Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman

An Introduction to Modern Satanism – ahftu.net

 Modern Satanism  Comments Off on An Introduction to Modern Satanism – ahftu.net
Mar 262016
 

Prior to LaVey forming the Church of Satan, LaVey in the early to mid sixties would hold Midnight Masses at his Victorian home in San Francisco’s Richmond District. It would attract many high profile figures from the San Francisco area, which made LaVey somewhat of a local legend. This is what caused LaVey to start the “Satanic Church” later renamed the “Church of Satan” (often referred to “CoS” for short).

In 1969 LaVey wrote the Satanic Bible, which would prove to be the bedrock for modern Satanism. To date it has sold nearly 1,000,000 copies worldwide and has been translated into several languages.

The Church of Satan thrived vigorously in the late sixties and early seventies attracting many celebrities including Sammy Davis Jr., and Jayne Mansfield to name a couple.

In 1975 many changes occurred within the CoS, LaVey had done away with the Grotto system. A network of sub-churches setup across the country. Some structural re-organization had also been done.

It was at this time that Michael Aquino, member of the Church of Satan, broke away from the Church and formed his “Temple of Set.” Aquino maintained that LaVey had changed his stance from believing in an actual Satan to referring to it as more of a relative term. LaVey claimed that he had always referred to Satan as a “Dark force of Nature” rather than an actual deity.

Between 1970 and 1992 LaVey had written three other books. The Compleat Witch (Re-released as “The Satanic Witch”), The Satanic Rituals, and The Devil’s Notebook.

During this period in the ’80’s there was a wave of Satanic panic as many talk shows, news media, and various papers across the country began reporting on Satanic Serial Killers, and Groups of Satanists that were opening day care centers, molesting, and sacrificing children. This sparked an FBI investigation, which concluded that there was no such activity taking place.

Just after the release of the Devil’s Notebook in 1992 LaVey made a film entitled “Speak of the Devil” It was a documentary about the Anton LaVey, the history of Satanism, and the Church of Satan. It seemed to revive the Satanic movement a little but not nearly as much as would be seen in 1996.

A musician by the name of Marilyn Manson release an album entitled “Antichrist Superstar” which fueled a pop-culture trend of Goth teenagers proclaiming to be Satanists. Many of these children were nothing more than alienated teens that were simply rebelling against religion, and their parents.

This created a surge of attention for LaVey and the Church of Satan. A revitalized church had sky rocketing membership applications and a renewed interest in Satanism. Ironically in the midst of the Goth culture phenomenon LaVey would die of heart failure in his home on the night of Oct. 27, 1997.

The Aftermath of LaVey’s Death

Not surprisingly the death of LaVey created a frenzy in and outside of the Satanic community. Detractors came out from rocks to demystify, or debunk nearly all parts of LaVey’s personal and private life, and of course the Church of Satan itself.

Karla LaVey (Anton’s eldest daughter) and Blanche Barton (LaVey’s Biographer, and mother of his Son) had agreed to run the Church together as co-High Priestess’s. It was just after this agreement that Blanche produced a handwritten will and claimed that the Church, LaVey’s personal property, and all rights to LaVey’s writings were the sole property of Blanche, and LaVey’s youngest Son Xerxes.

Karla had contested the will citing a Doctors statement that LaVey was heavily medicated and had just come out of a death experience when he was coerced to write the Will. The Will was later invalidated and an agreement was made.

Feeling that her fathers personal items were more important than the organization itself Karla agreed to let Blanche have the “Organization known as Church of Satan” in return LaVey’s three children (Karla, Zeena, and Xerxes) were to equally divide his personal belongings, and the rights to his works.

During this time Blanche and clergy of the Church had begun a vicious campaign against Karla claiming she was not qualified to run the Church, had not contributed to the Church, and went through long periods of not speaking to her father.

In reality Karla LaVey had gone on numerous lecture tours at University’s regarding Satanism. Appeared on countless television talk shows and radio interviews, promoting the Church, her father’s work, and the philosophy itself. She was even featured on the Cover of Brazil’s most popular magazine giving an interview on the Satanism, and the Occult.

Karla then decided to form the “First Satanic Church” in 1999, an identical organization to her father’s old Church in order to carry on the family tradition. Her church is operating out of San Francisco just as her father had run the Church of Satan.

Blanche currently resides in San Diego, California and has no longer handles CoS administration. The Church of Satan is now run mostly online, based out of New York where memberships are processed, while still maintaining the P.O. Box in San Francisco for personal correspondence to Blanche.

A large number of new Satanic Churches have popped up since the death of LaVey in 1997. Most of them Internet based and lacking any real substance. That just seems to be par for the course these days.

A Word about Satanism Today

Satanism has always been about being an individual; it therefore makes sense that regardless of organizational politics the primary focus should be on the individual. It has become a bit clich yet it still holds true that you do not have to join any organization to be a Satanist. Only you can determine where you want to go in life.

In closing I would like to say that Satanism is the Bedrock philosophy of human existence. It is the philosophy that is your primer paint before you put several layers of other paints on the wall. It is the first stepping-stone in life’s journey for infinite knowledge. In the long run it’s really what keeps you grounded and your head out of the clouds.

I would encourage you to do your own research and studying on the subjects of Satanism & the Occult Sciences. Click below to learn a few basic tennets of Satanism.

View original post here:

An Introduction to Modern Satanism – ahftu.net

Badbitcoin.org – Helping you stay Safe in the World of …

 Cryptocurrency  Comments Off on Badbitcoin.org – Helping you stay Safe in the World of …
Mar 202016
 

Bitpyramid.ml “Don’t trust us?” Er, no we don’t actually. All ponzi’s are scams. 3/19/16

Organica.fund They do like a different theme for these hyips, here’s another one. 3/19/16

Bitcoinx10.yolasite.com Dirty deeds done cheap. Freehosted fraud. 3/19/16

Bitcloner.com A doubler fraud using this domain was inevitable. 3/19/16

Ultimabitcoin.com A very worn out style of hyip scam. 3/16/16

Instantgenuinepaying.com Instantgenuineloseyour.bitcoin 3/16/16

Double-btc.info What have we told you about btc multipliers? They are ALL scams and there are NO exceptions. 3/15/16

Envestrade.com Another hyip/fraud to add. 3/15/16

Bitmines.info Just another ponzi fraud. 3/15/16

Ads by Google

Topmine.io Yet another fake mining scheme. There are no special algorythms, just a ponzi. 3/15/16

Btcshares.org If you want btc shares, buy some btc, then you have a share. Simple. 3/15/16

Free-shares.com These may be the most expensive free shares you’ve ever (never) received. 3/15/16

Hyip.com But seriously, hyips are scams – pure and simple frauds, so this site takes the biscuit. 3/15/16

Mybtc.bid I’m starting to get double vision – probably the safest way to double my wealth. 3/12/16

Nelektronicy.pl Yet another attempt at a scam doubler. 3/12/16

Nexus-investments.com If these serial thieves had any sense, they’d stay away from bitcoin, then we wouldn’t bother them. 3/10/16

Btcsinon.com Don’t let this hyip/fraud fool you. Just lies and more lies. 3/10/16

Earntory.com What an odd site title, and that is the best part. 3/8/16

Investmega.com This scam looks like it was put together by an idiot, but we’d better list it in case a bigger idiot sees it. 3/7/16

X10multiplier.com Only in your dreams does bitcoin double. 3/7/16

Bitboom.info Boom, and your bits are gone. If Cillit did bitcoin scams…. 3/7/16

Btc-e.black The old worn out ‘flaw in the blockchain’ better known as the Bitatt scam. 3/7/16

Fxacc.com A hyip/scam from the usual offenders. 3/6/16

Rixosfinance.com Just another faker after your dosh. 3/6/16

Bitcoinside.com Don’t risk it. You don’t need to, there are plenty of legit exchanges 3/6/16

Bitcoin-ex.com Or Ex-bitcoin? 3/3/16

Mybitcoinmania.com Don’t download that malware from these crooks. You will sorely regret it, Gen:Variant.Strictor.101663 3/3/16

Hourlytim.com He’s a busy boy is young Tim, avoiding Jail. 3/3/16

Bitsdoubler.me.pn Seriously, does anybody still fall for these multiplier scams? 3/3/16

Fastcury.com If you want a fast curry, order one from your local takeaway. Dodgy doesn’t even begin to describe this amateur fraudster. 3/3/16

Crypto-investment-experts.biz & Swiss-cryptocurrency-experts.com A free Cuckoo Clock for every sucker. 3/3/16 & 2/18/16

Slushcoin.com Your bitcoin may as well be slush if you send it to this faker. 3/1/16

Profitown.com Another hyip/fraud 3/1/16

These are just the most recent badsites. Click below for these and more Cryptocurrency badsites In alphabetical order.

** Important Announcement** The wife of our admin has just undergone a double organ transplant, and so updates and personal responses to emails will be a little erratic for a few weeks. Please bear with us during this unusual but amazing time. Thanks.

The Badbitcoin project was launched in Feb 2014. “The Badbitcoin Team” is made up of volunteers worldwide, and we welcome new contributors and sponsors.

You may read negative comments about this project, but this is the scammers only route to fight back, and a great many of these scammers are the same people who are Senior, and Gold members of forums. Forums relating to bitcoin are the best source of conflicting information ever invented, which is why we keep it plain and simple, we tell you it’s a badsite, and thats all you need to know.

It’s really easy to misunderstand the bitcoin environment when it’s all new to you, and it will take you some time to grasp some of the rules and concepts. This leaves you vulnerable to the swathes of scams and ponzis that try to lure you into their promises of easy money, and doubling or even 100 times multiplying your new ‘Magic Internet Money’ It doesn’t work like that. It isn’t magic, it’s just very efficient, very secure, and much sought after by thieves the world over. If you have bitcoin, you need to learn to look after it, or these crooks will soon take it from you.

Don’t make it easy for them. Contribute by reporting suspect sites when you find them, and we’ll do the rest. You can also help by donating bitcoin or litecoin to the project, and If you run a website or blog, you could add a link to this project and help spread the message. We have banners and logos to suit.

That’s it – nothing to add, nada.

To report Internet Fraud to IC3 – Click Here To report Internet Fraud to the FBI anonymously – Click Here To report Internet Fraud to the UK Police – Click Here

Ads by Google

You can help us to help others by making a donation to this project. However modest, it will help us to continue. We spend nearly all of the donations on advertising in the same space as the scamsites, so we can reach and warn the most users. We also use some expensive investigation tools, but we all give our time for free.

A Ponzi is any scheme which pays interest to “Investors” from Bitcoin coming in from new Investors. A HYIP (high yield investment program) is just a Ponzi. All Ponzi/Hyips will fail The later Investors will lose everything when the scheme folds and leaves with the Bitcoin. Most HYIPS just steal it immediately – Due diligence is your own responsibility. There are plenty of good sites out there where your Bitcoin and your work are safe. You just need to do your homework, including checking here. If it isn’t in our Badlist, email us, and we’ll check it and get back to you.

Heres the psychology behind the typical ponzis & HYIP’s run by the professional scammers. They know most people will do this.

You deposit a small amount, you want to be cautious, you cant quite figure out how they do this but they double it (or pay promised interest) and pay you. You think Ah thats great, so you either redeposit the entire amount, or just your profit. You get that back and think wow, it works, so you deposit a much larger amount and in the worst case, even get your friends involved in this wonderful money making scheme.

Then one day it doesnt get returned there is some issue with your account, or your withdrawal is stuck or something similar, so you keep emailing the site and gradually it dawns on you that youve been scammed.

Even if you just put your initial profit back in, the conman hasnt lost anything and the depositors who think they are playing the ponzi do try that, and most of them dont get it back either.

Some people empty their savings into these scams, and they are the ones the scammers are really after. Once they get that big depositor, they move on and create a new ponzi, just leaving the old one alive for a while to mop up any new mugs Some even return after a 3 or 6 month absence to catch a fresh load of hits, they will never run out of victims. Its what they do, and they are expert at it.

Declaration of Interests. We currently have personal and project investments in VIP and Mining shares at Miningsweden.se, and mining shares at Hashnest We would not invest in anything we considered to be a Ponzi or Scam. As a project, we are not directly funded by any organisation and depend on ad revenue, our own, and other donations, and our external investments. We also provide links including referral links to trusted 3rd party sites, not including advertisements beyond our control. Updated August 2015 PS – As a friendly tip, we probably aren’t the people to generally ask about good bitcoin investments. We are pretty good at what we do, but so far, like yourselves no doubt, we aren’t really that succesful when it comes to our own investments. Mintsy being our latest fail.

The high costs of running this site are helped by adverts. We also have to advertise in the same places as the scamsites. We have little control over the content, and consequently we do not directly endorse any advert. Some adverts will even appear in our Badlist. But at least the Bitcoin they spend on ads is coming back into the Bitcoin Industry.

Footnote. The evolution of society beyond the demise of the failed capitalist neo-liberal experiment, first needs the evolution of it’s means of trade and exchange. The current financial system, and system of fiat currency, is not fit for present or future purpose, and for all intents and purposes is already obsolete. Bitcoin is our first financial step towards a fairer, more benefecial society for all. Bitcoin is incorruptible, decentralised, concensus led, and above the influence of conventional politics and economics. A parallel currency with which you can begin to trade, and no middleman to take their slice or to gamble with your asset. When you deposit money to a Bank, it becomes the Banks property to do with what they choose, bitcoin is different, and you are your own Bank. It is up to you to take care of your bitcoin, and also to use it, not hoard it, and to be an important part of helping to build this fair and open global society. Bitcoin is worth what somebody is prepared to exchange it for, be that USD, Yuan, PC-hardware, Webhosting or anything that ‘money’ might buy. You can even get a bitcoin Debit Card. However, the bitcoin Blockchain, and it’s potential is a much much bigger subject.

Read the original here:
Badbitcoin.org – Helping you stay Safe in the World of …

Second Amendment | Fox News

 Second Amendment  Comments Off on Second Amendment | Fox News
Oct 192015
 

Luby’s massacre survivor speaks out on gun control debate

Suzanna Hupp slams Hillary Clinton’s gun control plan on ‘The Kelly File’

Gun control advocates are launching a new regulatory push in California to impose first-in-the-nation instant background checks for ammunition sales, a move that comes as gun viole…

Alan Colmes vs: Larry Pratt on why he believes gun registration is the first step towards total confiscation of all guns

Texas professor is worried about students bringing guns to campus under new law; Daniel Hamermesh sounds off on ‘The Kelly File’

Pres. Obama’s visit to Oregon a week after shooting massacre not welcome by some Roseburg residents and the publisher of the Roseburg Beacon. ‘On the Record’ takes a closer look

Judge Napolitano’s Chambers: The Judge reminds the people what the 2nd Amendment means in 2015 and why Hillary Clinton should not convince anyone to not have guns

While the FBI continued to analyze the emails Hillary Clinton thought she deleted and her advisers pressed her to hire a Republican criminal defense attorney in Washington, a madma…

Starnes Exclusive: Franklin Graham condemns Obama’s reaction to the Oregon school shooting, defends Dr. Ben Carson’s controversial comments about the tragedy and discusses his fath…

Viewer tired of talking heads

Donald Trump goes ‘On the Record’ on his biggest disappointment with Pres. Obama, says Putin clearly has a ‘lack of respect for the president. Trump also sounds off on latest 2016 …

Read more:
Second Amendment | Fox News

The NSA wants front door access to your encrypted data

 NSA  Comments Off on The NSA wants front door access to your encrypted data
Apr 142015
 

Last December, I had the opportunity to travel to the Netherlands to meet with multiple European tech companies, web hosts, and other infrastructure providers. The topic of intelligence agency backdoors and US corporate involvement with such policies came up more than once, often in not-entirely-friendly ways. Its therefore refreshing to see the head of the NSA, Admiral Michael S. Rogers, state up front that the NSA isnt interested in a backdoor solution to digital surveillance. Instead, he wants a so-called front-door solution which could be even worse.

Instead of handing the NSA a unilateral window into encrypted communications taking place at Google or Apple, Rogers suggested a future in which the encryption keys to access such information would be divided between at least two groups possibly more. In the simplest example, Google would retain half the key, while the NSA held the other half. Thus, the agency wouldnt be able to unilaterally snoop inside anyones files it would need Googles support.

I dont want a back door, Rogers, the director of the nations top electronic spy agency, said during a speech at Princeton University, according to the Washington Post. I want a front door. And I want the front door to have multiple locks. Big locks.

The first problem with Rogers proposed front-door solution is that its a meaningless feel-good measure given the current regulatory structure of our national security system. Before the Snowden leaks, Google, Microsoft, and other digital providers were forbidden from disclosing that theyd received national security letters, even in aggregate. Thanks to Snowden, we now know that Yahoo went to bat for users, challenging the legality and authority of the NSA and lost, every time.

Giving half a key to Google or Yahoo would be meaningless unless the company possesses the authority to refuse to use it. In theory, the court system offers robust oversight of how such capabilities are used. In practice, the FISA court has operated more like a rubber stamp body than an organization devoted to judicial oversight. The government, as a whole, doesnt currently have a great track record of respecting suspects rights the FBI is on record as ordering local police departments to drop cases rather than disclose how secret stingray hardware may have been used in ways that fundamentally violate those suspects Fourth Amendment rights.

The other systemic problem with Rogers suggestion is that it assumes a degree of trust between corporations and government at a time when such good feelings are at an all-time low. The NSA has demonstrated no practical ability to differentiate between friend and foe. Its decision to hoover up data running across Googles transatlantic cables may have been legal, but it illustrated a total lack of respect for Google and a willingness to resort to extrajudicial methods when it was convenient.

The NSA could avoid this problem by sharing the key with government-appointed escrows rather than corporations, but this simply hides the process from public view. Thats already extremely problematic.

The technological problems with the NSAs front-door policy are formidable. The divide the key among trusted parties, approach isnt new the NSA proposed exactly this method of securing its ill-fated Clipper Chip in the early 1990s. At the time, the newly-formed EFF and other consumer advocacy agencies battled the NSAs proposed system, noting that it exposed citizens to increased surveillance while providing no assurance that the cryptographic standard, dubbed Skipjack, was actually secure.

Many of these questions would remain in any escrow system the government dreamed up today. The basic question is, is it possible to design a completely secure system to hold a master key available to the U.S. government but not adversaries, said Donna Dodson, chief cybersecurity adviser at the Commerce Departments National Institute of Standards and Technologies. Theres no way to do this where you dont have unintentional vulnerabilities.

Hackers, generally speaking, dont go after the code itself or attempt to brute-force it instead, they work to compromise the organizations that hold the keys, or find other avenues of attack. Splitting the key into parts is only an advantage if the parts cant be combined or analyzed for clues to the final key structure. In order to function properly, every escrow needs to be secure, and every one-time access key needs to be destroyed.

Read more here:
The NSA wants front door access to your encrypted data

Maine Police Pay Ransomware Demand in Bitcoin

 Bitcoin  Comments Off on Maine Police Pay Ransomware Demand in Bitcoin
Apr 142015
 

The Lincoln County Sheriff’s Office and four town police departments were infected with the “megacode” virus.

In an effort to keep their computer files from being destroyed, a group of cooperative police departments in Maine paid a $300 ransom demandin bitcoin.

According to local news station WCSH-TV, the shared computer system of the Lincoln County Sheriff’s Office and four town police departments was infected with the “megacode” virus.

When someone using the communal network accidentally downloaded the virus, an encryption code locked all the computer data, holding it for ransom. After the $300 fee was paid via a bitcoin transfer, the police received a code to unlock the encryption and restore their files.

“We needed our programs to get back online,” Damariscotta Police Chief Ron Young told WCSH-TV. “And that was a choice we all discussed and took to get back on line to get our information.”

There is no official word on who carried out the attack; the FBI could only track the bitcoin payment to a Swiss bank account.

The hackcommonly known as ransomwareis a virus that blackmails users by encrypting their hard drives or locking them out of their computer. The only way to gain access again: pay the monetary demand. There is no guarantee, however, that the machine will be restored.

A similar struggle was depicted in a fall episode of CBS drama The Good Wife. The hackers demanded $50,000 on the show, but real-life ransoms are typically a much less pricey $200 to $400.

A common currency for paying off hackers, bitcoin was named the world’s worst legal tender for 2014 by Bloomberg, which said bitcoin peaked at around $1,130 in 2013, landing at $320 by the end of last year.

For more, see Everything You Need to Know About Bitcoin.

Read more:
Maine Police Pay Ransomware Demand in Bitcoin

Is encryption the Second Amendment for the Internet?

 Second Amendment  Comments Off on Is encryption the Second Amendment for the Internet?
Apr 112015
 

Last week, FBI Director James Comey once again campaigned for backdoors into the encryption programs of tech companies, writes Sunday Yokubaitis at the Daily Dot.

Tech execs say privacy should be the paramount virtue, he told the House of Representatives Appropriations Committee. When I hear that, I close my eyes and try to imagine what the world looks like where pedophiles cant be seen, kidnappers cant be seen, [and] drug dealers cant be seen.

The United States government is playing to fear, uncertainty, and doubt. The reality is the government already collects a tremendous amount of personal data about its citizens through the location data our phones give away, National Security Agency metadata programs and online shopping habits without our consent.

Encryption is how privacy-conscious Internet users fight back against the unblinking eye of government mass surveillance and protect themselves online. Even if the NSA can break some encryption technologies, were at least making it harder and more expensive for them to track law-abiding citizens en masse. When Comey asks for backdoors, he is really just asking to make his job easierwith dubious benefits and very serious risks.

We must protect encryption because backdoors are inherently insecure.

Todays Question: Is encryption the Second Amendment for the Internet?

Read more:
Is encryption the Second Amendment for the Internet?

 Posted by at 6:42 am  Tagged with:

A fatal wrong turn suspected at NSA – The Washington Post

 NSA  Comments Off on A fatal wrong turn suspected at NSA – The Washington Post
Apr 032015
 

Local television showed two damaged vehicles near a gate and emergency workers loading an injured uniformed man into an ambulance. (AP)

(Updated: FBI identifies man involved in deadly incident at NSA security gate)

The overnight tryst began in Baltimore, with three men, two dressed as women. It continued at a motel on U.S. 1, and when one of the men woke up Monday morning, his two cross-dressing companions, and his Ford Escape, were gone.

The dark-colored Escape was headed south on the Baltimore-Washington Parkway. Its driver, in what authorities believe could have been a mistake, took a restricted exit leading to a security post at the sprawling campus of the National Security Agency at Fort Meade, Md.

An NSA statement said the driver ignored police commands to stop and instead accelerated toward a police vehicle as at least one officer opened fire. The stolen SUV crashed into the cruiser. One man died at the scene, and the other was taken to a hospital for treatment. An NSA officer also was injured, though officials did not say how.

What had first appeared to be an attempt to breach security at the listening post that eavesdrops on communications throughout the world now appears to be a wrong turn by two men who police believe had robbed their companion of his vehicle and perhaps didnt stop because there were drugs inside.

A spokeswoman for the Baltimore office of the FBI, Amy J. Thoreson, said early in the investigation that authorities do not believe [the incident] is related to terrorism. A law enforcement official said: This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.

Police have not released the identities of the people involved, or the conditions of the man who survived the incident and the injured NSA officer. The NSA statement did not say whether either person in the car was struck by gunfire or was injured as a result of the crash.

Details about how the incident began were pieced together with information from several law enforcement officials and others familiar with the case, who spoke on the condition they not be named in order to discuss a pending case.

A Howard County police spokeswoman confirmed that the men involved stayed at a Jessup motel and that the owner of the SUV called police Monday morning to report it stolen.

Here is the original post:
A fatal wrong turn suspected at NSA – The Washington Post

2 men dressed as women ram NSA gate

 NSA  Comments Off on 2 men dressed as women ram NSA gate
Apr 032015
 

Story highlights Two people tried to enter the main gate to enter the headquarters of the National Security Agency at Fort Meade. One died at the scene, and another was wounded, the NSA says.

His passenger who remained hospitalized Tuesday has not been publicly identified.

On Monday morning, Hall attempted to gain entry at the National Security Agency headquarters, Jonathan Freed, NSA director of strategic communications, said in a statement.

“The driver failed to obey an NSA Police officer’s routine instructions for safely exiting the secure campus. The vehicle failed to stop and barriers were deployed.”

NSA police on the scene fired on the vehicle when it accelerated toward a police car, blocking its way, according to the NSA. An NSA police officer was also hospitalized but not identified.

The two men who officials say tried to ram the main gate at NSA headquarters were dressed as women, according to a federal law enforcement official.

Investigators are looking into whether the men were under the influence of drugs following a night of partying, a federal law enforcement official said.

A man reported his car stolen from a hotel not far away from NSA Headquarters and said he had been with two men who had taken his car. Cocaine was found in the vehicle. The Howard County Police Department confirms that a Ford Escape reported stolen in Howard County, Maryland, is the vehicle involved in the incident.

The FBI said Monday morning that it was conducting an investigation with NSA police and other law enforcement agencies, and interviewing witnesses on the scene. The incident took place near one of the gates to the complex, far from the main buildings. The FBI said they did not think terrorism was related to the incident.

“We are working with the U.S. Attorney’s Office in Maryland to determine if federal charges are warranted,” the FBI said in a statement.

More here:
2 men dressed as women ram NSA gate

Justice Department Won't Charge IRS' Lois Lerner With Criminal Contempt

 Fifth Amendment  Comments Off on Justice Department Won't Charge IRS' Lois Lerner With Criminal Contempt
Apr 022015
 

Updated at 4:33 p.m. ET

The Justice Department will not pursue criminal contempt charges against former IRS official Lois Lerner, who was at the center of a political storm over the agency’s alleged targeting of conservative groups. The announcement came from Ronald Machen, the outgoing U.S. attorney for the District of Columbia, to House Speaker John Boehner. (The letter is embedded at the bottom of this story.)

Here’s the background: Lerner invoked her Fifth Amendment rights and refused to testify before the House Oversight and Government Reform Committee in March 2014. But Rep. Darrell Issa, R-Calif., who headed that panel, said at the time that Lerner had waived that right by making an opening statement at a May 2013 hearing in which she proclaimed her innocence in short opening remarks.

The House voted later in 2014 to hold Lerner in criminal contempt. Machen’s office was examining the case and, in the letter dated March 31, he disagreed with Issa’s interpretation.

“Ms. Lerner did not waive her Fifth Amendment privilege by making general claims of innocence,” his office said in a statement. “The Constitution would provide Ms. Lerner with an absolute defense if she were prosecuted for contempt.”

Wednesday’s announcement grants a reprieve to the former IRS official, who at the time of the controversy led the agency’s division that oversees tax-exempt groups. William Taylor, her attorney, said in a statement: “We are gratified but not surprised by today’s news.”

But as Politico notes, she and other officials from the Internal Revenue Service are still under investigation by the FBI for the IRS’ targeting of conservative groups.

As NPR’s Mark Memmott reported at the time: “[A] report … concluded some conservative groups had been ‘deliberately targeted.’ (Democrats have released IRS documents showing liberal groups also came in for extra scrutiny.) A political furor erupted, eventually leading to the resignation of the agency’s acting director. Lerner retired from the agency later in the year.”

You can read the letter in full here:

View post:
Justice Department Won't Charge IRS' Lois Lerner With Criminal Contempt

 Posted by at 12:50 pm  Tagged with:

Cross-dressing man killed by NSA had lengthy record (+video)

 NSA  Comments Off on Cross-dressing man killed by NSA had lengthy record (+video)
Apr 012015
 

Fort Meade, Md. Two cross-dressing men who were fired upon by National Security Agency police when they disobeyed orders at a heavily guarded gate had just stolen a car from a man who had picked them up and checked into a motel, police said Tuesday.

The FBI said the driver, Ricky Shawatza Hall, 27, died at the scene, and his passenger remained hospitalized Tuesday with unspecified injuries. An NSA police officer was treated for minor injuries and released.

NSA police opened fire on the stolen sports utility vehicle after Mr. Hall failed to follow instructions for leaving a restricted area, authorities said.

As it turns out, Hall and his passenger had just driven off in the SUV of a 60-year-old Baltimore man, who told investigators that he had picked up the two strangers in Baltimore and brought them to a Howard County motel.

“We can’t confirm there was any sexual activity involved,” a Howard County Police spokeswoman, Mary Phelan, told The Associated Press on Tuesday.

The SUV’s owner, who has not been publicly identified, said they checked into a room at the Terrace Motel in Elkridge at about 7:30 a.m. Monday, and that he used the bathroom about an hour later. When he came out, the men were gone, along with his car keys.

He called police to report the stolen car, and only minutes later, just before 9 a.m., the men took a highway exit that leads directly to a restricted area at the NSA entrance at Fort Meade.

The two men were dressed as women, but “not in an attempt to disguise themselves from authorities,” FBI spokeswoman Amy Thoreson said.

Hall has a lengthy criminal record that includes assault and robbery charges. In 2013, Hall was charged after he assaulted a woman and stole a bottle of methadone from her pocket. Court papers show that Hall had been wearing a yellow dress at the time of the assault and was mistaken for a woman. In 2014, Hall was charged with robbery after stealing a vest and skirt from a Baltimore clothing store.

The FBI has ruled out terrorism, and no one has explained yet why the men ended up in a restricted NSA area.

Read more from the original source:
Cross-dressing man killed by NSA had lengthy record (+video)

NSA: Car smashes into police vehicle at Fort Meade; 1 dead

 NSA  Comments Off on NSA: Car smashes into police vehicle at Fort Meade; 1 dead
Mar 312015
 

By Meredith Somers And Lolita C. Baldor Associated Press

FORT MEADE, Md. (AP) Two men dressed as women smashed a stolen car into a police vehicle after they disobeyed commands at the closely guarded gates of the National Security Agency on Monday, prompting police to open fire.

One of the men died, the other was injured and a police officer also was taken to a hospital. Details remained unclear hours later. Initial images from the scene showed emergency workers loading the uniformed officer into an ambulance. Nearby were a dark-colored SUV and an SUV emblazoned with “NSA Police,” both heavily damaged.

It was not known why the men wound up at the gate at Fort Meade, a sprawling military post that houses the National Security Agency, or why they did not obey orders from NSA police. Fort Meade is just off Interstate 295 between Baltimore and Washington.

A helicopter hovers over Fort Meade after a vehicle rammed a gate to the National Security Agency, Monday, March 30, 2015 in Fort Meade, Md. One person was killed in a firefight that erupted Monday after a car with two people tried to ram a gate at the Fort Meade, Md., military base near a gate to the National Security Agency, according to preliminary reports cited by two U.S. officials. (AP Photo/Andrew Harnik) (Andrew Harnik/AP)

The men were dressed as women, said a senior defense official who spoke on condition of anonymity because the official was not authorized to discuss an ongoing case. It also was unclear exactly what the men were wearing.

The NSA said in a news release that investigators have not yet determined how the man in the vehicle died, and the conditions of the wounded man and officer were not disclosed.

An agency officer gave the driver “routine instructions for safely exiting the secure campus,” but the driver disobeyed them, the release said. The driver then accelerated toward a police vehicle blocking the road, and police then opened fire.

An FBI spokeswoman said earlier in the day that the incident was not believed to be linked to terrorism. The NSA said the incident was contained to the perimeter of the secure campus.

The car that rammed the police vehicle had been stolen Monday morning from a hotel in Jessup, Maryland, said Mary Phelan, a spokeswoman for the Howard County Police Department. She declined to name the hotel, citing the ongoing investigation, or release any further details, referring all questions to the FBI.

Go here to read the rest:
NSA: Car smashes into police vehicle at Fort Meade; 1 dead

 Posted by at 7:50 am  Tagged with:

Man dressed as woman killed at NSA

 NSA  Comments Off on Man dressed as woman killed at NSA
Mar 312015
 

Story highlights Two people tried to enter the main gate to enter the headquarters of the National Security Agency at Fort Meade. One died at the scene, and another was wounded, the NSA says.

“Shortly before 9:00 AM today, a vehicle containing two individuals attempted an unauthorized entry at a National Security Agency gate,” Jonathan Freed, NSA director of strategic communications, said in a statement. “The driver failed to obey an NSA Police officer’s routine instructions for safely exiting the secure campus. The vehicle failed to stop and barriers were deployed.”

NSA police on the scene fired on the vehicle when it accelerated toward a police car, blocking its way, according to the NSA. One of the unauthorized vehicle’s two occupants died on the scene. The other was hospitalized, as was an NSA police officer.

The two men who officials say tried to ram the main gate at NSA headquarters were dressed as women, according to a federal law enforcement official.

Investigators are looking into whether the men were under the influence of drugs following a night of partying, a federal law enforcement official said.

A man reported his car stolen from a hotel not far away from NSA Headquarters and said he had been with two men who had taken his car. Cocaine was found in the vehicle. The Howard County Police Department confirms that a Ford Escape reported stolen in Howard County, Maryland, is the vehicle involved in the incident.

The FBI said Monday morning that it was conducting an investigation with NSA police and other law enforcement agencies, and interviewing witnesses on the scene. The incident took place near one of the gates to the complex, far from the main buildings. The FBI said they did not think terrorism was related to the incident.

“We are working with the U.S. Attorney’s Office in Maryland to determine if federal charges are warranted,” the FBI said in a statement.

White House Principal Deputy Press Secretary Eric Schultz said President Barack Obama had been briefed on the incident this morning.

This is the second security incident this month involving the NSA. At the beginning of March, a former state correctional officer was arrested, accused in a string of Maryland shootings, including one at Fort Meade. Gunshots struck a building near the NSA office, according to a police report.

Read more here:
Man dressed as woman killed at NSA

Undercover agents 'stole Bitcoin' while investigating Silk Road

 Bitcoin  Comments Off on Undercover agents 'stole Bitcoin' while investigating Silk Road
Mar 312015
 

Force, a special agent with the Drug Enforcement Administration, was the lead undercover agent in communication with Dread Pirate Roberts in the probe, which aimed to build evidence that Silk Road was a platform for drug deals financed by the crypto-currency Bitcoin.

With one of these identities he offered Dread Pirate Roberts protection from the FBI probe in exchange for $250,000-worth of Bitcoin, and with another he offered to sell information about the probe for $100,000 in the currency.

Meanwhile, he kept funds used in FBI transactions on Silk Road to build evidence against the website and Ulbricht.

Also as part of the investigation, Bridges, a special agent with the Secret Service, obtained access to a Silk Road website administrator account just before a huge theft of Bitcoin from the website.

The Justice Department said the stolen Bitcoin were moved to Tokyo-based Mt Gox, at the time the leading Bitcoin exchange. Weeks later Bridges began moving $820,000-worth of Bitcoin in several transfers from Mt Gox to a US account he controlled.

Bridges made the last transfer from Mt Gox to his US account just two days before he took part in a Justice Department order to seize millions of dollars from Mt Gox and its owner.

Force is being charged with wire fraud, theft of government property and money laundering, while Bridges is charged with wire fraud and money laundering.

In February this year in a New York trial, a jury found that Ulbricht was indeed Dread Pirate Roberts and found him guilty of drug trafficking, computer hacking and money laundering.

More:
Undercover agents 'stole Bitcoin' while investigating Silk Road

 Posted by at 7:47 am  Tagged with:

NSA considered scrapping phone program before Snowden leaks

 NSA  Comments Off on NSA considered scrapping phone program before Snowden leaks
Mar 292015
 

National Security Agency Director Michael Rogers testifies before a House (Select) Intelligence Committee hearing in Washington November 20, 2014. The NSA considered abandoning its secret program to collect and store American call records before leaker Edward Snowden revealed the practice, intelligence officials say. Photo by Joshua Roberts/Reuters

WASHINGTON The National Security Agency considered abandoning its secret program to collect and store American calling records in the months before leaker Edward Snowden revealed the practice, current and former intelligence officials say, because some officials believed the costs outweighed the meager counterterrorism benefits.

After the leak and the collective surprise around the world, NSA leaders strongly defended the phone records program to Congress and the public, but without disclosing the internal debate.

The proposal to kill the program was circulating among top managers but had not yet reached the desk of Gen. Keith Alexander, then the NSA director, according to current and former intelligence officials who would not be quoted because the details are sensitive. Two former senior NSA officials say they doubt Alexander would have approved it.

Still, the behind-the-scenes NSA concerns, which have not been reported previously, could be relevant as Congress decides whether to renew or modify the phone records collection when the law authorizing it expires in June.

The internal critics pointed out that the already high costs of vacuuming up and storing the to and from information from nearly every domestic landline call were rising, the system was not capturing most cellphone calls, and program was not central to unraveling terrorist plots, the officials said. They worried about public outrage if the program ever was revealed.

After the program was disclosed, civil liberties advocates attacked it, saying the records could give a secret intelligence agency a road map to Americans private activities. NSA officials presented a forceful rebuttal that helped shaped public opinion.

Responding to widespread criticism, President Barack Obama in January 2014 proposed that the NSA stop collecting the records, but instead request them when needed in terrorism investigations from telephone companies, which tend to keep them for 18 months.

Yet the president has insisted that legislation is required to adopt his proposal, and Congress has not acted. So the NSA continues to collect and store records of private U.S. phone calls for use in terrorism investigations under Section 215 of the Patriot Act. Many lawmakers want the program to continue as is.

Alexander argued that the program was an essential tool because it allows the FBI and the NSA to hunt for domestic plots by searching American calling records against phone numbers associated with international terrorists. He and other NSA officials support Obamas plan to let the phone companies keep the data, as long as the government quickly can search it.

Go here to read the rest:
NSA considered scrapping phone program before Snowden leaks

 Posted by at 7:54 pm  Tagged with:

AP Exclusive: Some at NSA thought costs of collecting US calling records exceeded the benefits

 NSA  Comments Off on AP Exclusive: Some at NSA thought costs of collecting US calling records exceeded the benefits
Mar 292015
 

WASHINGTON The National Security Agency considered abandoning its secret program to collect and store American calling records in the months before leaker Edward Snowden revealed the practice, current and former intelligence officials say, because some officials believed the costs outweighed the meager counterterrorism benefits.

After the leak and the collective surprise around the world, NSA leaders strongly defended the phone records program to Congress and the public, but without disclosing the internal debate.

The proposal to kill the program was circulating among top managers but had not yet reached the desk of Gen. Keith Alexander, then the NSA director, according to current and former intelligence officials who would not be quoted because the details are sensitive. Two former senior NSA officials say they doubt Alexander would have approved it.

Still, the behind-the-scenes NSA concerns, which have not been reported previously, could be relevant as Congress decides whether to renew or modify the phone records collection when the law authorizing it expires in June.

The internal critics pointed out that the already high costs of vacuuming up and storing the “to and from” information from nearly every domestic landline call were rising, the system was not capturing most cellphone calls, and program was not central to unraveling terrorist plots, the officials said. They worried about public outrage if the program ever was revealed.

After the program was disclosed, civil liberties advocates attacked it, saying the records could give a secret intelligence agency a road map to Americans’ private activities. NSA officials presented a forceful rebuttal that helped shaped public opinion.

Responding to widespread criticism, President Barack Obama in January 2014 proposed that the NSA stop collecting the records, but instead request them when needed in terrorism investigations from telephone companies, which tend to keep them for 18 months.

Yet the president has insisted that legislation is required to adopt his proposal, and Congress has not acted. So the NSA continues to collect and store records of private U.S. phone calls for use in terrorism investigations under Section 215 of the Patriot Act. Many lawmakers want the program to continue as is.

Alexander argued that the program was an essential tool because it allows the FBI and the NSA to hunt for domestic plots by searching American calling records against phone numbers associated with international terrorists. He and other NSA officials support Obama’s plan to let the phone companies keep the data, as long as the government quickly can search it.

Civil liberties activists say it was never a good idea to allow a secret intelligence agency to store records of Americans’ private phone calls, and some are not sure the government should search them in bulk. They say government can point to only a single domestic terrorism defendant who was implicated by a phone records search under the program, a San Diego taxi driver who was convicted of raising $15,000 for a Somali terrorist group.

View original post here:
AP Exclusive: Some at NSA thought costs of collecting US calling records exceeded the benefits

 Posted by at 7:54 pm  Tagged with:

Rule 41 Change Could Allow FBI To Get Warrants To Remotely Search Suspects' Computers Without Notice

 Fourth Amendment  Comments Off on Rule 41 Change Could Allow FBI To Get Warrants To Remotely Search Suspects' Computers Without Notice
Mar 222015
 

The Department of Justice recently edged closer to a rule change that would allow the FBI to track suspected criminals’ computer activity more easily. The Judicial Conference Advisory Committee on Criminal Rules voted last week in favor of an update to Rule 41, which dictates how judges can issue search warrants on electronic devices, Government Executive reported. The new rule 41 would let judges OK warrants to examine computers remotely anywhere as opposed to only those in their districts. The FBI would also no longer would be required to give users notice ahead of its searches.

“The rule itself would be an acknowledgement that remote access searches are valid without notice, without special justification,” Electronic Privacy Information Center general counsel Alan Butler told Gizmodo. “Notice is one of the essential procedural protections of the Fourth Amendment. Validating a rule that implies that notice will never happen does not comport with the Fourth Amendment.”

The Fourth Amendment forbids unreasonable searches and seizures.

The FBI has requested the rule change to better function in the 21st-century world of technology, DefenseOnereported. The agency would have more options, like the authority to secretly install tracking software on the computers of alleged criminals.

Privacy groups are opposed to this. Google came out against the Rule 41 change last week, arguing it raises a number of monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide. The Department of Justice fired back, saying the amendment had been misread and would not authorize the government to undertake any search or seizure or use any remote search technique not already permitted under current law.

In any event, the proposal will next go before the Standing Committee on Rules of Practice and Procedure, then the Supreme Court. If approved, Gizmodo reported, Rule 41 could be updated by December 2016.

Originally posted here:
Rule 41 Change Could Allow FBI To Get Warrants To Remotely Search Suspects' Computers Without Notice

 Posted by at 4:50 pm  Tagged with:

The DOJ Is Sneaking in a Policy That'd Crap All Over the 4th Amendment

 Fourth Amendment  Comments Off on The DOJ Is Sneaking in a Policy That'd Crap All Over the 4th Amendment
Mar 192015
 

The rules for how the Department of Justice tracks down criminals in the digital age are woefully arcane, but the DoJ’s recent proposed changes to update those rules go way too far, using vague terms to grant sweeping remote search powers that would radically undermine the Fourth Amendment.

Under the auspices of probable cause, it’d give FBI agents the power to install tracking malware on computers all over the world, without telling people they’ve started surveillance. Even though it looks like a minor rule change, the proposal would make it much easier for FBI agents to get warrants on computers without first figuring out their exact location. It gives judges much more flexibility on handing out remote search warrants outside of their jurisdictions. And that would give federal agents way more power to search computers.

This proposal isn’t just the DOJ being Big Brothery for no reason. Remote computer searches are difficult to execute right now and that’s an obstacle for combating digital crime and hunting criminals who use anonymizing software. This is a real problem, and something that needs to be addressed. But not this way. This is like using a nuke instead of a sniper rifle, and it’s going to blow up our privacy rights.

I’m not going to lie, I didn’t think I’d ever write an article about a DOJ procedural change because frankly, that sounds like comically dull policy housekeeping. And comically dull is what they were going for: It’s a lot easier to slip in a major expansion of power if no one cares enough to pay attention.

But this proposal is way too big not to notice, no matter how boring-sounding and rote the DOJ tries to make it.

“Basically, we think this is a substantive legal change masquerading as a mere procedural rule change,” Electronic Frontier Foundation staff counsel Hanni Fakhoury told me via email. “The government is essentially pushing for approval of the idea that it should have the power to deploy malware and execute remote searches. To us, it seems like that’s a decision Congress should make.”

The vague language of these rules could galvanize an avalanche of covert government surveillance by making it totally OK in certain situations to search peoples’ computers without ever letting them know. And that’s a violation of the Bill of Rights hidden inside a wonky-sounding procedural adjustment.

Right now, law enforcement officials can get a warrant to search computers remotely, as long as they have probable cause. But, apart from rare, limited circumstances, they need to find the right jurisdiction to petition for a warrant, and they need to give notice of their searches to whoever they’re investigating. Notice is an important part of our Fourth Amendment privacy right. It’s generally not legal for FBI agents to search you and never tell you. Except this change would make it so.

“The rule itself would be an acknowledgement that remote access searches are valid without notice, without special justification,” Electronic Privacy Information Center general counsel Alan Butler told me. “Notice is one of the essential procedural protections of the Fourth Amendment. Validating a rule that implies that notice will never happen does not comport with the Fourth Amendment.”

See the article here:
The DOJ Is Sneaking in a Policy That'd Crap All Over the 4th Amendment

 Posted by at 11:50 pm  Tagged with:

"Illuminati Exposed" | FBI VAULT UTAH UFO CASE INTERVIEW _ FOOTAGE 1949 – Video

 Illuminati  Comments Off on "Illuminati Exposed" | FBI VAULT UTAH UFO CASE INTERVIEW _ FOOTAGE 1949 – Video
Mar 132015
 



“Illuminati Exposed” | FBI VAULT UTAH UFO CASE INTERVIEW _ FOOTAGE 1949
“Illuminati Exposed” | FBI VAULT UTAH UFO CASE INTERVIEW _ FOOTAGE 1949 , Revealing the truth about “The Greater Darkness” In Our World Today… Watch: …

By: Illuminati Exposed

See original here:
"Illuminati Exposed" | FBI VAULT UTAH UFO CASE INTERVIEW _ FOOTAGE 1949 – Video

 Posted by at 2:45 pm  Tagged with:



Pierre Teilhard De Chardin | Designer Children | Prometheism | Euvolution | Transhumanism