Monthly Archives: January 2015

Super Soldier Talk with Ben Murphy – Reptilians, Heather Material – Nov 14, 2014

Ben murphy shares his story of how he survived a near fatal wound, his take on James Casbolt, his experience with extraterrestrial beings, and the release of audio CDs to activate super soldiers given to him by Heather Anderson. Also we like to give a special thanks to for correcting the audio malfunction.

To read the transcripts please visit

View original post

British securocrats try to sneak in Snooper’s Charter yet again


Earlier this month, four U.K. lords tried to sneak the text of a rejected piece of legislation popularly known as the Snooper’s Charter into a new anti-terror bill. After debate in the House of Lords produced heavy pushback, the peers withdrew the amendments that would have brought the surveillance law in by the back door.

And now, incredibly, they’re trying it again just days later. On Saturday, ahead of a “report stage” debate on Monday (the Counter-Terrorism and Security Bill is almost fully baked), Lords West, Blair, Carlile and King introduced a new amendment that appears to be nearly identical to the last, and to the Communications Data Bill before it.

Again, this new amendment would force “telecommunications operators” – which these days includes the likes of [company]Facebook[/company] and [company]Skype[/company], as well as traditional telcos – to store communications metadata for up to a year and hand it over to…

View original post 407 more words

UK Lords kill attempt to sneak in new surveillance laws


Members of the U.K. House of Lords, who last week introduced amendments to an antiterror bill that would have essentially brought back defeated surveillance legislation, have withdrawn the amendments after a spirited debate in the House.

The amendments had been added to the Counter-Terrorism and Security Bill and would have reintroduced key planks of the Communications Data Bill, popularly known as the Snooper’s Charter.

This included a new data retention regime and very broadly-phrased clauses that would have allowed security services to force communications service providers such as Facebook to install equipment in their facilities, so U.K. intelligence and law enforcement could search through Britons’ communications metadata.

Lord King, one of the four peers who introduced the amendments, withdrew them after hours of debate on the basis that their contentiousness might sink the wider terror bill.

It was certainly a lively debate. The peers who submitted the amendments attacked the…

View original post 266 more words

Mass Surveillance Threatens Digital Security And Human Rights, Says European Report


A 32-page report into mass surveillance by a top European rights body has warned that digital dragnets set up by U.S. government intelligence agencies, and some of the U.S.’ allies in Europe and elsewhere, are endangering fundamental human rights — such as the right to privacy, to freedom of information and expression, to freedom of religion, and to the right to a fair trial.

NSA whistleblower Edward Snowden gave evidence to the committee last year, including revealing that U.S. government intelligence agencies spied on NGOs and human rights organizations.

The Parliamentary Assembly of the Council of Europe (PACE) report also expresses deep concern about threats to Internet security by what it describes as “the practice of certain intelligence agencies”, as disclosed in the Snowden files, of “seeking out systematically, using and even creating ‘back doors’ and other weaknesses in security standards and implementation, which could easily be exploited also by terrorists and cyber-terrorists or other…

View original post 692 more words

License plate data lets cops spy on US drivers at record rates


A new investigation shows the scale of surveillance on U.S. highways is more extensive than many previously imagined, thanks to a license plate database that allows federal and local law enforcement to watch cars and even drivers in real time.

According to documents reviewed by the Wall Street Journal, the database was created by the Drug Enforcement Administration to track cartel activity, but it soon came to comprise millions of records that are regularly shared with police forces across the country:

The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists […]

The DEA program collects data about vehicle movements, including time, direction and location, from high-tech cameras placed strategically on major highways. Many devices also record visual images of drivers and passengers, which are sometimes clear…

View original post 201 more words

Levitation program tracked file-sharing sites, Snowden doc shows


The Canadian spy agency CSE monitors activity across over 100 free file upload sites, a newly-revealed PowerPoint document from NSA whistleblower Edward Snowden’s cache has shown.

The document describing CSE’s Levitation program was published on Wednesday by The Intercept, reporting alongside Canadian broadcaster CBC. Although Canada has long been known to be a member of the core Anglophone “Five Eyes” spying club, this is the first Snowden revelation putting it at the forefront of one of the Eyes’ mass surveillance programs.

Using an internet cable-tap program called Atomic Banjo, CSE’s agents were at the time of the presentation’s authoring collecting HTTP metadata for 102 cyberlocker sites, including Sendspace and Rapidshare, and tracking 10-15 million “events” each day to find “about 350 interesting download events per month.” And yes, this meant filtering out loads of TV shows and such.

According to the presentation, the technique yielded a “German hostage…

View original post 129 more words

UK terror law amendments would bring back “Snooper’s Charter”


Four U.K. Lords have proposed amendments to an anti-terror bill that would revive much of the dormant Communications Data Bill, a.k.a the “Snooper’s Charter”.

In particular, the amendments would let British authorities force web and telecoms providers — even those outside the U.K. — not only to retain metadata on customers’ communications, but also to install equipment for “filtering” data. It looks like access to this data would not be subject to judicial oversight.

The Communications Data Bill is supposedly dead in the water during the current Parliament – the Conservatives’ Liberal Democrat coalition partners refuse to allow it – but the key elements are found in the amendments to the Counter-Terrorism and Security Bill, which is in its latter stages of development.

The amendments broadly describe a data retention regime, and much of their language seems to double up what can already be found in the recently rushed-through Data…

View original post 688 more words

China Cracks Down On VPN Services After Censorship System ‘Upgrade’


China is cracking down on VPNs, software that allows internet users to access Twitter, Facebook, Gmail and others services blocked in the country, according to state media and service providers.

People’s Daily reports that China’s ‘Great Firewall’ internet censorship system was “upgraded for cyberspace sovereignty”, a move that affected the usage of at least three popular VPN services and attacked others with more vigor than usual.

Strong VPN noted on its blog that it is suffering “connection issues” from China, while TunnelBear told TechCrunch it is investigating after reports from some China-based customers who “have been less successful in connecting over the last few weeks.”

Furthermore, Astrill, a service that is well used by China’s expat and business community, this week alerted users of issues with its iOS client.

An employee at Astrill reportedly told People’s Daily…

View original post 390 more words

Whistleblower Randy Cramer Tells About Secret Military Operations on Mars

Posted on April 30, 2014

Note: Images have been resized and the multiple copy issue is being resolved.

By Eve Lorgen

Randy Cramer-aka-Captain “Kaye”, a former supersoldier I Interviewed back in 2006, code named “Zed” (See:

is going public with his testimony about his service for the Mars Defense Force. The MDF is part of the Earth Defense Force, a UN “Unacknowledged Special Access Program”. His recruitment in 1987 into the “US Marine Corps Special Section” began a 20 year tour of duty working for the Mars Defense Force, which is the primary defense unit that protects the Mars Colony Corporation. This defense unit recruits people from many military services globally to protect the interests of the MCC, which consists of five civilian space colonies. Aries Prime is the main human “headquarters” on Mars, and is located inside of a crater.

According to Randy, the atmosphere on Mars is…

View original post 7,658 more words

Defending encryption doesn’t mean opposing targeted surveillance


David Omand, the former head of British spy agency GCHQ, has made an extraordinary threat. Speaking earlier this week, he said that if companies such as Apple and Google don’t abandon their end-to-end encryption efforts, intelligence services will have to employ more “close access” surveillance on people they suspect of evil deeds.

This means physical observation, or bugging rooms, or hacking into phones and computers. According to Omand, such actions are “more targeted but in terms of intrusion into personal privacy – collateral intrusion into privacy – we are likely to end up in an ethically worse position than we were before.”

No, you’re not. Surreptitiously getting a key to a suspect’s communications is no more ethical than conducting close personal surveillance — but in the big picture, the latter is vastly preferable.

The ethics of spying

Targeted surveillance will always mean “collateral intrusion” into the privacy of people associated with…

View original post 601 more words

EHANG, Maker Of Ghost Drone, Raises $10M Series A Led By GGV Capital


Though the market is still in its early stages, drone startups are becoming increasingly popular among venture capital firms. One of the latest companies to benefit is EHANG, maker of Ghost Drone, which users can control by tilting their smartphones. The company announced today that it has raised a $10 million Series A led by GGV Capital, with participation from entrepreneurs Xiaoping Xu, the co-founder of ZhenFund; entrepreneur Nick Yang, former chief technology officer of Sohu; and early-stage startup fund PreAngel also participated.

(EHANG was a finalist at the TechCrunch/TechNode Beijing event’s startup competition in August.)

EHANG co-founder Derrick Xiong says the Series A will be used to grow EHANG from its current roster of 17 70 employees, who are based in Guangzhou, Beijing, and San Francisco. EHANG plans to expand its marketing team to promote the drone as well as its software development kit (SDK) and hopes…

View original post 482 more words

How the internet’s engineers are fighting mass surveillance


The Internet Engineering Task Force has played down suggestions that the NSA is weakening the security of the internet through its standardization processes, and has insisted that the nature of those processes will result in better online privacy for all.

After the Snowden documents dropped in mid-2013, the IETF said it was going to do something about mass surveillance. After all, the internet technology standards body is one of the groups that’s best placed to do so – and a year and a half after the NSA contractor blew the lid on the activities of the NSA and its international partners, it looks like real progress is being made.

Here’s a rundown on why the IETF is confident that the NSA can’t derail those efforts — and what exactly it is that the group is doing to enhance online security.

Defensive stance

The IETF doesn’t have members as such, only…

View original post 1,611 more words

FBI doesn’t want companies to hack in retaliation


Major banks, retailers, manufacturers and other companies are fed up with the increasing amount of cyber attacks and are exploring hacking in revenge, something the FBI doesn’t seem too keen on, according to a Bloomberg report.

Based on the perception that the U.S. government is not doing enough to stop data breaches, some companies are looking to hack into criminal networks and take back their goods as well as stop future breaches. To help with the retaliation hacks, these companies are supposedly working with security firms.

Citing anonymous sources, Bloomberg reports that the FBI is investigating who took down the Iranian servers responsible for launching cyber attacks against major banks last year. Supposedly, [company]JPMorgan[/company] Chase (whose unpatched server led to a data breach earlier this summer) advocated such a move in a secret meeting in February 2013. But a spokeswoman told Bloomberg that the bank didn’t present any sort…

View original post 229 more words

The Patriot Act Is Cannibalizing America’s Economic Edge


Editor’s Note: Amit Patel is the chief financial officer of HighQ.

You would think that when tech companies, the ACLU and the NRA unite for the same cause, the federal government would listen. That was not the case in this year’s USA FREEDOM Act vote where the Senate voted against reforms that would stop the NSA from collecting phone metadata.

The majority opinion prioritized protectionism—the idea that phone-record collection could stop threats like ISIS from endangering U.S. citizens—over economic growth. Such myopic attachment to the tools of defense, without consideration of their big-picture relevance, puts the $5.7 trillion U.S. IT industry in danger of losing its competitive advantage.

Risking the second-largest industry in the country will pose serious long-term consequences—not only to the economy, but, by association—to national security itself.

It’s time for legislators to ask themselves which laws matter most.

Running From The U.S. Cloud

With more…

View original post 690 more words

UK wants hot tech grads to do spy work before building startups


The British government is considering a program that would see the most promising tech graduates spend some time working for the GCHQ signals intelligence agency, the U.K.’s equivalent to the NSA, before they move into the private sector.

As per a Thursday article in The Independent, confirmed to me by the Cabinet Office on Friday, the scheme would give the U.K. a rough equivalent to the system in Israel, where many tech entrepreneurs have come out of Unit 8200 of the Israel Defence Force. Unit 8200 is also a signals intelligence operation, and the cybersecurity firm Palo Alto Networks is a notable spinout.

According to the Cabinet Office sources quoted in the Independent piece, the idea would be to “capitalize on the expertise in GCHQ in terms of IT commercialization” by creating “a secure space where business can work with GCHQ and build an eco-system between the two.” (Side…

View original post 257 more words

Offshoring Data Won’t Protect It From The NSA


[tc_dropcap]The United States is the physical hub of the global Internet.  Data from around the globe crosses gateways and servers in the United States.  This basic fact, obscured by hazy visions of a borderless Internet cloud, is part of what accounts for global dismay at the revelations of extensive spying by the National Security Agency.[/tc_dropcap]

The natural reaction of many citizens, companies and governments is to try to get their data out of the United States and out of the hands of American companies.  The idea is a seductive one, even for Americans.  Offshoring money has been a popular strategy for tax avoidance.  Why not offshore data to a foreign company?

This offshoring of data to avoid surveillance is not just an idle notion.  As a privacy lawyer with experience in the intelligence community and the Obama White House, technology companies have asked me how they might pursue such a…

View original post 761 more words

With SkySpecs’ Guardians, The Drones Have Become Self-Aware


SkySpecs has solved the biggest problem with drones: avoiding obstacles. With the company’s first product, launching today at TechCrunch’s Hardware Battlefield 2015, drones become aware of their surroundings and will automatically avoid objects. If a person walks towards the spinning blades of death, the drone will casually back out of the way. If there is a tree in the way, the drone will avoid it.

Best of all, this system works with existing drone platforms.

SkySpecs’ team has been building drones for six years and and individuals in the company come from teams that won the 2012 international aerial competition and the prestigious DARPA sponsored “MAGIC” competition. These guys know drones.

Guardian is the company’s initial product and they tell me it’s the first product to offer this sort of capability. It works as advertised. While demoing in Hardware Battlefield at CES 2015, the drone swiftly moved out of the…

View original post 117 more words

Surely, Cybersecurity Must Have Your Attention Now


[tc_dropcap]As 2014 came to a close, we got a front row seat to the horror show that was the Sony hack.[/tc_dropcap] As if we needed a case study to show us, we saw, with vivid clarity, what can happen when hackers run amok inside servers and start sharing confidential business content with the world — and we learned it gets ugly in a hurry.

We’re less than a week into the new year and already we’ve seen a major Bitcoin attack. You know that it’s only a matter of time before we hear about the next catastrophic system assault. It’s a bit like cybersecurity roulette. We keep spinning the wheel to find out who the next victim is.

The question is, why are we still so vulnerable, and why is the industry not banding together to solve this once and for all? Security matters to everyone from governments to finance to private sector companies of all sorts. Nobody wants…

View original post 1,458 more words

UPDATE: There Is A Media Sponsored Fund And A Crowdfunding Campaign To Support Charlie Hebdo


Update: The Press and Pluralism Fund, which was set up by French newspapers to ensure diversity in media publishing (I’ll let that sink in), has set up a campaign for Charlie Hebdo support. It’s address is here.

There’s also a crowdfunding campaign to support the French satirical newspaper Charlie Hebdo and the families of victims of the killing spree at its headquarters.

The campaign was started by David Opolon, an MIT PhD and a principal with a large consulting firm here in the U.S.

“It’s great that a lot of people all over the world are donating. What’s more important than just the amount is that we maximize the number of people that contribute,” Opolon says.

For its good intentions, the logistics of how the money will be distributed hasn’t been worked out, Opolon says.

“That’s something we need to define as we get in touch with Charlie Hebdo, who are rightly…

View original post 32 more words

Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons


Edward Snowden says in a new interview with NOVA Next that the U.S. government wrongly promotes cyber offense strategies at the expense of weakening the system and leaving it open to cyber attacks from the black market.

“We’re creating a class of Internet security researchers who research vulnerabilities, but then instead of disclosing them to the device manufacturers to get them fixed and to make us more secure, they sell them to secret agencies,” Snowden says. “They sell them on the black market to criminal groups to be able to exploit these to attack targets. And that leaves us much less secure, not just on an individual level, but on a broad social level; on a broad economic level. And beyond that, it creates a new black market for computer weapons, basically digital weapons.”

Snowden points out that the White House’s own independent review panels have shown that not a single program has stopped an imminent terrorist…

View original post 323 more words

Obama administration won’t act on Aaron Swartz petition


The White House will not act on a petition filed to fire the U.S. Attorney who prosecuted Aaron Swartz, co-founder of Reddit and crusader for a free-and-open internet. Swartz died, of an apparent suicide, two years ago.

Swartz, 26 years old, was reportedly despondent over the government’s decision to pursue federal charges that he hacked into an academic database, downloading millions of research papers. He faced a maximum of 50 years in prison.

A petition filed on White, which received more than 61,000 signatures, asked the administration to remove Carmen Ortiz, the U.S. Attorney out of Boston, for overzealous prosecution for what critics call minor infractions. The petition cites a lack of a sense of “proportionality.”

In its response to the petition, the administration said it will continue to examine such thorny issues as “open access to information, privacy and intellectual property, free speech and security” But it will not fire Ortiz. The response noted that…

View original post 70 more words

Are you being tracked? A TED Fellow on how law enforcement follows your movements, and why you should care

TED Blog

Catherine-Crump-CTA-imageDid you know that across the United States, cameras are automatically taking pictures of your car’s license plate as you drive by, recording your plate number and your locations over time? In a chilling talk given at TEDGlobal 2014, civil liberties lawyer and TED Fellow Catherine Crump called attention to the ubiquity of mass surveillance technology currently being deployed without public awareness, laws governing its use or privacy policies regulating what happens to the data being collected. (Watch the talk, “The small and surprisingly dangerous detail the police track about you.”)

Crump tells the TED Blog more about her work, and the technologies that are quietly threatening the privacy and civil liberties of innocent people.

You are a civil liberties lawyer with many different strands to your work, but in the talk you gave at TEDGlobal, you focused on automatic license plate reader technology. Why did you choose that topic?

I think…

View original post 2,268 more words

European Ministers Call For Increased Digital Surveillance After Paris Terror Attacks


And so it begins again; the customary fingerpointing at the Internet as a platform for fueling extremist hatred in the wake of the latest terrorist outrages in Europe — accompanied, in certain corners of the political arena, by calls for greater powers of digital surveillance to preemptively thwart acts of terror.

In a joint statement put out yesterday, the justice and interior ministers of 12 European countries — including the U.K., France and Germany — express concern at “the increasingly frequent use of the Internet to fuel hatred and violence and signal our determination to ensure that the Internet is not abused to this end”.

They also call for major ISPs to partner with governments to enable “swift reporting of material that aims to incite hatred and terror and the condition of its removing, where appropriate/possible”.

The statement echoes moves by the U.K. government late last year to co-opt major ISPs (and their users) into doing more to help combat extremist material…

View original post 1,097 more words

The Aviary: Key players of the 1980s and 1990s

The story of artificial telepathy research in the 1980s and 1990s centers on The Aviary and their leader, Col. John B. Alexander (see photo).

“The Aviary” is a collection of strange birds: a group of key scientists, military men and intelligence agents who share an intense interest in UFOs, telepathy, remote viewing, parapsychology, mind control and the creation of psychotronic weapons.

They seem to work and flock together, and they are reportedly part of a secretive cell. Its members are codenamed after birds, hence they are called “the Birds” and their cell is called the “Aviary.”


The strange UFO slant on this group appears to be simple disinformation.

Members of the Aviary have reportedly participated in MILABS operations — black operations by rogue military-intelligence units that stalk, harrass, terrorize, kidnap, drug, gang-rape and mind-rape innocent civilians, using hypnotic mind-control programming to implant a false post-hypnotic “memory” that…

View original post 1,729 more words

Leaked US report says encryption “best defense” to protect data


A newly leaked document courtesy of Edward Snowden revealed that some U.S. officials are encouraging the use of encryption as a means to protect data, which contrasts with British Prime Minister David Cameron’s recent statements against encrypted communications, according to a report by The Guardian.

The 2009 document penned by the U.S. National Intelligence Council, which supports the U.S. Director of National Intelligence and acts as the middleman between the intelligence and policy communities, explained that companies and the government are prone to attacks by nation-states and criminal syndicates “due to the slower than expected adoption…of encryption and other technologies.”

The report detailed a five-year prognosis on the “global cyber threat to the US information infrastructure” and stated that encryption technology is the “[b]est defense to protect data.” Encryption makes it possible for documents and messages to be unreadable to people who don’t have the appropriate cryptographic key.


View original post 223 more words

Report: No real substitute for NSA’s bulk data collection


A new report from the National Research Council concludes that untargeted, or bulk, data collection remains probably the best method for fulfilling the National Security Agency’s mission. However, the report’s authors note, there are measures that can be taken to make that practice more transparent and less susceptible to agency abuse.

The 80-plus-page report, which was written in response to a presidential directive to investigate alternatives to bulk data collection by the intelligence community, lays out various possible methods of targeting data collection to specific individuals, groups or behavior patterns –ranging from machine learning to real-time analysis — but seems to come down on the side of the status quo. The only way to investigate newly identified suspects or new information is to have a large database that might already include relevant data, the report explained.

The report does offer suggestions for improving public trust in the process, primarily focused on improving the sanctity…

View original post 445 more words

A True Story of “The Handler and the Butterfly”

Victims of MKUltra Trauma Based Mind Control – A monarch is the king or queen at the head of a monarchy. This is a form of government in which a state or polity is ruled or controlled by an individual who …(wiki)

Their purpose was to study mind control, interrogation, behavior modification and … Its remit was to develop mind-controlling drugs for use against the Soviet … (wiki)
The Monarch butterfly (Danaus plexippus) is a milkweed butterfly (subfamily Danainae) in the family Nymphalidae. It is perhaps the best known of all North …(wiki)

View original post

The Strange World of NSA Mind Control

“Whatever you think of Gaddafi and Mussa Kussa …

they were good and they were good counter-terrorism partners,”

Gen. Michael V. Hayden Former NSA and CIA Director 


The Strange World of NSA Mind Control
The surveillance society is a secretive apparatus of intrusion and deception. An enigma within a disinformation perception of reality is at the core all activities of spooks. One of the most pervasive and all reaching agencies is the NSA. The National Security Administration officially is a cryptologic intelligence agency whose primary function is Signals Intelligence Directorate (SID), which produces foreign signals intelligence information, and the Information Assurance Directorate (IAD), which protects U.S. information systems. The General Accounting Office defines the nature of the structure of the NSA.

“The National Security Agency (NSA) is a combat support agency within the Department of Defense (DOD) established by presidential directive in 1952. NSA has two separate missions: signals intelligence…

View original post 1,447 more words

Mind Control: the Pentagon Mission to Program the Brain

By Jon Rappoport

Region: USA
Theme: Intelligence

“Since the dawn of time, the most powerful groups in every society have practiced forms of mind control on populations. They determined it was necessary. Eventually, they decided it was their most important job. Convincing the masses that a fabricated reality is Reality…that task requires formidable mind control.” (The Underground, Jon Rappoport)

DARPA, the technical-research arm of the Pentagon, is leading the way in a mission to program the human brain.

What could go wrong?

In a word, everything.

Here is a DARPA release (5/27/14) on the upcoming “brain-mapping” plan, in accordance with Obama’s initiative aimed at “preventing violence through improved mental health”—otherwise known as Clockwork Orange:

“…developing closed-loop therapies that incorporate recording and analysis of brain activity with near-real-time neural stimulation.”

Translation: Reading myriad brain activities as they occur, and influencing that activity with various…

View original post 1,029 more words

Time to build personal protect fields

(c) Terry Floyd Johnson, 2015

Terrorists, ISIS, etc., and others, are stepping up their killing of innocents. ISIS kills children and teenagers, 3 men kill cartoonists, because they don’t like their political cartoons, about their God, the Big M, and of others like the leaders of ISIS.

These fanatics, use these so called reasons, to be able to kill, innocents, who can’t defend themselves, and they call themselves heroes, because they kill everything in sight.

These freaks of nature, must be brought down, and the best way is to arm the public with a personal protect field, that not only protects them, but allows the bullets, etc., to return to sender, killing the killers.

There are going to be those who don’t won’t to kill them, but simply be safe from them, their protect fields will simply block out whatever the assholes, not terrorists, want to do to them.

It’s time to build smart devices, who can actually save lives, and put an end to terrorists, and wars, for they are unable, to kill anyone. What if they destroy the environment around them, and the building crashed down on them. These personal protect fields, will be able to protect their owners, from any kind of terrorist act, and send back to sender. Thus the terrorists are the one who dies, not the innocents.

These personal protect fields are futuristic; well, the future is now, and the military have been working on ideas which will protect soldiers, and allow the killing of the enemy.

Use their research, and add it for personal protection, for every person in the world. We have the way to build this, use our creative engineering and our mind to come up with the answers.

Anyone who is interested in doing this, anyone who wants to fund the research, please contact me at

Come on do something that will make the creator wealthy, and save the human race from itself.