Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Discuss political news items / current events.
msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

DOJ Claims Apple Should Be Forced To Decrypt iPhones Because ...
Techdirt- Oct 26 2015
The filing cites three other cases in which the FBI used an All Writs order to compel the unlocking of an iPhone. Pointing to these, the DOJ argues that pas


https://www.techdirt.com/articles/20151 ... stem.shtml" onclick="window.open(this.href);return false;

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://www.theguardian.com/technology/2 ... eed-claims" onclick="window.open(this.href);return false;

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://cyberlaw.stanford.edu/" onclick="window.open(this.href);return false;

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

Teen who hacked CIA head going after FBI official



http://thehill.com/policy/cybersecurity ... i-official" onclick="window.open(this.href);return false;


11/05/15 10:15 AM EST

The teenaged hackers who exposed the personal email account of CIA head John Brennan are hacking into more government officials’ accounts in retaliation for the FBI investigation into their actions.

The group, which calls itself Crackas With Attitude, told Vice Motherboard Wednesday that they have hacked into FBI Deputy Director Mark Giuliano’s personal account.

A member known as Cracka told the publication that they had also obtained Giuliano’s phone number and called him.

“I called it and asked for Mark and he's like ‘I don't know you but you better watch your back’ and then he hung up and I kept calling and he was getting mad then he didn't pick up,” Cracka told Motherboard via online chat.

The FBI has not confirmed the group’s claims.

WikiLeaks last month posted a handful of documents stolen from Brennan’s personal email account by an apparent teenage hacker. According to reports, the hacker posed as an employee of Verizon and got access to Brennan's account from the telecom company.

The hackers told Motherboard Wednesday that they gained access to Giuliano’s account by breaking into a Comcast email account belonging to his wife and exploiting the information they found there.

Brennan’s documents are largely draft forms of agency memos and other notes. Nothing on the account appears to be classified, but one document does contain personal information about Brennan’s wife and family members, including addresses, birthdays and Social Security numbers.

Brennan lambasted both the hackers themselves and the media for suggesting that he was “doing something inappropriate or wrong or [in] violation of my security responsibilities” by using the personal account.

An unnamed law enforcement official previously told The New York Post that he expected officials to “make an example” out of the group to “deter people from doing this in the future.”

Cracka said the second hack on Guiliano wasn’t intended to acquire any specific information.

“We didn't target him for anything interesting, w

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://whowhatwhy.org/2015/11/05/cult-m ... ensorship/" onclick="window.open(this.href);return false;


Cult Movie Inspires Global Protest Against Internet Censorship
Anonymous to Commemorate Guy Fawkes Day with Hundreds of Events
Members of Anonymous with Guy Fawkes masks. Photo credit: Peter K. Levy / Flickr (CC BY-SA 2.0)
Members of Anonymous with Guy Fawkes masks. Photo credit: Peter K. Levy / Flickr (CC BY-SA 2.0)

Here’s something sure to raise “hackles” in corporate boardrooms everywhere: The hacker collective Anonymous is marching in cities around the world today in the name of a free Internet.

The more than 600 events scheduled coincide with Guy Fawkes Day, an English holiday that animates the plot of the popular anti-tyranny movie V for Vendetta. Guy Fawkes was a notorious rebel who tried to blow up the English Parliament in 1605.
The Free Flow of Information: Unstoppable

“This year you are invited to stand against censorship and tyranny, corruption, war, poverty,” Anonymous said in a video on the Million Mask March website. “Millions will unite around the globe on the 5th of November to make their voices heard and let the various governments of the world know that they’ll never stop the free flow of information.”

Most of the events will be held in the US and Europe. In London protesters will gather outside the Ecuadorian embassy, where Wikileaks founder Julian Assange has found temporary refuge from prosecution. Hacktivists see his prosecution as payback for his making public vast numbers of top-secret files. Another major demonstration is planned for Washington, DC.

Others actions are scheduled for remote areas like Greenland and even, purportedly, scientific stations in Antarctica.

Only a handful of events are planned in countries like Russia and China, which have a history of dealing harshly with protesters.

The Million Mask March website warns marchers to be prepared for government counter-measures.

“Don’t risk your safety. Depending upon your country, if you believe you must go with superhero costumes, flowers, peace signs and pink sunglasses, do it,” the site states. “Go with a buddy. Keep your cameras on, and never surrender your camera.”

“Governments Don’t Work for the Interest of the People”

While advising caution, Anonymous frames the rationale for the Million Mask March in the starkest terms.

“It must be clear by now that governments don’t work for the interest of the people, but for big banks and corporations,” the hacker collective says in the video. “Do you or your children really want to live in a world where the government spies on its own citizens and sees you as a potential terrorist or criminal?”

Anonymous also announced that it would release today the names of KKK members that it gathered from hacked websites and databases. This would be the group’s latest high-profile action.

Anonymous is credited with dozens of “hacktivist” activities — against a wide range of government and private entities that rouse its ire. Previous targets have included the governments of the US and Israel, the Church of Scientology, child pornography sites, major corporations and the rabidly anti-gay Westboro Baptist Church.

The hacker collective sees the Internet as “one of the last truly free vessels that we the citizens have access to” and it has come out against what they view as harmful to that freedom. This includes government initiatives such as the Stop Online Privacy Act, the Cyber Intelligence Sharing and Protection Act, and the Trans-Pacific Partnership.

Readers, tell us what you know about this “action” — and what you think of it. Share your thoughts in our Comments section below.

Related front page panorama photo credit: Guy Fawkes Night bonfire (Shane Global / Flickr – CC BY 2.0 )

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

https://www.eff.org/deeplinks/2015/11/e ... -equipment" onclick="window.open(this.href);return false;


November 6, 2015 | By Nate Cardozo
FBI Returns Seized Devices to EFF Client

EFF is please to announce that our client, Chris Roberts, is now in the possession of all of his digital devices that had been held by the FBI since April 2015.

Earlier this year, Mr. Roberts was detained for tweeting about airplane network security. When he landed in Syracuse, the FBI escorted him off the plane, questioned him for several hours, and seized all of his computer equipment.

We are relieved that, as of this week, the FBI has returned all of that equipment. Like many others in the security community, Roberts’ interest has always been to identify vulnerabilities in networks so that they can be fixed, making us all safer. We would like to thank our co-counsel at Keker & Van Nest LLP for their pro bono assistance on this matter.

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

Tor director: FBI paid Carnegie Mellon $1M to break Tor, hand over IPs
Feds may have obtained Tor IP addresses with no warrant during Silk Road 2 case.

Nov 11, 2015 8:09pm EST


http://arstechnica.com/tech-policy/2015 ... -over-ips/" onclick="window.open(this.href);return false;

Proof of connection: the site check.torproject.org will show you if you're connected via Tor.
Tor

Further Reading
Did feds mount a sustained attack on Tor to decloak crime suspects?

Court doc suggests investigators spent six months last year exploiting anonymity bug.
The head of the Tor Project has accused the FBI of paying Carnegie Mellon computer security researchers at least $1 million to de-anonymize Tor users and reveal their IP addresses as part of a large criminal investigation.

Neither Carnegie Mellon officials nor the FBI immediately responded to Ars' request for comment. If true, it would represent a highly unusual collaboration between computer security researchers and federal authorities.

Ed Desautels, a spokesman for Carnegie Mellon’s Software Engineering Institute, did not deny the accusations directly but told Wired: “I’d like to see the substantiation for their claim,” adding “I’m not aware of any payment.”

One of the IP addresses revealed belongs to Brian Farrell, an alleged Silk Road 2 lieutenant who is due to stand trial in federal court in Seattle later this month. A new filing in Farrell's case, which was first reported Wednesday by Vice Motherboard, says that a "university-based research institute" aided government efforts to unmask Farrell.

Further Reading
Active attack on Tor network tried to decloak users for five months

Attack targeted "Tor hidden services" used to protect IDs of website operators.
As Ars reported in January 2015, a Homeland Security search warrant affidavit states that from January to July 2014, a “source of information” provided law enforcement “with particular IP addresses” that had accessed the vendor side of Silk Road 2.

By July, the Tor Project managed to discover and shut down this sustained attack. The Tor Project further concluded that the attack resembled a technique described by a team of Carnegie Mellon University researchers who a few weeks earlier had canceled a security conference presentation on a low-cost way to deanonymize Tor users. The Tor officials went on to warn that an intelligence agency from a global adversary also might have been able to capitalize on the vulnerability.

In a blog post published Wednesday, Tor Project Director Roger Dingledine said there is "no indication yet that [federal authorties] had a warrant or any institutional oversight by Carnegie Mellon's Institutional Review Board."

Dingledine did not immediately respond to Ars' request for proof of this $1 million payment allegation.

He continued:

We think it's unlikely they could have gotten a valid warrant for CMU's attack as conducted, since it was not narrowly tailored to target criminals or criminal activity, but instead appears to have indiscriminately targeted many users at once.

Such action is a violation of our trust and basic guidelines for ethical research. We strongly support independent research on our software and network, but this attack crosses the crucial line between research and endangering innocent users.

This attack also sets a troubling precedent: Civil liberties are under attack if law enforcement believes it can circumvent the rules of evidence by outsourcing police work to universities. If academia uses "research" as a stalking horse for privacy invasion, the entire enterprise of security

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://motherboard.vice.com/read/hacker ... -down-isis" onclick="window.open(this.href);return false;

Hacker Outs Himself as FBI ‘Snitch’ and Claims He Helped Track Down ISIS




November 23, 2015 // 03:47 PM EST



A hacker who in the past gained notoriety for hacking the Anonymous pseudo-official Twitter accounts, now claims he served as an FBI informant and helped the US government track down the hacker turned ISIS fighter Junaid Hussain.

“5hm00p,” a well-known troll, hacker, and member of the trolling and hacking collective Rustle League, identified himself over the weekend as an FBI “snitch,” as he put it.

“What the @#$%! have I done,” he tweeted cryptically early Sunday morning. Then, more than 15 hours later, he began tweeting at the FBI Twitter account, with some tweets clearly written in anguish.

“I lost a lot of good friendships and my @#$!%&! honor,” 5hm00p tweeted at the FBI, according to an archived copy of his now deleted tweets. “I'm so embarrassed to show my face in public now because of this.”

He said that he helped kill a hacker named Junaid “TriCk” Hussain, who left the UK and joined ISIS in 2013. 5hm00p claimed to be traumatized by the experience.

“I @#$!%&! helped you MURDER him. Do you know how I feel now when I sleep at night?”

“I @#$!%&! helped you MURDER him. Do you know how I feel now when I sleep at night?” he tweeted. “Regardless that he was a terrorist and an animal I sure as @#$%! felt betrayed.”

Hussain was killed in Syria with a drone strike on August 24th, along with two of his body guards. Hussain was the leader of the Islamic State Hacking Division, a hacking crew with ties to ISIS. Before he was radicalized and travelled to Syria, Hussain was a member of a notorious hacktivist group called Team Poison (or TeaMp0isoN), which is how he came into 5hm00p’s orbit.

In his tweets, 5hm00p recalled being coerced to help the FBI once the agency threatened the livelihood of his family. The FBI had him attempt to entrap two of his friends with a wire while partying at the hacker conference Def Con in 2015, he said, with the goal of getting information on Hussain’s whereabouts.

An FBI spokesperson declined to comment. But a source with knowledge of the facts told Motherboard that 5hm00p did indeed help the US government locate Hussain.

Jaime Cochran, a security analyst and former member of Rustle League, told Motherboard that 5hm00p reached out to her after his Twitter confession to apologize, and shared with her some more information on

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

Encryption vs. Surveillance in the New Civil Rights Movement
Saturday, 12 December 2015 00:00 By Abi Hassen, Truthout | News Analysis

http://www.truth-out.org/news/item/3397 ... s-movement" onclick="window.open(this.href);return false;


Encryption vs. Surveillance in the New Civil Rights Movement(Image: Jared Rodriguez / Truthout)

What if in 1960, instead of performing an act of civil disobedience at the Woolworth lunch counter, the Greensboro Four had been arrested for "attempted disorderly conduct" on their way downtown?

Even if the charge were bogus and had no chance in court, its effect on the movement would have been real. Instead of engaging in a high-profile confrontation with the state that highlighted the cruelty of the United States' racist laws, four young Black people would have been arrested on minor charges - hardly a noteworthy occurrence.
Law enforcement officials do not make clear distinctions between activism and terrorism - they even explicitly conflate the two.

Law enforcement and the intelligence complex are paving the way to preempt activism in this way with their current talk of banning strong encryption while perpetuating an ever-growing system of mass data collection and surveillance. Don't be fooled by their calls of "terrorism." Actual terrorists such as al-Qaeda have known about and subverted electronic eavesdropping for decades and will continue to do so. The current efforts at subverting digital security will not stop the Bin Ladens and al-Qaedas of the world. Rather, they will disrupt this generation's Martin Luther King Jrs., Black Panthers and Greensboro Fours.

The US national security apparatus has historically viewed Black activists as a particularly dangerous threat. During the FBI Cointelpro operations of the civil rights era, agents spied on, disrupted and even assassinated leaders of Black Power organizations. Though it's been about 50 years since the "I Have a Dream" speech prompted the FBI to consider Martin Luther King Jr. the nation's "most dangerous Negro," FBI agents are still 80 percent white (less than 5 percent Black), and 80 percent male. The FBI headquarters, the J. Edgar Hoover Building, stands as a virtual monument to the destruction of Black movements - think of it as the anti-MLK memorial. The absurdity of putting Assata Shakur, a 68-year-old grandmother who has no intention of ever returning to the United States, on a Most Wanted Terrorist list, combined with FBI Director James Comey's recent attempts to link protests to a fictitious "rise in crime" do little to reconcile the FBI's anti-Black legacy.

This is the context in which Black activists should view the FBI's and other agencies' attempts to gain access to the public's private data.

It's Not About Terrorism

Law enforcement officials have learned they can justify any expansion of power by crying "terrorism," while the public has learned that governments are not particularly good at preventing terrorism (unless they create it). However, law enforcement is really good at one thing: putting Black people in prison. Anti-encryption laws would continue this dynamic, in which the state continues to be basically ineffective against terrorism but gains more and more power to mass incarcerate.

Following the mass shooting in San Bernadino, California, there has been renewed pressure against encryption, building on the familiar calls from law enforcement to compromise public access to strong encryption in the wake of the Paris attacks. As it turns out, the attackers in Paris were known to law enforcement, discussed their plans in an English-language ISIS magazine and weren't even using strong encryption. However, immediately after the attack, without key facts of the attack, New York City Police Department Commissioner Bill Bratton, along with CIA Director John Brennan, and various other current and former officials, went on a media blitz complaining that governments were "going blind" due to new technology. They didn't propose any technical or legislative solutions to their alleged problem. Their goal was clear: to equate terrorism with encryption. This kind of disingenuous fearmongering only serves to confuse the real issues and to lead people into wrongly believing that law enforcement's war on encryption is actually about terrorism.

Meanwhile, Manhattan District Attorney Cyrus Vance has proposed anti-encryption legislation that would allow police to decrypt devices they already have in their physical possession. Vance himself, in a New York Times op-ed, says the law is meant to " solve and prosecute crimes"; he doesn't even mention prevention. The proposal asks Congress to "enact a statute that requires any designer of an operating system for a smart phone or tablet manufactured, leased, or sold in the U.S. to ensure that data on its devices is accessible pursuant to a search warrant," i.e. the ability to read "at rest" (as opposed to "in-transit") data off captured devices. This data was recoverable on earlier versions of iOS and Android until Apple and Google made it unreadable to everyone, including themselves. This was done partially to avoid giving this power to repressive governments.

The reason Vance's proposal does not aim to compromise "in-transit" data or third-party applications - the only things that could stop an imminent act of terror in real time - is because of how radical and counterproductive this would actually be.

"It's completely unrealistic to stop public access to strong encryption," said Matt Mitchell, a security researcher and encryption trainer with Crypto Harlem. "It would require developers to fundamentally rebuild the internet. Imagine a recall and update to all apps and websites that were not wiretap ready. While terrorist, criminals and monitored foreign governments would move to encrypted technologies that did not have the backdoors because they were not USA-made."

So, in the end, after the exploiting of public sympathy for Paris and San Bernadino, law enforcement wants to increase its power to fight everyday crime. Unfortunately, these powers are never spared for the "bad guys" and will surely be used against agents for social change.

Counterterrorism as Counter-Activism

The post-9/11 lesson for many activists, journalists and dissidents is that the spying apparatus built as a response to acts of terror is much better at investigating, intimidating and prosecuting suspects than at stopping actual acts of terrorism.

Law enforcement officials do not make clear distinctions between activism and terrorism - they even explicitly conflate the two. Anti-terrorism tools, from spies and infiltrators, to stingrays and MRAPs, seem to inevitably find their way into the hands of local law enforcement officials, where they are used against the public in times of protest. It is disheartening - but not surprising - that within weeks of the Paris attacks, climate change activists have been put under house arrest.

Government secrecy makes it difficult to know the extent of domestic spying on activists, but what we do know is troubling for the prospects of future movements. An illustrative example of how destructive government infiltration can be comes out of Washington State, where a group of antiwar activists called Port Militarization Resistance were spied on electronically as well as through undercover operations. Lindsey Schromen-Wawrin, an attorney for several activists associated with Port Militarization Resistance, explained to Truthout that:

Advocates for positive social change must contend with a surveillance state that seeks to be omnipresent and omnipotent. Antiwar activists in Olympia and Tacoma had a military spy in their movement for two years from 2007 to 2009. He orchestrated preemptive police suppression of demonstrations. He got several activists onto a Washington State domestic terrorist list. He wrecked a movement.

"The lessons folks learned from the spying was that the paranoia is worse than the actual spy," Schromen-Wawrin added. This "panopticon effect," the principle that people who think they are being watched will alter their behavior, has real results in deterring people from taking part in activism and other efforts to make social change.

The current wave of Black activists, a predictable target of state suppression, is already feeling the effects of surveillance. Anti-police violence and Black Lives Matter activists are being spied on electronically and by undercover officers and informants across the country. Minneapolis, Chicago, Ferguson, Baltimore, Washington, DC, and New York are just some of the cities where spying has been discovered through government documents, but it is surely more widespread. Sandy Nurse, a veteran New York City organizer who has been a part of many protest actions, explained:

We know that at any time you could be monitored. The police target people they perceive as leaders or people at the front of the march. We're called out by name by officers and it's not because we introduced ourselves. They've been shown a picture saying this person is a leader. The cops even came, one time, to my four-unit apartment building for a "security check" right before an action I helped plan (it took them an hour to get here when someone was murdered outfront). They make it scarier for people to step up in their activism.

It forces us to be very public. Sometimes the only way to protect yourself is to be super transparent about what you're doing, which itself creates problems. When you put everything out there, people show up just to disrupt your activism. It also creates barriers. Muslims, trans people, poor and working-class people who are more vulnerable might not show up while those who have more money or privilege to weather out an arrest are more able to participate.

Never knowing whether an organizing space is safe has created a climate where you have all this risk even though you're not doing anything that could hurt anyone. Why do we have to put our electronic devices in another room just to make a sign and show it to people? We're not hiding; we're openly trying to make things better. Why do they need to spend this money to spy on us?

Looking Forward

We are seeing the emergence of a new civil rights movement just as the gains from the previous generation's movement are being dismantled and some of the most dangerous strains of US racism are being mainstreamed (and even discussed openly by presidential candidates). The ability to confront the state through marches, rallies and direct actions is a necessary aspect of movement building that is threatened by a mass-surveillance society.

Encryption offers this movement a mathematical backing of the First Amendment's guarantee of free speech and association. Widespread adoption of uncompromisable encrypted communication gives activists, journalists and the public small spaces to be free from government subversion while forcing law enforcement and intelligence agencies to abandon the failing project of mass surveillance. New encryption technology does help.

"Texting with other activists now I don't feel paranoid like I did a couple years ago. I feel careful," Nurse said. "A truly free society would welcome this."
Copyright, Truthout. May not be reprinted without permission.

Abi Hassen

Abi Hassen is an attorney, consultant and cofounder of the Black Movement-Law Project. He was formerly the mass defense coordinator at the National Lawyers Guild. He has a J.D. from New York University School of Law, and an undergraduate degree in computer science from The Evergreen State College. With his extensive background in labor, political and community organizing, Abi has been active at the intersection of law, technology and organizing for social justice for over a decade.
Related Stories
Protest Is the New Terror: How US Law Enforcement Is Working to Criminalize Dissent
By Derek Royden, Occupy.com | News Analysis
The Post-Paris War on Encryption Is an Opportunistic Attack on Our Civil Liberties
By Dan Massoglia, Truthout | News Analysis
A State of Emergency in France: Draconian Measures Threaten Civil Liberties
By Bianca Jagger, Truthout | Op-Ed

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

Last night I googled the name of FBI
agent John Kenoyer was was arrested
for pedophilia in Augusta Maine in
1985.

I was only able to find a story written
by the L A Times even though I possess
hard copies of at least 5 stories that
appeared in the Kennebec Journal.

If you are doing an inportant search
consider other search engines


http://searchengineland.com/alternative ... rope-50425" onclick="window.open(this.href);return false;

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://motherboard.vice.com/read/the-fb ... -computers" onclick="window.open(this.href);return false;


The FBI's 'Unprecedented' Hacking Campaign Targeted Over a Thousand Computers
Written by Joseph Cox
January 5, 2016 // 04:00 PM EST

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://fedscoop.com/fbi-shopping-for-a-new-cio" onclick="window.open(this.href);return false;


Wanted By the FBI: A New Chief Information Officer

January 16 2016

The FBI is hunting for a new chief information officer, according to a listing on the bureau’s jobs website.

Billy Mitchell of fedscoop reports that the FBI is looking for an American citizen who can obtain a Top Secret-Sensitive Compartmented Information clearance to report to the deputy director and associate deputy director on enterprise IT functions.

Mitchell writes:

According to the listing, the new CIO will be “responsible for overseeing the acquisition and integration of the FBI’s information resources and will provide IT portfolio management, recommend IT program improvements, and coordinate and review the agency’s IT budget to both ensure technology initiatives are aligned to FBI objectives, and sufficiently agile to adapt to the evolving needs of FBI operations.”

That includes: “all data centers, networks, help desks, computer program development, computer systems operations, information sharing, cybersecurity (including policy, standards, and operations), data management, and end-user computing. “

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://propagandalert.blogspot.com/2005 ... truth.html" onclick="window.open(this.href);return false;


Seventeen Techniques for Truth Suppression: (Originally Thirteen Techniques for Truth Suppression)

by David Martin, author of America's Dreyfus Affair

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it's not reported, if it's not news, it didn't happen.

2. Wax indignant. This is also known as the "how dare you?" gambit.

3. Characterize the charges as "rumors" or, better yet, "wild rumors." If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through "rumors." (If they tend to believe the "rumors" it must be because they are simply "paranoid" or "hysterical.")

4. Knock down straw men. Deal only with the weakest aspect of the weakest charges. Even better, create your own straw men. Make up wild rumors and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like "conspiracy theorist," "nut," "ranter," "kook," "crackpot," and of course, "rumor monger." Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the "more reasonable" government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own "skeptics" to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as "old news."

9. Come half-clean. This is also known as "confession and avoidance" or "taking the limited hangout route." This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than- criminal "mistakes." This stratagem often requires the embrace of a fall- back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. For example: We have a completely free press. If they know of evidence that the Bureau of Alcohol, Tobacco, and Firearms (BATF) had prior knowledge of the Oklahoma City bombing they would have reported it. They haven't reported it, so there was no prior knowledge by the BATF. Another variation on this theme involves the likelihood of a conspiracy leaker and a press that would report the leak.

12. Require the skeptics to solve the crime completely. For example: If Vince Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Scantly report incriminating facts, and then make nothing of them. This is sometimes referred to as "bump and run" reporting.

15. Baldly and brazenly lie. A favorite way of doing this is to attribute the "facts" furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges "expose" scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, "What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?" Don't the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

Comment from Signs of the Times: Boy, have we seen these tactics used against our work! The Pentagon Strike flash is a great example. The first question we get asked (by the sincere) or that gets thrown in our face (by the agents) is what then happened to Flight 77? What happened to everyone on it?

The point is, we may never know. We can make some hypotheses based on the data. But the important point raised in the flash and by 911 researchers is that the evidence is overwhelming that it was not an airplane that hit the Pentagon. And we see that there are numerous agents in the 911 movement who expose scandals like holographic inserts or who accept the official version that a Boeing hit the Pentagon, seeking to lead people astray.

Reasoning backwards is one of the strongest ones when it comes to 911. They begin by saying "It is impossible for an elected government in the US to attack it's own citizens" and therefore all the evidence is dismissed beforehand.

You can go through the list and see how each of these tactics is used, be it on 911 or hyperdimensional realities. The powers that be do not want this information to get out.

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://whowhatwhy.org" onclick="window.open(this.href);return false;


Disinformation Part 1: How Trolls Control an Internet Forum
This is the first of a three-part series on the techniques of trolls, spooks, feds, saboteurs, provocateurs, and disinformants. As you read about these dirty tricks, you may have a sense of deja-vu.

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

http://www.rigorousintuition.ca/board2/ ... =8&t=32101" onclick="window.open(this.href);return false;

msfreeh
Level 34 Illuminated
Posts: 7718

Re: FBI Internet Control-What to Do

Post by msfreeh »

Unnamed Hacker To Identify Thousands Of Federal Employees In Leak, Report Says



http://www.ibtimes.com/unnamed-hacker-i ... ys-2297597" onclick="window.open(this.href);return false;


On 02/07/16 AT 11:20 PM

FBI
A hacker told the technology site Motherboard that he plans to release tens of thousands of records of FBI and Department of Homeland Security employees. The U.S. federal government has endured a rash of data breaches in recent years. Photo: Wikimedia Commons

An anonymous hacker will release troves of information about government employees working for the Federal Bureau of Investigation and the U.S. Department of Homeland Security, according to a report posted to Motherboard on Sunday. The leak may include names, phone numbers, email addresses and titles of as many as 20,000 presumed FBI employees and 9,000 presumed DHS workers.

However, the legitimacy of the records has not been confirmed by any federal agency or officials. An anonymous sour

msfreeh
Level 34 Illuminated
Posts: 7718

Re: Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Post by msfreeh »

also see


Are FBI Informants Working Inside America's Churches? - Bob McCarty
bobmccarty.com › 2015/03/01 › are-fbi-...
Mar 1, 2015 - Jesse Trentadue's ongoing effort to obtain information from the FBI ... Why is Trentadue seeking the information? ... The Sensitive Informant Program is the FBI's disturbing practice of ...
Brother of Murder Victim Seeks Details of FBI's u2018Sensitive ...
LewRockwell.com › bob-mccarty › brot...
Feb 1, 2013 - Salt Lake City attorney Jesse Trentadue filed a motion ... into the FBI's u201CSensitive Informant Program. ... Shown below, Trentadue's definition of a “ sensitive informant” is, perhaps, ...
The OKC Bombing Coverup - LewRockwell
LewRockwell.com › 2015/03 › no_author
Mar 3, 2015 - Jesse Trentadue's ongoing effort to obtain information from the FBI ... Why is Trentadue seeking the information? ... The Sensitive Informant Program is the FBI's disturbing practice of

msfreeh
Level 34 Illuminated
Posts: 7718

Re: Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Post by msfreeh »

Who are the FBI Sensitive Informants at the Harvard Berkman Center ?

https://cyber.law.harvard.edu/people" onclick="window.open(this.href);return false;

also see

http://intelwire.egoplex.com/trentadueindex.html" onclick="window.open(this.href);return false;


November 17, 2005
THE TRENTADUE FILES

New documents offer details of the FBI's secret Oklahoma City Bombing investigation

By J.M. Berger
INTELWIRE.com

Click here for the full documents and an index of their contents.

UPDATES

2/22/2007:

Nichols Alleges FBI Role in OKC Bombing


9/21/2006:

The full collection of Trentadue documents can be found here. This 100-page PDF contains unredacted versions of some of the documents below as well as previously unreleased documents.

12/5/2006:

The FBI has released two addtional documents, which can be viewed by clicking here.

Original documents obtained by INTELWIRE cast additional light on individuals and groups mentioned in the Trentadue documents. Click here for documents related to Andreas Strassmeier and other OKC figures involved in a Texas militia group. Click here for documents related to Aryan Republican Army and Richard Guthrie.

Several newly revealed FBI documents provide the most dramatic evidence to date that the Oklahoma City bombing was carried out by a conspiracy involving more people than Timothy McVeigh and Terry Nichols.

Attorney Jesse Trentadue has disclosed more than 50 pages of FBI internal documents, which are at the center of a court battle over the FBI's obligation to disclose information about the Oklahoma City bombing investigation. All currently available documents are now available to journalists and the public on this site.

The documents have been credibly authenticated during the course of Trentadue's lawsuit. Some of the documents were provided to Trentadue in redacted form by an undisclosed source. The lawsuit aims, in part, to obtain the unredacted versions of this documents.

Trentadue, a Salt Lake City attorney, became involved in the lawsuit after the death of his brother, Kenneth Trentadue, in federal custody on Aug. 21, 1995. Kenneth Trentadue's death was initially declared a suicide by prison officials, but the family discovered signs of numerous injuries when preparing him for burial. The family was awarded more than $1 million after winning a wrongful death suit against the government.

Jesse Trentadue's lawsuit over the FBI's disclosure stems from a belief that his brother was killed because of his resemblance to Richard Lee Guthrie, a white supremacist and bank robber who has been credibly linked to the Oklahoma City bombing by numerous reports, including those from the Associated Press, J.D. Cash of the McCurtain Gazette and In Bad Company, a 2001 book by criminology professor Mark S. Hamm.

Guthrie was later apprehended by authorities. Just days before he was scheduled to testify against one of his accomplices in the bank robbery gang, Guthrie was found dead of a purported suicide in his cell. His alleged means of suicide was hanging, the same cause of death originally cited by prison officials for Kenneth Trentadue.

Trentadue has presented the documents linked below as part of an effort under the Freedom of Information Act (FOIA) to force the FBI to disclose its internal files on the Oklahoma City bombing, including unredacted versions of some of the cited documents. The FBI is notoriously unwilling to provide information about the Oklahoma City bombing in particular, and is also known for being generally unresponsive to FOIA requests. Thousands of pages of documents relevant to the OKC investigation were also improperly withheld by the Justice Department until after the conviction of Timothy McVeigh, whose attorneys had requested the documents in discovery.

In the course of Trentadue's lawsuit, the FBI has denied the existence of some documents (including those linked below), but the agency was forced to withdraw that claim after Trentadue presented copies of the documents in court as proof of their existence. Trentadue has not disclosed how he obtained the documents, but their authenticity is no longer in dispute.

The FBI has subsequently attempted other legal strategies to avoid disclosure, in full or in part, and the case is ongoing. For more information on Jesse Trentadue and the lawsuit, click on the following links to recent news articles:

Attorney Offers Document On OKC Warning
Documents May Prompt Congressional Probe
Jesse Trentadue's Long Battle For Proof
Terror, Lies and Memos
Testimony: ATF warned before OKC (Alt. link)
FBI Files Sealed Documents in OKC Suit


The documents are indexed in detail below, with links to facsimiles which were provided to INTELWIRE by Jesse Trentadue. The documents reveal that the FBI investigated links between the Oklahoma City bombing and white supremacists (both individuals and groups). The documents also flatly contradict various claims made by the FBI in the years since the bombing.
The Trentadue Documents

The following documents can be viewed by clicking the links below, and they can also be navigated in order from the first page.

With all of these documents, the important point to remember is that the FBI has fought against disclosing them, despite various legal obligations to do so, including as part of discovery in the federal trials of Timothy McVeigh and Terry Nichols. The author of this Web site does not necessarily stipulate that every lead reported within the documents is provably true, but many of them are highly credible and all of them are worthy of further journalistic investigation.

The documents were filed as exhibits in Jesse Trentadue's FOIA lawsuit against the FBI and have been credibly authenticated during the course of those proceedings. They were provided to INTELWIRE by Trentadue. The dates provided usually reflect the date the document was created, but in some cases may reflect the date the document was received and filed by FBI headquarters.

Some documents contain signficant redactions. The documents were provided to Trentadue in redacted form by an undisclosed source. One document has additional redactions added by INTELWIRE out of privacy concerns. The specific redaction is noted in the index below, and an unredacted version is available for mainstream journalists interested in pursuing this story.

FBI TELETYPE, AUGUST 1995

White supremacists planned to bomb U.S. targets
Unnamed suspect may have assisted McVeigh

This redacted document is connected to the OKBOMB investigation (the FBI's code name for the Oklahoma City bombing). The teletype discusses a report from an undisclosed individual regarding Elohim City, a white separatist compound in Vian, OK. Court records confirm that McVeigh telephoned the complex shortly before the OKC bombing, and numerous reports have suggested links between McVeigh and Nichols, Elohim City and the Aryan Republican Army, a bank robbery gang whose members were white separatists who stated that the proceeds of their robberies would be used to fund terrorist attacks on the U.S. government.

On page two of the document, an unidentified informant (name redacted) is quoted as saying that unidentified individuals at Elohim City have explosive devices which they intend to use on various targets around the U.S. Meetings on such plans are described, but the names of the participants have been redacted.

On page three of the document, the writer states that "[redacted name] also indicated that [redacted name] may have assisted McVeigh in the Oklahoma City bombing."

FBI TELETYPE, JANUARY 1996

McVeigh phone call to Elohim City, 4/17/1995
Suspect cited for relationship to McVeigh
4/17 call was to seek additional conspirators

This document dealing with BOMBROB, the bank robbery investigation involving Richard Guthrie, has been significantly redacted. However, it states that "Information has been received through the Southern Poverty Law Center that one [name redacted], aka [name redacted], [redacted] telephone call from Timothy McVeigh, on or about 4/17/1995, two days prior to the OKBOMB attack, when [name redacted], per a source at the SPLC, was in the white supremacist compound at [redacted], OK. [name redacted] allegedly has a lengthy relationship with Timothy McVeigh, one of the two indicted OKBOMB defendants. The source of the SPLC advised that [name redacted] is currently residing with [name redacted] in [redacted], N.C., and plans to leave the U.S. via Mexico in the near future."

"Prior OKBOMB investigation determined that McVeigh had placed a telephone call to Elohim City on 4/5/1995, a day that he was believed to have been attempting to recruit a second conspirator to assist in the OKBOMB attack (emphasis added by INTELWIRE)."

FBI TELETYPE, AUGUST 1996

McVeigh phone calls detailed
BOMBROB suspects summoned by phone from Phila.

On the second page of this teletype from FBI headquarters to the Philadelphia office of the FBI (involved in the BOMBROB investigation), the following passage appears:

"Information has been developed that [names redacted] were at the home of [name redacted] Elohim City, Oklahoma, on 4/5/1995 when OKBOMB subject, Timothy McVeigh, placed a telephone call from [redacted] residence to [redacted] residence in Philadelphia division. BOMBOB subjects [names redacted] left [redacted] residence on 4/16/1995 en route to Pittsburgh (sic), Kansas, where they joined [name redacted] and Guthrie."

Some of the Aryan Republican Army bank robbery suspects lived in Philadelphia. The ARA maintained a safe house in Pittsburg, Kansas.

SUMMARY OF INFORMANT INFORMATION, 1/16/1996

SPLC informant information discussed
McVeigh meeting with unnamed suspect in 1993

As has been reported elsewhere, the Southern Poverty Law Center (an independent organization that monitors hate group activity in the U.S.) maintained an informant in Elohim City. The reports of this informant have become the center of much ensuing controversy regarding the OKC investigation. This OKBOMB document summarizes information obtained through this avenue.

The document states: "With regard to [redacted] wherein Timothy McVeigh met [redacted] being in November 1993, the information was actually that it was approximately 18 months before the bombing." The rest of the report appears to represent speculation on the part of the informant, but certain sections are so heavily redacted that it is impossible to know for sure.

FBI TELETYPE, 1/11/96

Redacted information on suspect links

This OKBOMB case teletype also discusses information obtained from the SPLC. The document is OKBOMB related and refers to relationships between individuals whose names have been redacted.

FBI TELETYPE, 1/20/96

Heavily redacted
McVeigh 4/17 call to suspect identified
Suspect reported to plan flight from country

This heavily redacted OKBOMB document contains extensive information on individuals whose names have been excised. According to the teletype, the FBI in Oklahoma "has received information [redacted name] may be an associate of Timothy McVeigh. (According to the SPLC informant,) "McVeigh attempted to telephonically contact [redacted] on or about April 17, 1995, while [name redacted] was residing in Elohim City."

Massive portions of the page that follows are redacted but appear to contain reports from numerous confidential witnesses (CW) relating to the above claim. On the subsequent page, an informant reports "[redacted passage] because things were 'too hot out there.' CW understood that [redacted] was referring to the bombing of the Oklahoma City federal building."

INFORMANT SUMMARY, 12/21/1995

Relationships to McVeigh discussed
McVeigh 4/17 call again discussed
Elohim City reaction to McVeigh arrest

Another OKBOMB case document referencing information from the SPLC informant. According to the document, "In November 1993, [redacted] met Timothy McVeigh [long passage redacted] is described as a white male, DOB (date of birth) [redacted] POB (place of birth) [redacted]. He is a [redacted] who [redacted] with help from [redacted] somewhere in [redacted] and [redacted]. Allegedly, McVeigh and [redacted] became associates because of their common background in [redacted].

"[redacted] was [redacted] at Elohim City, Oklahoma. On 4/17/95, McVeigh called Elohim City and spoke with a female who answered the phone. He asked to speak to [redacted].

"Sources have told [redacted] that [redacted] Elohim City anywhere from two days before the Oklahoma City bombing to two weeks before the bombing. [redacted] latest information is that [redacted] of Elohim City, saw McVeigh being led out of the courthouse on television and at that time, [redacted] was told to [redacted]."

Virtually all of the remaining document is redacted, except for a notation that the information may be valuable to the FBI's legat (legal attache) in London, who was investigating the background of an individual whose name has been redacted.

FBI TELETYPE, FBI HQ TO LEGAT BONN, 1/26/1996

Andreas Strassmeir likely subject of document
Documents seized by OK police, contents redacted

Although this document has been heavily redacted, one can reasonably speculate that it deals with German national Andreas Strassmeir, an Elohim City resident who has been linked to the BOMBROB suspects and also to the Oklahoma City investigation. Strassmeir was the son of a high-ranking German government official, according to British newspaper The Guardian. Strassmeir reportedly met McVeigh at a gun show in 1993.

The teletype says that [name redacted] may be an associate of Timothy McVeigh," and reiterates several phrases from the teletype of 1/20/96, suggesting both documents may primarily concern Strassmeir (who reportedly fled the country in 1996).

Even more importantly in terms of furthering this investigation, the teletype states that it provided to the FBI several documents received from confidential sources regarding Elohim City. "Among these documents were documents [redacted] relating to [redacted] Some documents have the heading [redacted]. One document appears to be a [redacted] dated [redacted]. One document [redacted] is entitled [redacted]. This document certifies that [redacted]. The course included instruction in [redacted]."

The remainder of the document is heavily redacted, often inexplicably so, such as the removal of apparent references to Terry Nichols and Michael Fortier, known subjects in the investigation whose identities hardly need to be concealed.

msfreeh
Level 34 Illuminated
Posts: 7718

Re: Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Post by msfreeh »

2 stories


1.

http://spectrum.ieee.org/tech-talk/tele ... aketh-away" onclick="window.open(this.href);return false;


2.

https://www.eff.org/deeplinks/2014/08/d ... rofit-many" onclick="window.open(this.href);return false;

October 7, 2014 |
DEFCON Router Hacking Contest Reveals 15 Major Vulnerabilities

"I could take down the internet with that, and so could you."

Dan Geer, Chief Information Security Officer of CIA’s venture capital arm, didn't mince words when he mentioned the security flaws in home routers during his keynote address at last month's Black Hat conference in Las Vegas. But he also noted a small silver lining around the dark cloud of router security: people are starting to take the problem much more seriously. As he noted, the "SOHOpelessly Broken" DEFCON hacking contest, co-presented by Independent Security Evaluators and EFF, is drawing attention to security vulnerabilities in routers with the goal of helping to get them fixed.

The contest was a success and the results are alarming: participants documented 15 new 0-day vulnerabilities, including 7 full router takeovers. These attacks took place on Track 0 of the contest.

According to the rules of the contest, an entry wasn't considered valid unless the contestant also showed proof of disclosure to the manufacturer. Here's a full list of routers in which 0-days were reported in Track 0, along with our current understanding of the fix in progress:

ASUS AC66U; reported, but no response from the manufacturer.
Netgear WNDR4700; reported, but no response from the manufacturer.
D-LINK 865L; reported, and manufacturer confirms it is working on a fix, currently in beta.
Belkin N900; reported, and manufacturer acknowledged but was unclear on providing a fix.
TRENDnet TEW-812DRU; reported, and manufacturer claims all reported 0-days are fixed.
Actiontec Q1000; reported, and manufacturer acknowledged the report.

For details please see the full contest results.

It's clear from the fact that the list spans many different manufacturers that the problem is not unique to any one company. It affects nearly all router makers, and a huge percentage of Internet users. And if these brand names are not familiar, that doesn't mean you're safe: the Actiontec Q1000, for example, is provided by Verizon Communications to its customers.

Unfortunately, fixes have been slow to roll out. Because each of the bugs have been disclosed to the manufacturer directly, there may not be pressure to push an emergency patch, but manufacturers have a chance to address the issues. As Craig Young, the winner of Track 0 notes, that process results in better security without the panic of high-profile exploits:

SOHOpelessly Broken clearly got the attention of vendors without attacks in the wild or irresponsibly disclosed vulnerabilities. Several vendors have already released fixes and others have proactively reached out to the Tripwire VERT researchers for security guidance.

There were two other tracks in the contest, that aimed to get newbies interested in hacking routers. These were Track 1 and and a "surprise" Track 2, both of which involved demonstrating attacks on routers known to be vulnerable. The first round of the surprise Track 2 attracted 7 teams, and the winner was able to demonstrate a full takeover after an hour and a half; the second round featured 9 teams and a winner was crowned after three hours. For details please see the full contest results.

At the end of the day, we were able to help expose many major bugs, and to reward their discoverers $2,700 in cash prizes, 8 DEFCON badges for next year, 11 trophies, as well as swag including backpacks, stickers, shirts, and other gear. We hope the experience, awards, and bragging rights will draw more hackers to expose the problems with SOHO routers and motivate manufacturers to fix them.

We're a long way from a good baseline level of router security, but—alongside projects like EFF's Open Wireless Router Firmware—these efforts can help us get there.

msfreeh
Level 34 Illuminated
Posts: 7718

Re: Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Post by msfreeh »

Senators cannot even protect themselves
from CIA spying

You do know what to do

The Latest: FBI chief says encryption blocks investigations - KXXV-TV News Channel 25 - Central Texas News and Weather for Waco, Temple, Killeen |

The Latest: FBI chief says encryption blocks investigations

WASHINGTON - The Latest on the worldwide threat assessment from U.S. intelligence agencies (all times local):
February 9 2016


http://www.kxxv.com/story/31177851/the- ... stigations" onclick="window.open(this.href);return false;
___

5 p.m.

FBI Director James Comey says one of the phones used by the killers in the San Bernardino, California, attacks remains inaccessible to investigators more than two months after 14 people were fatally shot.

Comey is testifying before the Senate Intelligence Committee.

He cites the case as an example of how encryption is affecting counterterrorism efforts. But he says the dilemma of bad guys "going dark" is mostly affecting state and local law enforcement officials who are trying to solve murder, drug and car accident cases.

Companies are increasingly making devices such as cellphones with encryption that allows only the people communicating to read the messages.

Comey says it's a big problem when law enforcement armed with a search warrant can't open a phone, even when a judge says there's probable cause to have it opened.

____

3:22 p.m.

CIA Director John Brennan had a heated exchange with a member of the Senate Intelligence Committee over whether the agency spied on staffers investigating harsh interrogation methods - a probe that resulted in the so-called torture report.

Sen. Ron Wyden, D-Ore., asked Brennan to acknowledge that a CIA search of intelligence committee files in January 2014 was improper and would not happen again. But Brennan held his ground.

At the time, Brennan denied that his personnel spied on Senate investigators. Later, an internal CIA review faulted five CIA employees for hacking into the intelligence committee's computers and emails. Brennan apologized to the top committee leaders, while insisting it was "very limited" access.

Wyden says both the CIA review and an inspector general's report of the incident found the agency had improper access to Senate files. But Brennan says Wyden mischaracterized the findings.

"Don't say that we spied on Senate computers or files. We did not do that," Brennan says.


msfreeh
Level 34 Illuminated
Posts: 7718

Re: Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Post by msfreeh »

March 18, 2016, 1:08 PM
Secret Service, FBI aware of alleged disclosure of Donald Trump's personal info

http://www.cbsnews.com/news/secret-serv ... onal-info/" onclick="window.open(this.href);return false;

The possible disclosure of Donald Trump's personal information by hacking group Anonymous has been brought to the attention of the U.S. Secret Service.

"The U.S. Secret Service is aware of the internet postings of Candidate Donald Trump's personal information. We are working

msfreeh
Level 34 Illuminated
Posts: 7718

Re: Can you name the "FBI Sensitive Informants working at the Berkmann Center for the Internet

Post by msfreeh »

http://www.nydailynews.com/news/nationa ... -1.3632972


Baltimore officer arrested for selling stolen cocaine and heroin in conspiracy involving eight others


BY CHRIS SOMMERFELDT
NEW YORK DAILY NEWS Updated: Tuesday, November 14, 2017, 5:27 PM




https://apnews.com/ab34d80df22546ed9429 ... -probation

Utah deputy whose dog died in hot vehicle gets probation


LOGAN, Utah

A former Utah sheriff’s deputy whose police dog died of heat exhaustion after he left it in a vehicle has been court-ordered to spend a minimum of 50 hours educating the public about the dangers of leaving pets and children in hot cars.



http://www.nydailynews.com/new-york/nyp ... -1.3632853

NYPD practice of allowing cops view bodycam footage prior to incident reports questioned
BY GRAHAM RAYMAN
NEW YORK DAILY NEWS Tuesday, November 14, 2017, 4:31 PM





http://www.nydailynews.com/news/nationa ... -1.3630637

Georgia sheriff suspended after deputies allegedly sexually assaulted students during drug search
BY CHRIS SOMMERFELDT
NEW YORK DAILY NEWS Monday, November 13, 2017, 8:48 PM




http://www.latimes.com/local/california ... story.html


The FBI called him 'Captain America.' But the informant had a secret






http://www.nydailynews.com/news/nationa ... -1.3630623

Roy Moore reportedly banned from Alabama mall after harassing teen girls in the 1980s
BY ELIZABETH ELIZALDE
NEW YORK DAILY NEWS Monday, November 13, 2017, 8:22 PM




https://apnews.com/e9cd16233ca44b2c9bba ... bezzlement


AZCOPS bookkeeper gets 3 years in prison for embezzlement


TUCSON, Ariz. Authorities say a former bookkeeper for the Arizona Conference of Police and Sheriffs has been sentenced to three years in prison and seven years of probation for stealing from her former employer.



https://apnews.com/ed5a7b5dbe1e4ff4a486 ... cked-truck


Black man shot by police while entering his locked truck


MESQUITE, Texas

Authorities say they have determined that a black auto burglary suspect shot by officers in a Dallas suburb was trying to get into his own locked truck.

Lyndo Jones is recovering after he was shot in the abdomen by Mesquite police on Nov. 8. At a news conference Tuesday, police Lt. Brian Parrish said officers responded after someone reported a man breaking into a vehicle, setting off its alarm.








http://www.ctpost.com/local/article/Cop ... 357002.php

Cop suspended in uniform dispute
By Daniel Tepfer Updated 4:53 pm, Tuesday, November 14, 2017






https://apnews.com/a0bf90f2e1854218832a ... to-proceed

Lawsuit filed by Dakota Access protesters to proceed


BISMARCK,

An appeals court ruled Tuesday that a federal judge in North Dakota was correct in not barring police from using harsh methods against Dakota Access pipeline protesters.

There have been no protests since February, but the decision will allow a lawsuit to proceed in which pipeline opponents allege they were subjected to police brutality and their civil rights were violated.

The plaintiffs sued last November seeking to stop police from using tactics against protesters such as chemical agents and water cannons. U.S. District Judge Daniel Hovland refused the request and they appealed, putting on hold the rest of their lawsuit, which seeks unspecified damages for alleged police brutality and rights violations.


The protesters’ attorney, Rachel Lederman, said her clients look forward to proceeding with those claims.

“We are determined to keep fighting for justice and we are optimistic that when we are able to present all the evidence, the district court judge and jury will determine that law enforcement’s use of force was illegal,” she said.

Lederman said she also believes the plaintiffs’ case has been bolstered by developments since it was put on hold. Documents leaked to an online magazine in May show that TigerSwan, a private security company hired by Texas-based pipeline developer Energy Transfer Partners, used military-style counter-terrorism measures, had a close working relationship with public law enforcement and used propaganda.

Lederman said she hopes Hovland “will see that he has been misinformed about the nature of that (anti-pipeline) movement due to the efforts of these hired mercenaries, and will be able to take a fresh view of the evidence as the case moves forward.”

TigerSwan has maintained that its efforts were aimed at creating a safe working environment and that it is the victim of a smear campaign.

Law enforcement — who allege that protesters made threats against officers and public officials, including the governor — asked Hovland in February to dismiss the lawsuit, saying police are entitled to immunity and protesters had failed to present any plausible claims that their rights were violated.

Attorneys from Bakke Grinolds Wiederholt, a firm representing law officers, said Tuesday they were pleased that Hovland will now be able to rule on their motion.

Hovland indicated in February that he didn’t think protesters were likely to succeed on the merits of their claims.


The pipeline began moving oil from North Dakota to Illinois in June following months of delays caused by legal battles and more than half a year of protests in North Dakota that resulted in 761 arrests.




http://www.nydailynews.com/new-york/cor ... -1.3632310

Correction commissioner, 8 top staffers pay hefty fines for using city cars for personal travel
BY RICH SCHAPIRO ERIN DURKIN
NEW YORK DAILY NEWS Updated: Tuesday, November 14, 2017, 9:04 PM




Link du jour

https://www.pbs.org/newshour/politics/w ... -are-white



http://www.latimes.com/science/sciencen ... story.html


http://www.nydailynews.com/new-york/ret ... -1.3632913


http://exclaim.ca/music/article/fbi_rep ... sentencing


http://www.nydailynews.com/news/nationa ... -1.3630810


http://www.latimes.com/nation/la-na-bun ... t01a-10la1

http://www.nydailynews.com/new-york/201 ... -1.3632200

http://www.latimes.com/sns-subsidizing- ... 11aH-13gp1


https://www.law360.com/articles/985135? ... les_search

NY Times Loses Bid For All FBI Info On Underwear Bomber


Chicago (November 14, 2017, 9:28 PM EST) -- A New York federal judge has ruled that the FBI rightfully kept from The New York Times part of its investigation of the “Underwear Bomber” who attempted to hijack a plane in 2009, finding in an order made public Tuesday that the withheld data was properly deemed exempt under the Freedom of Information Act.

U.S. District Judge Ronnie Abrams agreed with the FBI in an order, initially filed under seal on Nov. 7, granting the agency summary judgment that releasing all of the data relating to...




http://www.palmbeachpost.com/news/crime ... pxjXF7UcJ/

Ex-FBI agent blasts Boynton police Sgt. Philip Antico for lying
Jane Musgrave Palm Beach Post Staff Writer
8:28 p.m Tuesday, Nov. 14, 2017 Palm Beach County Crime




http://www.cnn.com/2017/11/14/politics/ ... index.html

10 moments to remember from Attorney General Sessions' testimony
Greg Krieg
Analysis by Gregory Krieg, CNN
Updated 7:16 PM ET, Tue November 14, 2017





http://thehill.com/policy/technology/ov ... h-wh-still



Overnight Tech: Sessions won't say if WH intervened in AT&T merger talks | Dems want hearing on Trump's involvement in merger







http://abcnews.go.com/Politics/congress ... d=51152034


Congressional Black Caucus members grill Jeff Sessions on relationship with minority communities
By ERICA Y. KING
Nov 14, 2017, 6:43 PM ET



https://www.law.com/nationallawjournal/ ... 1014231526

Trump Picks Holland & Knight Partner, Brother-in-Law of FBI Director, for Intelligence Post
Holland & Knight partner Jason Klitenic, a former deputy general counsel at the U.S. Department of Homeland Security, is the Trump administration's pick to serve as the top lawyer at the Office of the Director of National Intelligence. Klitenic is a brother-in-law to FBI Director Christopher Wray, who gave him a shout-out at his confirmation hearing this year.

By C. Ryan Barber | November 14, 2017







http://www.wbng.com/story/36842983/a-lo ... house-raid



A LOOK BACK: Tuesday marks 60 years since Apalachin 'Mafia House' raid


"It was the biggest thing that ever hit, not just Apalachin, but the whole county really," Sedore said.

While many were caught, they had to be let go because no crimes had been committed that day. Still, the event made history because the FBI was forced to acknowledge for the first time the mafia existed.





Adelson Breaks Publicly With Bannon After Ghosting Him At Gala
November 14, 2017 By Ari Feldman
Read more: http://forward.com/fast-forward/387561/ ... m-at-gala/





FBI Octopus


How to fight extremist hate and violence? Start by pulling out politics ...
OCRegister


http://www.caller.com/story/news/local/ ... 863450001/

NAACP names Freedom Fund Banquet guest speaker
Corpus Christi Caller-Times-
FBI Special Agent in Charge Perrye K. Turner has been named the guest speaker for the 48th annual Freedom Fund Banquet set for January 13, 2018. Wochit.
“If there is no clear ideology at work, I'm not counting those as homegrown terrorism,” said Erroll Southers, a former FBI agent and director of Homegrown Violent ...







https://www.barnesandnoble.com/w/eyes-t ... 1112139895


Eyes to My Soul: The Rise or Decline of a Black FBI Agent

Unjustified FBI harassment of Black mayors Coleman Young (Detroit), Harold Washington (Chicago) and Marion Barry (Washington, DC); white agents urinating on photographs of President Bill Clinton and Vice-President Al Gore; a white agents' fundraiser for white policemen accused of murdering a Black Detroit motorist; agents pasting the picture of an ape over the photo of an African American agent's child; sheet-clad classmates pretending to be Ku Klux Klansmen at the FBI Academy; the mysterious explosion of a "troublesome" Black agent's FBI-issued vehicle -- all of this, too, is the FBI, and former Special Agent Tyrone Powers tells it as only a conscious Black insider could.

Post Reply