Started by poseidonlost, Oct 02, 2017, 02:02:51 AM
0 Members and 1 Guest are viewing this topic.
Quote from: poseidonlost on Oct 05, 2017, 07:02:24 PMPossibly It's all good though. Look at the corpse picture again. The empty shells look like they landed on top of the pool of coagulated blood instead of being there before and having blood run over them.There's no blood on top of the empty shells. So how did he do this on his own and then fire shells after all that blood from his head flowed all over hell?Last Edit by Palmerston
Quote from: Dick Stallion on Oct 05, 2017, 07:17:34 PMCan you post the link to the picture?Last Edit by Palmerston
Quote from: Dick Stallion on Oct 05, 2017, 07:40:18 PMMeet The Iraq War Veteran Cyber Intelligence Contractor Who Led Police To The Vegas Shooterhttp://www.zerohedge.com/news/2017-10-03/meet-iraq-war-veteran-who-led-police-vegas-shooterLast Edit by Palmerston
Quote from: John_Back_From_The_Club_O on Jan 26, 2017, 03:12:33 PMTrump adds biometrics industry veteran to transition teamhttp://www.biometricupdate.com/201611/trump-adds-biometrics-industry-veteran-to-transition-teamNovember 28, 2016 - According to an FCW report, President-elect Donald Trump has named Michael T. Dougherty, currently CEO of the Secure Identity and Biometrics Association (SIBA), as a member of his transition team, with responsibility over the Department of Homeland Security.The transition process, governed by the Presidential Transition Act, ensures the smooth transfer of executive power. Dougherty will provide policy advice to the incoming Trump administration, which has made completing the biometric entry-exit visa tracking system, now in pilot project stage, a key component of its proposed immigration policy.Dougherty has over 20 years of legal and policy experience in the federal government. At the Department of Homeland Security (DHS), he was appointed Ombudsman for U.S. Citizenship and Immigration Services where he led an office of 27 professionals with a US$6.5 million budget.Dougherty served as Legislative Counsel to Senator Jon Kylon the Senate Judiciary Committee and prior to that, as a Senior Policy Advisor at DHS Headquarters. He also served as an appellate litigator with the Department of Justice (DOJ) Office of Immigration Litigation, and as a Special Assistant U.S. Attorney in the Eastern District of Virginia.Immediately before he became the CEO of SIBA, he was Director of Business Development in Homeland Security Programs at Raytheon. At the defense contractor, he was responsible for initiating and supporting pursuits in the homeland and public safety markets, and leading collaborative efforts across businesses to bring distinctive products and services to civilian mission sets. He also represented Raytheon as a a thought leader, writing white papers and speaking at both U.S. and international events. He also worked to evaluate third-party technologies for investment purposes.At SIBA, Dougherty is responsible for promoting awareness of technologies, services and processes that could secure and improve travel, borders, health care, law enforcement, commercial transactions and emergency situation management. SIBA is a non-profit group that promotes the value of secure identity technologies and biometric solutions. It members, who include Unisys, General Dynamics Mission Systems, Leidos, Identify, RiVidium, NEC, Advanced Optical Systems, and Disaster Solutions, share a common interest in biometrics, identity management, cyber protection, and mission assurance.------------------------------------------------More "draining the swamp"?
Quote from: One Revelator on Sep 03, 2017, 03:05:44 PMNotes from Shipp's presentation: Who is "they"??Shadow or Secret Government is Intelligence Agencies while Deep State SUPPORTS these agencies (mostly financial)Shadow Government primary players: CIA/CFR, NSA connected to Silicon Valley, And MSM. They control/influence all 3 branches of the visible government. Note that CIA was created WITHOUT Congressional approval.Secondary players include FBI, NGA, NGTC, NRO, DIA (torture program), DOS, DHS, DNI – 17 Agencies, and JSOC – President's private army.The Deep State, the system behind Shadow Government consists of the MIC, MICC intelligence contractors, defense contractors, Federal Reserve, IMF/World Bank, MIC lobbyists, foreign lobbyists, central banks, and a connection between the Treasury and Wall Street offshore accounts.Estimated 4,800,000 Americans hold some sort of security clearance. They have signed a secrecy agreement and can go to jail for speaking about what they are involved with.Primary MIC players are Lockheed Martin (tracks all USPS mail, airport biometrics, info tracking for CIA and NSA), Northrop Grumman, Boeing, Booz Allen Hamilton, Raytheon, and General Dynamics. One trillion USD/year is sent to these folks. All go through the Congressional Armed Services Committee headed by......John McCain.Intelligence Industrial Complex consists of Leidos Holdings, SAIC, CACI, CSRA, Booz Allen. They are contracted, without public accountability by CIA, NSA, NRO, and NGA. Booz Allen rakes in 50 billion USD/yr. These companies do 80% of the top secret work for the government.
Quote from: One Revelator on Oct 02, 2017, 05:38:52 PMSoros is a small part of a much bigger picture. Qui Bono?Lockheed Martin, Northrop Grumman, Boeing, General Dynamics, Raytheon, Booz-Allen Hamilton, Leidos Holdings, SAIC, CSRA, and CACI to name a few...$800 billion is at stake.Yeah. The "middle east" correction to the narrative doesn't make sense and is completely out of profile for this guy. Quite the globetrotter all of a sudden with his GF in the FAR east. Whenever I see "FBI" as the source of fresh narrative-steering information, I'm always dubious. I also see no evidence from the transcripts that the guy in the room shot first. This is all based on statements from anonymous "authorities".
QuoteThis exclusive is being released for free in the public interest, and was enabled by crowdfunding. I'd like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this in-depth investigation. Please support independent, investigative journalism for the global commons.Mass surveillance is about control. It's promulgators may well claim, and even believe, that it is about control for the greater good, a control that is needed to keep a cap on disorder, to be fully vigilant to the next threat. But in a context of rampant political corruption, widening economic inequalities, and escalating resource stress due to climate change and energy volatility, mass surveillance can become a tool of power to merely perpetuate itself, at the public's expense.A major function of mass surveillance that is often overlooked is that of knowing the adversary to such an extent that they can be manipulated into defeat. The problem is that the adversary is not just terrorists. It's you and me. To this day, the role of information warfare as propaganda has been in full swing, though systematically ignored by much of the media.Here, INSURGE INTELLIGENCE exposes how the Pentagon Highlands Forum's co-optation of tech giants like Google to pursue mass surveillance, has played a key role in secret efforts to manipulate the media as part of an information war against the American government, the American people, and the rest of the world: to justify endless war, and ceaseless military expansionism.THE WAR MACHINEIn September 2013, the website of the Montery Institute for International Studies' Cyber Security Initiative (MIIS CySec) posted a final version of a paper on 'cyber-deterrence' by CIA consultant Jeffrey Cooper, vice president of the US defense contractor SAIC and a founding member of the Pentagon's Highlands Forum. The paper was presented to then NSA director Gen. Keith Alexander at a Highlands Forum session titled 'Cyber Commons, Engagement and Deterrence' in 2010.MIIS CySec is formally partnered with the Pentagon's Highlands Forum through an MoU signed between the provost and Forum president Richard O'Neill, while the initiative itself is funded by George C. Lee: the Goldman Sachs executive who led the billion dollar valuations of Facebook, Google, eBay, and other tech companies.Cooper's eye-opening paper is no longer available at the MIIS site, but a final version of it is available via the logs of a public national security conferencehosted by the American Bar Association. Currently, Cooper is chief innovation officer at SAIC/Leidos, which is among a consortium of defense technology firms including Booz Allen Hamilton and others contracted to develop NSA surveillance capabilities.The Highlands Forum briefing for the NSA chief was commissioned under contract by the undersecretary of defense for intelligence, and based on concepts developed at previous Forum meetings. It was presented to Gen. Alexander at a "closed session" of the Highlands Forum moderated by MIIS Cysec director, Dr. Itamara Lochard, at the Center for Strategic and International Studies (CSIS) in Washington DC.SAIC/Leidos' Jeffrey Cooper (middle), a founding member of the Pentagon's Highlands Forum, listening to Phil Venables (right), senior partner at Goldman Sachs, at the 2010 Forum session on cyber-deterrence at the CSISLike Rumsfeld's IO roadmap, Cooper's NSA briefing described "digital information systems" as both a "great source of vulnerability" and "powerful tools and weapons" for "national security." He advocated the need for US cyber intelligence to maximize "in-depth knowledge" of potential and actual adversaries, so they can identify "every potential leverage point" that can be exploited for deterrence or retaliation. "Networked deterrence" requires the US intelligence community to develop "deep understanding and specific knowledge about the particular networks involved and their patterns of linkages, including types and strengths of bonds," as well as using cognitive and behavioural science to help predict patterns. His paper went on to essentially set out a theoretical architecture for modelling data obtained from surveillance and social media mining on potential "adversaries" and "counterparties."A year after this briefing with the NSA chief, Michele Weslander Quaid — another Highlands Forum delegate — joined Google to become chief technology officer, leaving her senior role in the Pentagon advising the undersecretary of defense for intelligence. Two months earlier, the Defense Science Board (DSB) Task Force on Defense Intelligence published its report on Counterinsurgency (COIN), Intelligence, Surveillance and Reconnaissance (IRS) Operations. Quaid was among the government intelligence experts who advised and briefed the Defense Science Board Task Force in preparing the report. Another expert who briefed the Task Force was Highlands Forum veteran Linton Wells. The DSB report itself had been commissioned by Bush appointee James Clapper, then undersecretary of defense for intelligence — who had also commissioned Cooper's Highlands Forum briefing to Gen. Alexander. Clapper is now Obama's Director of National Intelligence, in which capacity he lied under oath to Congress by claiming in March 2013 that the NSA does not collect any data at all on American citizens.Michele Quaid's track record across the US military intelligence community was to transition agencies into using web tools and cloud technology. The imprint of her ideas are evident in key parts of the DSB Task Force report, which described its purpose as being to "influence investment decisions" at the Pentagon "by recommending appropriate intelligence capabilities to assess insurgencies, understand a population in their environment, and support COIN operations."The report named 24 countries in South and Southeast Asia, North and West Africa, the Middle East and South America, which would pose "possible COIN challenges" for the US military in coming years. These included Pakistan, Mexico, Yemen, Nigeria, Guatemala, Gaza/West Bank, Egypt, Saudi Arabia, Lebanon, among other "autocratic regimes." The report argued that "economic crises, climate change, demographic pressures, resource scarcity, or poor governance could cause these states (or others) to fail or become so weak that they become targets for aggressors/insurgents." From there, the "global information infrastructure" and "social media" can rapidly "amplify the speed, intensity, and momentum of events" with regional implications. "Such areas could become sanctuaries from which to launch attacks on the US homeland, recruit personnel, and finance, train, and supply operations."The imperative in this context is to increase the military's capacity for "left of bang" operations — before the need for a major armed forces commitment — to avoid insurgencies, or pre-empt them while still in incipient phase. The report goes on to conclude that "the Internet and social media are critical sources of social network analysis data in societies that are not only literate, but also connected to the Internet." This requires "monitoring the blogosphere and other social media across many different cultures and languages" to prepare for "population-centric operations."[INSERT: THIS IS EXACTLY WHY THEY'VE CREATED THE "SUPER SECRET LIFE" NARRATIVE OF COMPLETE PATSY STEPHEN PADDOCK.]The Pentagon must also increase its capacity for "behavioral modeling and simulation" to "better understand and anticipate the actions of a population" based on "foundation data on populations, human networks, geography, and other economic and social characteristics." Such "population-centric operations" will also "increasingly" be needed in "nascent resource conflicts, whether based on water-crises, agricultural stress, environmental stress, or rents" from mineral resources. This must include monitoring "population demographics as an organic part of the natural resource framework."Other areas for augmentation are "overhead video surveillance," "high resolution terrain data," "cloud computing capability," "data fusion" for all forms of intelligence in a "consistent spatio-temporal framework for organizing and indexing the data," developing "social science frameworks" that can "support spatio-temporal encoding and analysis," "distributing multi-form biometric authentication technologies ["such as fingerprints, retina scans and DNA samples"] to the point of service of the most basic administrative processes" in order to "tie identity to all an individual's transactions." In addition, the academy must be brought in to help the Pentagon develop "anthropological, socio-cultural, historical, human geographical, educational, public health, and many other types of social and behavioral science data and information" to develop "a deep understanding of populations."A few months after joining Google, Quaid represented the company in August 2011 at the Pentagon's Defense Information Systems Agency (DISA) Customer and Industry Forum. The forum would provide "the Services, Combatant Commands, Agencies, coalition forces" the "opportunity to directly engage with industry on innovative technologies to enable and ensure capabilities in support of our Warfighters." Participants in the event have been integral to efforts to create a "defense enterprise information environment," defined as "an integrated platform which includes the network, computing, environment, services, information assurance, and NetOps capabilities," enabling warfighters to "connect, identify themselves, discover and share information, and collaborate across the full spectrum of military operations." Most of the forum panelists were DoD officials, except for just four industry panelists including Google's Quaid.DISA officials have attended the Highlands Forum, too — such as Paul Friedrichs, a technical director and chief engineer of DISA's Office of the Chief Information Assurance Executive.KNOWLEDGE IS POWERGiven all this it is hardly surprising that in 2012, a few months after Highlands Forum co-chair Regina Dugan left DARPA to join Google as a senior executive, then NSA chief Gen. Keith Alexander was emailing Google's founding executive Sergey Brin to discuss information sharing for national security. In those emails, obtained under Freedom of Information by investigative journalist Jason Leopold, Gen. Alexander described Google as a "key member of [the US military's] Defense Industrial Base," a position Michele Quaid was apparently consolidating. Brin's jovial relationship with the former NSA chief now makes perfect sense given that Brin had been in contact with representatives of the CIA and NSA, who partly funded and oversaw his creation of the Google search engine, since the mid-1990s.In July 2014, Quaid spoke at a US Army panel on the creation of a "rapid acquisition cell" to advance the US Army's "cyber capabilities" as part of the Force 2025 transformation initiative. She told Pentagon officials that "many of the Army's 2025 technology goals can be realized with commercial technology available or in development today," re-affirming that "industry is ready to partner with the Army in supporting the new paradigm." Around the same time, most of the media was trumpeting the idea that Google was trying to distance itself from Pentagon funding, but in reality, Google has switched tactics to independently develop commercial technologies which would have military applications the Pentagon's transformation goals.Yet Quaid is hardly the only point-person in Google's relationship with the US military intelligence community.One year after Google bought the satellite mapping software Keyhole from CIA venture capital firm In-Q-Tel in 2004, In-Q-Tel's director of technical assessment Rob Painter — who played a key role in In-Q-Tel's Keyhole investment in the first place — moved to Google. At In-Q-Tel, Painter's work focused on identifying, researching and evaluating "new start-up technology firms that were believed to offer tremendous value to the CIA, the National Geospatial-Intelligence Agency, and the Defense Intelligence Agency." Indeed, the NGA had confirmed that its intelligence obtained via Keyhole was used by the NSA to support US operations in Iraq from 2003 onwards.A former US Army special operations intelligence officer, Painter's new job at Google as of July 2005 was federal manager of what Keyhole was to become: Google Earth Enterprise. By 2007, Painter had become Google's federal chief technologist.That year, Painter told the Washington Post that Google was "in the beginning stages" of selling advanced secret versions of its products to the US government. "Google has ramped up its sales force in the Washington area in the past year to adapt its technology products to the needs of the military, civilian agencies and the intelligence community," the Post reported. The Pentagon was already using a version of Google Earth developed in partnership with Lockheed Martin to "display information for the military on the ground in Iraq," including "mapping out displays of key regions of the country" and outlining "Sunni and Shiite neighborhoods in Baghdad, as well as US and Iraqi military bases in the city. Neither Lockheed nor Google would say how the geospatial agency uses the data." Google aimed to sell the government new "enhanced versions of Google Earth" and "search engines that can be used internally by agencies."White House records leaked in 2010 showed that Google executives had held several meetings with senior US National Security Council officials. Alan Davidson, Google's government affairs director, had at least three meetings with officials of the National Security Council in 2009, including White House senior director for Russian affairs Mike McFaul and Middle East advisor Daniel Shapiro. It also emerged from a Google patent application that the company had deliberately been collecting 'payload' data from private wifi networks that would enable the identification of "geolocations." In the same year, we now know, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security — agreements that Gen. Alexander was busy replicating with hundreds of telecoms CEOs around the country.Thus, it is not just Google that is a key contributor and foundation of the US military-industrial complex: it is the entire Internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the US intelligence community (or powerful financiers embedded in that community) — which sustain the Internet and the telecoms infrastructure; it is also the myriad of start-ups selling cutting edge technologies to the CIA's venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community. Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.
QuoteWhy Big Business Profit Is The Real Reason Behind NSA SurveillanceMay 14, 2015 at 3:23 pmWritten by Anti-Media News DeskClaire BernishMay 14, 2015(ANTIMEDIA) The US Surveillance State is scrambling to save itself in the wake of a federal ruling that declared the bulk collection of metadata under a provision of the Patriot Act, which is set to expire on June 1, illegal . But the reason for so many 'experts' touting the benefits of surveillance, goes beyond the basic desire to spy on Americans. Because, as you might imagine, "terrorism" is big business.Under the guise of such a nebulous phrase as the 'War on Terror', it's well known how the military-industrial complex is thriving. But another booming industry has escaped the same attention, in part because the subject, itself, is so controversial — surveillance. As we learn with increasing frequency, the government often acts as a proxy for corporate interests, and the business of spying is no exception.As would be important with any issue where the government is concerned, examining the personal history and financial ties of the so-called 'experts' offering reasons why surveillance is so crucial will give better insight into why we're being spied on.Acting on insight into the NSA's insidious surveillance program from leaks by various whistleblowers, The Intercept investigated ties between spying's biggest proponents and the lucrative field of surveillance.With House approval and an upcoming vote from the Senate, the USA Freedom Act, which by name purports to give us freedom from spying, but by content helps the program continue, these experts are popping up everywhere to explain why giving up a little liberty for security really isn't a big deal. But a big deal is precisely what someone like Jack Keane, a military analyst for Fox News, will get if the bill passes. Keane is certainly well-qualified to give his opinion, having been a four-star General in the Army and now heading the Institute for the Study of War, but when he said the bulk collection of phone records is "vital for national security", his opinion wasn't an unbiased piece of advice.Keane, who was a proponent of legislation similar to the Freedom Act, would have the public believe that "what the NSA has been doing has been right on the mark". There is good reason for this, since he has served as a board member for NSA contractor General Dynamics since 2004, a position which earns him a quarter million dollars in annual income through cash and stock options. According to a Boston Globe article from 2010, he also consults with other military contractors to have his clients hired into government jobs, though he claims his lobbying falls below the requirement for registration under the Lobbying Disclosure Act.Calling the unprecedented information disclosure by Edward Snowden a "traitorous act [which] is a perfect example of the dual threat we face from state and non-state actors" doesn't seem that unusual. But when former Republican National Committee Chair Jim Gilmore did so, it was from the perspective of board member for a major NSA contractor. Since 2009, Gilmore has earned more than $1 million in that seat at CACI International, the same firm whose contractors were responsible for the graphic abuse of prisoners at Abu Ghraib. Not so coincidentally, CACI purchased another NSA contracting firm in 2013 for $820 million, the cybersecurity-focused Six3 Systems. Gilmore doesn't deny his NSA ties, saying "I do not feel I have a conflict of interest that would prevent me from commenting on public policy issues related to national security. [...] I have been very vocal in the past as to warning against the loss of civil freedoms", but says that loss would be from the "reaction to the dangers we face in today's world." His statement sneakily switches the blame for domestic surveillance from the NSA to the public.Think tanks help to shape opinions and drive policy, and the Center for Strategic and International Studies has been a major advocate of the "irreplaceable role" of surveillance in the American landscape. In May last year, CSIS issued a report, subtitled "Principles for Rebuilding Trust in Intelligence Activities". This report disputes the fact that no terrorist attack has ever been thwarted through the sweeping communications surveillance program, calling that "perception [...] wrong." Of course, the center has good reason to do so. The government officials who released the report included CSIS president, John Hamre, who received nearly a quarter million dollars that year as a board member for NSA contractor Leidos. Former NSA director Mike McConnell was also partly responsible for that report, and at the time of its release, he was vice chairman of Booz Allen Hamilton. This is the same NSA contracting firm made famous when some of its documents were leaked by Edward Snowden.Such stunning conflicts of interest reveal a frightening trend that has permeated every facet of life in the US: big business profit will always trump personal liberties in the eyes of the government. Once an avenue for raking in cash has been found, there is virtually nothing at our disposal to stop it. Since the exploitation of section 215 of the Patriot Act for collecting metadata was deemed illegal, there is a distinct threat to the livelihood of big surveillance businesses, and experts singing industry praises are their life preservers. It's a guarantee. Therefore, that surveillance will continue, whether through deft policy handiwork or creative interpretation of existing legislation. The significance of the profit connection must be divulged to a public otherwise duped by the cloak of security. When military bases across the country raise their threat level right before the Patriot Act provisions are due for renewal, motives become transparent.Everyone knows money talks, and now, more than ever, it's watching, too.
Quote from: #1 Trouble Maker on Oct 05, 2017, 11:30:43 PMHere's a little background on the 'vet' the corporate media is waving in front of us, who just happened to be staying below the 'so-called' gunman / patsy. The rest of the story...
Quote'Q Stallion's of the board
Quote from: poseidonlost on Oct 05, 2017, 07:46:21 PMhttps://liveleak.com/view?i=36c_1507085146It's the last picture on that link.The empty shells are on top of the coagulated blood glop with no blood on top of them.Last Edit by Palmerston
Quote from: Dick Stallion on Oct 06, 2017, 05:36:08 AMI think it has been replaced. I would like to see this picture if someone can find it.Last Edit by Palmerston
Quote from: EvadingGrid on Oct 06, 2017, 06:13:12 AMSave As . . .
Quote from: Dick Stallion on Oct 06, 2017, 05:59:57 PMThis ruined my dinner, but thanks for this.I cannot conclude the story from this picture.Last Edit by Palmerston
Quote from: EvadingGrid on Oct 06, 2017, 06:10:47 PMAll I can suggest, is that you look a the brass bullet cases.Last Edit by Palmerston
Quote from: EvadingGrid on Oct 06, 2017, 11:54:54 AMCall me cynical, but the first thing I thought about the room service receipt for x 2 was a professional lady visitor.Next it will be his coke dealer . . . . Family friend of Las Vegas shooter says the mass murderer's girlfriend felt 'nervous and jittery' around him and he would sleep with prostitutes offered by casinoshttp://www.dailymail.co.uk/news/article-4955002/Friend-Las-Vegas-shooter-says-used-free-prostitutes.htmlLast Edit by Palmerston