background preloader

Counterterrorism

Facebook Twitter

Obama's CDC has stackable coffins ready... FEMA clearly is fast becoming the Obama administration’s secret in-country military operations that is scaring citizens out of their wits.

Obama's CDC has stackable coffins ready...

NSA reportedly intercepting laptops purchased online to install spy malware. Gun laws in the United States by state. Gun laws in the United States regulate the sale, possession, and use of firearms and ammunition.

Gun laws in the United States by state

State laws vary, and are independent of existing federal firearms laws, although they are sometimes broader or more limited in scope than the federal laws. For instance, some US states have created assault weapon bans that are similar to the expired federal assault weapons ban. Your car's black box can reveal all. They are about the size of a pack of cigarettes, a high-tech piece of equipment that looks like a motor vehicle ashtray turned upside down.

Your car's black box can reveal all

While many cars no longer have ashtrays under their dashboard, most cars built in the past decade contain an event data recorder, more commonly known as a black box. The EDR, a computer chip that is part of a vehicle's air bag control module, activates in a damage-causing accident and records information such as speed, braking distance and whether occupants are wearing seat belts. The Next Data Privacy Battle May Be Waged Inside Your Car. WikiLeaks Archive — Mixing Diplomacy With Spying. Protect America Act of 2007. Background[edit] In December 2005, the New York Times published an article[3] that described a surveillance program of warrantless domestic wiretapping ordered by the Bush administration and carried out by the National Security Agency in cooperation with major telecommunications companies since 2002 (a subsequent Bloomberg article[4] suggested that this may have already begun by June 2000).

Protect America Act of 2007

Many critics have asserted that the Administration's warrant-free surveillance program is a violation of the Fourth Amendment to the United States Constitution against warrantless search, and, a criminal violation of FISA. The Bush administration maintained that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists,[5] and that the President's inherent authority under Article II of the Constitution to conduct foreign surveillance trumped the FISA statute. However, the Supreme Court decision in Hamdan v.

PRISM (surveillance program) Below are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM program.

PRISM (surveillance program)

It should be noted that the "FAA" referred to is Section 702 of the FISA Amendments Act ("FAA"), and not the Federal Aviation Administration, which is more widely known by the same FAA initialism. Slide showing that much of the world's communications flow through the U.S. Details of information collected via PRISM Slide listing companies and the date that PRISM collection began Slide showing PRISM's tasking process Slide showing the PRISM collection dataflow Slide showing PRISM case numbers Slide showing the REPRISMFISA Web app Slide showing some PRISM targets. Slide fragment mentioning "upstream collection", FAA702, EO 12333, and references yahoo.com explicitly in the text.

Data Sovereignty in the Cloud: The Issues for Government. Location, location, location.

Data Sovereignty in the Cloud: The Issues for Government

Channeling Reality. Clandestine HUMINT operational techniques. Many of the techniques here are important in counterintelligence.

Clandestine HUMINT operational techniques

Defensive counterintelligence personnel need to know them to recognize espionage, sabotage, etc. in process. Offensive counterintelligence specialists may actually use them against foreign intelligence services (FIS). While DA and UW can be conducted by national military or paramilitary organizations, al-Qaeda and similar non-state militant groups appear to use considerably different clandestine cell system structure, for command, control, and operations, than do national forces. Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say. June 30 (Bloomberg) -- The U.S.

Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say

National Security Agency asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks, lawyers claimed June 23 in court papers filed in New York federal court. The allegation is part of a court filing adding AT&T, the nation's largest telephone company, as a defendant in a breach of privacy case filed earlier this month on behalf of Verizon Communications Inc. and BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President George W.

Bush violated the Telecommunications Act of 1934 and the U.S. White House Confidential. By Martin Filler Jan/Feb-2001 On January 20, after an unprecedented amount of post-election drama, George W. and Laura Bush will become the 41st family to call the White House home.

White House Confidential

HUMINT. Good intelligence management begins with the proper determination of what needs to be known.

HUMINT

Unless precise requirements are set, data will be collected unsystematically and the decision maker ultimately left without pertinent information on which to act. Collected data must be evaluated and transformed into a usable form and sometimes stored for future use. UN Pushes Population Control Agenda. The United Nations has openly proclaimed that the world’s increasing population is a cause for concern. Likewise, the UN has advocated for its Agenda 21 program that seeks to bring about “sustainable development.” On February 10, The New American’s William Jasper wrote of Agenda 21: The UN’s Agenda 21 is definitely comprehensive and global — breathtakingly so.

Agenda 21 proposes a global regime that will monitor, oversee, and strictly regulate our planet’s oceans, lakes, streams, rivers, aquifers, sea beds, coastlands, wetlands, forests, jungles, grasslands, farmland, deserts, tundra, and mountains. City Says Using Garage For Anything But Car is Illegal! It’s Illegal to store anything but your car in your garage in San Francisco San Francisco is a great example of what happens when liberalism runs amok.

What the left “innocently” forgets when they woo voters to their cause is the obvious and logical outcome of their policies. Government involvement in every facet of life. In San Francisco, one of the examples of leftist policies that are just simple outgrowths of leftist philosophy, is the micromanagement of a community. IANSA - the global movement against gun violence. Weather Warfare: Beware the US Military’s Experiments with Climatic Warfare. This article was first published by The Ecologist in December 2007. I summarizes several in-depth and detailed articles written by the author on the HAARP program. The debate on climate change does not acknowledge the role of climatic warfare, namely the deliberate manipulation of climate for military use. “HAARP is a weapon of mass destruction, capable of destabilising agricultural and ecological systems globally.”

“‘Climatic warfare’ potentially threatens the future of humanity, but has casually been excluded from the reports for which the IPCC received the 2007 Nobel Peace Prize.” Keeping Up Appearances. FBI Investigating Numerous Attacks on Nation’s Power Grid. Why the hottest new police car is a bomb-proof military SUV. All-New Police Interceptor Law Enforcement Sedans & SUVs. Chief orders new 'beacon lights' on Cincinnati police cruisers. Pa. town latest to force drivers over and ask for cheek swabs for federal study. Police Skip Chasing Criminals With New Tracking Technology. Police officers in Iowa are using cutting-edge technology to cut down on risky high-speed chases. Texas Police Ask Drivers for Blood Samples, Secretly Test Those Who Refuse.

Costa Mesa police trade in venerable Crown Vics for high-tech cars. The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks. Diana killed by bright light shone into car. EU may recommend black box recorders for cars. 'It's Intimidating. And It's Free': Iraq War Surplus Militarizing US Police. Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic. Justice Department Pays Linkedin $500,000 For Unlimited Access To Your Personal InformationWealthy Debates. iSpy: Latest report says NSA has backdoor access to iPhones.

Unmanned Aerial Vehicle (UAV) - Predator Drone - News. About the Museum · International Spy Museum. LG Smart TV spying whiplash: LG removes Smart Ad video and changes statement. Rumor: UN arms treaty will ban guns in US. McDonald v. Chicago. Secret U.S. court approved wider NSA spying even after finding excesses. New NSA Spying Info on Project Code Named ‘Stellar Wind’: Collected Data Akin to a ‘Real-Time Map of Your Brain’

Area 51 officially acknowledged by CIA. The Road to Area 51. The World Factbook. The Difference between Aliens, Demons and Fallen Angels. Simon Peter versus Simon the Sorcerer.