Categories

Archives

Follow Us on Twitter

Like us on Facebook!

AltNews.INFO

1 day 20 hours ago

It's becoming all too common.

AltNews.INFO

2 days 15 hours ago

AltNews.INFO shared Hashem Al-Ghaili's video.

Researchers have developed an advanced night vision camera.

Donate to AltNews.INFO

Our BTC Address: 3D5W9V6husNZuhapxGMbRLnwWQDMGoXcwZ

NOTICE: INTELLECTUAL PROPERTY All intellectual property rights to the various posts, materials, and cartoons belong solely to their respective creators. No claim is made here to the intellectual creations of others.

Julian Assange Is (probably) Dead, Captured or Escaped

From: http://survivalacres.com

Disclaimer: This is simply my opinion, based upon published stories, events and alleged sightings. I cannot prove the conclusions I’ve reached at this time. The facts (transpired events) are however, the facts. These events did happen. When pieced together, they present a disturbing conclusion.

Lacking “proof of life”, there is every reason to suspect that Julian Assange of Wikileaks is dead, captured or escaped. Since his disappearance, there has been no current, actual proof of life from any source.

Proof of life is means current evidence that he is alive. Which means what it says – daily evidence of life. So far since his disappearance, there’s been none that can be reliably trusted. Just “reports” most of which are actually old regurgitated stories and videos.

None of the claims, videos, stories and reports circulating on the Internet since his disappearance are actually current when they were published, including Micheal Moore’s video (recorded in June) and widely circulated online, Pam Anderson’s visit in October, and even the John Pilger’s recent interview with Assange (released on November 5th). Outside of these last two people, NOBODY has claimed they’ve seen him and there are reasons to suspect both Pam and John’s stories as being a part of an ongoing coverup.

Since his disappearance, millions of people have wondered about the lack of evidence proving Assange is alive. Wikileaks (allegedly) responded to this demand early on – conducting a “poll” asking what evidence would suffice. A vote was taken, which had a current video as being the most desired, and a appearance at a window then next most desired. Then nothing happened. Wikileaks did not respond any further which was very strange considering the level of interest.

A lot of older videos and stories popped up the moment Assange disappeared too, which have been shared all over the Internet if you were looking (I did), all had their dates removed. The sheer number of these and their date removals were / is astounding (hundreds). Investigation into these stories and videos reveals that they are all “old” with nothing current being shown at all. Some dated back more then two years ago. What stood out each time was the apparent deliberate attempt make the videos and stories seem current when none actually were. Major news media sources and nearly all alternative news media sources were doing this. There are even several released today that has this same characteristic – they’re ALL old video takes. This can’t / couldn’t have been accidental since it is so consistent acrossed the Internet.

For the past four weeks, since October 12th, nobody other then Pam has admitted to actually seeing Julian Assange. In fact, only Pam Anderson has actually made this claim since October 16th. Nobody at the Ecudorian embassy, none of the staff, no bystanders watching the windows, nobody has reporting anything. All we have since then on October 16th is the story from Pamela Anderson. It’s possible she actually did see him then, but there has been nothing at all since.

There have been a few Tweets allegedly from Assange, and some very strange ones from Wikileaks containing odd mispellings and odd statements, however, none of these can be considered as evidence of anything.

John Pilger released a video interview of Assange on November 5th that appears to confirm it was taken after his internet was cutoff, however Assange does not actually bother to discuss this, nor does Pilger reveal when the interview actually takes place. Neither person even mentions his long disappearance either or the public demand for proof of life, only a specific point made by Pilger about his internet. Assange does not even answer this point nor even mention the interest in proof of life, which he would by now surely know about.

This in itself is also quite odd, since the Internet was abuzz with this request, but it was simply ignored like the Wikileaks promises that were issued. Assange is meticulous, very detail oriented and highly organized, it simply makes no sense at all that he would not respond to this request given opportunity. Which he allegedly had if the interview with Pilger was current. But we do not know for certain that it actually was. I suspect it wasn’t, just like all the other videos and stories that cropped up after his disappearance, because it contains critical absence of content.

I’ve written to Pilger myself, but it’s unlikely I’ll get a response. I suspect lacking more evidence, that the Pilger interview was performed shortly before Assange’s internet was cut off, or shortly thereafter. But this still does not explain anything else, nor can the Pilger video (posted here) be considered proof of life at this time.

There does seem to be an agenda from Wikileaks themselves to keep up appearances regarding Assange’s status. Tweets and postings about Assange are widely ignored, but the few that have appeared try to disaude any “conspiracy” regarding Assange and proof of life. This is also unusual, since it would be an incredibly easy thing to do to provide actual evidence and quell the rumors and speculation. Yet none has been provided. The resistance to this request is what is so strange.

If Assange has been taken or compromised, this raises many other serious questions, such as how compromised is Wikileaks now and the stories and leaks they’re releasing? The whole issue of trust and transparency becomes paramount. There have been many earth-shattering leaks regarding the Clintons, the Clinton Foundation and the crime / corruption / connections to global terrorism and pedophilia and much, much more since Assange disappeared. That is why proof of life is so imporant – if the Wikileaks editor has been captured, how much of the information being released by Wikileaks is compromised?

Maybe none of the information is compromised or fabricated at all, even if he were captured or dead. But integrity and honesty demands evidence on Assange anyway. Somebody is running the show over at Wikileaks and they probably do know his real status, but they’re not saying anything more then “Assange is ok“. However, considering all that has transpired, is that really sufficient? I think not. Either Wikileaks can’t or refuses to say more (at this time), or worse, Wikileaks isn’t really Wikileaks anymore. If their communications have been taken over, then the world will be left without this organization and the trust the people have placed within it.

Wikileaks is a repository and outlet for information leaked by anyone in the world, they are not the source of this information. You can read up about Wikileaks yourself to find out how it works.

Now, just two days before the (s)Election (November 6th), Wikileaks is apparently promised another “bombshell” release on Hillary Clinton. The Clinton camp however, already anticipated this a day ago and announced that if there were any more leaks, “they’re probably fake“. If they already know Assange is dead or in custody, this would certainly make sense. But if they are just running scared, they’d also say this to disuade anyone from being convinced by another new leak. So this isn’t really proof of anything, and the Hillary camp is quite obviously capable of saying / do anything to get (s)Elected as their record now clearly shows.

This new video was just released. In my opinion (as others have pointed out already), it’s fake. There are really strange head movements, odd delays and questions. The story about Seth Rich notwithstanding, I doubt that this video is really the real Assange. They certainly have the ability to fake it as my last post shows. Assange claims Wikileaks doesn’t delay leaks  in this video – which is exactly what Wikileaks has been doing for some time now, exquisitely “timing” leaks for maximum damage. This makes no sense.

Today (Monday, November 7th) there is wide-spread reporting that Julian Assange “will be questioned in the Ecuadorian Embassy” in London regarding the rape allegations. A Internet search will reveal that this story is very consistent across the Internet (carbon copies), which means what you should think it means, it’s all coming from a single source. It also means there there is a decided LACK of independent reporting on this.

In itself, this doesn’t mean much necessarily, other then evidence that reporters are pretty damned lazy today. It may also mean that nobody is expecting any surprises or doing any investigative journalism on this, and THAT is what stands out to me. All these news sources are simply reguritating what they’ve been told. That’s dangerous. But it’s very typical these days. The mind-control the media has over the public is quite astounding.

A DNA test is also supposed during this questioning period “if Assange agrees to this“. If this interview does not provide current video evidence of life to the world, then this interview is also suspect as proof of life. They already have his DNA if he’s been captured and could easily claim this as “proof”.

Lacking current video evidence with multiple credible eyewitnesses, there is simply no way to know if Assange is actually still alive and in the embassy. Not yet. But to this date, it is absolutely possible that there is a gigantic conspiracy unfolding pretending to keep Assange “alive” in the public eye. He could already be dead or captured, and this could have happened anytime after October 12th or the 16th (take your pick on who / what you believe). Moreover, he could still be permanently disappeared or renditioned or killed at anytime in the future.

This is a standard tactic by the way in clandestine operations. You can appear to make a disappearance before or after the actual, real event takes place. It is especially useful if you need to keep up appearances – or credibility.

We’ll have to wait for the promised November 14th interview at the embassy for additional proof one way or the other. If this is delayed, it is suspect. If it does not provide actual real proof, it is suspect. If we are left wondering again, having to trust or base “proof” on claims that cannot be trusted, it is suspect.

Here is the timeline as best as I can make it at this time, including the alleged “extradition” by aircraft of Assange. Note that this isn’t proof – just a claim. You can easily find the events below online, these actually did happen as far as I can tell:

Internet connection was cutoff, allegedly by the Ecuadorian embassy. Shortly thereafter, there were reports that the embassy was raided by police vehicles.

Pam Anderson visits on October 16th.

Three pre-commitments “tweets” were made on Oct 16, the same day Assange supposedly met with Pam Anderson:

  • pre-commitment 1: John Kerry 4bb96075acadc3d80b5ac872874c3037a386f4f595fe99e687439aabd0219809
  • pre-commitment 2: Ecuador eae5c9b064ed649ba468f0800abf8b56ae5cfe355b93b1ce90a1b92a48a9ab72
  • pre-commitment 3: UK FCO f33a6de5c627e3270ed3e02f62cd0c857467a780cf6123d2172d80d02a072f74

Fox News reports that Assange would be arrested in a few hours, on October 18th. This video reporting this has now been deleted, and deleted here too.

Wikileaks promised information releases on Tim Kaine and John Kerry, yet nothing to date has been provided. John Kerry allegedly asks Ecuador to stop Assange from publishing Clinton docs.

Wikileaks tweets on 22nd they will provide proof of life. A poll it taken, yet no proof is ever provided.

October 23rd – Michael Moore claims to have visited Assange. This video was recorded on June 9th. Wikileaks does not dispute this old video as evidence and neither does anybody else. This is repeated all over the place (far too many to list here) with old videos of Assange and interviews and many stories being suddenly resurfaced, all with their dates removed.

Wikileaks offers to provide proof of life, this story is picked up everywhere, yet nothing of the sort has been provided.

Ecuador conference call October 26th. It’s probable that this was fake. It is certainly not proof of lie. From a Reddit poster: “I think it was prerecorded yes. He never responds to a question which is very odd. And given the info he mentioned in there it could have been recorded as early as the 14th.”

There is a claim that Assange is actually being extradited – https://i.reddituploads.com/8ab040357e8f40dba8a66030f750b721?fit=max&h=1536&w=1536&s=fc6528a63b71065f538e09c2936d89f6

Less than two weeks prior to the start of this timeline, Wikileaks published Assange’s Medical and Psychological Records on 9/14/2016. This is odd.

Some commentary I found:

The reason you would release that info is if you needed to either protect yourself from “dying of cancer” or getting “Alzheimers”. What they did was show that the only thing wrong with him is bad dentistry, but it also shows that there are dental records… It was a protection from character assassination by discrediting any claims that he was not of sound mind or actual assassination by mysterious un-diagnosed physical ailment. It’s possible Assange did this for security.

The Embassy was raided, we saw the pictures of police vehicles. Fox News reported he would be arrested in a few hours, that was on Oct 18th. They took Assange for the rape allegations or CIA rendition 9 miles away from the Embassy to a nearby airport, which coincidentally underwent a chemical attack clearing out witnesses and distracting low level airport personnel. John Kerry and Goldman Sachs may have struck a deal to bring him down any way possible. The conference was somehow forced or faked, using voice technology, or it was done under the presence and duress of multiple intelligence agents with their fingers on the mute button. Assange’s whereabouts unknown.

On the 26th of September 2016 Secretary of State John Kerry (self admitted Skull and Bones member) visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.

For over four years, the Ecuadorian embassy has been under surveillance and Julian’s human rights violated as he has been unlawfully detained termed “illegal arbitrary detention” by a recent UN ruling. During that time, it has been possible for intelligence agencies to gather critical information and build a detailed profile and plan to circumvent Julian’s dead man’s switch.

Both John Kerry and US intelligence agencies know perfectly well that cutting off Julian’s internet would have no impact on the release of the leaked emails that are damaging to Hillary’s campaign. It has been very clear for a long time that many US officials wanted Julian Assange dead, Hillary Clinton even has remarked, “can’t we just drone the guy”.

The cutting off of Julian’s internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they know that media organisations already have the entire leaked email database and a schedule for release, they also know WikiLeaks staff would continue to leak regardless of Julian’s ability to communicate.

Removing Assange would not be enough, they would need to circumvent his dead man’s switch and then tarnish WikiLeaks reputation. Removing Assange’s internet could have the effect of causing Assange to take steps that can be followed to prevent the automatic triggering of his DMS.

From the day Julian’s internet was cut off, a series of peculiar and uncharacteristic events started to take place. The same day that Julian’s internet was cut off, CBS reported that Pamela Anderson visited Assange and had “Tortured” him with a vegan sandwich. A few days before on the 14th, John Podesta tweeted “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”. Then on October the 16th the SHA-256 prerelease keys were issued on WikiLeaks twitter feed, although these events are odd and seemingly inconsequential, combined with John Kerry being in the UK from the 16th to the 17th sparked concern among the community for Julian’s safety.

Assange supporters started to gather at the embassy to keep Assange safe and witness any foul play, some of these witnesses have claimed that a very swift police armed raid took place that lasted only 5 minutes while the crowd was kept under control and prevented from approaching, there have also been reports that they were prevented from taking photographs and that their phones were confiscated. A live periscope feed was also cut off. There have also been some reports of the presence of a mobile jamming van.

If Assange has been seized, any recognition by mainstream media would be detrimental to Hillary’s campaign. A covert operation with media blackout would be the only effective way of seizing him at this time. On October the 18th Fox News said that Julian Assange would be “arrested soon, maybe in a matter of hours.”. The was video was then promptly removed and articles relating to it have disappeared. However, one reddit user was able to find an alternative source and now the video can be found again on YouTube.

Although Julian’s primary DMS (the release of insurance file encryption keys) did not activate, on October the 18th one of Julian’s contingencies did activate, a script was activated that made https://file.wikileaks.org/file publicly visible and set all the file date and time stamps to 01/01/1984 (Orwell reference). This file repository contains many documents that had not been released prior.

Staffers Kristinn Hrafnsson and Sarah Harrison, have gone silent while the Ecuadorian embassy is refusing to provide any updates on Assange’s fate. There is a recorded call made to the embassy by a journalist where the receptionist refused to confirm that Julian was at the embassy, she also refused to confirm that Julian was even alive. Julian has not made an appearance at the window of the embassy since being cut off.

WikiLeaks suggested in a tweet that its supporters were responsible for the DDOS attacks on the 21st. Neither Assange or WikiLeaks would ever insinuate such a thing. WikiLeaks deceptively tweeted a video of Michael Moore that was actually recorded in June. The video was posted on the 24th of October giving the impression that Michael Moore had been speaking with Assange in the embassy. Why would WikiLeaks do this when they know they are already under suspicion?

WikiLeaks have been using their Twitter account to give the appearance of his safety while providing no concrete evidence of his safety. They issued a poll asking what proof would satisfy the public that Julian was safe. WikiLeaks have yet to follow up on the conclusive result of a video or window appearance.

Julian Assange is known for his attention to detail and his consistently good spelling and grammar. Currently the twitter feed has very poor spelling, there are numerous uncharacteristic spelling errors, for example, an accomplished cryptographer knows how to correctly spell algorithm and so do WikiLeaks staff.

On the 21st of October, there was a massive widespread DDOS attack that disrupted US and EU internet. Also on the 21st of October London City Airport was evacuated. The next day (the 22nd), Gavin MacFayden is reported dead. WikiLeaks made a further blunder by stating his death as the 23rd.

There has been a number of high level WikiLeaks deaths recently too. John Jones QC – WikiLeaks U.N. lawyer died on April 16th 2016. Michael Ratner – WikiLeaks chief counsel died on May 11th 2016. Seth Rich – Employee of the Democratic National Committee (DNC) was fatally shot on July 10th 2016 and Gavin MacFadyen – WikiLeaks director died October 22nd 2016.

If WikiLeaks has been compromised, it is already preparing the scene for future discrepancy to seriously tarnish WikiLeaks reputation. Nothing WikiLeaks has shared since the 15th of October 2016 should be trusted until Julian has been fully verified as alive.

My speculative fears are that Julian has been seized and removed from the Embassy. His internet being cut not being related to the release of the emails, but rather as a component of a plan of 4 years in the making to as secretly as possible remove Assange from the embassy, circumvent his DMS and hijack WikiLeaks with the key team members silenced or under duress.

My fears would be confirmed by no future public (mass witnessing and recorded/televised) appearance of Julian Assange discussing recent topics. His death by whatever means after the US presidential election would be extremely suspect. Until proof of life, assume the following compromised: SHA-256 verification Keys posted after the 15th. WikiLeaks submission process and/or platform. WikiLeaks twitter feed. Any WikiLeaks leaks after the 15th October 2016.

I have written to John Pilger about his recent video without any response, but I’m sure he gets tons of email:

Greetings, There has been wide speculation regarding Julian Assange and his disappearance. Virtually all videos, stories, articles, etc., now being published are “pre-disappearance” recordings and stories. What was the DATE you last interviewed Julian Assange? So far, there has been no actual proof of life since his disappearance. Millions of people are depending on YOU for the answer. Thank you.

Now, just two one day before the (s)Election, Wikileaks is apparently promising another “bombshell” on Hillary Clinton. The Clinton camp however, already anticipated this and announced that if there were any more leaks, “they’re probably fake“. If they already know Assange is dead or in custody, this was certainly make sense.

Today (Monday, November 7th) there is a report that Julian Assange “will be questioned in the Ecuadorian Embassy” in London regarding the rape allegations. A DNA test is also supposed to be performed. If this does not provide video evidence of life to the world, then this story is also suspect as proof of life. They already have his DNA if he’s been captured.

It’s actually also possible Assange has escaped and is somewhere else. Nobody that knows anything about this is saying. My conclusion however is Assange is no longer in the embassy. I don’t know if he’s dead or not (I’ve looked into the plane story, flight path, redirection to Florida, etc.) but cannot conclude anything lacking actual evidence.

It’s an interesting twist, that’s for sure, worthy of a Hollywood movie. I believe Assange is dead / gone / captured based on the evidence and obvious coverup taking place, until I actually see proof and evidence otherwise.

How to communicate if the Internet goes down for good

First of all, download or print these instructions. Keep them with your survival gear, if you have prepared one.

 

SCENARIO

Your government is displeased with the communication going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service.

This is what happened in Egypt Jan. 25, 2012 prompted by citizen protests, with sources estimating that the Egyptian government cut off approximately 88 percent of the country’s internet access. What do you do without internet? Step 1: Stop crying in the corner. Then start taking steps to reconnect with your network. Here’s a list of things you can do to keep the communication flowing.

 

PREVENTIVE MEASURES

 

MAKE YOUR NETWORK TANGIBLE

Print out your contact list, so your phone numbers aren’t stuck in the cloud. Some mail services like Gmail allow you to export your online contact list in formats that are more conducive to paper, such as CSV or Vcard, and offer step-by-step guides on how to do this.

 

BROADCAST ON THE RADIO

CB Radio:Short for “Citizens Band” radio, these two-way radios allow communication over short distances on 40 channels. You can pick one up for about $20 to $50 at Radio Shack, and no license is required to operate it.

Ham radio:To converse over these radios, also known as “amateur radios,” you have to obtain an operator’s license from the FCC. Luckily, other Wired How-To contributors have already explained exactly what you need to do to get one and use it like a pro. However, if the President declares a State of Emergency, use of the radio could be extremely restricted or prohibited.

GMRS:The General Mobile Radio Service (GMRS) is a licensed land-mobile FM UHF radio service in the United States available for short-distance two-way communication. It is intended for use by an adult individual who possesses a valid GMRS license, as well as his or her immediate family members… They are more expensive than the walkie-talkies typically found in discount electronics stores, but are higher quality.

Family Radio Service:The Family Radio Service (FRS) is an improved walkie-talkie radio system authorized in the United States since 1996. This personal radio service uses channelized frequencies in the ultra high frequency (UHF) band. It does not suffer the interference effects found on citizens’ band (CB) at 27 MHz, or the 49 MHz band also used by cordless phones, toys, and baby monitors.

Micro-broadcasting:Micro-broadcasting is the process of broadcasting a message to a relatively small audience. This is not to be confused with low-power broadcasting. In radio terms, it is the use of low-power transmitters to broadcast a radio signal over the space of a neighborhood or small town. Similarly to pirate radio, micro-broadcasters generally operate without a license from the local regulation body, but sacrifice range in favor of using legal power limits.

Packet Radio Back to the ’90s: There do exist shortwave packet-radio modems. These are also excruciatingly slow, but may get your e-mail out. Like ham radio above it requires a ham radio license because they operate on ham radio frequencies.

 

TELEPHONE:

Set up a phone tree:According to the American Association of University Women, a phone tree is “a prearranged, pyramid-shaped system for activating a group of people by telephone” that can “spread a brief message quickly and efficiently to a large number of people.” Dig out that contact list you printed out to spread the message down your pyramid of contacts.

Enable Twitter via SMS:Though the thought of unleashing the Twitter fire hose in your text message inbox may seem horrifying, it would be better than not being able to connect to the outside world at all. The Twitter website has full instructions on how to redirect tweets to your phone.

Call to Tweet: A small team of engineers from Twitter, Google and SayNow, a company Google acquired recently, made this idea a reality. It’s already live and anyone can tweet by simply leaving a voicemail on one of these international phone numbers (+16504194196 or +390662207294 or +97316199855) and the service will instantly tweet the message using the hashtag #egypt. No Internet connection is required. People can listen to the messages by dialing the same phone numbers or going to the Twitter account, speak2tweet.

 

FAX:

If you need to quickly send and receive documents with lengthy or complex instructions, phone conversations may result in misunderstandings, and delivering the doc by foot would take forever. Brush the dust off that bulky old machine, establish a connection by phone first with the recipient to make sure his machine is hooked up, then fax away.

You may not need a fax machine to send or receive faxes if your computer has a dial-up fax application.

 

NON-VIRTUAL BULLETIN BOARD

Sometimes we get so wrapped up in the virtual world that we forget about resources available in the real world. Physical bulletin boards have been used for centuries to disseminate information and don’t require electricity to function. If you are fortunate enough to be getting information from some other source why not share it with your friends and neighbors with your own bulletin board? Cork, magnetic and marker bulletin boards are as close as your nearest dime store and can be mounted just about anywhere. And if push comes to shove you can easily make your own with scrap wood lying around the house.

Getting back online – While it might be relatively easy for a government to cut connections by leveraging the major ISPs, there are some places they wouldn’t get to so readily, like privately-owned networks and independent ISPs.

 

FIND THE PRIVATELY RUN ISPs

In densely populated areas, especially in central business districts and city suburbs there are multiple home WiFi networks overlapping each other, some secure, some not. If there is no internet, open up your WiFi by removing password protection: If enough people do this it’s feasible to create a totally private WiFi service outside government control covering the CBD, and you can use applications that run Bonjour (iChat on Mac for example) to communicate with others on the open network and send and receive documents. **needs more clarification

If you are a private ISP, it’s your time to shine. Consider allowing open access to your Wi-Fi routers to facilitate communication of people around you until the grid is back online.

 

RETURN TO DIAL-UP

According to an article in the BBC about old tech’s role in the Egyptian protests, “Dial-up modems are one of the most popular routes for Egyptians to get back online. Long lists of international numbers that connect to dial-up modems are circulating in Egypt thanks to net activists We Re-Build, Telecomix and others.”

Dial-up can be slow. Often, there is a lightweight mobile version of a site that you can load from your desktop browser quickly despite the limitations of dial-up. Examples: mobile.twitter.com, m.facebook.com, m.gmail.com.

 

AD-HOC NETWORKING

Most wireless routers, PCs, laptops, and even some ultramobile devices like cellphones have the ability to become part of an “ad hoc” network, where different “nodes” (all of the devices on the network) share the responsibility of transmitting data with one another. These networks can become quite large, and are often very easy to set up. If used properly by a tech-savvy person, such networks can be used to host temporary websites and chat rooms. There are many internet tutorials on the internet for ad hoc networking, so feel free to Google some.

Apple computers tend to have very accessible ad hoc functionality built in, including a pre-installed chat client (iChat) that will automatically set up an ad hoc “Rendezvous” chatroom among anybody on the network, without the need for an external service like AIM or Skype. Ad hoc network-hosting functionality is built in to the Wi-Fi menu.

Windows computers have several third-party ad hoc chat applications available (such as Trillian) and setting up an ad hoc Wi-Fi network is almost as simple as on a Mac.

Linux operating systems, of course, have plenty of third-party apps available, and most distros have ad hoc network-creation support built in.

 

BUILD LARGE BRIDGED WIRELESS NETWORK

Using popular wireless access point devices like a Linksys WRT54G, you can create a huge wireless bridged network — effectively creating a Local Area Network (LAN), or a private Internet that can be utilized by all users within range using a Wi-Fi enabled device.

You can also link multiple devices together wirelessly, extending the range of your network. Most access points will cover a 100 meter area and if your wireless device is built to support the 802.11n wireless standard, you will get almost a 500 meter coverage area for each access point.

To build a wireless bridge, check out the dd-wrt wiki, and learn how to configure Linksys WRT54G as a wireless client using this Anandtech thread.

 

NINTENDO DS

A used DS family device can be purchased inexpensively. In addition to wi-fi, the DS supports its own wireless protocols. Using Pictochat, it is possible to chat with nearby DS users without having any DS games. Unfortunately, the range is quite short.

Some games, such as the fourth generation Pokemon games, support mail items. Thus you can send your message under the guise of just playing a game. Mail items can be sent through the Internet if you can get on the net and you and your partner(s) have each other’s friend codes.

The original DS and the DS Lite do support the Opera web browser, but finding the game card and memory pack may be very difficult. Starting with the DSi, Opera is downloadable.

 

INTRANET

Your computer has the ability to set up your own INTRANET. This was done BEFORE the internet was popularized in two ways: Your computer dialed up other computers and sent them the contents of a message board, or local people people dialed into your computer. A nationwide system can be set up this way with a central location sending to many cities then each city sending out the info locally.

 

BECOME UNTRACEABLE

If you’re going to post government secrets on your work-around site, you may want to set up an untraceable account. Really, you only need a mail drop, an assumed name, a prepaid credit card you can get at many stores to set up service.

 

GET SATELLITE ACCESS

You can have very, very slow internet if you have something similar to an Iridium phone, which would allow you to do dial up at 2400 baud, which at least gives you e-mail. This will also work when your government has shut down GSM and telephone access, and will work pretty much anywhere on the planet. If you’re in the right place, get yourself KA-SAT access which is satellite broadband and will not be routed through any internet exchange that certain local governments may monitor or block (unless that government is part of EU or er … Uncle Sam.

 

BACK TO BASICS

Make some noise: Have an air horn or other loud instrument handy. It may just come down to being able to alert people in your local geographic area, who would otherwise be unaware of an emergency. You may also want to learn a bit about Morse code and have a cheat sheet available.

 

SOURCE: Before It’s News

RELATED:

FALSE FLAG ALERT!

Leon Panetta warns of a Cyber “Pearl Harbor” event

‘War on whistleblowers must end!’ – Assange speech at Ecuador Embassy

Julian Assange makes his first public appearance in two months, ever since he took refuge in the Ecuadorian embassy in London. The WikiLeaks founder was granted political asylum on Thursday — a decision that ignited a wave of international responses, with the UK and Sweden opposing the verdict and Latin American countries strongly supporting Ecuador’s move. MORE INFO & PHOTOS: http://on.rt.com/2gkwzk

DTOM Contributor Brandon Raub Arrested By FBI For Facebook Posts

This is very disturbing news. His Facebook posts, from my knowledge, contained a single line that said ~ the revolution is coming ~ . If this is all it takes for the FBI to haul your ass away to jail, then we are all in a lot of trouble. Please see the video below and comment. Does anyone have screen caps of his Facebook posts?

 

For more info, check out: http://dont-tread-on.me/?p=21770

 

Anonymizer ‘anonymous email’ owned by Trapwire’s Cubic Corporation

Anonymizer 'anonymous email' owned by Trapwire's Cubic Corporation

August 14, 2012 – Beware, Anonymizer, the company that brings you free anonymous email facilities, called nyms, as well as similar secure services used by activists all over the world, is actually owned by Cubic Corporations, the parent company that owns Abraxis, which in turn owns Trapwire. So, it’s possible, if not probable that all those activists around the world who believe their emails are safe may well be sending messages that go straight into Trapwire, the surveillance system that monitors activists. This could be lifted straight out of a political conspiracy movie – but it isn’t. Furthermore, Cubic Corporation runs transport smart cards around the world, including USA, Australia and London (Oyster card): a link with Trapwire too?

The above info has actually been available for some time, but it is only thanks to the information about Trapwire and Abraxas, hacked from Stratfor files by Anonymous and published by Wikileaks, that the full picture is starting to emerge.

1. Anonymizer

Re. Anonymizer, this was acquired by Abraxas in 2008. Two years later, Cubic acquired Abraxas for $124 million in cash. Cubic internal communications explain that the RFI for Cubic’s ‘persona software’ was actually written for Anonymizer. Quote from Richard Helms (former director of CIA during Allende coup and Watergate periods and then founder of Abraxas): “I am also pleased to announce that Lance Cottrell, the Founder and Chief Technology Officer of Anonymizer, will become our Chief Scientist and continue to pursue his advocacy of privacy for people around the world. Bill Unrue, Anonymizer’s CEO, will assume the position of President of Anonymizer which will operate as a wholly owned subsidiary of Abraxas Corporation. Bill will continue to pursue Anonymizer’s goals to provide proprietary technologies and complementary capabilities that offer unique, multi-layered identity protection that enhances the traditional network perimeter defenses of consumers, corporations and government agencies.”

2. Transportation smart cards

A. Australia:

In 2010 Cubic Corporation signed a $370 million contract with the NSW Government to provide Sydney’s electronic ticketing system for public transport. It was also awarded a $65 million contract to provide services to NSW’s CityRail. It also runs the Brisbane “go card” system. It operates in Australia as Cubic Transportation with offices in Sydney, Brisbane and Perth. In 2008 it also opened a defence subsidiary based in Queensland, Cubic Defence Australia, run by Mark Horn.

B. UK

Cubic designed, developed and installed the Oyster Card system for London’s Underground and buses.

C. Other

In 1972, Cubic acquired the first Automatic Fare Collection (AFC) system for Chicago’s Illinois Central Gulf Railroad. By the late 1970s, Cubic had installed AFC systems for the Hong Kong Mass Transit Railway Corporation and the Eastern Suburbs Railway in Sydney. Soon came the Bay Area Rapid Transit (BART) system in San Francisco, the Washington Metropolitan Area Transit Authority and the Pennsylvania Port Authority Transit Company AFC system.

Cubic Corporations offices:

WASHINGTON, D.C. Crystal Gateway One, Suite 1102 1235 Jefferson Davis Hwy. Arlington, VA 22202 703-415-1600 703-415-1608 Fax

ORLANDO, FL 12000 Research Parkway Suite 408 Orlando, FL 32826 407-273-5500 407-275-0200 Fax

SHALIMAR, FL 60 Second St., Suite 105 Shalimar, FL 32579 850-609-1600 850-609-0100 Fax

LONDON Derwent House Kendal Avenue Park Royal London W3 OXA UK

Cubic Corporation Board of Directors:

Walter J. Zable: Chairman; Walter C. Zable: Vice- Chairman; Robert D. Weaver: Director; Robert S. Sullivan: Director; Richard Atkinson: Director; Raymond E. Peet: Director; Robert T. Monagan: Director; Raymond L. DeKozan: Director; Gerald R. Dinkel: Vice-Presiden;t Mark A. Harrison: Vice-President; Daniel A. Jacobsen: Vice-President; Kenneth Kopf: Vice-President; Bernard A. Kulchin: Vice-President; John A. Minteer: Vice-President; John D. Thomas: Vice-President; Richard A. Johnson: Corporate Executive; William L. Hoese: Secretary; William W. Boyle: Chief Financial Officer.

Cubic Corporation IP addresses (via Anonymous):

208.86.144.37 ca.trapwire.net

208.86.144.37 access.trapwire.net

208.86.144.37 demo.trapwire.net

208.86.145.176 cert.trapwire.net

208.86.144.37 lv.trapwire.net

208.86.144.40 smtp.trapwire.net

208.86.144.37 training.trapwire.net

208.86.144.37 west.trapwire.net

208.86.144.37 www.trapwire.net

See also:

http://wiki.echelon2.org/wiki/Cubic_Corporation

http://www.dailymail.co.uk/news/article-2187602/U-S-Government-secretly-spying-using-civilian-security-cameras-say-Wikileaks.html?ito=feeds-newsxml

http://darkernet.wordpress.com/2012/08/11/abraxas-and-trapwire-the-technology-and-personnel-revealed/

http://www.theage.com.au/technology/technology-news/revealed-trapwire-spy-cams-ticket-to-australia-20120813-2448z.html

( via darkernet.wordpress.com )

Chalk a sidewalk, go to jail

When chalking is a crime, only criminals will play hopscotch.”

 

One of these people is going to jail flash2000/Flickr
Cuff ’em! Flash200/Flickr

“I draws what I like and I like what I drew!” sings Bert, the affable sidewalk artist in Disney’s Mary Poppins. He doesn’t know how easy he’s got it. If Bert lived in one of a dozen American cities, his colorful chalk drawings of boats and circus animals could very well land him in jail.

Take the recent example of Susan Mortensen, 29-year-old mom in Richmond, Virginia. In March, Mortensen was arrested for allowing her four-year-old daughter to draw on rocks at a local park with sidewalk chalk. This month a judge sentenced her to 50 hours of community service helping to strip and repaint 200 boundary posts on a bridge. Mortensen told a local TV station that her daughter is now “very nervous around cops” and “very scared of chalk.”

That’s not all. One week ago in Doylestown, Pennsylvania, police cited two teenagers for decorating a street with chalk renditions of a whale and a sea turtle. The kids must now appear in court and pay a fine to be determined by a district judge. James Donnelly, Doylestown’s police chief, told a local newspaper that the chalking was “an attempt at vandalism” that could lead to the use of more permanent materials.

Chalk. The gateway art supply.

 

Read more at Mother Jones

National Weather Service Follows DHS In Huge Ammo Purchase

Hollow point bullets designed to cause maximum organ damage

Paul Joseph Watson
PRison Planet.com
Tuesday, August 14, 2012

Why would the National Weather Service need to purchase large quantities of powerful ammo? That’s the question many are asking after the federal agency followed in the footsteps of the Department of Homeland Security in putting out a solicitation for 46,000 rounds of hollow point bullets.

National Weather Service Follows DHS In Huge Ammo Purchase 140812nws

A solicitation which appears on the FedBizOpps website asks for 16,000 rounds of .40 S&W jacketed hollow point (JHP) bullets, noted for their strength, to be delivered to locations in Ellsworth, Maine, and New Bedford, Mass.

A further 6,000 rounds of S&W JHP will be sent to Wall, New Jersey, with another 24,000 rounds of the same bullets heading to the weather station in St. Petersburg, Florida.

The solicitation also asks for 500 paper targets to be delivered to the same locations in Maine, Massachusetts and New Jersey.

The National Weather Service is is one of six scientific agencies that make up the National Oceanic and Atmospheric Administration (NOAA).

The solicitation requires a response by August 21.

The NWS is following its federal counterpart the DHS in securing large quantities of ammo. Back in March,Homeland Security purchased 450 million rounds of .40-caliber hollow point bullets that are designed to expand upon entry and cause maximum organ damage, prompting questions as to why the DHS needed such a large amount of powerful bullets merely for training purposes.

As the Business Insider notes, hollow point bullets have been “illegal in international warfare since 1899.”

The DHS is also planning to purchase a further 750 million rounds of different types of ammoin a separate solicitation that also expires on August 20, including 357 mag rounds that are able to penetrate walls.

The DHS recently put out an order for riot gear in preparation for the upcoming DNC, RNC and presidential inauguration. The U.S. Army is also busy buying similar equipment.

The DHS also recently purchased a number of bullet-proof checkpoint booths that include ‘stop and go’ lights.

The federal government is clearly gearing up for the likelihood of civil unrest on a scale that could outstrip what we’ve already seen in countries across Europe.

While the establishment demonizes the second amendment in light of recent mass shootings and legislation is prepared to ban the sale of large quantities of ammunition online, the federal government is acquiring ammunition at levels necessary to fight a full scale domestic war.

TRAPWIRE: Wikileaks says Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network

surveillance

Source: Business Insider

TrapWire is watching.

The U.S. cable networks won’t be covering this one tonight (not accurately, anyway), but Trapwire is making the rounds on social media today—it reportedly became a Trending hashtag on Twitter earlier in the day.

Trapwire is the name of a program revealed in the latest Wikileaks bonanza—it is the mother of all leaks, by the way. Trapwire would make something like disclosure of UFO contact or imminent failure of a major U.S. bank fairly boring news by comparison.

And someone out there seems to be quite disappointed that word is getting out so swiftly; the Wikileaks web site is reportedly sustaining 10GB worth of DDoS attacks each second, which is massive.

Anyway, here’s what Trapwire is, according to Russian-state owned media network RT (apologies for citing “foreign media”… if we had a free press, I’d be citing something published here by an American media conglomerate): “Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology—and have installed it across the U.S. under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community.

The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.”

So: those spooky new “circular” dark globe cameras installed in your neighborhood park, town, or city—they aren’t just passively monitoring. They’re plugged into Trapwire and they are potentially monitoring every single person via facial recognition.

In related news, the Obama administration is fighting in federal court this week for the ability to imprison American citizens under NDAA’s indefinite detention provisions—and anyone else—without charge or trial, on suspicion alone.

So we have a widespread network of surveillance cameras across America monitoring us and reporting suspicious activity back to a centralized analysis center, mixed in with the ability to imprison people via military force on the basis of suspicious activity alone. I don’t see how that could possibly go wrong. Nope, not at all. We all know the government, and algorithmic computer programs, never make mistakes.

Here’s what is also so disturbing about this whole NDAA business, according to Tangerine Bolen’s piece in the Guardian: “This past week’s hearing was even more terrifying. Government attorneys again, in this hearing, presented no evidence to support their position and brought forth no witnesses. Most incredibly, Obama’s attorneys refused to assure the court, when questioned, that the NDAA’s section 1021 – the provision that permits reporters and others who have not committed crimes to be detained without trial – has not been applied by the U.S. government anywhere in the world after Judge Forrest’s injunction. In other words, they were telling a U.S. federal judge that they could not, or would not, state whether Obama’s government had complied with the legal injunction that she had laid down before them. To this, Judge Forrest responded that if the provision had indeed been applied, the United States government would be in contempt of court.”

Is DHS Preparing for Civil Unrest with Massive Ammo Order?

Fears that federal authorities are preparing for mass civil unrest have increased after it was revealed that the Department of Homeland Security is planning to buy a further 750 million rounds of ammo in addition to the 450 million rounds of hollow point bullets already purchased earlier this year.

 

Stratfor emails reveal secret, widespread TrapWire surveillance system

AFP Photo / Valery Hache

AFP Photo / Valery Hache

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the PentagonCIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.

Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks beganreleasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.

On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.

Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the servers of WikiLeaks supporter sites were reported to be dropping upwards of 40 gigabits of traffic per second. On Friday, WikiLeaks tweeted that their own site was sustaining attacks of 10 Gb/second, adding, “Whoever is running it controls thousands of machines or is able to simulate them.”

According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”

In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.

What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).

“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”

In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”

An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”

Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes“God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files onUSASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.

News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.

Jared Loughner Will Not Stand Trial Because He Is A False Flag Patsy

Strange behavior. The bailiffs pounce on him for saying one tiny little thing, smash him down into the floor, and drag him out of the room? Very odd indeed. The AP article below states that Loughner has been “forcibly” drugged up for about a year on heavy psychotropic drugs. Why? Who’s afraid to hear him talk? Perhaps someone is afraid he’ll say that he was set up as a patsy, and that the real target was Judge John Roll for going against the Obama administration’s claim that they could seize property and misappropriate it into war? Is it possible Judge John Roll was assassinated?

Blogger Sorcha Faal states that “Federal Judge John McCarthy Roll was the Chief Judge for the United States District Court for the District of Arizona who this past Friday issued what is called a “preliminary ruling”in a case titled “United States of America v. $333,520.00 in United States Currency et al” [Case Number: 4:2010cv00703 Filed: November 30, 2010] wherein he stated he was preparing to rule against Obama’s power to seize American citizens money without clear and convincing evidence of a crime being committed.

The case being ruled on by Judge Roll, this report continues, was about bulk cash smuggling into or out of the United States that the Obama administration claimed was their right to seize under what are called Presidential Executive Orders, instead of using existing laws.  The Obama administration used as support for their claim before Judge Roll, the SVR says, the seizing of all American citizens’ gold, in 1933, by President Franklin D. Roosevelt’s signing of Executive Order 6102, which was ruled at the time to be constitutional.

If this is true, this would explain the need for Loughner not to speak during his ‘trial’, and to make it as quick as possible to avoid the publicity surrounding the revelation that Judge John Roll was the real target of this attack, not Gabby Giffords.

For your information:

Loughner pleads guilty to Ariz. shooting

By ELLIOT SPAGAT and BOB CHRISTIE

AP

TUCSON, Ariz. — Jared Lee Loughner agreed Tuesday to spend the rest of his life in prison, accepting that he went on a deadly shooting rampage at an Arizona political gathering and sparing the victims a lengthy, possibly traumatic death-penalty trial.

His plea came soon after a federal judge found that months of psychiatric treatment for schizophrenia made Loughner able to understand charges that he killed six people and wounded 13 others, including his intended target, then-Rep. Gabrielle Giffords.

“I plead guilty,” the 23-year-old college dropout said.

His hair closely cropped, Loughner was not the smiling, bald-headed suspect captured in a mugshot soon after the January 2011 shooting.

Wearing khakis, Loughner sat quietly throughout the hearing and smiled at one point when a psychologist testifying about his competence remarked that he had bonded with one of the federal prison guards.

After the hearing, Loughner’s parents cried and embraced. The victims mostly just watched without expression.

Judge Larry A. Burns accepted the plea agreement and said that he found it to be in the best interest of everyone involved.

The outcome was welcomed by some victims, including Giffords herself, as a way to move on.

“The pain and loss caused by the events of Jan. 8, 2011, are incalculable,” Giffords said in a joint statement with her husband, Mark Kelly. “Avoiding a trial will allow us – and we hope the whole Southern Arizona community – to continue with our recovery.”

Experts had concluded that Loughner suffers from schizophrenia, and officials at a federal prison have forcibly medicated him with psychotropic drugs for more than a year.

 

Read more here

 

Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’

This deceptive piece of ‘journalism’ reeks of some sort of psy-op to put pressure on people to join the biggest spy operation ever created so they can spew out data points for the NSA and the spying apparatus in this country.

So, not having a Facebook account is not considered suspicious behavior. There you have it.

~

Dailymail | August 6, 2012

Facebook has become such a pervasive force in modern society that increasing numbers of employers, and even some psychologists, believe people who aren’t on social networking sites are ‘suspicious.’

The German magazine Der Taggspiegel went so far as to point out that accused theater shooter James Holmes and Norwegian mass murder Anders Behring Breivik have common ground in their lack of Facebook profiles.

On a more tangible level, Forbes.com reports that human resources departments across the country are becoming more wary of young job candidates who don’t use the site.

Facebook
Normal: Facebook has become so pervasive in this culture that not having a profile is considered ‘abnormal’

The common concern among bosses is that a lack of Facebook could mean the applicant’s account could be so full of red flags that it had to be deleted.

Slate.com tech reporter Farhad Manjoo wrote in an advice column that young people shouldn’t date anyone who isn’t on Facebook.

 

‘If you’re of a certain age and you meet someone who you are about to go to bed with, and that person doesn’t have a Facebook page, you may be getting a false name. It could be some kind of red flag,’ he says.

Manjoo points out that these judgements don’t apply to older people who were already productive adults before social media became widespread.

The tech news site Slashdot summed up Der Taggspiegel’s story about social networking as ‘not having a Facebook account could be the first sign that you are a mass murderer.’

James Holmes

Loner: James Holmes, the accused Colorado theater shooter, does not appear to have friends and did not have a Facebook page

It points out that Holmes, who is accused of killing 12 people and an unborn child and wounding 58 others at a movie theater in Aurora, Colorado, and Breivik, who murdered  77 people with a car bomb and mass shooting, did not use Facebook and had small online footprints.

Breivik used MySpace and Holmes was reportedly on the hookup site Adult Friend Finder.

Psychologist Christopher Moeller told the magazine that using Facebook has become a sign of having a healthy social network.

Psychologists have noted that Holmes, along with several noted mass murderers, have lacked any real friends.

And this is what the argument boils down to: It’s the suspicion that not being on Facebook, which has become so normal among young adults, is a sign that you’re abnormal and dysfunctional, or even dangerous, ways.

Sikh Shooter a Former Psyop Soldier Linked to FBI’s National Alliance

Kurt Nimmo
Prisonplanet.com
August 6, 2012

The alleged shooter in the Wisconsin Sikh shooting is a former soldier who worked in military psychological operations, according to the corporate media.

Sikh Shooter a Former Psyop Soldier Linked to FBIs National Alliance

CBS News reports that Page enlisted in the Army in April 1992 and was given a less-than-honorable discharge in October 1998. He was last stationed in Fort Bragg, N.C., serving in the psychological operations unit.

Psyops are not confined to the military and usually span a number agencies, including the CIA, DIA, NSC, NSA, and SAIC.

In 2002, the Joint Chiefs of Staff at the Pentagon defined psychological operations as “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own. Also called IO.” (emphasis added) (see Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms).

Since the alleged shooter, Wade Michael Page, is now characterized as a white supremacist, the Southern Poverty Law Center is leading the information campaign to portray him as a racist skinhead. In addition to fronting a “hate rock band,” the Southern Poverty Law Center “has found that Page also attempted to purchase goods from the neo-Nazi National Alliance, then America’s most important hate group,” according to SPLC propaganda minister Mark Potok.

The National Alliance, like most white supremacist groups, is controlled by the FBI.

In 2007, its supposed leader, Green Beret David Kellerman, said he worked for the FBI. During a trial on weapons charges, Kellerman “said he went to work for the FBI with orders to infiltrate the National Alliance, a neo-Nazi group, in 2000 and relay intelligence. The group’s founder wrote a book that is widely believed to have inspired the 1995 Oklahoma City bombing,” the Miami Herald reported.

Is it possible the SPLC is somehow connected to the latest shooting? In 2005, court papers revealed that the supposed anti-racist organization ran an “informant” (informant and agent provocateur are often interchangeable) at Elohim City prior to the bombing of the Murrah Federal Building in 1995.

“The potentially explosive contents of the teletype, among other things, exposed for the first time an informant operation being conducted by nationally known civil rights lawyer Morris Dees through his organization the Southern Poverty Law Center (SPLC),” J. D. Cash wrote for the McCurtain Daily Gazette in October of 2005.

In some detail the FBI acknowledged the SPLC was engaged in an undercover role where it monitored subjects for the FBI believed to be linked to executed bomber Timothy McVeigh, the white supremacist compound at Elohim City and the mysterious German national Andreas Carl Strassmeir.

Strassmeir was a German intelligence officer and the leader of the Aryan Republican Army at Elohim City, Robert Millar, worked closely with the FBI. “Founder Millar repeatedly shared information with law enforcement officials. During a June 31, 1997 court proceeding, FBI Senior Agent Peter Rickel testified Millar was in regular contact with the agency in the years before the bombing,” writes Jim Redden in his book, Snitch Culture.

As we noted in the case of the 1st SS Kavallerie Brigade Motorcycle Division bust in July, the FBI controls the virtually all white supremacist groups.

It came out during the trail of reputed racist Hal Turner that he was a “National Security Intelligence” asset working for the FBI’s Joint Terrorism Task Force. His code name was “Valhalla” and “he received thousands of dollars from the FBI to report on such groups as the Aryan Nations and the white supremacist National Alliance, and even a member of the Blue Eyed Devils skinhead punk band,” according to The Record.

The FBI has run racist and white supremacist groups since the 1960s. Under COINTELPRO, the FBI “subsidized, armed, directed and protected the Ku Klux Klan and other right-wing groups,” Brian Glick writes. Racist groups were used to create a strategy of tension by attacking groups on the so-called left, including anti-war, Chicano and Puerto Rican activists and nationalists.

It now appears the government has taken its psyop to the next level. Instead of merely concentrating on small time busts and demonizing “rightwing extremists” for propaganda purposes in a complaint corporate media, they have decided to add the racist “white power” angle to the domestic terrorism narrative.

Wisconsin shooting – Witnesses report multiple shooters and a well coordinated attack, police say they shot and killed The shooter, no evidence of multiple shooters.

 

Amardeep Kaleka, a filmmaker working on a disclosure project film, reported that his father was shot in the temple. He reported that he had gone to the hospital, and was in contact with and getting information from the priest who he got in touch with during the incident. The priest told him his father was shot, and then Arm went on to report that from his knowledge by talking to people inside that there were “multiple shooters, of Caucasian descent”. He then said that his mother got in touch with him shortly afterward via phone to say that “they are out there, they are out there.” further adding to the coordinated attack reports that came early in this story. Arm Kaleka’s reports of multiple shooters indicated, as he stated, a “well coordinated” and not “haphazard” attack, complete with the “release of gases” into the kitchen where his mother was hiding.

Police are claiming that they have no evidence of any additional shooters. Starting to sound familiar?

Another victim’s family member was told there were 4 people involved in the shooting. Speaking with the Associated Press, he stated, “Between ten and ten-thirty, four white males who were dressed darkly, dressed in all black clothing, came in and opened fire on our congregation.”

He then estimated from hearing different reports from inside the scene that up to 25 people have been shot inside, and that the perpetrators were holding children inside; that there could be a possible hostage situation with children hiding in basements and people hiding in pantries and closets.

Two people in communication with people inside claimed that three priests, including the guest speaker were shot, and the guest speaker who was here from India is among the presumed dead.

Update: 11:48am pst: Police claim they have only identified one shooter, which they shot and killed on the street.

Update: 12:23pm pst:  A witness from inside reported the shooters were ‘dropped off’ by a car, which sped away from the scene, hostage situation is no longer ongoing. Reports seeing 5 people dead inside.

Update: 1:43pm pst: police say 6 dead, and the 7th being The shooter.

Update: 3pm pst: WISN reports that one of the injured had shots to the chest and abdomen, the second had shots to the extremities and face and the third had gunshot wounds to the neck. All three men are in critical condition. 2 have undergone surgery, 1 is having a “complex procedure” at this time.

Update: 4:06pm pst: WTMJ reports police surrounding house near Oak Creek, WI, 4 blocks cordoned off, reports of possible explosive devices, no confirmation that the two incidents are connected as yet.

Update: 5:35pm pst: local news outlet WISN reports police the FBI has converged on a house in Cudahy, and have warned residents to leave the area “for an extended amount of time”. SWAT team members were reported going in guns drawn, and for now, it appears this incident is related to the shootings in Oak Creek earlier in the day.

Update: Neighborhood near Packard Ave and Holmes in Cudahy being evacuated. Possible bomb in the home. from @awa22 & @veronicamponies

Is Anaheim, CA under martial law?

Source: GovtSlaves.info: Is Anaheim California Under Martial Law?

(Dan Horn)  If you’d been following the news from California following Tuesday’s Anaheim riots spurred by a protest of a nonexistent police force continuum that lead to two fatal shootings of suspects in the Southern California city, chances are you haven’t been getting much accurate information on the current state of Anaheim since the riots.

The riots were eventually quelled, and a mother of one of the men shot to death by police called for an end to the violence. Peaceful protests around the city’s police headquarters proceeded, but when a picket line along Harbor Blvd got too close to Disneyland, something unprecedented and unnerving happened: a paramilitary police force, stripped of names and badge numbers, wearing urban-camouflage utilities, and outfitted with a combat load and assault rifles, emerged to blockade the world-famous theme park.

News sources like the L.A. Times simply report that riot police formed the blockade, but that’s incredibly misleading, and the reports say nothing about the paramilitary forces patrolling the city streets of Anaheim itself en masse. User-generated communiques on social networks and videos and photos uploaded to sites like YouTube depict heavily armored black vehicles, with paramilitary troops riding on outboard foot-rails, patrolling civilian communities, making arrests, and blockading public roads.

These “police” look like National Guardsmen, and some have been photographed with grenade launchers, ostensibly loaded with tear gas canisters, M16-A2 assault rifles, and tear gas paintball guns. They bear simple vests or patches emblazoned with “POLICE” over their camo flak jackets. It looks like a military occupation, and they are carrying out a directive reminiscent of urban combat in the Middle East. You’re hearing this from someone who saw this sort of thing in Afghanistan.

It’s no wonder that accurate news cables have been squashed in Anaheim. Emmy-winning photographer and correspondent Amber Lyon captured images of a reporter who accompanied her having his press ID turned away by police who then asked for identification that would prove residency in the city.