for the rights of every EU resident.

I’m not being heartless. Yes, thousands of refugees have lost their lives in the struggle to reach EU borders. Many more are living in a desperate plight, often at the mercy of human traffickers. That’s not my point.

Relatively few of us have genuinely got to grips with the realities of this situation. It’s a massively complex issue that goes to the heart of geopolitics and national dynamics, but intelligent people should not be sucked into the orchestrated rhetoric that is being peddled. This isn’t the first time we’ve faced such circumstances – and it certainly won’t be the last.

The migration issue is trending across the political landscape of nearly all EU countries. Emerging from the hysteria over rising numbers of asylum seekers is a mix of innovative and humane solutions. Sadly, the “crisis” is also spotlighting the very worst of Europe, spewing out a raft of reactions that defy the very basis of the values that Europe is supposed to uphold.

Instead of making an effort to find a rational way through the difficult issues, some governments have cheered on a contagion mentality which has genuinely terrified entire populations that the barbarians are at the gate. It feels like Donald Trump’s shadow has fallen across Europe.

At one level (though certainly not for the migrants themselves) the situation is nowhere near as dramatic as some media outlets are portraying. At another level, the crisis is far worse for Europe than anyone could imagine. This situation could trigger a backlash for civil liberties across the EU.

Let’s deal first with the raw figures.

At the risk of simplification, here is the top level statistic. The EU’s external border force, Frontex, which monitors the flow of people arriving at Europe’s borders, says some 340,000 migrants have been detected at EU borders since the beginning of 2015. That compares with 123,500 in the same period last year.

My response is “what’s the big deal?

[Lila: Exactly my reaction. Anyone who has actually been in populous, poor, or war-torn countries, would find the numbers nothing so extraordinary.]

…….

During World War II, refugees flooded from Germany to Switzerland, as any Sound of Music fan will remember. Between 1933 and 1939, about 200,000 Jews fleeing Nazism were able to find refuge in France. At around that time several hundred thousand Spanish Republicans fled to France after their loss to the Nationalists in the Spanish Civil War. Unlike the EU of today, nations coped with such circumstances.

It’s true that the current headline figures can look dramatic. More than 300,000 migrants have risked their lives trying to cross the Mediterranean to Europe so far this year, according to the UN. This compares with 219,000 for the whole of 2014.

Nearly 200,000 people have landed in Greece since January this year, while another 110,000 made it to Italy.

To put the current situation into a statistical perspective, imagine a town of 10,000 people calling emergency meetings and getting into a froth of paranoia because ten migrants show up at the town hall office. 

Having said that, the total population of the EU member states is just over half a billion. Is anyone seriously arguing on any basis of rationality that a region of five hundred million people can’t find a way to absorb a peak of an extra half million migrants? In the view of many observers, this isn’t so much a migrant crisis as it is a crisis of political fragility over Europe’s teetering economy and employment.

To put the current situation into a statistical perspective, imagine a town of 10,000 people calling emergency meetings and getting into a froth of paranoia because ten migrants show up at the town hall office. Most of us would condemn such a response.

In line with this reasoning, let’s try to put the situation is a historical context.

Some people might like to forget that the decade leading up to 2001 saw the one of the bloodiest conflicts of modern times – and right on Europe’s doorstep. The Bosnian and Yugoslav wars saw genocide that murdered between 100,000 and 200,000 people (depending on whose figures you accept). States that are now happily part of the European family of nations were obliterating entire communities at the time your fifteen year old child was born. Now, all is forgiven – and almost forgotten.

But at the time, there was misery and human displacement at a scale that people these days can barely understand. Vast waves of refugees poured out of the carnage and tried for a new life in Europe and elsewhere.

Europe whines about a “crisis” of having to deal with an overflow that’s equivalent to less than one tenth of one percent of its population. Compare this to what Croatia agreed to burden at the time of the conflict.

The U.S. Ambassador to Croatia, Peter Galbraith, tried to put the number of refugees in Croatia into perspective during an interview in 1993. He said the situation would be the equivalent of the United States taking in 30,000,000 refugees. The number of Bosnian refugees in Croatia stood at 588,000. Serbia took in 252,130 refugees from Bosnia, while other former Yugoslav republics received a total of 148,657 people.”

Angela Merkel: Stasi Informant

Dialog International.com reproduces the thesis of a recent biography alleging that Angela Merkel’s father used his church as the terrain on which he spied for the East German government:

I have always been curious about Angela Merkel’s background in the former GDR.  Did she always have pro-American, Christian democratic beliefs?  If so, did she suffer any consequences for these beliefs in the repressive GDR system?  Was she spied on by the Stasi?  Was she close to democratic dissidents like Wolf Biermann or Robert Havemann?  Some of these questions are answered in Gerd Langguth’s biography: Angela Merkel.

The key to unlocking the mystery of Angela Merkel is her father, the Protestant Minister Horst Kasner, who emigrated from West Germany to the East Zone in 1954, where he began an effort to “rehabilitate” the church – making it acceptable to the Stalinist SED ruling party.  The church under Kasner thus became another instrument of state domination, and Kasner benefitted greatly from his elite status within the political apparatus.  Kasner’s family also reaped the benefits: luxury home, two cars (most GDR citizens had to wait years for just one Trabant), trips to Italy and other countries outside the socialist bloc.  Angela was able to attend the elite school (Erweiterte Oberschule) along with the sons and daughters of important party functionaries.  Langguth describes how Horst Kassner worked closely together with Stasi informant Clemens de Maiziere on forming the SED church policy. De Maiziere’s son Lothar would later play a decisive role in Angela’s life during his brief stint as DDR-Premier (before he too was exposed as a Stasi informant).

What is interesting about Angela’s formative years is the utter banality and conformity of her life.  While the Perestroika movement was shaking the foundation of the GDR and led to a creative renaissance with novels (Jurek Becker), films and theater(Plenzdorf) , Angela was blithely studying physics at the Karl Marx University in Leipzig, where she was active in the SED youth organization.  Fellow students recall that Angela was Secretary for Agitation and Propaganda and procured theater tickets for her comrades, but her files from that period have mysteriously vanished. 

Her one act of rebellion against her father occured after Die Wende when she joined the new party Demokratischer Aufbruch (DA), started by another Stasi informant Wofgang Schnur.  As Langguth points out, this was a shrewd move on her part, since she could hedge her bets by not joining one of the West parties should the DDR have remained a separate country.  After Lothar de Maiziere made her his deputy spokesperson and the DA became subsumed in the Christian Democrats, Angela caught the attention of Helmut Kohl and the rest is history.  Angela Merkel – a daughter of Stalinist privilege, now the leader of the conservative CDU and quite possibly Germany’s next chancellor. ”

[Lila: This was written before Merkel became German Chancellor]

More in this piece at the World Socialist Web on the nexus between the evangelical church and the East German government that allowed members to spy on the congregation, exert pressure in political circles, and groom Merkel for her own career.

Dystopiaearth.com has more incriminating details, this time from her academic career:

What most Germans don’t know, however, is that Hans-Jörg Osten was her Professor and close confidante at the Academy of Sciences where she was a student. And what they only found out yesterday is that Osten was a paid agent of the Stasi – with documentary evidence from the files to prove it.

ostenStasidoc

In the files (extracted left) her physics professor and fellow FDJ bigwig is unmasked as a spy using the cover name ‘Einstein’.

Today, Hans-Jörg Osten is 56 years old, and a professor at the Leibniz University of Hanover.

The documents go on to say that he was recruited ‘on the basis of the political-ideological cooperation…in his operating activities, he is mainly useful on defence issues, and for the development of people working files. He was always a very reliable worker.’ The ‘defence issues’ thing is a reference to time spent by Osten working in the US. During this period, he was a Stasi spy.

Contemporaries suggest that Merkel had “an unusually close” relationship with her married Professor. Indeed, this tendency of unsere geliebte Geli to stick like a limpet to the big mines before disarming them has been recorded several times before at The Slog.”

Merkel was to go on to spy for the KGB, even on other agents, one of whom was her first husband, and then to parlay her espionage contacts and technical knowledge (a PHD in quantum chemistry) into a political career.

The further suspicion is that her  Stasi/KGB past is behind her suspected blackmail by Mossad into supporting strongly pro-Israeli positions.

Dangers Of Ancestral DNA Data Banks

From GeneticsAndSociety.org:

The New Orleans Advocate recently published a shocking story that details the very real threats to privacy and civil liberties posed by law enforcement access to private genetic databases and familial DNA searching.

In 1996, a young woman named Angie Dodge was murdered in her apartment in a small town in Idaho. Although the police collected DNA from semen left at the crime scene, they haven’t been able to match the DNA to existing profiles in any criminal database, and the murder has never been solved.

Fast forward to 2014. The Idaho police sent the semen sample to a private lab to extract a DNA profile that included YSTR and mtDNA—the two genetic markers used to determine patrilineal and matrilineal relationships (it’s unclear why they reopened the case after nearly 20 years). These markers would allow investigators to search some existing databases to try to find a match between the sample and genetic relatives.

The cops chose to use a lab linked to a private collection of genetic genealogical data called the Sorenson Database (now owned by Ancestry.com), which claims it’s “the foremost collection of genetic genealogy data in the world.” The reason the Sorenson Database can make such an audacious claim is because it has obtained its more than 100,000 DNA samples and documented multi-generational family histories from “volunteers in more than 100 countries around the world.” Some of these volunteers were encouraged by the Mormon Churchwell-known for its interest in genealogy—to provide their genetic material to the database. Sorenson promised volunteers their genetic data would only be used for “genealogical services, including the determination of family migration patterns and geographic origins” and would not be shared outside Sorenson. Its consent form states:

The only individuals who will have access to the codes and genealogy information will be the principal investigator and the others specifically authorized by the Principal Investigator, including the SMGF research staff.

Despite this promise, Sorenson shared its vast collection of data with the Idaho police. Without a warrant or court order, investigators asked the lab to run the crime scene DNA against Sorenson’s private genealogical DNA database. Sorenson found 41 potential familial matches, one of which matched on 34 out of 35 alleles—a very close match that would generally indicate a close familial relationship. The cops then asked, not only for the “protected” name associated with that profile, but also for all “all information including full names, date of births, date and other information pertaining to the original donor to the Sorenson Molecular Genealogy project.”

This is when the case starts to sound like something out of the TV show “CSI.” Sorenson linked the crime scene DNA to DNA from a man born in 1952. That man didn’t fit the age profile of the murderer, so the cops used Sorenson’s genealogical information to trace his male descendant line and find his son, Michael Usry Jr., born in 1979. Then the cops searched Usry’s Facebook page and found he had some Facebook friends who lived somewhat near Idaho Falls. And then through Google searches, the cops learned Usry was a filmmaker who had been involved in making a few short films that had homicide or killings in the story line. (The cop noted in a warrant affidavit “these short films have won awards in several film festivals.”) Based on this completely circumstantial evidence, the Idaho investigators got a warrant to collect a swab of Usry’s DNA.

They called up Usry, told him they were investigating a hit-and-run, and asked him to meet with them. Usry thought he “had nothing to hide” and agreed to the meeting. They took him to an interrogation room, questioned him without a lawyer present, and eventually collected a DNA sample. Then Usry sat on pins & needles for a month waiting for the results.

When the results came in, it turned out Usry’s DNA didn’t match the crime scene sample—despite the close familial markers and other circumstantial evidence, he wasn’t the murderer.

Usry was lucky. The forensic crime scene DNA sample came from semen and likely was single source (meaning it contained DNA from only one person). This means that it was relatively easy for the cops to compare Usry’s DNA against the forensic sample and determine conclusively the two didn’t match. In many cases today, however, forensic samples come instead from “touch” DNA—miniscule samples of DNA deposited on physical surfaces that people have touched. Touch DNA is less reliable and harder to match both because it may not include enough DNA for meaningful interpretation and because it often contains DNA from multiple persons—some of whom may have had no connection to the crime at all. With touch DNA, lab analysts may see a match where none exists. Just this year in San Francisco, the San Francisco Chronicle revealed a crime lab analyst had been making assumptions about poor-quality, incomplete genetic evidence and testified at trial that one of the profiles she generated matched the defendant, which was false. This analyst’s misconduct could affect as many as 1,400 cases. When touch DNA analysis expands to include familial markers, the risk of misidentification only increases.

This risk will increase further as state and local law enforcement agencies begin to use Rapid DNA analyzers—portable machines that can process DNA in less than an hour. These machines will make it much easier for police to collect and analyze DNA on their own outside a lab. Currently, because forensic DNA analysis in a lab takes so long, we generally see its use limited to high-level felonies like rape and murder. However, Rapid DNA manufacturers are now encouraging local police agencies to analyze DNA found at the scene of low-level property crimes. This means much more DNA will be collected and stored, often in under-regulated local DNA databases. And, because most of the forensic DNA found at property crime scenes is likely to be touch DNA—this only increases the risk that people will be implicated in crimes they didn’t commit.

 

Citizen Statement Against Indian DNA Profiling

An excerpt from a Petition against Biometric profiling through Aadhar and Human DNA Profiling:

Notably, Human DNA Profiling Bill has been prepared and which when enacted could require the citizen to give one’s DNA to the state. What ambitions does this reveal? This would complete the journey of subjugation which started with fingerprints and is possibly ending in DNA profiling.
The profiling, and the intrusion of privacy, that is a central aspect of these projects are, among other things, contrary to the Supreme Court’s judgment dated 4th July, 2011 [Writ Petition (Civil) NO. 176 of 2009] where it reiterated that the Right to Privacy is a part of the constitutional Right to Life. The central government has shown disdain towards this judgment by launching aadhaar related projects on the basis of biometrics which is untested and untried, and which have surveillance, tracking, profiling, tagging and convergence at its core.

UIDAI had set up a Biometrics Standards Committee which revealed that ’the biometrics will be captured for authentication by government departments and commercial organisations at the time of service delivery.’ The commercial organisation mentioned herein is not defined. The working paper of the UIDAI revealed that the ’UID number will only guarantee identity, not rights, benefits or entitlements’. It is also said that it would not even guarantee identity, it would only provide ’aid’ in identification. In fact it makes right to having rights conditional on having biometric aadhaar.
Notably, Biometrics Standards Committee had categorically stated that UID/aadhaar’s is meant only for “civilian application” but the order on aadhaar enabled biometric attendance system has been extended to defence employees as well. The fact remains UID was first adopted by USA’s Department of Defence, later by NATO. It has subsequently been pushed through World Bank’s eTransform Initiative in partnership with France, South Korea, Gemalto, IBM, L1, Microsoft, Intel and Pfizer.

Some of them have signed agreements with UIDAI. This constitutes breach of national security.


Across the globe very stringent data privacy law has been framed wherein one’s personal data cannot be used by anyone including the government without your specific consent. But in India there is no data protection law. Aadhaar is akin to a piece of collar which the transnational powers want to tie on the neck of Indian citizens. Government has allowed itself to be misled and it has failed to protect personal sensitive information which has already gone to foreign companies.

It must be recalled that Dr. Manmohan Singh as Prime Minister had distributed Unique Identification (UID)/ Aadhaar numbers among the villagers of Tembhali village in Nandurbar District of Maharashtra on 29th September 2010. “The Aadhaar number will ease these difficulties in identification, by providing a nationally valid and verifiable single source of identity proof. The UIDAI will ensure the uniqueness of the Aadhaar numbers through the use of biometric attributes (Finger Prints and Iris) which will be linked to the number”.

It has now come to light as per a RTI reply of April 2015 that out of 83.5 crore aadhaar numbers issued so far, only 2.19 lakh i.e. 0.03 % comprised of them who did not have a pre-existing ID proof.

It shows how Indians were taken for a ride.

It must also be noticed that even the Identification of Prisoners Act, 1920, of colonial vintage, reads: “The object of this bill is to provide legal authority for taking measurements, finger impressions, footprints and photographs of persons convicted of, or arrested in connection with, certain offences.” According to the Identification of Prisoners Act, 1920, at the time of the acquittal of the prisoner, his biometric data is required to be destroyed. Since 1857, fingerprint identification methods have been used by police agencies in India and around the world to identify suspected rebels, political dissidents and criminals. The method is unfolding to indiscriminately profile citizens in general to identify them. The UID/aadhaar project, however, stores the biometric data forever.

It should be noted that in its report to Parliament, the Parliamentary Standing Committee on Finance has taken on board studies done in the UK on the identity scheme that was begun and later withdrawn in May 2010, where the problems were identified to include”(a) huge cost involved and possible cost overruns; (b) too complex; (c)untested, unreliable and unsafe technology; (d) possibility of risk to the safety and security of citizens; and (e) requirement of high standard security measures, which would result in escalating the estimated operational costs.” Countries like China, Australia, UK and France have also rejected it.

This open declaration of war against citizens’ sensitive personal information like biometric data by transnational entities and governments captured by them paves way for the enslavement of present and future generations through aadhaar database that lies on cloud beyond Indian jurisdiction. Such initiatives must be stopped and boycotted else it will spread its tentacles in every sphere of life and mobility in the country.

Notably, central government itself has filed several written affidavits in the Hon’ble Court contending that right to privacy is a fundamental right. It is remarkable that one former Union Law Minister has complained to the Prime Minister informing him about the blunders being committed by the law officer in question.

There is a compelling logic for rejection of those parties which implicitly or explicitly support tracking, profiling, databasing and mortgaging of citizens’ rights and their sovereignty under the dictates of their donors and non-state actors. The biometric idea is aimed at making citizens transparent before the all mighty Governments so that Government, their servant can remain opaque to safeguard the interests of undemocratic and ungovernable social control technology companies.

In a case of breach of trust central government has proposed to make aadhaar mandatory although the very first promise which legally questionable UIDAI made in its aadhaar enrolment form is/was that it is “voluntary”.

This Public Statement is a follow up of the Statement of Concern against UID/aadhaar issued by 17 eminent citizens at a Press Conference at Press Club of India in New Delhi on 28th September 2010. These citizens included Justice VR Krishna Iyer, Retired Judge, Supreme Court of India, Prof Romila Thapar, Historian, K.G.Kannabiran, Senior Civil Liberties Lawyer, Kavita Srivastava, PUCL and Right to Food Campaign, Aruna Roy, MKKS, Rajasthan, Nikhil Dey, MKKS, Rajasthan, S.R.Sankaran, Retired Secretary, Government of India, Upendra Baxi, Jurist and ex-Vice Chancellor of Universities of Surat and Delhi, Uma Chakravarthi, Historian, Shohini Ghosh, Teacher and Film Maker, Amar Kanwar, Film Maker, Bezwada Wilson, Safai Karamchari Andolan, Trilochan Sastry, IIMB, and Association for Democratic Reforms, Prof. Jagdish Chhokar, ex- IIMA, and Association for Democratic Rights, Shabnam Hashmi, ANHAD, Justice A.P.Shah, Retired Chief Justice of High Court of Delhi and Deep Joshi, Independent Consultant.

A Dalit activist who was one of these eminent citizens said, “This project wants to fix our identities through time. Even after that we are dead. The information held about us will be fixed to us by the UID number. Changing an identity will become impossible. We are working for the eradication of the practice of manual scavenging, for rehabilitation of those who have been engaged in manual scavenging, and then leaving behind that tag of manual scavenger. How can we accept a system that does not allow us to shed that identity and move on? How can a number that links up databases be good for us?”

We reiterate our demand that Bills like Human DNA Profiling Bill 2015 and projects like biometric aadhaar “should be halted before it goes any further”.

Signatories

1. Prof. Anil Sadgopal, Scientist, All India Forum for Right to Education (AIFRTE), Bhopal, Email: anilsadgopal@yahoo.com
2. Prof. Kalpana Kannabiran, Director, Council for Social Development, Hyderabad, Email: kalpana.kannabiran@gmail.com
3. Prof (Dr) Mohan Rao, Centre of Social Medicine and Community Health (CSMCH), Jawaharal Nehru University (JNU), New Delhi, Email: mohanrao2008@gmail.com
4. Dr Meher Engineer, Scientist, former President, Indian Academy of Social Science, Kolkata Email: mengineer2003@gmail.com
5. Ram Bahadur Rai, noted senior journalist, Email: rbrai118@gmail.com
6. Dr Babu Rao Kalapala, Scientist, formerly with National Institute of Chemical Technology, Hyderabad, Email: baburaokalapala@gmail.com
7. Kavita Krishnan, Secretary, All India Progressive Women Association (AIPWA), Email: kavitakrish73@gmail.com
8. Prof D M Diwakar, Professor of Economics, A N Sinha Institute of Social Studies, Patna, , Email: dmdiwakar@yahoo.co.in
9. Arun Kumar, former Member, Press Council of India, Indian Journalists Union, General Secretary, Bihar Working Journalists Union & President, The Times of India Newspaper Employees Union, Patna, Email: karunpatna@gmail.com
10. Sankar Ray, veteran journalist, Email: sankar.ray@gmail.com
11. N D Jayaprakash, Disarmament Researcher & veteran activist seeking justice for victims of Bhopal disaster, Email: jaypdsf@gmail.com
12. Qaneez Sukhrani, urban affairs analyst, Pune, Email: qaneez.sukhrani@gmail.com
13. Kshetrimayum Onil, Lead Coordinator, REACHOUT, Manipur Email:onilrights@gmail.com
14. Shabnam Hashmi, social activist, Anhad, Email: shabnamhashmi@gmail.com
15. Irfan Ahmed, General Secretary, All India Tanjin-e-Insaf, Bihar, Email: irfan.tree@gmail.com
16. Guman Singh, Himalaya Niti Abhiyan, Himachal Pradesh, Email:guman107@yahoo.co.in
17. Dr Umakant, Human rights advocate & independent scholar, New Delhi, Email: uk4in@yahoo.co.in
18. PT George, Intercultural Resources, Delhi, Email: ihpindia@gmail.com
19. Wilfred D’ Costa, Indian Social Action Forum, Delhi, Email: willyindia@gmail.com
20. Prakash K Ray, Editor, bargad.org, Email: pkray11@gmail.com
21. Gopal Krishna, Member, Citizens Forum for Civil Liberties (CFCL), Email: 1715krishna@gmail.com

Sudanese Women Stripped Naked For Crime Against Modesty

Police harassment of Christian women in Muslim-majority Sudan:

A Sudanese court has fined three Christian girls on charges of “immoral dress” for wearing slacks and skirts on their way home from a Baptist church function in June, while it found four other girls who were wearing similar clothing innocent of the charges, the advocacy group Christian Solidarity Worldwide has reported. During their apprehension, 10 girls from the church were forced to strip naked in front of police who inspected their clothing for compliance with Shariah law.

All seven girls were among a group of 12 Christian females who were arrested on June 25 while on their way home from a service at El Izba Baptist Church in Khartoum simply because they were wearing trousers and skirts, which police deemed to be immoral dress.

Two of the girls were released from police custody without charges, while the remaining 10 were forced by authorities to strip out of their clothes and later charged with indecent dress under Article 152 of the Sudanese Criminal Code. Advocates for the girls said they range in age from teens younger than 18 to early 20s.”

Read more at http://www.christianpost.com/news/3-sudanese-christian-girls-found-guilty-of-immoral-dress-after-being-forced-to-strip-naked-in-front-of-police-142835/#qZlQ5UbqKTUojfCu.99

Hong-Kong Introduces “DNA Shaming”

To get an inkling of the abuse possible with DNA profiling of the kind being considered in India, take a look at a public health initiative called “Hong-Kong Clean Up.”

The South China Morning Post has this:

The Face of Litter campaign was launched on Global Earth Day last month for the Hong Kong Cleanup Initiative, organised by online magazine Ecozine and the Nature Conservancy. It was aimed at raising awareness of the extent of littering in the city by pinpointing those responsible and encouraging people to change their behaviour.”

That should ring a bell just there.

“Earth Day” is a holiday central to the ecological movement and, not coincidentally, it is celebrated on April 22, which is the  birthday of Vladimir Lenin, the blood-drenched architect of the communist revolution in Russia in 1917.

A number of people have spotted this coincidence as further proof of the underlying communistic agenda of environmentalism.

Population control,if not depopulation, is its real goal.

Virginia-based Nature Conservancy is a corporate “do-gooder” that I’ve dealt with before.

You can read about its shenanigans in this excellent series published in the Washington Post.

Nature Conservancy has a long history with Goldman Sachs, which just supplied this “non-profit” with a CEO for a mere $700,000.

Nature Conservancy is in the business of monetizing (i.e. putting a financial figure on) environmental efforts, through such mechanisms as “cap and trade” and the “carbon exchange,” both regarded as useless rackets by grass-roots activists.

So what did “Hong-Kong Clean Up” do with the litter it picked up?

It used DNA from the litter to reconstruct the faces of the litterbugs and then posted the faces publicly to shame them.

The firm behind this DNA scheme is PR giant Ogilvy & Mather and the lab tests were done in the US by Parabon Labs.

Ogilvy & Mather has a history of complicity in the US Government’s propaganda efforts, including the War on Terror, the Drug War, and so-called “Greenwashing” – repackaging companies with bad environmental practices as good guys.

Why people resident in Hong-Kong should have their DNA fingered by Americans is anybody’s guess.

Reed Collins, the Ogilvy chief creative officer who led the campaign, says 27 facial composites were created from a combination of 24 DNA samples taken from litter and three controlled samples donated by volunteers.

The faces were used to create “wanted posters” and digital banners, which were displayed in high-traffic areas, including 10 MTR stations and at “the scene of the crime”.

“Because age is impossible to determine through DNA alone, but still integral in creating an accurate portrait, DNA data has been combined with other factors, such as demographics based on the type of litter and where it was collected to determine the approximate age of the litterer,” Collins says.”

Christensen says that although DNA alone can only produce a high probability of what someone looks like, the purpose of the campaign was not to point fingers at specific individuals.”

Despite Ogilvy & Mather’s disingenuous disclaimers, this is on so many levels outrageous.

It breaches privacy in the grossest fashion.

It has endless potential for abuse –

Identity theft

Falsification of evidence

Framing innocents

Blackmail

Refusal of insurance, housing, or other services

Racial and genetic profiling

Targeting for abortion/contraception advertising

Targeting for drug-testing

Targeting for drugs and porn advertising

Targeting for bio-weapons and depopulation programs.

If you think that’s over-reaction, consider the centrality of population control and eugenics in the thinking of every major thinker in the modern leftist pantheon.

Margaret Sanger, Bertrand Russell, Havelock Ellis, and dozens of other influential leftist thinkers, were all enamored of eugenics, population control, and the elimination of undesirables.

The question is not IF DNA profiling will be abused. The question is only WHEN.

 

Indian DNA Profile Usable For “Any Purpose”

In the Hindustan Times, Menaka Guruswamy, a Supreme Court lawyer, points out the dystopian nightmare hidden in India’s 2015 DNA profiling bill:

Most troubling is that the bill provides that the DNA profiles will be made available for identification in criminal cases during judicial proceedings to enable decisions in criminal prosecution for the defence of the accused and, rather strangely, ‘for the creation and maintenance of a population statistics Data Bank that is to be used … in identification research, protocol development or quality control…’.

As if this were not enough, the DNA information can also be used for ‘any other purposes’ as may be prescribed.

The idea that the State can assemble a population data base, not simply a census but a blood history of its citizens, so as to enable identification research or even quality control, is anathema to a constitutional, democratic India.

This bill, when worked in tandem with the Aadhar regime, has the potential to profile, rather intimately, every Indian.

In fact, this bill reads like very bad science fiction, one in which the State runs amok and bad science leads to little truth, many lies and an abuse of our DNA.”

Draconian Kuwaiti DNA Law Sets Ominous Precedent

From July 2015 onward, all Kuwait residents (citizens and foreigners) must submit their DNA or risk up to seven years of jail. This draconian law casts a fearful shadow on the DNA bill now being considered by the Indian government.

From DailyO.in:

Earlier this month, Kuwait enacted a law that makes DNA profiling of its citizens and foreign nationals living in the country mandatory. Anybody refusing to furnish their DNA for this database is liable to be jailed for up to seven years. This means all residents of Kuwait, including Indian workers living there, will have to give samples so that their DNA can be extracted and kept in government custody. To say the least, it is draconian.

Even before the news of Kuwait’s DNA profiling law sank, news has emerged about such a law in India. No, the Indian government is not emulating the Kuwaiti model, but only wants to make DNA profiles of criminals and suspects. The Human DNA Profiling Bill 2015 is slated for introduction in the Indian Parliament during the current session. The full draft of the Bill is not currently in the public domain, but going by the details trickling from various sources (and information based on its earlier versions), it appears that the bill has clauses that violate privacy and leave room for potential misuse.”

Modi Seeks Direct Govt. Interception Of Phones, Net

Saikat Datta at Scroll.in:

Milind Deora, a former minister in the United Progressive Alliance government, has cautioned against the possible misuse of  a new and more sophisticated system of surveillance conceptualised by his government and now reportedly put on the fast track by the Narendra Modi government. Called the Central Monitoring System, it allows government agencies to bypass phone and internet service providers to directly intercept communications. In an interview to Scroll.in, Deora said that he realised the system could lead to “technically lawful but malicious” interception in the absence of a privacy law.

Currently, in India, the sanction of the union home secretary is required before an agency can tap phones or intercept communications. According to an official reply under a query under the Right to Information Act, the home secretary clears nearly 300 phone tap applications every day. This information led to a seminal study by the New Delhi-based Software Freedom Law Centre which found there was very little transparency about what the government is doing with so much of data that it collects through these 100,000 phone taps every year.

Ideally, any phone tap can lead to only one of two results. It can ether lead to conclusively establish that the person whose communications are being intercepted is guilty, as was suspected. Or, it can reveal that the suspicions were not founded and the person is not indulging in any criminal activity.

If the interception shows that the person is indeed guilty as suspected, then the person should be charged under the relevant laws and prosecuted in the courts. If the person is proved to be innocent after the lawful interception has been conducted, there is no guarantee that the material collected during the period when their phones were being tapped has been destroyed. None of the 10 authorised agencies under law has published a transparency report and even when asked for metadata about whether the law is being followed, they have withheld information.”

USG Monitors Poop, Feeds Citizens Cocaine

Here’s the scoop on the fate of  poop in the Electronic Gulag from the American Chemical Society:

The war on drugs could get a boost with a new method that analyzes sewage to track levels of illicit drug use in local communities in real time. The new study, a first-of-its-kind in the U.S., was published in the ACS journal Environmental Science & Technology and could help law enforcement identify new drug hot spots and monitor whether anti-drug measures are working.

Kurunthachalam Kannan and Bikram Subedi note that to date, most methods to estimate drug use in the U.S. are based on surveys, crime statistics and drug seizures by law enforcement. But much illegal drug use happens off the radar. To better approximate usage, scientists have been turning to wastewater. Like a lot of other compounds from pharmaceuticals and personal care products to pesticides, illegal drugs and their metabolic byproducts also persist in sewage. In Europe, a number of studies have been done to see how well wastewater treatment plants are removing illicit drugs from sludge before treated water is released into the environment. But until now, no study in the U.S. had looked at this, likely leading to underestimates of abuse. Kannan and Subedi wanted to form a more complete picture of drug use, so they studied levels of illicit drugs at two wastewater treatment plants in Albany, New York.”

Notice that the scientists in this program are of Indian origin.  I wonder why these two didn’t put their expertise in sewage to better use by figuring out inexpensive ways to treat sewage which is a major need in India, as it is in the US.

As Mike Adams points out, it will only be a matter of time before toilets are microchipped to analyze your excreta in real time.

As he notes, if cocaine is finding its way into sewage and via the treatment procedure back into our drinking water, traces of it must be in the blood of all citizens, making the government guilty of forcing a class-A felony on its citizens.

Anyone drinking tap water is, therefore, consuming class-A felony controlled substances which can then be detected in their bodies in parts per billion concentrations. This is how the police state can arrest and imprison absolutely anyone by claiming they’re a drug user since there’s cocaine in their blood and it’s all over their twenty dollar bills, too!

There probably isn’t a single person living in America today who doesn’t have traces of cocaine on their person or in their blood. Notably, federal laws on cocaine possession make no exceptions for “inadvertent possession” or possession of trace amounts. Even one molecule of cocaine qualifies you to be charged with felony possession.

 

Secret Corporate Espionage, Harassment Of Citizens

From Alternet.org:

Hiring cops, spooks and vets to do corporate dirty work leads to one more trend enabling corporate espionage to flourish. That is a lack of accountability or legal consequence for espionage that clearly breaks domestic law, such as stealing documents, wiretapping, etc. In France or England, where some of these same activities have come to the attention of authorities, those responsible have been prosecuted and some perpetrators have even gone to jail. Not so in the U.S.

“Hiring former intelligence, military and law enforcement officials has its advantages,” the report notes. “First, these officials may be able to use their status as a shield. For example, current law enforcement officials may be disinclined to investigate or prosecute former intelligence or law enforcement agents… In effect, the revolving door for intelligence, military and law enforcement officials is yet another aspect of the corporate capture of federal agencies, and another government subsidy for corporations.”

What Americans Don’t Know

As detailed as the Center for Corporate Policy report is, author Gary Ruskin says most of the information was obtained “by accident.” It wasn’t freely given. It was the result of lawsuits, a handful of whisteblowers, mistakes by those hired to do the corporate espionage, boasts in trade press and other somewhat random sources.

But even so, there is a dark playbook that comes into view. Nonprofits are scrutinzed for vulnerabilities. Computers are hacked. Documents are copied or stolen. Phone calls and voice mail are secretly recorded. Personal dossiers are compiled. Disinformation is created and spread. Websites are targeted and taken down. Blackmail is attempted. Just as bad, Ruskin says, the Justice Department and Congress look the other way.

“The entire subject is veiled in secrecy,” his report says. “In recent years, there have been few serious journalistic efforts—and no serious government efforts—to come to terms with the reality of corporate spying against nonprofits.”

Steven Rosenfeld covers national political issues for AlterNet.

My Comment:

This excellent article describes the rampant misuse of surveillance technology to invade the privacy of thousands of ordinary citizens, to blackmail, harass, and threaten them.

It perfectly sums up my experience since 2007:

1.  Phone-tapping, landline and cell phones.

2. Appearance of private conversations in websites, in a disguised form, recognizable only to myself or very close friends.

3.  Innuendo and slander republished by internet trolls and sometimes blogs. No facts or evidence, just reiteration of the slander, personal abuse. Cyber-stalking.

4.  Infiltrators or spies posing as clients, customers, or visitors, attempting to enter into business with me.

5. Emails deleted or blocked.  Computer trojans, spyware inserted.  VOIP conversations recorded. Blog hacking. Manipulation of Google hits. Threats to readers of the blog.  Manipulation of search results for specific posts. Monitoring via “fake” readers/commenters (they know who they are).

6. Work projects sabotaged.

7. Professional relations sabotaged.

8. At least one accident that seems to have been intentionally staged.

9. Theft of IP.

10. Using proxies to threaten, attack, or discredit through staged provocations. Street theater (paying random individuals to engage in behavior calculated to threaten/cause anxiety).

 

Jade Helm: The Drug Connection To China

Previous posts:

Jade Helm: Training, Terror, Or Hoax? (May 2, 2015)

Jade Helm –  Part II (May 3, 2015)

This is my third post on Jade Helm 15, the special forces drill spread out across nine US states that is scheduled to run from July 15 to September 15, 2015.

JADE HELM: THE DRUG CONNECTION TO CHINA

Again, my starting point is going to be the Jade Helm logo and name.  These things are usually carefully chosen and are worth more than cursory examination.

So far, I’ve suggested the following readings:

1. The crossed arrows and upright dagger is the logo of one of the Special Forces, the Green Berets. The Green Berets took their logo from British commandos, who got it from South Africa. (Uncontroversial).

2. The clog in the center symbolizes anarcho-syndicalism and revolution and is also associated with Jewish oppression and suffering, at the hands of the Nazis and Muslims (in the middle ages).

Connecting the Nazis and Islam is fairly typical of neo-conservativism and also, covertly, of left-liberalism.

(Convincing)

3. Jade Helm =  Green Helmet = Nazi helmet (Plausible, not convincing).

I am still dissatisfied with my parsing of this last part:

1. Since  the clog indicates syndicalism and leftist revolution and also evokes Jewish suffering under Nazis and Muslims,  a Nazi interpretation of the term Jade Helm is precluded rather than indicated.

2. The Nazi helmets are described as “apple-green” and sometimes “olive.” Jade might be green, but it’s not really the word you would use in that context.

What is Jade?

Jade is an opaque green stone and has a long association with China.

What is the Chinese angle in all this?

One. Communists run China.

But behind the egalitarian rhetoric, forrmer Chinese Premier Li Peng was and current PM Li Leqiang is at home with the rich and powerful, although whether they are in any way related either to a common family that includes the Hong-Kong plutocrat Li-Kashing  (worth over $35 billion) or to the “New World Order ruling-family blood-line” of Li, as suggested by conspiracy researcher Fritz Springmeier, is too much for me to figure out here.

Secondly, mega investment bank Goldman Sachs, which supplies governments and agencies with officials through out the West,has extended its reach into the state in China.

Goldman Sachs is a leading part of the Rothschild complex of ruling families and financial houses. The House of Rothschild is the architect of the New World Order.

Third, the Chinese holds over a trillion in US debt. The US government cannot meet those claims.

Fourth, received wisdom is that China has overtaken the  US as an economic power.

Just take a look at what Rabbi Cahn’s best-selling book says  – the American century is over; the Chinese century has begun.

China-boosting is very much a part of the Rockefeller/Rothschild New World Order.

And the Chinese recently announced a new economic world order.

Zion is not necessarily centered on Israel. It is more broadly “the kingdom of God on earth,” that is, a humanist/man-created utopia.

Zion,  in what is called British-Israel ideology, is also England’s “fair and pleasant land,” to quote gnostic William Blake’s  “New Jerusalem”.

British-Israel dogma holds that the “lost tribes” of Israel,  the ten northern kingdoms of Israel after the Assyrian invasion, were dispersed and eventually became the nations that now constitute Europe.

In Brit  Israel teaching, the thrones of Scotland and England derive from the House of David and the Anglo-Saxon race is the true Israel.

[This genetic dogma should not be confused with the authentic Christian teaching that believers in Jesus are the “true Israel.” That is a matter of belief and not blood.]

British-American belief and Zionist belief coincide, since the House of Rothschild is also married into the royalty of Britain and it also claims descent from the House of David.

So “the New Jerusalem” can be led as well from Britain (or America) as from Israel.

In fact, Blake’s poem, “Jerusalem” was prominently featured at the London Olympics of 2012, which was clearly meant to be the inaugural ceremony of the New World Order.

There was also the 2012 logo at the Olympics that set off a fire-storm for looking exactly like the word Zion.

The global order, whether neo-conservative and pro-Israel, or liberal-left and anti-Israel, is  Zionist in this British-Israel sense.

Zion in this context is never the heavenly/spiritual paradise of the Gospel, which is a genuine Christian teaching.

The Zionist’ Zion is an earthly, not a spiritual, kingdom.

This Zion  is also the state-less utopia promised to communist dupes after the “proletarian” revolution. The dupes don’t seen through the skin-deep secular language  of communism to its sacred, occult skeleton.

Communism may be godless, but it is a godless religion, with capitalists as devils, workers as saints, Marx as its prophet, and a future classless, gender-less society as paradise.

This is the political and ideological back-ground you need before you understand why Jade Helm has got to refer to China.

Now for the role of China in Jade Helm 15.

In one sentence:

Chinese gangs partner with the drug cartels that control the area of Mexico below the main theater of Jade Helm – 15 in south-western USA.

Arrests last Christmas in the Philippines confirmed that Chinese gangs based in Hong-Kong – called triads – are heavily involved with Mexican drug gangs in the manufacture and supply of methamphetamine (“crystal meth”) for which there is massive demand in the US.

Tightening regulations on access to the precursor chemicals in Mexico and the US and lax regulation in China have given an opening to gangs in Hong-Kong to make money smuggling precursor chemicals, along with Asian gang members, into the West.

It is a lucrative trade, in which a single shipment can bring in $10 billion.

Two triads were named in the raid – “14K” and “Sun Yee On,” both among the three most important in Asia.

The triads are known to have deeply penetrated Hong-Kong and Chinese intelligence and  government with the backing of Hong-Kong’s plutocrats, including, reportedly, Li Ka Shing.

A 1997 Canadian Mounted Police report describes the extent of Hong-Kong and Chinese ownership of Canadian businesses and real estate; their ties to organized crime and to Chinese/Hong-Kong intelligence; and their control of the Canadian financial services industry.

A 1999 Intelligence Assessment by the US Southern Command (SouthCom) warned of the threat posed by Li Ka-shing’s containerized shipping facilities in the Bahamas and Panama. US intelligence services were afraid of the leverage Ka-shing possessed with the Panamanian government because of his business; they warned about his business dealings with the government of Communist China, including the Red Army; and they were certain that he was involved in smuggling drugs.

The report indicates that Li Ka-shing met with then Commerce Secretary Daley at a luncheon hosted by Goldman Sachs on its boat, “The Monkey’s Uncle,” on a Hong-Kong trade trip.

Also present were a who’s who” of organized crime families from Hong-Kong, including Henry Fok of the 14K Triad and Robert Kok, who was allegedly involved in smuggling heroin in Burma and whose son Peter was the business partner of the husband of Senator Dianne Feinstein’s (Dem – CA).

(To be continued in the next post)

 

Jade Helm: Part II

Previous Post on Jade Helm: 

 Jade Helm 15 – Training, Terror, Or Hoax? (5/2/15).

Jade Helm – Part II

The Symbolism of Jade Helm:

That the clog is a symbol of the Nazi concentration camp has been noted also on the Common Sense Show.

This is helpful, because overnight I was wondering if I was being  paranoid.

So the clog can symbolize anarcho-syndicalism, the French Revolution,  Jewish persecution by Muslims during the middle ages and by Nazis in the 20th century, and also orthodox Sephardic Jews, as I posted earlier.

That connection makes me more confident that Jade Helm could be read as Green Helmet, which is the color of the steel helmets of the Nazi army.

Here’s the Jade Helm logo again:

Special ops: Operation Jade Helm will involve Green Berets and SEALs and special forces from the Air Force and Marines starting in July and lasting 8 weeks

The Reach of Jade Helm:

I wrote before that some of the blogs were getting it wrong about the number of forces being deployed. 1200 is the number only in Texas.

This blog seems to think that that will be the largest number overall in any individual state, but that the largest numbers at any specific time will be in Florida and Mississippi, because the HQ’s of the operation are located there, at Eglin Airforce Base and Camp Shelby, respectively.

Eglin Airforce Base lies about 60 miles east of Pensacola in north-west Florida. Camp Shelby in southern Mississippi is the largest reserve training site in the country.

Most interestingly,  local HQ in at least 3 of the Texas counties involved will be set up at private ranches, two of them being that of Steve Blaylock and of T. Michael O’Connor.

Reportedly, the ranches were volunteered and the owners are not compensated in any way, not even with tax write-offs.

Previous Drills:

There was a large military drill in Fort Lauderdale, Florida, at the end of March.

On April 11, 2015, armed national guards patrolled a neighborhood in Ontario, California.

Abrogation of Law:

The National Defense Authorization Act of 2012 had a section providing for the indefinite detention of US citizens on suspicion of terrorism. The provision was reaffirmed by Obama in 2014.

Context of false-flags and black ops

A good article published at Global Research rounds up the various false-flags and black ops that make people wary of Jade Helm. It makes the point that the alternative media is not to be trusted either.

When the Washington Post condemns conspiracy theories by featuring them prominently, the reader is probably wise not to take either the theories or the critics at face-value but to reserve judgment until he understands all the facts for himself.

 

 

 

 

 

 

 

Jade Helm: Training, Terror, Or Hoax?

Update 9:

The clog in the Jade Helm logo has a number of associations.

Jews were forced to wear clogs around the neck during times of Islamic persecution in the 10th and 11th century; and, later, under the Nazis,  Jewish prisoners were forced to wear clogs rather than shoes.

Clogs are also associated with workers’ movements and with anarcho-syndicalism.

Among Sephardic Jewish women in Jerusalem, the wearing of clogs was associated with ascetic piety and conservatism.

Most interestingly, they were adopted by the sans-culottes, the Republicans, to differentiate themselves from the aristocrats, during the French Revolution, an upheaval that was one of the first triumphs of Masonic subversion.

Update 8

Several websites are claiming that Jade Helm is an acronym for Joint Assistance for  Deployment and Execution and Homeland Extraction of Local Militants.

They cite two Dept of Defense documents, only one of which I could find on the web and that one certainly doesn’t contain Jade Helm, although it does discuss global disarmament.

UPDATE 7

I had some more insights into the logo of Jade Helm, particularly the clog.

The anarcho-syndicalist link didn’t fully satisfy me, because communist/anarchism is only a front for much deeper affiliations.

Researching it a bit more, I found that the wearing of clogs in the Nazi camps was not the only time the Jews had been humiliated in this way.

Al-Hakim, the third Cairo Caliph who lived in the 10th-11th century, persecuted Jews and Christians, destroying some 30,000 churches in Egypt and the Near East between 1004 and 1014.  Jews were forced to wear clogs around their necks.

UPDATE 6

Here is the logo of Jade Helm 15

jadehelm1.jpeg

1. The “human domain” is a bit of military jargon that has become popular and just refers to the totality of the human environment in which battle is conducted.

2. The crossed swords comes from the logo of the Green Berets.

3.  “Jade Helm” could be a reference to the Green Berets, but I think it might hint at the helmets of  the Nazi army, which were green.

Through Operation Paper-Clip, the Nazis were foundational in the post-WW II organization of US intelligence.

Or, less conspiratorially,  Jade Helmet could refer to Jade Helmet in Wonderland Online, a video-game by the  Taiwanese studio Chinese Gamer International; in it, the characters have abilities linked to the four elements – strength from earth, support from water, attack from air, and agility from wind.

The transparent clog has been seen as a reference to the sabot (French –  wooden clog) and thus, to  sabotage/saboteurs.

The clog is a symbol of anarcho-syndicalism and revolution, thus Wikipedia:

“In Philadelphia, Pennsylvania, there is an anarcho-syndicalist bookshop called Wooden Shoe Books, and from 2001 to 2003 there was an anarchist magazine in Denmark called Sabot. There is also an American record label focusing primarily on punk-rock and genres revolving around it called Sabot Productions,[2] which uses exactly the same sabot picture seen on the right as their logo.

A flag depicting a regular leather shoe of a type worn by peasants in the 16th century was carried by the peasants in the German peasants war of 1524-1525, a proto-anarchist rebellion.”

But the image could at the same time be a reference to the clogs worn by Jewish prisoners in German camps.

Zionist Jews collaborated with the Nazis and enabled the Holocaust as a sacrificial offering (holo-caust, a word that came into usage in that way only in the late 1960s) for the acquisition of Israel,  a central component of the NWO.

The New World Order is an Anglo-Zionist project.

UPDATE 5

I just saw this report of a massive military drill in Fort Lauderdale that went on for 3 hours on March 27.

I’m not sure of the date….elsewhere, the drill was supposed to have gone on from March 24-27.

The Baltimore riots started on April 19 and ran on until the end of the month, with 250 people arrested and a state of emergency declared within the city limits.

UPDATE 4:

Correction : the number 1200 is only the number operating in Texas. It’s wrongly reported on several sites.

UPDATE 3:

Evangelical Christians who teach that Jesus is the only way have been listed as one of 72 groups classified as potential terrorists, alongside threats like Al Qaeda. Also listed as threats are Tea Party activists, constitutionalists, anti-abortion activists, and people who monger conspiracy theories or attack the New World Order.

I fit the profile in at least 4 categories, if not 5.

UPDATE 2:

Granting that there is a need for RMT (Realistic Military Training), why is it being spread out over 9 states?

And why so much hubbub around the exercise? You would think the whole thing would have been kept much more secret to avoid this kind of controversy around it. This way, the entire world is tipped off about the nature of US training. So that too doesn’t  make sense.

It also doesn’t make sense that only 1200 forces are involved in such an expensive, time-consuming exercise.

(Correction: It’s 1200 in Texas).

And finally, it doesn’t make sense that an exercise that is supposed to train the military to infiltrate civilian populations abroad is working with the FBI, DHS, and local police. What do those outfits have to do with foreign enemy situations?

UPDATE 1:

Here’s a thought that came to me:

JADE HELM =  GREEN (THE COLOR OF JADE) HELMET

Per wikipedia:

In 1935 the Wehrmacht adopted a lower, lighter version of the M1916/18 “coal scuttle” helmet; this became the ubiquitous German helmet of World War II, worn by all branches of the Wehrmacht and SS, police, fire brigades and Party organizations. Collectors distinguish slight production variants as the M35, M40 and M42. Heer helmets were originally painted “apple green,” a semigloss feldgrau somewhat darker than the uniform color; wartime factory and field painting covered a gamut from very dark black-green to slate-grey to olive-green (and sand-yellow in Africa), increasingly in matte or textured paint to eliminate reflections.”

ONGOING POST

(Links and information will be added at the bottom, as I find them)

Truth and Action blog describes Jade Helm 15, an unconventional warfare military drill being run across select states in the country that is causing panic among right-wing and anti-state blogs:

“JH is a challenging eight-week joint military and Interagency (IA) Unconventional Warfare (UW) exercise conducted throughout Texas, New Mexico, Arizona, California, Nevada, Utah and Colorado.

UPDATE: Mississippi, Florida and Louisiana have now been added to the list, bringing the total number of states participating to 9.”

The left-liberal websites of course pooh-pooh any concerns as “right-wing” insanity.

Salon:

The governor of one of the 50 states ordered his National Guard forces to “monitor” the U.S. military to ensure they are not planning to turn Texas into Nazi Germany. This is, by the way, the same U.S. military that has 15 bases in the state of Texas.

There’s really only one thing to ask these Real American Patriots at a time like this: Why do they hate the troops so much?”

Of course, it has nothing to do with”hating the troops.”

If the military has become the tool of an unconstitutional, power-hungry ruling cabal, as many fear it is, the Governor of Texas should be commended for ordering the State Guard to monitor the military in its planned “interactions” with civilians.

Even people who who don’t believe any of the conspiracy theories about Jade Helm and see it as bonafide training for survival in hostile territory, envisage scenes that have tremendous potential for violent confrontation:

They’re going to set up cells of people and test how well they’re able to move around without getting too noticed in the community.”

There is no way of knowing exactly what the scenario presented to the troops will be, but it is a certainty that this is not a federal takeover.

At some point, some or all of the troops will be captured. They will begin attempting to “resist” interrogation and plan their “escape.”

Why the big secret?

These exercises are very common. Let’s suppose you were 1000 miles from where you had to be and you had little or no funds to get there. What would you have to do to arrive safely at your destination while avoiding law enforcement and a military detachment?

These training exercises are not discussed because America’s most elite units will most likely be committing a slew of minor crimes along the way. They will certainly trespass, engage in petty theft, sneak onto a train, hide in the back of an 18-wheeler, they might even steal a car. This training is absolutely necessary for these troops’ survival in extreme situations, however, the public reaction to the above wouldn’t be favorable.””

More below on Jade Helm 15.

1. The drill will be running for 3 months from July  15 – September 15.

Some states have been designated as hostile, including Utah, Texas, and New Mexico.

2. There have been many such drills before, although not anywhere as large. Some of them also designated parts of the US as hostile territory.

3. Special forces (Green Berets, Seals, Marines) will be involved.

The 82nd Airborne Division is also involved.

4. 1200 Special Ops personnel will be involved.

Correction: That’s 1200 in Texas.

Lila: That really is not a lot of people.

5. They will be dropped into select cities from planes and will be armed with weapons filled with blanks.

6. Unlike previous exercises,  Jade Helm will involve the police, FBI, JPRA (Joint Personnel Recovery Agency), DHS ( Homeland Security), FEMA (Federal Emergency Management Agency) and electronic warfare.

7. The goal is to test current plans to reduce or control “events and populations” engaged in “unconventional warfare” against the authority of the US government.

Unconventional warfare used to be called guerilla warfare and according to a 1951 manual includes the following:

The term…includes organized and directed passive resistance, espionage, assassination, sabotage and propaganda, and, in some cases, ordinary combat.”

That means that anyone running a blog, participating in strikes, marches, or other non-violent anti-government activities, including merely communicating through social media sites or posting comments, could be considered a dissident, traitor, spy, or jihadi, as Bob English found out a few months ago.

Now you know why I have spent so much time on the thankless and unlovely task of deconstructing people I suspect of acting as provocateurs, such as Ann Barnhardt, whose histrionics have surely created a fat data-base for the Feds to trawl.

The focus of special ops expertise is usually such things reconnaissance, espionage, assassinations, and extraction of key enemy figures.

In this case, that would be prominent (and maybe not-so prominent) dissidents and internal enemies, such as patriot groups, drug cartels, and Hispanic revanchists.

8. There will be exercises involving the following:

a. Cutting off the flow of goods and services and information in and out of selected areas.

b. Infiltrating civilian groups.

c. Staged provocations or operations.

d. Reporting of suspicious activities or noises by civilians.

9. The exercises will be carried out mostly in remote areas between 11 pm and 4 am, with the knowledge of local law enforcement..

10. The novel “Day of Wrath,” William R. Forstchen, August 29, 2014, involves a scenario in which ISIS enters the US  and slaughters people in a new 9-11, and it  has been linked to the rationale of Jade Helm.

A month later, Fox News ran a story that immigration unions were warning that immigration loop holes were creating a serious threat of ISIS infiltration.

11. Considering the level and complexity of propaganda in the US, it would be simplistic to think that all activists are simply cautioning people sincerely.  My sense is that key activists/websites are involved in the program in a kind of entrapment scenario, intended to precipitate confrontation, for whatever end – whether gun control, or martial law, or some other constraint on civil liberties.

There could also be a legitimate threat in the region that needs the cover story of a military drill and the ISIS angle might be a red herring to distract from the actual objective.

This blogger connects Jade Helm to ISIS and the Baltimore riots, which he sees as instigated.

 

The United States Of Spying

Andrew Napolitano via Lew Rockwell:

“When Gen. Michael Hayden, the director of both the CIA and the NSA in the George W. Bush administration and the architect of the government’s massive suspicionless spying program, was recently publicly challenged to deny that the feds have the ability to turn on your computer, cellphone or mobile device in your home and elsewhere, and use your own devices to spy on you, why did he remain silent? The audience at the venue where he was challenged rationally concluded that his silence was his consent.”

When I read this, I’m convinced that my experience in the past few years of having my private conversations surface in a wide-range of web-sites was not imagination or paranoia at all.

I am more than ever certain that the right explanation is spying by someone with access to government technology who was either a lawless private contractor or the witless employee of one of those urban DHS (Dept of Homeland Security) fusion centers that have become notorious for spying on anti-government dissidents.

Witless, because even the most brain-dead flunky of the government should know that venting your political opinion on a blog, sans any act of armed insurrection, espionage, or other illegal activity, is constitutionally-protected, indeed highly valuable, speech and that the government is not permitted in any way, shape, or form, to go on fishing expeditions in people’s private lives (remember those things?) to either back into charges, in the case of people who are engaged in wrong-doing, or to twist arms, in the case of people who are not  doing anything wrong and can only be coerced by the government’s own illegal actions or threats thereo.

 

Former Canadian Dep. Minister Convicted Of Child Pornography

CORRECTION:

Since I posted this piece, I’ve had time to look at the way in which Levin was charged and find that it’s really not clear what happened.

Beyond the possession of child pornography on his computer – and that’s quite easily downloaded by someone else –  is there hard evidence that he committed any of the crimes about which he, admittedly, fantasized.

Did he actually counsel a real mother with a real daughter to rape her child…. or did he respond to an FBI officer engaged in entrapment, which response, devoid of actual criminal action, is something of a manufactured thought-crime, however repugnant those thoughts might be?

ORIGINAL ARTICLE

From Lifesite News comes a report that the high-level Canadian bureaucrat behind a controversial child sex-ed program, has been convicted in court of being a child pornographer.  (For the American equivalent of the program, see here).

Ben Levin claims to have molested his own daughters and was recorded counseling mothers to molest their own children and prepare them for him to molest them.

For those who think that theories about a  global network  of pedophilic criminals in government are mere conspiracy theory, this will be an eye-opener about how and to what end our rulers are subverting instincts and cultural practices that have protected civilization for millenia:

Ontario Premier Kathleen Wynne’s former deputy minister of education, Benjamin Levin, was convicted March 3 in a Toronto courtroom to three charges involving child pornography: making written child pornography, counseling a person to commit a sexual assault, and possession of child pornography.

After Justice Heather Adair McArthur of the Ontario Court of Justice accepted Levin’s guilty plea to the three charges, crown counsel Allison Dellandrea said neither the crown nor Levin’s lawyer, Clayton Ruby, disputed the “agreed statement of fact.”

Among the more lurid details contained in the statement are the admission that Levin, in internet chats, claimed he had sexually abused his own daughters, hoped his daughters would make his grandchildren available to him for sex, and counseled an undercover officer on how to groom a child for sexual abuse. The statement acknowledges that there is no evidence Levin actually abused his children and he has not been charged for that offense.

Levin, in a light grey suit, sat slightly slumped in a chair to the left of lawyer Gerald Chan, often resting his head on his right hand and only once glancing behind at the 40 or so spectators filling the 1000 Finch Avenue courtroom.

These were news media, parents, grandparents, and the odd blogger, some of whom palpably recoiled as Dellandrea read out the statement of facts describing the events leading to the 63-year-old’s arrest on July 8, 2013.

At that time, Toronto police seized three laptops, 11 thumb drives, an XD Olympus memory card, a Samsung cell phone, and an external hard drive from Levin’s home.

They discovered 79 files of child pornography on two of the laptops and the external hard drive, but only 15 images and two videos were accessible to Levin. The rest of the child pornography was found in “computer system-generated folders” created without Levin’s knowledge while he used the Yahoo! Messenger program.

Levin had also created a Word document titled “aaa3” which compiled details of the approximately 1,750 people he had chatted with online “on the subject of subversive sexually interests, primarily those related to sexual contact between parents and children.”

Levin frequented a website, designated as “M” (as it is under ongoing police investigation) that described itself as an “alternative sexual lifestyle social networking site” with chat rooms on “incest” and “teens.”  Levin created his profile on M in 2010, describing his gender as “couple,” and his sexuality as “nothing is taboo.”  His profile, under the username BandB, had been visited 5,103 times, had 29 subscribers and was marked as a favorite by 44 users, according to the statement.

On August 7, 2012, Levin started an online chat with Toronto undercover police officer Janelle Blackadar, who posed as a “sexually submissive, young, single mother with a subversive interest in the sexualization of her children,” the statement reads.

Levin told Blackadar that “he sexually abused his own daughters and other children when they were as young as 12 years old, and encouraged D.C. Blackadar to do the same.” There is no evidence that Levin actually did so, nor has he been charged with this offence, the statement points out.”

Big brother IS watching you

Nick Cohen at the Guardian explains why people who justify national ID schemes are completely mistaken:

The British, who survived the First and Second World Wars, the cold war and IRA bombs appear willing to tear up their civil liberties because of Islamist murderers. ….
The standard reply to the public’s belief that “if you’ve nothing to hide you’ve nothing to fear” is to ask: “So you don’t draw your curtains then?”
It is good as far as it goes, but a better warning against unconstrained police surveillance comes from our experience online. Malice and mobbish rage drive the Twitter storms that break more often than the autumn rains…..
The same people who scream “censorship” and “persecution” when one of their own is targeted lead the slobbering pack when the chance comes to censor and persecute their enemies. They want them fined, punished and sacked, and never pause for a moment to consider their dizzying double standards or reflect that the weapons they use against others will one day be turned on them……
Employers examine Facebook pages before they hire staff. A politically incorrect post can lead to your sacking or demotion. …..
Give it the chance and the authoritarian political class will ape the authoritarian managerial elite and be just as malicious as the Twitter heresy hunters.
The Dorset council that used surveillance powers designed to catch gangsters to spy on a mother who was trying to get her child into a decent school is a symbol of our times.
However outrageous and ham-fisted its behaviour was, the authorities could say that parents are breaking the rules if they game the school system. The police will make the same argument once they have the freedom to roam the web. They will say they have a duty to collect evidence of any crime, however minor. They will do it because they can.”

I found the Cohen article archived at aadhaar-articles.blogspot.com, which is an archive of articles focusing on aadhaar and related concerns.

Aadhaar run by “private shop” accountable to no-one

The New Indian Express points out that the Indian biometric ID is essentially being collated and bared for snooping by foreign governments and private corporations, with no accountability to Indian citizens.

The material collected can be used to track, monitor, and control citizens.

It can subject them to unlawful governmental surveillance, as well as to criminal attacks.

The material can also be used to silence dissidents, frame patsies and scape-goats, and terrorize the population at large:

In 2012, the IB warned the state about loopholes in Aadhaar, but the government continued with the enrolment process, sidestepping security concerns.

The NSA top secret documents leaked last week point to the covert operation. “Identity Intelligence is exploiting pieces of information that are unique to an individual to track, exploit and identify targets… ,” the papers stated.

Three types of data is being mined by the NSA which includes “biometric, biographic and contextual.” Biometric data shows an individual’s physical or behavioural traits like face, iris, fingerprints, voice etc. Biographic data gives details of life history, including address, school, and profession while contextual data is about individual’s travel history and financial bank details.

Although, the US government had earlier scrapped Aadhaar-like project for its residents, it surprisingly mounted covert ops to infiltrate biometric database in other countries. The decision of the US to not allow biometric profiling of residents was followed by China, Australia and UK and similar proposals were shot down by the respective governments.

The intelligence agencies raised the contentious provision in the contract agreement that allows foreign vendors to keep the biometric data for next 7 years making it easy prey for NSA. “The contract agreement signed by UIDAI with foreign vendors is absurd. Private companies can easily share it with US spy agency. We have seen how they arm twist private players to gain foothold in their server,” a top intelligence official said, adding the UIDAI also had arrangements with certain private software firms for technology assistance. “

The Bible says you are not your brother’s keeper

Gary North  (h/t LRC) describes how the left twists the Biblical story of Cain and Abel to support the welfare state.

In the story, Cain murders his innocent brother Abel out of envy of his piety and is questioned about it by God shortly after.

North argues that Cain’s famous reply to God,  “Am I my brother’s keeper?” should not be read to support the idea that people ought to be their brothers’ keepers, as it frequently is.

Cain was only temporizing.

He knew full well where Abel’s murdered body lay, since he’d put it there.

And he knew full well that God knew he’d put it there.

God’ question to Cain was only intended to find out whether Cain was willing to admit what he’d done to Abel.

Cain’s answer really has the opposite meaning from the commonly accepted one.

In this version, a keeper can only “keep” (that is, monitor) someone who is mentally non compos or physically incapacitated.

Since Abel was neither, Cain could not be  Abel’s “keeper.”

Cain was perfectly right on this point.

Which was why he made it, since he knew he was perfectly wrong on everything else.

Reading Cain’s reply this way, anyone who is someone’s “keeper” is obliged to “monitor” them.

The “kept” ones  necessarily lose their physical and moral freedom, since they no longer have full responsibility for the consequences of their actions.

Having full responsibility for the consequences of your actions is roughly what it means to be a legal adult.

Obviously, if other people have to foot the bill for your actions, they are going to watch your actions very closely.

The bill could run up steeply, otherwise.

And that is  just what happens when the government (as proxy for the the public) is obliged to provide for its citizens (that is, for everyone).

The bill runs up.

To stop that happening, ostensibly, the government tightens the screws.

When everyone (as the government) monitors everyone (as the public), the results are pretty much what you have in the US, the UK, Europe, and many other countries following the same dysfunctional model of nationhood – a top-heavy bureaucratic police-state, with endless, infinite surveillance.

 

 

 

The Framing of Edgar Steele?

Will Grigg, of Pro Libertate, believes that  Edgar Steele, a white nationalist attorney who faced off against the powers-that-be and earned the wrath of the SPLC (Southern Poverty Law Center) and the JDL (Jewish Defense League), was framed by the Feds.

He was charged in a supposed murder plot against his wife of many years.

Steele was convicted and sentenced to a lengthy jail term,  but died in September this year, apparently from health-related problems:

While the Edgar Steele jury was permitted to hear Loginova’s videotaped testimony, it was not permitted to hear the testimony of Dr. Robert Stoll, who had spent several hours in Steele’s company on June 10 – the day he supposedly planned to murder his wife. Dr. Stoll, a local veterinarian, has filed an affidavit recounting how he had discussed Steele’s health problems and how he was impressed by “the manner of Edgar’s tender affection for his wife and family. I believe that this man’s intent … when I visited him was not to kill anyone, especially his wife.”

To understand the deeply prejudicial nature of Winmill’s rulings in this regard it’s necessary to take into account the composition of the jury: In a case involving an alleged plot by a husband to murder his middle-aged wife, the jury consisted of eleven women and one man.

The panel that emerged from voir dire was ideal for the prosecution’s theory of the case, which could have been the plot from any of several dozen made-for-TV movies of the kind broadcast incessantly on the “Lifetime” cable network: The scheming, unfaithful husband, driven by ego and what remains of his mid-life libido, plots to murder his long-suffering wife in order to take up with a pneumatic trophy bimbo.

Edgar Steele is a widely despised figure. His legal practice was devoted to defending the rights of similarly marginalized and disreputable people out of the conviction that “it is the … politically incorrect whose rights are first infringed and then eliminated,” as he pointed out in a speech he delivered in Jekyll Island, Georgia almost exactly two years before his Stalinist show trial in Boise.

Actually, the comparison to the Soviet-era Russian legal system is unfair, given that a defendant hauled before a Soviet criminal tribunal actually enjoyed a small but measurable chance of acquittal.

After the Bolsheviks seized power in 1917, the jury system — which had been established under Alexander II in 1864 — was abolished and replaced with”People’s Courts” composed of a judge and a panel of two to six Party-appointed “assessors” who heard all of the evidence and decided all questions of both fact and law. The assessors “became known as `nodders’ for simply nodding in agreement with the judge,” wrote federal Judge John C. Coughenour in an article published by the Seattle University Law Review. “People’s assessors virtually always agreed with judges; acquittals were virtually nonexistent…. [U]nlike our adversarial system, the Soviet inquisitorial criminal justice system neither prioritized nor emphasized the rights of individual defendants, but instead paid homage to the interests of the state.”

What Judge Coughenour describes as a contrast between the Soviet and American legal systems is actually one of the strongest points of similarity. Lew Rockwell recently pointed out that in the pseudo-legal proceedings referred to as “trials” by the federal Leviathan, the defendant “wins once every 212 times” — a respectable approximation of “never.” During the late Stalin era, Soviet procurators were ordered to achieve a 100 percent conviction rate; their counterparts in contemporary U.S. federal courts have essentially accomplished that feat. This is because the federal system, like its Soviet predecessor, is designed to serve the interests of the State — and federal juries are typically purged of anyone unwilling to play the role of “nodder” in a show trial.

During jury selection in the Edgar Steele “trial,” Assistant U.S. Attorney Traci Whelan, who presided over the prosecution, carefully scrutinized potential jurors for what she called “hidden biases” against “the United States Government.” Neither Whelan nor Judge Winmill was willing to abide the presence of any juror who understood that the jury’s role is to force the government to overcome the constitutionally prescribed “bias” in favor of the defendant. They needn’t have worried.

In Idaho, the most “anti-government” state in the Soyuz, the Feds were able to win a murder conspiracy conviction in a case without a victim, a murder weapon, or a motive, using only a doctored audio recording and the self-exculpating testimony of an admitted liar who confessed to manufacturing and planting the non-functional bomb. Andrei Vyshinsky would be suitably impressed.

(Note: In the original version of this essay, I mistakenly reported that Dr. George Papcun had offered to fly to Boise for the “pre-trial hearing”; in fact, he had attended a pre-trial hearing, but was prevented by Judge Winmill from testifying at the trial. My thanks to Violet Harris, who attended the trial and took comprehensive notes, for that very important correction. I likewise erred in referring to Dr. Allen Banks as a veterinarian, rather than a research scientist who specializes in chemistry and biochemistry; my thanks as well to Robert Magnuson for correcting that mistake.)

 

Greenwald: Torture porn promoter

An insightful piece at reclusive leftist on one of the most prominent  activists against torture….when it’s done by the government   – “libertarian” Glenn Greenwald.

Greenwald has been unmasked as a corporate/intelligence shill and Iraq war-promoter by his own leftist ex-fans.

 

Update: I have been asked to preface this post with a warning that readers may find it disturbing.)

When I posted a link to Glenn Greenwald’s column the other day, I was unaware of his history as an advocate for torturers. Greenwald has vigorously championed torturers’ rights, has explicitly privileged their version of events over that of their victims, and has asserted — in agreement with the torturers — that “no real pain was inflicted” on the victims.

Of course these aren’t the torturers at Gitmo or Abu Ghraib. It’s the film company of “Max Hardcore,” an extreme pornographer who grossly abused women while filming the proceedings for the entertainment of other men. Hardcore claims his victims were thrilled to be tortured, and Greenwald accepts this point of view unquestioningly.

Amazing what a difference gender makes, huh?

And if you’re thinking that it’s not a question of gender, that the real difference is between prisoners of war and allegedly volunteer performers, think again. I’ll help you:

Imagine that instead of Max Hardcore, we have a U.S. Army dude stationed in Iraq with a sideline in homemade porn. Imagine that this homemade porn is of a very special kind, involving Iraqi boys and young men off the streets, the ones who are scavenging in garbage dumps and living hand-to-mouth. Our imaginary Army pornographer offers these guys $20 each to be in a porn video. Many of them say yes — after all, $20 is a fortune for a street kid.

Each porn video consists of heavy-duty homosexual sadism and racism. The young Iraqi victim in each film is violently penetrated, choked, beaten, urinated on, masturbated on, fed his own feces, and forced to crawl on the floor while saying things like, “I’m a filthy sand n*****” and “Mohammed is a pig-f*****.” The Army pornographer screams racist epithets at the young victim throughout — that is, when he’s not too busy raping and kicking and pissing and force-feeding shit down the Iraqi’s throat. By the end of each video, the Iraqi victim is shrieking in pain and sobbing uncontrollably. When the camera finally shuts off, he collects his $20 and gets the hell out — shocked, shattered, humiliated to his core.

So think about that. Think about this imaginary series of homemade porn from Iraq, and imagine that it’s widely popular — on Army bases, stateside, anywhere white men enjoy fantasizing about torturing exploited Iraqis. How do you think people like Glenn Greenwald would react? Do you think Glenn would be talking loftily about the Army pornographer’s First Amendment rights? Do you think he would say that the videos are simply entertainment? That no harm is being done, to anyone? Would he insist that the central fact of the matter is that the Iraqis are exercising perfect free will? And that by honoring their desire to be humiliated and tortured for $20, he’s respecting them as people?

Of course not. If porn like that existed, there would be an uproar. C*****! People would throw up after 10 seconds of one video. What kind of sick shit is this? The racism! The hatred! The sheer breathtaking cruelty! And the whole surrounding exploitation — god! Paying these garbage dump kids all of $20 to be tortured! It’s too sick to believe. And what kind of insane people get off on this shit anyway? What’s wrong with them? Is our society really that vicious? Liberals all over the blogosphere would be writing long posts about the black heart of American fascism. And people like Glenn Greenwald would be saying that if this shit isn’t illegal somehow, then by god, we need to find a way to make it so.

That’s if the victims were men.

In the real world, of course, there is porn just like that: it’s what Max Hardcore specialized in. But his victims were female, you see. And that makes it okay. You can do anything to a woman — anything at all — and as long as some dude gets an orgasm out of it, it’s okay.

(And I cannot resist noting the extent to which the orgasm, in our current bizarro era of human-rights-as-defined-by-Larry-Flynt, has assumed preternatural importance as a kind of all-purpose salvific justification.

If you’re a guy who likes seeing women get beaten up and raped and mauled, but you don’t get any kind of sexual charge out of it, you’re a creep who hates women. But if it gives you an orgasm, then by god, it’s a healthy and beautiful thing. And anybody who says otherwise is a prude.)”

More here on the so-called “left-libertarian” alliance and what it really fronts for.

OSINT, espionage, & sedition

A university researcher wrote to me a week or two ago. He asked if I would be interested in a project studying Operation Mockingbird and the CIA’s past and continuing use of the news media (and of social media).

A little research into the researcher showed that he was involved in a website promoting the use of  OSINT.

OSINT is the graceless acronym the government bestows on something called open-source intelligence.

OSINT is public information similar to what this blog uses.

Not just media reports, but links on forums,  government data,  court documents, commentary at blogs and in discussion groups, social media postings.

As long as it’s not confidential (a lawyer’s privileged conversation) or obviously private (a home phone number or medical information), it’s all fair game.

Until “national security” gets involved.

Of course, “national security” is an elastic term that seems to include everything.

The empire’s desire for full-spectrum dominance makes anything in outer – or inner – space part of “national security.”

Now, until I encountered the term OSINT in the past few days, I‘d no idea that what I was doing by chance bears a resemblance to what a whole wing of the CIA specializes in.

I do it because I’ve generally found the major media unreliable (and uninteresting) and the alternative media, while far more interesting,  ideologically biased.

But there’s a catch.

OSINT can get an un-credentialed journalist or blogger into serious trouble.

How serious?

Wikipedia on the dangers of OSINT:

“Accredited journalists have some protection in asking questions, and researching for recognized media outlets. Even so they can be imprisoned, even executed, for seeking out OSINT.

Private individuals illegally collecting data for a foreign military or intelligence agency is considered espionage in most countries. Of course, espionage that is not treason (i.e. betraying one’s country of citizenship) has been a tool of statecraft since ancient times, is widely engaged in by nearly all countries, and is considered an honorable trade.”

So, well-paid mercenaries and meddlesome bureaucrats who provoke international conflicts and break domestic and foreign laws while  spying on foreign countries are patriots, while unpaid citizen-bloggers/journalists trying to deconstruct the dense fog  of corporate-state propaganda to help ordinary people should be shot.

Very rational.

That leads me back to the curious invitation in my mail-box.

If gathering open-source intelligence can in some circumstances be seen as  treasonous, then why the invitation?

Blogging from public sources is one thing. But blogging that is intended to inform an enemy might be another.

The OSINT web-site I saw gave me a hint by referring to an open-source “revolution.

Long-time readers of my blog will probably know  how I feel about “revolutions,” especially those led by what I call techno-utopians.

And sure enough, in the last two weeks it seems that the 45-year-old meme of “open source revolution” has been revived.

Yes, 45 years. That’s how old this “cutting-edge” meme is.

Only now it’s migrated from the soft-ware community, where it began, to the intelligence community.

Going back, the term “open-source” was a spin-off from a community of “hackers” creating what was later called free software at an MIT artificial intelligence lab in 1971.

The word hacker here doesn’t mean anything criminal. It’s a positive word for people who take apart and improve on computer programs for the sheer fun of it and for the good of the public.

At least, that’s the self-portrait.

The developer of free software, Richard Stallings, later worked at Lawrence Livermore lab and won a MacArthur “genius” award.

Lawrence Livermore is a government lab devoted to science and research in the interests of national security.

The cypherpunk group, devoted to developing strong cryptography ,  was the group from which Julian Assange and Wikileaks emerged.

It  included one researcher from the Lawrence Livermore lab, as well as many senior people from Bell, MIT, and Sun Microsystems (among others).

Stallings himself is a strong supporter of free software.

He developed the “copyleft” approach to IP, which allows changes to be made to code by innovators, so long as each innovator in turn allows other users the same freedom.

Copyleft also allows people the freedom to commercialize their innovations.

Stallings is a strong supporter of the hacker collective Anonymous, seeing it as a kind of legitimate “street protest.”

You can search this blog to find my ruminations about Anonymous….

(To be continued)

Unknown devices…..

Unknown devices keep showing up under network adapters in my device manager. I keep disabling them and they keep showing up.

They have no signature, no device ID or function, no location or vendor information. They just have the word root and then a number.

Then there’s the comment link on which I accidentally clicked that took me to an empty website. Was someone tying to download something or find my IP address?

My computer got very buggy and slow yesterday. Then my security software keeps turning off.

Worse, there are the unknown devices of my fellow man.

Someone sent me an email at which to contact them. The handle was something like city-slicker@usa.com (not the actual handle, of course).

Now do high-profile people usually have emails with such handles,  and, even if they do, do they give it out to strangers on the web?  Do they insist on contacting you and then insist that you respond only on personal email and private cell numbers?

And then do they comment on this blog using a fake handle?

One with a link on which I accidentally click that takes me to an empty website set up a long while ago?

Methinks I smell a set-up.  Especially when the high-profile one claims to have intelligence contacts/experience.

I could be wrong, of course. In which case, my profound apologies.

But that is why I do not respond except in ways I choose.

And that is why I like to keep it strictly about politics, except for people who have actually intersected with me.

Even then, I tend to be wary.

Anything a stranger needs to tell me can be posted at this blog.

If it’s confidential and has some public importance, disguise the information and post pseudonymously.

If it’s private information, please find a personal friend in whom to confide.

It does you, the reader, and me, the blogger,  no good to confuse web-reality with real-reality.

Ex-KGB Spies Shape the New America

In a  “News with Views” article from 2003 Charlotte Iserbyt analyzes the dynamics of “convergence”whereby the soi-disant capitalist USA merges with the communist USSR, while the population is brain-washed to believe in a Cold War victory of “capitalism” over “communism”:

Reading:  Convergence Theory. 

Also: Convergence Theory (Social Sciences)

and Convergence Hypothesis.

[I use quotation marks around the two terms, because the manner in which they exist today suggests that they are simply two different versions of the same totalitarian system:

“United States-Russian Merger: A Done Deal?”

 Charlotte Iserbyt, News With Views, October 16, 2003

“The average American when confronted with world news that has Putin and Bush embracing one another one year and quarreling/threatening to target one another with missiles the next year, sinks into a state of “cognitive dissonance” whereby he is unable to make sense of anything or to carry on an intelligent conversation about the subject at hand, reacting to one’s comment with nothing more than a “glazed expression.”

This back and forth “planned” agenda is, of course, a brilliant psychological strategy, part of the dialectic, and highly effective in keeping the “sheeple” in line.

When, as a result, none of the conditioned “sheeple” utter a peep over such pre and post-9/11 actions, the “traitors” know that it’s “safe” to take actions such as naming Henry Kissinger, a Soviet agent, to lead an investigation of 9/11… if ever there was a fox overseeing the hen house! (Please refer to Iserbyt article, “Kissinger Out of the Closet” for documentation regarding Kissinger being a Soviet agent.)…..

..The New York Times, in an article dated 8/24/03 entitled “Former Top Russian Spy Pledges Allegiance” stated that the above Center…….

Lila: The Center for Counterintelligence and Security Studies, http://www.cicentre.com a consulting service in Alexandria, Virginia.

“…provides expertise and advice in counterintelligence, counterterrorism and security for the government (repeat government, ed) and companies.”

The hiring of these ex-KGB agents appears to be a result of FBI/KGB collaboration. The New American, July 30, 2001 discussed such collaboration in a news item entitled “Community Policing, East and West.”

It said: “Among Louis Freeh’s supposedly commendable achievements as FBI director, according to Robert S. Bennett, (brother of William Bennett, former Secretary of Education, ed) was the realization of his vision of a ‘global FBI.’…..

….The New York Times article also says, and this is interesting in light of the U.S.-Soviet education exchange agreements which have been going on since President Eisenhower signed the first one in 1958, “Kalugin’s relationship with America began in the late 1950’s, when Communist officials noticed his skill with languages. He was a K.G.B. trainee when he was sent to Columbia University as an exchange student.The New York Times goes on to reveal the following: “He was one of the generals of the cold war, a K.G.B. leader who did his best to undermine Western capitalism by recruiting Americans to work for Moscow….

…It was Kalugin, a frequent TV commentator and regular guest on Fox News, who stirred up a hornet’s nest last spring by spilling the beans (to an unnamed intelligence agent) on a spy cruise (go to http://www.cicentre.com and click on SpyTrek) regarding his associates, ex-K.G.B. Chiefs Primakov (also former President of Russia and close associate/advisor to Saddam Hussein who visited with Saddam in February of this year, prior to the war in Iraq) and General Alexander Karpov working for recently retired Admiral Poindexter’s Office of Information Awareness which is attached to the Defense Advanced Research Project Agency (DARPA), an agency of the U.S. Department of Defense responsible for the development of new technology by the military.

This information is covered in detail in an article in the April 2003 issue of Soviet Analyst (www.sovietanalyst.com) entitled “Architect of Soviet Middle East Terror to ‘Advise’ Washington“…Convergence Acquires New Meaning” by Christopher Story, a highly respected researcher and author with offices in London and New York City.

The story was also covered in the May 15, 2003 issue of The Howard Phillips Issues and Strategy Bulletin in an entry entitled “GWB Names Kremlin Spymaster Primakov as Consultant to U.S. Homeland Security Team”.

Please see Iserbyt’s two articles on this subject at www.NewsWithViews.com: “Former KGB Heads to Help Spy on Americans” 4/24/03 and “Former USSR/Russian Premier to Work for Homeland Security” 4/22/03, both of which included information taken from an article in American Free Press entitled “Get Ready for the Sovietization of America”, 4/21/03 by Al Martin, www.almartinraw.com, a former intelligence agent.

Al Martin’s information can also be traced to the same important source, Oleg Kalugin.”

Google: Cyberbullying for profit

An anonymous Australian web-site reveals how Google has a financial incentive to cyber-bully people by elevating smear-and-extort sites like The Ripoff Report.

(I will not link to it, but here is Wikipedia’s entry on the Ripoff Report):

[Side-note: One of my attackers on the web seems to have been affiliated with this site,  which essentially runs an extortion racket by smearing people via hired proxies and then asking for money from the victims to remove the smears.]

UPDATE September 20th 2013: Victory

A large number of major companies have removed their advertisements from Ripoff Report.

This webpage contains an overview of the project.

The updated full report can be downloaded from this url:

https://www.adrive.com/public/9u3aau/Cyberbullying for Profit September 2013.zip

A list of examples URLs from Ripoff Report containing offensive material about children, public figures and individuals is contained in an attachment to the report but an also be found here:

This video explains how Google priorities links from Ripoff Report in its search results.

This video shows that Google considers Ripoff Report has unacceptable  business practices. So why does it advertise on its webpages? The answer is…..advertising revenue for  Google (see above).

Overview

The website Ripoff Report and other websites that emulate the business model of ‘cyberbullying for profit’  publish false and offensive information about minors, teenager, adults and businesses and these are often accompanied by photographs and identifying details.   Ripoff Report also publishes extremely racist and homophobic material, offensive material about religious groups, public figures and ‘celebrities’. While the material about public figures appears to be given a low Google page rank, the names of children, teenagers, ordinary people and small business owners ‘reported’ on these websites is contained in snippets displayed at or near the top of the Google search results (SERPs). These snippets contain names and location details couched in terms such as ‘ripoff’, ‘fraud, ‘pedophile’, ‘scam’, ‘whore’, ‘slut, ‘prostitute’, ‘skank’, ‘murderer’, ‘bitch’ ‘faggot’ ‘liar’ ‘drug abuser’, ‘cunt’, ‘stalker’, ‘HIV’ and/or ‘AIDS’ and other accusatory and derogatory terms.  

Ripoff Report earns revenue from two sources – advertising and payments from victims to the website to ‘rehabilitate’ their reputation in the Google search results or remove the false material. Despite the fact that the claims are false, if a person cannot pay their life is ruined because, as stated by Google, their search engine is often ‘the first place people look for information that’s published’ about a person.

Even if the allegations can be proven to be false Ripoff Report will not remove the material unless they are paid a substantial corporate advocacy’, or ‘arbitration’ feeIn response to removal requests, Google provides a number of excuses and victims must find an ‘ex-gratia’ payment in order to ensure the material is removed from the Google index and ameliorate the danger towards their children and/0r save their livelihoods and businesses. Furthermore, Ripoff Report publishes registered trade names and copyrighted photographs without permission. It claims a copyright over the webpages. This business model is enabled by both a high Google page rank  and advertising revenue. The companies and business that advertise on Ripoff Report supply this revenue and support the endangerment and cyberbullying of children, teenagers and adults and the destruction of careers and livelihoods. This project arose out of my own experience with the publication of false and defamatory material on these websites.

Despite the fact that it takes only a couple of minutes to remove links from the Google index, after four years of notifications, pleading with the website and Google, and litigation against Google it has not been removed. ……I sued Google for defamation in February 2011 with the hope that it would simply remove the links and I could then move on with my life. My hope was misplaced. …….

…Despite the fact that Google refuse most removal requests, they have quietly removed links for other victims of Ripoff Report.

[Lila: I have seen Google actively suppress information that exposes the financial mafia,which is to the left, politically.]

“For obvious reasons I cannot and will not publish the names of these people because they likely paid a substantial amount to either the websites or Google to save their families and livelihoods.

However, Google can and does remove websites and links without much effort.

For example, since December 2011 Google has removed almost 90,000 links from its index at the request of Ripoff Report. Many of those links contained registered trademarks and copyrighted photographs but it appears that Ripoff Report is  not questioned about these DMCA issues by Google. My blog, was also removed from the Google index soon after it went online.  If this appears difficult to believe consider that the removal occurred  after I drew attention to the blog by applying for AdSense advertising as an experiment.

In fact, I clearly stated on my blog that I was suing Google. Apparently’ freedom of speech’ only applies unless one says something negative about Google.

My blog was magically re-indexed in the Google index within hours of my public complaint in a blog conversation in which Matt Cutts was participating. The documents showing the removal and reinstatement of my blog in the Google SERPs can be downloaded from this link.

[Lila : Here is a previous blog post of mine, from 2009, where I reference Ripoff  Report and its owner, in the context of describing the nexus of organized crime and short-sellers.]

Worst cyber-crime is in US, Russia

As I blogged yesterday, the IP addresses attacking me trace back to a Netherland hosting company called Ecatel Network.

ECATEL NETWORK

Ecatel has become notorious for hosting bad actors, from the Russian spammers to pedophile networks.  It also has a reputation for brushing off requests for help from the victims.

Trying to figure out what was going on, I did a bit of research into the world of cyber-crime.

AKAMAI REPORT – CHINA LEADS CYBER-CRIME?

The mainstream media likes to portray cyber-crime as essentially a foreign threat. China, especially, is fingered as the bad guy.

For instance, in January,  US-based Akamai Technologies issued a report  placing China at the head of global hacking, responsible for 35% of cyber-attacks world-wide.

More recently,  the US government pressed cyber-warfare charges against five of China’s army officers.

Nigerians scamsters are rumored to run a close second.

There are two things wrong with this picture. The first is the source of the information.

Akamai Technologies is a “content-delivery network” head-quartered in Cambridge, Massachussetts.

It was founded by an MIT applied math professor, Tom Leighton, and a graduate student at MIT, Daniel Lewin, later killed on AA flight 11, which crashed during the September 11, 2001 attack.

According to his MIT bio, Leighton is a specialist in cryptography,  digital rights, and algorithms for network applications. He also chaired a Presidential committee on Cyber-Security.

Akamai’s co-founder,  COO, and President was the founder of the Road-Runner cable service. Its CEO was a senior VP from IBM.

Akamai’s privacy policy states that it collects IP addresses and effectively tracks clients.

Its partners include Microsoft and Apple and its clients include the BBC, the White House,  Facebook, Twitter, Adobe Systems, Netflix, Yahoo, ESPN Star (India),  China Central Television and Al Jazeera, among many others.

How likely is it that reports from Akamai on cyber-crime are untouched by political pressure?

WORLD HOSTS REPORT –  US, RUSSIA LEAD CYBER-CRIME

Point two. The statistics don’t support Akamai’s pious propaganda.

The Chinese do indeed have a very high number of IP addresses attached to their malicious activity. If sheer volume were the only criterion, China would dominate.

However,  as far as the number of malicious sites and the level of threat involved, the world’s leading cyber-criminals aren’t Chinese.  Not even close.

They are in the US and in Russia, closely followed by smaller countries like the Netherlands, the Ukraine, and Romania.

In Host Exploit’s authoritative World Hosts Report of March 2013, five of the top twenty  malware hosts were based in the US; four were in Russia, two each in the Netherlands, Germany, and the Ukraine.

Chinanet Backbone was the only host from China that made the top twenty.

What was especially interesting to me was to find the originator of the attacks on my computer, Ecatel network, at the top of the list of the world’s leading hosts for malware.

Host Exploit also breaks down cyber-crime by country, with Russia leading the pack.

This is its list of the world’ top ten cyber-crime havens in 2013:

1. The Russian Federation (RU)

2. Belarus (BY)

3. Ukraine (UA)

4. The British Virgin Islands (VG)

5. The United States (US)

6. Romania (RO)

7. Netherlands (NL)

8. Poland (PL)

9. Turkey (TR)

10. Bulgaria  (BG)