Support Us | Southern Poverty Law Center

With your help, were standing up for the most vulnerable people in society those who have no other champion. Were exposing hate and injustice, fighting discrimination, and providing award-winning anti-bias materials free of charge to schools across America.

We never take legal fees from our clients, and we accept no government funding. Rather, we rely on the compassion and generosity of people like you.

Supporters who give $25 or more will receive our quarterly newspaper, SPLC Report.

We also welcome donations by both phone and mail. Please call us at1-334-956-8408. Monday-Friday from 8:00 a.m. to 4:30 p.m. CST.

SPLC’s tax ID# is: 63-0598743

Dont want to make a donation online? No problem. Download a PDF of our donation form here and mail it to us at the address printed on the form. You will receive a letter confirming your gift that can be used for your tax returns.

See the original post here:

Support Us | Southern Poverty Law Center

Read More...

April 24, 2018  Tags:   Posted in: Southern Poverty Law Center  Comments Closed |

Apartheid – definition of apartheid by The Free Dictionary

Nations Divided: American Jews and the Struggle Over Apartheid.Since the end of apartheid in 1994, approximately five million immigrants have settled in South Africa; most are Africans from further north pursuing economic opportunity or refugees seeking the political stability of the continent’s most highly developed nation.After years of struggle led by Nelson Mandela, South Africa succeeded in ending the apartheid regime and started to become an effective power in the region and one of the most stable and developed African countries which qualified it to become a member state of the BRICS and of the G-20.The shameful system of apartheid deprives its victims of all human rights, flaunts its atrocities for the world to see, supported by vested interests in–illegal territorial expansion, cheap or slave labor, profit, dehumanizing racial views of its victims, and good press by the corporate media.Apartheid Week (IAW) is an annual international series of events (includingThe action is timed to coincide with Israeli Apartheid Week, an annual event held in cities and universities around the world during the months of February and March that aims ‘to educate people about the nature of Israel as an apartheid system’ and to build support for the ‘Boycott, Divestment, and Sanctions (BDS) campaign as part of a growing global BDS movement’.Feld’s new book, Nations Divided: American Jews and the Struggle Over Apartheid, details American Jewish involvement in the battle against racial injustice in South Africa, placing it in within the context of the long historical encounter between American Jews and apartheid.The “One Word” campaign was launched on June 8 by Ads Against Apartheid (A), which is a local Boston-based non-profit group, and is scheduled to run throughout June.He said that without the two-state solution, “a unitary [Israeli] state winds up either being an apartheid state with second-class [Palestinian] citizens – or it ends up being a state that destroys the capacity of Israel to be a Jewish state.He stressed that he does not believe that Israel is an apartheid state.Having suffered a form of apartheid themselves in the USA and known how dehumanising it was, you would think that all African-Americans would hate the apartheid regime in South Africa.Addressing the congregation, the Most Rev Tutu, the former Archbishop of Cape Town, thanked “splendid” and “amazing” campaigners for their efforts in changing the “moral climate” over apartheid.

Read more:

Apartheid – definition of apartheid by The Free Dictionary

Read More...

April 24, 2018  Tags:   Posted in: Apartheid  Comments Closed |

Lock Down on Prison Planet Almost Complete American …

A conversation about the article below: Patent Theft Steals From All Americans.A 530-page free PDF book with hundreds of hyperlinked documents is available here: Facebook CorruptionHow the US Military Control of Social Media Has Already Imprisoned You and Thrown Away the Key

Long before we could imagine the evil of the elite pedophile globalists of the world, they had already started locking down planet earth. They knew that humanitys wakening consciousness would jeopardize their planetary reign so they had to find a way to imprison our minds, direct our thinking, and limit our expanding consciousness.

They did it right under our noses.

They did it with our own hard-earned money.

While we were busy rearing our children and tending our families, they were quietly implementing Alinskys rules and Soros regimes. They are evil people who prey on our children, profit from our blood, rape our women and countries, and control us with their money illusions. They dont care about our national borders, cultural uniqueness, spiritual paths, or personal liberty. YOU are THEIRS to be farmed any way that brings them greater wealth, longer life, and wicked pleasures.

You have now awakened and realized that the nightmare is actually on the other side of your dreamy sleep. What do you do? First and foremost is to educate yourself on what has occurred since you stopped paying attention. The American Intelligence Media has been writing Citizens Intelligence Reports for several years now so that you can become highly informed patriots. Patriots need to know precisely who the enemy is, how they have weaponized the world, and what we can do to throw off our digital shackles.

The global elites know that education is the key to enlightenment. For this reason, you will find more and more outlets for self-education becoming censored and shut down by the planetary rulers. They simply cant have us know what is going on as there are far too many of us and too few of them.

In this Citizens Intelligence Report we want to alert you to the grave dangers of the weaponization of the internet and social media. A new technological revolution is taking place that will affect all of us. They make it sound so cool and fun the Internet of Thingsbut it is nothing more than a self-imposed prison that will eventually control you 24/7 once you connect into the network.

The more you participate in the automatic information fed directly to your devices that is personalizing your news, entertainment, business, and life-patterns, the more you will think you are free and fully informed. Actually, you will become more and more limited by what your pattern-of-life generates as your individualized algorithms. A mechanical virtual world will be created around you that becomes your personalized digital prison that, at first, may seem like digital heaven, but later rears its ugly head of control and enslavement. By then, it will be too late for any of us to break free.

Your new digital prison is being created every time you do an internet search, click a like button on Facebook, type a phrase into your computer, choose something to watch on television, or speak a word into your phone. Every speck of information that you participate in is used to make your personalized digital life-pattern profile.

Even your bank account and everything you spend is being gathered in an NSA program called Marina [1] that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone automatically pings the route and distance to your destination.

Your phone can also activate all your devices that are connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker starts and your TV comes on with your usual show as the heating pad in your easy chair turns on to your favorite setting.

There is no end to the machine intelligence support you can get from mechanically augmented reality. Now Facebook and its fake, phony, stooge inventor Mark Zuckerberg wants you to put on a 3-D visor and enter a self-created virtual reality world where it feels you are free to do as you please.

We have created this world by being lazy and not asking the hard questionswho owns and controls this technology, what is the ultimate goal of the Internet of Things, does this technology serve or enslave humanity? Eric Schmidt, the CEO of Alphabet has bragged about this new system that claims it is ready to go.

Google, somehow, morphed into a mother company that is named Alphabet which owns all 26 subsidiaries of Google, including the only AI on the planet called Google Deep Mind. Alphabet seems to have unlimited money and unlimited technology patents that are supported wholesale by Wall Street and the U.S. military-industrial complex.

Essentially, Google has always been owned and operated by the dark side of our military-industrial complex. Like Cisco Systems, Inc. before them, Google (Alphabet) was incubated through the U.S. Defense Advance Research Project Agency (DARPA) and the CIAs private corporate venture capital company called In-Q-Tel. (Ask yourself how it is that a government entity can hold private companies and enjoy private profits outside of Congressional oversight, but we digress.)

Google, Cisco, Facebook, Twitter, and most other search engines and social networks all run on allegedly open source code given out by DARPA/In-Q-Tel to universities and corporations to develop. Open source means free to the user without the need to pay royalties or fees to the inventor or creator. Basically, whoever is able to take this weaponized open source code (with encryption back door keys already built in) and develop it for the consumer wins the military contracts.

Then Wall Street (Goldman Sachs and JPMorgan Chase usually) sweeps in with venture capital, and in short time values the new tech company in the tens and hundreds of billions. After that, the banks loan whatever money these companies need to buy out all their competition. These newly acquired Silicon Valley corporate stooges then become front-men for even more weaponized military systems. This now includes Facebook, LinkedIn, Instagram, Pinterest, YouTube, Tumblr and Amazon.

Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that he is simply having fun. Since most American and global businesses have some component on the internet, the militarization of the internet can be as powerful as the threat of global nuclear annihilation. Just imagine if the internet was turned off tomorrow permanently, never to return.

Most of what we think of as modern life would end, and many people would never recover. Economies would collapse, wars would rage, and many of us wouldnt know what to do or what to think. Modern life would collapse because the weapon of the internet already controls modern life. The life of the pygmy in Indonesia would go on uninterrupted, but American life would screech to a halt. We might not be able to reboot for years. This thought begs the question, How did we let this happen?

We, the users of the Internet and all things digital, were happy to use the new technology without asking basic questions like: Who actually owns the cables the Internet travels through? Can they turn it off? Why was so much power given over to the internet? At this point, is there an alternative or way out of this digital?

The answers to the questions above can be given, and there is a solution to this looming problem. But first we must see the internet and all of its wonders for exactly what they are weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools that they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by nonsensical entertainment, religion is replaced by consumerism, and the real world by virtual reality.

Not counting the social networking technology that was stolen, taxpayers of the United States, through the CIAs private venture capital company In-Q-tel, largely funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponizedthese devices and systems against the citizens of the world.

We the People demand that these companies, and any other like them that have been financially seeded and funded by U.S. taxpayers, BE GIVEN TO THE PEOPLE AS A PUBLIC UTILITY and that the fictitious owners of these companies be prosecuted for patent infringement and/or theft.

In numerous articles fromAmericans for Innovation, the Anonymous Patriots have foundunequivocal evidence that IBMs Eclipse Foundation stole the original ideas and source code forGoogle and Facebook from Columbus, Ohio innovator Leader Technologies, Inc. through theirpatent attorney James P. Chandler III. Chandler was mentor of Barack Obama, Eric Holder, Robert Mueller, James Comey and John Podesta, to name but a few.

Chandler represented Leader Technologies, Inc. from the moment Leader realized their innovations were patentable in early 2000. But rather than file the patents immediately, Chandler suspiciously advised Leader to reduce to practice the invention before he would file them.

Hindsight shows that Chandler gave that advice in order to steal the actual source code when it was ready. Chandler bamboozled Leader into taking custody of a copy of the source code in 2002 which he immediately gave to the IBM Eclipse Foundation which then disseminated it to Zuckerberg/Facebook and other companies.

David J. Kappos, IBMs attorney (who also served later as Obamas Under Secretary of Commerce for Intellectual Propertyand Director of theUnited States Patent and Trademark Officefrom 2009 to 2013) was also a student of Chandler at the time of the theft. This theft is one of if not the largest theft of intellectual property and trade secrets in history. It was clearly part of the the weaponization of these digital platforms.

For more information, please see our Citizens Intelligence Reports on these subjects:

.

Once the Silicon Valley high-tech dummy companies are established by stooges who are pre-selected for their willingness to incorporate military back doors into all of their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every devise that broadcasts a signal phone, computer, or any devise on the Internet of Things. Any intelligence agency can simply type in a query and access the metadata collected from every digital devise on the internet or that uses Wi-Fi or cell phone towers.

Among these spying tools is the RIOT (Rapid Information Overlay Technology]) program by Raytheon which leaked to the public on Nov. 16, 2010.[2]

This information is used to target individuals for consumer behaviors as well as DoD intelligence collection. If an internet user is targeted, there are hundreds of ways to attack the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.

The object of the intelligence is simple: Control the user. Social networks on the internet are military experiments in social manipulation. This is what is called PSYOPS or psychological operations.

Another program used to gather the Internet metadata is XKeyscore, a secret computer system first used by the NSAfor searching and analyzing global Internet data, which it collects on a daily basis. It enables almost unlimitedsurveillanceof anyone anywhere in the world.

The NSAs databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored. It can also access your browsing histories or Google search terms that youve entered, and can alert them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects ALL data, on EVERYBODY, ALL THE TIME. [3]

Another component of NSA data collection is a program called Marina, adatabase and analysis tool set for interceptedinternetmetadata. The database stores metadata up to a year. The Marina metadata application tracks a users browser experience, gathers contact information/content and develops summaries of the target. It also has the capability to look back on the last 365 days worth of metadata seen bythe collection system,whether or not the target was tasked for collection. The stored metadata is mainly used forpattern-of-life analysis.

Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation (SWS). This program is developing a parallel to Planet Earth, with billions of individual nodes (prisons) to reflect every man, woman, and child.

SWS will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. It provides an environment for testing psychological operations so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners, including U.S. citizens. SWS also mimics financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.

These four programs XKeyscore, Marina, RIOT, and Sentient World Simulation create some of the environments which intend to imprison and control those who willingly enter into the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even neutrals are the target of these systems.

No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet. Just look how President Donald Trump uses Twitter as a weapon against the corporate media. There is a battle for information and every person is in the middle of the battle whether they like it or not.

The largest domestic military exercises in US history happened in 2015. They were entitled: Jade Helm 2015 Master the Human Domain. Just the very name of the exercise should show you where the U.S. military is focusing its time and energy on U.S. citizens. It also clearly tells us the intent of the U.S. military is to Master the Human Domain. So much for America freedom and liberty.

The Defense Advanced Research Projects Agency (DARPA) has controlled technological innovation since 1958 when it was created by the military-driven Department of Defense. DARPA is the father of war-fighting, both conventional and digital. DARPA was controlled by a man they called Yoda, who leads a group called the Highlands Forum that directs all military research and development the weaponization of every U.S. patent, over 4,000 of which have been stolen.

DARPAs history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum, have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing.

The U. S. military wants our enemies to have the technology so that it can spy upon them and keep up with them in weaponry. If both sides have the same technology and weapons, then more money needs to be spent on bigger and better weapons continually and the military industrial complex thrives and gets richer.

Their business plan is simple: Make sure the customer has a need for military products and services by supplying their enemies with competing products and services, a business cycle that never stops and guarantees that the military industrial complex will always be selling something to someone.

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. The inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the Highlands Forum, this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the unregulated and unconstitutional private military-industry network around the Highlands Forum has become increasingly successful in dominating U.S. defense policy.

Basically, the CIA needed to launder all of its stolen gold and set up many companies to wash its illegal money. Why do you think they call the CIA The Company?

In-Q-Tel also uses a company called SAIC, the U.S. defense firm Science Applications International Corporation, which changed its name to Leidos in 2013, now operating SAIC as a subsidiary. SAIC/Leidos is among the top 100 largest defense contractors in the U..S, and works closely with the U.S. intelligence community, especially the NSA. The agency is the companys largest single customer and SAIC is the NSAs largest contractor.

Since 1973, Andrew Marshall has headed up one of the Pentagons most powerful agencies, the Office of Net Assessment (ONA), the U.S. defense secretarys internal think tank which conducts highly classified research on future planning for defense policy across the U.S. military and intelligence community. Out of Marshalls work in the ONA came an independent group called the Highlands Forum.

Marshall, now 93 years old, is the DoDs most elusive but one of its most influential officials. He created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation-only, not open to the public, and no written records are kept, except for the snippets that participants reveal in their braggadocio and biographies, which are considerable.

Marshall created this type of secret platform so that no one could prove the Highland Forum exists or that it has the greatest power over high-tech warfare on the planet. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz, who are widely considered the hawks of the neoconservative movement in American politics,were among Marshalls star protgs.

The Highlands Forums influence on U.S. defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense; its direct link to Marshalls ONA; and its direct link to DARPA/In-Q-Tel and the Highlands Forum.

The Highlands Forum has served as a two-way influence bridge: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector.

There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.

Around 1994, the Highlands Group was chaired by Richard ONeill as an official Pentagon project at the appointment of Bill Clintons then defense secretary William Perry. In ONeills own words, the group would function as the Pentagons ideas lab.

Total participants in the DoDs Highlands Forum number over a thousand; although meetings and sessions largely consist of small closed workshop style gatherings of maximum 2530 people, bringing together experts and officials depending on the subject.

The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA to the ONA, and is deeply plugged into the Pentagons policy research task forces. In 2001, under the Total Information Awareness Program, President Bush secretly authorized the NSAs domestic surveillance of Americans without court-approved warrants.

From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSAs secret eavesdropping systems.

This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a vulnerable weapons system, Donald Rumsfelds IO roadmap had advocated that Pentagon strategy should be based on the premise that the Department of Defense will fight the net as it would an enemy weapons system. The U.S. should seek maximum control of the full spectrum of globally emerging communications systems, sensors, and weapons systems, advocated the document.

As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPAs jurisdiction to the NSA.

ONeill said his job as Forum chairman was to scope case studies from real companies across the private sector, such as eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiorityhow to dominate the information marketand leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the Department of Defense.

Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the front for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoor keys so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers the military.

The Highland Forum directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a bugged microprocessor inside. Intel microprocessors are found in most of our private digital devices and are, in fact, collecting intelligence for the Department of Defense, CIA, and NSA.

DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel microprocessers, Cisco routers, Google search engines, Facebook social networks, the IBM Internet of Things, cellphones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.

The Highlands Forum has been the headquarters of weaponizing military patents, intellectual property and trade secrets for five decades. Andrew Marshall has the blood of millions on his hands, yet he is considered an America hero instead of a warlord criminal.

Inside every Intel microprocessor is a smaller processor that lets Intel who works for the Department of Defense control every aspect of your computer remotely no matter what encryption codes or firewalls you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.

It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. According to WikiLeaks, there is even secret diskless memory embedded on each chip that spies can use to store and retrieve data and instructions on each chip that is inaccessible to the user and supposedly only used for internal operations and maintenance. Intels latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine(ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.

Even an encrypted hard drive can be monitored and controlled by the processor within the processor that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions there is Intel Inside your computer. Intel collects intelligence but it also provides a back door to control, or turn off your computer at will just like it has been demonstrated that Cisco routers have a back door open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.

Samsung calls the on/off feature Fake Off meaning the TV looks like it is off, but is merely pretending to be off.

I dont have anything to hide

But why shouldnt DARPA, through Intel, have open access to all your files and your computer? DARPA funded all the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare.

Just as the Internet was originally named after its founding group, DARPA, ARPARNET, microprocessors also were military creations that were permitted into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful digital platforms of cyber warfighting.

Most semiconductor chips are made in Singapore, Taiwan, China, or Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.

Since Bill Clinton in 1999,In-Q-Tel funds promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum. The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIAs In-Q-Tel in the development of high-tech network-based cyber-warfare.

The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tank for inventing and controlling innovations that can be turned into weapons.In-Q-Tel is a bottomless source of funding for the CIA provided without any Congressional oversight.

Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of network-centric warfare which is now a top concern of the military and the corporations that serve it.

Since 1999, there efforts have been supplemented by other quasi-secret organizations including The IBM Eclipse Foundation and the National Infrastructure Advisory Council.

Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allowed a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.

The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor put millions of customers and their private information at risk and jeopardized the security of electrical power facilities, public utilities, and transportation systems.

Publicly, Cisco blamed the government for not telling them about this vulnerability, but that was simply the pot calling the kettle black the government was blaming itself for the vulnerability, thus manipulating public opinion with a boldfaced deception.

Cisco has been accused of remotely monitoring users connectionsthrough Ciscos Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.

Cisco has also been accused of building a firewall backdoor developed by NSA into its routers. The Tailored Access Operations(TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before theyre delivered. These Trojan horse systems were described by an NSA manager as being some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.

In fact, hiding in plain sight, Cisco registers the Dual_EC_DRBG NSA encryption back door key with NIST (National Institute of Standards and Technology on all products for export.) This key relies on an inbuilt flaw in the encryption standard which only the NSA knows and can exploit at will to break in to any hardware, software or firmware.

The U.S. intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.

In 1994 two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Googles search service. Brin and Page had performed their work with funding from theDigital Library Initiative(DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA wanted to control and monitor digital information, particularly the data flowing over the internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It has users e-mail addresses and knows where they are physically located, and what they are searching for on the web. Google has a profile on every user.

The government can command that any company, including Google, to turn over that information, and it does so as part of the NSAs Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Googles terms of service, the company advises its users that it may share its personal information with outside organizations, including government agencies, in order to detect, prevent, or otherwise address fraud, security or technical issues and to protect against harm to the rights, property or safety of Google.

Googles terms of service go further, they actually assume control of all user information with clever sleight of legal hand: When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.

The NSA partnered with Google, just one of hundreds of companies who have been brought into the NSAs circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install backdoors or other forms of privileged access.

The NSA helps the companies find weaknesses in their products. But it also pays the companies not to fix some of them. Those weaknesses give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure.

Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain information superiority.

The origins of this strategy trace back to Bill Clinton and the Highlands Forum which has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the U.S. and around the world. The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war.

The U.S. intelligence community is implicated in nurturing todays web platforms for the precise purpose of utilizing the technology as a mechanism to fight the global information war- a war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the U.S. military-industrial complex.

Microsoft shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order.

By 2008, the NSA effectively resurrected the Total Information Awareness project with a focus on Internet data-mining via comprehensive monitoring of e-mails, text messages, and Web browsing. We also now know that the NSAs XKeyscore Digital Network Intelligence exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communicationsessentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSAs XKeyscore.

The rest is here:

Lock Down on Prison Planet Almost Complete American …

Read More...

April 24, 2018  Tags:   Posted in: Prison Planet  Comments Closed |

French imams say they are ready to help counter Muslim …

(JTA) Thirty imams in France signed an open letter calling on their colleagues to help counter Muslim extremism.

The letter, which appeared Tuesday in the daily LeMonde, expressed compassion for all our fellow citizens who have been directly or indirectly affected by terrorism and by the anti-Semitic crimes that have blindly struck our country.

It added that the imams are suffering from the confiscation of our religion by criminals.

The letter was in response to a manifesto published on Sunday in LeParisien, the largest circulation newspaper in France, signed by 300 politicians, intellectuals and artists denouncing the new anti-Semitism in France driven by radical Islamists in the country.

The manifesto also suggested that verses of the Quran calling for the murder and punishment of Jews, Christians and disbelievers be removed on the grounds that they are obsolete.

The imams offered their theological expertise to help guard against radicalized Muslims. They said that Islam has fallen into the hands of an ignorant, disrupted and idle youth. A naive youth, easy prey for ideologues who exploit this dismay.

For more than two decades, subversive readings and practices of Islam have been rampant in the Muslim community, generating a religious anarchy, rife throughout society. A cancerous situation to which some imams unfortunately contributed, often unconsciously, the letter said.

The imams called on the enlightened imams to provide counter-speech that prevents all practices of rupture and all forms of extremism that can directly or indirectly lead to terrorism.

Frances chief rabbi, Haim Korsia, told FranceTV that the letters call for some Quran verses to be removed was inconceivable, The Jerusalem Post reported. Korsia was one of the signatories to the manifesto.

Meanwhile, Dalil Boubakeur, rector of the Grand Mosque of Paris, in a statement said the manifesto subjected French Muslims and French Islam to an unbelievable and unfair trial.

French citizens of the Muslim confession are largely attached to their republican values and werent waiting for this manifesto to denounce and fight decades of antisemitism and Islamophobia in all its forms, he wrote.

Read more:

French imams say they are ready to help counter Muslim …

Read More...

April 24, 2018  Tags:   Posted in: Muslim Extremism  Comments Closed |

Hate Crimes – ICAAD

Under the current Uniform Crime Reporting (UCR) Program led by the Federal Bureau of Investigation (FBI), only 3% percent of all hate crimes are documented through the UCR Program. In 2012, the UCR reported 7,713 victims of hate crimes, whereas, the National Crime Victimization Survey (NCVS) reported on average 259,700 hate crimes a year from 2007-2011. The 34 fold gap in documenting hate crimes reveals systemic flaws that result in the government failing to devote adequate resources: to train police officers in properly identifying bias indicators in crime, and to protect particularly vulnerable communities from hate crimes.

According to NCVS, 65% of all hate crime victimizations are never reported to the police. Many of the reasons stem from mistrust of law enforcement to: investigate their claim thoroughly, prosecute the case as a hate crime, prevent retaliation, and not use their position to deport victims who lack legal immigrant status. Moreover, as there is no federal mandate to ensure recording of hate crimes by local law enforcement jurisdictions, reporting is voluntary. As a result of the combination of voluntary reporting with a failure to adequately train police officers to identify bias indicators in crime, there is little chance that the scope of violence directed at vulnerable communities will be understood. Ultimately, the culture of a police department can be a strong determinant on whether hate crimes documentation is seen by police officers as necessary to protect vulnerable communities or functions to support the agendas of gay and minority groups.

ICAAD has advocated directly before the U.S. government on this issue and filed a number of reports to the UN Human Rights Committee and treaty body review committees on these concerns.

The FBI UCR data masks a widespread problem of reporting hate crimes under the Hate Crimes Statistics Act (HCSA). Under the UCR, the FBI recorded 5,796 bias-motivated incidents which resulted in 7,164 victims in 2012.[1] Out of the 13,022 jurisdictions that participated in the program covering 248,809,710 people, 86.2% of agencies reported zero hate crimes.[2] This does not mean that they failed to report; rather, they affirmatively reported to the FBI that no hate crimes occurred in their jurisdiction.[3] Further, in 43 of those jurisdictions, the population exceeds 100,000 people.[4] Breaking this down, jurisdictions representing the equivalent of almost a third (76,542,952) of the U.S. population, reported zero hate crimes.

How is this possible? The FBI, in fact, has never reported more than 10,000 hate crimes in any given year.[5] In contrast, the Bureau of Justice Statistics (BJS)[6] 2013 Special Report on hate crime victimizations, relying on data from the National Crime Victimization Survey (NCVS), found that from 2007-2011 an average of 259,700 hate crime victimizations occurred each year.[7] In 2003-2009, the NCVS reported 195,000 hate crimes per year.[8] Clearly, the FBIs UCR data accounts for only a marginal number of bias-motivated crimes (3%) in the U.S. The variance between the UCR and NCVS represents a 34-fold gap.

The NCVS has overcome some of the limitations of survey methodology through the use of representative sampling on a national level in a longitudinal or repeated cross-sectional design.[9] Furthermore, scholars have found that because the data is gathered from households

where victimizations happened within the last six months, the NCVS data provides a more direct check on the true amount of crime, [and therefore] it is considered superior to the UCR for this purpose.[10]

A big part of the data gap, as revealed by the NCVS, is that law enforcement was not notified about hate crime victimizations in 65% of the cases documented by NCVS.[11] The fact that two-thirds of victims dont report to the police suggests a larger systemic problem, which we address in the following section. However, even if we take into account that almost two-thirds of victims or bystanders never reported hate crimes to the police, it still leaves us with an average of over 90,000 hate crimes per year that were reported to law enforcement. Thus, the gap in underreporting by local agencies to the FBI is still greater than 10 fold.

[1] FBI Uniform Crime Reporting (UCR), Hate Crime Incident Report, available at: http://www.fbi.gov/about- us/cjis/ucr/reporting-forms/hate-crime-incident-report-pdf.

[2] FBI Uniform Crime Reports, 2012 Hate Crimes Statistics, http://www.fbi.gov/about-us/cjis/ucr/hate-crime/2012

[3] Leadership Conference on Civil Rights, Hate Crimes in America: The Nature and Magnitude of the Problem, http://www.civilrights.org/publications/hatecrimes/natureandmagnitude.html.

[4] See Hate Crime Statistics 2012, Hate Crime by Jurisdiction, at Table 14, available at: http://www.fbi.gov/about-us/cjis/ucr/hate-crime/2012/tables-and-data-declarations/14tabledatadecpdf/table_14_hate_crime_zero_data_submitted_per_quarter_by_ state_and_agency_2012.xls/view

[5] The FBI data on hate crimes is available from 1996 onward. See Federal Bureau of Investigation, U.S. Department of Justice, Uniform Crime Reports: UCR Publications, http://www.fbi.gov/about-us/cjis/ucr/ucr- publications#Hate.

[6] The BJS is a division of the Department of Justice, part of the Executive Branch of government.

[7] Nathan Sandholtz, et al., U.S. Dept. Of Justice, Hate Crime Victimization, 2003-2011, 4 (Mar. 2013), http://www.bjs.gov/content/pub/pdf/hcv0311.pdf. note 18, at 1.

[8] Lynn Langton, et al., U.S. Dept. of Justice, Hate Crime Victimization, 2003-2009, 1 (June 2011), available at: http://www.bjs.gov/content/pub/pdf/hc0309.pdf.

[9] Michael Shively, Study of Literature And Legislation On Hate Crimes In America, Abt Associates, Inc., 3 (March 31, 2005), https://www.ncjrs.gov/pdffiles1/nij/grants/210300.pdf.

[10] Peter P. Lynch, et al., Understanding Crime Statistics: Revisiting the Divergence of NCVS and UCR, Cambridge University Press, 269 (2007).

[11] Id. at 5.

The U.S. federal government should:

[1] American Psychological Association, supra note 17.

See the original post:

Hate Crimes – ICAAD

Read More...

April 23, 2018  Tags:   Posted in: Hate Crimes  Comments Closed |

ReformJudaism.org | Jewish Life in Your Life

The Eternal One spoke to Moses after the death the two sons of Aaron who died when they drew too close to the presence of the Eternal. – Leviticus 16:1

The Eternal One spoke to Moses saying: “Speak to the whole Israelite community and say to them: You shall be holy, for I, the Eternal your God, am holy.” – Leviticus 19:1-2

Go here to see the original:
ReformJudaism.org | Jewish Life in Your Life

Read More...

April 22, 2018  Tags:   Posted in: Judaism  Comments Closed |

"National Month" Observances in April

Pekic/E+/Getty Images

Updated February 19, 2018

Many countries adopt causes or special interest groups to highlight and promote during given calendar months. The U.S. is particularly prolific at creating “national month” events to promote business and other interests. April is one of the few months that doesn’t have a long list of ridiculous observations, although there are a good many national month observances in the spring.Compare this to July, which actually honors Lasagna Awareness Month.

The following events, industries, causes and emotionsyes, emotionsare observed month-long in April unless otherwise indicated. Even cannabis, Florida tomatoes,celery and soft pretzels are honored…all month long.

Lest we forget the participation of other countries, here are a few international honorees, as well as some causes that are observed elsewhere:

Is there a way your business can benefit from promoting itself during “April is” National Month? April offers more than enough causes and interests to choose from. There’s something here for just about any business. It’s just a matter of figuring out how to best to use the observance or event.

See more here:
"National Month" Observances in April

Read More...

April 22, 2018  Tags:   Posted in: Jewish American Heritage Month  Comments Closed |

Four Killed in Gaza, as Weekly Protests Shrink – The New …

JERUSALEM They came in smaller numbers. But the outcome was still deadly, and the victims this time included a 15-year-old boy.

Palestinians protested for a fourth Friday along the security fence dividing Gaza from Israel, some of them burning tires, hurling rocks or flying kites with flaming tails in the hope of setting ablaze the fields of Israeli rural communities on the other side. The Israeli military distributed a photograph of one kite with a scrawled swastika.

The military estimated the number of participants at about 3,000 in five locations along the Gaza border, down from at least 30,000 on March 30, when the protest campaign started.

But by evening the Gaza Health Ministry reported four killed by Israeli sniper fire. One was identified as Muhammad Ayoub, 15. Amateur video taken on the Gaza side of the fence purported to show him shot while running with other youths, apparently empty-handed. Graphic photographs showed the teenager lying on the rocky ground, bleeding from the head, and later on a hospital gurney.

His father, Ibrahim Ayoub, told a local Gaza-based news site: I thank Allah for taking him as a martyr. This is better than the humiliating life and tragedy we live.

The Friday toll brought the total number of fatalities from the start of the campaign to at least 37. Hundreds more protesters have been wounded by Israeli fire.

Israel has drawn international censure for using live fire against the mostly unarmed protesters who did not appear to present any immediately life-threatening danger to the soldiers.

On Friday, Nickolay E. Mladenov, the United Nations special coordinator for the long-stalled Israeli-Palestinian peace process, denounced the shooting of the 15-year-old as outrageous, writing on Twitter: How does the killing of a child in #Gaza today help #peace? It doesnt! It fuels anger and breeds more killing. He called for an investigation into the killing.

Even as the numbers of protesters waned, the international campaign supporting the Palestinians received a boost this week when Natalie Portman, the Oscar-winning actress, backed out of a major award ceremony meant to honor her in Jerusalem. Representatives initially cited her distress over recent events in Israel. On Friday, Ms. Portman issued a statement explaining her absence, saying, I did not want to appear as endorsing Benjamin Netanyahu.

Israels military says it is acting to prevent any mass crossing of the fence and to prevent attacks against Israeli soldiers and nearby communities. The military said it was looking into the reports of the fatalities.

On Friday, the Israeli military said in a statement that people participating in what it described as riots were attempting to approach the security infrastructures, burning tires and trying to fly kites over the border with burning items attached to them. Several crossed into Israel, the statement said, and were extinguished when required.

The military added that it would not allow any harm to security infrastructure that protects Israeli civilians, and will act against the violent rioters and terrorists who threaten either. The troops responded with tear gas and live fire.

As in previous weeks, no injuries were reported on the Israeli side.

The protests began as a grass-roots campaign but were quickly adopted by Hamas, the Islamist militant group that controls Gaza. They are meant to draw international attention to the 11-year blockade imposed by Israel and Egypt on the isolated, impoverished coastal territory. The protests also are meant to punctuate Palestinian demands for the return to lands in what is now Israel.

The organizers of the protests, named the Great Return March, originally said the idea had been for a peaceful, family-style six-week sit-in at tent encampments erected about 700 yards from the fence, with weekly marches building up to a peak on May 15. That is when Palestinians mark the Nakba, or the catastrophe, of the foundation of Israel and the war surrounding its creation in 1948, during which hundreds of thousands of Palestinians fled or were expelled from their homes in what is now Israel. Many of the refugees ended up in Gaza.

Israel says the campaign has been taken over by Hamas, which Israel, like much of the Western world, classifies as a terrorist organization.

In leaflets dropped from the air on Friday the military warned protesters, in Arabic, to stay away from the fence, and told them to ignore instructions from Hamas, which Israel says is exploiting the protesters for its own political interests. While a few confronted the troops, most of the protesters stood by, watching.

One protester, Abdallah Daoud, 16, explained why he was participating. With his face black with soot from the burning tires and slingshot in hand, he said: There is no money, there is nothing. I want to be a martyr because of the siege, a reference to the blockade. I cannot get out of Gaza. There is no income.

In a new tactic, protesters including whole families in the Shejaiya area of eastern Gaza moved tents forward to about 300 yards from the fence, considered the edge of the danger zone.

Some Shejaiya protesters built a cage, like a mock prison cell, containing effigies of two Israeli soldiers whose bodies are being held by Hamas in Gaza, and two Israeli citizens also believed held by Hamas there. The entrance to the Shejaiya protest site included a large poster with pictures and names of those killed during the first three Fridays.

During a visit to the protest area, Ismail Haniya, the political leader of the Hamas organization, said: Be ready and prepared for the human flood on all the borders of Palestine inside and outside the occupied lands on the anniversary of the Nakba.

Islamic Jihad, an extremist group that often rivals Hamas in Gaza, went further, releasing a video on Thursday showing Israeli officers, including a senior general, in its sights as they toured the Israeli side of the fence.

Avigdor Lieberman, Israels hard-line defense minister, visited the Gaza border area on Friday. What we have seen in these four weeks is that every week there are less and less people on the one hand, he said, and on the other hand, there is much more terror activity.

He warned, Whoever makes threats will lose in the end.

Isabel Kershner reported from Jerusalem, and Iyad Abuheweila from Gaza.

Go here to see the original:
Four Killed in Gaza, as Weekly Protests Shrink – The New …

Read More...

April 22, 2018  Tags:   Posted in: Gaza  Comments Closed |

HOLOCAUST DEPROGRAMMING COURSE Free yourself from a …

Below is a long list of facts refuting the Greatest Lie Ever Told: An Introduction to Holocaust Revisionism Care must be taken not to give a platform for deniers… or seek to disprove the deniers’ position through normal historical debate and rational argument. ‘Guidelines for Teaching about the Holocaust’ at the Stockholm …

The rest is here:
HOLOCAUST DEPROGRAMMING COURSE Free yourself from a …

Read More...

April 22, 2018  Tags:   Posted in: Holocaust Revisionism  Comments Closed |


Fair Use Disclaimer

"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances."

Under the 'fair use' rule of copyright law, an author may make limited use of another author's work without asking permission. Fair use is based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism. The fair use privilege is perhaps the most significant limitation on a copyright owner's exclusive rights.

Fair use as described at 17 U.S.C. Section 107:

"Notwithstanding the provisions of section 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phono-records or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.

In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include:

  • (1) the purpose and character of the use, including whether such use is of a commercial nature or is for or nonprofit educational purposes,
  • (2) the nature of the copyrighted work,
  • (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole, and
  • (4) the effect of the use upon the potential market for or value of the copyrighted work."