James O’Keefe Offers $10,000 Award for Content Which Exposes Media Malfeasance
Anonymous Source Within CNN Provided Audio to Project Veritas
More Audio Yet to be Released in a WikiLeaks Style Dump
Project Veritas released 119 hours of raw audio in a WikiLeaks style dump, with over 100 more hours still yet to be released. The audio was secretly recorded in 2009 by an anonymous source inside CNN’s Atlanta headquarters who we are identifying as Miss X.
The Portuguese authorities have detained a former undercover C.I.A. officer whose extradition has been sought by Italy, where she faces a prison sentence over her role in the 2003 kidnapping of an Egyptian cleric as part of a secret United States rendition program.
There is a documentary online about this affair: “The Italian Job”. [Vice News]
The Defense Advanced Research Projects Agency, better known as DARPA, is embarking on a new program, called RadioBio, to determine whether cells are able to exchange information with EM signals and, if so, what the cells are saying and how they do it. This new initiative seems very close to the once TOP-SECRET “PANDORA Project”.
While the casualty claim is almost certainly exaggerated, U.S. officials confirm that the terrorist group appears to have crossed a threshold with its use of unmanned aircraft. Two years after the Islamic State first used commercially purchased drones to conduct surveillance, the militants are showing a growing ambition to use the technology to kill enemies, U.S. officials and terrorism experts say.
The threat to troops is serious enough to prompt U.S. and Iraqi commanders to issue warnings to soldiers near the front lines. But a far bigger worry, U.S. officials say, is the potential for future attacks against civilians. Islamist militants have long discussed the possibility of using drones as remote-controlled missiles that can deliver explosives or even unconventional weapons such as deadly nerve agents. In recent weeks, the notion of terrorist drones has moved a step closer to reality, terrorism experts say.
The Department of Homeland Security issued a sweeping set of orders Tuesday that implement President Trump’s plan to increase immigration enforcement, placing the vast majority of the nation’s 11 million undocumented immigrants at risk of deportation.
The memos instruct all agents — including Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) — to identify, capture and quickly deport every undocumented immigrant they encounter.
The memos require undocumented immigrants caught entering the country to be placed in detention until their cases are resolved, increase the ability of local police to help in immigration enforcement, call for the hiring of 10,000 more immigration agents and allow planning to begin on an expansion of the border wall between the United States and Mexico.
As we can see in this picture, there are the following telephone sets on the president’s desk in the Oval Office:
– On the left: a new Cisco 8841 IP phone, which is part of the internal White House telephone network and can be used for all non-secure calls. This network was modernized since 2015, but the phone was not placed on the president’s desk until late 2016.
On the back of this phone is a black metal box and on the front panel there’s an extra red button, both of which are modifications by Advanced Programs, Inc. (API) in order to meet Telephone Security Group (TSG) standards, including on-hook security for the handset and the speakerphone and probably also for TEMPEST protection.
These modifications are to make sure that the phone cannot by any means be caused to produce or transmit audio when the handset is on-hook – whether accidental or deliberate. It’s not for securing the calls by means of encryption.
– On the right: an older Cisco 7975G Unified IP Phone with expansion module 7916, which is for the highly secure Executive Voice over Secure IP-network connecting the president to all major decision makers, like the secretaries of State, Defense and Homeland Security, the Director of National Intelligence and top military officials.
This telephone network became operational in 2006 or 2007, but this particular phone is on the president’s desk only since early 2011. Elsewhere, these phones usually have a bright yellow bezel or faceplate instead of the standard silver one, indicating they may be used for conversations up to the level of Top Secret/SCI.
In a 2015 Women’s Aid survey of 693 women, 29 per cent said they had spyware or GPS locators installed on their phones or computers by a partner or ex. In 2014, NPR surveyed 70 women’s shelters, finding 85 per cent were working with victims whose abusers tracked them via GPS, or what’s often referred to as “spouseware.”
Where do those surveillance tools come from? A FORBES investigation has unearthed evidence that often behind such easy-to-use spyware are opportunistic salesmen who’re peddling not just to jealous spouses and paranoid parents for small fees, but whose powerful spying software is also sold to police and intelligence agencies for hundreds of thousands of dollars. Though the cyberweapons creators we investigated have never publicly disclosed this, their digital trails prove that often the malware used to snoop on terrorists and pedophiles is much the same as that used to control partners in abusive relationships.
Not only are lawmakers, lawyers and women’s rights activists horrified at the blatant militarization of personal surveillance, they’ve called on the U.S. government to take action on the sale of spyware in America, something many have long considered illegal.