Posts Tagged ‘Intel’

Founder and Director of Oath Keepers Stewart Rhodes urges all Oath Keeper chapters across the country to hold an Emergency Summit by state, in order to prepare for an economic collapse. ‘Assume the worst’ and formulate support teams. Food storage the most crucial.


The evening proceeded quietly. The dark drama I experienced earlier was like a strong dose of caffeine that began to wear off. At around 11:30 that evening I went to bed hoping to capture some of the sleep stolen from me the night before. All was quiet . . . but not for long. At exactly 12:00 midnight I was rudely awakened by a sudden eruption of clamor from the apartment above! They’re back! The Scowler (or his henchmen) had returned!

This assault was a perfect replica of what I endured the night before. The noise, stomping, and loud profane voices bounced off my bedroom walls. I now faced a second night of stolen sleep and harassment. What should I do? If law enforcement agents are my antagonists, what would happen if I called the police to complain? I did not want a confrontation, just a good night’s sleep.

Forced to lay awake for the second night in a row by this assault, I began to analyze my situation. This scheme was not the improvised efforts of a ragtag group of local police officers. I sensed that it was a well-crafted, thoroughly rehearsed technique that reflected expertise in psychology and surveillance. The participants knew their roles well and stuck to a script.

Rather than beat me physically, they were seeking to beat me by attacking my emotions and injuring my pride. I had been rudely deprived of sleep for over 36 hours. Also, I was subject to a series of actions designed to humiliate me and provoke an angered response. They had also provided a target for my anger . . . the “Scowler.”

This gang-stalking methodology falls under a system of psychological operations being developed and tested on American citizens by covert quasi-military law enforcement agencies. The basic process described above has been taught by the CIA (Central Intelligence Agency) since the 1950’s. “The purpose of all coercive techniques is to induce psychological regression in the subject by bringing a superior outside force to bear on his will to resist. Regression is basically . . . a reversion to an earlier behavioral level. As the subject regresses, his learned personality traits fall away in reverse chronological order. He begins to lose the capacity to carry out the highest creative activities, to deal with complex situations, to cope with stressful interpersonal relationships, or to cope with repeated frustrations.” – CIA Human Resource Exploitation Manual

Full Story @ [youarenotmybigbrother]

The above article is actually taken from a now defunct website that was captured by the Way Back Machine.


One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage.”

Beyond enabling the collection, categorization, and querying of metadata and content, XKEYSCORE has also been used to monitor the surveillance and hacking actions of foreign nation states and to gather the fruits of their hacking. The Intercept previously reported that NSA and its allies spy on hackers in order to collect what they collect.

Once the hacking tools and techniques of a foreign entity (for instance, South Korea) are identified, analysts can then extract the country’s espionage targets from XKEYSCORE, and gather information that the foreign power has managed to steal.

Monitoring of foreign state hackers could allow the NSA to gather techniques and tools used by foreign actors, including knowledge of zero-day exploits—software bugs that allow attackers to hack into systems, and that not even the software vendor knows about—and implants. Additionally, by monitoring vulnerability reports sent to vendors such as Kaspersky, the agency could learn when exploits they were actively using need to be retired because they’ve been discovered by a third party.


The author of a book once banned in America, Douglas Valentine, discusses how the American government is conducting covert warfare on its citizens via the CIA. The book, “The Phoenix Program”, details the nitty-gritty black ops that were conducted against the people of Vietnam. Mr. Valentine says the “Phoenix Program” is the blueprint for the covert warfare that the government is conducting on the American people today.

Americans can get the complete picture in combination with “Confessions of a Economic Hitman”.

Awake Radio
Douglas Valentine – The Phoenix Program
CIA Speaks: The Phoenix Files
Confessions of an Economic Hit Man: How America Really Took Over the World (2005)


Joint Terrorism Task Forces (JTTFs), of which there are currently 104 located in cities and towns across the United States, were created in the 1980s and greatly expanded in the aftermath of 9/11. They were set up to coordinate between diverse federal agencies and local law enforcement, and often work in tandem with “Fusion Centers” that are supposed to collect and analyze data related to potential terrorism.

To see how these task forces can overstep their bounds, take the case of Eric Linsker, who police tried to arrest for allegedly trying to throw a trash can over the side of a walkway on the Brooklyn Bridge during the large, mostly peaceful protests that erupted in New York City following the failure to indict the officer whose choke-hold led to the death of Eric Garner. Other protesters intervened to stop the arrest but Linkser left his bag behind which, according to authorities, contained “his passport, three hammers, and a small amount of marijuana.”

While police may have been well within their rights to track down Linsker and charge him if the vandalism allegations were true, it’s who did the arresting that is problematic: rather than the NYPD, it was the New York JTTF that brought Linkser in, perhaps believing that the hammers were potential instruments of terror. This should be a cause for worry, since it means either law enforcement’s definition of terrorism has become far too broad, or they are targeting more than just terrorism.

Another bizarre case comes out of Minneapolis in the lead up to the Republican national convention in 2008. According to the City Pages, a Univ. of Minnesota police officer who was the department’s only officer on the local Joint Counter Terrorism Task Force worked with an FBI Special Agent to recruit college students who acted as paid informants at “vegan potlucks” hoping they’d discover activist plans to disrupt the city’s upcoming convention.

Full Story @ [truth-out]

It appears that the only reason calmative drugs are not already used is because police don’t have a good way of delivering them to the unruly citizens. Since a howitzer (which delivers the Army’s XM1063) might be a bit much for city streets, other means are being considered.

A short article from the “National Clearinghouse for Science, Technology and the Law” notes:

Ultimately, a calmative chosen for less lethal law enforcement purposes should exhibit the following characteristics: an easy and versatile route of administration, fast onset of action, a short drug effect duration, a consistent dose response, reversible action by antidote or rapid metabolism, and no long-lasting or permanent toxicity or side effects. A few ways that a non-lethal calmative might be administered, depending on the law enforcement environment, would include a topical or transdermal skin application, an aerosol spray, an intramuscular dart, or a rubber bullet filled with an inhalable agent. However, the ability to target a specific wrongdoer or horde, while not affecting outlying innocent bystanders, through a discriminatory application, has yet to be mastered. Until the proper administration techniques for a controllable yet effective calmative drug meet the demands of public welfare, calmatives, as riot control agents, will continue to be shelved.

In soliciting research and development for calmative agents, the JNLWD encouraged private entities to investigate a variety of chemicals and combinations, including anesthetics/analgesics, tranquilizers, hypnotics and neuromuscular blockers. They cited several law enforcement applications: “hostage and barricade situations; crowd control; close proximity encounters, such as, domestic disturbances, bar fights and stopped motorists; to halt fleeing felons; and prison riots.

Tomorrow’s cop could be able to put people into a stupor as easily as shocking them with a Taser gun. Could protests one day be met with a massive dose of sedative drugs delivered by unmanned aerial drones?

Source: [thefreethoughtproject]


Although many of the practices I describe here could be used in just about any environment, a few of them are specific to EC2, but even then, you may find ways to map these notions to other cloud environments. Most of these practices revolve around Security Groups. EC2 Security Groups can be thought of in some ways like a VLAN in a traditional network. With Security Groups, you can create firewall settings to block incoming traffic to specific ports for all servers that are members of a specific group. Unlike traditional VLANs, you can create firewall rules within Security Groups that block traffic between members of that group. Servers can be members of multiple Security Groups, although it’s important to know that Security Groups are assigned only when an instance is created—you can’t add or remove Security Groups from an instance after you create it.

Finally, I never store a secret in my userdata file. Often when you spawn a server in EC2, you provide the server with a userdata file. A number of AMIs (Amazon Machine Images—the OS install image you choose) are configured to execute the userdata script. Although in some cases this file is used to pass specific configuration values on to the server, many people (myself included) use the file as a post-install script. In my case, I use it to configure my configuration management system (Puppet) and from that point on let it take over the configuration of the system. What you may not know is that the contents of the userdata script are available via an API call to any user who is on the system throughout the life of the instance. If you use the userdata file to inject any sort of secrets (certificates or SSH private keys, passwords or shared secrets the system uses in its configuration, or anything you wouldn’t want a regular user to see), those secrets will be visible to any user on the system. In fact, if you happen to use Puppet yourself (or otherwise have facter installed on the system), facter itself will return the contents of that userdata script for you.
Handling Secrets

It’s incredibly important to think about how you manage secrets in a cloud environment beyond just the userdata script. The fact is, despite your best efforts, you still often will need to store a private key or password in plain text somewhere on the system. As I mentioned, I use Puppet for configuration management of my systems. I store all of my Puppet configuration within Git to keep track of changes and provide an audit trail if I ever need it. Having all of your configuration in Git is a great practice, but the first security practice I recommend with respect to secrets is to avoid storing any plain-text secrets in your configuration management system. Whenever possible, I try to generate secrets on the hosts that need them, so that means instead of pushing up a GPG or SSH key pair to a server, I use my configuration management system to generate one on the host itself.

Full Story @ [Linux Journal]

When this trucker “Lou” tells me how much equipment is being moved under the cover of darkness. He also said he doesn’t want to get involved and he doesn’t agree with it, he wants no part of it.. Lou told me he has enough money..Truckers and brokers are being offered a lot of money to participate. Blue Bell ice cream trucks were spotted a few weeks ago in a convoy. Do not know what the contents were. Could have just been free ice cream for the troops.

The footage in this video was just taken in a Walmart Parking Lot in the Scranton Pennsylvania Area.

However, these could be freshly ordered news crew SUV’s. Fox News in New York City even have New York State government issued license plates with USDOT numbers and they are white. You can verify those numbers online.

The pictures below are of a customized surveillance vehicle taken at a U.S. government security trade show.



FEMA Staging In Northwest Austin Texas

Posted: June 19, 2015 in SWIG

FEMA and DHS RVs were spotted in the southern parking lot of the FedEx Trucking Terminal in northwest Austin, Texas (YouTube). Latest intel is that FEMA is supposedly building a facility in Austin.

However, the federal government added many more Texas counties, including Travis and Williamson, to the Major Disaster Declaration list of counties impacted by May’s storms and flooding. Hays County, which holds about 200 Austin residents, was included in the original declaration announced on May 29. The parked FEMA RV’s in the video are sitting in Williamson county.