Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images.

But DeFoggiconvicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child pornmust have believed his use of the Tor anonymizing network shielded him from federal investigators.

Hes the sixth suspect to make this mistake in Operation Torpedo, an FBI operation that targeted three Tor-based child porn sites and that used controversial methods to unmask anonymized users.

But DeFoggis conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services. DeFoggi worked for the department from 2008 until January this year. A department official told Business Insider that DeFoggi worked in the office of the assistant secretary for administration as lead IT specialist but a government budget document for the department from this year (.pdf) identifies a Tim DeFoggi as head of OS IT security operations, reporting to the departments chief information security officer.

The porn sites hes accused of usingincluding one called PedoBookwere hosted on servers in Nebraska and run by Aaron McGrath, who has already been convicted for his role in the sites. The sites operated as Tor hidden servicessites that have special .onion URLs and that cannot normally be traced to the physical location where they are hosted.

Although anyone could use the sites, registered users like DeFoggiwho was known online under the user names fuckchrist and PTasseatercould set up profile pages with an avatar, often child porn images, and personal information and upload files. The site archived more than 100 videos and more than 17,000 child porn and child erotica images, many of them depicting infants and toddlers being sexually abused by adults.

The FBI seized the sites in late 2012, after McGrath failed to secure his administrative account with a password. Agents were able to log in and uncover the IP address of the Nebraska server where he was hosting two of them. McGrath worked at the server farm, and hosted the third site from his home. The FBI monitored him for a year and after arresting him in November 2012 continued to operate his child porn sites secretly from a federal facility in Omaha for several weeks before shutting them down. During this time, they monitored the private communications of DeFoggi and others and engaged in various investigative techniquesto defeat the anonymous browsing technology afford by the Tor network and identify the real IP addresses of users.

These techniques successfully revealed the true IP addresses of approximately 25 domestic users who accessed the sites (a small handful of domestic suspects were identified through other means, and numerous foreign-based suspect IPs were also identified), prosecutors wrote in a court document. In March 2013, twenty suspects were indicted in Nebraska; followed by two others who were indicted the following August.

One of these techniques involved drive-by downloads that infected the computers of anyone who visited McGraths web sites. The FBI has been using malicious downloads in this way since 2002, but focused on targeting users of Tor-based sites only in the last two years.

Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates.

Follow this link:
Federal Cybersecurity Director Found Guilty on Child Porn Charges

The Senate report is called National Security Agency Surveillance Affecting Americans, and describes the results of its investigation into NSAs electronic surveillance practices and capabilities, especially involving American citizens, groups, and organizations.

Among its findings are:

Project MINARET, in which the NSA intercepted and disseminated international communications of U.S. citizens and groups whose names were supplied by other agencies and put on a watch list. Those listed were supposed to be linked to concerns about narcotics, domestic violence and antiwar activities.

It was part of an attempt to discover if there was a foreign influence on them, according to the Senate report. NSA personnel were instructed to keep the agencys name off any distributed reports in order to restrict the knowledge that NSA was collecting such information, the report said.

Operation SHAMROCK involved the collection of millions of international telegrams sent to, from or transiting the United States provided to NSA by the three major international telegraph companies. In some years NSA analysts reviewed 150,000 telegrams a month, according to the committee. What began at the end of World War II as an Army Signals Security Agency project to get access to foreign government messaging morphed into collecting calls from a watch list of Americans whose names were supplied by the Bureau of Narcotics and Dangerous Drugs.

The CIA, the FBI and others joined in. Over one four-year period when the list had 1,200 names the committee said NSA distributed approximately 2,000 reports [the texts or summaries of intercepted messages] to the various requesting agencies as the result of inclusion of American names on the watch lists.

Any of this sound familiar?

This was the 1976 report, one of 14 from the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, chaired by then-Sen. Frank Church (D-Idaho). One direct result of the Church committees activities, which began as a probe into domestic CIA activities in the 1960s and 1970s, was the Foreign Intelligence Surveillance Act (FISA). President Jimmy Carter signed the bill into law in 1978.

That law, amended several times, has provided a legal foundation for NSAs operations. It also added judicial and congressional oversight of NSA with the establishment of the Foreign Intelligence Surveillance Court and the House and Senate intelligence committees. At the same time, it continued secrecy for operations necessary to carry out electronic surveillance to protect national security. It allowed intercepts abroad of foreign entities and individuals without a warrant when collecting foreign intelligence. When the target became a U.S. citizen or someone known to be in the United States, a warrant was required within 72 hours.

History does at times seem to repeat itself.

The rest is here:

This NSA history has a familiar ring to it

As a teenager growing up in Chicago in the 1970s, Rogers recalls watching news broadcasts with his family and being horrified by how the CIA, FBI and NSA had illegally spied on hundreds of thousands of Americans. Four decades later, and six weeks into his new job as director of the NSA, the agency is facing similar accusations: that it has used its vast and intrusive surveillance powers to …

See the original post here:

Post-Snowden, the NSA's future rests on Admiral Rogers' shoulders

Microsofts cooperation with the NSA and FBI on the controversial Prism program has been laid bare in a new book written by an American journalist who brought it to public attention in the first place.

Glenn Greenwald, the American journalist who worked extensively with Edward Snowden, wrote in a new book that Microsofts cloud services allowed the National Security Agency [NSA] to collect data from a range of its different cloud options.

“Beginning on 7 March 2013, Prism now collects Microsoft SkyDrive data as part of Prism’s standard Store Communications collection package for a tasked FISA Amendments Act Section 702 [FAA702] selector, stated a slide released by Greenwald, according to Cloud Pro.

It is detailed in Greenwalds new book, No Place to Hide: Edward Snowden, the NSA and the Surveillance State, and goes on to hint that Microsoft was implicit in the NSA data collecting process.

“This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established,” the document stated.

Part of the reason that it was able to do this was down to the FISA Amendment Act of 2008 that legalized NSA Internet surveillance and allowed warrantless wiretapping by the NSA and related agencies.

“This means that analysts will no longer have to make a special request to SSO for this. This new capability will result in a much more complete and timely collection response from SSO for our enterprise customers,” the documents added.

Other sabotage methods employed by the NSA and outlined in Greenwalds book include the supply-chain interdiction, which meant intercepting various communications products in order to carry out covert surveillance. This included routers and servers made by Cisco and involved implanting beacons before the products were repackaged and shipped out to customers across the world.

“While American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organizations would have been well advised to beware of American-made ones,” Greenwald said.

Read more:

Microsoft openly offered cloud data to the NSA

Glenn Greenwald on the NSA and Hoover's FBI — political blackmail
Glenn Greenwald, at his Washington, DC presentation at Sixth and I on his new book No Place to Hide, responds to a question from former Congressman Neil Gallagher asked by Jason Ross, on the…

By: Jason Ross

Here is the original post:

Glenn Greenwald on the NSA and Hoover’s FBI — political blackmail – Video

Statue of Liberty: The Lost Symbol
DOWNLOAD:::::FREE GAME:::::*****You'll play the FBI special agent Susan Pierce. She's been sent to Liberty Island to clear up the unbelievable disappearance…

By: MusicDanGames

Read the original here:
Statue of Liberty: The Lost Symbol – Video

Statue of Liberty The Lost Symbol Micoids Eres la agente especial del FBI Susan Pierce. Has sido enviado a la Isla Libertad para aclarar la increble desaparicin de la llama de la Estatua…

By: LosjuegosdelCaldero

See the article here:
Statue of Liberty The Lost Symbol Micoids – Video

Statue of Liberty — The Lost Symbol – Gameplay – PC/HD
(2014) Statue of Liberty — The Lost Symbol – Gameplay – PC/HD —- You'll play the FBI special agent Susan Pierce. She's been sent to Liberty Island to clear up the unbelievable disappearance…

By: FenixSANI

Go here to see the original:
Statue of Liberty — The Lost Symbol – Gameplay – PC/HD – Video

FBI Agents Harass Photographer: First Amendment Test

By: EMSNews Arizona

Originally posted here:
FBI Agents Harass Photographer: First Amendment Test – Video

WASHINGTON, May 7 (UPI) — The high-profile cases of Edward Snowden and Chelsea Manning have turned a microscope onto the U.S. intelligence community, launching a serious discussion on the balance of civil liberties in a post-9/11 world.

Secondary to Snowden and Manning’s revelations, but perhaps no less important, was the treatment of the whistleblowers themselves: Snowden lives exiled, and without a passport, in Russia, while Manning faces 35 years in federal prison. Both saw grievous abuses within the U.S. government that they felt must be revealed, and both paid for their consciences with their freedom.

Thomas Drake, a former NSA executive, was more fortunate. Drake witnessed what he said were privacy and Fourth Amendment violations, as well as a massive waste of funding on the Trailblazer project, which collected intelligence data off the Internet. He initially took his concerns to internal authorities, including the NSA Inspector General and the Defense Department Inspector General, then to the staff of the House Intelligence and Oversight Committees. He also passed his concerns on to a reporter at the Baltimore Sun, carefully avoiding divulging classified information.

In 2007, Drake’s home was raided by the FBI, in 2010, he was indicted by a grand jury and charged with illegally holding sensitive information, obstruction of justice and making a false statement. All along, he refused to plead guilty or help the government prosecute fellow whistleblowers.

The 10 charges filed against him under the Espionage Act were ultimately dropped, in exchange for a guilty plea on a misdemeanor count of misusing the NSA’s computer system.

Drake has since worked as a privacy activist, speaking out against the surveillance state. In an interview with UPI this week, he talked about what it takes to blow the whistle on the U.S. government and just how difficult it is to do.

(This interview has been edited and condensed for clarity.)

UPI: What would you have done differently?

Drake: I would not have spoken with the FBI at all. I was speaking to them to report high crimes and misdemeanors; I was expecting them to come to my house for quite some time. I would have hired an attorney sooner.

Even though I made a conscious choice [to go through the proper channels], I didn’t have to. Under the NSA portion [of the Intelligence Community Whistleblower Protection Act], I could go directly to the Department of Defense or directly to Congress and not inform the NSA. That was the statute that you would exercise if you had a responsible belief as a whistleblower. Now there’s huge cutout: Any national security position is not covered by that act.

See the rest here:

Exclusive Interview: NSA whistleblower on what he'd do differently now

May 042014

NSA proof phone Case
Subscribe for more videos: twitter: Do you need a NSA, CIA, FBI track phone case! If so then this one is for you. BTS:…

By: Randomtvusa

Read more from the original source:

NSA proof phone Case – Video

Friday was the deadline for submissions to a counterterrorism program seeking vendors to help the military understand state-of-the-art technologies that may pose threats to national security, and bitcoin and virtual currencies are listed among them.

The program is being conducted by the Combating Terrorism Technical Support Office, a division of the Department of Defense that identifies and develops counterterrorism abilities and investigates irregular warfare and evolving threats.

An unclassified memo from January unearthed by Bitcoin Magazine detailed solicitations for CTTSO projects. The memo states that one of the mission requirements is for innovative…solutions to develop and/or enhance new concepts and constructs for understanding the role of virtual currencies in financing threats against the United States.

The memo said the blurring of national lines is facilitating the transfer of virtual currencies: The introduction of virtual currency will likely shape threat finance by increasing the opaqueness, transactional velocity, and overall efficiencies of terrorist attacks, it stated.

At the heart of the concern is the anonymity built into the bitcoin architecture. While every bitcoin transaction is public, the parties involved are kept anonymous. With bitcoins, illegal operations can be made with the speed and ease of the Internet and with the secrecy of cash.

Several recent high-profile cases have put bitcoin under greater scrutiny.

In October, the FBI closed down the Silk Road, a digital black market that allowed users to buy drugs, guns and even professional assassins. Silk Road accepted only bitcoin for payments, and the man arrested for running Silk Road was charged with narcotics trafficking and money

laundering, among other charges.

Charlie Shrem, chairman of the Bitcoin Foundation and the head of BitInstant, a defunct bitcoin exchange, was arrested in January on charges of money laundering with bitcoins.

In February, Mt. Gox, one of the largest bitcoin exchanges, filed for bankruptcy protection after hundreds of millions of dollars worth of bitcoins were stolen. No criminal charges have been filed yet, but many former Mt. Gox customers suspect that it was a scam.

Continue reading here:

Bitcoin A Terrorist Threat? Counterterrorism Program Names Virtual Currencies As Area Of Interest

first amendment test filming Tucson FBI Headquarters.
no violations, private security pass, FBI pass. good job Uncle Sam Proud of you! Let ol glory fly!

By: Anthony Potter

Read more:
first amendment test filming Tucson FBI Headquarters. – Video

May 022014

The Bitcoin Revolution Hits Africa

The virtual currency straight up: computer money created by an anonymous hacker in 2009 has captured hard-core geeks hearts. Its appeal? It enables bank-free (aka middleman-free) anonymous purchasing and, crucially, its a global currency thats not tied to any central bank and not much different than a dollar or a euro. The key characteristics of this digital cash also happen to make it a great fit for people who arent so down with advanced digital technology: the 326 million Africans who lack access to basic banking services. This isnt such a crazy idea. Mobile payments that work on standard-feature phones have already made strong inroads in Africa, with 16 percent of Africans using the services. The largest provider of such payments, M-Pesa, already operates in Kenya, Tanzania and South Africa, as well as India and Afghanistan. READ THE FULL STORY

The Silk Road, for all its clever uses of security protections like Tor and Bitcoin to protect the sites lucrative drug trade, still offered its enemies a single point of failure. When the FBI seized the server that hosted the market in October and arrested its alleged owner Ross Ulbricht, the billion-dollar drug bazaar came crashing down. If one group of Bitcoin black market enthusiasts has their way, the next online free-trade zone could be a much more elusive target. READ THE FULL STORY

Bitcoin may be the future of digital money, but it has a big problem here in the United States: why use it to buy anything when millions of merchants already accept debit and credit cards? Today, if you want to buy a bottle of lemonade with bitcoins, you need to scan a QR code with your phone or email a long bitcoin address to the seller. For most people, buying with bitcoins just isnt as easy as Visa or MasterCard. READ THE FULL STORY

ByPatrick Howell ONeillonApril 19, 2014 Never has there been a more confident, carefree group of drug users than those buying and selling on theSilk Roadin the weeks leading up to April 20, 2012. Hot off the infamous black markets first birthday celebrations, those hazy-eyed optimists were busy getting ready for what seemed would be the greatest4/20sale of all time. A feeling of invincibility permeated the Road and all who walked it. If the cops hadnt shut her down yetafter all the media attention the black market had receivedthen they might never come. This party didnt have to end. READ THE FULL STORY

Reuters | Updated: Apr 19 2014, 16:53 IST Mark Karpeles, the chief executive of Mt. Gox, said he would not come to the United States to answer questions about the Japanese bitcoin exchanges U.S. bankruptcy case, Mt. Gox lawyers told a federal judge on Monday. In the court filing, Mt. Gox lawyers cited a subpoena from the U.S. Department of Treasurys Financial Crimes Enforcement Network, which has closely monitored virtual currencies like bitcoin. READ THE FULL STORY

Cryptocurrencies will create a fifth protocol layer powering the next generation of the Internet,saysNaval Ravikant. Our 2014 fund will be built during the blockchain cycle,concursFred Wilson. And Andreessen Horowitz have very visiblydoubled downon Bitcoin. Even if you dont believe in Bitcoin as a currency, and Ill grant theres plenty to be skeptical about, you should be thinking:huh, a lot of extremely smart and successful people think that its underlying technology is a pretty big deal. But as I wrote myselfjust a few weeks ago, theres a big difference between blockchain technology and Bitcoin itself, right? READ THE FULL STORY

BYKIM ZETTER The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online. Grams, which launched last week and is patterned after Google, is accessible only through the Tor anonymizing browser (the address for Grams is: grams7enufi7jmdl.onion) but fills a niche for anyone seeking quick access to sites selling drugs, guns, stolen credit card numbers, counterfeit cash and fake IDs sites that previously only could be found by users who knew the exact URL for the site. READ THE FULL STORY

The Monday night meetings at New York Citys Bitcoin Center hardly seem the stuff of a revolution. Wielding smartphones and computers, the mostly male, mostly under-30 revolutionaries stand in the middle of a cavernous space in the shadow of the New York Stock Exchange. Their mission is to spread the gospel of bitcoin, which they believe has the power to upend the global financial system. READ THE FULL STORY

PostedyesterdaybyCatherine Shu BTC China, one of the worlds largest bitcoin exchanges by trading volume, released a new mobile-friendly Web app called thePicasso ATMtoday. The Picasso ATM allows users around the world to exchange the digital currency for cash without having to find a physical ATM. To use Picasso ATM, bitcoin owners first load the currency into BTC Chinas Picasso Wallet and then sell it through the Web app. Buyers can then immediately confirm transactions on their smartphones. The app is targeted at casual bitcoin users as well as businesses and store owners, who can set their own profit margins on the currency like owners of physical ATM machines. READ THE FULL STORY

Original post:


A majority of the justices on the U.S. Supreme Court seemed disconcerted Monday by the consequences of one of the court’s own rulings on the free speech rights of public employees.

Eight years ago, the conservative court majority, by a 5-4 vote, said public employees have no First Amendment protection for speech “pursuant to his official responsibilities.” But Monday, in a case involving subpoenaed testimony in a criminal case, the court seemed headed in a different direction.

The case was brought by Edward Lane, an Alabama official who was fired after he testified truthfully that a state legislator was a ghost employee being paid by the taxpayers for no work.

Lane managed a program for at-risk juvenile offenders that was run out of Central Alabama Community College. After he was hired, he conducted an audit and found that one of the program’s employees, a state legislator named Suzanne Schmitz, was a no-show employee in his department.

Lane says that people in his office warned him not to tangle with Schmitz because of her influence, but when she repeatedly refused to come to work, he fired her.

Soon after, he says, the FBI was investigating public corruption in Alabama, and Lane was subpoenaed to testify first before a grand jury, and later at Schmitz’ two fraud trials. After Lane’s first trial testimony, he was fired by the president of the community college, Steve Franks.

“He told me to clean out my office that day, like I had done something wrong,” Lane recalled in an interview on the Supreme Court steps Monday. “When I got in my car, I was in tears. I felt no doubt that it was in retaliation” for testifying.

So Lane sued, contending his First Amendment right to free speech had been violated when he was fired for testifying. A federal appeals court ruled that under its own previous rulings, and under a 2006 Supreme Court decision, public employees have no free speech rights when they testify about information they learn on the job.

Lane appealed to the Supreme Court, and in oral arguments Monday the justices signaled that the lower court had gone too far.

Mark Waggoner, representing the former college president who fired Lane, repeatedly quoted back to the justices their own words from that 2006 decision, Garcetti v. Ceballos.

See more here:
Free Speech In Focus During High Court's Case On Public Employee

Liberty Advocate Framed by FBI? – The Schaeffer Cox Story
Today we bring you the story of a group “seeking resolutions to America's woes” and we'll shed new light on a story of a man who some feel was set up by the government to silence him from speaking…

By: NextNewsNetwork

Liberty Advocate Framed by FBI? – The Schaeffer Cox Story – Video

On Monday, April 28, the Court will hear oral arguments in Lane v. Franks on the First Amendment protections for a public employee who testifies in court. There are two respondents the previous and current presidents of the college in question and they disagree with each other on the First Amendment question. The Solicitor General will participate in the oral argument.


Central to the resolution of Lane v. Franks is the reach of Garcetti v. Ceballos, the Courts latest pronouncement on the First Amendment rights of public employees. Since Pickering v. Board of Education in 1968, the First Amendment has protected public employees from adverse employment actions when they are speaking as a citizen on a matter of public concern. In Garcetti, the closely divided Court held that, when public employees make statements pursuant to their official duties, such speech is not protected by the First Amendment. The employee in Garcetti was a deputy district attorney in Los Angeles who investigated a law enforcement officers affidavit in support of a search warrant and concluded it was false. The prosecutor wrote a memo recommending the case be dismissed; his supervisors not only vehemently disagreed but also allegedly retaliated against him. In an opinion by Justice Kennedy, the Court reasoned that when an employee is simply performing his or her job duties, there is no relevant analogue to speech by citizens who are not government employees.

In the eight years since Garcetti, courts have varied in their application of the doctrine. For some courts, Garcetti has seemed a broad mandate insulating public employer actions from First Amendment challenge by any employee. Other courts, however, have limited and distinguished Garcetti. The Court has denied certiorari in several closely watched cases, such as Jackler v. Byrne and Bowie v. Maddox, which both involved police officers and reached differing conclusions, arguably producing a circuit split.

The Eleventh Circuits opinion in Lane v. Franks is decidedly in the expansive mandate camp. Indeed, the opinion is a per curiam one, decided without oral argument and intended as non-precedential. In affirming the district judges grant of summary judgment to the public employer, the Eleventh Circuit described Garcetti as further restricting public employees protected speech. Relying on its own circuit precedent, including pre-Garcetti cases, the court of appeals ruled that an employee enjoys no First Amendment protection when the speech was made pursuant to his official duties, including if his speech owes its existence to the employees professional responsibilities and is a product that the employer itself has commissioned or created. This broad category included subpoenaed testimony. However, the Eleventh Circuit recognized, albeit in a footnote, that both the Seventh Circuit and Third Circuit had decided this issue differently, citing Morales v. Jones and Reilly v. City of Atlantic City.

Even as related by the Eleventh Circuit, however, the circumstances giving rise to Lane v. Franks paint a troubling picture of retaliation for a public employees failure to cooperate with political corruption and his resulting testimony. In 2006, soon after Edward Lane became the director of a program for at-risk youth at Central Alabama Community College (CACC), he looked at the programs finances. He discovered that an Alabama state representative, Suzanne Schmitz, was listed on the payroll. He also discovered she had never performed any work for the program. Edward Lane raised his concerns about Schmitz, but he was warned by the CACC president (a predecessor to respondent Steve Franks) and CACCs lawyer that terminating Schmitzs employment could have negative repercussions for both Lane and CACC. Nevertheless, Lane did terminate Suzanne Schmitz after she refused to report to work. Schmitz told another program employee that she planned to get [Lane] back for terminating her and that, if he requested money from the state legislature, she would tell him youre fired. The FBI began investigating Suzanne Schmitz and contacted Edward Lane for information. Lane testified before a federal grand jury and pursuant to a subpoena he testified at Schmitzs two federal criminal trials for mail fraud and fraud involving a program receiving federal funds. Schmitz was ultimately convicted, although a divided Eleventh Circuit panel reversed her convictions on some of the counts.

Lane was terminated after his testimony at the first criminal trial. In January 2009, Franks who had become president of CACC terminated the twenty-nine employees of the at-risk youth program, but soon rescinded the termination of all the employees except Lane and one other. Whether Franks terminated Lane due to Lanes testimony against Schmitz remains unresolved; an essential issue in the Supreme Court is whether it needs to be.

Arguments and analysis

The primary question before the Court is whether the Eleventh Circuit was correct in holding that Lanes testimony was categorically unprotected by the First Amendment, although there is also a secondary issue of whether Franks is entitled to qualified immunity from an award for damages.

There is little support for a straightforward affirmance of the Eleventh Circuit opinion on the First Amendment issue. Lane is not the only one to argue that the Eleventh Circuits categorical exclusion of First Amendment protection for subpoenaed testimony is incorrect: the Solicitor General, representing the United States as an amicus, agrees with him. More unusually, the Alabama attorney general Alabama representing respondent Susan Burrow, the current acting president of CACC also agrees that the Eleventh Circuit was incorrect to conclude that Lanes testimony was categorically unprotected by the First Amendment. Additionally, almost all of the amicus briefs agree with this position, including one from the National Association of Police Organizations, which is perhaps not surprising given that so many of the similar cases involve persons employed in law enforcement.

Read the original here:
Argument preview: First Amendment protections for public employees subpoenaed testimony

A 27-year-old Northeast Ohio man with previous illegal explosives manufacturing, weapons possession and drug trafficking convictions was indicted in federal court on Wednesday on charges he threatened to kill President Barack Obama and for “threats made in interstate commerce” when he used social media to threaten the lives of others.

“Through multiple postings on Facebook, he stated he would kill the president when he had the chance,” the federal indictment said of Christopher Gembicki, 27. The second count says he posted on Facebook that he was going to Kill another person and their family with a chainsaw, and the third count says he posted on Twitter that another person’s “time was up and he was going to drink (the person’s) blood.”

Scene could not find a Facebook account for him it’s possible he deleted the account since the time of the posts but was able to track down the Twitter account the feds attribute to Gembicki (account names are not mentioned in the indictment, but there’s not doubt it’s the one). He changed his twitter handle from @ChrisGembicki11 to @THE4ANTICHRIST in recent months.

On there is all-caps posts about the Illuminati and the New World Order, constant references to himself as the antichrist, and regular use of racial and sexual slurs in death threats to rap and hip hops stars, Vladimir Putin, and a few non-famous people he seemed to have an issue with. One particular target of Gembicki on Twitter was a musician named Honey Cocaine (@QueenHoneyC), a female Cambodia-born, Canada-raised rapper with more than a half million followers on the site. On just Feb. 19 and 20, he sent these tweets regarding the musician:


Gembicki’s Google+ account says he’s been a journalism student at Cleveland State since 2013, but we were unable to confirm that statement. He’s also an aspiring standup comedian, according to his profile, and may have performed at a Jan. 8 show at Jack Perry’s Grille & Pub in Austintown (it’s possible this event was referenced in the Feb. 19 tweet about “A FAKE COMEFY SHOW” mentioned above).

Gembicki had been locked up in the Cuyahoga County jail in Cleveland since February 25 (five days after his last published tweet) when he was arrested by Broadview Heights police on burglary and aggravated theft charges, county court records show. Those records list a Broadview Heights address for the him, but previous court records show addresses in Warren and Niles.

On March 3, federal court records show a US magistrate judge issued an order transferring Gembicki from the county jail over to custody by the United States Secret Service, FBI, or the United States Marshal in Cleveland. He was officially indicted by a federal grand jury on Wednesday.

Gembicki has been in trouble before, per court records in Trumbull County. In 2005 when he was living in Niles, the Trumbull County sheriff’s office arrested him for illegally manufacturing or processing explosives and carrying a concealed weapon and sentenced to five years of probation.

A few months later, he was arrested for felony trafficking of counterfeit controlled substances. The next year, the Niles Police Department booked him on three felony counts of having weapons while under disability, carrying a concealed weapon, and improperly handling firearms in a motor vehicle.

Read more:
"KILLINGSPREECOMING": Feds Indict Broadview Heights Man For Social Media Threats Against President Obama, Others

The New York City Police Department has denied a public records request and subsequent appeal for its Freedom of Information handbook.

Muckrock journalist Shawn Musgrave filed a records request under New Yorks Freedom of Information Law (FOIL) for the police departments FOIL handbook, the guide officers use to apply public record law.

SEE ALSO: U.S. Navy mistakenly sends how-to memo on dodging FOIA requests

However, the NYPD told Musgrave its Freedom of Information handbook is not covered by FOIL, arguing it is protected under attorney-client privilege.

The NYPD said the information in the handbook reflects confidential communications between members of the FOIL unit and their attorneys in the context of the providing of legal advice concerning the meaning and requirements of the Freedom of Information Law.

Journalists and transparency advocates who have long complained about the NYPDs culture of secrecy criticized the latest rejection.

Whats ludicrous here is that the NYPD is refusing to be open about its own transparency process itself, Musgrave told the WashingtonFree Beacon. Even if attorney-client privilege applied hereand I dont believe that it does, not for the departments FOIL handbooks and manuals, at leastdepartment lawyers can absolutely choose to release this basic information. Even the FBI and NSA have released similar documents with minimal redactions.

Robert Freeman, the executive director of the New York State Committee on Open Government, said that, while he has not seen the handbook, the NYPDs arguments are tenuous at best.

Legal advice is something that can be accepted, rejected, or modified by the boss, Freeman said. When it is adopted by the decision maker, its no longer legal advice, it becomes the policy of the agency. There are any number of circumstances where similar kinds of documents have been made public via FOIL requests.

Second, assuming that some of the content does not consist solely of legal advice but rather is reflective of police department policy, in my opinionagainthe privileges that were cited would not apply, Freeman continued.

Excerpt from:
NYPD denies Freedom of Information request for public records handbook

Fringe Season 5, Episode 12 – Liberty Part 1
Fringe online Watch Fringe Season 5, Episode on FOX . Fringe follows the exploits of FBI Special Agent Olivia Dunham, scientist Wa…


View original post here:
Fringe Season 5, Episode 12 – Liberty Part 1 – Video

FireFox! Start Your Own Web Hosting Company
Web Hosting Advertise Here $10 a Month Affordable web-hosting
Pierre Teilhard De Chardin

Designer Children | Prometheism | Euvolution | Transhumanism

Sign up below for the Prometheism / Designer Children Discussion Forum

Subscribe to prometheism-pgroup

Powered by