Category Archives: Internet threats

Golden Dawn Immigrants-Fake NeoNazi’s

All those links were sent to me on Twitter and I am more than glad to post them,I do beleive I will find more on those people due time.No threats allowed according to the WP policy or the HR declaration. So please stay vigilant of what you are going to post :)I checked all blog categories so that the post can get the most views possible. Regards!

“##Spiros Macrozonaris## IMMIGRANT Golden Dawn Deputy leader in Montreal, Canada” :

Facebook profile :

INTERESTING FACEBOOK POST MR. MACROZONARIS, HE CANNOT EVEN WRITE GREEK! BAD NAZI BAD! :

His NON 100% PURE GREEK son’s Facebook : https://www.facebook.com/macrozonaris?ref=ts&fref=ts

1. Greek Immigrant who married a “foreigner” >>>>>French-Canadian Doris Morrissette, they bore a son, Nicolas Macrozonaris (World-Class Sprinter – CANADIAN Olympian 🙂 ..who unfortunately is not 100% Pure Greek…

2. Conversations with Nicolas on Twitter, lead to nothing, he is ‘pretending’ that he has NO knowledge of what Golden Dawn supports and believes YET he states that he does not condone his fathers “actions”

Twitter @Macrozonaris TWEETER CONVERSATIONS with Nicolas –>

###### MUST WATCH #####
Video from CBC Montreal, from week of Oct 12th – INTERVIEW with Spiros Macrozonaris – next to him sits LOOSER Ilias Hondronicolas : http://www.youtube.com/watch?v=v-3rbLI4K78

#Ilias Hondronicolas ———> on PHOTO second guy from the left :

#MORE HONDRONICOLAS:

(FRIENDS WITH ELENI ZAROULIA SHARING HER PHOTOS!)
( MUST SEE )

#MORE PAPAGEORGIOU:


Dead Scientists Do Tell Tales

 

Wed Jan 11, 2012 2:04pm EST

* Iran says nuclear scientist killed in car bombing

* Officials in Iran blame killing on Israel, U.S.

* Fifth such attack in two years in apparent “covert war” (Adds U.S. comment, clarifies to show scientist was passenger, edits)

By Ramin Mostafavi and Parisa Hafezi

TEHRAN, Jan 11 (Reuters) – An Iranian nuclear scientist was blown up in his car by a motorbike hitman on Wednesday, prompting Tehran to blame Israeli and U.S. agents but insist the killing would not derail a nuclear programme that has raised fears of war and threatened world oil supplies.

The fifth daylight attack on technical experts in two years, the magnetic bomb delivered a targeted blast to the door of 32-year-old Mostafa Ahmadi-Roshan’s silver sedan as he was driven down a busy street near a Tehran university during the morning rush hour. The chemical engineer’s driver also died, Iranian media said, and a passer-by was slightly hurt.

Israel, whose military chief said on Tuesday that Iran could expect to suffer more mysterious mishaps, declined comment. The White House, struggling for Chinese and Russian help on economic sanctions, denied any U.S. role and condemned the attack.

While Israeli or Western involvement seemed eminently plausible to independent analysts, a role for local Iranian factions or other regional interests engaged in a deadly shadow war of bluff and sabotage could not be ruled out.

The killing, which left debris hanging in trees and body parts on the road, came in a week of heightened tension:

Iran has started an underground uranium enrichment plant and sentenced an American to death for spying; Washington and Europe have stepped up efforts to cripple Iran’s oil exports for its refusal to halt work that the West says betrays an ambition to build nuclear weapons. Iran says its aims are entirely peaceful.

Tehran has threatened to choke the West’s supply of Gulf oil if its exports are hit by sanctions, drawing a U.S. warning that its navy was ready to open fire to prevent any blockade of the strategic Strait of Hormuz, through which 35 percent of the world’s seaborne traded oil passes.

U.S. Secretary of State Hillary Clinton said Iran’s threats to close the strait were “provocative and dangerous” and repeated the White House denial of any U.S. involvement in the killing of Ahmadi-Roshan.

Analysts saw the latest assassination, which would have taken no little expertise, as less a reaction to recent events than part of a longer-running, covert effort to thwart Iran’s nuclear development programme that has also included suspected computer viruses and mystery explosions.

While fears of war have forced up oil prices, the region has seen periods of sabre-rattling and limited bloodshed before without reaching all-out conflict. But a willingness in Israel, which sees an imminent Iranian atom bomb as a threat to its existence, to attack Iranian nuclear sites, with or without U.S. backing, has heightened the sense that a crisis is coming.

“HEINOUS ACT”

The Atomic Energy Organisation of Iran, which has failed to persuade the West that its quest for nuclear power has no hidden military goal, said the killing of Ahmadi-Roshan would not deter it: “We will continue our path without any doubt … Our path is irreversible,” it said in a statement carried on television.

“The heinous acts of America and the criminal Zionist regime will not disrupt our glorious path … The more you kill us, the more our nation will awake.”

First Vice-President Mohammad Reza Rahimi, quoted by IRNA news agency, said: “Iran’s enemies should know they cannot prevent Iran’s progress by carrying out such terrorist acts.”

Iran’s leaders, preparing for the first national election since a disputed presidential vote in 2009 brought street protests against 32 years of clerical rule, are struggling to contain internal tensions. Defiance of Israel and Western powers plays well with many who will vote in March.

In Washington, White House spokesman Tommy Vietor said: “The United States had absolutely nothing to do with this … We strongly condemn all acts of violence, including acts of violence like what is being reported today.”

Israel, which has a history of covert killings abroad, declined comment, though army spokesman Yoav Mordechai wrote on Facebook: “I don’t know who settled the score with the Iranian scientist, but I am definitely not shedding any tears.”

On Tuesday, Israeli armed forces chief Lieutenant-General Benny Gantz was quoted as telling members of parliament: “For Iran, 2012 is a critical year in combining the continuation of its nuclearisation, internal changes in the Iranian leadership, continuing and growing pressure from the international community and things which take place in an unnatural manner.”

MOTORCYCLE HITMAN

The attack bore some of the hallmarks of sophisticated intelligence agencies capable of circumventing Iran’s own extensive security apparatus and apparently taking care to limit the harm to passers-by.

While witnesses spoke of a frighteningly loud explosion at 8:20 a.m. (0450 GMT) and parts of the Peugeot 405 ended up in the branches of the trees lining Gol Nabi Street, much of the car was left intact. This suggested a charge designed to be sure of both killing the occupants and preventing serious injury to others.

Witnesses said the motorcycle, from which the rear pillion passenger reached out to stick the device to the side of the car, made off into the heavy commuter traffic.

Though the scientist killed — the fourth in five such attacks since January 2010 — was only 32, Iranian media described him as having a role overseeing uranium enrichment at Natanz underground site. The semi-official news agency Mehr said Ahmadi-Roshan had recently met officials of the U.N. nuclear watchdog, the International Atomic Energy Agency.

At the IAEA in Vienna, where a spokeswoman condemned the killing, officials could not confirm knowing of him.

Analysts say that killing scientists — especially those whose lack of personal protection suggests a relatively junior role — is unlikely to have much direct impact on Iran’s nuclear programme, which Western governments allege is seeking to enrich enough uranium highly enough to let it build weapons.

COVERT WAR

Sabotage — like mysterious reported explosions at military facilities or the Stuxnet computer virus widely suspected to have been deployed by Israel and the United States to disrupt nuclear facilities in 2010 — may have had more direct effects.

However, assassinations may be intended to discourage Iranians with nuclear expertise from working on the programme.

An Israel official said Mossad agents called that “virtual defection”: “It’s not that we’ve been seeing mass resignations, but rather a sense of spreading paranoia,” the official, who has extensive Iran expertise, told Reuters.

“It means they have to take more precautions, including, perhaps, being a little less keen to stand out for excellence in their nuclear work. That slows things down.”

Bruno Tertrais from France’s Strategic Research Foundation said: “It certainly has a psychological effect on scientists working on the nuclear programme.”

He cautioned, however, against assuming that Israel, the United States or both were behind the latest attack.

Trita Parsi, a U.S.-based expert on Iran, said the killing might, along with the heightened rhetoric of recent weeks, be part of a pattern ahead of a possible resumption of negotiations on Iran’s nuclear programme; some parties may want to improve their bargaining position, others may see violence as a way of thwarting renewed negotiations altogether, Parsi said.

Last month, Iran signalled a willingness to return to a negotiating process which stalled a year ago, though Western officials say a new round of talks is far from certain yet.

SANCTIONS CAMPAIGN

Iran’s decision to carry out enrichment work deep underground in the once undeclared plant at Fordow, near the holy Shi’ite city of Qom, could make it harder for U.S. or Israeli forces to carry out veiled threats to use force against Iranian nuclear facilities. The move to Fordow could reduce the time available for diplomacy to avert any attack.

The announcement on Monday that enrichment — a necessary step to make uranium into nuclear weapons — had begun at Fordow has given added impetus to Western efforts to impose an oil export embargo intended to pressure Tehran to halt enrichment.

Iran, a signatory to the treaty banning the spread of nuclear weapons, complains it is entitled to conduct peaceful research and denies any military nuclear aims. Its adversaries say its failure to take up their offers of help with civilian technology undermine the credibility of its position.

Oil prices have firmed 5 percent since U.S. President Barack Obama moved on New Year’s Eve to block bank payments for oil to Iran. The European Union is expected this month to impose a ban on its states buying oil from Tehran, and other major customers have been looking for alternative supplies.

In Iran, the new U.S. sanctions have started to bite.

The rial currency has lost 20 percent of its value against the dollar in the past week and Iran has threatened to shut the Strait of Hormuz.

U.S. Treasury Secretary Timothy Geithner, visiting Beijing, appealed for Chinese cooperation on nuclear non-proliferation, but Chinese officials made clear that they still opposed the U.S. sanctions and would go on buying Iranian oil.

Russia, too, came out against the U.S.-led oil embargo. (Additional reporting by Parisa Hafezi, Robin Pomeroy and Mitra Amiri in Tehran, Allyn Fisher-Ilan and Dan Williams in Jerusalem, Fredrik Dahl in Vienna, Lucy Hornby in Beijing and Andrew Quinn in Washington; Writing by Alastair Macdonald editing by Tim Pearce)

Microbiologist Dr. David Kelly, 59, was found dead after seemingly slashing his wrist in a wood near his home at Southmoor, Oxfordshire, days after being named as the Iraq dossier mole. An investigation into the circumstances surrounding his death continues. Dr. Kelly was Britain’s leading expert on Baghdad’s weapons programs.

Dr. Steven Mostow, 63, was one of the country’s leading infectious disease and bioterrorism experts and was associate dean at the University of Colorado Health Sciences Center. He died in a plane crash near Centennial Airport.

Dr. Ian Langford, 40, found dead at his blood-spattered and ransacked home. Langford was a Senior Fellow at the Univ. of East Anglia’s

Died 2012Centre for Social and Economic Research on the Global Environment in the UK. He was discovered by police and ambulance men. The body was naked from the waist down and partly wedged under a chair. Cause of death: not determined by post-mortem examination.
Dr. David Banks, 55, died in an aircraft crash in Queensland, AU. Much of Dr. Banks’ work involved trying to keep diseases affecting cattle, pigs and fruit orchards out of Australia. His current work looked at foot and mouth disease and its potential to spread through the archipelago and Australia in addition to swine fever, Nipah virus and Japanese encephalitis.

Virus expert, Dr Robert E. Shope, and principal author of a highly publicized 1992 report by the National Academy of Sciences warning of the possible emergence of new and unsettling infectious illnesses died at age 74 of lung transplant complicatons. Dr. Shope also built the World Reference Center for Emerging Viruses and Arboviruses, a collection of some 5,000 samples. Harvard biochemistry professor Don C. Wiley has been declared missing after his abandoned rental car was discovered on a highway outside of Memphis, Tenn. The car, discovered on I-40—which runs between Memphis and Arkansas—had the keys in the ignition, the hazard lights off and a full tank of gas. Award-winning micro-biologist David Wynn-Williams, 55, killed by a vehicle while out jogging in England. In 2000 he was appointed leader of the Antarctic Astrobiology Project, which explores the effects of environmental stress at the limits of life on Earth. Wynn-Williams had assessed the capability of microbes to adapt to environmental extremes, including the bombardment of ultraviolet rays and global warming.
Dr. Eugene F. Mallove, a Norwich Free Academy graduate, 56, died May 14, 2004 after being beaten to death during an alleged robbery. Mallove appeared on Coast To Coast AM as recently as Feb. 2004 speaking about alternative energy. Mallove was well respected for his knowledge of cold fusion. http://www.infinite-energy.com/

Jeong H. Im, retired protein chemist, age 72, was found in the burning trunk of his car with mutlitple stab wounds to the chest. West Nile researcher, Dr. Michael Perich, 46, died in a one-vehicle car accident. From 1986 to 1992, Perich worked at Fort Detrick in Frederick, Md., as the vector suppression program manager and research medical entomologist. Colleagues described him as “one of the few entomologists with the experience to go out and save lives today.”

#119 Professor Dr. Richard Crowe, 60, died May 27 in an off-road accident in Arizona. Dr. Crowe came to UH Hilo 25 years ago and helped launch the University’s undergraduate astronomy program. is numerous publications and co-authored works added significantly to the body of astronomical literature. He regularly trained UHH student observers with the UH 24-inch telescope on Mauna Kea, and conducted many research programs on that telescope. In 2005, he won the AstroDay Excellence in Teaching Award for his efforts. In 1991, Dr. Crowe was selected as a Fujio Matsuda Research Fellow for his scholarly work on pulsating variable stars. Crowe was also active in the community. He was a longtime member of the Rotary Club of Hilo Bay.

#118 Gelareh Bagherzadeh, died Jan. 17, when she was shot outside her home, DDetectives investigating the murder of an Iranian molecular scientist gunned down in her car as she drove home believe she was followed or that someone was waiting for her. Bagherzadeh was struck by a single bullet that entered the passenger door window as she talked on her cell phone with her ex-boyfriend. Bagherzadeh was a molecular genetic technology student at M.D. Anderson Cancer Center in Houston and also active in promoting Iranian women’s rights.

Died 2011

#117 James S. Miller, 58, as a result of being attacked during a home invasion. Professor James Steven Miller came to Goshen College to teach in 1980, the same year he completed his doctorate degree in medical biochemistry at Ohio State University. He received his undergraduate degree in chemistry in 1975 from Bluffton (Ohio) University. The Goshen College Board of Directors granted Professor Miller tenure in June 1985. He primarily taught upper-level courses taken by students in nursing, pre-medical and other health-related tracks.

#116 Zachary Greene Warfield, 35, died July 4 in a boating accident on the Potomac River. Zack was a co-founder and a member of the Board of Directors for Omnis, Inc., a McLean, VA-based strategic consulting firm for the intelligence, defense and national security communities. He spearheaded major research initiatives and, in addition to helping steer the company, was directly involved in numerous projects, including analytic training and technology consulting. Prior to founding Omnis, Zack was an engineer and analyst for the U.S. Government and private industry. As a science and technology analyst, he assessed missile and space systems, managed technical contracts, and investigated Iraq’s Weapons of Mass Destruction (WMD) program as a member of the Iraq Survey Group, serving in Baghdad on two separate occasions. As an engineer, he worked on aerospace projects for the National Aeronautics and Space Administration (NASA), the Defense Advanced Research Projects Agency (DARPA), and private industry. Most notably, Zack designed critical guidance systems that ensured a successful landing for the Mars Exploration Rovers, Spirit and Opportunity; his name is inscribed on one of the rovers, and remains on Mars today.

#115 Jonathan Widom, 55, died July 18 of an apparent heart attack. He was a professor of Molecular Biosciences in the Weinberg College of Arts and Sciences at Northwestern University. Widom focused on how DNA is packaged into chromosomes — and the location of nucleosomes specifically. Colleagues said the work has had profound implications for how genes are able to be read in the cell and how mutations outside of the regions that encode proteins can lead to errors and disease.

#112-114 Fanjun Meng, 29, and Chunyang Zhang, 26, drowned in a Branson hotel swimming pool. Both were from China and working in the anatomic pathology lab at the University of Missouri-Columbia. Meng was a visiting scholar and his wife, Zhang, was a research specialist, according to information at the university’s website. Meng was working on research looking at a possible link between pesticides and Parkinson’s disease.Police said the investigation is ongoing as to the cause of the drowning but had said earlier there was no sign of foul play.

#107-111 Andrei Tropinov, Sergei Rizhov, Gennadi Benyok, Nicolai Tronov and Valery Lyalin, in a Russian plane crash.. The five scientists were employed at the Hydropress factory, a member of Russia’s state nuclear corporation and had assisted in the development of Iran’s nuclear plant. Theyworked at the Bushehr nuclear power plant and helped to complete construction of it. Officially Russian investigators say that human error and technical malfunction caused the deadly crash, which killed 45 and left 8 passengers surviving.

#106 Rodger Lynn Dickey, 56, from an apparent suicide Mar. 18 after he jumped from the Gorge Bridge. Dickey was a senior nuclear engineer with over 30 years of experience in support of the design, construction, start-up, and operation of commercial and government nuclear facilities. His expertise was in nuclear safety programmatic assessment, regulatory compliance, hazard assessment, safety analysis, and safety basis documentation. He completed project tasks in nuclear engineering design and application, nuclear waste management, project management, and risk management. His technical support experience included nuclear facility licensing, radiation protection, health and safety program assessments, operational readiness assessments, and systems engineering.

#105 Gregory Stone, 54, from an unknown illness Feb. 17. Stone, who was quoted extensively in many publications internationally after last year’s BP oil leak, was the director of the renowned Wave-Current Information System. Stone quickly established himself as an internationally respected coastal scientist who produced cutting-edge research and attracted millions of dollars of research support to LSU. As part of his research, he and the CSI Field Support Group developed a series of offshore instrumented stations to monitor wind, waves and currents that impact the Louisiana coast. The system is used by many fishermen and scientists to monitor wind, waves and currents off the Louisiana coast. Stone was a great researcher, teacher, mentor and family man.

#104 Bradley C. Livezey, 56, died in a car crash Feb. 8. Livezey knew nearly everything about the songs of birds and was considered the top anatomist. Livezey, curator of The Carnegie Museum of Natural History, never gave up researching unsolved mysteries of the world’s 20,000 or so avian species. Carnegie curator since 1993, Livezey oversaw a collection of nearly 195,000 specimens of birds, the country’s ninth largest. Livezey died in a two-car crash on Route 910, authorities said. An autopsy revealed he died from injuries to the head and trunk, the Allegheny County Medical Examiner’s Office said. Northern Regional Police are investigating.

#103 Dr Massoud Ali Mohammadi, 50, was assassinated Jan. 11 when a remote-control bomb inside a motorcycle near his car was detonated. This professor of nuclear physics at Tehran University was politically active and his name was on a list of Tehran University staff who supported Mir Hossein Mousavi according to Newsweek. The London Times reports that Dr. Ali-Mohammadi told his students to speak out against the unjust elections. He stated “We have to stand up to this lot. Don’t be afraid of a bullet. It only hurts at the beginning.” Iran seems to be systematically assassinating high level professors and doctors who speak out against the regime of President Ahmadinejad. However, Iran proclaims that Israel and America used the “killing as a means of thwarting the country’s nuclear program” per Newsweek.

Died 2010

#102 John (Jack) P. Wheeler III, 66. last seen Dec. 30found dead in a Delaware landfill, fought to get the Vietnam Memorial built and served in two Bush administrations. His death has been ruled a homicide by Newark, Del. police. Wheeler graduated from West Point in 1966, and had a law degree from Yale and a business degree from Harvard. His military career included serving in the office of the Secretary of Defense and writing a manual on the effectiveness of biological and chemical weapons, which recommended that the United States not use biological weapons.

#101 Mark A. Smith, 45. Died Nov. 15 renowned Alzheimer’s disease researcher has died after being hit by a car in Ohio. Smith was a pathology professor at Case Western Reserve University and director of basic science research at the university’s memory and cognition center. He also was executive director of the American Aging Association and co-editor-in-chief of the Journal of Alzheimer’s Disease. He is listed as the No. 3 “most prolific” Alzheimer’s disease researcher, with 405 papers written, by the international medical Journal.

#100 Chitra Chauhan, 33. Died Nov. 15 was found dead in an apparent suicide by cyanide at a Temple Terrace hotel, police said. Chauhan left a suicide note saying she used cyanide. Hazmat team officials said the cyanide was found only in granular form, meaning it was not considered dangerous outside of the room it was found in. The chemical is considered more dangerous in a liquid or gas form. Potassium Cyanide, the apparent cause of death, is a chemical commonly used by universities in teaching chemistry and conducting research, but it was not used in the research projects she was working on. Chauhan, a molecular biologist, was a post-doctoral researcher in the Global Health department in the College of Public Health. She earned her doctorate from the Institute of Genomics and Integrative Biology in New Delhi, India, in 2005, then studied mosquitoes and disease transmission at the University of Notre Dame.

#99 Franco Cerrina, 62. Died July 12 was found dead in a lab at BU’s Photonics Center on Monday morning. The cause of death is not yet known, but have ruled out homicide. Cerrina joined the faculty of BU in 2008 after spending 24 years on the faculty at the University of Wisconsin-Madison. He co-founded five companies, including NimbleGen Systems, Genetic Assemblies (merged with Codon Devices in 2006), Codon Devices, Biolitho, and Gen9, according to Nanowerk News. NimbleGen, a Madison, WI-based provider of DNA microarray technology, was sold to Basel, Switzerland-based Roche in 2007 for $272.5 million. Cerrina, chairman of the electrical and computer engineering department, came to BU two years ago from the University of Wisconsin at Madison as a leading scholar in optics, lithography, and nanotechnology, according to his biography on the university website. The scholar was responsible for establishing a new laboratory in the Photonics Center.

#98 Vajinder Toor, 34. Died April 26 shot and killed outside his home in Branford, Conn. Toor worked at Kingsbrook Jewish Medical Center in New York before joining Yale.

#97Joseph Morrissey, 46. Died April 6 as a victim of a home invasion. The autopsy revealed that the professor died from a stab wound. Although the cause of death was first identified as a gun shot wound, the autopsy revealed that the professor died from a stab wound. Morrissey joined NSU in May 2009 as an associate professor and taught one elective class on immunopharmacology in the College of Pharmacy.

#96 Maria Ragland Davis, 52. Died February 13 at the hand of neurobiologist Amy Bishop. Her background was in chemical engineering and biochemistry, and she specialized in plant pathology and biotechnology applications. She had a doctorate in biochemistry and had worked as a postdoctoral research fellow at the Monsanto Company in St. Louis. She was hired at the University of Alabama after a seven-year stint as a senior scientist in the plant-science department at Research Genetics Inc. (later Invitrogen), also in Huntsville.

#95 Gopi K. Podila, 54. Died February 13 at the hand of neurobiologist Amy Bishop, Indian American biologist, noted academician, and faculty member at the University of Alabama in Huntsville. He listed his research interests as engineering tree biomass for bioenergy, functional genomics of plant-microbe interactions, plant molecular biology and biotechnology. In particular, Padila studied genes that regulate growth in fast growing trees, especially poplar and aspen. He has advocated prospective use of fast growing trees and grasses as an alternative to corn sources for producing ethanol.

#94 Adriel D. Johnson Sr. , 52. Died February 13 at the hand of neurobiologist Amy Bishop. His research involved aspects of gastrointestinal physiology specifically pancreatic function in vertebrates.

#94-96 Amy Bishop, 45, Neurobiologist – murdered three fellow scientists February 13 after being denied tenure. Dead biology professors are: G. K. Podila, the department’s chairman, a native of India; Maria Ragland Davis; and Adriel D. Johnson Sr.
Died 2009

#93 Keith Fagnou, 38. Died November 11 of H1N1. His research focused on improving the preparation of complex molecules for petrochemical, pharmaceutical or industrial uses. Keith’s advanced and out–of-the-box thinking overturned prior ideas of what is possible in the chemistry field.

#92 Stephen Lagakos, 63. Died October 12 in an auto collision, wife, Regina, 61, and his mother, Helen, 94, were also killed in the crash, as was the driver of the other car, Stephen Krause, 52, of Keene, N.H. Lagakos centered his efforts on several fronts in the fight against AIDS particularly how and when HIV-infected women transmitted the virus to their children. In addition, he developed sophisticated methods to improve the accuracy of estimated HIV incidence rates. He also contributed to broadening access to antiretroviral drugs to people in developing countries.

#91 Malcolm Casadaban, 60. Died Sept. 13 of plague. Casadaban, a renowned molecular geneticist with a passion for new research, had been working to develop an even stronger vaccine for the plague. The medical center says the plague bacteria he worked with was a weakened strain that isn’t known to cause illness in healthy adults. The strain was approved by the Centers for Disease Control and Prevention for laboratory studies.

#90 Wallace L. Pannier, 81. Died Aug. 6 of respiratory failure and other natural causes. Pannier, a germ warfare scientist whose top-secret projects included a mock attack on the New York subway with powdered bacteria in 1966. Mr. Pannier worked at Fort Detrick, a US Army installation in Frederick that tested biological weapons during the Cold War and is now a center for biodefense research. He worked in the Special Operations Division, a secretive unit operating there from 1949 to 1969, according to family members and published reports. The unit developed and tested delivery systems for deadly agents such as anthrax and smallpox.

#89 August “Gus” Watanabe, 67. Died June 9, found dead outside a cabin in Brown County. Friends discovered the body, a .38-caliber handgun and a three-page note at the scene. They said he had been depressed following the death last month of his daughter Nan Reiko Watanabe Lewis. She died at age 44 while recovering from elective surgery. Watanabe was one of the five highest-paid officers of Indianapolis pharmaceutical maker Eli Lilly and Co. when he retired in 2003.

#88 Caroline Coffey, 28. Died June 3, from massive cuts to her throat. Hikers found the body of the Cornell Univ. post-doctoral bio-medicine researcher along a wooded trail in the park, just outside Ithaca, N.Y., where the Ivy League school is located. Her husband was hospitalized under guard after a police chase and their apartment set on fire.

#87 Nasser Talebzadeh Ordoubadi, 53. Died February 14, of “suspicious” causes. Dr. Noah (formerly Nasser Talebzadeh Ordoubadi) is described in his American biography as a pioneer of Mind-Body-Quantum medicine who lectured in five countries and ran a successful health care center General Medical Clinics Inc. in King County, Washington for 15 years after suffering a heart attack in 1989. Among his notable accomplishments was discovering an antitoxin treatment for bioweapons.
Died 2008

#86 Bruce Edwards Ivins, 62. Died July 29, of an overdose. He committed suicide prior to formal charges being filed by the Federal Bureau of Investigation for an alleged criminal connection to the 2001 anthrax attacks. Ivins was likely solely responsible for the deaths of five persons, and the injury of dozens of others, resulting from the mailings of several anonymous letters to members of Congress and members of the media in September and October, 2001, which letters contained Bacillus anthracis, commonly referred to as anthrax. Ivins was a coinventor on two US patents for anthrax vaccine technology.

#84 & 85 Laurent Bonomo and Gabriel Ferez, both 23. Died July 3, after being bound, gagged, stabbed and set alight. Laurent, a student in the proteins that cause infectious disease, had been stabbed 196 times with half of them being administered to his back after he was dead. Gabriel, who hoped to become an expert in ecofriendly fuels, suffered 47 separate injuries.
Died 2007

#83: Yongsheng Li, age 29. Died: sometime after 4 p.m. on March 10, when he was last seen as a result of unknown causes. He was found in a pond between the Women’s Sports Complex and State Botanical Gardens on South Milledge Avenue Sunday and had been missing 16 days. Li was a doctoral student from China who studied receptor cells in Regents Professor David Puett’s biochemistry and molecular biology laboratory.

#82: Dr. Mario Alberto Vargas Olvera, age 52. Died: Oct. 6, 2007as a result of several blunt-force injuries to his head and neck. Ruled as murder. Found in his home. He was a nationally and internationally recognized biologist.
Died 2006

#81: Yoram Kaufman, age 57 (one day before his 58th birthday). Died: May 31, 2006when he was struck by an automobile while riding his bicycle near the Goddard center’s campus in Greenbelt. Dr. Kaufman began working at the space flight center in 1979 and spent his entire career there as a research scientist. His primary fields were meteorology and climate change, with a specialty in analyzing aerosols — airborne solid and liquid particles in the atmosphere. In recent years, he was senior atmospheric scientist in the Earth-Sun Exploration Division and played a key role in the development of NASA’s Terra satellite, which collects data about the atmosphere.

#80: Lee Jong-woo, age 61. Died: May 22, 2006after suffering a blood clot on the brain. Lee was spearheading the organization’s fight against global threats from bird flu, AIDS and other infectious diseases. WHO director-general since 2003, Lee was his country’s top international official. The affable South Korean, who liked to lighten his press conferences with jokes, was a keen sportsman with no history of ill-health, according to officials.
Died 2005

#79: Leonid Strachunsky. Died: June 8, 2005 after being hit on the head with a champagne bottle. Strachunsky specialized in creating microbes resistant to biological weapons. Strachunsky was found dead in his hotel room in Moscow, where hed come from Smolensk en route to the United States. Investigators are looking for a connection between the murder of this leading bio weapons researcher and the hepatitis outbreak in Tver, Russia.

#78: Robert J. Lull, age 66. Died: May 19, 2005 of multiple stab wounds. Despite his missing car and apparent credit card theft, homicide Inspector Holly Pera said investigators aren’t convinced that robbery was the sole motive for Lull’s killing. She said a robber would typically have taken more valuables from Lull’s home than what the killer left with. Lull had been chief of nuclear medicine at San Francisco General Hospital since 1990 and served as a radiology professor at UCSF. He was past president of the American College of Nuclear Physicians and the San Francisco Medical Society and served as editor of the medical society’s journal, San Francisco Medicine, from 1997 to 1999. Lee Lull said her former husband was a proponent of nuclear power and loved to debate his political positions with others.

#77: Todd Kauppila, age 41. Died: May 8, 2005of hemorrhagic pancreatitis at the Los Alamos hospital, according to the state medical examiner’s office. Picture of him was not available to due secret nature of his work. This is his funeral picture. His death came two days after Kauppila publicly rejoiced over news that the lab’s director was leaving. Kauppila was fired by director Pete Nanos on Sept. 23, 2004 following a security scandal. Kauppila said he was fired because he did not immediately return from a family vacation during a lab investigation into two classified computer disks that were thought to be missing. The apparent security breach forced Nanos to shut down the lab for several weeks. Kauppila claimed he was made a scapegoat over the disks, which investigators concluded never existed. The mistake was blamed on a clerical error. After he was fired, Kauppila accepted a job as a contractor at Bechtel Nevada Corp., a research company that works with Los Alamos and other national laboratories. He was also working on a new Scatter Reduction Grids in Megavolt Radiography focused on metal plates or crossed grids to act to stop the scattered radiation while allowing the unscattered or direct rays to pass through with other scientists: Scott Watson (LANL, DX-3), Chuck Lebeda (LANL, XTA), Alan Tubb (LANL, DX-8), and Mike Appleby (Tecomet Thermo Electron Corp.)

#76: David Banks, age 55. Died: May 8, 2005. Banks, based in North Queensland, died in an airplane crash, along with 14 others. He was known as an Agro Genius inventing the mosquito trap used for cattle. Banks was the principal scientist with quarantine authority, Biosecurity Australia, and heavily involved in protecting Australians from unwanted diseases and pests. Most of Dr Banks’ work involved preventing potentially devastating diseases making their way into Australia. He had been through Indonesia looking at the potential for foot and mouth disease to spread through the archipelago and into Australia. Other diseases he had fought to keep out of Australian livestock herds and fruit orchards include classical swine fever, Nipah virus and Japanese encephalitis.

#75:Dr. Douglas James Passaro, age 43. Died April 18, 2005 from unknown cause in Oak Park, Illinois. Dr. Passaro was a brilliant epidemiologist who wanted to unlock the secrets of a spiral-shaped bacteria that causes stomach disease. He was a professor who challenged his students with real-life exercises in bioterrorism. He was married to Dr. Sherry Nordstrom..

#74: Geetha Angara, age 43. Died: February 8, 2005. This formerly missing chemist was found in a Totowa, New Jersey water treatment plant’s tank. Angara, 43, of Holmdel, was last seen on the night of Feb. 8 doing water quality tests at the Passaic Valley Water Commission plant in Totowa, where she worked for 12 years. Divers found her body in a 35-foot-deep sump opening at the bottom of one of the emptied tanks. Investigators are treating Angara’s death as a possible homicide. Angara, a senior chemist with a doctorate from New York University, was married and mother of three.

#73: Jeong H. Im, age 72. Died: January 7, 2005. Korean Jeong H. Im, died of multiple stab wounds to the chest before firefighters found in his body in the trunk of a burning car on the third level of the Maryland Avenue Garage. A retired research assistant professor at the University of Missouri – Columbia and primarily a protein chemist, MUPD with the assistance of the Columbia Police Department and Columbia Fire Department are conducting a death investigation of the incident. A “person of interest” described as a male 6’–6’2″ wearing some type of mask possible a painters mask or drywall type mask was seen in the area of the Maryland Avenue Garage. Dr. Im was primarily a protein chemist and he was a researcher in the field.
Died 2004

#72: Darwin Kenneth Vest, born April 22, 1951, was an internationally renowned entomologist, expert on hobo spiders and other poisonous spiders and snakes. Darwin disappeared in the early morning hours of June 3, 1999 while walking in downtown Idaho Falls, Idaho (USA). The family believes foul play was involved in his disappearance. A celebration of Darwin’s life was held in Idaho Falls and Moscow on the one-year anniversary of his disappearance. The services included displays of Darwin’s work and thank you letters from school children and teachers. Memories of Darwin were shared by at least a dozen speakers from around the world and concluded with the placing of roses and a memorial wreath in the Snake River. A candlelight vigil was also held that evening on the banks of the Snake River.

Darwin was declared legally dead the first week of March 2004 and now the family is in the process of obtaining restraining orders against several companies who saw fit to use his name and photos without permission. His brother David is legal conservator of the estate and his sister Rebecca is handling issues related to Eagle Rock Research and ongoing research projects.

Media help in locating Darwin is welcome. Continuing efforts to solve this mystery include recent DNA sampling. Stories about his disappearance continue to appear throughout the world. Issues surrounding missing adult investigations have received new attention following the tragedies of 911.

#s70-71: Tom Thorne, age 64; Beth Williams, age 53; Died: December 29, 2004. Two wild life scientists, Husband-and-wife wildlife veterinarians who were nationally prominent experts on chronic wasting disease and brucellosis were killed in a snowy-weather crash on U.S. 287 in northern Colorado.

#69: Taleb Ibrahim al-Daher. Died: December 21, 2004. Iraqi nuclear scientist was shot dead north of Baghdad by unknown gunmen. He was on his way to work at Diyala University when armed men opened fire on his car as it was crossing a bridge in Baqouba, 57 km northeast of Baghdad. The vehicle swerved off the bridge and fell into the Khrisan river. Al-Daher, who was a professor at the local university, was removed from the submerged car and rushed to Baqouba hospital where he was pronounced dead.

#68: John R. La Montagne, age 61. Died: November 2, 2004. Died while in Mexico, no cause stated, later disclosed as pulmonary embolism. PhD, Head of US Infectious Diseases unit under Tommie Thompson. Was NIAID Deputy Director. Expert in AIDS Program work and Microbiology and Infectious Diseases.

#67: Matthew Allison, age 32. Died: October 13, 2004. Fatal explosion of a car parked at an Osceola County, Fla., Wal-Mart store. It was no accident, Local 6 News has learned. Found inside a burned car. Witnesses said the man left the store at about 11 p.m. and entered his Ford Taurus car when it exploded. Investigators said they found a Duraflame log and propane canisters on the front passenger’s seat. Allison had a college degree in molecular biology and biotechnology.

#66: Mohammed Toki Hussein al-Talakani, age 40. Died: September 5, 2004: Iraqi nuclear scientist was shot dead in Mahmudiya, south of Baghdad. He was a practicing nuclear physicist since 1984.

#65: Professor John Clark, Age 52, Died: August 12, 2004. Found hanged in his holiday home. An expert in animal science and biotechnology where he developed techniques for the genetic modification of livestock; this work paved the way for the birth, in 1996, of Dolly the sheep, the first animal to have been cloned from an adult. Head of the science lab which created Dolly the sheep. Prof Clark led the Roslin Institute in Midlothian, one of the world s leading animal biotechnology research centers. He played a crucial role in creating the transgenic sheep that earned the institute worldwide fame. He was put in charge of a project to produce human proteins (which could be used in the treatment of human diseases) in sheep’s milk. Clark and his team focused their study on the production of the alpha-I-antitryps in protein, which is used for treatment of cystic fibrosis. Prof Clark also founded three spin-out firms from Roslin – PPL Therapeutics, Rosgen and Roslin BioMed.

#64: Dr. John Badwey, age 54. Died: July 21, 2004. Scientist and accidental politician when he opposed disposal of sewage waste program of exposing humans to sludge. Suddenly developed pneumonia like symptoms then died in two weeks. Biochemist at Harvard Medical School specializing in infectious diseases.

#63: Dr. Bassem al-Mudares. Died: July 21, 2004. Mutilated body was found in the city of Samarra, Iraq*. He was a Phd. chemist and had been tortured before being killed. He was a drug company worker who had a chemistry doctorate.

#62: Professor Stephen Tabet, age 42. Died on July 6, 2004 from an unknown illness. He was an associate professor and epidemiologist at the University of Washington. A world-renowned HIV doctor and researcher who worked with HIV patients in a vaccine clinical trial for the HIV Vaccine Trials Network

#61: Dr. Larry Bustard, age 53. Died July 2, 2004 from unknown causes. He was a Sandia scientist in the Department of Energy who helped develop a foam spray to clean up congressional buildings and media sites during the anthrax scare in 2001. He worked at Sandia National Laboratories in Albuquerque. As an expert in bioterrorism, his team came up with a new technology used against biological and chemical agents.

#60: Edward Hoffman, ag2. Die 6ed July 1, 2004 from unknown causes. Hoffman was a professor and a scientist who also held leadership positions within the UCLA medical community. He worked to develop the first human PET scanner in 1973 at Washington University in St. Louis.

#59: John Mullen, age 67. Died: June 29, 2004. A Nuclear physicist poisoned with a huge dose of arsenic. A nuclear research scientist with McDonnell Douglas. Police investigating will not say how Mullen was exposed to the arsenic or where it came from. At the time of his death he was doing contract work for Boeing.

#58: Dr. Paul Norman, age 52. Died: June 27, 2004. From Salisbury Wiltshire. Killed when the single-engine Cessna 206 he was piloting crashed in Devon. Expert in chemical and biological weapons. He traveled the world lecturing on defending against the scourge of weapons of mass destruction. He was married with a 14-year-old son and a 20-year-old daughter, and was the chief scientist for chemical and biological defense at the Ministry of Defense’s laboratory at Porton Down, Wiltshire. The crash site was examined by officials from the Air Accidents Investigation Branch and the wreckage of the aircraft was removed from the site to the AAIB base at Farnborough.

#57: Dr. Assefa Tulu, age 45. Died: June 24, 2004. Dr. Tulu joined the health department in 1997 and served for five years as the county’s lone epidemiologist. He was charged with trackcing the health of the county, including the spread of diseases, such as syphilis, AIDS and measles. He also designed a system for detecting a bioterrorism attack involving viruses or bacterial agents. Tulu often coordinated efforts to address major health concerns in Dallas County, such as the West Nile virus outbreaks of the past few years, and worked with the media to inform the public. Found face down, dead in his office. The Dallas County Epidemiologist died of a hemorrhagic stroke.

#56: Thomas Gold, age 84. Died: June 22, 2004. Austrian born Thomas Gold famous over the years for a variety of bold theories that flout conventional wisdom and reported in his 1998 book, “The Deep Hot Biosphere,” the idea challenges the accepted wisdom of how oil and natural gas are formed and, along the way, proposes a new theory of the beginnings of life on Earth and potentially on other planets. Long term battle with heart failure. Gold’s theory of the deep hot biosphere holds important ramifications for the possibility of life on other planets, including seemingly inhospitable planets within our own solar system. He was Professor Emeritus of Astronomy at Cornell University and was the founder (and for 20 years director) of Cornell Center for Radiophysics and Space Research. He was also involved in air accident investigations.

#55: Antonina Presnyakova, age 46. Died: May 25, 2004. A Russian scientist at a former Soviet biological weapons laboratory in Siberia died after an accident with a needle laced with ebola. Scientists and officials said the accident had raised concerns about safety and secrecy at the State Research Center of Virology and Biotechnology, known as Vector, which in Soviet times specialized in turning deadly viruses into biological weapons. Vector has been a leading recipient of aid in an American program.

#54: Dr. Eugene Mallove, age 56. Died: May 14, 2004. Autopsy confirmed Mallove died as a result of several blunt-force injuries to his head and neck. Ruled as murder. Found at the end of his driveway. Alt. Energy Expert who was working on viable energy alternative program and announcement. Norwich Free Academy graduate.Beaten to death during an alleged robbery. Mallove was well respected for his knowledge of cold fusion. He had just published an “open letter” outlining the results of and reasons for his last 15 years in the field of “new energy research.” Dr. Mallove was convinced it was only a matter of months before the world would actually see a free energy device.

#53: William T. McGuire, age 39. Found May 5, 2004, last seen late April 2004. Body found in three suitcases floating in Chesapeake Bay. He was NJ University Professor and Senior programmer analyst and adjunct professor at the New Jersey Institute of Technology in Newark. He emerged as one of the world’s leading microbiologists and an expert in developing and overseeing multiple levels of biocontainment facilities.

#52: Ilsley Ingram, age 84. Died on April 12, 2004 from unknown causes. Ingram was Director of the Supraregional Haemophilia Reference Centre and the Supraregional Centre for the Diagnosis of Bleeding Disorders at the St. Thomas Hospital in London. Although his age is most likely the reason for his death, why wasn’t this confirmed by the family in the news media?

#51: Mohammed Munim al-Izmerly, Died: April 2004. This distinguished Iraqi chemistry professor died in American custody from a sudden hit to the back of his head caused by blunt trauma. It was uncertain exactly how he died, but someone had hit him from behind, possibly with a bar or a pistol. His battered corpse turned up at Baghdad’s morgue and the cause of death was initially recorded as “brainstem compression”. It was discovered that US doctors had made a 20cm incision in his skull.

#50: Vadake Srinivasan, Died: March 13, 2004.Microbiologist crashed car into guard rail in Baton Rouge, LA. Death was ruled a stroke. He was originally from India, was one of the most-accomplished and respected industrial biologists in academia, and held two doctorate degrees.

#49: Dr. Michael Patrick Kiley, age 62. Died: January 24, 2004. Died of massive heart attack. Ebola, Mad Cow Expert, top of the line world class. It is interesting to note, he had a good heart, but it “gave out”. Dr. Shope and Dr. Kiley were working on the lab upgrade to BSL 4 at the UTMB Galvaston lab for Homeland Security. The lab would have to be secure to house some of the deadliest pathogens of tropical and emerging infectious disease as well as bioweaponized ones.
LEAD Technologies Inc. V1.01

#48: Robert Shope, age 74. Died: January 23, 2004. Virus Expert Who Warned of Epidemics, Dies died of lung transplant complications. Later purported to have died of Idiopathic Pulmonary Fibrosis which can be caused by either environmental stimulus or a VIRUS. It would not be hard to administer a drug that would cause Dr. Shope’s lung transplant to either be rejected or to cause complications from the transplant. Dr. Shope led the group of scientists who had an 11 MILLION dollar fed grant to ensure the new lab would keep in the nasty bugs. Dr. Shope also met with and worked with Dr. Mike Kiley on the UTMB Galveston lab upgrade to BSL 4. When the upgrade would be complete the lab will host the most hazardous pathogens known to man especially tropical and emerging diseases as well as bioweapons.

#47: Dr Richard Stevens, age 54. Died: January 6, 2004. He had disappeared after arriving for work on 21 July, 2003. A doctor whose disappearance sparked a national manhunt, killed himself because he could not cope with the stress of a secret affair, a coroner has ruled. He was a hematologist. (hematologists analyze the cellular composition of blood and blood producing tissues e.g. bone marrow).

 


Big Brother is Watching ,Stay Alert

 

By Dr. Mercola

Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write1:

“When Eugene Kaspersky, the founder of Europe’s largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create.

He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet.

“Cyberweapons are the most dangerous innovation of this century,” he told a gathering of technology company executives… While the United States and Israel are using the weapons to slow the nuclear bomb-making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses.”

Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Telecommunication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry.

What makes the Flame virus a major potential concern for common citizens of the world is the fact that it’s the first virus found with the ability to spread wirelessly by attaching itself to Bluetooth-enabled devices.

Once there, it can not only trace and steal information stored on those devices; according to Kramer and Perlroth the program also contains a “microbe” command that can activate any microphone within the device, record whatever is going on at the time—presumably whether you’re actually using the device or not—and transmit audio files back to the attacker. This, clearly, has huge privacy implications were it to be deployed against civilian populations.

New Revelations about the Links Between Flame and Stuxnet

While cybersecurity experts initially claimed there were no links between the earlier Stuxnet worm and the Flame virus, a recent article on The Verge now reports that the two are undoubtedly related2. Joshua Kopstein writes:

“[I]n examining an earlier version of Stuxnet, the lab’s researchers now find that they were wrong: a previously overlooked module within the virus is now providing the “missing link” between the two pieces of malware. The module in question… matches very closely with a module used by an early version Flame. “It was actually so similar, that it made our automatic system classify it as Stuxnet,” wrote Alexander Gostev… indicating that the module was likely the seed of both viruses. “We think it’s actually possible to talk about a ‘Flame’ platform, and that this particular module was created based on its source code.”

The new evidence suggests that Stuxnet and Flame are two sides of the same coin, with the former built for sabotage and the latter for surveillance. But researchers also say that the Flame platform pre-dated Stuxnet and its sister, Duqu, and was likely built in the Summer of 2008.”

InformationWeek Security recently offered the following advice3:”… Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday [June 8] for Windows Server Update Services (WSUS) 3.0 Service Pack 2 (SP2), which according to the release notes “strengthens the WSUS communication channels … [by] trusting only files that are issued by the Microsoft Update certification authority.”

Microsoft is also set to issue an update Tuesday–as part of its monthly Patch Tuesday–that will further update all supported versions of Windows to block Flame. Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. “Apply the certificate patch released a week ago today if you haven’t done so already,” said SANS Institute chief research officer Johannes B. Ullrich in a blog post. “This way, no patch signed by the bad certificate should be accepted tomorrow. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway.”

When installing the update, however, do so preferably only if using a trusted environment. “Avoid patches while ‘on the road.’ Apply them in your home [or] work network whenever possible,” said Ullrich. “This doesn’t eliminate the chance of a ‘man in the middle’ (MitM) attack, but it reduces the likelihood.”

For users who must update while on the road, perhaps because they travel frequently, always use a VPN connection back to the corporate network, said Ullrich, since hotel networks can be malware and attack hotbeds. “Hotel networks and public hotspots frequently use badly configured HTTP proxies that can be compromised and many users expect bad SSL certificates–because of ongoing MitM attacks,” he said.”

Spy Central: Utah

In related news, Wired Magazine recently reported that the US government is building a massive spy center, right in the heart of Mormon country, in Bluffdale, Utah4–so massive, in fact, that once finished, the facility will be five times larger than the US Capitol.

According to Wired Magazine:

“Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013.

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes.

And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US.

The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”[Emphasis mine]

That about says it all. And for those of you still under the mistaken belief that the US government does not have the authority to spy on its citizens, consider the following:

“… [The NSA] has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed…

In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail…

As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, [William] Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications. He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore.

If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law.

Instead it chose to put the wiretapping rooms at key junction points throughout the country… thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says… The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations…

… Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything…”

To learn more, I highly recommend reading the featured Wired article5 in its entirety. It’s a fascinating read, but it will not likely make you sleep better at night. The full article is available on their website and is free to view.

Google Also in the Privacy News

Beginning the first week of June, Google will warn you every time it picks up activity on your computer account that looks suspiciously like someone trying to monitor your computer activities. Google won’t say how it figured out that state-sponsored attackers may be attempting to compromise your account or computer. But it’s promised to let you know if it thinks Big Brother is tuned in to what you’re doing.

As recently reported on the New York Times’ blog6, the warning will pop up at the top of your Gmail inbox, Google home page, or Chrome browser, stating:

“Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.”

According to a Google blog post by Eric Grosse, VP of Security Engineering at Google7:

“If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account.

Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors.

Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for https://accounts.google.com/ in your browser bar. These warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack.”

The Next Big War Zone = the Internet

Unless you’ve been living under a rock this past year, you’ve surely heard about the repeated attempts to restrict your online freedom and grant government near limitless control over the internet and its content.

It began in January with the introduction of two proposed laws in US Congress: the Stop Online Piracy Act (SOPA), and the Protect IP Act (PIPA). While “sold” as laws to address online copyright infringement, most of which allegedly arise from outside the US, both laws contained measures capable of severely restricting online freedom of speech and harm web sites and online communities of all kinds, including this one. After tens of millions of people rose up in various protests, both online and by hitting the pavement, both bills were “indefinitely postponed.”

Many have warned, however, that the bills are not “dead” and are likely to return.

It didn’t take long for the next round. In April, the Cyber Intelligence Sharing and Protection Act (CISPA) was brought forth, and quickly became described by opponents as an even greater threat to internet freedom than SOPA and PIPA. I won’t go into any detailed discussion on these bills here, but simply want to bring your attention to the fact that bills such as these three, while dressed up as laws that will protect you and save you money, are poorly guised attempts to gut privacy laws and open the door for a totalitarian takeover of the internet and its content.

Campaign for Liberty8 is continuing its fight to stop another government intrusion, warning that this coming December, the United Nations will also be meeting to compile even more recommendations for international internet regulations.

While it may seem hopeless at times, I urge you to take an active role anytime the opportunity presents itself to take a stand. I personally believe internet freedom and health freedom go hand in hand these days, as a majority of people get a majority of their health information from freely available web sites such as mine.

Right now, you can sign the Campaign for Liberty Protect Internet Freedom Mandate.

If Squelching In formation Freedom Doesn ‘t Work, What’s Next?

The draconian advancements in surveillance do not end with the erection of a massive spy central and ever-increasing attacks on internet freedom. We also have some 63 drone launch sites within the US9, and the US military has admitted it now has drone technology in the form of tiny mechanical insects, equipped with cameras, microphones, and DNA sampling capabilities10.

Besides that, there’s an ever-expanding arsenal of so-called “active denial weapons”—directed energy weapons that can scatter or incapacitate those in its path, by a variety of means11. Such weapons are already being used domestically by various law enforcement agencies for crowd control. Then there are more sinister signs of readiness for domestic combat. In April, news reports began circulating questioning the Department of Homeland Security’s rationale for purchasing 450 million rounds of hollow point bullets12

A report by RT News reads:

“The department has yet to discuss why they are ordering such a massive bevy of bullets for an agency that has limited need domestically for doing harm, but they say they expect to continue receiving shipments from the manufacturer for the next five years, during which they plan to blow through enough ammunition to execute more people than there are in the entire United States.

… the choice — and quantity — of its hollow point order raises a lot of questions about future plans for the DHS… On their website, the contractor claims that the ammunition is specifically designed so that it can pass through a variety of obstructions and offers “optimum penetration for terminal performance.” Or, in other words, this is the kind of bullet designed to stop any object dead in its tracks and, if emptied into the hands of the DHS a few hundred million times, just might do as much.

… As the DHS gains more and more ground in fighting terrorism domestically, the US at the same time has turned the tables to make its definition of terrorist way less narrow. With any American blogger or free thinking on the fringe of what the government can go after under H.R. 347, or the National Defense Authorization Act that allows for the indefinite detention of US citizens without charge, the DHS could just be blasting through what’s left of its budget to make sure that its roster of agents across the country can get in their target practice over the next few years.”

Without Online Freedom, You Cannot Exercise Health Freedom

Some of you may at this point wonder why I report on an issue such as this, so let me make this point clear. Access to health information could easily be deemed a “threat” to national welfare—especially when web sites such as this one publish information that contradicts the official government stance. Examples such as advising women against national mammography screening standards, or raising concerns about vaccine safety, or questioning conventional cancer treatments could all be considered a threat to an extremely profitable status quo.

In such a scenario, they could simply shut Mercola.com, and others like us, down; leaving you with no truth-telling, corruption-exposing, alternative voices other than the officially sponsored viewpoint. And it should be quite clear by now that the government-sanctioned stance on most issues relating to health and diet are primarily dictated by powerful lobbying groups furthering financially-driven industry agendas that have absolutely nothing to do with optimizing health and longevity.

Don’t Be Fooled—Internet Security Bills are Likely Nothing of the Sort

Interestingly enough, CISPA is promoted primarily as a cyber security bill, which brings us full circle back to where this article started. Recall, the Flame virus has surveillance capabilities that far surpass previous viruses and worms that may collect or destroy data. In fact, its capability to transfer to Bluetooth-enabled gadgets and secretly activate microphones renders it perfect for spying on anyone and everyone, anywhere, at any time… which is exactly the plan, if you believe the information detailed in the featured Wired Magazine article above.

It’s interesting to note the rationale used when trying sell us this bill. According to an April 26 report in the International Business Times13:

“Co-sponsor Rep. Dutch Ruppersberger, D-Md., says CISPA provides essential tools for repelling online security threats: “Without important, immediate changes to American cyber security policy, I believe our country will continue to be at risk for a catastrophic attack on our nation’s vital networks, networks that power our homes, provide our clean water or maintain the other critical services we use every day.”

Sounds like he was talking about an eventuality just like the Flame virus, or the older Stuxnet worm, for that matter—both of which, incidentally, appear to have targeted Iranian oil- and nuclear facilities, and neither of which has been officially traced back to any country or agency, despite our already overwhelming security apparatus—just over a month before Flame was discovered by a Russian antivirus company which, by the way, currently employs the virus hunter who discovered Stuxnet in 2010.

I’ll leave the meaning of such coincidences for you to ponder. But suffice it to say, it does not bode well if a law like CISPA is enacted that allows companies and governments to share information collected online, especially when combined with a massive data-mining virus that can skip around from one wireless piece of technology to another, from computers to cell phones to iPads, gathering data on every single social network contact every single person has, and audio files on every single conversation any one might have at any point in time. Especially now that we will shortly have the facility to store and “process” all that data.

In closing, I will simply urge you to take efforts at curbing online freedom and extending the government’s reach seriously, and whenever such efforts are launched, take action to help preserve your right to health freedom, which is closely tied to the right to online freedom of speech.

For right now, you can take a stand by signing the Campaign for Liberty Protect Internet Freedom Mandate. Source

 


It Always Happens when People With No Guns Stand Up Against People With Guns

 


The World Is NOT going to wait for YOU to get up from the sofa and switch off the TV .. The world IS changing Course. Either you are with the ones with the guns or you are with the rest of us,the 99%. But you have to choose side

Respect to all the People of our global community that are rising up against manipulation and enforcement. All copuntries in protest are not mentioned but it doesn’t mean we ignore their righteous struggle against Suppression.

Greece

Spain

Mexico

Thailand

Italy

Germany

UK

USA

Egypt

 


'Police Trojan' locks down computers and asks their owners to pay a fine for violating several laws

 

IDG News Service – A ransomware application that locks computers and asks their owners to pay fines for allegedly violating several laws through their online activity is targeting U.S. and Canadian users, malware experts from security firm Trend Micro said on Wednesday.

The Trend Micro researchers refer to this particular ransomware — malware that disables system functionality and asks for money to restore it — as the “Police Trojan,” because it displays rogue messages claiming to originate from law enforcement agencies.

The “Police Trojan” appeared in 2011 and originally targeted users from several countries in Western Europe, including Germany, Spain, France, Austria, Belgium, Italy and the U.K.

The rogue message displayed after locking down a victim’s computer is localized in the victim’s language and claims to be from a national law enforcement agency from the victim’s country.

The owners of the locked-down computers are told that their IP addresses were involved in illegal activities and are asked to pay a fine using prepaid cards like Ukash or Paysafecard. The malware’s authors prefer these payment services because transactions made through them cannot be reversed and are hard to trace.

When investigating new command and control (C&C) servers recently used by this malware, Trend Micro researchers discovered message templates that were designed for U.S. and Canadian users. This suggests that the malware’s scope has been extended to these two countries.

“Not only has the list of countries increased but also their targets are now more specific,” Trend Micro senior threat researcher David Sancho wrote in a blog post on Wednesday. “For instance, UKash vouchers are not available in the U.S., thus the U.S. fake police notification that spoofs the Computer Crime & Intellectual Property Section of the U.S. Department of Justice, only mentions PaySafeCard as the accepted payment method.”

The rogue messages displayed to U.S. users read: “This operating system is locked due to the violation of the federal laws of the United States of America! Following violations were detected: Your IP address was used to visit websites containing pornography, child pornography, zoophilia and child abuse. Your computer also contains video files, elements of violence and child pornography! Spam messages with terrorist motives were also sent from your computer. This computer lock is aimed to stop your illegal activity.”

The user is asked to pay a US$100 fine through Paysafecard and the message is accompanied by the logos of several supermarkets and chain stores from where Paysafecard vouchers can be bought.

The Trend Micro researchers have found clues that suggest a link between this “Police Trojan” and Gamarue, a piece of information stealing malware distributed through drive-by download attacks launched from infected websites and spam emails.

There are also signs that the C&C software used to manage the computers infected with this Trojan horse is being resold, which means that multiple cybercrime gangs might be spreading this ransomware.

“What is becoming crystal clear is that the same Eastern European criminal gangs who were behind the fake antivirus boom are now turning to the Police Trojan strategy,” Sancho said. “We believe this is a malware landscape change and not a single gang attacking in a novel way.”

 


NSA Insider: You Are the Target: “They’re Pulling Together the Data About Virtually Every U.S. Citizen ”

 

Few Americans would believe that the government has the technological capability and wherewithal to monitor, track, log, and analyze the everyday activities of American citizens. The idea that the National Security Agency, an organization responsible the collection and analysis of foreign communications and foreign signals intelligenc, would operate on US soil to turn the surveillance apparatus on the people they are tasked with protecting has up until now been reserved for conspiracy theorists and Hollywood movies.

It turns out that it’s not a conspiracy, and not only does the NSA operate within the borders of the United States, they are assembling detailed dossiers on every single one of us. William Binney, an NSA whistleblower who recently resigned his post at the NSA over its illegal domestic surveillance programs, notes that the agency is engaged in implementing a total surveillance net over America with the help of private businesses like internet and telecom companies – and their target is YOU.

Domestically, they’re pulling together all the data about virtually every U.S. citizen in the country and assembling that information, building communities that you have relationships with, and knowledge about you; what your activities are; what you’re doing.

So the government is accumulating that kind of information about every individual person and it’s a very dangerous process.

…from one company alone… they were sending, according to my estimate… I reckon there were between 10 and 12 [companies] that were participating… that one company was providing 320 million average logs per day since 2001.

As we’ve noted previously Everything You Do Is Monitored. The NSA’s technological capabilities far surpass anything that has ever existed. Not only is the NSA nowbuilding a massive surveillance facility in Utah capable of monitoring and logging multiple yottabytes (1 Trillion Terabytes of information) of data like emails, cell phone communications, text messages, shopping records and social network interactions, there are over fifty fusion centers across the United States where data is processed on a local or regional level:

All of this information will eventually be fused into one large database. In fact, the government has already setup well over fifty fusion centers around the nation. What goes on in these centers is kept strictly confidential, and there doesn’t seem to be any agency in charge of them, but we know they exist, and we know that their purpose is to acquire, aggregate and act on whatever information they have available to them. These are fairly new, appearing just over the last several years. But be assured that as processing power and software technology improves, so too will the surveillance capabilities of fusion like facilities, whether they belong to government, private industry or criminal industry.

Of course the NSA denies the existence of a spy center designed to monitor US-based communications and activity, but we already know from past experience that government denying something exists doesn’t necessarily mean it’s not real.

They are watching everything we do. For what reason? We can’t say for certain, but history tells us any time government(s) start making lists and collecting data it often turns into a mechanism of intimidation, control and a culling of those who are perceived to be acting against the state.

Our Republic is on very dangerous ground.

From SHTF Plan

 


Ethiopian Journalists Accused of Terrorism

 

Human rights groups, press watchdogs, and even the U.S. government have strongly denounced recent prison sentences meted out against journalists and opposition activists accused of violating Ethiopia’s anti-terrorism laws.

In an unusually tough statement against a close ally, the State Department said it was “deeply concerned about the trial, conviction, and sentencing of Ethiopian journalist Eskinder Nega, as well as seven political opposition figures, under the country’s Anti-Terrorism Proclamation.”

It said the 18-year prison sentence for Eskinder and life imprisonment for opposition leader Andualem Arage Wale handed down by the high court in Addis Ababa Friday “are extremely harsh and reinforce our serious questions about the politicized use of Ethiopia’s anti-terrorism law in these and other cases.”

The sentences are “emblematic of the Ethiopian government’s determination to gag any dissenting voice in the country”, charged Claire Beston, Amnesty International’s Ethiopia researcher.

She said both men, as well as Nathnael Mekonnen Gebre Kidan, another opposition leader who was convicted late last month in the same anti-terrorism case, were “prisoners of conscience – convicted and imprisoned because of their legitimate and peaceful activities. They should be immediately and unconditionally released.”

The prison sentences followed the Jun. 27 conviction by the Ethiopian high court of a total of two dozen journalists, political opposition leaders, and other activists for allegedly violating the controversial Anti-Terrorism Proclamation of 2009 (ATP).

Of the 24, Eskinder, an influential blogger and journalist who has long championed basic freedoms in Ethiopia, is perhaps the most well known in the West, having just recently received the prestigious PEN America press freedom award. While he remains in detention, the other five journalists convicted by the court were tried in absentia.

Eskinder, who has been detained at least eight times since 1995, according to Human Rights Watch (HRW), was charged with participating in a terrorist organisation, planning a terrorist act, and “working with the Ginbot 7 organisation”, a U.S.-based opposition group which the government of Prime Minister Meles Zenawi officially designated as a terrorist group last year.

The ATP is the latest in a series of laws that the Meles government has used to crack down on political dissent and suppress free speech, according to international human rights groups, including Amnesty International, HRW, and the Committee to Protect Journalists (CPJ), among others.

In a joint appearance in February, several independent U.N. human rights experts, including special rapporteurs who deal with press freedom, counter-terrorism and human rights, and human rights defenders, also warned against the use of the ATP against individuals who were merely exercising their rights to free speech and association.

The ATP’s article on support for terrorism, for example, contains a vague prohibition on “moral support”, under which journalists have been charged and convicted. “Encouragement of terrorism,” under which all 24 defendants in the latest case were charged, includes the publication of statements “likely to be understood as encouraging terrorist acts”, a highly subjective definition that lends itself to serious abuse.

“Not only do (Meles’s) officials have zero tolerance for criticism, they consider people who either talk to or write about the opposition as abetting terrorists,” noted Tobias Hoffman, an East Africa expert at the University of California at Berkeley, in an op-ed published in the New York Times last week just before the prison sentences were announced.

As defined by the ATP, an “act of terrorism” is also vague and could include activities such as organising a peaceful march or assembly.

“The Ethiopian government is using every means at its disposal to shut down press freedom,” said HRW’s deputy Africa director, Leslie Lefkow. “The use of draconian laws and trumped-up charges to crack down on free speech and peaceful dissent makes a mockery of the rule of law.”

She urged Ethiopia’s donors to immediately call for the release of all those who have been unlawfully prosecuted under the law and for a revision of the Proclamation.

She was joined by several other organisations, including London-based Article 19 and the Federation of African Journalists (FAJ), whose president, Omar Faruk Osman, called the prosecution of journalists under anti-terrorism laws “unacceptable”.

That position was echoed by the State Department whose strong denunciation of the prosecution and conviction of the defendants was particularly notable given Washington’s generally staunch support for the Meles government.

Indeed, Addis Ababa has been one of the three top U.S. aid recipients in sub-Saharan Africa over the last several years. In 2011, it received nearly 800 million dollars, more than any other African nation.

The European Union, which released a somewhat more subdued criticism of the trial, is also a major donor to Ethiopia, about a third of whose budget is provided by donor countries and international financial institutions, such as the World Bank, according to Hoffman.

In a major 2010 report, HRW criticised the donors’ alleged failure to monitor how the Meles government uses the aid to support repression and consolidate its power and to take corrective measures.

“The West, most prominently the United States and the European Union, have concluded a strange pact with Meles Zenawi: So long as his government produces statistics that evince economic growth, they are willing to fund his regime – whatever its human rights abuses,” Hoffman charged last week.

In addition, Washington, in particular, receives the benefit of Ethiopian cooperation in counter-terrorism, currently targeted against al-Shabaab, the radical Islamist group in neighbouring Somalia. The U.S., for example, has been using a small base in Arba Minch to fly surveillance drones over Somali territory.

Similarly, Ethiopia has offered help on other regional security issues, most recently by providing 4,000 troops to separate Sudanese from South Sudanese forces in the contested border town of Abeye at a moment when war between the two sides loomed as a distinct possibility, according to David Shinn, a former U.S. ambassador to Addis Ababa who now teaches at George Washington University.

He praised the State Department’s harsh rebuke of the court’s action, noting that it was “much stronger than anything they usually put out, and it was long overdue”.

But he also suggested that Washington had little leverage over Addis Ababa, noting that about 85 percent of U.S. aid to Ethiopia is earmarked for health programmes and food aid. Most of the rest is development assistance, and only a token military training programme of less than 100,000 dollars a year, he said.

“The question is, how far do you push it?” he told IPS. “Do you say (to the government), ‘If you go any further, we’re going to stop our humanitarian aid?’ The answer (from the Meles government) would be, ‘Okay.'”

“Humanitarian aid doesn’t give you much leverage,” he said.

 


SECURE COMMUNICATION INTEROPERABILITY PROTOCOL (SCIP) by NSA-pdf

SECURE COMMUNICATION INTEROPERABILITY PROTOCOL (SCIP)
The Secure Communication Interoperability Protocol (SCIP) is a communications standard developed bythe National Security Agency (NSA) to enable interoperable secure communications among allies andpartners around the globe.

The SCIP-210 Signaling Plan is the specification that defines the application layer signaling used tonegotiate a secure end-to-end session between two communication devices, independent of networktransport. SCIP negotiates the operational mode (e.g., voice, data, etc.), the cryptographic algorithmsuite (e.g., Suite A, Suite B, etc), and the traffic encryption key used for each secure session. It alsoprovides capabilities for cryptographic synchronization and operational mode control betweencommunicating end-point devices. SCIP is designed to operate over any network and is currently utilizedin devices operating on a wide variety of networks including PSTN, ISDN, CDMA, GSM, IP, and satellite.Potential developers of SCIP devices may contact the NSA SCIP Program Office atSCIP_POC@missi.ncsc.mil for further information. The SCIP-210 Signaling Plan is available withoutrestrictions on its use for the development, manufacture, and sale of SCIP products. Compliance andinteroperability testing will be necessary to ensure secure interoperability between the wide variety of current and future SCIP products

SCIP-210Revision 3.219 December 2007vii

LIST OF FIGURES
Figure 1.6-1 SCIP Application State Diagram – Point-to-Point…………………………………………..11 Figure 1.6-2 SCIP Protocol Layer Diagram – Point-to-Point………………………………………………12 Figure 1.7-1 Process Diagram Symbols……………………………………………………………………………13 Figure 2.1-1(a) Transport Layer Signaling Time Line (Framed)…………………………………………17 Figure 2.1-1(b) Transport Layer Signaling Time Line (Full bandwidth-to-Framed)………………18 Figure 2.1-1(c) Transport Layer Signaling Time Line (Full bandwidth-to-Full bandwidth)……18 Figure 2.1-2 Transmission Frame Group………………………………………………………………………….19 Figure 2.1-3 ESCAPE Processing…………………………………………………………………………………..24 Figure 2.1-4(a) Message Transmission…………………………………………………………………………….31 Figure 2.1-4(b) Message Transmission (Cont.)…………………………………………………………………32 Figure 2.1-5(a) Message Reception…………………………………………………………………………………35 Figure 2.1-5(b) Message Reception (Cont.)……………………………………………………………………..36 Figure 2.2-1(a) FIREFLY Secure Call Setup Signaling Time Line……………………………………..39 Figure 2.2-1(b) PPK Secure Call Setup Signaling Time Line……………………………………………..41 Figure 2.2-2 Capabilities Message Transmission………………………………………………………………57 Figure 2.2-3 Capabilities Message Reception Unique Processing……………………………………….60 Figure 2.2-4 Common Capabilities Message Processing……………………………………………………62 Figure 2.2-5 Parameters/Certificate Message Transmission……………………………………………….70 Figure 2.2-6(a) Parameters/Certificate Message Reception………………………………………………..72 Figure 2.2-6(b) Parameters/Certificate Message Reception (Cont.)…………………………………….73 Figure 2.2-6(c) Parameters/Certificate Message Reception (Cont.)……………………………………..74 Figure 2.2-7 F(R) Message Transmission…………………………………………………………………………79 Figure 2.2-8 F(R) Message Reception……………………………………………………………………………..81 Figure 2.2-9 Cryptosync Message Transmission……………………………………………………………….84 Figure 2.2-10 Cryptosync Message Reception………………………………………………………………….86 Figure 2.3-1(a) Notification Message Signaling Time Line (Full Bandwidth to Framed)……..107 Figure 2.3-1(b) Notification Message Signaling Time Line (Framed to Framed)………………..107 Figure 2.3-1(c) Notification Message Signaling Time Line (Full Bandwidth to FullBandwidth)…………………………………………………………………………………………..107 Figure 2.3-1(d) Mode Change Signaling Time Line………………………………………………………..108 Figure 2.3-1(e) Two-Way Resync Signaling Time Line…………………………………………………..108 Figure 2.3-2 Notification Message Processing (Connection Terminate)…………………………….115 Figure 2.3-3(a) Notification Message Processing (Native Clear Voice/Connection Idle)……..117 Figure 2.3-3(b) Notification Message Processing (Native Clear Voice/Connection Idle)(Cont.)…………………………………………………………………………………………………118 Figure 2.3-4 Notification Message Receive Processing (CKL Transfer)…………………………….124 Figure 2.3-5 Notification Message Processing (Secure Dial)……………………………………………126 Figure 2.3-6 Notification Message Processing (Attention)……………………………………………….130 Figure 2.3-7 Notification Message Processing (Secure Update)………………………………………..133 Figure 2.3-8 Mode Change Processing…………………………………………………………………………..135 Figure 2.3-9 Two-Way Resync Processing…………………………………………………………………….140 Figure 3.2-1 Application Timeout Processing…………………………………………………………………151 Figure 3.3-1 Secure MELP Voice Transmission Format – Blank and Burst……………………….154 Figure 3.3-2 Sync Management Frame Format – Blank and Burst…………………………………….154

SCIP-210Revision 3.219 December 2007vii

LIST OF FIGURES
Figure 1.6-1 SCIP Application State Diagram – Point-to-Point…………………………………………..11 Figure 1.6-2 SCIP Protocol Layer Diagram – Point-to-Point………………………………………………12 Figure 1.7-1 Process Diagram Symbols……………………………………………………………………………13 Figure 2.1-1(a) Transport Layer Signaling Time Line (Framed)…………………………………………17 Figure 2.1-1(b) Transport Layer Signaling Time Line (Full bandwidth-to-Framed)………………18 Figure 2.1-1(c) Transport Layer Signaling Time Line (Full bandwidth-to-Full bandwidth)……18 Figure 2.1-2 Transmission Frame Group………………………………………………………………………….19 Figure 2.1-3 ESCAPE Processing…………………………………………………………………………………..24 Figure 2.1-4(a) Message Transmission…………………………………………………………………………….31 Figure 2.1-4(b) Message Transmission (Cont.)…………………………………………………………………32 Figure 2.1-5(a) Message Reception…………………………………………………………………………………35 Figure 2.1-5(b) Message Reception (Cont.)……………………………………………………………………..36 Figure 2.2-1(a) FIREFLY Secure Call Setup Signaling Time Line……………………………………..39 Figure 2.2-1(b) PPK Secure Call Setup Signaling Time Line……………………………………………..41 Figure 2.2-2 Capabilities Message Transmission………………………………………………………………57 Figure 2.2-3 Capabilities Message Reception Unique Processing……………………………………….60 Figure 2.2-4 Common Capabilities Message Processing……………………………………………………62 Figure 2.2-5 Parameters/Certificate Message Transmission……………………………………………….70 Figure 2.2-6(a) Parameters/Certificate Message Reception………………………………………………..72 Figure 2.2-6(b) Parameters/Certificate Message Reception (Cont.)…………………………………….73 Figure 2.2-6(c) Parameters/Certificate Message Reception (Cont.)……………………………………..74 Figure 2.2-7 F(R) Message Transmission…………………………………………………………………………79 Figure 2.2-8 F(R) Message Reception……………………………………………………………………………..81 Figure 2.2-9 Cryptosync Message Transmission……………………………………………………………….84 Figure 2.2-10 Cryptosync Message Reception………………………………………………………………….86 Figure 2.3-1(a) Notification Message Signaling Time Line (Full Bandwidth to Framed)……..107 Figure 2.3-1(b) Notification Message Signaling Time Line (Framed to Framed)………………..107 Figure 2.3-1(c) Notification Message Signaling Time Line (Full Bandwidth to FullBandwidth)…………………………………………………………………………………………..107 Figure 2.3-1(d) Mode Change Signaling Time Line………………………………………………………..108 Figure 2.3-1(e) Two-Way Resync Signaling Time Line…………………………………………………..108 Figure 2.3-2 Notification Message Processing (Connection Terminate)…………………………….115 Figure 2.3-3(a) Notification Message Processing (Native Clear Voice/Connection Idle)……..117 Figure 2.3-3(b) Notification Message Processing (Native Clear Voice/Connection Idle)(Cont.)…………………………………………………………………………………………………118 Figure 2.3-4 Notification Message Receive Processing (CKL Transfer)…………………………….124 Figure 2.3-5 Notification Message Processing (Secure Dial)……………………………………………126 Figure 2.3-6 Notification Message Processing (Attention)……………………………………………….130 Figure 2.3-7 Notification Message Processing (Secure Update)………………………………………..133 Figure 2.3-8 Mode Change Processing…………………………………………………………………………..135 Figure 2.3-9 Two-Way Resync Processing…………………………………………………………………….140 Figure 3.2-1 Application Timeout Processing…………………………………………………………………151 Figure 3.3-1 Secure MELP Voice Transmission Format – Blank and Burst……………………….154 Figure 3.3-2 Sync Management Frame Format – Blank and Burst…………………………………….154

SCIP-210Revision 3.219 December 2007vii

LIST OF FIGURES
Figure 1.6-1 SCIP Application State Diagram – Point-to-Point…………………………………………..11 Figure 1.6-2 SCIP Protocol Layer Diagram – Point-to-Point………………………………………………12 Figure 1.7-1 Process Diagram Symbols……………………………………………………………………………13 Figure 2.1-1(a) Transport Layer Signaling Time Line (Framed)…………………………………………17 Figure 2.1-1(b) Transport Layer Signaling Time Line (Full bandwidth-to-Framed)………………18 Figure 2.1-1(c) Transport Layer Signaling Time Line (Full bandwidth-to-Full bandwidth)……18 Figure 2.1-2 Transmission Frame Group………………………………………………………………………….19 Figure 2.1-3 ESCAPE Processing…………………………………………………………………………………..24 Figure 2.1-4(a) Message Transmission…………………………………………………………………………….31 Figure 2.1-4(b) Message Transmission (Cont.)…………………………………………………………………32 Figure 2.1-5(a) Message Reception…………………………………………………………………………………35 Figure 2.1-5(b) Message Reception (Cont.)……………………………………………………………………..36 Figure 2.2-1(a) FIREFLY Secure Call Setup Signaling Time Line……………………………………..39 Figure 2.2-1(b) PPK Secure Call Setup Signaling Time Line……………………………………………..41 Figure 2.2-2 Capabilities Message Transmission………………………………………………………………57 Figure 2.2-3 Capabilities Message Reception Unique Processing……………………………………….60 Figure 2.2-4 Common Capabilities Message Processing……………………………………………………62 Figure 2.2-5 Parameters/Certificate Message Transmission……………………………………………….70 Figure 2.2-6(a) Parameters/Certificate Message Reception………………………………………………..72 Figure 2.2-6(b) Parameters/Certificate Message Reception (Cont.)…………………………………….73 Figure 2.2-6(c) Parameters/Certificate Message Reception (Cont.)……………………………………..74 Figure 2.2-7 F(R) Message Transmission…………………………………………………………………………79 Figure 2.2-8 F(R) Message Reception……………………………………………………………………………..81 Figure 2.2-9 Cryptosync Message Transmission……………………………………………………………….84 Figure 2.2-10 Cryptosync Message Reception………………………………………………………………….86 Figure 2.3-1(a) Notification Message Signaling Time Line (Full Bandwidth to Framed)……..107 Figure 2.3-1(b) Notification Message Signaling Time Line (Framed to Framed)………………..107 Figure 2.3-1(c) Notification Message Signaling Time Line (Full Bandwidth to FullBandwidth)…………………………………………………………………………………………..107 Figure 2.3-1(d) Mode Change Signaling Time Line………………………………………………………..108 Figure 2.3-1(e) Two-Way Resync Signaling Time Line…………………………………………………..108 Figure 2.3-2 Notification Message Processing (Connection Terminate)…………………………….115 Figure 2.3-3(a) Notification Message Processing (Native Clear Voice/Connection Idle)……..117 Figure 2.3-3(b) Notification Message Processing (Native Clear Voice/Connection Idle)(Cont.)…………………………………………………………………………………………………118 Figure 2.3-4 Notification Message Receive Processing (CKL Transfer)…………………………….124 Figure 2.3-5 Notification Message Processing (Secure Dial)……………………………………………126 Figure 2.3-6 Notification Message Processing (Attention)……………………………………………….130 Figure 2.3-7 Notification Message Processing (Secure Update)………………………………………..133 Figure 2.3-8 Mode Change Processing…………………………………………………………………………..135 Figure 2.3-9 Two-Way Resync Processing…………………………………………………………………….140 Figure 3.2-1 Application Timeout Processing…………………………………………………………………151 Figure 3.3-1 Secure MELP Voice Transmission Format – Blank and Burst……………………….154 Figure 3.3-2 Sync Management Frame Format – Blank and Burst…………………………………….154

SCIP-210Revision 3.219 December 2007viii
LIST OF FIGURES (Cont.)
Figure 3.3-3 Secure MELP Voice Transmission Format – Burst w/o Blank……………………….159 Figure 3.3-4 Sync Management Frame Format – Burst w/o Blank…………………………………….159 Figure 3.3-5 Clear MELP Voice Transmission Format…………………………………………………….163 Figure 3.3-6 Clear MELP Voice Sync Management Frame Format…………………………………..163 Figure 3.3-7 Secure G.729D Voice Transmission……………………………………………………………166 Figure 3.3-8 Secure G.729D Voice Superframe Details…………………………………………………..167 Figure 3.3-9 Secure G.729D Voice Escape and Return Example (No Cryptosync)……………..167 Figure 3.3-10 Secure G.729D Voice Sync Management Frame Format……………………………..169 Figure 3.3-11 Secure G.729D Voice Encrypted Speech Frame Header………………………………170 Figure 3.4-1 Secure RT Asynchronous Data Message Preparation…………………………………….174 Figure 3.4-2 V.14 Asynchronous Data Input Ordering…………………………………………………….175 Figure 3.4-3 Secure BET Asynchronous Data Transmission Format…………………………………178 Figure 3.4-4 Secure BET Asynchronous Data Superframe Structure…………………………………179 Figure 3.4-5 Sync Management Frame Format……………………………………………………………….180 Figure 3.4-6 V.14 Asynchronous Data Input Ordering…………………………………………………….180 Figure 4.1-1 Rekey Protocol Conversion Using the GRFE……………………………………………….184 Figure 4.1-2 Electronic Rekey System Infrastructure………………………………………………………185 Figure 4.2-1 SCIP Rekey Message Preparation……………………………………………………………….186 Figure 5.1-1 Multipoint Transport Signaling Timeline…………………………………………………….191 Figure 5.1-2 Multiple Multipoint Cryptosync Message Transmissions………………………………192 Figure 5.2-1 SCIP Multipoint State Diagram………………………………………………………………….197 Figure 5.2-2 Multipoint Secure Voice Transmit Signaling Time Line………………………………..198 Figure 5.2-3 Multipoint Cryptosync Message Transmission……………………………………………..200 Figure 5.2-4 Multipoint MELP Voice Transmission Format – Blank and Burst………………….202 Figure 5.2-5 End of Multipoint Secure Traffic Transmission……………………………………………203 Figure 5.2-6 Multipoint Cryptosync Message Reception………………………………………………….205 Figure 5.2-7 Multipoint Secure Voice Traffic Reception………………………………………………….206 Figure 5.2-8 Multipoint Late Entry Cryptographic Synchronization………………………………….208 Figure 5.2-9 End of Multipoint Secure Traffic Reception…………………………………………………209 Figure B-1 DTX Voice………………………………………………………………………………………………..B-1


Newest U.S. Counterterrorism Strategy: Trolling

In the decade since 9/11, the U.S. government has used a wide variety of tactics against terrorists. It’s invaded countries where they operated (and ones where they didn’t). It’s tried to win the backing of foreign populations in which the terrorists hide. And it’s sent commandos and deadly flying robots to kill them one by one.

One thing it hasn’t done, until now: troll them.

Within the State Department, a Silicon Valley veteran has quietly launched an improbable new initiative to annoy, frustrate and humiliate denizens of online extremist forums. It’s so new that it hasn’t fully taken shape: Even its architects concede it hasn’t fleshed out an actual strategy yet, and accordingly can’t point to any results it’s yielded. Its annual budget is a rounding error. The Pentagon will spend more in Afghanistan in the time it takes you to finish reading this sentence.

But it also represents, in the mind of its creator, a chance to discourage impressionable youth from becoming terrorists — all in an idiom they firmly understand. And if it actually works, it might stand a chance of cutting off al-Qaida’s ability to replenish its ranks at a time when it looks to be reeling.

The program, called Viral Peace, seeks to occupy the virtual space that extremists fill, one thread or Twitter exchange at a time. Shahed Amanullah, a senior technology adviser to the State Department and Viral Peace’s creator, tells Danger Room he wants to use “logic, humor, satire, [and] religious arguments, not just to confront [extremists], but to undermine and demoralize them.” Think of it as strategic trolling, in pursuit of geopolitical pwnage.

Outside the first Viral Peace/Generation Change seminar in Davao City, Philippines, April 2012. Photo: Crishyl Ann/Facebook

Al-Qaida’s influence has waxed and waned during the past decade, but its adherents, both current and potential, have gradually drifted online. Forums like the password-protected Shumukh site host extremist bulletin boards, where regulars debate the finer points of jihadist theory and boast of grandiose plans to assassinate senior U.S. officials.

The denizens of those forums might be scrubs. But the online havens are, increasingly, the town square for extremism, especially as drones and commandos batter the terrorists’ physical sanctuaries. Al-Qaida’s Yemen branch publishes an English-language web magazine; its Somali branch recently joined Twitter.

The U.S. has thought of several strategies for confronting the not-so-new wave of online extremism, from apparent DDoS attacks on extremist websites to infiltrating them using fake jihadi personas. The White House’s broad counterterrorism strategy, meanwhile, all but ignores the internet.

Amanullah has a different view. You don’t necessarily need to deface the forums if you can troll them to the point where their most malign influences are neutralized.

In an interview at a Washington coffee shop near his State Department office, Amanullah explains that online extremists have “an energy, they’ve got a vitality that frankly attracts some of these at-risk people,” Amanullah says. “It appeals to macho, it appeals to people’s rebellious nature, it appeals to people who feel downtrodden.” Creating a comparable passion on the other side is difficult. But it’s easier if the average online would-be jihadi has his mystique challenged through the trial by fire that is online ridicule.

To Jarret Brachman, it’s an idea with promise. Brachman is one of the leading researchers of online jihadism. The people who post to the forums are “are massive narcissists [who] need constant ego boosts,” Brachman says — and, like other online blowhards, they tend to talk outside their areas of presumed expertise. Omar Farouk Abdulmutallab, the would-be Christmas bomber, used to bloviate on an Islamic forum about “love and marriage” while simultaneously complaining about his moribund love life.

And that makes Abdulmutallab’s virtual contemporaries vulnerable to trolling — hopefully, before they can command attract an audience. The jihadi braggarts “keep the momentum, the anger and the virulence going in forums, and they have a disproportionate impact, so if you can get rid of them, it’ll pay dividends,” Brachman says.

But not every extremist forum is alike. Will McCants, a former State Department official now at the CNA think tank and another scholar of online jihadism, argues Amanullah’s pupils can’t focus on the hardcore extremist forums like Shumukh. “The admins will immediately take down” posts that challenge the jihadi narrative, McCants tells Danger Room. “For something like that to work, it would have to be in more mainstream fora where extremists are trying to recruit,” like the conservative muslm.net, where “you can engage and the admins wouldn’t necessarily take you offline.”

But all that is several steps ahead of Viral Peace at the moment. Viral Peace doesn’t have a strategy yet. And to hear Amanullah and his colleagues tell it, the State Department won’t be the ones who come up with one. It’s better, they argue, to let Muslims in various foreign countries figure out which message boards to troll and how to properly troll them. Americans won’t know, say, the Tagalog-language Internet better than Filipinos; and as outsiders, they won’t have the credibility necessary to actually make an impact. The best the State Department can do is train good trolls — which Amanullah began to do this spring.

That means taking a big risk. If Viral Peace works as intended, with the trainees taking control of the program, Amanullah and the State Department will have little control over how the program actually trolls the terrorists. And the first wave of meetings in Muslim countries shows how far the program has to go.

Inside a Viral Peace meeting in the Philippines, April 2012. Photo courtesy of Humera Khan.

It makes sense that someone like Amanullah would think about pwning terrorists. A 44-year old proud Muslim and proud California geek, he was the editor-in-chief of the web magazine Altmuslim; started an online restaurant-rating service called Zabihah that’s like a Halal version of Yelp; and launched a business service called Halalfire to drive advertising to the Muslim consumer market. Long before he arrived at the State Department in October 2010, he was profiled in Newsweek, which described the bookshelves at his El Cerrito home as “lined with copies of Wired magazine and Jack Kerouac novels.”

In April, Amanullah dispatched two young associates, Humera Khan of the U.S.-based counter-radicalization think tank Muflehun and the playwright and essayist Wajahat Ali, to set the idea into practice. They took a quickie tour of Muslim nations to meet young local leaders who might be interested in confronting extremism. It was a pilot program for Viral Peace and a related program of Amanullah’s called Generation Change. The idea was to connect notable people — rising stars in the arts, business and culture fields, who had an online following — with one another and to people who focused on counterterrorism.

“You don’t need to teach this generation how to use social media. They know how to use Twitter. They know how to use Facebook,” says Khan, who participated in Viral Peace in her individual capacity. “The whole [Viral Peace] curriculum is about learning what strategy is.”

Except that the first wave of Viral Peace didn’t yield a strategy. In Singapore, Malaysia, the Philippines and Indonesia — Ali went to Pakistan as well — the opening meetings brought together about 30 people per country, selected by the State Department and Amanullah’s own social networks, for sprawling brainstorming sessions. Some of them were just about how Muslim communities are perceived in their own countries. And some participants didn’t place counterterrorism at the top of their agendas.

“Yes, there were issues of extremism” discussed, Khan says. “But by and large, the people felt that if you could deal with economics, education, making sure the rights of the underprivileged were maintained, it would take care of a lot of the other problems.”

That may be, but it’s also far afield from trolling the trolls. Amanullah accepts that mission creep is a risk. But, he contends, if you want to get the most effective people denouncing jihadis online, it’s a risk worth accepting. And unlike the U.S. government, they stand the better chance of getting lurkers to think of them as “actually a cool group of people to be in,” as Amanullah puts it.

What’s more, Amanullah has basically no budget. Viral Peace, a global program, has mere thousands of dollars in annual seed money so far; the Obama administration is asking for about $85 billion for the Afghanistan war next year. Participants are staying connected via Facebook, with minimal U.S. government presence as a middleman; Amanullah wants to expand to more countries soon. But it’s not clear where Viral Peace fits in Obama’s broader counterterrorism strategy: White House officials declined repeated requests to comment for this story. Amanullah sees it as a supplement to existing counterterrorism efforts — not a replacement for, say, drone strikes in Yemen — and he also concedes that his project will take a long time before it starts to pay counterterrorism dividends.

But Amanullah doesn’t view that as an unconquerable obstacle. He thinks of counterterrorism like a venture capitalist might.

“I come from Silicon Valley, from the start-up environment. I want to prove you can do small, inexpensive, high-impact projects that don’t just talk about the problem but solve the problem,” he says. “And solve it the right way: not with the government’s heavy hand but by empowering local people to do what they already know to do but don’t know how.”Source


U.S. Government Accountability Office:Fiscal Year 2013 Budget Request -pdf

 

This testimony discusses the U.S. Government Accountability Office’s (GAO) budget request for fiscal year (FY) 2013. GAO very much appreciates the confidence Congress has shown in the efforts to help support the Congress in carrying out its constitutional responsibilities and to help improve government performance and accountability for the benefit of the American people.

GAO is requesting an appropriation of $526.2 million for FY 2013 to support a staffing level of 3,100. This funding level represents a modest increase of 2.9 percent over FY 2012, and is 5.4 percent below our FY 2010 level. The majority of the requested increase represents the first step in rebuilding our staff capacity to a level that will enable us to optimize the benefits we yield for the Congress and the nation.


We have carefully reviewed every aspect of our operations from a zero base to identify opportunities to reduce costs without sacrificing the quality of our work and preserving our ability to assist the Congress in addressing the most important priorities facing the nation. However, given that staff costs now represent about 81 percent of our budget and the deep reductions already taken in our infrastructure programs, reducing the size of our workforce could not be avoided. By the end of FY 2012, for the first time in over 75 years, GAO’s staffing level will drop below 3,000 staff, resulting in a net reduction of 11 percent in our staff capacity, or 365 people, in only a 2-year period.

GAO’s work directly contributes to improvements in a broad array of federal programs affecting Americans everywhere and remains one of the best investments across the federal government. With this committee’s support, in FY 2011, GAO provided assistance to every standing congressional committee and about 70 percent of their subcommittees. GAO issues hundreds of products annually in response to congressional requests and mandates. Our work yielded significant results across the government, including financial benefits of $45.7 billion—a return on investment of $81 for every dollar invested in GAO. Our findings and recommendations produce measurable financial benefits for the federal government, enabled through the actions of Congress and Executive Branch agencies, ultimately making funds available to reduce government expenditures, reallocate funds to more productive areas, or increase revenues.

 


The Dreaming Panda

My neuroimmune journey: PANS, ME, and POTS

Autism & Oughtisms

Dealing with the endless "oughts" of parenting and autism.

Well Balanced Blog

Take Control of Your Own Health!

Έγκλημα και Τιμωρία/Crime and Punishment/Crime et Châtiment/Delitto e castigo/Преступление и наказание

CRIME DOES NOT PAY... PLUS, THE BUTLER DID IT! AND REMEMBER: WHAT DOESN'T KILL YOU, WILL -MOST LIKELY- TRY AGAIN... AND DON'T FORGET: TODAY IS A GOOD DAY FOR SOMEONE ELSE TO DIE.

BanTheBBC Blog

A constant reminder that life would be so much better without the BBC's TV Licence Gestapo

Healthy At Any Age

Welcome to June Rousso's Blog !

iGlinavos education

glintiss.co.uk

Scottish Gaelic

Word a Day

NEO INKA - ΣΕ ΠΡΟΣΤΑΤΕΥΕΙ, ΔΥΝΑΜΩΣΕ ΤΟ!!!

ΓΙΝΕ Ο ΕΠΟΜΕΝΟΣ ΚΡΙΚΟΣ ΣΤΟ ΔΙΚΤΥΟ.

Talk of the Tail

"Tails" from pets searching for their forever home.

ultimatemindsettoday

A great WordPress.com site

TBN Media

Alea Jacta Est

Watts Up With That?

The world's most viewed site on global warming and climate change

Levi Quackenboss

Putting the boss in quack.

Unstrange Mind

Remapping My World

Psychinfo.gr

ΑΡΘΡΑ ΨΥΧΟΛΟΓΙΑΣ

Wee Ginger Dug

Biting the hand of Project Fear

QUITTRAIN®

Quit Smoking & Take Your Freedom Back!

Lefteria

Στό μυαλό είναι ο στόχος το νού σου