How Goes the Global War on Terror?

"The U.S. military and the CIA are good at deposing dictators and wrecking countries. They are bad at defeating an operation like al Qaeda. Their incompetence is matched only by that of the government that has set the war policies and determined grand strategy. How’s the GWOT going in America? Americans are the losers. The cost of the wars in Iraq, Afghanistan and Pakistan is anywhere from $2.4 trillion to $4 trillion. Civil liberties have been curtailed. Police have been militarized. Privacy has deteriorated. A police state apparatus has been installed. Economic progress has vanished." Continue reading

Continue ReadingHow Goes the Global War on Terror?

‘Most members of Congress have not even seen the secret legal interpretations’ behind FISA

"President Obama’s stated desire for an 'open debate and democratic process' about the U.S. government’s surveillance activities met with open disbelief by a prominent former congressional staffer — Jennifer Hoelzer, who recently left service as deputy chief of staff to Senator Ron Wyden (D-Oregon). Hoelzer noted that she had been explicitly barred earlier this year from publicly discussing her senator’s reasons for opposing a bill that contained a loophole giving the NSA the apparent authority to run searches on Americans without any kind of warrant. Supporters of the legislation, however, were free to issue press releases touting its value to the public." Continue reading

Continue Reading‘Most members of Congress have not even seen the secret legal interpretations’ behind FISA

Treating Surveillance as Damage and Routing Around It

"Even as the U.S. security state becomes more closed, centralized and brittle in the face of NSA whistleblower Edward Snowden’s leaks, civil society and the public are responding to the post-Snowden repression by becoming more dispersed and resilient. That’s how networks always respond to censorship and surveillance. Each new attempt at a file-sharing service, after Napster was shut down — Kazaa, Kazaa lite, eDonkey, eMule, The Pirate Bay — was less dependent on central servers and other vulnerable nodes than the one before it. Wikileaks responded the same way to U.S. government attempts to shut it down." Continue reading

Continue ReadingTreating Surveillance as Damage and Routing Around It

Ron Paul: Why Are We At War In Yemen?

"The US government is clearly at war in Yemen. It is claimed they are fighting al-Qaeda, but the drone strikes are creating as many or more al-Qaeda members as they are eliminating. Resentment over civilian casualties is building up the danger of blowback, which is a legitimate threat to us that is unfortunately largely ignored. Also, the US is sending mixed signals by attacking al-Qaeda in Yemen while supporting al-Qaeda linked rebels fighting in Syria. This cycle of intervention producing problems that require more intervention to 'solve' impoverishes us and makes us more, not less, vulnerable. Can anyone claim this old approach is successful?" Continue reading

Continue ReadingRon Paul: Why Are We At War In Yemen?

Ted Koppel: ‘Can You Imagine A Day When We’ll Be Without The TSA?’

"'The terrorists have achieved more with one phone call than we have achieved with all our response,' Koppel said. 'Terrorism is imply the weapon by which the weak engage the strong,' Koppel said. 'They cause the strong—in this case us—to overreact. We are the ones who went into Iraq and spent about a trillion and a half dollars doing it, losing 4,500 men and women, god knows how many tens of thousands injured. We are the ones who created a bureaucracy. The TSA has what—57,000 people operating within the TSA? Can you imagine a day when we will ever be without that bureaucracy? All imposed upon ourselves.'" Continue reading

Continue ReadingTed Koppel: ‘Can You Imagine A Day When We’ll Be Without The TSA?’

Homeland Security tracks down 400-page diary of Nazi leader and Hitler aide

"The FBI opened a criminal investigation into the missing documents. No charges were filed in the case. But the Holocaust museum has gone on to recover more than 150,000 documents, including a trove held by Kempner’s former secretary, who by then had moved into the New York state home of an academic named Herbert Richardson. The Rosenberg diary, however, remained missing. Early this year, the Holocaust museum and an agent from Homeland Security Investigation tried to locate the missing diary pages. They tracked the diary to Richardson, who was living near Buffalo." Continue reading

Continue ReadingHomeland Security tracks down 400-page diary of Nazi leader and Hitler aide

Scholarly book presents ‘hidden history’ of Nazi ‘gun control’

"'A skeptic could surmise that a better-armed populace might have made no difference,' the overview for 'Gun Control in the Third Reich: Disarming the Jews and ‘Enemies of the State’' observes, 'but the National Socialist regime certainly did not think so -- it ruthlessly suppressed firearm ownership by disfavored groups.' The book, 'based on newly-discovered, secret documents from German archives, diaries and newspapers of the time … presents the definitive, yet hidden history of how the Nazi regime made use of gun control to disarm and repress its enemies and consolidate power.'" Continue reading

Continue ReadingScholarly book presents ‘hidden history’ of Nazi ‘gun control’

New Nanotech Set to Track, Self-Destruct, and GPS Tag Guns Wirelessly

"The technological system utilizes tiny devices that are implanted in guns and other weapons. These devices are more than chips; they are actual mechanical processes created by precision engineering that can affect the weapon’s operations. The devices include miniature GPS systems designed to make guns easier to track and self-destruct systems that could cause them to explode if they receive a wireless signal. The technology coincides with the ‘smart gun’ technology Anthony Gucciardi has broken down in the past, which can be used to ‘turn off’ weapons when in gun free zones or whenever designated by government." Continue reading

Continue ReadingNew Nanotech Set to Track, Self-Destruct, and GPS Tag Guns Wirelessly

Point-and-shoot scanner copies and creates almost any item using a 3D printer

"A British has inventor has unveiled the ultimate Star Trek gadget - a £650 handheld scanner that could be used to copy almost any item. The Fuel3D scanner, originally developed at Oxford University, can capture everything from a flower’s petals to the contours of human skin. It is able to capture images in seconds, and they can then be sent to a computer for processing. When combined with a 3D printer, it could be used to create 3D copies of everything from broken parts to 3D portraits." Continue reading

Continue ReadingPoint-and-shoot scanner copies and creates almost any item using a 3D printer

Dotcom: Surveillance and Copyright Extremism Will Cost United States Dearly

"'The US government and the other Five Eyes partners (UK, Canada, Australia and New Zealand) have an agreement to push for new spy legislation that will provide them with backdoors into all Internet infrastructure and services. The NZ government is currently aggressively looking to extend its powers with the GCSB and the TICS act, which will force service providers with encryption capabilities to give them secret decryption access,' Dotcom explains. 'The US is on a path of destroying its massive lead in the Internet economy. Mass surveillance and copyright extremism will cost the US economy more than any terrorist attack or piracy,' Dotcom says." Continue reading

Continue ReadingDotcom: Surveillance and Copyright Extremism Will Cost United States Dearly