Page 8 of 59 FirstFirst ... 4567891011121858 ... LastLast
Results 71 to 80 of 582
Like Tree27Likes

Thread: Privacy Alert! Big Brother is watching and listening, UPDATED

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #71
    April
    Guest
    Snowden Used Banned Flash Drive to Smuggle NSA Data

    .

    Friday, 14 Jun 2013 04:42 PM
    By Todd Beamon




    Edward Snowden, who has admitted leaking top-secret documents detailing the NSA's phone and Internet surveillance programs, exceeded his authorized access to the agency's computer systems while managing to smuggle out classified documents on a portable USB drive.

    The small data-storage device has been banned from use on secret military networks, including those of the National Security Agency, for at least five years, The Washington Times reports.


    "He should not have been able to do either of those things" without raising red flags, a private-sector IT security specialist told the Times.

    NSA officials "were lying down on their job if they didn't disable the USB port," the specialist said, referring to the small socket on the side of a computer where the thumb-sized drives are inserted.

    The agency is still trying to determine the extent of Snowden's breach of top-secret information. It did not respond to a request for comment from The Washington Times.

    Snowden, a former NSA contractor, smuggled electronic copies of an unknown number of classified documents out of the agency's operations center in Hawaii, where he worked, The Los Angeles Times reported on Friday.

    A U.S. official told The Washington Times "that's one avenue" investigators are following.

    Thumb drives have been banned from use on classified military systems since malicious software, thought to be of Russian origin, infected the secret computer networks of the U.S. Central Command five years ago, The Washington Times reports.

    Lawmakers briefed on the matter by NSA Director Gen. Keith Alexander have not commented on the USB drive, but said Snowden also exceeded his authorized access to the agency's computer systems.


    Read Latest Breaking News from Newsmax.com http://www.newsmax.com/Newsfront/snowden-nsa-flash-drive/2013/06/14...

  2. #72
    April
    Guest
    Another secure email , info sent to me by a friend.



    Sign up for Hushmail
    Hushmail Business

    Use your own domain name. We’ll give each employee up to 10 GB storage, an email address with your company’s domain name, and a ton of other great features.
    Learn about Hushmail Business


    HIPAA-compliant private email

    Protect sensitive PHI. We’ll sign a Business Services Agreement and give each of your employees an email account with enhanced privacy protection.
    Learn about HIPAA-compliant email



    Every day, thousands of people make the switch to Hushmail.
    It only takes a minute to sign up.

  3. #73
    April
    Guest
    Canada Free Press columnist being investigated by NSA
    It was reported last night that, Douglas J. Hagmann, columnist for the Canada Free Press (CFP) was informed that he was put on an active investigation list by NSA by an unnamed security source.
    Judi McLeod, an award-winning journalist with 30 years’ experience in the print media stated that Hagmann’s recent reporting and for the past several years of his Insider Reports, has earned him the spot on the NSA’s watch list and that a FOIA (Freedom of Information Act) request has been filed on his behalf.
    McLeod stated that the NSA investigation was found on the heels when Hagmann wrote a column warning Americans, “It’s about to get very ugly”.
    In his column, “It’s about to get very ugly” and reported on by the Paulding County Republican Examiner, Hagmann said that a Department of Homeland Security (DHS) insider told him, “The present administration is going after leakers, media sources, anyone and everyone who is even suspected of ‘betrayal.’ That’s what they call it, ‘betrayal.’ Can you believe the size of their cahones? This administration considers anyone telling the truth about Benghazi, the IRS, hell, you name the issue, ‘betrayal’.”
    http://www.examiner.com/article/canada-free-press-columnist-being-i...

  4. #74
    April
    Guest
    Confirmed: CBS Reporter’s Computer Was Hacked on Multiple Occasions

    Posted by Jim Hoft on Friday, June 14, 2013, 1:25 PM

    In 2011, CBS reporter Sharyl Attisson broke the story that Eric Holder knew about the gun sting long before he said he did.

    In 2012, Attisson investigated the Benghazi massacre.

    In May, Sharyl Attkisson announced that her computers were compromised by the Obama administration.
    Today CBS News confirmed that Sharyl Attkisson’s computer was hacked by “an unauthorized, external, unknown party on multiple occasions.”

    CBS News announced Friday that correspondent Sharyl Attkisson’s computer was hacked by “an unauthorized, external, unknown party on multiple occasions,” confirming Attkisson’s previous revelation of the hacking.

    CBS News spokeswoman Sonya McNair said that a cybersecurity firm hired by CBS News “has determined through forensic analysis” that “Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions in late 2012.”“Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion. CBS News is taking steps to identify the responsible party and their method of access.”


  5. #75
    Guest
    Join Date
    Aug 2009
    Posts
    9,266
    Cheney calls Snowden a ‘traitor,’ defends NSA phone tracking


    Sunday, June 16, 2013

    Former Vice President Dick Cheney on Sunday defended the National Security Agency’s data surveillance programs and labeled admitted leaker Edward Snowden as a “traitor.”
    “I think he’s a traitor…I think he has committed crimes,” Cheney said in an interview with “Fox News Sunday.”
    The former number two to President George W. Bush said he suspects Snowden was a Chinese spy all along, questioning his decision to flee to Hong Kong ahead of releasing classified information on the NSA’s phone and Internet monitoring programs.
    Cheney defended those data surveillance methods as essential to national security, arguing that the threat from terrorism is worse than ever.

    Post Continues on thehill.com

    Read more: http://patriotupdate.com/2013/06/che...#ixzz2WOTr8ZDO



    Well it is clearly not these people they all belong to the same admiration society of freedom for themselves but not for US..It is also getting so easy to see who is "with us or against US", now isn't it!!!!






    Brothers from another "Mother" but still drank from the same milk!!!!



  6. #76
    April
    Guest
    Secret to Prism Program: Even Bigger Data Seizure




    (AP) - In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

    Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world's largest software company and, at the time, largest email provider.
    The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.
    Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.
    Inside Microsoft, some called it "Hoovering" -- not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

    This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.


    The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.


    Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information.


    The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.


    Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success.


    The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far.The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.

    ___
    Deep in the oceans, hundreds of cables carry much of the world's phone and Internet traffic. Since at least the early 1970s, the NSA has been tapping foreign cables. It doesn't need permission. That's its job.But Internet data doesn't care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant.


    Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations.


    Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light.


    "You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber optic cables.


    What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.
    Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
    The Bush administration called it the "Terrorist Surveillance Program" and said it was keeping the United States safe.
    "This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of saving lives and breaking up plots directed at the United States," Vice President Dick Cheney said at the time.
    The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer.
    That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation.


    The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now.What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.


    The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required.


    Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
    "This administration also puts forward a false choice between the liberties we cherish and the security we provide," Obama said in a speech two days before that vote. "I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom."
    ___
    When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.


    One expert in national security law, who is directly familiar with how Internet companies dealt with the government during that period, recalls conversations in which technology officials worried aloud that the government would trample on Americans' constitutional right against unlawful searches, and that the companies would be called on to help.
    The logistics were about to get daunting, too.


    For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN.It was known as Prism. Though many details are still unknown, it worked like this:


    Every year, the attorney general and the director of national intelligence spell out in a classified document how the government plans to gather intelligence on foreigners overseas.By law, the certification can be broad. The government isn't required to identify specific targets or places.


    A federal judge, in a secret order, approves the plan.
    With that, the government can issue "directives" to Internet companies to turn over information.
    While the court provides the government with broad authority to seize records, the directives themselves typically are specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of targets. Other company officials recall similar experiences.
    All adamantly denied turning over the kind of broad swaths of data that many people believed when the Prism documents were first released.


    "We only ever comply with orders for requests about specific accounts or identifiers," Microsoft said in a statement.
    Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.


    How many of those were related to national security is unclear, and likely classified. The numbers suggest each request typically related to one or two people, not a vast range of users.Tech company officials were unaware there was a program named Prism. Even former law enforcement and counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past week that they didn't know what it was called.

    What the NSA called Prism, the companies knew as a streamlined system that automated and simplified the "Hoovering" from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The government wanted the data in a structured, consistent format that was easy to search.


    Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.
    "They do this every two to three years," said Janke, who said government agents have approached his company but left empty-handed because his computer servers store little information. "They ask for the moon."


    That often creates tension between the government and a technology industry with a reputation for having a civil libertarian bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court and lost in a classified ruling in 2008, The New York Times reported Friday."The notion that Yahoo gives any federal agency vast or unfettered access to our users' records is categorically false," Ron Bell, the company's general counsel, said recently.


    Under Prism, the delivery process varied by company.
    Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have set up user interfaces making it easier for the government, according to a security expert familiar with the process.


    Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more.Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines.


    In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables.Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.


    With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property.Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.


    That's one example of how emails belonging to Americans can become swept up in the hunt.
    In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree."I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."


    One unanswered question, according to a former technology executive at one of the companies involved, is whether the government can use the data from Prism to work backward.For example, not every company archives instant message conversations, chat room exchanges or videoconferences. But if Prism provided general details, known as metadata, about when a user began chatting, could the government "rewind" its copy of the global Internet stream, find the conversation and replay it in full?


    That would take enormous computing, storage and code-breaking power. It's possible the NSA could use supercomputers to decrypt some transmissions, but it's unlikely it would have the ability to do that in volume. In other words, it would help to know what messages to zero in on.Whether the government has that power and whether it uses Prism this way remains a closely guarded secret.

    ___
    A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to.Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.


    "I came in with a healthy skepticism about these programs," Obama explained recently. "My team evaluated them. We scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards."
    Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.
    "You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," the president said.


    Obama's administration, echoing his predecessor's, credited the surveillance with disrupting several terrorist attacks. Leading figures from the Bush administration who endured criticism during Obama's candidacy have applauded the president for keeping the surveillance intact.


    Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said it's no surprise Obama continued the eavesdropping."You can't expect a president to not use a legal tool that Congress has given him to protect the country," he said. "So, Congress has given him the tool. The president's using it. And the courts are saying `The way you're using it is OK.' That's checks and balances at work."

    Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said.

    He said it doesn't matter what the government and the companies say, either. It's spycraft, after all.
    "Everyone is playing word games," he said. "No one is telling the truth."


    http://www.breitbart.com/Big-Government/2013/06/15/Secret-to-Prism-...

  7. #77
    Guest
    Join Date
    Aug 2009
    Posts
    9,266
    NSA Chief Lies to Congress



    Saturday, June 15, 2013 10:42





    (Before It's News)
    Stephen Lendman
    Activist Post


    General Keith Alexander is NSA director. He’s US Cyber Command head. He’s in charge of lawlessly spying. He directs illegal hacking.
    He does both globally. He’s a serial lawbreaker. He violates fundamental constitutional law. He testified before Congress. More on that below.
    Edward Joseph Snowden revealed what vital to know. He exposed unconstitutional spying. He said more. He accused NSA of lawless hacking. He knows. He was there. He revealed what he saw firsthand.
    On June 14, Russia Today headlined “Snowden’s asset: NSA hacking exposer knows secrets China wants,” saying:
    He’s currently in Hong Kong. He’s a wanted man. Washington wants him extradited, arrested, prosecuted, disappeared or murdered. He fears for his safety.
    According to the Chinese daily Global Times:
    The US is accumulating all the advanced powers of the Internet to forge a state-level ‘fist’ in order to launch cyber attacks on other countries.
    The unparalleled power of this ‘fist’ is beyond our imagination, which should be an alarm bell for us to catch up with the development of the internet.
    On June 14, the South China Morning Post headlined “Edward Snowden: Classified US data shows Hong Kong hacking targets.”
    Records show specific NSA-hacked Hong Kong and mainland dates and IP addresses over a four year period. According to Snowden:
    The primary issue of public importance to Hong Kong and mainland China should be that the NSA is illegally seizing the communications of tens of millions of individuals without any individualised suspicion of wrongdoing.
    They simply steal everything so they can search for any topics of interest.
    Exposure “demonstrated (America’s) hypocrisy and arrogance” on matters regarding cyber warfare.
    On June 12, the Wall Street Journal headlined “NSA Director Says Data Programs Foiled Plots,” saying:
    Classified US government data shown to the South China Morning Post by whistle-blower Edward Snowden has provided a rare insight into the effectiveness of Washington’s top-secret global cyberspying programme.
    New details about the data can be revealed by the Post after further analysis of information Snowden divulged during an exclusive interview on Wednesday in which the former CIA computer analyst exposed extensive hacking by the US in Hong Kong and the mainland.
    In testimony before Senate Appropriations Committee members, NSA Director General Keith Alexander defended the indefensible. He lied doing so. He falsely claimed NSA spying foiled “dozens” of terror plots.
    He “didn’t elaborate on the attacks that were stopped, other than to tie them to two well-known foiled 2009 plots.” More on them below. No such plots existed. They were invented. Innocent victims were falsely accused.
    No verifiable evidence shows any plots were foiled on Alexander’s watch. He’s been NSA chief since August 1, 2005. His claims don’t wash.
    He committed perjury. He’s guilty on multiple counts. Don’t expect recrimination against him. Key Senate members are fully briefed. They’re complicit in state crimes. So are many other congressional members.
    Post 9/11, Washington declared war on Islam. Muslims became America’s enemy of choice. They’ve been wrongfully vilified and dehumanized as terrorists.
    So-called terror plots are fake. None existed earlier. None exist now. Dozens of innocent men and women were falsely charged, prosecuted, convicted and given long prison terms. Expect more innocent victims persecuted ahead.
    Alexander referred to Najibullah Zazi and David Coleman Headley.
    Justice Department officials claimed Zazi “received bomb-making instructions in Pakistan, purchased components of improvised explosive devices, and traveled to New York City on September 10 (2009) in furtherance of his criminal plans.”
    No evidence whatever supported government accusations. Zazi got no bomb-making instructions. He planned no crimes. His so-called ingredients included hydrogen peroxide, acetone and hydrochloric acid.
    He bought them at a beauty shop. He did so legally. Anyone can buy the same things. Hydrogen peroxide’s a common bleaching agent. It’s a mild disinfectant.
    Acetone’s an inflammable organic solvent. It’s used in nail polish remover, plastics and for cleaning purposes.
    Hydrochloric acid’s used in oil production, ore reduction, food processing, pickling, metal cleaning, and over-the-counter eye lubricants, among other applications. It’s found diluted in stomachs.
    Zazi’s alleged plot was fabricated. Authorities claimed he planned to attack New York commuter trains and/or other high-profile New York targets. No motive was explained. None existed.
    No legitimate evidence surfaced. None was presented. Innocence is no defense. Zazi was declared guilty by accusation.
    According to Justice Department officials, Healy was guilty of “a dozen federal terrorism crimes relating to his role in planning the November 2008 terrorist attacks in Mumbai, India, and a subsequent proposed attack on a newspaper in Denmark.”
    No verifiable evidence links him to any crimes. CIA, Mossad, India’s Research Analysis Wing (RAW, and perhaps Pakistan’s ISI were behind twelve coordinated shooting and bombing Mumbai attacks. They were false flags.
    DOJ officials fabricated charges against Healy and others. He’s innocent but guilty as charged. Thousands of political prisoners rot in America’s gulag.
    Media scoundrels pronounce guilt before trial. They do so in the court of public opinion. They support the worst state crimes. They violate core journalistic ethics. They it unapologetically. They betray their readers, viewers and listeners in the process.
    Post-9/11, dozens of Muslims were falsely convicted of terrorism and/or conspiracy to commit it.
    Alexander’s claims about NSA spying foiling plots and keeping America safe don’t wash.
    On June 12, London’s Guardian headlined “Senators press NSA director for answers on secret surveillance program.”
    It was more show-and-tell than holding Alexander accountable. Congress is fully briefed on what’s ongoing. Key members know the worst of it. Permitting it makes them complicit.
    FBI Director Robert Mueller lied like Alexander. In testimony before House Judiciary Committee members, he claimed spying could have foiled 9/11. It will prevent “another Boston,” he said.
    Both incidents were state-sponsored false flags. Mueller didn’t explain. House members didn’t ask. Perhaps they know and don’t need to. Maybe key House and Senate members are briefed in advance of US-staged terror plots.
    Mueller claims watering down spying leaves America vulnerable. “If you narrow (the scope of surveillance), you narrow the dots and that might be the dot that prevents the next Boston,” he said.
    America has no enemies except ones it invents. Mueller lied to Congress. He committed perjury like Alexander. He remains unaccountable.
    He’s stepping down in September. Perhaps he’ll accept a high-paying private sector job. Most exiting US officials do so.
    America’s war on terror continues. Doing so reflects war on humanity. Obama represents the worst of rogue governance. Accountability is sorely lacking. Fundamental laws are spurned.
    Diktat power rules. No one’s safe anywhere. Tyranny and permanent wars define Obama’s agenda. Ravaging humanity continues. Unchallenged dominance alone matters.
    Thermonuclear war is possible. All bets are off if it happens. Imagine a worst case scenario. Imagine not going all out to prevent it.
    Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net. His new book is titled How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War. Also visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening. http://www.progressiveradionetwork.com/the-progressive-news-hour/

    http://beforeitsnews.com/alternative...rticalresponse



    Now what part of treasonous action to the Our Country and to the American People do we not understand here....They lie it is fine, we lie we go to jail, they make up false innuendo's, just fine there, we tell the truth, we go to jail...Makes sense to me....Hmmmm See Something Say Something, well can you hear us now!!!!...Oh so sorry it isn't your kind of "see something say something" truth you want to hear, should we say Heil!

    Praying isn't all we need, we need more than a few good men or women to constantly "see some say something" so we can keep their feet to the fire and their embarrassments out in the open, so a few good men and women will do something about it, because from where I sit they are all in it together and none of them are very good!!!!!





  8. #78

  9. #79
    April
    Guest
    AT&T to Load iPhones With Emergency Alerts From Obama – That You Can’t Switch Off

    Posted by Jim Hoft on Sunday, June 16, 2013, 1:17 AM
    Just in case you want more Obama in your life…
    AT&T is loading iPhones with emergency alerts from Barack Obama…
    That you can’t switch off.

    Engadget reported:
    AT&T has begun rolling out Wireless Emergency Alerts updates for iPhone 4S and 5, so you won’t be the last folks to know if the entire northern hemisphere is about to be covered in ice à la Day After Tomorrow.
    You’ll receive a notification from the carrier when your update is ready, but only if you’re using iOS 6.1 or higher.
    Once installed, AMBER and Emergency alerts are automatically sent to your phone unless you switch them off via Settings. However, should you be tired of Obama, just know that there’s no way to switch off Presidential alerts.
    So now Barack can track your calls and send you messages, too.
    Hat Tip Michael
    UPDATE: Henry sent this screenshot from his Blackberry z 10 phone.

    955 522 102 1635


    538 Comments

  10. #80
    Guest
    Join Date
    Aug 2009
    Posts
    9,266
    Which Websites Are Under NSA surveillance – This May Shock You!!!


    Saturday, June 15, 2013 18:00


    (Before It's News)
    (Be The Media) – One of BIN contributor, Ye Olde False Flag, recently posted an excellent article about a Firefox plug-in that warns computer users about potential government surveillance. Ye Old False Flag explains that a 28-year-old artist and developer from Brooklyn, NY has found a fun way to alert users of potential NSA snooping by creating the “The Dark Side of The Prism’ browser extention, which plays songs from Pink Floyd’s 1973 classic “The Dark Side of The Moon” each time a questionable website is crossed.
    Since I already have many plug-ins, proxies, gadgets and other goodies that keep me invisible to prying eyes online, I definitely had to give this one a try. I installed the plug-in and accessed several webpages that Ive always been a tad suspicious about. Well, the songs went off on pretty much most of the ones I suspected!
    Below are some of the websites where the “alarm” went off. I’ve compiled news, social media, alternative news, governement and pro-constitution websites. Now the question is if these sites are unknowingly being tracked to keep tabs on visitors or if the ones behind them are nothing but government shills feeding the masses controlled oppositon. You decide. Comments are more than welcomed so we can extend the discussion.
    http://www.irs.gov/
    http://www.ronpaul.com/
    http://sheriffmack.com/
    http://constitutionclub.ning.com/ (Constitutional Sheriffs)
    https://www.youtube.com/
    http://petersantilli.com/
    http://www.infowars.com/
    http://www.davidicke.com/
    https://pandaunite.org/ (People Against the NDAA)
    http://divinecosmos.com/
    http://www.stewwebb.com/
    http://21stcenturywire.com/
    http://www.orlytaitzesq.com/
    http://exovaticana.com/
    http://americannationalmilitia.com/
    http://disinfo.com/
    http://brianhaw.tv/index.php
    http://in5d.com/
    http://misstilaomg.com/
    http://www.freedominfonetwork.org/
    http://www.activistpost.com/
    http://www.watchmanscry.com
    https://endtimesnews.wordpress.com/
    https://www.facebook.com/
    https://www.microsoft.com
    http://google.com/
    http://apple.com/
    http://www.yahoo.com/
    http://rt.com/

    http://beforeitsnews.com/blogging-ci...in.info%2Fa7rK

Page 8 of 59 FirstFirst ... 4567891011121858 ... LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •