Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Michael Hastings Dies in Suspicious Car 'Crash'.....
#41
"despite stonewalling from the LAPD."

Echos of the RFK assassination.

Nothing changes.

And unless people begin to think critically and are not so quick to believe the lying media
nothing will change. The murders will continue, unabated.

Dawn
Reply
#42
Perhaps this latest entry to Russ Baker's WhoWhatWhy site might put at least some focus on all this

http://whowhatwhy.com/2013/07/14/the-mic...few-clues/
Reply
#43
Jerry Ellis Wrote:Perhaps this latest entry to Russ Baker's WhoWhatWhy site might put at least some focus on all this

http://whowhatwhy.com/2013/07/14/the-mic...few-clues/

I don't buy that analysis...he says things like 'could the planners have not thought about cross-traffic at intersections', as if having been slammed on the side of the car wouldn't do the same damage as hitting something in front of it...etc. He tried very hard in his article to make it an 'accident'. The level of coincidence is just off the scale for this to have been an 'accident'. The special effects man is quoted as saying they had only one shot and wouldn't leave anything to chance. That's patently false. If they didn't kill him this time, they had all the chances to try again as they wished.

It was, IMO, and from the evidence and basic logic of probability/coincidence, an engineered 'accident' - the specialty of intelligence creeps and special ops groups. Denial is not just a river in Egypt.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#44
Peter

I agree; "we asked" this "hometown" turnip to ask the LAPD and they told him, "Nothing to see here, Kid," then snickered in the wings.

Stranger in a Strange Land sees the burned wreck on a flatbed truck

My father drove us in the '55 Nomad to a point on the grounds where a flatbed rolled through with this blackened cigar which had been Bill Vukovich the Mad Russian's third Indy victory

Leading, he encountered the laggers, went left instead of right, caught a tire-on-tire and spectacularly flipped and rolled and cartwheeled over a barrier to collide with vehicles on the service road, coming to rest upside down, sans rollbar, au flambe

Nobody every accused Vuky of driving like Granma

Hastings died in a friend's "hometown"

He said he'd talked to witnesses and his summation was contrived death

Acceleration and braking can be overridden with professional diagnostics

Are we to believe that an enemy of the Drone Kingdom wasn't hacked and launched off the deck of the McChrystal

Estimates of speed vary from 80 to 130

The intersection was the ramp

When the car landed things happened

Hastings didn't have Vukovich's reflexes, skills, experience

If he chose right instead of left

He performed the Diana denouement

And the snickering in the wings has been officially denied
Reply
#45
Peter Lemkin Wrote:
Jerry Ellis Wrote:Perhaps this latest entry to Russ Baker's WhoWhatWhy site might put at least some focus on all this

http://whowhatwhy.com/2013/07/14/the-mic...few-clues/

I don't buy that analysis...he says things like 'could the planners have not thought about cross-traffic at intersections', as if having been slammed on the side of the car wouldn't do the same damage as hitting something in front of it...etc. He tried very hard in his article to make it an 'accident'. The level of coincidence is just off the scale for this to have been an 'accident'. The special effects man is quoted as saying they had only one shot and wouldn't leave anything to chance. That's patently false. If they didn't kill him this time, they had all the chances to try again as they wished.

It was, IMO, and from the evidence and basic logic of probability/coincidence, an engineered 'accident' - the specialty of intelligence creeps and special ops groups. Denial is not just a river in Egypt.

10-4 Peter. The core of the article is as follows: 'I haven't the foggiest but I thought I would write some words anyway. And I got laughed at by Chief Inspector Clouseau.'
"We'll know our disinformation campaign is complete when everything the American public believes is false." --William J. Casey, D.C.I

"We will lead every revolution against us." --Theodore Herzl
Reply
#46
This has been touched on earlier, but Ralph Fiennes' book about a secret SAS committee known as The Feather Men, published in 1991, contains "an illustration of a block diagram of the modification of the BMW car brake system to incorporate remote radio control" used in an assassination.

The film version Killer Elite, staring Robert DeNiro and Jason Statham, includes a scene where the technology is used.

Published in 1991 but talking about operations which had already taken place.

Hastings had his, ahem, road traffic accident in 2013.......
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#47

MICHAEL HASTINGS' ASHES SENT HOME FOR BURIAL


[Image: 1373820357-still.jpg]



By Kimberly Dvorak
Created: Sun, 14 Jul 2013 11:41:00 PST
Updated: Mon, 15 Jul 2013 12:17:15 PST

Details uncovered by this reporter shed new light into the June 18 death of journalist Michael Hastings.
Hastings' friend and confidant SSgt. Joe Biggs disclosed a macabre twist in the award-winning journalist's death in a suspicious single-car accident. According to SSgt. Biggs, "Michael Hastings' body was returned to Vermont in an urn." He further alleged, "Family members did not want Michael's body cremated."
This revelation provides another wrinkle in the Los Angeles Police Department's (LAPD) handling of a case they labeled "no foul play" only hours after the writer's death.

Nevertheless LA County assistant corner, Ed Winter, said it took two days to identify the burned-beyond recognition body of Hastings. Officials also confirmed that an autopsy has been performed, but the cause of death is still pending. Unfortunately the family will have to wait for cause of death answers as LAPD media spokesperson Lieutenant Andrew Neiman indicated, "It will take several weeks to get the toxicology results."

SSgt. Biggs also emphatically stated that liquor was not a factor in the accident, as Hastings hadn't consumed alcoholic beverages in five years.

So why is the LAPD delaying the reports?

It was SSgt. Biggs who released the following chilling email to members of the media; "Subject: FBI Investigation, re: NSA -Hey (redacted names) the Feds are interviewing my "close friends and associates." Perhaps if the authorities arrive "BuzzFeed GQ," er HQ, may be wise to immediately request legal counsel before any conversations or interviews about our news gathering practices or related journalism issues. Also: I'm onto a big story, and need to go off the rada[r] for a bit. All the best, and hope to see you all soon. Michael"

The receipt of this email from Hastings tipped the scales for SSgt. Biggs. "This wasn't an accident and I will continue to investigate his death."
As an investigative journalist, Hastings saw his fair share of threats. One particular passage in Hastings book, "The Operators: The Wild and Terrifying Inside Story of America's War in Afghanistan," revealed that a former McChrystal staff member made a death threat. "We'll hunt you down and kill you if we don't like what you write," the unnamed staffer said. Hastings coolly retorted: "Well, I get death threats like that about once a year, so no worries."
Despite the LAPD's categorization of the Hasting fatal accident as a "no (evidence of) foul play," LAPD continues to ignore FOIA (CPRA in Calif.) requests made by San Diego 6 News for the police report, 9/11 call, autopsy, bomb squad and toxicology reports, or make the Mercedes available for inspection which only fuels conjecture.
Link to previous story: http://www.sandiego6.com/story/details-of-reporter-hastings-death-remain-elusive-20130708 - storyComments
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#48

Endgame: the link between Barratt Brown & Michael Hastings and why they were targeted

Posted on July 17, 2013 by admin
[Image: wpid-images1.jpg][Image: hastings-Copy.jpg]
Barrett Brown is a journalist who has been arrested and is in jail on remand, facing charges that could result in life imprisonment for merely carrying out his investigative work. Michael Hastings was an investigative journalist who wrote for Rolling Stone but who died tragically in a car crash, which occurred under mysterious circumstances. What links them, apart from investigative journalism? Answer: both were working on the same story, but from different angles. And the story? The surveillance programs managed by a company called Endgame. The article below is by Jill Simpson and Jim March and was first published on June 24th by http://freepress.org but we have decided it's of such major significance it needs wider publicity so are republishing it. We've also added some contextual information on other investigations Brown and Hastings were conducting, as well as links to articles by and on Brown and links to videos investigating the car crash that killed Hastings. The adjacent images are of Barrett and Michael.
A. Introduction
1. Barrett Brown
Barrett Brown is charged with basically helping to disseminate information from Stratfor a private company engaged in intelligence gathering for the business community, which researcher Jeremy Hammond is accused of hacking. (Here are the main charges against Brown.) Here are the files hacked by anons and which Barrett Brown is accused of analysing. The following is a summary of the investigative projects Brown was investigating…
1. Echelon 2. The PRISM system exposed by Edward Snowden is part of the Echelonnetwork (as exposed by Duncan Campbell in an article in the New Statesman) or, more correctly, Echelon 2 (the latter is being researched by Project Blue Cabinet and was previously researched by Project PM ).
2. Endgame. Another investigation Project PM was involved with in conjunction with Project Blue Cabinet was regarding Endgame , a company that specialises in hacking on behalf of NSA. Endgame also offers its intelligence clients e.g. Cyber Command, NSA, CIA and MI6, etc a unique map, called Bonesaw, showing exactly where targets are located. Both Bonesaw and Endgame were exposed in a recent article as part of the fallout from the Snowden revelations. Further details on Endgame (and Bonesaw) are in the main article below.
3. Persona Management. In a 17 March 2011 article in the Guardian it was revealed that a Persona Management program had been set up to organise sock puppets, or fake identities, on the Internet via Twitter and Facebook etc, to glean information as well as provide disinformation. "Centcom [Central Command, part of NSA] confirmed that the $2.76m contract was awarded to Ntrepid, a newly formed corporation registered in Los Angeles. It would not disclose whether the multiple persona project is already in operation or discuss any related contracts." At the time Project PM was also investigating persona development/management as well as helping to expose the wider activities of Ntrepid.
4. Other investigations. TrapWire is a surveillance system that was first revealed by Wikileaks some nine months back and since then there have been numerous articles published about it (see links to some of these by Darker Net at the end of this article). According to Richard Hollis Helms, the founder of Trapwire, "It can collect information about people and vehicles that is more accurate than facial recognition, draw patterns and do threat assessments of areas that may be under observation… The application can do things like "type" individuals so if people say "medium build," you know exactly what that means from that observer." Through the systematic reporting of suspicious events and the correlation of those events… operations can be identified, appropriate countermeasures employed and steps taken to apprehend the perpetrators. Brown had been researchingTrapWire and it's links to Cubic Corporation and spin-offs such as Abraxas andAnonymizer (proxy email system to entrap activists). Note: Brown learned about Cubic by visiting Telecomix IRC Blue Cabinet chan
See also, two recent articles on Barrett Brown: here and here . Here is a recent article by Barrett Brown on the aftermath of the Snowden revelations.
2. Michael Hastings
Michael Hastings died in a car crash under mysterious circumstances. Hastings was a target by the US establishment if only because he helped destroy the career of General McChrystal. This article summarises some of the many investigations Hastings was involved with. He was also, reportedly, working on a major story about the CIA. A number of video are available that examine the crash: see here and here . This article provides a good overview on the circumstances. There there was the Endgame story…
B. The Other Side Of The Snowden/Hastings/Barrett Brown Cases
NOTE from authors: all data in this report is from publicly available sources as of Monday June 24th 2013 and will be footnoted as to origins wherever possible. It will not be possible to label us as "hackers" based on this report or anything else.
The final moves in a chess game are called the "endgame". It has come to the attention of American whistleblowers and election integrity specialists that the CIA, NSA and White House have designed the ultimate final "endgame" for the free world as we know it with a group of computer "security specialists".
One key component of this is a corporate office called Endgame1 based in Atlanta Georgia (at the old Biltmore Hotel building, 817 W. Peachtree NW suite 770).2 This company is a private spin-off from the major intelligence source X-Force that was founded originally by Chris Klaus whose career dates to at least 1994 when he founded Internet Security Systems, a private "white hat" counter-hacker group.3
The X-Force was a team of elite cyber-security specialists who operated within ISS in an Atlanta office and made daily reports to the intelligence community and White House about Internet security and malicious software threats. They were allegedly defensive in nature, at least when they started out, and protective of US security. One of their members was Christopher Rouland who was a famous hacker who got caught attacking the Pentagon's systems by US Airforce cyber-cop Jim Christy who gave him a "break" so long as he would work from then forward as a "white hat" cybersleuth for the US government.4
"White hat" in this context means defensive Internet security fighting the "black hat" attackers. We write this in part to show that Rouland and his company Endgame have in fact gone back to "black hat" with the approval of the Federal government, doing (and facilitating for others) the sorts of attacks that the Pentagon, the NSA and the like don't want their fingers found in.
For a quick look at just how paranoid Endgame seems to be, this video taken from a micro-camera mounted on glasses showed what happened when we went to take a look:http://www.youtube.com/watch?v=Vr5LIgZvx_8
Rouland took over the X-Force and ISS operations from Klaus for a period of time until ISS and X-Force were bought out as a package by IBM.5 Rouland either decided not to continue with IBM or his criminal record excluded him; for whatever reason he switched a few years ago and co-founded a new private corporation called "Endgame" with the generous funding of Chris Darby who is the CEO of In-Q-Tel, an independent strategy investment firm that supports the missions of the Central Intelligence Agency and the broader intelligence community.6 Darby still sits on Endgame's board of directors.7
One key member of the board of directors at Endgame is retired Lt. General Kenneth A. Minihan8 whose claim to fame is that he was the 14th director of the National Security Agency/Central Security Service. He is a former director of the Defense Intelligence Agency and a founder of the National Information Assurance Program which is a United States government initiative to meet the security testing needs for information technology for both consumers and producers that is operated by the NSA and was originally a joint effort between the NSA and NIST (National Institute of Standards and Technology). The goal of the National Information Assurance Program (NIAP) was to ensure that consumer and business software products comply with the "Common Criteria Evaluation Standard". In 1994 the Federal government had already passed "CALEA" ("Communications Assistance to Law Enforcement Act") which mandated back-door intelligence
access to consumer and business internet systems and products.9 This back-door access could then be "double checked" by the updates that Minihan oversaw under NIAP and/or the "Common Criteria" and we strongly suspect they are privately used by Endgame and created by Klaus' boys under X-Force.
In a 2003 interview Chris Klaus started by saying that attacks against Linux would be an increasing area of concern before devoting the rest of the interview to threats against Microsoft Windows. Microsoft had by that time been deep enough "in bed" with the NSA to put back doors into the Microsoft Windows NT operating system, the ancestor of all subsequent versions including those in use now.10 Klaus was, by 2003, attempting to steer people away from Linux knowing it would be harder to plant "software taps" into Linux due to the open-source nature of the code basically geeks can peer under the hood of Linux and might detect data taps.11 Microsoft keeps the innards of Windows secret via trade secret and copyright laws and hence taps can go undetected longer which has allowed Endgame, ISS and X-Force to write reports and software tools to exploit foreign governments around the world. This interview in 2003 is therefore indicative of where Klaus' head was at he was already a partner with the NSA, involved in the X-Force and reporting to the White House daily and wanted to make sure US/NSA access to foreign and domestic online systems remained available by panning Linux in 2003 when it was in it's infancy but clearly an upand-coming "threat" to the intelligence communities around the world.12
Klaus had dreamed this up while serving on the National Common Criteria task force. This set of software back doors allowed him and his ISS to continue their leadership roles in President George W. Bush's National Infrastructure Advisory Council and the FBI's "Infraguard" program along with their cyberprotection and information warfare contracts with the Department of Defense and the US Department of Justice. Klaus was selected for this job as co-chair of the NCC by the Business Software Alliance (a trade group with Microsoft as the largest and leading "partner"), the Information Technology Association of America, the US Chamber of Commerce, TechNet and Tom Ridge, then-Secretary of the Department of Homeland Security. As co-chair of the Technical Standards and Common Criteria task force in 2003 it was Klaus' job to bring together experts from government, the private sector and academia to provide a national strategy to "secure cyberspace" for President George W. Bush so that the Department of Homeland Security could implement a plan to protect the United States from domestic and foreign threats, online or otherwise.13
Klaus testified in 2003 before the House Government Reform, Subcommittee on Technology, Intergovernment Relations and the Census committee about his industry experience as being the first commercial vulnerability assessment inventor and the first inventor of intrusion detection products, and how it would be cost-effective to develop a "criteria and certification" process for software products to help defend against threats.14 This federal control thereby allowing the insertion of back doors into that software at the same time via federal control over certification so that the US could spy on every foreign and domestic person, government or organization in the world.
This is also where Klaus and his X-Force boys including Mr. Rouland made their funding connections with the Intelligence community including the director of the DIA, Gen. Minihan, and why In-Q-Tel chose these folks to run a private version of all this in Endgame.
It might be added that Mr. Rouland was the designer of the www.senate.gov website and infrastructure which would have potentially allowed him to plant taps.15 Let us be clear: the senate.gov site is more than a website, it is a communication infrastructure for the Senators and their staffers and taps into that by somebody we know for a fact started out as a criminal should be of serious concern to all. We know that another contractor by the name of Mike Connell did work on the equivalent House side (doing portions for various committees and individual Republican house member websites)16 and Connell died in a plane crash shortly after being called to testify in an Ohio electronic voting case.17 So there's a pattern of sketchy people doing things to the most important computers in the nation.
The "services" offered by Endgame include offensive and defensive vulnerability research including software called Bonesaw supporting the detection and mitigation of cyber threats. This basically means that they cover both offensive and defensive aspects of computer security. What they can do is show what computers exist at specific locations and show the user of "Bonesaw" what software vulnerabilities are on those computers, making attacks easy against citizen, business or government systems across the planet.18 Bonesaw has information in it about both threats and targets and can connect the two, for the low, low price of $2.5million per customer per 25 exploits according to Emails found by Anonymous in 2011.19 What an "exploit" allows is either reading from or alteration of an online system, which could even possibly blow up a power plant or other critical physical infrastructure.
"Zero day" exploits (meaning "security holes" or "flaws in a given system" are particularly dangerous because they haven't yet been reported to (or discovery by) anybody who has the job of patching them. So the people who can defend against the attack have "zero days" in which to do something about it. Ethical "white hat" hacking behavior on encountering any such flaw is to report it to whoever needs to fix it say, Cisco for a flaw in their large routers. If Cisco doesn't respond or doesn't do anything significant about the issue, a public release is warranted because that is the action most likely to make Cisco (in this example) managers wake up and do something at which point it is no longer a "zero day" exploit. Anybody who continues to hide and either exploits or facilitates the usage of a zero day exploit cannot portray themselves as "one of the good guys" period, end of discussion.20
In this context Endgame long ago "went over to the dark side" of the computer security world.
This was first brought to light by Barrett Brown, the journalist and alleged leader of Anonymous who is currently being prosecuted by the US government for "hacking". It is contended in recent reports that he was arrested shortly after looking into the Endgame operation in Atlanta and exposing what Bonesaw is and can do.21
The organization "Free Barrett Brown" consisting of Brown's supporters wrote a condolence message on the recent death of intelligence reporter Michael Hastings that also confirms that Hastings was working on the Brown case, including Brown's initial (aborted by arrest) reporting on Endgame.22 Hastings, prior to his untimely death, posted on his Twitter account to his friend Ron Brynaert that he was going to be working on Barrett Brown's story and to "get ready for your mind to be blown".23
However, before going underground Michael Hastings' car exploded and his engine was blown sixty feet in a fiery crash in Los Angeles. Many journalists on the left in the US have assumed foul play in the Hastings crash and recently an Email was released by one of Hastings' friends in the military that suggests Hastings was onto a major case and about to go underground after learning he was being investigated and under surveillance by people he assumed were FBI.
Clearly the FBI worked with the creators of Bonesaw and their supporters in the intelligence infrastructure who had no desire to see any of this come to light. In fact, when HBGary was researching people on the left who were writing about misconduct at the US Chamber of Commerce, Christopher Rouland ordered an Endgame employee to write an Email to HBGary that stated "please let HBGary know we don't want to see our name in an Email" as was recently reported by Nation magazine in an article about Barrett Brown. Brown, according to Nation magazine, published as a reporter the Email from the Stratfor data dump that Anonymous made available. Brown and his "Project PM" which Michael Hastings was also a part of became fascinated with Endgame.
It appears Endgame desired to remain under the radar as was exhibited by an exchange between HBGary's Aaron Barr and Brian Masterson at Xteron brought to light by Barrett Brown's reporting where he reproduced these Email exchanges:
Aaron Barr to Brian Masterson of Xetron: "But they are awfully cagey about their data. They keep telling me that if their name gets out in the press they are done. Why?"
CEO Chris Rouland to employee John Farrell: "Please let HBgary know we don't ever want to see our name in a press release."
John Farrell to Aaron Barr: "Chris wanted me to pass this along. We've been very careful NOT to have public face on our company. Please ensure Palantir and your other partners understand we're purposefully trying to maintain a very low profile. Chris is very cautious based on feedback we've received from our government clients. If you want to reconsider working with us based on this, we fully understand."
Aaron Barr to John Farrell: "I will make sure your [sic] a silent' partner and will ensure we are careful about such sensitivities going forward."http://wiki.echelon2.org/wiki/Endgame_Systems
Clearly this reporting by Brown showed Endgame to be particularly secretive even by the standards of private intelligence community corporations. This set of exchanges by Email show that Endgame was working with HBGary's Aaron Barr who became famous for attempting to "out" Anonymous, who then in turn dumped and spread data from HBGary, Stratfor and others, but did not successfully raid Endgame, to show that HBGary and the like were investigating individuals who were trying to show that the US Chamber of Commerce was working with foreign countries, corporations and promoting them through foreign "American Chamber of Commerce" (AmCham) branches over actual American businesses. This is not surprising considering that Chris Klaus served on a board with the US Chamber of Commerce, and Barrett Brown attempted to expose the whole rotten mess which has come to be known as "Team Themis" made up of HBGary, Palantir and Berico, with Endgame providing "unusually accurate report on WikiLeaks and Anonymous".24
What is at stake here is that the United States government has outsourced the most evil elements of national security: the ability to hack into computer systems across the world, foreign and domestic, private or government owned. The organizations they outsourced this to then set about monetizing the process, selling it to the highest bidder. This process could also allow corporations and the financial and political elites to create acts of war that appear to have come from the US Government due to the severely interconnected nature of the intelligence community, split between private companies and actual government agencies with alleged oversight of sorts. Edward Snowden's access to NSA data while an employee of a private company for only four months (Booz Allen Hamilton, owned in large part by the Carlyle group which has long ties to the Bush family) illustrates the extent of the problem.
While Snowden was in Hong Kong he stated that the US Government had been attacking foreign systems of governments we are allegedly at peace with. Clearly these systems and exploits have their roots in the NSA and CIA and the private firm Endgame. What is interesting to progressive civil libertarians in the United States is that the "white hats" may have become "black hats" while nobody was watching (or able to watch until now). The question becomes: are Barrett Brown, Julian Assange and Eric Snowden the "white hats" who have been exposing criminal activities of the "black hats" at Endgame and their allies? It is clear that the political chess game is indeed in play and that the Endgame team currently is ahead on points but being exposed.
In conclusion: Who is actually being protected, the citizens or the "security state" or the multi-national corporations? Endgame is admitting to facilitating computer crime against overseas targets at a minimum (and likely domestic) even the foreign attacks violate US law and if you and I did it we would be prosecuted under a number of federal statutes that prohibit, among other things, attacks against "those computers used in or affecting interstate or foreign commerce or communication" including overseas.
The US Department of Justice has a good overview of federal computer crimes and their possible prosecutions at http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pd f by their own marketing materials Endgame, HBGary and the rest of the privatized intelligence services violate enormous sections of it on a daily basis or conspire to facilitate (for profit) violations by others. Reporters, critics and at least some members of congress have called for the investigation and prosecution of HBGary25 and we think it obvious that investigating Endgame is even more vital. Endgame has contracts with various elements of the US federal government's intelligence infrastructure including the US DOJ's "National Security Division Counterespionage Section".26 Among other problems, part of what Endgame does can be described as acts of war (hence their own reference to "WOPR"?), without even the minimal oversight that the NSA and other actual government agents and agencies are subjected to. It is time for President Obama to appoint a special prosecutor to determine if the NSA and CIA have outsourced criminal activities to private "hacker groups" such as Endgame since the DOJ has a clear conflict of interest as an employer of Endgame. It is also time for Congress to investigate whether government contractors such as Endgame who are tied to the intelligence community are selling computer exploits against foreign and domestic targets to the highest bidder.

Jill Simpson is a practicing attorney in rural Northern Alabama and a noted whistleblower in several political/legal scandals including the political prosecution of AL Gov. Don Siegelman. She is also a seminary student and social justice activist with a focus on election reform and the reforms needed to end political prosecutions once and for all at the US Department of Justice. Jim March is a computer technical support/system administration/technical writing professional with a long history of interest and activism in electronic voting issues. He has previously served on the board of the Southern Arizona ACLU and is now living in Northern Alabama. Simpson and March researched the "Orca" Republican election monitoring process, the Scytl election systems relating to military overseas voting and the "OpSec" PR program last year for a coalition of California progressives, traveling across the country to various places where election misdeeds were
occurring. Their research on the problems with the Military Overseas Voting Act ("MOVE") are summarized at:http://electionprotectionaction.org/uplo...rticle.pdf
Notes:
1 http://www.endgamesystems.com
2 http://www.superpages.com/bp/Atlanta-GA/Endgame-Systems-LLC-L2239339339.htm
3 [URL="http://news.google.com/newspapers?nid=1696&dat=19981110&id=UxsbAAAAIBAJ&sjid=FEkEAAAAIBAJ&pg=%204219,1551099"]http://news.google.com/newspapers?nid=1696&dat=19981110&id=UxsbAAAAIBAJ&sjid=FEkEAAAAIBAJ&pg=
4219,1551099 [/URL] this shows that as of 1998 the "X-Force" was an elite division of ISS.
4 http://attrition.org/errata/media/pd.008.html
5 www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html#p4
6 http://www.crunchbase.com/person/chris-darby
7 http://www.endgamesystems.com/about-us/ or if that page disappears we have a PDF printout of it as of June 23rd 2013
archived at: https://docs.google.com/file/d/0B6Fh3F6hufhDRmt1WFdGZnNrcFk/edit?usp=sharing
8 See footnote 7 where he is referenced…
9 The "Communications Assistance to Law Enforcement Act" mandates that "ISPs" (Internet Service Providers) install taps for law enforcement. What most people don't realize is that any website that stores information for you is an "ISP" by the Federal Government's definitions, so that includes Gmail, Google Docs, Youtube, Facebook, Yahoo and many more we don't usually think of as "ISPs". Put another way: the definition of "ISP" has grown significantly since 1994 to include online services not even considered plausible in 1994, such as Facebook.
10 http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backdoor-in-windows-by-1999.html and
http://techrights.org/2013/06/15/nsa-and-microsoft/ this is not a deep secret although Snowden may have succeeded in getting people to pay attention…
11 Linux is "open source". In 1993 a Finnish computer science student by the name of Linus Torvalds wrote the first "kernel" (think "core") of what came to be called "Linus' Unix" or "Linux". He gave it away free so long as anybody doing modifications or extensions of it also gave those aware free including the human readable "source code" showing how it was done. It basically spiraled out of control from there and now has tens of thousands of contributors who all have access to the "how it works" info; Linus still manages the key Kernel component, screening and approving (and occasionally writing) modifications. With that many eyes on the ball, pulling a fast one isn't easy. In comparison, as few as one product manager and one coder can slip something ugly into Windows. For those curious about the details and permutations see generallyhttp://www.gnu.org/licenses and also the "Creative Commons" movement: http://creativecommons.org
12 http://www.technewsworld.com/story/32288.html note the opening paragraph in particular regarding Linux.
13 http://www.technewsworld.com/story/32288.html
14[URL="http://www.thefreelibrary.com/Internet+Security+Systems%27+Founder+and+Chief+Technology+Officer,...-%20a0131654799"]http://www.thefreelibrary.com/Internet+Security+Systems%27+Founder+and+Chief+Technology+Officer,…-
a0131654799 [/URL]
15 http://www.zoominfo.com/p/Chris-Rouland/6976439
16 http://www.sourcewatch.org/index.php/Mike_Connell third paragraph
17http://rawstory.com/news/2008/Republican..._0929.html
18 http://www.defensenews.com/article/20130115/C4ISR01/301150007/Nathaniel-Fick-Former-CNAS-Chief-Heads-Cyber-Targeting-Firm
19[URL="http://www.slate.com/articles/technology/future_tense/2013/01/zero_day_exploits_should_the_hacker_gray_market%20_be_regulated.html%20and%20www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html#p4"]http://www.slate.com/articles/technology/future_tense/2013/01/zero_day_exploits_should_the_hacker_gray_market
_be_regulated.html and http://www.businessweek.com/magazine/cyb...11.html#p4 [/URL]
20 http://www.zerodayinitiative.com/about/ this is a good overview of the process for "ethical hacking" and the reporting of major exploits including zero day security holes. However, while they claim that for-profit use of zero-day exploits is limited to "a very small minority" of security researchers, the kind of cash Endgame and their competitors can throw at the people who can find exploits has possibly affected the percentage who have "turned black hat".
21 http://www.thenation.com/article/174851/strange-case-barrett-brown#axzz2XBSWGd2B
22 http://freebarrettbrown.org/michael-hastings-death-barrett-brown/ this message references Hastings' work on "Project PM" which included Endgame: http://wiki.echelon2.org/wiki/Endgame_Systems
23 https://twitter.com/mmhastings/status/294534049094053888 in context, this was about "minds blowing" over Hastings' review of the Barrett Brown situation and Project PM, of which Endgame was a major part:
http://wiki.echelon2.org/wiki/Main_Page note highlighting of Endgame entry towards the bottom of the screen.
24 http://wiki.echelon2.org/wiki/Endgame_Systems
25 http://www.forbes.com/sites/parmyolson/2011/03/17/congress-opens-investigation-into-hbgary-scandal
26 http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf Note page 12 (PDF page 18) for the reference to this DOJ unit. There's even a phone number for them (202-514-1187) and a description there of how prosecutions of certain classes of computer crime must be "pre-cleared" by that division is that to ensure that the crimes in question are not committed by a sanctioned agency, person or company? Additionally, many activists are now questioning whether the DOJ refused to prosecute HBGary and the other "Team Themis" companies for crimes they committed because their partner Endgame worked with HBGary to target Glenn Greenwald, members of Anonymous and various other activists.
http://darkernet.in/endgame-the-link-bet...-targeted/
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#49
From INSLAW to PROMIS to ESCHELON to PRISM to ENDGAME....and so many others I haven't named or are [as yet] unknown. Soon, they'll know every time on goes to the toilet and even what we are thinking......:darthvader::thumbsdown: Technology is dangerous in the hands of out-and-out fascists intent on destroying everyone's basic liberties and freedoms.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#50
If one leaves out the naive special pleading about the US government, this is the military-multinational-intelligence complex writ large:


Quote:The United States government has outsourced the most evil elements of national security: the ability to hack into computer systems across the world, foreign and domestic, private or government owned. The organizations they outsourced this to then set about monetizing the process, selling it to the highest bidder. This process could also allow corporations and the financial and political elites to create acts of war that appear to have come from the US Government due to the severely interconnected nature of the intelligence community, split between private companies and actual government agencies with alleged oversight of sorts. Edward Snowden's access to NSA data while an employee of a private company for only four months (Booz Allen Hamilton, owned in large part by the Carlyle group which has long ties to the Bush family) illustrates the extent of the problem.
While Snowden was in Hong Kong he stated that the US Government had been attacking foreign systems of governments we are allegedly at peace with. Clearly these systems and exploits have their roots in the NSA and CIA and the private firm Endgame.
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Robert Vaughn, friend of RFK, critic of official story, dies Tracy Riddle 4 14,404 15-11-2016, 06:46 PM
Last Post: Dawn Meredith
  Rockefeller heir dies in single engine plane crash Drew Phipps 4 5,942 14-06-2014, 11:58 PM
Last Post: Drew Phipps
  Deputy of Russian GRU dies in Syria, washes up in Turkey Carsten Wiethoff 13 11,512 29-06-2013, 06:07 AM
Last Post: Magda Hassan
  Another plane crash: a favorite method Dawn Meredith 20 18,042 31-12-2008, 02:40 PM
Last Post: Dawn Meredith

Forum Jump:


Users browsing this thread: 1 Guest(s)