NSA using facial recognition software to steal your images. Russia beating the West at Propaganda war in Ukraine.

I think it safe to assume nothing is sacred in terms of the NSA. They are snagging any information they can and can afford to let technology catch up to what they have. They steal your phone calls… Web searches.. Your texts… They use your phone to see where you are going and how often… They are stealing your friends lists and finding out who you talk to and how often. The New York Times is now reporting they are stealing your photos off Facebook..Instagram or any other service they want. Let’s not forget this is all against the 4th amendment of the US Constitution..

 

 

 

The implications of this are devious and mind numbing. Let’s not forget they have not stopped any attacks anywhere for any reason. They are data mining for their own nefarious illegal plans which the NSA thinks you have zero right to actually know.

 

 

 

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.

The implications of this are devious as well as mind numbing. They have yet to stop a single attack anywhere for any reason. Th continue Data mining for their own nefarious illegal plans.

The documents themselves can be found here.

 

Russia and Propaganda.

I have been interested in Propaganda for awhile and the various ways it is used both know and in our past. Propaganda has been around for hundreds of years now and has been almost perfected in WW2 and since the Cold War. The US and Russia are in a bitter propaganda war for the hearts and minds of the World concerning Ukraine.

Russia appears to be winning.

Rodionov says that, since its founding, Ruptly has attracted 14 subscribers and over 200 customers, including German broadcasters “both public and private.” Subsidies from Moscow enable Ruptly to offer professionally produced videos at prices cheaper than those of the private competition.

The battle over Ukraine is being fought with diverse means — with harsh words and soft diplomacy, with natural gas, weapons and intelligence services. But perhaps the most important instruments being deployed by Moscow are the Internet, newspapers and television, including allegedly neutral journalists and pundits dispatched around the world to propagate the Kremlin position.

“We’re in the middle of a relentless propaganda war,” says Andrew Weiss, vice president of studies at the Carnegie Endowment for International Peace, an influential Washington think tank. Weiss describes this propaganda as a crucial tool used by Russia to conduct its foreign policy.

Moscow is looking beyond the short-term, seeking to influence opinion in the long-run to create “an alternative discourse in Western countries as well,” says Margarita Simonyan, editor in chief of Kremlin foreign broadcaster RT, formerly known as Russia Today, which owns Ruptly.

The Kremlin invests around €100 million ($136 million) a year in Russian media abroad in order to influence public opinion in the West. This effort also helps explain why Putin addressed Germans directly in his speech on the annexation of Crimea. Noting the Kremlin had supported Germany’s reunification process, he called on Germans to back Russia’s reunification with Crimea. Putin’s popularity in Germany has declined steadily over the years, but his worldview remains quite popular.

A Triumphant Media Advance

Sources within the Kremlin express satisfaction these days when talking about Moscow’s information policies. “We may have won the war in Georgia in 2008, but we lost the propaganda battle against America and the West by a mile,” says one. “Thanks to RT and the Internet, though, we are now closing the gap.”

Whereas Ruptly is seeking to establish itself as an alternative to Reuters and the Associated Press in providing video footage, RT has already successfully established itself in the nine years since its creation, recently surpassing even CNN when it comes to clips viewed on YouTube. With close to 1.2 billion views, the BBC is the only media outlet ahead of RT. In Britain, RT has more viewers than the Europe-wide news station Euronews and in some major US cities, the channel is the most-viewed of all foreign broadcasters. RT’s 2,500 employees report and broadcast in Russian, English, Spanish and Arabic with German to be added soon.

The triumphant advance of Putin’s broadcaster began in a former factory in northeast Moscow. Founding RT editor Simonyan was just 25 at the time Putin appointed her in 2005. Her assignment from the Russian president: to “break the monopoly of the Anglo-Saxon mass media.”

It’s a mandate she has been pursuing successfully ever since. “There’s large demand for media that doesn’t just parrot the uniform pulp from the Western press,” says Simonyan. “Even in Western countries.” RT gives pro-Russian representatives from Eastern Ukraine far more air time than supporters of the government in Kiev, and not even Simonyan disputes this fact. “We’re something along the lines of Russia’s Information Defense Ministry,” her co-workers say, not without pride.

Ruptly and RT are only the most visible instruments being used by the Kremlin. Other propaganda methods being exploited can be less obvious.

For example, when German talk shows invite Russian journalists to speak about the Ukraine crisis, they are almost always pundits who could have been taken directly out of the Kremlin propaganda department. Programmers, of course, like to book these guests because they generate heated and provocative discussion. But it’s also a function of the fact that experts critical of the government either don’t want to talk or are kept from doing so. Take the example of Sergej Sumlenny, who served until January as the German correspondent for the Russian business magazineExpert. Early on, he appeared often on German talk shows, intelligently and pointedly criticizing Putin’s policies. He has since been driven out at the magazine.

In his stead, the Russian perspective is now represented on German talk shows by people like Anna Rose, who is generally introduced as a correspondent for Rossiyskaya Gazeta, or Russian Gazette. The name sounds innocuous enough, but eyebrows should be raised immediately when this “serious” Russian journalist begins claiming that the Ukrainian army could be shooting “at women and children” and that Russian soldiers need to provide them with protection. Her positions suddenly become more understandable with the knowledge that Rossiyskaya Gazeta is the Russian government’s official newspaper.

Manipulating Comments and Social Media

Those who read comments posted under articles about Ukraine on news websites will have noticed in recent months that they have been filled with missives that always seem to follow the same line of argumentation. Moscow’s independent business daily Vedomosti reported recently that, since the start of the Ukraine crisis, the presidential administration in Moscow has been testing how public opinion in the United States and Europe can be manipulated using the Internet and social networks. The paper reported that most of the professional comment posters active in Germany are Russian immigrants who submit their pro-Russian comments on Facebook and on news websites.

In addition, journalists and editors at German websites and publications report receiving letters and emails offering “explosive information about the Ukraine crisis” on an almost daily basis. The “sources” often mention they have evidence about the right-wing nature of the Kiev government that they would like to supply to journalists. The letters are written in German, but appear to include direct translations of Russian phrases. They would seem to have been written by mother-tongue Russian speakers.Other forms of propaganda have also been deployed in recent months. For example, there have been frequent incidences of intercepted conversations of Western diplomats or Kiev politicians getting published in ways that serve Russia’s interests. From the “Fuck the EU” statement by Victoria Nuland, the top US diplomat to Europe, right up to statements made by Estonia’s foreign minister that were apparently supposed to prove who was responsible for the deaths of protesters on Maidan Square. The Russian media also seemed to take pleasure in reporting in mid-April that CIA head John Brennan had traveled to Kiev.

There’s a high likelihood that this confidential information and the content of intercepted communications is being strewn by Russian intelligence. Officials at Western intelligence agencies assume that even communications encrypted by the Ukrainian army are being intercepted by the Russians.

 propa

http://www.spiegel.de/international/world/russia-uses-state-television-to-sway-opinion-at-home-and-abroad-a-971971.html

Advertisements

NSA. Have been talking about Stellar Wind for years or so…

I have been looking into the NSA for several years. I just find it really interesting. I have been talking about Stellar Wind for a couple or years. I posted the Wired article about the Utah data collection center because if you read the article it is clear they need this space and this supercomputer to deal with vast amounts of data. It was clear to me that meant our Data. You and my own private Data… Or so we thought. I kept saying if we only knew the exact nature of the spying we would be shocked. It has been alleged that part of Prism allows for it to pre guess a crime happening. Almost exactly like Minority Report. Great article today in Washington Post detailing Stellar Wind and tying together a bit of the programs history.

On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal.

President George W. Bush backed down, halting secret foreign-
intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.

http://washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story.html

Last week they told us they were not spying on us nor did they have any of the capabilities that Snowden alleges.

The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls.

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”

If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee.

http://cnet.com/news/nsa-admits-listening-to-us-phone-calls-without-warrants/57589495

Wait.. What? That contradicts what they said last week. A Congresswoman was quoted as saying. The Snowden allegations are the tip of the iceberg. I believe she is right. I intend on blogging every twist and turn and development that I can find.

The federal surveillance programs revealed in media reports are just “the tip of the iceberg,” a House Democrat said Wednesday.
Rep. Loretta Sanchez (D-Calif.) said lawmakers learned “significantly more” about the spy programs at the National Security Agency (NSA) during a briefing on Tuesday with counterterrorism officials.
“What we learned in there,” Sanchez said, “is significantly more than what is out in the media today.”
Lawmakers are barred from revealing the classified information they receive in intelligence briefings, and Sanchez was careful not to specify what members might have learned about the NSA’s work.
“I can’t speak to what we learned in there, and I don’t know if there are other leaks, if there’s more information somewhere, if somebody else is going to step up, but I will tell you that I believe it’s the tip of the iceberg,” she said.

Read more: http://thehill.com/video/house/305047-dem-rep-lawmakers-learned-significantly-more-about-surveillance-programs-in-nsa-briefing#ixzz2WP69cw8A
Follow us: @thehill on Twitter | TheHill on Facebook

http://thehill.com/video/house/305047-dem-rep-lawmakers-learned-significantly-more-about-surveillance-programs-in-nsa-briefing

One more really good article about this..

“Secret Court ruling put Tech companies in bind” NY Times.

SAN FRANCISCO — In a secret court in Washington, Yahoo’s top lawyers made their case. The government had sought help in spying on certain foreign users, without a warrant, and Yahoo had refused, saying the broad requests were unconstitutional.

The judges disagreed. That left Yahoo two choices: Hand over the data or break the law.
So Yahoo became part of the National Security Agency’s secret Internet surveillance program, Prism, according to leaked N.S.A. documents, as did seven other Internet companies.
Like almost all the actions of the secret court, which operates under the Foreign Intelligence Surveillance Act, the details of its disagreement with Yahoo were never made public beyond a heavily redacted court order, one of the few public documents ever to emerge from the court. The name of the company had not been revealed until now. Yahoo’s involvement was confirmed by two people with knowledge of the proceedings. Yahoo declined to comment.

But the decision has had lasting repercussions for the dozens of companies that store troves of their users’ personal information and receive these national security requests — it puts them on notice that they need not even try to test their legality. And despite the murky details, the case offers a glimpse of the push and pull among tech companies and the intelligence and law enforcement agencies that try to tap into the reams of personal data stored on their servers.

2012 report to Harry Reid about FISA implementation.

I need to look into FISA a bit… Hope those are not my famous last words.

http://www.fas.org/irp/agency/doj/fisa/2012rept.pdf

Since 2002. Interesting article I just ran across.

Bonus Cyberwar stuff:•••

On the hidden battlefields of history’s first known cyber-war, the casualties are piling up. In the U.S., many banks have been hit, and the telecommunications industry seriously damaged, likely in retaliation for several major attacks on Iran. Washington and Tehran are ramping up their cyber-arsenals, built on a black-market digital arms bazaar, enmeshing such high-tech giants as Microsoft, Google, and Apple. With the help of highly placed government and private-sector sources, Michael Joseph Gross describes the outbreak of the conflict, its escalation, and its startling paradox: that America’s bid to stop nuclear proliferation may have unleashed a greater threat.

Fantastic article. Very compelling to me personally. Very interested in this type of thing.

http://m.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business

Since I am at it…

A great short bio of Keith Alexander (Head of Cyber activities).

Illustrations by Mark Weaver

INSIDE FORT MEADE, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”

Great article. Written by Bamford who has written several books on the NSA.

http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/?src=longreads

Bonus link. Thought you would find this interesting.

http://www.scribd.com/mobile/doc/44606026/html5

Wow dbl bonus link and this is actually very relevant to what I am talking about.
Almost everything they deny doing in this letter June 8th 2013 has since been proven to actually be a part of Prism.

http://www.scribd.com/mobile/doc/146556159/html5

http://www.scribd.com/mobile/doc/146556159/html5

Cyber hit list

I am about to go to sleep but found this article and am stunned. If you follow this blog you know I have a interest in cyber security-warfare-methods of attack so I will have my thoughts later tomorrow.

Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals.

The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”.

It says the government will “identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power”.

http://m.guardiannews.com/world/2013/jun/07/obama-china-targets-cyber-overseas

The list apparently names China as the top target. I can totally understand that. The leaking of this info comes at a really bad time with Chinese top leadership meeting with Obama and other top officials in Wash DC next week.

I will return with more thoughts as I look into this a little bit.

Another fantastic article that recently came out concerning Cyber War. Really covers many of the same things I either think about or consider to be true based on my own amateur research into Cyber war/ attacks/ whatever you might want to call it.

On the hidden battlefields of history’s first known cyber-war, the casualties are piling up. In the U.S., many banks have been hit, and the telecommunications industry seriously damaged, likely in retaliation for several major attacks on Iran. Washington and Tehran are ramping up their cyber-arsenals, built on a black-market digital arms bazaar, enmeshing such high-tech giants as Microsoft, Google, and Apple. With the help of highly placed government and private-sector sources, Michael Joseph Gross describes the outbreak of the conflict, its escalation, and its startling paradox: that America’s bid to stop nuclear proliferation may have unleashed a greater threat.

heir eyeballs felt it first. A wall of 104-degree air hit the cyber-security analysts as they descended from the jets that had fetched them, on a few hours’ notice, from Europe and the United States. They were in Dhahran, in eastern Saudi Arabia, a small, isolated city that is the headquarters of the world’s largest oil company, Saudi aramco. The group included representatives of Oracle, IBM, CrowdStrike, Red Hat, McAfee, Microsoft, and several smaller private firms—a SWAT dream team for the virtual realm. They came to investigate a computer-network attack that had occurred on August 15, 2012, on the eve of a Muslim holy day called Lailat al Qadr, “the Night of Power.” Technically the attack was crude, but its geopolitical implications would soon become alarming.

The data on three-quarters of the machines on the main computer network of Saudi aramco had been destroyed. Hackers who identified themselves as Islamic and called themselves the Cutting Sword of Justice executed a full wipe of the hard drives of 30,000 aramco personal computers. For good measure, as a kind of calling card, the hackers lit up the screen of each machine they wiped with a single image, of an American flag on fire.

http://m.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business

Here is the actual Presidential directive calling for a list of cyber targets. I find these authentic Govt documents about serious issues to be fascinating on its own level. This one is particularly interesting in my opinion.
http://www.scribd.com/mobile/doc/146382006/html5

http://m.theweek.com/article.php?id=245356

Cyber War articles from same website contradict each other.

I thought both articles were somewhat interesting. I disagree with the premise of article one. Cyber warfare can inflict real damage and cause real harm. You only have to consider the stuxnet attack on Iran’s Nuclear plants and see that a cyber attack was able to destroy hundreds if not over a thousand centrifuges. Costing real money and delaying the progress Iran had been making. In my opinion a very ingenious way to deal with a massive problem. No one was put in harms way and they accomplished the objective of slowing down Iran. This now attack shows that cyber war can be effective and cause real damage. Both monetarily and people can be killed or injured.

The second article poses a question I have been considering. What exactly are the rules of Cyber War? What ultimately will cause a Country to retaliate with real weapons designed to kill.

Food for thought.

Article 1: Is Cyber War just a scare tactic?
http://www.salon.com/2013/05/26/is_cyber_war_just_a_scare_tactic_partner/

Article 2: Cyber attacks could cause the next world war
http://www.salon.com/2013/05/22/cyber_war_poses_significant_threat_to_national_security_partner/

I find it ironic that these articles are from the same website and dated 4 days apart. Yet one seems to think Cyber Warfare is being used as a scare tactic and we have nothing to worry about. The second article assumes Cyber War does inflict real damage and could lead to a world wide conflict.

Have a great Memorial Day. Thanks for anyone who served their country in The US or any other nation on Earth. Be safe everyone.

Bonus

http://www.scribd.com/mobile/doc/28656200/html5

http://www.scribd.com/mobile/doc/57767711/html5

From this mornings Washington Post. Shocking that China is stealing secrets and weapons systems details. According to that first article I linked cyber war is a scare tactic. I am here to tell you it is not. There are real consequences to what is going on. Both in people’s lives and monetarily as well.

http://m.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html

From wired on cyber warfare and DARPA.

http://www.wired.com/dangerroom/2013/05/pentagon-cyberwar-angry-birds/all/

I have been saying for over a year that what is occurring in Syria is a proxy war. Not much different than the Spanish Civil War that preceded WW2. Those who cannot learn from History are doomed to repeat it.

A proxy war or proxy warfare is a war that results when opposing powers use third parties as substitutes for fighting each other directly. While powers have sometimes used governments as proxies, violent non-state actors, mercenaries, or other third parties are more often employed. It is hoped that these groups can strike an opponent without leading to full-scale war.

Proxy wars have also been fought alongside full-scale conflicts. It is almost impossible to have a pure proxy war, as the groups fighting for a certain nation usually have their own interests, which can diverge from those of their patron.

Typically proxy wars function best during cold wars, as they become a necessity in conducting armed conflict between at least two belligerents while continuing cold warfare. /blockquote>

http://en.m.wikipedia.org/wiki/Proxy_war

http://m.guardiannews.com/world/2013/may/28/israel-warns-russia-against-arming-syrian-rebels

Able Archer 1983 NATO exercise almost leads to Nuclear war. Bonus… When America first put on its cyber warfare helmets. Just released Benghazi emails and my feelings without reading them yet.

Fascinating to me and hopefully interesting to you as well. I will add a ton of my haarp info this weekend. This is to keep you entertained. Hopefully History is more exciting to you now then it was as a sophomore in High School.

I was a history major and thought I knew a lot about history. Most of it is an illusion. Usually the winning side writes history. History can really be summed up by a conflict for money or natural resources.

During the 80’s… Things apparently got to a level where the United States and USSR were at each others throats and distrusted each other immensely. I sort of remember this exercise beginning and talk of it on the news. I was maybe 16-17 years old at the time and not as interested in foreign policy as I am now.

During 10 days in November 1983, the United States and the Soviet Union nearly started a nuclear war. Newly declassified documents from the CIA, NSA, KGB, and senior officials in both countries reveal just how close we came to mutually assured destruction — over a military exercise.

That exercise, Able Archer 83, simulated the transition by NATO from a conventional war to a nuclear war, culminating in the simulated release of warheads against the Soviet Union. NATO changed its readiness condition during Able Archer to DEFCON 1, the highest level. The Soviets interpreted the simulation as a ruse to conceal a first strike and readied their nukes. At this period in history, and especially during the exercise, a single false alarm or miscalculation could have brought Armageddon.

Article can be found here…
http://www.wired.com/dangerroom/2013/05/able-archer-scare/

Additional documents can be found in following links.

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB426/

http://en.m.wikipedia.org/wiki/Able_Archer_83

The realistic nature of the 1983 exercise, coupled with deteriorating relations between the United States and the Soviet Union and the anticipated arrival of strategic Pershing II nuclear missiles in Europe, led some members of the Soviet Politburo and Soviet military to believe that Able Archer 83 was a ruse of war, obscuring preparations for a genuine nuclear first strike.[1][2][3][4]

Cyber warfare update.

In foreign policy magazine they outline when the United States first entered the cyber war fray. 1997 of all things they were considering how to attack enemies ( and most likely allies computer systems).

This short item from a classified NSA publication reveals that as far back as 1997 the super-secret agency was tasked with finding ways not just to listen in on our enemies (the NSA’s usual stock-in-trade), but actually to attack hostile computer networks. The document proclaimed that “the future of warfare is warfare in cyberspace,” and it sketched out how tomorrow’s “Information Warriors” would think, act, and fight on the new digital battlefield.

http://www.foreignpolicy.com/articles/2013/04/26/when_america_became_a_cyberwarrior_nsa_declassified

I have not looked these over as of yet and really have no thoughts about content as of yet. I do think it is hypocritical of Republicans to have hearing after hearing about Benghazi where 4 people died. At the same time Bush Jr lied directly to the American people and cooked evidence to sway public opinion for the Iraq War. No hearings have been held. Let us remember 4000 + US service members have died in combat. 22 a day are commuting suicide currently. The suicides have now outpaced combat deaths. 1.4 Trillion dollars have been wasted. 500,000 + Iraqi civilians have been killed. Contract after contract went to Haliburton ( of which Dick Cheney was CEO of) in no bid contacts worth hundreds of millions of dollars. Hundreds of millions of dollars have just turned up missing as well. Yet no hearings have been held. No responsibility has been claimed. No one has been held to account for war crimes such as torture-rendition ( kidnapping)-suspension of habias corpus-spying on Americans directly. I could go on and on. Various aspects of the war just infuriate me to be honest. The Iraq war and various activities have seriously eroded Americans on the world stage. How can we remotely claim to represent the “moral upper hand” we have always claimed to have when we torture people and water board them with administration approval. Yet they want to have repeated hearings about something where 4 people died to embarrass Obama and stab Hillary Clinton’s presidential aspirations in the back. I am posting this because it is somewhat historically significant in my opinion.

http://www.scribd.com/mobile/doc/141731229/html5

I will offer a very long post on the Iraq war in the near future as well and talk somewhat about “the battle for the Baghdad airport”. It has been rumored for a long long time that the United States used a nuclear or hydrogen tactical device of some kind to decide that conflict in a hurry. Google it if you doubt me. Google battle for Baghdad airport and the word nuclear.