Showing posts with label Documents. Show all posts
Showing posts with label Documents. Show all posts

Thursday, May 28, 2015

Internal Documents Show TSA Agents Regularly Assault and Grope Americans as Found Through Freedom of Information Act Request


We hate to say, "We told ya so," but if we in the alternative media don't point out our triumphs, nobody else will, and certainly nobody in the mainstream media: The Transportation Security Administration is a rogue agency filled with miscreants, criminals and perverts who make more of an effort to, and take more pleasure in, making the traveling public miserable than in protecting them from "terrorism."

As noted by InfoWars.com, documents obtained under a Freedom of Information Act request filed by a government watchdog organization show that TSA-caused sexual abuse is still rife around the nation, "with Americans complaining of being sexually harassed and groped while screeners laugh and sneer at them."

We've been on to the TSA all along

The documents were uncovered by Judicial Watch (JW), a Washington, D.C.-based organization that filed a lawsuit last year for more information related to alleged TSA sexual abuse.

In all, JW received 58 pages of material containing passenger complaints from 2013 alone. Alleged sexual assaults were documented at Dulles International Airport in Washington, Chicago's O'Hare International Airport, Denver International Airport, Miami International Airport and Los Angeles International Airport.

InfoWars.com further framed the issue thusly:

Clearly these documents present only a snapshot of what is going on at every airport in the US every day.

The president of JW, Tom Fitton, observed that in order to get a hold of the documents the legal accountability watchdog had to fight, indicating that "the TSA is more interested in a cover-up than in addressing the problem that its employees violate innocent travelers too often, sexually or otherwise."

According to the documents, here are a few of the cases cited:

July 5, 2013, "TSA Contact Center Record," O'Hare Airport:

The female TSO [Transportation Safety Officer] then proceeded to roughly feel of [sic] her breast including her nipples. The TSO didn't go under her arms or along her sides. She indicated that she did not receive a proper pat down. The search was limited to her breast... Two other individuals came over to where the supervisor and gentleman were and they began laughing. The caller indicated that the incident was not the business of the other two officers and not a show for them. The caller indicated that even the Supervisor, along with the others, began to roar with laughter.

July 29, 2013, "To/From Memo," O'Hare Airport:

The person began to tell me how TSO [redacted] stuck his hands down his pants and grabbed the top of his penis and placed his fingers in his butt crack... The person was sure that he was violated and wanted to talk to a supervisor.... He said he is going to file a police report with Chicago Police Department and file a lawsuit against TSA and Officer [redacted] and walked away.

You can read more incident reports here[PDF] or here.



Voluminous coverage of TSA malfeasance, criminality:

Monday, May 18, 2015

Master the Human Domain: Exercise Drills for Jade Helm Intent Could Be Found in Newly Released Documents

A relatively new and obscure document, U.S. Army Special Operations Command “ARSOF Operating Concept” is the blueprint for Jade Helm. This document does not boldly use phrases such as “extracting political dissidents”, but it does use “legal language” to basically communicate the same messages that many in the Independent Media have been telling the public about for 6 weeks, namely, that ARSOF is going to be used to extract political dissidents and then enforce martial law.
Key phrases and terms of the ARSOF document are presented here so as to have no misunderstanding as to meaning and intent. Other relevant military documents are mentioned in order to reinforce the interpretation of the ARSOF, Jade Helm inspired document.

ARSOF  1-4. Sustaining and Enabling ARSOF: The Operating Concept

1). A global network including joint,interagency, andInternational partnerswill enable these capabilities, but that network itself is not enough. The U.S. military must place supreme value in its operators, who will be constantly challenged through the most demanding education, training, and developmental assignments. Our operators’ capabilities also rely on strong and healthy families, supported by the broader ARSOF and Army community.



Why do the deep, dark forces behind the planning of Jade Helm need to have foreign mercenaries involved with Jade Helm? The answer is simple, they cannot fully trust that American soldiers will participate in the long-term subjugation of American citizens. And who would these shadowy forces behind Jade Helm be? We cannot be 100% sure, but my bet is on the CIA. From former ARSOF officer, Scott Bennett, we know that the CIA is funding ISIS through Swiss bank accounts and they have been involved in nearly every nefarious activityconnected to this government from Iran-Contra to the JFK assassination. The CIA is a very safe bet.

There is not a topic that I have taken more criticism for than when I have written about the presence of foreign troops on American soil, particularly, the Russians. At Ft. Carson, we are witnessing the insertion of Russian troops on our soil. The extra-constitutional “agreements”(that means illegal agreements) were inked in Washington, D.C., at the fourth annual meeting of the illegally created U.S.-Russia Bilateral Presidential Commission Working Group on Emergency Situations.” This extra-governmental organization, formed under the Obama administration, is one of almost two dozen similar “working groups” bringing together top U.S. and Russian officials. These agreements allowed for the first 15,000 Russian troops to enter the country. Case Closed!

Before taking another sip of the CNN Kool-Aid, you might want to consider the contents of the following Army document.


Appendix N of FM 3-39.4
Foreign Confinement Officer Training Program

Training U.S. Trainers
N-43. Soldiers and Marines who are assigned training missions receive a course in the preparation to deal with the specific requirements of developing the target HN confinement officers (i.e. foreign detention officers). The course should emphasize the cultural background of the HN, introduce its language (to include specific confinement-related terms and phrases) and provide insights into cultural tips for developing a good rapport with HN personnel.

Some of these international partners will be wearing the UN blue and driving in UN white vehicles. These Jade Helm partners are not your friend. They are not here to conduct traffic control exercises. They are here to subjugate you, strip you of your assets and herd you into detention camps and when deemed necessary, they will not hesitate to fire upon you if they feel compelled to do so.

ARSOF 2-2. A Multipolar World

  1. Competition in the global commons will revolve around maintaining the security of key populations in militarily significant urban terrain. The sheer mass and scale of urbanized humanity will be amplified by the intersection of informationally aware, smartphone‐enabled urban populations and their satisfaction—or lack of satisfaction—with local, regional, and even global conditions.

  1. In the coming decades, failed states and ungoverned areas will become sanctuaries for extremist, criminal, and terrorist organizations to flourish. Vacuums emerging from the weakened nation‐state model of 19th and 20th centuries will not elicit new forms of government, but only a proliferation of preexisting forms. The significant difference will be thegreater ability of nonstate actors to defend themselves, and to influence or attack other populations, due to the diffusion of weapons and communications technologies down to subnation groups…
    Urban terrain? I thought they were training for war in the Middle East? What is a subnation group? Texas, Utah and part of Southern California are subnation groups that have deemed to be hostile states by Jade Helm documents. Jade Helm is preparing to occupy these “nonstate actors”.
    On the surface, the Posse Comitatus Act (18 USC 1385) act should prevent the Army from deploying the troops in the midst of a protest that is not on the scale of something like the 1992 LA Riots. However, the Army claims exemption from Posse Comitatus in the following area.
    Perhaps this is why the original Jade Helm maps depicted states like Texas, to be hostile states.
    The following explains the mystery behind the Jade Helm moniker phrase “Mastering the Human Domain“.

    ARSOF 3-3. The Central Idea

    1. Special Warfare. Special warfare is an umbrella term indicating operating force conduct of combinations of unconventional warfare (UW), foreign internal defense (FID), military information support operations (MISO), CT, and counterinsurgency (COIN) through and with indigenous personnel. With discreet, precise, politically astute, and scalable capabilities, ARSOF frequently undertake politically sensitive missions over extended periods of time in hostile, austere, and denied environments. Here, ARSOF’s deep language and cultural expertise enhance unit survivability through the recognition and understanding of emerging threats. Such capabilities also grant Army special operators influence over the human domain in pursuit of U.S. objectives, to avoid conflict, or to bring about a quick and enduring victory…
    Mastering the human domain can only mean one thing, enslavement!

    ARSOF 4-5. Counterinsurgency Operations

    1. …COIN will involve comprehensive civilian and military efforts taken to defeat an insurgency and to address any core grievances…
10 USC 331. When a state is unable to control domestic violence and they have requested federal assistance, the use of the militia or Armed Forces is authorized.

 Address any core grievances? My mind immediately harkens back to Kent State, in 1970, when four college students frustrated by the illegal Vietnam War were gunned down for expressing “core grievances”.

This is not hyperbole! In an Army manual, known as ATP 3-39.33, is the field manual that provides discussion and techniques about civil disturbances and crowd control operations that occur in the continental United States (CONUS) and outside the continental United States (OCONUS). This document, ATP 3-39.33  published the same week as the ARSOF document, on August 15, 2014, promises to change the way the “military authorities” deal with protesters, even peaceful ones through the use of well-placed snipers who will have orders to take out the leaders of any protest movement. The consequences of ATP 3-39.33 could prove deadly for protesters. Further, the provisions of this Army manual is the end of the First Amendment right to peaceably assemble. The Army is telling you how they are going to deal with protests. Protesting, in America, is now a crime punishable by death. Therefore, when Jade Helm is in your neighborhood, unless you willing to fight, it would be best to stay inside!

ARSOF 5-3. Sustaining Surgical Strike

…operations against critical mission command nodes and infrastructure to weaken the enemy’s grip on the population
How do Special Forces weaken the grip that dissidents have on the local population? Death squads is the way that many governments deal with “weakening the grip on the population”.  This is clearly fancy language used to justify the extraction, either through kidnapping or targeted assassination, of political dissidents from inside the Jade Helm identified “hostile state” areas.

Friday, March 13, 2015

Kaspersky Proofs Continue Pointing to NSA as Creators of 'Equation Group' Master Hacks

""Kaspersky has carried out an involved study of the Equation Group and made it look like it is probably the work of the US government.
Before it was an NSA 'style' threat, now it looks much more likely to be an NSA sourced threat, thanks to some commonality with other online security menaces.
The term, and others like it, appear in Snowden leaked documents that have been sourced from the NSA.
There are other clues that it is a US entity that is involved. For example time stamps associated with attacks suggest that it is nine to five, monday to friday staffers who operate in US timezones who are responsible.
It would seem unreasonable to suppose that an average malicious anchor who is not on a government salary would be inclined to work at the weekend. So this is another clue. The code is said to be of good quality, but we can't say that that provides any clue about its creator.
We have asked Kaspersky if it wants to actually finger the NSA as the Equation Group and it did not. It said that it did not want to pin it on the agency, but did concede that there does appear to be a strong link between Stuxnet and Equation.
"We are not able to confirm the conclusions that journalists came up with. Kaspersky Lab experts worked on the technical analysis of the group's malware, and we don't have hard proof to attribute the Equation Group or speak of its origin," it said in a statement.
"With threat actor groups as skilled as the Equation team, mistakes are rare, and making attribution is extremely difficult. However we do see a close connection between the Equation, Stuxnet and Flame groups."
In February Kaspersky researchers claimed to have uncovered one of the biggest, if not the biggest, threat actor that it has seen in two decades.
The security firm dubbed this outfit the Equation Group, and its toolbox 'the Death Star of the Malware Galaxy', and explained that the tools of its trade have hallmarks and themes similar to those of Stuxnet.
Words were not minced. Kaspersky described the group as a "powerful threat actor" that is "unique almost in every aspect of their activities".
The group is sophisticated and well-resourced, and uses complex tools to hide itself in "an outstandingly professional way".

In one incident the group infected targets by switching out legitimate CD Roms with spiked ones at a conference. This makes it sound like a very organised, and perhaps connected outfit.
The tools, a range of trojans, have been named EquationLaser, EquationDrug, DoubleFantasy, TripleFantasy, Fanny and GrayFish. Of these, Fanny, is described as the standout.
Two of these trojans, or modules, can be found deeply inserted in as many as a dozen different makes of hard drive that are sold and shipped to international waters.
The malware is so deeply inserted into the firmware that it can survive wipes, and "resurrect" itself indefinitely. Additional 'implants' add to the mix and can grab and store encrypted passwords, for example.
Costin Raiu, director of the global research and analysis team at Kaspersky Lab, said: "Another dangerous thing is that, once the hard drive gets infected with this malicious payload, it is impossible to scan its firmware.
"To put it simply: for most hard drives there are functions to write into the hardware firmware area, but there are no functions to read it back. It means that we are practically blind, and cannot detect hard drives that have been infected by this malware."
The Fanny trojan is used to fill in the spaces in systems, and launch attacks in unconnected and hard to reach places. Kaspersky said that the 'air-gap filler' is USB-based, and can let attackers move between otherwise unconnected networks.
Thousands of victims lie at the feet of the group, according to Kaspersky, and they include state targets, governments, security developers, telecoms, aerospace and energy industries, along with the military, Islamic activists and the media.
Kaspersky didn't name a likely source  then, but found a lot of links to Stuxnet, which is often linked to the NSA.
"There are solid links indicating that the Equation group has interacted with other powerful groups, such as the Stuxnet and Flame operators, generally from a position of superiority," adds Kaspersky.
A Reuters report makes the NSA link, and we asked the agency if it wanted to make comment in response. It did. 
"We are aware of the recently released report. We are not going to comment publicly on any allegations that the report raises, or discuss any details," an NSA spokesperson told The INQUIRER
"The US. Government calls on our intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats - including terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against ourselves and our allies; and international criminal organisations."
We asked some of the hard drive firms that Kaspersky said have been infiltrated by the Equation Group for their take on the news, and at least one told us that it has not heard specific allegations about any backdoor action.""

Kaspersky traces the Equation Group and its activities back to 2001:

Thursday, January 22, 2015

X-ray'd Ancient Scroll Documents Blackened by Mount Vesuvius Near Pompeii Readable at Last




""The 79 A.D. eruption of Mount Vesuvius is most famous for burying Pompeii, spectacularly preserving many artifacts—and residents—in that once bustling town south of Naples. The tumbling clouds of ash also entombed the nearby resort of Herculaneum, which is filled with its own wonders. During excavations there in 1752, diggers found a villa containing bundles of rolled scrolls, carbonized by the intense heat of the pyroclastic flows and preserved under layers of cement-like rock. Further digs showed that the scrolls were part of an extensive library, earning the structure the name Villa of the Papyri.

Blackened and warped by the volcanic event, the roughly 1,800 scrolls found so far have been a challenge to read. Some could be mechanically unrolled, but hundreds remain too fragile to make the attempt, looking like nothing more than clubs of charcoal. Now, more than 200 years later, archaeologists examining two of the scrolls have found a way to peer inside them with x-rays and read text that has been lost since antiquity.



"Anybody who focuses on the ancient world is always going to be excited to get even one paragraph, one chapter, more," says Roger Macfarlane, a classicist at Brigham Young University in Utah. "The prospect of getting hundreds of books more is staggering."

Most of the scrolls that have been unwrapped so far are Epicurean philosophical texts written by Philodemus—prose and poetry that had been lost to modern scholars until the library was found. Epicurus was a Greek philosopher who developed a school of thought in the third century B.C. that promoted pleasure as the main goal of life, but in the form of living modestly, foregoing fear of the afterlife and learning about the natural world. Born in the first century B.C. in what is now Jordan, Philodemus studied at the Epicurean school in Athens and became a prominent teacher and interpreter of the philosopher's ideas.

Modern scholars debate whether the scrolls were part of Philodemus' personal collection dating to his time period, or whether they were mostly copies made in the first century A.D. Figuring out their exact origins will be no small feat—in addition to the volcano, mechanical or chemical techniques for opening the scrolls did their share of damage, sometimes breaking the delicate objects into fragments or destroying them outright. And once a page was unveiled, readability suffered.



"Ironically, when someone opened up a scroll, they would write on a separate sheet what they could read, like a facsimile, and the original ink, once exposed to air, would start to fade," says Brent Seales, a computer scientist at the University of Kentucky who specializes in digital imaging. What's more, the brute-force techniques usually left some pages stuck together, trapping hidden layers and their precious contents.

From 2007 to 2012, Seales collaborated with Daniel Delattre at the French National Center for Scientific Research in Paris on a project to scan scrolls in the collections of the Institut de France—former treasures of Napoleon Bonaparte, who received them as a gift from the King of Naples in 1802. Micro-CT scans of two rolled scrolls revealed their interior structure—a mass of delicate whorls akin to a fingerprint. From that data the team estimated that the scrolls would be between 36 and 49 feet long if they could be fully unwound. But those scans weren't sensitive enough to detect any lettering.

The trouble is that papyri at the time were written using a carbon-based ink, making it especially hard to digitally tease out the words on the carbonized scrolls. Traditional methods like CT scans blast a target with x-rays and look for patterns created as different materials absorb the radiation—this works very well when scanning for dense bone inside soft tissue (or for peering inside a famous violin), but the method fails at discerning carbon ink on blackened scrolls.



Now a team led by Vito Mocella of the Italian National Research Council has shown for the first time that it is possible to see letters in rolled scrolls using a twist on CT scanning called x-ray phase-contrast tomography, or XPCT. Mocella, Delattre and their colleagues obtained permission to take a fragment from an opened scroll and a whole rolled scroll from the Paris institute to the European Synchrotron in Grenoble. The particle collider was able to produce the high-energy beam of x-rays needed for the scans.

Rather than looking for absorption patterns, XPCT captures changes in the phase of the x-rays. The waves of x-rays move at different speeds as they pass through materials of various density. In medical imaging, rays moving through an air-filled organ like a lung travel faster then those penetrating thick muscle, creating contrast in the resulting images. Crucially, the carbon-based ink on the scrolls didn't soak into the papyrus—it sits on top of the fibers. The microscopic relief of a letter on the page proved to be just enough to create a noticeable phase contrast.""



Read Second Half of Report:

All My Verses Chemistry 4 Conscious Eggs ********* ALCHemYEGG AUMniVERSE