Sunday, December 29, 2013

Real-life Secret Santa Shows Incredible Kindness to the Homeless! You'll be Moved to Tears!!!

A SPECIAL MESSAGE TO DINARIANS WORLDWIDE :
With the RV pending, I can only hope that those of us who will receive financial blessings from it will look for every way possible to help those less fortunate than us on a continuing basis. 
PLEASE WATCH THE VIDEO BELOW ...........
Don't miss videos like Funny Church Signs, Praying Dogs, Miraculous Healing, Hilarious Baptisms, Amazing Child Singers and MORE!

  



GodTube.com must-see video

Click to Watch Now
Click to Watch Now

          SHARE

        

When You Realize What This Santa Claus is Doing, You'll Cry

Santa's sack is usually known to be filled with toys for the good girls and boys. But this time, Santa has a surprise that'll bring tears to your eyes. This is awesome!



Salem Web Network | Copyright 2013. All rights reserved. | 111 Virginia St., Suite 500, Richmond, VA 23219

The Federal Reserve on Trial

video on this page

The Federal Reserve on Trial

August 20, 2013 by Kris Zane


Starr International, which in the global meltdown in 2008 owned more AIG stock than any other entity, spells out in a $25 billion lawsuit against the Federal Reserve, how the Fed, acting in the name of the U.S. Government, illegally took control of AIG. That the Fed then gutted the company to the tune of billions of dollars and secretly siphoned off this money to other financial institutions, including foreign banks.

How many foreign banks? The list goes on and on, but here are a few: Societe Generale, Deutsche Bank, Banco Santander (Spain), and Royal Bank of Scotland.
…The unprecedented approach the Government took with AIG enabled the Government to use AIG as a vehicle to covertly funnel billions of dollars to other preferred financial institutions, including billions of dollars to foreign entities, in a now well-documented “backdoor bailout” of these financial institutions. (Starr International v. United States of America p.8)
But this is just half of the story. AIG shareholders in 2008 overwhelmingly rejected the Federal Reserve’s bid to take control of the company.  But the Fed, acting in the name of the U.S. Government, spurned the law and Constitution.
Per the lawsuit:
Plaintiff’s claim is governed by the Fifth Amendment to the United States Constitution, which provides in pertinent part that no person shall “be deprived of life, liberty, or property, without due process of law.” (Starr International v. United States of America p.12)
The entity known as the Federal Reserve, in fact not part of the federal government, nor actually having any money reserves, like a robber baron, illegally commandeered AIG.
Though the lawsuit names the United States government as the plaintiff, Starr International is clear that the Federal Reserve was the body that gutted the company:
In connection with the transactions commencing in September 2008 described above, the Federal Reserve Bank of New York (“FRBNY”) assumed control of AIG as a controlling shareholder and controlling lender. (Starr International v. United States of America p.9)
The Fed, not satisfied with gutting the company and feeding billions to foreign banks, then proceeded to force the company, then 90% owned by the U.S. Government, to take so-called bailout loans at exorbitant rates:
This is the only time in history when a borrower from the Government, let alone a fully-secured borrower, was charged such an extortionate interest rate. (Starr International v. United States of America p.6)
This sounds like a Mafia shakedown! Who’s running the Federal Reserve—Al Capone?
Starr International, the plaintiff, joined by thousands of other former AIG stockholders, including former AIG Chairman, Maurice “Hank” Greenberg,  subpoenaed the modern day Al Capone—none other than Fed Chairman Ben Bernanke. But Bernanke and the Federal Reserve, being above the law, refused. Starr International then filed a separate lawsuit to have a federal court compel Bernanke to testify. Eric Holder’s DOJ fought tooth and nail to prevent this, saying high government officials should not have to testify. Never mind that the Federal reserve is not part of the government! On August 12, federal judge Thomas Wheeler of the U.S. Court of Federal Claims ruled against the government, and mandated that Bernanke must testify.
Whether Bernanke will actually obey the law and testify remains to be seen. Perhaps Bernanke’s testimony will reveal the Fed’s illegal operations and will be the beginning of dismantling the Fed. The so-called “Federal Reserve” that has no reserves.  That is not part of the Federal government, but enjoys federal protections. That has destroyed the  economy,  despite its charter mandating that it stabilize the economy. That has devalued our currency more than 90% since its inception in 1913,  and if not stopped will eventually destroy this country.
Will this lawsuit be the beginning of the end for the Federal Reserve?
Time will tell.
http://www.westernjournalism.com/the-federal-reserve-on-trial/
The Federal Reserve

THE FEDERAL RESERVE IS A BANKING CARTEL (excellent!)

communist obama marxist socialist maoist progressive
communist obama marxist socialist maoist progressive
Federal Reserve
On Trial

$25 Billion Lawsuit for Assorted Crimes

http://www.commieblaster.com/nwo-cfr-bilderberg/index.html

BARRY's Secret Treaty

Please take a few minutes and you'll see the danger we are in.


>
> Subject: Zero’s Secret Treaty
>

>
> Obama’s Secret Treaty Which Will Merge America More Deeply Into The
> Emerging One World Economic System
>
> By Michael Snyder
>
> [http://theeconomiccollapseblog.com/archives/obamas-secret-treaty-which-will-merge-america-more-deeply-into-the-emerging-one-world-economic-system/barack-obama-on-the-phone-in-the-oval-office-2009-2]
>
>
>
> Did you know that the Obama administration is negotiating a super secret
> "trade agreement" that is so sensitive that he isn't even allowing members
> of Congress to see it?  The Trans-Pacific Partnership
>  is being called the "NAFTA of the Pacific" and "NAFTA on steroids", but the
>
> truth is that it is so much more than just a trade agreement.  This treaty
> has 29 chapters, but only 5 of them have to do with trade.  Most Americans
> don't realize this, but this treaty
>  will fundamentally change our laws regarding Internet freedom, health care,
>
> the trading of derivatives, copyright issues, food safety, environmental
> standards, civil liberties and so much more.  It will also merge the United
>
> States far more deeply into the
>  emerging one world economic system.  Initially, twelve nations will be a
> party to this treaty including the United States, Mexico, Canada, Japan,
> Australia, Brunei, Chile, Malaysia, New Zealand, Peru, Singapore and
> Vietnam.  Together, those nations represent
>  approximately 40 percent of global GDP.  It is hoped that additional
> nations such as the Philippines, Thailand and Colombia will join the treaty
>
> later on.
>
> There are some very good reasons why Obama does not want the American people
>
> to know anything about what is in this treaty.  This agreement will impose
> very strict Internet copyright rules on
>  the American people, it will ban all "Buy American" laws, it will give Wall
>
> Street banks much more freedom to trade risky derivatives and it will force
>
> even more domestic manufacturing offshore.
>
> It contains a whole host of things that Obama would be unable to get through
>
> Congress on his own.  But he is hoping to spring this on Congress at the
> last minute and get them to agree to this
>  "free trade agreement" before they realize all of the things that are
> contained in it.
>
> The secrecy surrounding these treaty negotiations have really been
> unprecedented.  The following is an excerpt from a recent article by
>  Kurt Nimmo
> [http://www.infowars.com/secret-globalist-treaty-threatens-internet-freedom/]...
>
> And Obama reportedly is seeking "trade
>  promotion authority"
> [http://www.wnd.com/2013/10/obama-secretly-signing-away-u-s-sovereignty/]
> which would give him the ability to sign this treaty before Congress even
> votes on it...
>
> Normally free -trade agreements must be authorized by a majority of the
> House and Senate, usually in lengthy proceedings.
>
> However, the White House is seeking what is known as “trade promotion
> authority” which would fast track approval of the TPP by requiring
> Congress to vote on the likely lengthy trade
>  agreement within 90 days and without any amendments.
>
> The authority also allows Obama to sign the agreement before Congress even
> has a chance to vote on it, with lawmakers getting only a quick post-facto
> vote.
>
> This is so insidious that it is hard to find the words to describe it.
>
> In essence, Obama is trying to make a giant end run around Congress on
> dozens of different issues that are addressed by this treaty.
>
> Fortunately, there are at least some members of Congress that are waking up
>
> to this.  Earlier this
>  week
> [http://www.huffingtonpost.com/2013/11/12/trans-pacific-partnership-house_n_4263174.html],
>
> a small group of Republicans and a small group of Democrats both sent Obama
>
> a letter condemning this "free trade" agreement...
>
> Separate groups of House Republicans and Democrats on Tuesday condemned the
>
> Obama administration's proposed sweeping free trade agreement with 11
> Pacific nations, known as the Trans-Pacific
>  Partnership.
>
> Strongly worded letters to President Barack Obama Tuesday were signed by
> hardline tea partiers, true-blue progressives, and moderate,
> corporate-friendly lawmakers in both parties,
>  indicating political trouble for a trade deal the administration had hoped
>
> to seal by year end.
>
> This is one of the most important political issues facing our nation here at
>
> the end of 2013, and yet you hear next to nothing about this treaty on the
> mainstream news.  If this treaty is approved,
>  the United States will be permanently bound by the provisions of this
> treaty and will never be able to change them unless
>  all of the other countries agree
> [http://www.thenation.com/article/168627/nafta-steroids]...
>
> Countries would be obliged to conform all their domestic laws and
> regulations to the TPP’s rules—in effect, a corporate coup d’état.
> The proposed pact would limit even how governments
>  can spend their tax dollars. Buy America and other Buy Local procurement
> preferences that invest in the US economy would be banned, and
> “sweat-free,” human rights or environmental conditions on government
> contracts could be challenged. If the TPP comes to
>  fruition, its retrograde rules could be altered only if all countries
> agreed, regardless of domestic election outcomes or changes in public
> opinion. And unlike much domestic legislation,
>  the TPP would have no expiration date.
>
> Are you starting to understand just how dangerous this treaty is?
>
> Let me give you just one example of how this treaty could directly affect
> you.
>
> Do you remember SOPA
> [http://endoftheamericandream.com/archives/why-we-must-stop-sopa]?
>
> There was a huge public backlash when the very strict Internet copyright
> provisions of SOPA were revealed to the public, and the American people
> loudly expressed their displeasure to members of
>  Congress.
>
> But now the provisions of SOPA are back.  Most of them have reportedly been
>
> very quietly inserted into this treaty.  If this treaty is enacted, those
> provisions will become law and the American
>  people will not be able to do a thing about it.
>
> And according to an article in the
>  New York Times
> [http://www.nytimes.com/2013/06/03/opinion/obamas-covert-trade-deal.html?nl=todaysheadlines&emc=edit_th_20130603&_r=1&],
>
> there are all sorts of other disturbing things that have been slipped into
> this treaty...
>
> And yet another leak revealed that the deal would include even more
> expansive incentives to relocate domestic manufacturing offshore than were
> included in Nafta — a deal that drained
>  millions of manufacturing jobs from the American economy.
>
> The agreement would also be a boon for Wall Street and its campaign to water
>
> down regulations put in place after the 2008 financial crisis. Among other
> things, it would practically
>  forbid bans on risky financial products, including the toxic derivatives
> that helped cause the crisis in the first place.
>
> Are you starting to grasp why the Obama administration is so determined to
> keep this treaty such a secret?
>
> In addition, this "free trade" agreement will push the ongoing
> deindustrialization of America into overdrive.  Every year, we buy hundreds
>
> of billions of dollars more stuff from the rest of the
>  world than they buy from us.  Tens of thousands of American businesses have
>
> been lost as a result, and millions of good jobs have been shipped
> overseas.
>
> If you are not familiar with our "trade deficit", you really should be.  It
>
> is one of the issues at the very heart of our economic problems.  Posted
> below is a short 3
>  minute video [http://www.youtube.com/watch?v=JEQO0PBC5L8] that briefly
> discusses the trade deficit and why it is so important...
>
> Slowly merging our economy with the rest of the planet has been absolutely
> disastrous for America.  Just consider the following statistics...
>
> -Overall, the United States has run a trade deficit of more
>  than 8 trillion dollars
> [http://theeconomiccollapseblog.com/archives/22-stats-that-show-how-the-emerging-one-world-economy-is-absolutely-killing-american-workers]
>
> with the rest of the world since 1975.
>
> -The United States has lost more
>  than 56,000
> [http://www.politifact.com/ohio/statements/2011/nov/07/betty-sutton/betty-sutton-says-average-15-us-factories-close-ea/]
>
> manufacturing facilities since 2001.
>
> -Back in the year 2000, there were more
>  than 17 million [http://research.stlouisfed.org/fred2/data/MANEMP.txt]
> Americans working in manufacturing.  Now there are less than 12 million
> [http://research.stlouisfed.org/fred2/data/MANEMP.txt].
>
> -There are less Americans working in manufacturing today than
>  there was in 1950
> [http://theeconomiccollapseblog.com/archives/10-amazing-charts-that-demonstrate-the-slow-agonizing-death-of-the-american-worker]
>
> even though the population of the country has more than doubled since then.
>
> -Back in 1950, more than 80 percent
> [http://research.stlouisfed.org/fred2/series/LNS12300001] of
>  all men in the United States had jobs.  Today, less than 65 percent
> [http://research.stlouisfed.org/fred2/series/LNS12300001] of all men
>  in the United States have jobs.
>
> -When NAFTA was pushed through Congress in 1993, the United States had a
> trade surplus with Mexico of 1.6 billion dollars.
>  By 2010, we had a trade deficit with Mexico of 61.6
>  billion dollars
> [http://www.wnd.com/2012/06/we-need-more-economic-nationalists/].
>
> -Back in 1985, our trade deficit with China was approximately 6
> milliondollars [http://www.census.gov/foreign-trade/balance/c5700.html]
> (million
>  with a little "m") for the entire year.  In 2012, our trade deficit with
> China was 315 billion dollars
> [http://www.census.gov/foreign-trade/balance/c5700.html].
>  That was the largest trade deficit that one nation has had with another
> nation in the history of the world.
>
> -According to the Economic Policy Institute, America is losing half
>  a million jobs
> [http://economyincrisis.org/content/trade-deficit-china-could-cost-half-million-jobs]
>
> to China every single year.
>
> -According to Professor Alan Blinder of Princeton University, 40
>  million [http://www.cnbc.com/id/44625759]more U.S. jobs could be sent
> offshore over the next two decades if current trends continue.
>
> Once upon a time, our great manufacturing cities were the envy of the entire
>
> planet.  In fact, at one time Detroit actually had the highest per capita
> income in the United States.
>
> But now Detroit is a rotting, decaying, festering hellhole that is
> completely bankrupt.  And there are dozens of other formerly great
> manufacturing cities that are heading down the exact same
>  path.
>
> These "free trade" agreements are neither "free" nor "fair" when you really
>
> examine them, and they are absolutely eviscerating the middle class.
>
> Please urge your representatives in Congress to block the Trans-Pacific
> Partnership.  If this treaty does get approved, it is going to make a lot of
>
> our problems a whole lot worse.

WHO AM I ?

Can You Guess Who I Am ?

PLEASE TAKE THE TIME TO WATCH THIS. IT IS NOT VERY LONG, BUT IS POWERFUL AND I GUARANTEE YOU WILL BE SHOCKEDAT WHO THIS PERSON IS.....

Can You Guess Who I am? (hang in till the end, your first guess WILL be wrong!)




More Tony

I forgot to tell you guys that the bonds did pre-sell at the rate of $3.71 according to Iraq sources. This rate can change when it goes international.
Also, Iraq library of law is on record as of today saying that the qui cards will go international Jan 1, 2014 and that the tariff  laws will be in effect on Jan 2, 2014.  It  says there  will be a rise in the dinar on Jan 1, 2014.   This is also in their gazette, its public knowledge.  It is now in black and white.  None of this can happen unless the dinar is international.
TNTDinar
12/29/13

Tony

DHS Is Bringing In Terrorists By The Busload.... The Next False Flag Is On The Way

WE NEED TO HAVE A LIST OF ALL DHS EMPLOYEES WHO ARE COMPLICENT WITH THIS !!!
 
 
43-min Video: X-22 Report - - DHS Is Bringing In Terrorists By The Busload.... The Next False Flag Is On The Way
Posted By: Watchman
Date: Saturday, 28-Dec-2013 19:21:22
: “It is not the size of the dog in the fight, but the size of
: the fight in the dog”. This axiom is soon going to be put
: to the test in the United States.
: Dr. Jim Garrow is a name you are going to be seeing a lot of
: in the truthful media for the foreseeable future. Garrow is
: a former deep cover CIA agent who has his hand on the pulse
: of the crises which are befalling America. What separates
: Dr. Garrow from many high level sources who are disgusted
: with the status quo, is that he is on the record and is
: publicly visible.
: While many of the 200+ command level officers fired by Obama
: are informing many of us in the media about the current
: state of affairs, they are not on the record. Other than
: self-preservation, the major reason why these former
: military commanders are not on the record is because some
: of them are involved in planning a guerrilla war against
: the occupation forces commanded by this administration
: under the auspices of DHS. And this is precisely what Dr.
: Garrow stated on my December 22, 2013 show which you can
: listen to here. He also went on to say that a coup attempt
: is probable and that a prolonged guerrilla civil war is
: likely. All of my sources state that the coming civil war
: will be a guerrilla war.
: Why the Coming Civil War Will Be a Guerrilla War---

P.S. TO THE TNT SUNDAY EVENING BLAST...

Subject: P.S. TO THE TNT SUNDAY EVENING BLAST.....................

.

I forgot to tell you guys that the bonds did pre-sell at the rate of $3.71 according to Iraq sources. This rate can change when it goes international.

Also, Iraq library of law is on record as of today saying that the qui cards will go international Jan 1, 2014 and that the tariff  laws will be in effect on Jan 2, 2014.  It  says there  will be a rise in the dinar on Jan 1, 2014.   This is also in their gazette, its public knowledge.  It is now in black and white.  None of this can happen unless the dinar is international.

TNTDinar

12/29/13

Tony

Inside TAO: Documents Reveal Top NSA Hacking Unit

Inside TAO: Documents Reveal Top NSA Hacking Unit

By SPIEGEL Staff
The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.
In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn't budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.
In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States' foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA's radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

It was thanks to the garage door opener episode that Texans learned just how far the NSA's work had encroached upon their daily lives. For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001.
On-Call Digital Plumbers
One of the two main buildings at the former plant has since housed a sophisticated NSA unit, one that has benefited the most from this expansion and has grown the fastest in recent years -- the Office of Tailored Access Operations, or TAO. This is the NSA's top operative unit -- something like a squad of plumbers that can be called in when normal access to a target is blocked.
According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks.
The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
A Unit Born of the Internet
Defining the future of her unit at the time, she wrote that TAO "needs to continue to grow and must lay the foundation for integrated Computer Network Operations," and that it must "support Computer Network Attacks as an integrated part of military operations." To succeed in this, she wrote, TAO would have to acquire "pervasive, persistent access on the global network." An internal description of TAO's responsibilities makes clear that aggressive attacks are an explicit part of the unit's tasks. In other words, the NSA's hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries -- nearly everywhere in the world. In 2010, it conducted 279 operations worldwide.
Indeed, TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry's BES email servers, which until then were believed to be securely encrypted. Achieving this last goal required a "sustained TAO operation," one document states.
This TAO unit is born of the Internet -- created in 1997, a time when not even 2 percent of the world's population had Internet access and no one had yet thought of Facebook, YouTube or Twitter. From the time the first TAO employees moved into offices at NSA headquarters in Fort Meade, Maryland, the unit was housed in a separate wing, set apart from the rest of the agency. Their task was clear from the beginning -- to work around the clock to find ways to hack into global communications traffic.
Recruiting the Geeks
To do this, the NSA needed a new kind of employee. The TAO workers authorized to access the special, secure floor on which the unit is located are for the most part considerably younger than the average NSA staff. Their job is breaking into, manipulating and exploiting computer networks, making them hackers and civil servants in one. Many resemble geeks -- and act the part too.
Indeed, it is from these very circles that the NSA recruits new hires for its Tailored Access Operations unit. In recent years, NSA Director Keith Alexander has made several appearances at major hacker conferences in the United States. Sometimes, Alexander wears his military uniform, but at others, he even dons jeans and a t-shirt in his effort to court trust and a new generation of employees.
The recruitment strategy seems to have borne fruit. Certainly, few if any other divisions within the agency are growing as quickly as TAO. There are now TAO units in Wahiawa, Hawaii; Fort Gordon, Georgia; at the NSA's outpost at Buckley Air Force Base, near Denver, Colorado; at its headquarters in Fort Meade; and, of course, in San Antonio.

One trail also leads to Germany. According to a document dating from 2010 that lists the "Lead TAO Liaisons" domestically and abroad as well as names, email addresses and the number for their "Secure Phone," a liaison office is located near Frankfurt -- the European Security Operations Center (ESOC) at the so-called "Dagger Complex" at a US military compound in the Griesheim suburb of Darmstadt.
But it is the growth of the unit's Texas branch that has been uniquely impressive, the top secret documents reviewed by SPIEGEL show. These documents reveal that in 2008, the Texas Cryptologic Center employed fewer than 60 TAO specialists. By 2015, the number is projected to grow to 270 employees. In addition, there are another 85 specialists in the "Requirements & Targeting" division (up from 13 specialists in 2008). The number of software developers is expected to increase from the 2008 level of three to 38 in 2015. The San Antonio office handles attacks against targets in the Middle East, Cuba, Venezuela and Colombia, not to mention Mexico, just 200 kilometers (124 miles) away, where the government has fallen into the NSA's crosshairs.
Part 2: Targeting Mexico
Mexico's Secretariat of Public Security, which was folded into the new National Security Commission at the beginning of 2013, was responsible at the time for the country's police, counterterrorism, prison system and border police. Most of the agency's nearly 20,000 employees worked at its headquarters on Avenida Constituyentes, an important traffic artery in Mexico City. A large share of the Mexican security authorities under the auspices of the Secretariat are supervised from the offices there, making Avenida Constituyentes a one-stop shop for anyone seeking to learn more about the country's security apparatus.
Operation WHITETAMALE
That considered, assigning the TAO unit responsible for tailored operations to target the Secretariat makes a lot of sense. After all, one document states, the US Department of Homeland Security and the United States' intelligence agencies have a need to know everything about the drug trade, human trafficking and security along the US-Mexico border. The Secretariat presents a potential "goldmine" for the NSA's spies, a document states. The TAO workers selected systems administrators and telecommunications engineers at the Mexican agency as their targets, thus marking the start of what the unit dubbed Operation WHITETAMALE.
Workers at NSA's target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets. As a first step, TAO penetrated the target officials' email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data.
Soon the NSA spies had knowledge of the agency's servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies' structures, including video surveillance. It appears the operation continued for years until SPIEGEL first reported on it in October.
The technical term for this type of activity is "Computer Network Exploitation" (CNE). The goal here is to "subvert endpoint devices," according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives -- "servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc." SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country's critical infrastructure.
The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran's nuclear program, and successfully so. The country's nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran's uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable.
The special NSA unit has its own development department in which new technologies are developed and tested. This division is where the real tinkerers can be found, and their inventiveness when it comes to finding ways to infiltrate other networks, computers and smartphones evokes a modern take on Q, the legendary gadget inventor in James Bond movies.
Having Fun at Microsoft's Expense
One example of the sheer creativity with which the TAO spies approach their work can be seen in a hacking method they use that exploits the error-proneness of Microsoft's Windows. Every user of the operating system is familiar with the annoying window that occasionally pops up on screen when an internal problem is detected, an automatic message that prompts the user to report the bug to the manufacturer and to restart the program. These crash reports offer TAO specialists a welcome opportunity to spy on computers.
When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft. An internal presentation suggests it is NSA's powerfulXKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic.
The automated crash reports are a "neat way" to gain "passive access" to a machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.
Although the method appears to have little importance in practical terms, the NSA's agents still seem to enjoy it because it allows them to have a bit of a laugh at the expense of the Seattle-based software giant. In one internal graphic, they replaced the text of Microsoft's original error message with one of their own reading, "This information may be intercepted by a foreign sigint system to gather detailed information and better exploit your machine." ("Sigint" stands for "signals intelligence.")
One of the hackers' key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They've bestowed their spying tools with illustrious monikers like "ANGRY NEIGHBOR," "HOWLERMONKEY" or "WATERWITCH." These names may sound cute, but the tools they describe are both aggressive and effective.
According to details in Washington's current budget plan for the US intelligence services, around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these "implants" are conducted by TAO teams via the Internet.
Increasing Sophistication
Until just a few years ago, NSA agents relied on the same methods employed by cyber criminals to conduct these implants on computers. They sent targeted attack emails disguised as spam containing links directing users to virus-infected websites. With sufficient knowledge of an Internet browser's security holes -- Microsoft's Internet Explorer, for example, is especially popular with the NSA hackers -- all that is needed to plant NSA malware on a person's computer is for that individual to open a website that has been specially crafted to compromise the user's computer. Spamming has one key drawback though: It doesn't work very often.
Nevertheless, TAO has dramatically improved the tools at its disposal. It maintains a sophisticated toolbox known internally by the name "QUANTUMTHEORY." "Certain QUANTUM missions have a success rate of as high as 80%, where spam is less than 1%," one internal NSA presentation states.
A comprehensive internal presentation titled "QUANTUM CAPABILITIES," which SPIEGEL has viewed, lists virtually every popular Internet service provider as a target, including Facebook, Yahoo, Twitter and YouTube. "NSA QUANTUM has the greatest success against Yahoo, Facebook and static IP addresses," it states. The presentation also notes that the NSA has been unable to employ this method to target users of Google services. Apparently, that can only be done by Britain's GCHQ intelligence service, which has acquired QUANTUM tools from the NSA.
A favored tool of intelligence service hackers is "QUANTUMINSERT." GCHQ workers used this method to attack the computers of employees at partly government-held Belgian telecommunications company Belgacom, in order to use their computers to penetrate even further into the company's networks. The NSA, meanwhile, used the same technology totarget high-ranking members of the Organization of the Petroleum Exporting Countries (OPEC) at the organization's Vienna headquarters. In both cases, the trans-Atlantic spying consortium gained unhindered access to valuable economic data using these tools.
Part 3: The NSA's Shadow Network
The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".)
In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
A Race Between Servers
Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID.
This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer.
The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
Tapping Undersea Cables
At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors.
One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.
The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
It appears the government hackers succeeded here once again using the QUANTUMINSERT method.
The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues.
But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
Spying Traditions Live On
To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work.
Responding to a query from SPIEGEL, NSA officials issued a statement saying, "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies." The statement added that TAO's "work is centered on computer network exploitation in support of foreign intelligence collection." The officials said they would not discuss specific allegations regarding TAO's mission.
Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.
Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.
These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
Even in the Internet Age, some traditional spying methods continue to live on.
REPORTED BY JACOB APPELBAUM, LAURA POITRAS, MARCEL ROSENBACH, CHRISTIAN STÖCKER, JÖRG SCHINDLER AND HOLGER STARK
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html

AT A TIME OF THE "PRESIDENT'S" CHOOSING ....................... THE "FEDERAL GOVERNMENT" MAY TAKE OVER

'President's "EXECUTIVE ORDER 13603"

NOTE: Remember this 'president' is president of a private foreign corporation that is posing as your 'government.'  This is NOT our nation TRUE government.  You are NOT his employees and are NOT subject to his 'executive orders' nor to his taxes nor to his 'healthcare.'  When is America going to have ENOUGH and make the overdue changes???
 
AT A TIME OF THE "PRESIDENT'S" CHOOSING .......................
 
THE "FEDERAL GOVERNMENT" MAY TAKE OVER (unless America puts a stop to this fraud and treason) ...................
 
*ALL energy
*ALL food...human and animal
*ALL transportation
*ALL water
*ALL health resources
 
in the USA. That includes the food on your dining room table. 
 
CONTRIBUTOR: common sense. The Third Wave of US Martial Law Mass Detentions Dave Hodges The Common Sense Show This is a two part series which examines the extreme threat posed by President Obama’s Executive Order (EO) 13603. How Will DHS Conduct Mass Roundups of American Citizens? Thanks to the NDAA and...

 

The Psy-opp Hoax Continues On - Guess Who The Corporation of the United States Deems "Terrorist"

The Psy-opp Hoax Continues On - Guess Who The Corporation of the United States Deems "Terrorist"
Posted By: Lion [Send E-Mail]
Date: Sunday, 29-Dec-2013 10:09:04

-------------------------------
The despots of the Corporation lie again - and again.
Reader D: "It is because we are the 'enemy'.
http://www.rumormillnews.com/cgi-bin/forum.cgi?read=295014
Thanks, D
This is one of the 'must know' fundamentals of the questions we all have asked: "How can they possibly do what they do; and yet they are referred to as "leaders"?
We did not choose this path.
We went in with eyes wide shut, believing 'they' wanted what was best for the Republic - because what is best for the People and the Republic is how we think, and we falsely surmised 'they' wanted the same.
...Not even close to the reality that is.
All Americans outside of Washington DC have been declared "Enemies of the State" AKA 'terrorist' in today's vernacular - officially - since 1933.
Think about that for a moment...
Your own 'government' - the parasites you pay for, vote for, are forced to obey, and are preyed upon by - on a daily basis - officially (by corporate law) have classified YOU as their official ENEMY for over 80 years.
Does anyone with a stitch of common sense see a reason for their continued existence?
Lion
-----------------------------
Re: I Believe The Answer Is In The Question
It is because we are the enemy
A Special Report on the National Emergency in the United States of America
..From Data On The Web and Archives, and the work of Dr. Eugene Schroder, et al, 1979 to present.
Not sure it can be stated in any clearer terms as to the situation we face as a people, cannot you understand what it means for them to look upon us as an enemy?
1933...80 years and counting, and the current bunch in Congress cannot and will not do anything about it.
Every single one that is up should be voted out, and the newly elected put on notice that this National Emergency farce MUST be addressed NOW.
No one man should have as much power as has been invested in the Executive over the last 80 years.
http://netteandme.blogspot.com/2013/12/a-special-report-on-national-emergency.html
---------------------------
: Re: READER REPLY - THE UNITED STATES IS IN A S....
: The 'permanent state of national emergency' is indeed what is
: going on. To make
: matter worse, during a declared state of national emergency We
: the People have been
: classified as "enemies of the state".
: In Sept 2013 Obama renewed the state of emergency due to the
: ongoing "war on terror".
:
http://anticorruptionsociety.com/2013/11/04/obama-reclaims-war-and-emergency-powers/
: This explains why the police state is growing. As long as
: there is a 'state of
: emergency' the Presidential dictatorship remains in power. Now
: we know why Aaron
: Russo exposed that Rockefeller was predicting a permanent
: "war on terror" whereas
: the enemy can't be identified therefore there could never be
: an end.
http://www.rumormillnews.com/cgi-bin/forum.cgi?read=295307

TD Update "The Stars May Be Lining Up In Our Favor"

TD Update "The Stars May Be Lining Up In Our Favor" 

12/29/2013
A Post sent to Dinar Daily from TD

THE STARS MAY BE LINING UP IN OUR FAVOR !

OK , Well some very positive news coming out through my Amigo who confirms that :

1) The postponement of the Bond sales was temporary and it JUST MAY happen sooner than later. Can't verify any rates, etc.

2) "Payment systems" through electronic banking, smart cards, etc. have been tested for efficiency and ready to go.
...
Read More Link On Right

3) As we saw M had another temper tantrum and arrested an opposition MP.

Then , just 24 hours later was released . This "RELEASE" is not by mistake as M had tremendous pressure caving in on him being told "With so much at stake, Are you really going to act like another Saddam" ?

The action of quick release is quite remarkable for a country like Iraq !

Something significant is lining up. While I remain cautiously optimistic, the next few days remain quite possible for numerous agenda items to be carried out.

While I'm not promising anything , I was told that the economists and accountants want programs & policies to be executed during the beginning of the fiscal year.

Whether buttons will be pushed Jan 1st (or thereabout) or Feb 1st. I can't really say.

Again, be grounded but news I received today (yes, rumors) are indeed positive. Due your own diligence, homework, fact check, etc. ( if you can) because the lights will be all off for couple days (news) and then we shall see ??

BE COOL !!  REGARDS,  TD
 
 

"We Now Know That The Attack On The CA. PG&E Substation Was Not A Bunch Of Amatuers Taking Potshots"

"We Now Know That The Attack On The CA. PG&E Substation Was Not A Bunch Of Amatuers Taking Potshots"
Posted By: WatchmanDate: Sunday, 29-Dec-2013 15:45:49


I’m going to start pushing out sporadic news reports with some level of intelligence-related interest, and calling them (for now) the Executive Summary (EXSUM). EXSUMs are typically written for flag-officer commanders who only have time to hear the most pressing developments. I present them for your viewing pleasure.
Critical Infrastructure.
Know where it is, and how it can affect you. We already know that the electrical grid is a vulnerability. Whether you believe in false-flag terrorism, Islamic terrorism, or a mix of the two, you really ought be to preparing for an event in which something like this causes some serious problems. Attackers infiltrated a California substation, disable 911 phone lines, and then fired 100 rounds that caused some damage to transformers. What’s most interesting is what the authorities now believe about the attack.
“Initially, the attack [on the substation] was being treated as vandalism and handled by local law enforcement,” the senior intelligence official said. “However, investigators have been quoted in the press expressing opinions that there are indications that the timing of the attacks and target selection indicate a higher level of planning and sophistication.”

“These were not amateurs taking potshots,” Mark Johnson, a former vice president for transmission operations at PG&E, said last month at a conference on grid security held in Philadelphia. “My personal view is that this was a dress rehearsal” for future attacks.
Source: Foreign Policy
Cell Phones Becoming NSA In-Flight Entertainment.
It only makes sense that NSA wants to monitor you 100% of the time. If they can’t, then they have a problem (and so do you).
[Greenwald:]
The NSA and GCHQ … are obsessed with searching out any small little crevice on the planet where some forms of communication may be taking place without them being able to invade it.
… the NSA and GCHQ are being driven crazy by this idea that you can go on an airplane and use certain cellphone devices or internet services and be away from their prying eyes for a few hours at a time.
Source: The Register – UK
DHS Cyber Expansion.
DHS plans on adding to its cyber workforce, even though 20% of billeted positions remain unfilled, according to the report. When a nation is so dependent upon the net for its communications, finance, and economy, a cyber attack becomes as dangerous as a nuclear weapon, with a payload much easier to deliver.
A proposed amendment to the Homeland Security Act calls for the DHS Secretary to regularly evaluate the readiness and capacity of the agency’s cyber staff to meet its cybersecurity mission, form a five-year recruitment plan, and develop a 10-year projection of workforce needs.
Source: acm.org
Killing Cities to Save Them.
Those of you who poo-poo military strategy and descriptions of warfare in order to characterize and learn from them, stop reading here. Everyone else, take a look at what Kilcullen (Counterinsurgency, The Accidental Guerrilla – we’ve talked about him on this blog several times) was on NPR to describe how the face of war is changing. Here, he describes how US/CF locked down cities… words to the wise.
… I think the lessons [of lowering civilian deaths in Iraq] are important because we did it by killing the city. We shut the city down. We brought in more than 100 kilometers of concrete T-wall. We put troops on every street corner. We got alongside people and try to make them feel safe. It was very, you know, sort of human intense and equipment intense. That option will not be open for us in the mega city. You won’t be able to do that in Karachi or just obviously, hypothetical examples, Lagos or Dakar or any of the big cities. There are 20 million people…
You could lose the entire U.S. military that went to Iraq in one of the cities, and most people that lived there wouldn’t even know. Counterinsurgency as practiced in Afghanistan and Iraq just won’t be feasible in a large city on a coast line in the next 20 or 30 years.
Of course, towns the size of 100,000 and smaller are prime territory for the Baghdad neighborhood-style of counterinsurgency that we saw throughout the mid-2000s in Iraq and Afghanistan. So if you expect a township rebellion, expect a troop ‘on every corner’, so to speak.
Kilcullen goes on to describe where and how urban conflict is born:
As I’ve looked at all the cities that are growing, one of the inescapable conclusions is you get conflict not where you have just basic income inequality. You get conflict where people are locked out of progress and they look at all these people having a good time and realize I’m never going to be part of that party and they decide to burn the house down. So a lot of it is about getting communities into collaborative approach to solving their own problems. And that’s fundamentally the realm of, you know, social work and international assistance and diplomacy.
Source: npr.org
That’s all for now. These may get more formal.
http://guerrillamerica.com/2013/12/28dec13-exsum/

Paul Ryan and how he is stealing the military pensions



Here is a link that is going viral on FB about Paul Ryan and how he is stealing the pensions that were earned, from Military. A must read