IT’S OVER

Voting is meaningless. It will change nothing. The corruption runs too deep. The existing social order must be swept away before there is a chance to put this country on some sort of sustainable path. That will not happen through the ballot box. It will happen in the streets. It will happen on future battlefields within our borders. The entirely predictable implosion of our corrupt financial system will be the trigger. It might happen tomorrow or it might happen in five years, but it will happen. Will you be ready? Greenwald is a truth teller. He is despised by the establishment. Listen to him.

“Hillary is banal, corrupted, drained of vibrancy and passion… But she’s going to be the first female president, and women in America are going to be completely invested in her candidacy. Opposition to her is going to be depicted as misogynistic, like opposition to Obama has been depicted as racist. It’s going to be this completely symbolic messaging that’s going to overshadow the fact that she’ll do nothing but continue everything in pursuit of her own power. They’ll probably have a gay person after Hillary who’s just going to do the same thing… Americans love to mock the idea of monarchy, and yet we have our own de facto monarchy… what these leaks did is, they demonstrated that there really is this government that just is the kind of permanent government that doesn’t get affected by election choices and that isn’t in any way accountable to any sort of democratic transparency and just creates its own world off on its own.”

Glenn Greenwald

QUOTES OF THE DAY

“There simply can be no honor in claiming you are protecting the country, if you are shitting on the Constitution while you do it.”
Morgan Clements – Publisher GlobalIncidentMap.com

“Under observation, we act less free, which means we effectively are less free.”
Edward Snowden

“Every time I do an interview people ask similar questions, such as “What is the most significant story that you have revealed?” […] There really is only one overarching point that all of these stories have revealed, and that is–and I say this without the slightest bit of hyperbole or melodrama; it’s not metaphorical and it’s not figurative; it is literally true–that the goal of the NSA and it’s five eyes partners in the English speaking world–Canada, New Zealand, Australia and especially the UK–is to eliminate privacy globally, to ensure that there could be no human communications that occur electronically, that evades their surveillance net; they want to make sure that all forms of human communications by telephone or by Internet, and all online activities are collected, monitored, stored and analyzed by that agency and by their allies.

That means, to describe that is to describe a ubiquitous surveillance state; you don’t need hyperbole to make that claim, and you do not need to believe me when I say that that’s their goal. Document after document within the archive that Edward Snowden provided us declare that to be their goal. They are obsessed with searching out any small little premise of the planet where some form of communications might take place without they being able to invade it.”
Glenn Greenwald

The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed

Guest Post by Mike Krieger

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Earlier this week, during a talk at SXSW, Edward Snowden pleaded with people to use encryption. While he admitted if the NSA targeted you individually they could almost certainly “own your computer,” he stated that if people use encryption on a massive scale it makes the NSA’s attempts to monitor everyone at the same time much more difficult.

Apparently, the NSA is well aware of this threat. Which is why we now know that the agency has been dedicating significant amounts of taxpayer dollars toward an attempt to infect millions of computers with malware in an attempt at “industrial-scale exploitation,” which would lead to them “owning the net.”

As Mikko Hypponen, an expert in malware stated:

“The NSA’s surveillance techniques could inadvertently be undermining the security of the Internet.”

Move along serfs, nothing to see here.

From The Intercept:

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

It sounds like that is precisely their intent…

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to securet internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.

The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Your tax dollars at works slaves.

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.

An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.

According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.

In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.

But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.

Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.

According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.

Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.

In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.

“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”

In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”

GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing “active” hacking attacks for surveillance “may be illegal” under British law.

When even the GCHQ is questioning the legality of a surveillance program you know you’ve gone too far. Way too far.

Full article here.

In Liberty,
Michael Krieger

QUOTES OF THE DAY

“The National Security Agency’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If a dictator ever took over, the N.S.A. could enable it to impose total tyranny, and there would be no way to fight back.”
Frank Church

“The way things are supposed to work is that we’re supposed to know virtually everything about what they [the government] do: that’s why they’re called public servants. They’re supposed to know virtually nothing about what we do: that’s why we’re called private individuals.”
Glenn Greenwald

“These examples and many others demonstrate an alarming trend whereby the privacy and dignity of our citizens is being whittled away by sometimes imperceptible steps. Taken individually, each step may be of little consequence. But when viewed as a whole, there begins to emerge a society quite unlike any we have seen — a society in which government may intrude into the secret regions of man’s life at will.”

[Osborn v. United States, 385 U.S. 323, 343 (1966) (dissenting)]”
William O. Douglas

“Big Brother in the form of an increasingly powerful government and in an increasingly powerful private sector will pile the records high with reasons why privacy should give way to national security, to law and order […] and the like.”
William O. Douglas, Points of Rebellion

 

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times; where there are no secrets from government.”

[Osborn v. United States, 385 U.S. 323, 341 (1966) (dissenting)]”
William O. Douglas

“Every time I do an interview people ask similar questions, such as “What is the most significant story that you have revealed?” […] There really is only one overarching point that all of these stories have revealed, and that is–and I say this without the slightest bit of hyperbole or melodrama; it’s not metaphorical and it’s not figurative; it is literally true–that the goal of the NSA and it’s five eyes partners in the English speaking world–Canada, New Zealand, Australia and especially the UK–is to eliminate privacy globally, to ensure that there could be no human communications that occur electronically, that evades their surveillance net; they want to make sure that all forms of human communications by telephone or by Internet, and all online activities are collected, monitored, stored and analyzed by that agency and by their allies.

That means, to describe that is to describe a ubiquitous surveillance state; you don’t need hyperbole to make that claim, and you do not need to believe me when I say that that’s their goal. Document after document within the archive that Edward Snowden provided us declare that to be their goal. They are obsessed with searching out any small little premise of the planet where some form of communications might take place without they being able to invade it.”
Glenn Greenwald

“Once the government can demand of a publisher the names of the purchasers of his publications, the free press as we know it disappears. Then the spectre of a government agent will look over the shoulder of everyone who reads. The purchase of a book or pamphlet today may result in a subpoena tomorrow. Fear of criticism goes with every person into the bookstall. The subtle, imponderable pressures of the orthodox lay hold. Some will fear to read what is unpopular, what the powers-that-be dislike. When the light of publicity may reach any student, any teacher, inquiry will be discouraged. The books and pamphlets that are critical of the administration, that preach an unpopular policy in domestic or foreign affairs, that are in disrepute in the orthodox school of thought will be suspect and subject to investigation. The press and its readers will pay a heavy price in harassment. But that will be minor in comparison with the menace of the shadow which government will cast over literature that does not follow the dominant party line. If the lady from Toledo can be required to disclose what she read yesterday and what she will read tomorrow, fear will take the place of freedom in the libraries, book stores, and homes of the land. Through the harassment of hearings, investigations, reports, and subpoenas government will hold a club over speech and over the press.”

[United States v. Rumely, 345 U.S. 41 (1953)]”
William O. Douglas

 

Reddit Censors Big Story About Government Manipulation and Disruption of the Internet

The moderators at the giant r/news reddit (with over 2 million readers) repeatedly killed the Greenwald/Snowden story on government manipulation and disruption of the Internet … widely acknowledged to be one of the most important stories ever leaked by Snowden.

Similarly, the moderators at the even bigger r/worldnews reddit (over 5 million readers) repeatedly deleted the story, so that each new post had to start over at zero.

For example, here are a number of posts deleted from r/news (click any image for much larger/clearer version):

Related posts from other sites – like 21stCenturyWire – were deleted as well:

 

And here are a number of the posts deleted by the moderators of r/worldnews:

 

Write-ups of the same story from other sites – like Zero Hedge – were also deleted:

Two Redditors provide further information on the censorship of this story:

This isn’t the first time Reddit moderators have been caught censoring:

Source links: Here, here, here, here, here and here.

SNOWDEN REVEALS PROOF GOVERNMENT INFILTRATING WEBSITES TO DISRUPT & DISCREDIT OPPOSITION

God Bless Edward Snowden and Glenn Greenwald. The truth will set you free.

The Conspiracy Theory Is True: Agents Infiltrate Websites Intending To “Manipulate, Deceive, And Destroy Reputations”

 

Tyler Durden's picture

In the annals of internet conspiracy theories, none is more pervasive than the one speculating paid government plants infiltrate websites, social network sites, and comment sections with an intent to sow discord, troll, and generally manipulate, deceive and destroy reputations. Guess what: it was all true.

 

 

And this time we have a pretty slideshow of formerly confidential data prepared by the UK NSA equivalent, the GCHQ, to confirm it, and Edward Snowden to thank for disclosing it. The messenger in this case is Glenn Greenwald, who has released the data in an article in his new website, firstlook.org, which he summarizes as follows: “by publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.” Call it Stasi for “Generation Internet.”

 

Greenwald’s latest revelation focuses on GCHQ’s previously secret unit, the JTRIG (Joint Threat Research Intelligence Group).

 

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

 

 

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

 

 

Then there are the tactics used to destroy companies the agency targets:

 

 

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

 

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

 

 

Greenwald’s punchline is disturbing, and is sure to make paradnoid conspiracy theorists crawl even deeper into their holes for one simple reason: all of their worst fears were true all along.

 

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.

 

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

 

At this point Greenwald takes a detour into a well-known topic: Cass Sunstein. Who is Cass Sunstein? Recall: “Obama Picks Cass Sunstein (America’s Goebbels?) To Serve On NSA Oversight Panel.”

 

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

 

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

 

But while until now there was speculation that Sunstein’s policies had been implemented, there was no proof. That is no longer the case:

 

… these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

 

What is perhaps most disturbing is the level of detail these modern day Stasi agents engage in, paradoxically proposing social subversion without realizing they themselves would be susceptible to just that. And all it would take is one whistleblower with a conscience:

 

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human being can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

 

 

 

 

 

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

 

 

 

 

Greenwald’s conclusion is spot on:

 

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

 

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

 

So the next time you run into someone in a chat room or a message board who sounds just a little too much like a paid government subversive… it may not be just the paranoia speaking. For the full details “why not”, read the formerly confidential slideshow below.

 

The Art of Deception

The NSA’s Secret Role in the U.S. Assassination Program

The NSA’s Secret Role in the U.S. Assassination Program
By Jeremy Scahill and Glenn Greenwald
The Intercept
February 10, 2014
EXCERPT – for full article see:
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

“Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

The former drone operator also says that he personally participated in drone strikes where the identity of the target was known, but other unknown people nearby were also killed.

“They might have been terrorists,” he says. “Or they could have been family members who have nothing to do with the target’s activities.”

What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”

The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision.

In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.”

But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.

The NSA declined to respond to questions for this article. Caitlin Hayden, a spokesperson for the National Security Council, also refused to discuss “the type of operational detail that, in our view, should not be published.”

In describing the administration’s policy on targeted killings, Hayden would not say whether strikes are ever ordered without the use of human intelligence. She emphasized that “our assessments are not based on a single piece of information. We gather and scrutinize information from a variety of sources and methods before we draw conclusions.”

Hayden felt free, however, to note the role that human intelligence plays after a deadly strike occurs. “After any use of targeted lethal force, when there are indications that civilian deaths may have occurred, intelligence analysts draw on a large body of information – including human intelligence, signals intelligence, media reports, and surveillance footage – to help us make informed determinations about whether civilians were in fact killed or injured.”

The government does not appear to apply the same standard of care in selecting whom to target for assassination. The former JSOC drone operator estimates that the overwhelming majority of high-value target operations he worked on in Afghanistan relied on signals intelligence, known as SIGINT, based on the NSA’s phone-tracking technology.

“Everything they turned into a kinetic strike or a night raid was almost 90 percent that,” he says. “You could tell, because you’d go back to the mission reports and it will say ‘this mission was triggered by SIGINT,’ which means it was triggered by a geolocation cell.”

In July, the Washington Post relied exclusively on former senior U.S. intelligence officials and anonymous sources to herald the NSA’s claims about its effectiveness at geolocating terror suspects.

Within the NSA, the paper reported, “A motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’”

But the Post article included virtually no skepticism about the NSA’s claims, and no discussion at all about how the unreliability of the agency’s targeting methods results in the killing of innocents.

In fact, as the former JSOC drone operator recounts, tracking people by metadata and then killing them by SIM card is inherently flawed. The NSA “will develop a pattern,” he says, “where they understand that this is what this person’s voice sounds like, this is who his friends are, this is who his commander is, this is who his subordinates are. And they put them into a matrix. But it’s not always correct. There’s a lot of human error in that.”

The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator who controls the “eyes” of the U.S. military’s unmanned aerial vehicles. By the time he left the Air Force in 2011, Bryant’s squadron, which included a small crew of veteran drone operators, had been credited with killing 1,626 “enemies” in action.

Bryant says he has come forward because he is tormented by the loss of civilian life he believes that he and his squadron may have caused. Today he is committed to informing the public about lethal flaws in the U.S. drone program.

Bryant describes the program as highly compartmentalized: Drone operators taking shots at targets on the ground have little idea where the intelligence is coming from.

“I don’t know who we worked with,” Bryant says. “We were never privy to that sort of information. If the NSA did work with us, like, I have no clue.”

During the course of his career, Bryant says, many targets of U.S. drone strikes evolved their tactics, particularly in the handling of cell phones. “They’ve gotten really smart now and they don’t make the same mistakes as they used to,” he says. “They’d get rid of the SIM card and they’d get a new phone, or they’d put the SIM card in the new phone.”

As the former JSOC drone operator describes – and as classified documents obtained from Snowden confirm – the NSA doesn’t just locate the cell phones of terror suspects by intercepting communications from cell phone towers and Internet service providers. The agency also equips drones and other aircraft with devices known as “virtual base-tower transceivers” – creating, in effect, a fake cell phone tower that can force a targeted person’s device to lock onto the NSA’s receiver without their knowledge.

That, in turn, allows the military to track the cell phone to within 30 feet of its actual location, feeding the real-time data to teams of drone operators who conduct missile strikes or facilitate night raids.

The NSA geolocation system used by JSOC is known by the code name GILGAMESH. Under the program, a specially constructed device is attached to the drone. As the drone circles, the device locates the SIM card or handset that the military believes is used by the target.

Relying on this method, says the former JSOC drone operator, means that the “wrong people” could be killed due to metadata errors, particularly in Yemen, Pakistan and Somalia. “We don’t have people on the ground – we don’t have the same forces, informants, or information coming in from those areas – as we do where we have a strong foothold, like we do in Afghanistan. I would say that it’s even more likely that mistakes are made in places such as Yemen or Somalia, and especially Pakistan.”

As of May 2013, according to the former drone operator, President Obama had cleared 16 people in Yemen and five in Somalia for targeting in strikes. Before a strike is green-lit, he says, there must be at least two sources of intelligence. The problem is that both of those sources often involve NSA-supplied data, rather than human intelligence (HUMINT).

As the former drone operator explains, the process of tracking and ultimately killing a targeted person is known within the military as F3: Find, Fix, Finish. “Since there’s almost zero HUMINT operations in Yemen – at least involving JSOC – every one of their strikes relies on signals and imagery for confirmation: signals being the cell phone lock, which is the ‘find’ and imagery being the ‘unblinking eye’ which is the ‘fix.’” The “finish” is the strike itself.

“JSOC acknowledges that it would be completely helpless without the NSA conducting mass surveillance on an industrial level,” the former drone operator says. “That is what creates those baseball cards you hear about,” featuring potential targets for drone strikes or raids.

President Obama signs authorizations for “hits” that remain valid for 60 days. If a target cannot be located within that period, it must be reviewed and renewed. According to the former drone operator, it can take 18 months or longer to move from intelligence gathering to getting approval to actually carrying out a strike in Yemen. “What that tells me,” he says, “is that commanders, once given the authorization needed to strike, are more likely to strike when they see an opportunity – even if there’s a high chance of civilians being killed, too – because in their mind they might never get the chance to strike that target again.”

While drones are not the only method used to kill targets, they have become so prolific that they are now a standard part of U.S. military culture. Remotely piloted Reaper and Predator vehicles are often given nicknames. Among those used in Afghanistan, says the former JSOC drone operator, were “Lightning” and “Sky Raider.”

The latter drone, he adds, was also referred to as “Sky Raper,” for a simple reason – “because it killed a lot of people.” When operators were assigned to “Sky Raper,” he adds, it meant that “somebody was going to die. It was always set to the most high-priority missions.”

In addition to the GILGAMESH system used by JSOC, the CIA uses a similar NSA platform known as SHENANIGANS. The operation – previously undisclosed – utilizes a pod on aircraft that vacuums up massive amounts of data from any wireless routers, computers, smart phones or other electronic devices that are within range.

One top-secret NSA document provided by Snowden is written by a SHENANIGANS operator who documents his March 2012 deployment to Oman, where the CIA has established a drone base. The operator describes how, from almost four miles in the air, he searched for communications devices believed to be used by Al Qaeda in the Arabian Peninsula in neighboring Yemen.The mission was code named VICTORYDANCE.

“The VICTORYDANCE mission was a great experience,” the operator writes. “It was truly a joint interagency effort between CIA and NSA. Flights and targets were coordinated with both CIAers and NSAers. The mission lasted 6 months, during which 43 flights were flown.”

VICTORYDANCE, he adds, “mapped the Wi-Fi fingerprint of nearly every major town in Yemen.”

The NSA has played an increasingly central role in drone killings over the past five years. In one top-secret NSA document from 2010, the head of the agency’s Strategic Planning and Policy Division of the Counterterrorism Mission Management Center recounts the history of the NSA’s involvement in Yemen. Shortly before President Obama took office, the document reveals, the agency began to “shift analytic resources to focus on Yemen.”

In 2008, the NSA had only three analysts dedicated to Al Qaeda in the Arabian Peninsula in Yemen. By the fall of 2009, it had 45 analysts, and the agency was producing “high quality” signal intelligence for the CIA and JSOC.

In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen.

The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala.

The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children. It is not clear whether the strike was based on metadata collection; the White House has never publicly explained the strike or the source of the faulty intelligence that led to the civilian fatalities.

Another top-secret NSA document confirms that the agency “played a key supporting role” in the drone strike in September 2011 that killed U.S. citizen Anwar al-Awlaki, as well as another American, Samir Khan. According to the 2013 Congressional Budget Justification, “The CIA tracked [Awlaki] for three weeks before a joint operation with the U.S. military killed” the two Americans in Yemen, along with two other people.

When Brandon Bryant left his Air Force squadron in April 2011, the unit was aiding JSOC in its hunt for the American-born cleric. The CIA took the lead in the hunt for Awlaki after JSOC tried and failed to kill him in the spring of 2011.

According to Bryant, the NSA’s expanded role in Yemen has only added to what he sees as the risk of fatal errors already evident in CIA operations. “They’re very non-discriminate with how they do things, as far as you can see their actions over in Pakistan and the devastation that they’ve had there,” Bryant says about the CIA. “It feels like they tried to bring those same tactics they used over in Pakistan down to Yemen. It’s a repeat of tactical thinking, instead of intelligent thinking.”

hose within the system understand that the government’s targeting tactics are fundamentally flawed. According to the former JSOC drone operator, instructors who oversee GILGAMESH training emphasize: “‘This isn’t a science. This is an art.’ It’s kind of a way of saying that it’s not perfect.”

Yet the tracking “pods” mounted on the bottom of drones have facilitated thousands of “capture or kill” operations in Afghanistan, Iraq, Yemen, Somalia and Pakistan since September 11. One top-secret NSA document provided by Snowden notes that by 2009, “for the first time in the history of the U.S. Air Force, more pilots were trained to fly drones … than conventional fighter aircraft,” leading to a “‘tipping point’ in U.S. military combat behavior in resorting to air strikes in areas of undeclared wars,” such as Yemen and Pakistan.

The document continues: “Did you ever think you would see the day when the U.S. would be conducting combat operations in a country equipped with nuclear weapons without a boot on the ground or a pilot in the air?”

Even NSA operatives seem to recognize how profoundly the agency’s tracking technology deviates from standard operating methods of war.

One NSA document from 2005 poses this question: “What resembles ‘LITTLE BOY’ (one of the atomic bombs dropped on Japan during World War II) and as LITTLE BOY did, represents the dawn of a new era (at least in SIGINT and precision geolocation)?”

Its reply: “If you answered a pod mounted on an Unmanned Aerial Vehicle (UAV) that is currently flying in support of the Global War on Terrorism, you would be correct.”

Another document boasts that geolocation technology has “cued and compressed numerous ‘kill chains’ (i.e. all of the steps taken to find, track, target, and engage the enemy), resulting in untold numbers of enemy killed and captured in Afghanistan as well as the saving of U.S. and Coalition lives.”

The former JSOC drone operator, however, remains highly disturbed by the unreliability of such methods. Like other whistleblowers, including Edward Snowden and Chelsea Manning, he says that his efforts to alert his superiors to the problems were brushed off. “The system continues to work because, like most things in the military, the people who use it trust it unconditionally,” he says.

When he would raise objections about intelligence that was “rushed” or “inaccurate” or “outright wrong,” he adds, “the most common response I would get was ‘JSOC wouldn’t spend millions and millions of dollars, and man hours, to go after someone if they weren’t certain that they were the right person.’ There is a saying at the NSA: ‘SIGINT never lies.’ It may be true that SIGINT never lies, but it’s subject to human error.”

The government’s assassination program is actually constructed, he adds, to avoid self-correction. “They make rushed decisions and are often wrong in their assessments. They jump to conclusions and there is no going back to correct mistakes.” Because there is an ever-increasing demand for more targets to be added to the kill list, he says, the mentality is “just keep feeding the beast.”

For Bryant, the killing of Awlaki – followed two weeks later by the killing of his 16-year-old son, Abdulrahman al Awlaki, also an American citizen – motivated him to speak out. Last October, Bryant appeared before a panel of experts at the United Nations – including the UN’s special rapporteur on human rights and counterterrorism, Ben Emmerson, who is currently conducting an investigation into civilians killed by drone strikes.

Dressed in hiking boots and brown cargo pants, Bryant called for “independent investigations” into the Obama administration’s drone program. “At the end of our pledge of allegiance, we say ‘with liberty and justice for all,’” he told the panel. “I believe that should be applied to not only American citizens, but everyone that we interact with as well, to put them on an equal level and to treat them with respect.”

Unlike those who oversee the drone program, Bryant also took personal responsibility for his actions in the killing of Awlaki. “I was a drone operator for six years, active duty for six years in the U.S. Air Force, and I was party to the violations of constitutional rights of an American citizen who should have been tried under a jury,” he said. “And because I violated that constitutional right, I became an enemy of the American people.”

Bryant later told The Intercept, “I had to get out because we were told that the president wanted Awlaki dead. And I wanted him dead. I was told that he was a traitor to our country…. I didn’t really understand that our Constitution covers people, American citizens, who have betrayed our country. They still deserve a trial.”

The killing of Awlaki and his son still haunt Bryant. The younger Awlaki, Abdulrahman, had run away from home to try to find his dad, whom he had not seen in three years. But his father was killed before Abdulrahman could locate him. Abdulrahman was then killed in a separate strike two weeks later as he ate dinner with his teenage cousin and some friends. The White House has never explained the strike.

“I don’t think there’s any day that goes by when I don’t think about those two, to be honest,” Bryant says. “The kid doesn’t seem like someone who would be a suicide bomber or want to die or something like that. He honestly seems like a kid who missed his dad and went there to go see his dad.”

Last May, President Obama acknowledged that “the necessary secrecy” involved in lethal strikes “can end up shielding our government from the public scrutiny that a troop deployment invites. It can also lead a president and his team to view drone strikes as a cure-all for terrorism.”

But that, says the former JSOC operator, is precisely what has happened. Given how much the government now relies on drone strikes – and given how many of those strikes are now dependent on metadata rather than human intelligence – the operator warns that political officials may view the geolocation program as more dependable than it really is.

“I don’t know whether or not President Obama would be comfortable approving the drone strikes if he knew the potential for mistakes that are there,” he says. “All he knows is what he’s told.”

Whether or not Obama is fully aware of the errors built into the program of targeted assassination, he and his top advisors have repeatedly made clear that the president himself directly oversees the drone operation and takes full responsibility for it. Obama once reportedly told his aides that it “turns out I’m really good at killing people.”

The president added, “Didn’t know that was gonna be a strong suit of mine.”

QUOTES OF THE DAY

“The term propaganda rings melodramatic and exaggerated, but a press that—whether from fear, careerism, or conviction—uncritically recites false government claims and reports them as fact, or treats elected officials with a reverence reserved for royalty, cannot be accurately described as engaged in any other function.”

Glenn Greenwald

“Sooner or later everyone sits down to a banquet of consequences.”

Robert Louis Stevenson

SERVANTS OF SECURITY APPARATUS

Greenwald: US, British media are servants of security apparatus

Published time: December 27, 2013 22:23

Journalist Glenn Greenwald condemned the mainstream media during an address at a German computer conference on Friday and accused his colleagues of failing to challenge erroneous remarks routinely made by government officials around the globe.

Thousands of attendees at the thirtieth annual Chaos Communication Congress in Hamburg packed into a room to watch the 46-year-old lawyer-turned-columnist present a keynote address delivered less than seven months after he started working with former National Security Agency contractor Edward Snowden.

Revelations contained in leaked documents supplied by Snowden to Greenwald and other journalists have sparked international outrage and efforts to reform the far-reaching surveillance operations waged by the NSA and intelligence officials in allied nations. But speaking remotely from Brazil this week, Greenwald argued that the media establishment at large is guilty of failing significantly with respect to accomplishing its most crucial role: keeping governments in check.

When Greenwald and his colleagues began working with Snowden, he said they realized that they’d have to act in a way that wasn’t on par with how the mainstream media has acted up until now.

We resolved that we were going to have to be very disruptive of the status quo — not only the surveillance and political status quo, but also the journalistic status quo,” Greenwald said. “And I think one of the ways that you can see what it is that we were targeting is in the behavior of the media over the past six months since these revelations have emerged almost entirely without them and despite them.”

[W]e knew in particular that one of our most formidable adversaries was not simply going to be the intelligence agencies on which we were reporting and who we were trying to expose, but also their most loyal, devoted servants, which calls itself the United States and British media.”

It really is the case that the United States and British governments are not only willing but able to engage in any conduct no matter how grotesque,” Greenwald said. Nevertheless, he added, journalists tasked with reporting on those issues have all too often been compliant with the blatant lies made by officials from those governments.

Halfway through his remarks, Greenwald recalled a recent quip he made while being interviewed by BBC about the necessity of a functioning media in an environment where government officials can spew untruths to reporters without being questioned.

[A]t one point I made what I thought was the very unremarkable and uncontroversial observation that the reason why we have a free press is because national security officials routinely lie to the population in order to shield their power and get their agenda advanced,” recalled Greenwald, who said it is both the “the goal and duty of a journalist is to be adversarial to those people in power.”

According to Greenwald, the BBC reporter met his remark with skepticism.

I just cannot believe that you would suggest that senior officials, generals in the US and the British government, are actually making false claims to the public,” he remembered being told on-air.

It really is the central view of certainly American and British media stars, that when — especially people with medals on their chest who are called generals, but also high officials in the government — make claims that those claims are presumptively treated as true without evidence. And that it’s almost immoral to call them into question or to question their voracity,” he said.

Obviously we went through the Iraq War, in which those very two same governments specifically and deliberately lied repeatedly to the government, to their people, over the course of two years to justify an aggressive war that destroyed a country of 26 million people. But we’ve seen it continuously over the last six months as well.”

From there, he went on to cite the example of US Director of National Intelligence James Clapper, who earlier this year made remarks to Congress that were quickly proved false by documents leaked to Greenwald by Mr. Snowden. The very first National Security Agency document he was shown, Greenwald said, “revealed that the Obama administration had succeeded in convincing court, a secret court, to compel phone companies to turn over to the NSA every single phone record of every single telephone call.”

Clapper “went to the Senate and lied to their faces…which is at least as serious of a crime as anything Edward Snowden is accused of,” Greenwald added.

But DNI Clapper aside, Greenwald said that the established media continues to reject the notion that government officials spew lies. Snowden’s NSA documents have exposed those fibs on more than one occasion, he noted, yet reporters around the world continue to take the word of officials as fact rather than dig from the truth.

Their role is not to be adversarial. Their role is to be loyal spokespeople to those powerful factions that they pretend to exercise oversight,” Greenwald said.

But as the US, UK and other governments continue to feed the media lies, Greenwald said their operations are far from being single-pronged. The US “knows that its only hope for continuing to maintain its regiment of secrecy behind which it engages with radical and corrupt acts is to intimidate and deter and threaten people who are would-be whistleblowers and transparency activists from coming forward and doing what it is that they do by showing them that they’ll be subjected to even the most extreme punishments and there’s nothing that they can do about it,” he said. “And it’s an effective tactic.”

Ironically, he added, those nations are “fueling the fire of this activism with their own abusive behavior.”

Meanwhile, NSA reform may not happen as quickly as Greenwald, Snowden and others have hoped; despite a series of considerable victories for privacy advocates as of late, a federal judge in New York said moments before Friday’s address that the surveillance policies exposed by those leaks are not in violation of the US Constitution. The American Civil Liberties Union sued DNI Clapper in June after Greenwald and others wrote that the government was compelling telecoms for telephony metadata pertaining to millions of Americans. But District Judge William Pauley wrote on Friday that “Whether the Fourth Amendment protects bulk telephony metadata is ultimately a question of reasonableness.”

And while Judge Pauley and proponents of that program and similar surveillance operations continue to call the NSA’s efforts imperative in America’s war on terror, Greenwald said at Friday’s conference that their intention is much more sinister than stopping another 9/11 from occurring.

The NSA’s goal, Greenwald said, is to “ensure that all forms of human communication . . .are collected, monitored, stored and analyzed by that agency and by their allies.”

QUOTES OF THE DAY – TRAITOR EDITION

“I’m neither traitor nor hero. I’m an American.”Edward Snowden

 

“America is now a less safe place. The world is a less safe place because of what Mr. Snowden unilaterally did. He deserves to be prosecuted. I hope they find him in the hole that he’s hiding in in Hong Kong and bring him home and try him.” – Karl Rove

“I hope we follow Mr. Snowden to the ends of the earth to bring him to justice.” – Lindsey Graham

“For this, some, including my colleague John Cassidy, are hailing him as a hero and a whistle-blower. He is neither. He is, rather, a grandiose narcissist who deserves to be in prison.”Jeffrey Toobin – The New Yorker

“What he did was an act of treason.”Diane Feinstein

“He’s a traitor.” – John Boehner

“I think he should be prosecuted to the fullest extent of the law. I consider him right now to be a defector.” – Peter King

“There is an obligation both moral, but also legal, I believe, against a reporter disclosing something which would so severely compromise national security.” – Peter King

“I can assure you, this is not about spying on the American people.” – Al Franken

“For me it is literally, not figuratively, literally, gut-wrenching to see this happen, because of the huge, grave damage it does to our intelligence capabilities.”James Clapper (Perjurer)

“We do not see a tradeoff between security and liberty.” – Keith Alexander – NSA Director

“The national security of the United States has been damaged as a result those leaks. The safety of the American people and the safety of people who reside in allied nations have been put at risk as a result of these leaks.” – Eric Holder

“I think he’s a traitor. I’m suspicious because he went to China. That’s not a place where you would ordinarily want to go if you are interested in freedom, liberty and so forth. It raises questions whether or not he had that kind of connection before he did this.” Dick Cheney – The Dark Lord

“And I hope that he is prosecuted to the fullest extent of the law.” – Mitch McConnell

“Now you’ve got this 29-year-old high school dropout whistleblower making foreign policy for our country, our security policy. It’s sad, Brian. We’ve made treason cool. Betraying your country is kind of a fashion statement. He wants to be the national security Kim Kardashian. He cites Bradley Manning as a hero. I mean, we need to get very, very serious about treason. And oh by the way, for treason — as in the case of Bradley Manning or Edwards Snowden — you bring back the death penalty.”Fox and Friends

“Can intelligence operate effectively if every starry-eyed analyst feels entitled to be a self-appointed whistle-blower?” – Gary RosenThe Wall Street Journal

“Edward Snowden should go to jail, as quickly and for as long as possible.” – John Yoo – The National Review.

“I think on three scores—that is leaking the Patriot Act section 215, FISA 702, and the president’s classified cyber operations’ directive—on the strength of leaking that, yes, that would be a prosecutable offense. I think that he should be prosecuted.” – Nancy Pelosi

“Who is a journalist is a question we need to ask ourselves. Is any blogger out there saying anything – do they deserve First Amendment protection? These are the issues of our times.” – Lindsey Graham

“This lens makes you more likely to share the distinct strands of libertarianism that are blossoming in this fragmenting age: the deep suspicion of authority, the strong belief that hierarchies and organizations are suspect, the fervent devotion to transparency, the assumption that individual preference should be supreme. You’re more likely to donate to the Ron Paul for president campaign, as Snowden did. But Big Brother is not the only danger facing the country. Another is the rising tide of distrust, the corrosive spread of cynicism, the fraying of the social fabric and the rise of people who are so individualistic in their outlook that they have no real understanding of how to knit others together and look after the common good.” – David Brooks

“We’ve slipped away from a true republic. Now we’re slipping into a fascist system where it’s a combination of government, big business and authoritarian rule, and the suppression of the individual rights of each and every American citizen. When it comes to any significant differences on foreign policy, economic intervention, the Federal Reserve, a strong executive branch, a welfarism mixed with corporatism, both parties are very much alike.  The major arguments in hotly contested presidential races are mostly for public consumption to convince the people they actually have a choice.” – Ron Paul

 

“Perfect safety is not the purpose of government. What we want from government is to enforce the law to protect our liberties. The government does not need to know more about what we are doing. We need to know more about what the government is doing. We need to turn the cameras on the police and on the government, not the other way around. We should be thankful for writers like Glenn Greenwald, who broke last week’s story, for taking risks to let us know what the government is doing. There are calls for the persecution of Greenwald and the other whistle-blowers and reporters. They should be defended, as their work defends our freedom.” Ron Paul