according to documents leaked by Edward Snowden, the SCS is part of a larger global surveillance program known as STATEROOM ZeroF6 - Last Friday at 1:59 PM
STATEROOM is the code name of a highly secretive signals intelligence collection program involving the interception of international radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the signatories to the UKUSA Agreement and the members of the ECHELON network including Australia, New Zealand, United Kingdom, Canada and the United States ZeroF6 - Last Friday at 2:38 PM
"...These sites are small in size and in number of personnel staffing them. They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned."
— Excerpt from the NSA's STATEROOM Guide
Damien Rogers, former senior adviser to the New Zealand intelligence agency Government Communications Security Bureau (GCSB) said he was surprised to hear that the "Stateroom" codeword and location of associated sites are being published in the media, because such revelations would cause "anxiety and concern" for the directors of the five intelligence agencies of the UKUSA Agreement.
Indonesian Foreign Minister Marty Natalegawa protested against the surveillance program, and told the media that "such action is not only a breach of security, but also a serious violation of diplomatic norms and ethics, and certainly not in tune with the spirit of friendly relations between nations.
Thailand's National Security Council asserted that such forms of surveillance are considered to be acts of criminality under the Law of Thailand
STATEROOM - (SCS) Highly classified SIGINT collection programme to intercept radio, telecoms and internet traffic. Operated by the Special Collection Service (SCS) in U.S. Embassies and Diplomatic buildings worldwide, also in Embassies etc of FIVE EYES nations - usually under cover and not declared to diplomatic staff.
The small SCS teams (motto: "Vigilantly keeping watch around the world") intercept communications in their host countries. The required antennas and dishes are usually disguised. According to the documents seen by SPIEGEL, such "concealed collection systems" as they are internally referred to at the NSA, can be hidden behind "roof maintenance sheds" on embassy buildings. Highly classified technical surveillance operations in diplomatic missions such as embassies and consulates are referred to internally in the NSA under the codename "Stateroom."
an intelligence expert, claimed that Australian embassies served as collection sites for Project STATEROOM, by helping the SCS monitor the Asia Pacific region. Dr. Ball said the Australian Signals Directorate was sharing information with the NSA as part of the UKUSA agreement (also known as Five Eyes), an intelligence cooperation network comprising agencies from Australia, New Zealand, Britain, Canada and the United States. Now new documents made available by Snowden appear to show that New Zealand’s embassies and consulates around the world are also being used as part of Project STATEROOM. The documents date from 2003, and contain a synopsis of a number of NSA intelligence-collection programs, along with their operational titles and status. The list, which is marked “Top Secret” is titled “Exceptionally Controlled Information”, and contains several entries under the heading “STATEROOM”. Underneath the heading appears the description: “SIGINT from diplomatic missions abroad”. The document then states that “this activity is conducted by USA, AUS, CAN, GBR and NZL”. Although the existence of STATEROOM has been known for over a year, this is the first time that New Zealand diplomatic missions are specifically identified in documents as collection sites for the program.
“Exceptionally Controlled Information”, and contains several entries under the heading “STATEROOM”. Underneath the heading appears the description: “SIGINT from diplomatic missions abroad”. The document then states that “this activity is conducted by USA, AUS, CAN, GBR and NZL”. Although the existence of STATEROOM has been known for over a year, this is the first time that New Zealand diplomatic missions are specifically identified in documents as collection sites for the program. The revelation is likely to provoke reactions from nations hosting New Zealand diplomatic missions, especially in Asia, where New Zealand’s diplomatic activity is most notable.
Since 2007
PRISM Dropmire Stateroom Bullrun MYSTIC MonsterMind (alleged)
Databases, tools etc.
PINWALE MARINA MAINWAY TRAFFICTHIEF DISHFIRE XKeyscore ICREACH BOUNDLESSINFORMANT
GCHQ collaboration
MUSCULAR Tempora ZeroF6 - Last Friday at 3:04 PM
(U//FOUO) ENSIGN (U//FOUO) ENS (TS//SI//NF) Protects potential NSA partnership with a Third Party in clandestine SIGINT activity in a specific location. (TS//SI//NF) STAIRWELL also covers NSA partnership with this Third Party in unconventional SIGINT initiatives.
(U//FOUO) ESCAPEE (U//FOUO) ESCP (TS//SI//NF) U.S. component to ECI STATEROOM (U//FOUO) STATEROOM
(U//FOUO) EVADEYIELD (U//FOUO) EVY (TS//SI//NF) Protects NSA's capability to exploit voice or telephonic conversations from an extremely sensitive source. (U) N/A
(U//FOUO) STATEROOM (U//FOUO) STRM (S//SI) Restricts access to information about personnel involved in covert collection, processing and reporting of SIGINT from diplomatic missions abroad. This activity is conducted by USA, AUS, CAN, GBR, and NZL. (S) U.S.-only version is ESCAPEE
SCS is part of a larger global surveillance program known as STATEROOM. ZeroISIS - Last Monday at 2:29 AM
STATEROOM – Operated by the ASD, CIA, CSE, GCHQ, and NSA ZeroF6 - Last Friday at 3:07 PM
(U//FOUO) STATEROOM (U//FOUO) STRM (S//SI) Restricts access to information about personnel involved in covert collection, processing and reporting of SIGINT from diplomatic missions abroad. This activity is conducted by USA, AUS, CAN, GBR, and NZL. (S) U.S.-only version is ESCAPEE ZeroEyes - 08/08/2017
Air Force's 544th Intelligence Group with ECHELON operations
The Naval Security Group Activity (NAVSECGRUACT) at Sugar Grove, West Virginia, has missions defined including "maintaining and operating an ECHELON site" ZeroEyes - 08/09/2017
"Echelon" was created in the incubator of the Cold War
Today it is a legacy system, and several NSA stations are closing.
NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group, was reported to be in command of the operation of the so-called ECHELON system.
Duncan Campbell reported in 1988 on the "ECHELON" surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[
In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists.
NSA's United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about "... U.S. persons, entities, corporations or organizations...." without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance STATEROOM is the code name of a highly secretive signals intelligence collection program involving the interception of international radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the signatories to the UKUSA Agreement and the members of the ECHELON network including Australia, New Zealand, United Kingdom, Canada and the United States
the true mission of Stateroom personnel is generally not revealed to the rest of the diplomatic staff at the facilities where they are assigned
Members
Location and status of CIA/NSA Special Collection Service (SCS) eavesdropping sites as of 13 August 2010
Australia – Australian Signals Directorate (ASD), formerly known as the Defence Signals Directorate (DSD)
Canada – Communications Security Establishment Canada (CSE)
United Kingdom – Government Communications Headquarters (GCHQ)
United States – Special Collection Service (SCS)
New Zealand – Government Communications Security Bureau (GCSB) ZeroStateRoom - Last Friday at 4:02 PM
By the end of the 20th century, the system referred to as "ECHELON" had allegedly evolved beyond its military and diplomatic origins, to also become "…a global system for the interception of private and commercial communications."
Lockheed called it P415
The software programs were called SILKWORTH and SIRE
A global network of electronic spy stations that can eavesdrop on telephones, faxes and computers. It can even track bank accounts. This information is stored in Echelon computers, which can keep millions of records on individuals.
In 1982, James Bamford, investigative journalist and author wrote The Puzzle Palace, an in-depth look inside the workings of the NSA, then a super-secret agency, and the massive eavesdropping operation under the codename "SHAMROCK". The NSA has used many codenames, and SHAMROCK was the codename used for ECHELON prior to 1975
Congressional investigators determined that "targeting of U.S. political figures would not occur by accident, but was designed into the system from the start.
Critics said the ECHELON system emerged from the Cold War as a "Big Brother without a cause".
In May 2001, as the committee finalised its report on the ECHELON system, a delegation travelled to Washington, D.C. to attend meetings with U.S. officials from the following agencies and departments:
U.S. Central Intelligence Agency (CIA)
U.S. Department of Commerce (DOC)
U.S. National Security Agency (NSA)
According to a BBC correspondent in May 2001, "The US Government still refuses to admit that Echelon even exists"
ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic), and microwave links
https://upload.wikimedia.org/wikipedia/commons/thumb/e/e9/Aerialmisawa.png/250px-Aerialmisawa.png Snowden-revelations by the website The Intercept on 3 August 2015, for the first time confirmed that NSA used the codeword ECHELON and provided some details about the scope of the program: ECHELON was part of an umbrella program codenamed FROSTING, which was established by the NSA in 1966 to collect and process data from communications satellites. FROSTING had two sub-programs
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Australian Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications.
espionage conducted by the members of the "Five Eyes" ZeroStateRoom - Last Friday at 6:54 PM
The first American satellite ground station for the ECHELON collection program was built in 1971 at a military firing and training center near Yakima, Washington. The facility, which was codenamed JACKKNIFE, was an investment of ca. 21.3 million dollars and had around 90 people. Satellite traffic was intercepted by a 30-meter single dish antenna. The station became fully operational on 4 October 1974. It was connected with NSA headquarters at Fort Meade by a 75-baud secure Teletype orderwire channel ZeroStateRoom - Last Friday at 7:05 PM
The sci-fi crime thriller, Person of Interest, a television show which aired from 2011 to 2016 on the CBS network, had a data-collecting supercomputer as its central narrative.
Based on Eschalon
"This is the work of the Dictionary program. It reads every word and number in every single incoming message and picks out all the ones containing target keywords and numbers. Thousands of simultaneous messages are read in 'real time' as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in the telecommunications haystack."
These organizations are bound together under a secret 1948 agreement, UKUSA, whose terms and text remain under wraps even today.
The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON “Dictionary”) that will prompt the computers to flag the message for recording and transcribing for future analysis.
http://4.bp.blogspot.com/_dHje8zJMc3Y/S7RG5lFLE_I/AAAAAAAAAyE/ZMsxcluQhj8/s1600/img167.jpg Forged in 1947 between the US and UK, the still-secret UKUSA agreement defined the relations between the SIGINT departments of those various governments. Direct agreements between the US and these agencies also define the intricate relationship that these organizations engage in.
Menwith Hill
Today, it is the largest spy station in the world, with over twenty-five satellite receiving stations and 1,400 American NSA personnel working with 350 UK Ministry of Defense staff
-1980
This quiet collusion between political and private interests typically involves the very same companies that are involved in developing the technology that empowers ECHELON and the intelligence agencies.
http://thephaser.com/wp-content/uploads/2016/04/economy-NWO-2016-04-05-at-12.39.54-AM.png
In 1945 Project SHAMROCK was initiated to obtain copies of all telegraphic information exiting or entering the United States.
even though Black Chamber had been at it since 1919
A sister project to Project SHAMROCK, Project MINARET involved the creation of “watch lists” by each of the intelligence agencies and the FBI of those accused of “subversive” domestic activities.
The watch lists included such notables as Martin Luther King, Malcolm X, Jane Fonda, Joan Baez and Dr. Benjamin Spock.
After the Supreme Court handed down its 1972 Keith decision,<35> which held that - while the President could act to protect the country from unlawful and subversive activity designed to overthrow the government - that same power did not extend to include warrantless electronic surveillance of domestic organizations, pressure came to bear on Project MINARET.
Attorney General Elliot Petersen shut down Project MINARET as soon as its activities were revealed to the Justice Department, despite the fact that the FBI (an agency under the Justice Department’s authority) was actively involved with the NSA and other intelligence agencies in creating the watch lists.
Operating between 1967 and 1973, over 5,925 foreigners and 1,690 organizations and US citizens were included on the Project MINARET watch lists.
Despite extensive efforts to conceal the NSA’s involvement in Project MINARET, NSA Director Lew Allen testified before the Senate Intelligence Committee in 1975 that the NSA had issued over 3,900 reports on the watch-listed Americans.
Additionally, the NSA Office of Security Services maintained reports on at least 75,000 Americans between 1952 and 1974.
This list included the names of anyone that was mentioned in a NSA message intercept. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know.
Such is the capability of this technology…
I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss.
That is the abyss from which there is no return. ZeroStateRoom - Last Friday at 4:11 PM
Lockheed called it P415
The software programs were called SILKWORTH and SIRE Other than the ECHELON computer network, the main projects at Menwith Hill are code-named,
SILKWORTH
MOONPENNY
SIRE
RUNWAY
STEEPLEBUSH ZeroEschalon - Last Saturday at 9:06 PM
Project SILKWORTH is, according to signals intelligence specialists, the code-name for long-range radio monitoring from Menwith Hill
ZeroEschalon - Last Saturday at 10:49 PM
NSA and CIA then discovered that Sigint collection from space was more effective than had been anticipated, resulting in accumulations of recordings that outstripped the available supply of linguists and analysts. Documents show that when the SILKWORTH processing systems was installed at Menwith Hill for the new satellites, it was supported by ECHELON 2 and other databanks
ZeroEschalon - Last Saturday at 9:06 PM
Other than the ECHELON computer network, the main projects at Menwith Hill are code-named,
SILKWORTH
MOONPENNY
SIRE
RUNWAY
STEEPLEBUS
MOONPENNY is a system for monitoring satellite communications
As of 2009, Menwith Hill’s foreign satellite surveillance mission, code-named MOONPENNY, was monitoring 163 different satellite data links. The intercepted communications were funneled into a variety of different repositories storing phone calls, text messages, emails, internet browsing histories, and other data. ZeroStateRoom - Last Friday at 4:15 PM
Lockheed called it P415
The software programs were called SILKWORTH and SIRE ZeroEschalon - Last Saturday at 9:10 PM
SIRE - SIGINT Requirement ZeroStateRoom - Last Friday at 7:13 PM
Menwith Hill
Today, it is the largest spy station in the world, with over twenty-five satellite receiving stations and 1,400 American NSA personnel working with 350 UK Ministry of Defense staff
-1980
It is very noteworthy that in the year 1966 when the NSA National Security Agency took over the Menwith Hill UK site from the US Army Security Agency (ASA), that in December of the very same year the US government signed the Pine Gap Treaty with the Australian government.
ZeroEschalon - Last Saturday at 9:07 PM
Project SILKWORTH is, according to signals intelligence specialists, the code-name for long-range radio monitoring from Menwith Hill
RUNWAY is thought to be the control network for an eavesdropping satellite called VORTEX, now in orbit over the Soviet Union The base earlier controlled a similar series of satellites called CHALET
The new STEEPLEBUSH control centre appears connected with the latest and biggest of the overhead listening satellites. These are code-named MAGNUM, according to US intelligence sources
Royal Air Force Menwith Hill or more simply RAF Menwith Hill is a Royal Air Force station near Harrogate, North Yorkshire,
support services provided by Government Communications Headquarters, United States Air Force, 421st Air Base Group, and US National Security Agency personnel(edited)
large number of highly distinctive white radomes, locally referred to as "the massive golf balls", and is alleged to be an element of the ECHELON system.
Project Phoenix, is "one of the largest and most sophisticated high technology programs carried out anywhere in the UK over the last 10 years". Of the 1,800 employees in 2012, 400 were British and 1,200 were American employees of the NSA
During an interview with Russia Today in April 2012, Schofield alleged that Menwith Hill was "involved in drone attacks". He said: "The UK’s providing a facility here that’s involved in drone attacks that we know, from independent assessments, are killing and injuring thousands of civilians, and because of the covert nature of that warfare, it's very difficult to provide information and accountability through the UK parliament. And yet these are acts of war. And normally when we have war, parliament should normally inform people that we’re involved in those. And we're not being informed. We're kept entirely in the dark about them.
http://www.policestateusa.com/wp-content/uploads/2014/02/Drone_PredatorMissile.jpg During the 2009 G-20 London Summit NSA intercept specialists based at Menwith Hill attempted to target and decode the encrypted telephone calls of the Russian president Dmitry Medvedev
Menwith Hill was "linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland."[16]
In April 2012 activists affiliated with the global Occupy Movement held a four-day campsite at Menwith Hill
https://i.guim.co.uk/img/static/sys-images/Politics/Pix/pictures/2012/3/1/1330620217739/Menwith-Hill-007.jpg?w=620&q=55&auto=format&usm=12&fit=max&s=7a49bc365a3f7e5819e032b36c7f7438 Though the base is officially called RAF Menwith Hill, most of the staff there are US employees of the NSA. The total number of people working there is due to increase from 1,800 last year (of whom 400 were British) to 2,500 in 2015.
he costs to Britain of servicing Menwith Hill, like other American bases in Britain, are confidential under cost-sharing arrangements between the UK and the US. The total cost of the equipment at the base, and running it, is classified.
"co-ordinate real-time military operations"
Menwith Hill would be "fully operational as an upgraded, active intelligence hub by 2015".
but rather to recognise its role as an active provider of integrated intelligence to support new forms of warfare Menwith Hill, which was near the pigeons’ course, somehow interfered with the birds’ homing instinct. Field Station 8613, the secret base — now called Menwith Hill Station — is located about nine miles west of the small town of Harrogate in North Yorkshire(edited)
Yet the British government has steadfastly refused to comment, citing a longstanding policy not to discuss matters related to national security.
Menwith Hill’s razor wire fence. The files reveal for the first time how the NSA has used the British base to aid “a significant number of capture-kill operations” across the Middle East and North Africa, fueled by powerful eavesdropping technology that can harvest data from more than 300 million emails and phone calls a day.
groundbreaking new spying programs at Menwith Hill to pinpoint the locations of suspected terrorists accessing the internet in remote parts of the world. The programs — with names such as GHOSTHUNTER and GHOSTWOLF
violated international laws or constituted war crimes
Menwith Hill has two main spying capabilities. The first is called FORNSAT, which uses powerful antennae contained within the golf ball-like domes to eavesdrop on communications as they are being beamed between foreign satellites. The second is called OVERHEAD, which uses U.S. government satellites
abbreviated MHS
The Intercept reveal that spy satellites operated at Menwith Hill today can target communications in China and Latin America,
ZeroEschalon - Last Saturday at 10:09 PM
Though the Snowden documents analyzed by The Intercept state that Menwith Hill has aided “a significant number” of “capture-kill” operations, they do not reveal specific details about all of the incidents that resulted in fatalities. What is clear, however, is that the base has targeted countries such as Yemen, Pakistan, and Somalia as part of location-tracking programs like GHOSTHUNTER and GHOSTWOLF — which were created to help pinpoint individuals so they could be captured or killed — suggesting it has played a part in drone strikes in these countries.
Hill spent more than $40 million on a massive new 95,000-square-foot operations building — nearly twice the size of an average American football field. A large chunk of this space — 10,000 square feet — was set aside for a data center that boasted the ability to store huge troves of intercepted communications. During the renovations, the NSA shipped in new computer systems and laid 182 miles of cables, enough to stretch from New York City to the outskirts of Boston.
Hamilton told The Intercept that he found the secrecy shrouding Menwith Hill to be “offensive.” The revelations about the role it has played in U.S. killing and capture operations, he said, showed there needed to be a full review of its operations. “Any nation-state that uses military means to attack any target, whether it is a terrorist, whether it is legitimate or not, has to be accountable to its electorate for what it does,” Hamilton said. “That’s the basis of our Parliament, it’s the basis of our whole democratic system. How can we say that Menwith can carry out operations of which there is absolutely no accountability to the public? I don’t buy this idea that you say the word ‘security’ and nobody can know anything. We need to know what is being done in our name.”
Ed Beverly - President
5626 Edgemere Dr.
Torrance, CA 90503
B. J. Lewis - Vice-President
211 Jim Buck Rd.
Johnson City, TN 37691
J. Coble Fonville - Treasurer
4607 Adonica Lane
Greensboro, NC 27410
Cheryl Garner Olmstead
Secretary
PO Box 20134
Springfield, IL 62708
Second Avenue, Harrogate, GBR 719-567-1110
two local farmers had seen a disc shaped object within the base, alongside base guards. The farmers also claimed to have been ordered away from the base. The MoD and Menwith Hill issued a joint statement that: "no UFO/flying saucer has landed in the vicinity "
What is nominally an RAF base is really an American ‘death star’, carrying out illegal forms of electronic spying and warfare over which there is no democratic accountability and very little debate. The only solution is to challenge the legitimacy of a foreign power occupying a large area of Yorkshire countryside.
We will continue to protest against Menwith Hill’s,
lack of accountability
its promotion of the arms trade and war; its violation of local, national and international law
its abuse of democracy and civil liberties
its crucial role in US plans to dominate earth and space with nuclear and military technology
http://www.klbird.com/Testbuttons/Coat%20of%20ARMS%20COLOR.jpg North Yorkshire, near the Victorian spa town of Harrogate, 222 miles north of London
Here we are at Menwith Hill
they dug a hole on land not theirs.
filled with computers called Menwith Hill:
7 floors down, hidden from view,
official secret, don't let us know
how they spend money whilst people starve.
They call it progress, "this year's thing"
1984 - they're listening in -
Technology made them robot people!
They tap our phones, record our lives; Menwith Hill plays as a fulcrum for intelligence-led warfare, as well as the dangers
to democracy from the accumulation of power by the NSA and other elements of the MIIC. The case is
put forward that the closure of Menwith Hill would be beneficial, both at the local level, and
internationally
1,000 innocent victims.
The NRO also maintains ground stations at Buckley Air Force Base, Colorado, Fort Belvoir, Virginia, White Sands Missile Range, New Mexico, as well as a presence at the Joint Defense Facility Pine Gap, Australia, and the Royal Air Force Base Menwith Hill Station, United Kingdom.
NSA and CIA then discovered that Sigint collection from space was more effective than had been anticipated, resulting in accumulations of recordings that outstripped the available supply of linguists and analysts. Documents show that when the SILKWORTH processing systems was installed at Menwith Hill for the new satellites, it was supported by ECHELON 2 and other databanks The upgraded base will be completed in 2017 and will have a similar number of personnel and operational importance to RAF Menwith Hill, the National Security Agency (NSA) station in North Yorkshire. It will include an installation for the Defense Intelligence Agency, the Pentagon’s primary military espionage service, and will most like be co-staffed with representatives of British intelligence, including GCHQ.
Around Britain, we've seen the same kind of changes taking place. Britain's GCHQ has a new high-tech headquarters in Cheltenham – packed to the gunnel's with high-powered computer systems. The sister facility to Croughton, RAF Menwith Hill in Yorkshire (click for a map), has also undergone a large expansion to it's surveillance capabilities. ZeroF6 - Last Friday at 2:17 PM
Data collected by Britain is sent to a relay facility at RAF Croughton in Northamptonshire, England, before being transmitted to a data center jointly operated by the U.S. Central Intelligence Agency and the U.S. National Security Agency in College Park, Maryland ZeroEschalon - Last Saturday at 9:14 PM
Royal Air Force Menwith Hill or more simply RAF Menwith Hill is a Royal Air Force station near Harrogate, North Yorkshire,
support services provided by Government Communications Headquarters, United States Air Force, 421st Air Base Group, and US National Security Agency personnel ZeroMenwithHill - Last Sunday at 2:31 AM
Noor Khan, whose father was killed in a drone strike in 2011, sued the-then foreign secretary, William Hague, in an attempt to find out whether UK officials at GCHQ share information about targets in Pakistan with the CIA, and whether this could therefore make British spies complicit in murder or war crimes. The case was thrown out by the courts on the grounds that it could ‘imperil relations’ between the US and UK.
The upgraded base will be completed in 2017 and will have a similar number of personnel and operational importance to RAF Menwith Hill, the National Security Agency (NSA) station in North Yorkshire. It will include an installation for the Defense Intelligence Agency, the Pentagon’s primary military espionage service, and will most like be co-staffed with representatives of British intelligence, including GCHQ.
based on documents provided by Snowden, revealed that GCHQ had indiscriminately collected 1.8 million private Yahoo webcam images from users across the world
The KARMA POLICE operation swept up the IP address of Internet users visiting websites. The program was established with no public scrutiny or oversight. KARMA POLICE is a powerful spying tool in conjunction with other GCHQ programs, because IP addresses could be cross-referenced with other data The goal of the program, according to the documents, was "either (a) a web browsing profile for every visible user on the internet, or (b) a user profile for every visible website on the internet.
In 2015, GCHQ admitted for the first time in court that it conducts computer hacking
In 2017, U.S. Press Secretary Sean Spicer alleged that GCHQ had conducted surveillance on U.S. President Donald Trump, basing the allegation on statements made by a media commentator during a Fox News segment.
surveillance of Russian agents did pick up contacts made by Trump's campaign team in the run up to his election, which was passed on to U.S. agencies
. The principal of these is with the United States (National Security Agency), Canada (Communications Security Establishment), Australia (Australian Signals Directorate) and New Zealand (Government Communications Security Bureau),
ZeroEyes - Last Tuesday at 9:10 PM
NSA, with NRO cooperation, operates a number of National Security Agency/Central Security Service (NSA/CSS) sites and other support activities
ZeroEconmicHitmen - Last Wednesday at 2:31 AM
the NSA, in collaboration with Britain's SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock
ZeroF6 - Last Friday at 2:13 PM
As of 2013, British embassies and consulates in the following capital cities are known to contain clandestine surveillance facility Berlin Germany(edited)
Data collected by Britain is sent to a relay facility at RAF Croughton in Northamptonshire, England, before being transmitted to a data center jointly operated by the U.S. Central Intelligence Agency and the U.S. National Security Agency in College Park, Maryland
IPT found that GCHQ acted unlawfully in conducting surveillance on two human rights organisations. The closed hearing found the government in breach of its internal surveillance policies in accessing and retaining the communications of the Egyptian Initiative for Personal Rights and the Legal Resources Centre in South Africa.
Current stations
GCHQ Ascension Island
GCHQ Bude
GCHQ Scarborough
Former stations
GCHQ Brora
GCHQ Cheadle
GCHQ Culmhead
GCHQ Hawklaw
GCHQ Hong Kong
headquarters based in Cheltenham GCHQ press office: 01242 221461 ext 33847; pressoffice@gchq.gsi.gov.uk
"Judge Andrew Napolitano made the following statement, quote, 'Three intelligence sources have informed Fox News that President Obama went outside the chain of command (to spy on Trump). He didn't use the NSA, he didn't use the CIA ... he used GCHQ,'"
"We do not comment on our relationship with any of our suppliers. All of the companies who participate in the accelerator programme will be afforded access to GCHQ and the NCSC’s technical expertise to support them in developing their products, solutions and businesses."
" Since its launch in 2012, Wayra UK start-ups have raised close to $150M in third-party investment."
" Wayra UK has partnerships with major corporates including pharmaceutical company Merck Sharpe & Dohme (MSD) and fashion retailer ASOS."
GCHQ, the UK spy agency which specializes in garnering intelligence from communications (as opposed to, MI5 and MI6, which focus on acquiring domestic and foreign “human intelligence”, respectively) has officially joined Twitter — posting a “Hello, world” inaugural tweet from its blue check verified account.
l GCHQ Twitter account is following is the official account of the fictional British spy James Bond….In one corner, a large globe visualises all the cyber attacks targeting the UK from around the world. The room is a reminder of the range of activity that GCHQ is involved in - as well as its global reach in monitoring communications and data flows.
creation of the National Cyber Security Centre, an arm of GCHQ which is based in London and is much more public facing in providing protective advice to the country about the threats in cyberspace.
When he took over as head of GCHQ in 2014, Mr Hannigan launched what was seen as a broadside against technology companies - arguing they were in denial about the way they were used by terrorist groups to communicate and spread their message. ZeroMenwithHill - Last Sunday at 4:34 PM
Under the bill internet and communication firms will also be forced in law to help spies hack in to phones and computers under new powers.
There will be a legal requirement on communication providers to assist MI5, GCHQ and the police to break in to suspects phones and computers.
That will include where the agencies want to remotely take control of devices and eavesdrop on suspects.
All police forces will also have the power to hack in to devices of suspects.
The revelations from Edward Snowden in 2013 about the techniques of GCHQ and the US National Security Agency and bulk collection of data reignited that debate and accusations of mass surveillance
Ciaran Martin, chief executive of the National Cyber Security Center (©GCHQ) National Cyber Security Center will include security experts drawn from the domestic security service - MI5 - as well as CERT-UK and GCHQ. "We'll have formalized and integrated operational partnerships with law enforcement, defense and private industry," he said.
The center was to be based in Cheltenham, where GCHQ is headquartered, according to the original announcement ZeroMenwithHill - Last Sunday at 5:23 PM
Can GCHQ order techies to work as govt snoops? Experts fear: 'Yes'
The UK Home Office's ambiguous response to whether or not the Investigatory Powers Act gives the British government the authority to pressure or force people to work for GCHQ is troublin
Clubley told El Reg: "The Home Office are saying that, yes, literally anyone can be served with a warrant but they are also saying that only telecommunications companies can be compelled to assist.
"The disconnect between those two statements doesn't seem to make sense. After all, why give yourself the power to do something if you cannot then enforce it?"
He added: "The only conclusion I have been able to reach is that the government knew it would never get a law passed which compelled everyone to cooperate with GCHQ, so they are instead relying on the actual act of serving a warrant to intimidate people into cooperating."
GCHQ is able to tap into data which flows along undersea cables and then store it for up to 30 days, to assess and analyse it.
MI5 deputy director general Jeremy Fleming appointed director of GCHQ
GCHQ encountered criticism regarding its lack of transparency in March 2015 when an Intelligence and Security Committee report said the legal framework surrounding surveillance was "unnecessarily complicated" and lacked "transparency" and there should be a single law to govern access to private communications by UK agencies.
UK intelligence agency GCHQ has admitted that it does hack into computers and devices to install malware to spy on people both in the UK and abroad. The admission was made before the UK's independent Investigatory Powers Tribunal, which is hearing complaints by human rights advocacy group Privacy International and seven internet service providers (ISPs) that GCHQ and the Foreign Office broke privacy laws to illegally hack into phones, computers and networks around the world.
GCHQ had refused to confirm or deny whether it had the capability to perform Computer and Network Exploitation (CNE), in which computers, devices and private networks are accessed without their owners' knowledge in order to steal information or monitor users' activities by surreptitiously turning on the device's camera and microphone, or by installing malware.
GCHQ admitted to spying on devices
The GCHQ confirmed that it undertook what it called "persistent operations", where an implant resided in the targeted computer or device to transmit information for an extended period of time, the GCHQ's hacking activities were not legal under Article 8 of the European Convention on Human Rights. However, in May 2015, one day before the court case was scheduled to begin, Privacy International claimed it was told by the UK government that amendments had been made to the Computer Misuse Act in March that provided a new exception for law enforcement and GCHQ to hack without criminal liability.
Privacy International has argued that there was no public consultation or debate about the amendments and that all hacking activities performed by GCHQ up until the law change in March 2015 were still deemed illegal. ZeroF6 - Last Friday at 2:12 PM
The collection of signals intelligence by Australian embassies and high commissions occurs in capital cities across East Asia and Southeast Asia, namely: Bangkok (Thailand), Beijing (China), Dili (East Timor), Hanoi (Vietnam), Jakarta (Indonesia), Kuala Lumpur (Malaysia), Port Moresby (Papua New Guinea)
A spokesman for Australia's Department of Foreign Affairs and Trade said: "It is the long-standing practice of Australian governments not to comment on intelligence matters.
ZeroStateRoom - Last Friday at 4:19 PM
In March 1999, for the first time in history, the Australian government admitted that news reports about the top secret UKUSA Agreement were true
the DSD "does co-operate with counterpart signals intelligence organisations overseas under the UKUSA relationship."
defense signals directorate was former name
In 2000, James Woolsey, the former Director of the U.S. Central Intelligence Agency, confirmed that U.S. intelligence uses interception systems and keyword searches to monitor European businesses Australian government foreign intelligence collection agency responsible for foreign signals intelligence (SIGINT) and information security (INFOSEC)
ASD's role within UKUSA Agreement (Five Eyes) is to monitor SIGINT in South Asia and East Asia. The ASD also houses the Australian Cyber Security Centre.
ZeroPeristantOp - Last Sunday at 7:05 PM
the Australian Defence Satellite Communications Station (ADSCS), located at Kojarena, near Geraldton, Western Australia,
the Shoal Bay Receiving Station, located at Shoal Bay, Northern Territory,[3] and
a small station on the Cocos (Keeling) Islands
Electronic warfare operators in the Royal Australian Corps of Signals work closely with ASD. 7 Signal Regiment (Electronic Warfare) at Borneo Barracks, Cabarlah, Queensland is also associated with ASD
Application Whitelisting;
Patch Applications;
Patch Operating System;
Minimise Administrative Privileges.
The Cyber Security Operations Centre in ASD has stated that at least 85% of the cyber intrusions it responds to would be mitigated had agencies implemented these Top 4 strategies.
The nature of its work means the agency is a large user of power
Office365 and Azure listed as ASD Certified Cloud Services
Countless freedom of information requests to access the budget of the ASD have been consistently denied by the government.
Currently the ASD’s website is advertising for people to join the organisation and become the “whitehat hackers” to defend Australia from the “dark side”.
e was studying computer science at the University of Wollongong when things like DDoS attacks first began occurring in the digital realm, he said, and he saw a job with the ASD as a “license to hack”.
“As a kid I thought it would be really cool because you get to do these things that are otherwise illegal,” he recalled
"he Australian Signals Directorate will be sharing threat intelligence with telcos and internet service providers, to help them provide, in turn, cost-effective cyber-security services for small to medium enterprises. This directly addresses the vulnerability to hacking of small and medium enterprises, which have been identified by both the government and the opposition as being sorely in need of protection, but without necessarily having the resources or expertise to protect themselves. Weirdly, however, this initiative ignores anti-virus and security software vendors—the companies that are perhaps best placed to immediately use this data to protect customers."
Bullshit
They help with cybersecurity to enable setting up camp in their techno works to spy on people
And Microsoft is a submarine screen door of security- they just traded asd certification to spy on their consumers
U$1 billion per year, Prime Minister Malcolm Turnbull has directed the Australian Signals Directorate (ASD) to use its offensive cyber capabilities to "disrupt, degrade, deny, and deter"
Size Unknown
Founded Unknown
Type Government
Industry Unknown
Revenue Unknown / Non-Applicable per year
Competitors Unknown
Australian Signals Directorate Reviews
N/A
the government announced that the ASD had been cleared to use its offensive cyber capabilities
Alan Laing Director of Cryptology
Australian Signals Directorate ASD (Formally DSD)
March 2007 – February 2014 (7 years)
development and management of ASD’s super computing environment as part of DEF21. Founded Unknown
Type Government
Industry Government
Revenue Unknown / Non-Applicable per year
Competitors Unknown
Defence Signals Directorate Reviews
N/A(edited)
Australia has four key facilities that are part of the XKeyscore program, the NSA’s controversial computer system that searches and analyses vast amounts of internet data.
Australian Signals Directorate (ASD) purposely targeted the law firm because it represented the commercial interests of the Indonesian state Located in Canberra, Australian Capital Territory Previously, the marking of NOFORN (i.e., No Foreign Nationals) required the originator to specify which, if any, non-U.S. countries could receive the information. A new handling caveat, USA/AUS/CAN/GBR/NZL Five Eyes, used primarily on intelligence messages, gives an easier way to indicate that the material can be shared with Australia, Canada, United Kingdom, and New Zealand.
The task of the division called "Verbindungsstelle 61" of the German Bundesnachrichtendienst is keeping contact to the CIA office in Wiesbaden
GCSB-NZ new electronic warfare equipment which had been purchased from the United States, one of the other Five Eyes partners to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS) ZeroStateRoom - Last Friday at 4:33 PM
eschalon program was espionage conducted by the members of the "Five Eyes" before the NGA upgraded the shit out of it
ZeroStateRoom - Last Friday at 6:52 PM
The U.S. National Security Agency spied on and intercepted the phone calls of Princess Diana right until she died in a Paris car crash with Dodi Fayed in 1997.
In order to boost America's position in trade negotiations with the then Japanese Trade Minister Ryutaro Hashimoto, in 1995 the CIA eavesdropped on the conversations between Japanese bureaucrats and executives of car manufacturers Toyota and Nissan ZeroPeristantOp - Last Sunday at 6:23 PM
ASD's role within UKUSA Agreement (Five Eyes) is to monitor SIGINT in South Asia and East Asia.
ZeroPeristantOp - Last Sunday at 7:12 PM
Other countries, known as "third parties", such as West Germany, the Philippines, and several Nordic countries also joined the UKUSA community
The existence of the UKUSA Agreement was discovered by the Australian government during the 1973 Murphy raids on the headquarters of the Australian Security Intelligence Organisation (ASIO). After learning about the agreement, Whitlam discovered that Pine Gap, a secret surveillance station close to Alice Springs, Australia, had been operated by the U.S. Central Intelligence Agency (CIA) ZeroISIS - Last Monday at 1:31 AM
The Five Eyes, often abbreviated as FVEY, is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries, with a similar common law legal inheritance, are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence
Documents leaked by Snowden in 2013 revealed that the FVEY have been spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens Since processed intelligence is gathered from multiple sources, the intelligence shared is not restricted to signals intelligence (SIGINT) and often involves defence intelligence as well as human intelligence (HUMINT)
Australia Australian Secret Intelligence Service ASIS HUMINT
Australia Australian Signals Directorate ASD SIGINT
Australia Australian Security Intelligence Organisation ASIO Security intelligence
Australia Australian Geospatial-Intelligence Organisation AGO GEOINT
Australia Defence Intelligence Organisation DIO Defence intelligence
Canada Canadian Forces Intelligence Command CFINTCOM Defence intelligence
Canada Communications Security Establishment CSE SIGINT
Canada Canadian Security Intelligence Service CSIS HUMINT
New Zealand Directorate of Defence Intelligence and Security DDIS Defence intelligence
New Zealand Government Communications Security Bureau GCSB SIGINT
New Zealand New Zealand Security Intelligence Service NZSIS HUMINT
United Kingdom Defence Intelligence DI Defence intelligence
United Kingdom Government Communications Headquarters GCHQ SIGINT
United Kingdom Security Service MI5 Security intelligence
United Kingdom Secret Intelligence Service MI6, SIS HUMINT
United States Central Intelligence Agency CIA HUMINT
United States Defense Intelligence Agency DIA Defense intelligence
United States Federal Bureau of Investigation FBI Security intelligence
United States National Geospatial-Intelligence Agency NGA GEOINT
United States National Security Agency NSA SIGINT ZeroISIS - Last Monday at 2:11 AM
In 1948, the treaty was extended to include Canada, followed by Norway (1952), Denmark (1954), West Germany (1955), Australia (1956), and New Zealand (1956)
These countries participated in the alliance as "third parties". By 1955, the formal status of the remaining Five Eyes countries was officially acknowledged in a newer version of the UKUSA Agreement that contained the following statement:
At this time only Canada, Australia and New Zealand will be regarded as UKUSA-collaborating Commonwealth countries.
The "Five Eyes" term has its origins as a shorthand for a "AUS/CAN/NZ/UK/US EYES ONLY" (AUSCANNZUKUS) classification level
By the end of the 20th century, the ECHELON surveillance network had evolved into a global system capable of sweeping up massive amounts of private and commercial communications, including telephone calls, fax, e-mail and other data traffic. This was done through the interception of communication bearers such as satellite transmission and public switched telephone networks
The Five Eyes has two types of information collection methods: the PRISM program and the Upstream collection system.
regularly abused for corporate espionage in the service of US business interests In the aftermath of the September 11 attacks on the World Trade Center and the Pentagon, the surveillance capabilities of the Five Eyes were greatly increased as part of the global War on Terror
SIS and the CIA forged a surveillance partnership with Libya's ruler Muammar Gaddafi to spy on Libyan dissidents in the West, in exchange for permission to use Libya as a base for extraordinary renditions. government-sponsored abduction
As of 2010, the Five Eyes also have access to SIPRNet, the U.S. government's classified version of the Internet FVEY have shown that they are intentionally spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on spying
FVEY alliance increases the ability of member states to "subcontract their dirty work" to each other.
European Parliament's Committee on Civil Liberties, Justice and Home Affairs released a draft report which confirmed that the intelligence agencies of New Zealand and Canada have cooperated with the NSA under the Five Eyes programme and may have been actively sharing the personal data of EU citizens
the NSA has a "massive body" called the Foreign Affairs Directorate that is responsible for partnering with foreign countries
Israel is, reportedly, an observer in Five Eyes
http://newnation.sg/wp-content/uploads/israel-singapore.jpg Singapore is reported to have partnered with the Five Eyes
Nine Eyes
The Nine Eyes is a different arrangement that consists of the same members of Five Eyes working with Denmark, France, the Netherlands and Norway
Fourteen Eyes
According to a document leaked by Edward Snowden, there is another working agreement amongst 14 nations officially known as SIGINT Seniors Europe, or "SSEUR".
These "14 Eyes" consist of the same members of 9 Eyes plus Germany, Belgium, Italy, Spain and Sweden. ZeroISIS - Last Monday at 3:03 PM
70 years old no government officially acknowledged the arrangement by name until 1999. Edward Snowden. Almost all of the documents include the classification “TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL” or “TOP SECRET//COMINT//REL TO USA, FVEY.” Tier B countries with which the Five Eyes have “focused cooperation” on computer network exploitation, including Austria, Belgium, Czech Republic, Denmark, Germany, Greece, Hungry, Iceland, Italy, Japan, Luxembourg, Netherland, Norway, Poland, Portugal, South Korea, Spain, Sweden, Switzerland and Turkey;
the most powerful espionage alliance in history. Canada took a pause in operations when its citizens came up in an uproar in January of 2016 The CFBLNet Unclassified Enclave (CUE), which is unclassified, but traffic is secured using 128 bit Advanced Encryption Standard (AES) encryption.
The Four-Eyes Enclave (FEE), which is a classified enclave at the SECRET level, accessible for USA, GBR, CAN and AUS only. This enclave was moved from behind the BLUE enclave to the Blackbone in 2006.
The 6-Eyes or BLUE Enclave, which is a classified enclave at the SECRET level, accessible for the Five Eyes plus NATO (see paragraph about 6, 8 and 10-Eyes) CENTRIXS networks
The main US-led multinational coalition networks are called CENTRIXS, which stands for Combined ENTerprise Regional Information eXchange System. It's a secure wide area network (WAN) architecture, which can be established according to the demands of a particular coalition exercise or operation. CENTRIXS supports intelligence and operations information sharing at the SECRET REL TO [country/coalition designator] level. Some notable CENTRIXS networks are:
- CENTRIXS Four Eyes (CFE) for the US, Britain, Canada and Australia.
- CENTRIXS-NZ for the Four Eyes plus New Zealand.
- CENTRIXS-JPN for the United States and Japan.
- CENTRIXS-K for the United States and South-Korea.
- CENTRIXS-PHI for the United States and the Philippines.
- CENTRIXS-CNFC for the Combined Naval Forces CENTCOM (VPN within GCTF).
- CENTRIXS-MCFI for the Multinational Coalition Forces Iraq.
- CENTRIXS-ISAF (CX-I) which is the US component of the Afghan Mission Network to share critical battlefield information among 50 coalition partners.
- CENTRIXS-GCTF (CX-G) for the Global Counter Terrorism Forces, which is the US coalition network in Afghanistan to share information among more than 80 Troop Contributing Nations. The countries connected to CENTRIXS-ISAF can be recognized as the 41-Eyes of the allied coalition in Afghanistan mentioned by The Guardian. This group grew slowly and was called 43-Eyes in 2010, when the NATO exercise Empire Challenge 2010 (EC10) changed its "main participating security domain" to "an International Security Assistance Forces (ISAF) equivalent 43-Eyes domain". hmmmm make that 86 http://4.bp.blogspot.com/-mcBFRnfZfCk/Un_NzUcABEI/AAAAAAAAA9Y/e_V4RcXqy1k/s1600/infosharing-4-5-eyes.jpg - 3-Eyes: USA, GBR, AUS (TEYE)
- 4-Eyes: USA, GBR, CAN, AUS (ACGU)
- 5-Eyes: USA, GBR, CAN, AUS, NZL (FVEY)
- 6-Eyes: USA, GBR, CAN, AUS, NZL, NATO
- 7-Eyes: USA, GBR, CAN, AUS, FRA, DEU, ITA (MIC?)
- 8-Eyes: USA, GBR, CAN, AUS, NZL, NATO, ?, South-Korea
- 9-Eyes: USA, GBR, CAN, FRA, DEU, ITA, NLD, NOR, ESP (CFBLNet)
- 9-Eyes: Five Eyes + FRA, DNK, NLD, NOR (Guardian)
- 10-Eyes: USA, GBR, CAN, AUS, NZL, NATO, Japan, South-Korea, Thailand, Singapore
- 14-Eyes: Five Eyes + FRA, DNK, NLD, NOR, DEU, ESP, ITA, BEL, SWE (SSEUR)
- 41-Eyes: ISAF-countries in ? (Guardian)
- 43-Eyes: ISAF-countries in 2010
86 eyes GCTF
FVEY, that database has codename STONEGHOST
Scripting abilities include lua, PHP, CSS, and HTML as our operations are not fully within the Roblox website. ZeroISIS - Last Monday at 11:02 PM
Since Five Eyes can and do spy on the activity of all their citizens, the concept of individual privacy is well on its way to being forgotten. To protect yourself from all your personal information being recorded and all your communication and internet activity monitored, you can use a VPN and other online security tools.
Much of the sharing of information is performed via the ultra-sensitive STONEGHOST network, which has been claimed to contain "some of the Western world's most closely guarded secrets".
“PKI Interoperability with FVEY Partner Nations on the NIPRNet,” that describes that under a Combined Joint Multilateral Master Military Information Exchange Memorandum of Understanding, DOD had agreed to issue FVEY partner nations software PKI certificates for three years. This was to provide the partner nations time to develop their own PKIs.
While recent leaks will likely trigger reviews of the security of information passed between allies, foundational changes to the intelligence sharing arrangement will be avoided. As long as regular dialogues such as the Five Country Ministerial on national security continue to provide opportunities for its members to work through complications, the alliances status as the world’s foremost intelligence sharing arrangement is unlikely to be challenged Generally, geospatial intelligence can be more readily defined as, data, information, and knowledge gathered about entities that can be referenced to a particular location on, above, or below the earth's surface. The intelligence gathering method can include imagery, signals, measurements and signatures, and human sources, i.e., IMINT, SIGINT, MASINT, and HUMINT, as long as a geo-location can be associated with the intelligence. HCS [HUMINT Control System], for human source operations GCHQ, the UK spy agency which specializes in garnering intelligence from communications (as opposed to, MI5 and MI6, which focus on acquiring domestic and foreign “human intelligence”, respectively) has officially joined Twitter — posting a “Hello, world” inaugural tweet from its blue check verified account.
ZeroISIS - Last Monday at 1:38 AM
FVEY Since processed intelligence is gathered from multiple sources, the intelligence shared is not restricted to signals intelligence (SIGINT) and often involves defence intelligence as well as human intelligence (HUM
Australian Secret Intelligence Service ASIS HUMINT ZeroFVEY - Last Tuesday at 2:30 AM
The National Clandestine Service (NCS) is the branch of the CIA responsible for the collection of HUMINT. The NCS is charged with strengthening national security and foreign policy objectives through the clandestine collection of HUMINT.
HUMINT is collected through:
Clandestine acquisition of photography, documents, and other material
Overt collection by people overseas
Debriefing of foreign nationals and U.S. citizens who travel abroad
Official contacts with foreign governments
Raw HUMINT is disseminated to the Intelligence Community, including analysts in the CIA’s Directorate of Intelligence and U.S. Military officers in the field. HUMINT can be used in its raw form to make decisions on the battlefield, or more often, HUMINT, along with other types of intelligence (SIGINT, IMINT, etc.), is analyzed to produce finished intelligence products for U.S. policymakers.
human sources using clandestine espionage
the quintessential spy
Espionage networks are typically organized as a cell system
in which each clandestine operator knows only the people in his own cell
. This cellular organization is a form of compartmentalisation, which is an important tactic for controlling access to information
Espionage is the act of obtaining (typically via covert methods) information which an adversary would not want the entity conducting the espionage to have. Espionage is inherently clandestine, and the legitimate holder of the information may change plans or take other countermeasures once it is known that the information is in unauthorized hands
Clandestine HUMINT operational techniques, also called "tradecraft"
It applies to clandestine operations for espionage, and for a clandestine phase prior to direct action (DA) or unconventional warfare (UW)
Clandestine HUMINT sources may also act as local guides for special reconnaissance
(SR)
(SR) is conducted by small units of highly trained military personnel, usually from special forces units or military intelligence organizations, who operate behind enemy lines, avoiding direct combat and detection by the enemy.
Many of the techniques here are important in counterintelligence. Defensive counterintelligence personnel need to know them to recognize espionage, sabotage, etc. in process. Offensive counterintelligence specialists may actually use them against foreign intelligence services (FIS)
art of war
militant groups appear to use considerably different clandestine cell system structure, for command, control, and operations, than do national forces. Cell systems are evolving to more decentralized models, sometimes because they are enabled by new forms of electronic communications.
Clandestine HUMINT asset recruiting refers to the recruitment of human agents, commonly known as spies, who work for a foreign government, within a host country's government, or other targets of intelligence interest for the gathering of human intelligence. The methods of detecting and "doubling" spies who betray their oaths to work on behalf of a foreign intelligence agency are called counterintelligence.
asset roles include support functions such as communications, forgery, disguise
"executive agents", who will kill or commit sabotage, and recruiting agents. In US practice, recruiting agents are called access agents.
Other supplementary functions include people who can "legalise" agents with cover jobs, and specialists that can forge documents or get illicit copies from the actual source. Safe houses, safe mail drops, and safe telephones are other supplementary functions.
Recruiting people that may have access to the activities of non-state groups will be much harder, since these groups tend to be much more clandestine, and often operate on a cell system composed of relatives and people who have known one another for years.
motives which will be used in the actual recruitment of the person are cultivated and weaknesses are exacerbated the first recruit may be someone well-connected in the local culture. Such a person may be called a principal agent or an access agent, who may simply arrange introductions, or actually run the operations of subagents the asset would be in the highest-priority country and have access to "the minutes of Politburo meetings" or equally critical military, scientific, or other data In the case of countries that either dominate countries (e.g., the satellites of the former Soviet Union) or client states of another power, officials of the client country, or of the patron country's representatives in the client, may be easier to recruit than officials in the home country.
the priority is to recruit a defector in place, continuing to report. "The Satellite diplomat, foreign trade official, journalist, or intelligence officer who has been useful to us abroad will be even more valuable when he goes back home at the end of his tour, not just because he is then inside the target country, but because the intelligence to which he has access in a ministry headquarters has greater scope and depth.
Last in priority is not direct recruitment, but the collection of information to support future recruitment. This begins with obtaining biographical information on "officials abroad who are likely in the future to have other tours of foreign duty somewhere in the world. An official may not be developable for recruitment during his current tour, but six months from now it might be a different story. Political turmoil being what it is within the Satellites, the "ins" can rapidly become the "outs". If we can identify a man as a former "in" who is now "out" we may be able to recruit him. But this kind of identification requires orderly and current biographic indexes of Satellite personnel who travel abroad".
The U.S. Army defines three classes of people who may present themselves:
Defectors
Asylum seekers
Walk-ins: who seek to provide information to the United States; or a disaffected person (one who is discontent and resentful, especially against authority) who presents him- or herself to a U.S. installation in a foreign country and who appears willing to accept recruitment in place or requests asylum or assistance in escaping from the control of his or her government.
The best way of doing this is actually bringing a sample of information. Suvorov observes that "this is perhaps the only way to convince the GRU that they can trust the person". The information is true, but is too old to be of operational value. This was one of the key techniques of the World War II British Double Cross System
polygraphy, voice stress analysis, interviews by psychologists and psychiatrists, and perhaps more in the future, brain imaging
U.S. intelligence services, for example, are concerned when their own personnel could be subject to sexual blackmail. This applied to any homosexual relationship until the mid-1990s
One former CIA officer said that while sexual entrapment wasn't generally a good tool to recruit a foreign official, it was sometimes employed successfully to solve short-term problems. Seduction is a classic technique; "swallow" was the KGB tradecraft term for women, and "raven" the term for men, trained to seduce intelligence targets. True friendship or romance may draw others to become involved with a current agent. John Anthony Walker, who spied for money, recruited friends and relatives. Rosario Ames, wife of Aldrich Ames, was brought into her husband's activities.
phase, in which the potential agent is called a developmental, has not yet reached the recruiting pitch. After the cultivation stage, overt contact is established with the candidate under the guise of an official meeting. After the acquaintanceship has ripened and official meetings evolve into personal meetings, the developmental stage begins
"The crash approach, or 'love at first sight' in GRU jargon, has a number of irrefutable advantages. Contact with the future agent takes place only once, instead of at meetings over many months, as is the case with the gradual approach. After the first contact the newly recruited agent will himself take action on his own security. He will never talk to his wife, or tell her that he has a charming friend in the Soviet military attaché who is also very interested in stamp collecting."
There must exist motives by means of which an individual can be recruited:
Financial considerations/greed (transcends all other motives)
Revenge/disaffection
Blackmail/hostage Situations (used in USSR but very infrequently in United States)
Appeal to emigre's national pride
Exploitation of an emotional involvement
False flag approaches
Exploitation of an American's naiveté
Sex
Ideology (which is no longer the motivation it was during the Cold War; the Soviet service changed its emphasis to concentrate on sympathy for "persecuted" elements of American, or other targeted, society) A common technique was to find birth records of someone known later to have died. The "documentation agent" who did this would not have contact with illegals
Recruiters can run false flag operations, where a citizen of country A believes they are providing intelligence to country B, when they are actually providing it to country C
covert operations, where personnel, uniformed or not, may conduct raids, sabotage, assassinations, propaganda (i.e., psychological operations)
espionage as: "gathering, transmitting, or losing ... information related to the national defense."
Espionage is a violation of 18 United States Code 792–798 and Article 106, Uniform Code of Military Justice.
a government many also employ private companies to collect information on their behalf such as SCG International Risk
The most common shorthand for changing allegiance is MICE, an acronym for:
Money: Low salary? Greedy? Needs money for family crisis? In debt?
Ideology: Hates his system, admires ours?
Compromise (or coercion): Vulnerable to blackmail? Emotional relationship with an access agent?
Ego (or excitement): Lonely? Looking for a friend? Passed over for a promotion? Not appreciated by peers and superiors? Seeking praise and recognition? Adventurous? Looking for personal challenge? Wants to be James Bond? Egomaniac? Wants to prove he can get away with it?
Another special case is a "deep cover" or "sleeper" mole, who may enter a service, possibly at a young age, but definitely not reporting or doing anything that would attract suspicion, until reaching a senior position False flag penetrator
false flag double agent
Starts in A
Assigned to C
B creates a situation where agent believes he is talking to C, when actually receiving B disinformation
Money laundering refers to methods for getting cash in and out of the financial system without it being noticed by financial counterintelligence.
The most common way to do money laundering is to find a legal business that naturally receives much of its income in cash. These could include hair and beauty shops, small groceries, and, ironically, laundries and dry cleaners. The legal business, or more likely multiple businesses, receive the illegal cash as well as normal receipts, and draw amounts that do not attract suspicion. Periodically, the launderer may have the cash-receiving firm buy something for him, or, less commonly, to write a large check that goes into his legal account. Care is taken that the amounts in the legal accounts do not hit the limits that cause automatic reporting.
UAVs may soon evolve past the need for HUMINT
You’ve heard about the Special Air Service (SAS). Perhaps you’ve heard about their maritime brethren, the Special Boat Service (SBS). Chances are, however, you haven’t heard about their youngest sibling, the Special Reconnaissance Regiment (SRR).
And for a good reason. Created in 2005, this shadowy unit is the equivalent of America’s Intelligence Support Activity (ISA), aka the Activity. ZeroFVEY - Last Tuesday at 2:35 AM
The National Clandestine Service (NCS) is the branch of the CIA responsible for the collection of HUMINT. The NCS is charged with strengthening national security and foreign policy objectives through the clandestine collection of HUMINT.
The NCS officers responsible for collecting HUMINT are called Operations Officers. They focus on acquiring information from individuals with access to vital foreign intelligence on the full range of national security issues.
To be successful, NCS officers must understand one of the most complex aspects of running assets — human nature. Emotions, intentions and motivations differ from person-to-person and change overtime. Understanding people, with all of their complexities, is crucial to the business of running assets to collect HUMIN
Collection methods can take place in a variety of ways, including in-person meetings. Some HUMINT operations are short in duration, while others take years. Through it all, NCS officers must understand and assess the intentions and motivations of their assets, as well as the authenticity of the intelligence they provide. The most successful HUMINT sources provide volumes of intelligence responsive to Intelligence Community requirements.
. When CIA collection addresses an intelligence requirement, the HUMINT information is disseminated as raw intelligence. In order for CIA assets to remain safe, NCS officers take careful measure to protect the identity of clandestine assets.
The success of NCS operations relies on officers working as a team. All NCS officers—from Targeters identifying future assets, to Staff Operations Officers supporting operations — are crucial to the success of the NCS in meeting the HUMINT needs of the Intelligence Community.
HUMINT resources in the NCS are tapped when only a well-placed human asset would have access to the intelligence needed by the President, U.S. Policymakers, the U.S. Military, and other key members of the Intelligence Community. If the intelligence can be collected through other collection methods, then HUMINT resources — with inherent risks to human lives — can be preserved for intelligence requirements for which no other collection method exists. The system of CIA being the collector of last resort is in place because assets and NCS officers have lost their lives collecting HUMINT.
ZeroFalseFlag - Last Tuesday at 5:22 PM
The Directorate of Operations (DO) serves as the clandestine arm of the Central Intelligence Agency (CIA) and the national authority for the coordination, de-confliction, and evaluation of clandestine operations across the Intelligence Community of the United States
It was known as the Directorate of Plans from 1951 to 1973; as the Directorate of Operations from 1973 to 2005; and as the National Clandestine Service (NCS) from 2005 to 2015
In 2004, Senator Pat Roberts, the Senate Intelligence Committee's Chairman, drafted the 9/11 National Security Protection Act in which he proposed that the Directorate of Operations be removed from the CIA and established as an independent agency known as the National Clandestine Service.
ZeroFalseFlag - Last Tuesday at 9:55 PM
The Directorate of Operations (DO) was the CIA's branch that conducted covert operations and recruited foreign agents. It was led by the Deputy Director for Plans (later renamed as the Deputy Director for Operations) and reportedly employed 1,000–2,000 people(edited)
ZeroFalseFlag - Last Tuesday at 11:03 PM
public outcry resulting from the Church Committee's revelations of the DO's highly questionable activities.
The NCS is structured under its Director as follows:
Deputy Director of the NCS
Counterproliferation Division
Counterterrorism Center
Counterintelligence Center
Regional & Transnational Issues Divisions
Technology Support Divisions(edited)
Deputy Director of the NCS for Community HUMINT Community HUMINT Coordination Center ZeroFalseFlag - Yesterday at 2:10 PM
National Clandestine Service
This is where the so-called "spies" work. NCS employees go undercover abroad to collect foreign intelligence. They recruit agents to collect what is called "human intelligence." What kinds of people work for the NCS? NCS employees are generally well-educated, know other languages, like to work with people from all over the world and can adapt to any situation, including dangerous ones. Most people, including their friends and family members, will never know exactly what NCS employees do. Later we'll take a look at how the spies stay undercover and check out some of their cool gadgets.
Below are brief descriptions of the four principal categories and where applicable the sub-categories of Clandestine Service Officers. For a more detailed description, visit the CIA website.
Operations Officers (OO): focus full-time on "clandestinely spotting, assessing, developing, recruiting, and handling individuals with access to vital foreign intelligence"
Collection Management Officers (CMO) "oversee and facilitate the collection, evaluation, classification, and dissemination of foreign intelligence developed from clandestine sources." They ensure that "foreign intelligence collected by clandestine sources is relevant, timely, and addresses the highest foreign policy and national security needs"
Staff Operations Officers (SOO) are based out of CIA Headquarters in Washington, D.C., and "plan, guide and support intelligence collection operations, counterintelligence activities and covert action programs
Specialized Skills Officers (SSO) consist of a diverse group of "Information Resource Officers, Language Officers, Paramilitary Operations Officers, Programs and Plans Officers, and Targeting Officers—many of which are Core Collector certified". SSOs conduct and/or directly support CIA operations leveraging their language, media, technical skills and/or military experience. Qualified candidates can expect to focus on human intelligence operations and activities as defined by the Intelligence Community.
Officers in this career track will directly support and drive complex worldwide NCS operations to develop actionable intelligence against the highest priority threats to U.S. national security
Paramilitary Operations Officers are chosen mainly from the ranks of U.S. special operations forces.
Program and Plans Officers devise, oversee and carry out a variety of particularly unique, complex and long-term clandestine operational activities primarily of a non-paramilitary nature, but often in support of paramilitary programs.
A covert action is defined as "an activity or activities of the United States government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly"
A covert operation differs from a clandestine operation in that emphasis is placed on concealment of the identity of the sponsor rather than on concealment of the operation
Covert operations include paramilitary and psychological activities.
Psychological operations (PSYOP) are planned operations to convey selected information and indicators to audiences to influence their emotions, motives, and objective reasoning, and ultimately the behavior of governments, organizations, groups, and individuals.
Executive Order 12333 bans assassinations by persons employed by or acting on behalf of the United States government
Intelligence Community Directive Number 340 designates the CIA as the National HUMINT Manager(edited)
clandestine collection of HUMINT are collectively known as tradecraft
In the Intelligence Authorization Act for the Fiscal Year 2002, Congress instructed the CIA's Director to rescind what Congress viewed as overly restrictive guidelines regarding the recruitment of foreign assets who had a record of human rights violations
Camp Peary (also referred to as "The Farm"), near Williamsburg, Virginia, is purportedly a CIA training facility for clandestine operatives
Sometimes in cooperation with technical personnel at other agencies such as the NSA when the collection discipline is SIGINT
DIA when the techniques come MASINT
agencies such as the Department of Energy for nuclear information
Research, development, testing, and production of ELINT and COMINT collection equipment for all Agency operations.
Technical operation and maintenance of CIA deployed non-agent ELINT systems.
Training and maintenance of agent ELINT equipment
Technical support to the Third Party Agreements.
Data reduction of Agency-collected ELINT signals.
ZeroFalseFlag - Yesterday at 3:10 PM
the CIA was, initially, the financial manager for OPC and OSO, authorized to handle "unvouchered funds" by National Security Council document 4-A of December 1947, the launching of peacetime covert action operations. NSC 4-A made the Director of Central Intelligence responsible for psychological warfare, establishing at the same time the principle that covert action was an exclusively Executive Branch function.
NSC 10/2 defined the scope of these operations as: "propaganda; economic warfare; preventive direct action, including sabotage, demolition and evacuation measures; subversion against hostile states, including assistance to underground resistance movements, guerrillas and refugee liberations groups, and support of indigenous anti-Communist elements in threatened countries of the free world. Such operations should not include armed conflict by recognized military forces, espionage, counter-espionage, and cover and deception for military operations.
Guerrilla warfare was outside this statement of scope, but such operations came under partial CIA control with NSC 10/5 of October 1951.
To implement covert actions under NSC 10/2, the OPC was created on September 1, 1948. Its initial structure had it taking guidance from the State Department in peacetime and from the military in wartime, initially had direct access to the State Department and to the military without having to proceed through the CIA's administrative hierarchy, provided the Director of Central Intelligence (DCI) was informed of all important projects and decisions. In 1950 this arrangement was modified to ensure that policy guidance came to OPC through the DCI. During the Korean War, the OPC grew quickly. Wartime commitments and other missions soon made covert action the most expensive and bureaucratically prominent of the CIA's activities.
, DCI Walter Bedell Smith in early 1951 asked the NSC for enhanced policy guidance and a ruling on the proper "scope and magnitude" of CIA operations. The White House responded with two initiatives. In April 1951 President Truman created the Psychological Strategy Board (PSB) under the NSC to coordinate government-wide psychological warfare strategy.
CIA's responsibility for conducting covert actions abroad". A series of committees, containing representatives from State, Defense, the CIA, and sometimes the White House or NSC, reviewed operations. Over time and reorganizations, these committees were called the Operations Coordinating Board (OCB), NSC 5412/2 Special Group or simply Special Group, Special Group (Augmented), 303 Committee, and Special Group (Counterinsurgency). ZeroHUMINT - Yesterday at 4:48 PM
The enhanced interrogation techniques, many of which constituted torture under international law, included shackling detainees in stress positions, slamming them against walls, depriving them of sleep for prolonged periods, and waterboarding, a method of controlled, simulated, or interrupted drowning. Other suspects were kidnapped and transported for interrogation to foreign countries whose governments routinely tortured criminal suspects and dissidents; see extraordinary rendition. Still others were eventually held at the Guantánamo Bay detention camp in southeastern Cuba, which was specially constructed starting in 2002 to house captured members of al-Qaeda and other Islamic militants. The black sites were officially closed in 2009, in keeping with an executive order signed by Obama. The Director of the Central Intelligence Agency (D/CIA) reports directly to the Director of National Intelligence (DNI)
n practice, the CIA director interfaces with the DNI, Congress, and the White House, while the Deputy Director is the internal executive of the CIA.
Under the Central Intelligence Agency Act of 1949, the Director of Central Intelligence is the only federal government employee who can spend "un-vouchered" government money.
$2.5 billion. "Covert action programs", including a variety of activities such as the CIA's drone fleet and anti-Iranian nuclear program activities, accounts for $2.6 billion
ZeroFalseFlag - Yesterday at 3:51 PM
, DCI Walter Bedell Smith in early 1951 asked the NSC for enhanced policy guidance and a ruling on the proper "scope and magnitude" of CIA operations. The White House responded with two initiatives. In April 1951 President Truman created the Psychological Strategy Board (PSB) under the NSC to coordinate government-wide psychological warfare strategy.
ZeroHUMINT - Yesterday at 4:50 PM
Mike Pompeo Jan. 23, 2017-
ZeroTGS - Yesterday at 5:08 PM
The Director reports to the Director of National Intelligence (DNI)
DCI advises President of the United States on intelligence matters and was the statutory intelligence advisor to the National Security Council (NSC)(edited)
Director of the Central Intelligence Agency
The Director of the Central Intelligence Agency is Mike Pompeo. The D/CIA serves as the head of the Central Intelligence Agency and reports to the Director of National Intelligence. The D/CIA is nominated by the President and confirmed by the Senate. The Director manages the operations, personnel and budget of the CIA and acts as the National Human Source Intelligence (HUMINT) Manager.
ZeroTGS - Yesterday at 6:30 PM
The office existed from January 1946 to April 21, 2005, and was replaced on that day by the Director of National Intelligence (DNI) as head of the Intelligence Community and the Director of the Central Intelligence Agency (D/CIA) as head of the CIA.
former CIA Director John Brennan is a Muslim who converted to Islam while stationed in Saudi Arabia.
cover-up” at the spy agency, intended to keep the commission focused on “what the Agency believed at the time was the ‘best truth’—that Lee Harvey Oswald, for as yet undetermined motives, had acted alone in killing John Kennedy.” The most important information that McCone withheld from the commission in its 1964 investigation, the report found, was the existence, for years, of CIA plots to assassinate Castro, some of which put the CIA in cahoots with the Mafia. Without this information, the commission never even knew to ask the question of whether Oswald had accomplices in Cuba or elsewhere who wanted Kennedy dead in retaliation for the Castro plots. ZeroTGS - Yesterday at 7:02 PM
the Director of the Central Intelligence Agency shall have no police, subpoena, or law enforcement powers or internal security functions "The reason why...Pompeo is launching this attack, is because he knows we're in this series exposing all sorts of illegal actions by the CIA," Assange continued. Pompeo is "trying to get ahead of the publicity curve and create a preemptive defense."
WASHINGTON — The head of the CIA says he was “outraged” by a teenager’s hacking of his personal AOL email account. using information like the four digits of Brennan’s bank card, which Verizon easily relinquished, the hacker and his associates were able to reset the password on Brennan’s AOL account repeatedly as the spy chief fought to regain control of it.
BI: What are the most critical language needs of the CIA?
BR: These days I would say Chinese ZeroTGS - Yesterday at 8:27 PM
Additionally, the CIA appeared “to have been investigating the man who recruited the [alleged 9/11] hijackers at the time he was recruiting them.” Although there is no evidence that the CIA took actions to stop the plot as it was unfolding, there were many interesting leads to follow. For example, in the summer of 1999 Bin Laden was reportedly given $50 million by a group of oil-rich sheikhs. The New York Times reported on this gift which came via a single bank transfer: “The Central Intelligence Agency has obtained evidence that Mr. Bin Laden has been allowed to funnel money through the Dubai Islamic Bank in Dubai, which the United Arab Emirates Government effectively controls.” former director of the NSA and the CIA, called Baker’s comment ‘absolutely correct,’ and raised him one, asserting, ‘We kill people based on metadata.’” 'With all that happened in the Vietnam years, what's really striking to me is why he wasn't tortured by it more,' he said.
William Colby killed himself over Project Phoenix nd other CIA veitnam ops Former CIA director James Woolsey and Dr. Peter Vincent Pry warn that North Korea could kill 90 percent of Americans
ZeroTGS - Yesterday at 5:27 PM
DCI advises President of the United States on intelligence matters and was the statutory intelligence advisor to the National Security Council (NSC)
ZeroMrWorld - Yesterday at 9:22 PM
National Security Council
Check back soon for more information.
They have submitted no information to the public
The regular attendees of the Principals Committee are the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, the Secretary of Energy, the Secretary of Homeland Security, the White House Chief of Staff, the Director of National Intelligence, the Chairman of the Joint Chiefs of Staff, the Director of the Central Intelligence Agency, the Homeland Security Advisor, and the United States Ambassador to the United Nations.
The National Security Council Deputies Committee is the senior sub-Cabinet interagency forum for consideration of national security policy issues. The Deputies Committee is also responsible for reviewing and monitoring the interagency national security process including for establishing and directing the Policy Coordination Committees
The Deputies Committee is convened and chaired by the Deputy National Security Advisor or the Deputy Homeland Security Advisor
ZeroMrWorld - Yesterday at 10:03 PM
The Policy Coordination Committees of the National Security Council, established and directed by the Deputies Committee, are responsible for the management of the development and implementation of national security policies through interagency coordination.
Assistant to the President and National Security Advisor: H.R. McMaster
"White House Senior Adviser Jared Kushner is leading an unprecedented effort to meddle in the… National Security Council (NSC), causing mayhem for senior staff who say the president's son-in-law is interfering in key foreign policy debates," the Washington Free Beacon
ZeroMrWorld - Yesterday at 9:29 PM
NSC
PC
zerotrace - Yesterday at 10:49 PM
Tillerson joined Exxon in 1975 and rose to serve as the chairman and chief executive officer (CEO) of ExxonMobil from 2006 to 2016.
zerotrace - Yesterday at 11:01 PM
Tillerson joined Exxon in 1975 and rose to serve as the chairman and chief executive officer (CEO) of ExxonMobil from 2006 to 2016. he became president of Exxon Yemen Inc
From 2010 to 2012 he was the national president of the Boy Scouts
Tillerson, who had made business deals on behalf of Exxon with Russian President Vladimir Putin
He has previously been the director of the joint US-Russian oil company Exxon Neftegas.
son of Patty Sue (née Patton) and Bobby Joe Tillerso
two sisters Rae Ann Hamilton, Jo Lynn Peters
1999, with the merger of Exxon and Mobil, he was named executive vice president of ExxonMobil Development Company. In 2004, he became president and director of ExxonMobil.
Under Tillerson's leadership, ExxonMobil cooperated closely with Saudi Arabia, the world's largest oil exporter and a longtime U.S. ally, Qatar and the United Arab Emirates From 2003 to 2005, a European subsidiary of ExxonMobil, Infineum, operated in the Middle East providing sales to Iran, Sudan and Syria
Exxon had misled investors and the public about climate change During his Secretary of State confirmation hearings, Marco Rubio asked Tillerson if he would label Saudi Arabia as a "human rights violator." Tillerson declined
He supported the Saudi Arabian-led intervention in Yemen
ExxonMobil's embrace of a carbon tax in October 2009 may have simply been an effort to avoid cap and trade legislation that was then being considered by the U.S. Congres
ExxonMobil "has not made a carbon tax a focus of its massive lobbying efforts and has supported a number of candidates and organizations that oppose
In 2013, Tillerson outlined his support for the Trans-Pacific Partnership (TPP), stating at the Global Security Forum: "One of the most promising developments
Speaking in March 2007 at a Council on Foreign Relations event, Tillerson said:
Should the United States seek so-called energy independence in an elusive effort to insulate this country from the impact of world events on the economy, or should Americans pursue the path of international engagement, seeking ways to better compete within the global market for energy? Like the Council's founders, I believe we must choose the course of greater international engagement .. Tillerson was first recommended to Trump for the Secretary of State role by former Secretary of State Condoleezza Rice Rice's recommendation of Tillerson to Trump was backed up by Robert Gates, three days later
His nomination was reportedly advocated by Steve Bannon and Jared Kushner
Tillerson's comments on blocking access to man-made islands in the South China Sea, China's state-controlled media warned of a "large-scale war" between the U.S. and China Senate Foreign Relations Committee approved Tillerson's nomination 11–10, a strict party line vote on January 23, 2017
Tillerson selected Margaret Peterlin to be his chief of staff
In 2015, Tillerson was named as the 25th most powerful person in the world by Forbes
Now #24
The Treasury Department slapped Exxon (XOM) with a $2 million fine -- the maximum allowed under current law -- and said the company had "demonstrated reckless disregard" for the requirements of the sanctions.
Climate Emails From Former Exxon CEO Rex Tillerson’s Alias Account Have Disappeared
August 17, 2017
zerotrace - Today at 12:01 AM
The new U.S. administration of Donald Trump has made it public that it will seek a regime change policy in Venezuela disguised in “transition to democracy” rhetoric, the country’s potential new Secretary of State Rex Tillerson said in an interview this week. the company will face allegations that security forces under its employ engaged in serious human rights abuses, including murder, torture, sexual violence, kidnapping, battery, assault, burning, arbitrary arrest, detention and false imprisonment. The complaint specifically names Rex Tillerson. diplomats have also been instructed to not speak to Tillerson directly — "or even make eye contact, His former company is being sued for its alleged role in unprovoked shootings and arbitrary detention of Indonesian people. ZeroTGS - 07/30/2017
Lee Raymond (ExxonMobil (Former CEO and Chairman, vice chairman of the Board of Trustees of the American Enterprise Institute, director of J.P. Morgan Chase & Co., director and member of the Executive Committee and Policy Committee of the American Petroleum Institute), and others. Tillerson retired from Exxon effective January 1, 2017, and was succeeded by Darren Woods.
1999, with the merger of Exxon and Mobil, he was named executive vice president of ExxonMobil Development Company. In 2004, he became president and director of ExxonMobil.
xxonMobil's embrace of a carbon tax in October 2009 may have simply been an effort to avoid cap and trade legislation that was then being considered by the U.S. Congres
ExxonMobil "has not made a carbon tax a focus of its massive lobbying efforts and has supported a number of candidates and organizations that oppose
ExxonMobil hires former State Department, Pentagon, and C.I.A Exxon /ˈɛksɒn/ was the brand name of oil and natural resources company Exxon Corporation, prior to 1972 known as Standard Oil
In 1999, Exxon Corporation merged with Mobil to form ExxonMobil.
Exxon has whitewashed the web In 1892, the Standard Oil company was broken up by the government after the passage of the Sherman Antitrust Act. The spinoffs of Standard Oil continue to be represented in many of the larger oil companies of today including Exxon, Mobil, Sohio, Esso, Arco and Chevron.
World Trade Center Exxon /ˈɛksɒn/ was the brand name of oil and natural resources company Exxon Corporation, prior to 1972 known as Standard Oil
Dispatching thugs who used threats and physical violence to break up the operations of competitors who could not otherwise be persuaded. zerotrace - Yesterday at 10:55 PM
1995 Tillerson became president of Exxon Yemen Inc zerotrace - Yesterday at 10:58 PM
95 rex tillierson takes over Esso name was a trademark of Standard Oil Company of New Jersey, and attracted protests from other Standard Oil spinoffs because of its phonetic similarity to the acronym of the name of the parent company, Standard Oil
Esso /ˈɛsoʊ/ is a trading name for ExxonMobil and its related companies. The name is a phonetic version of the initials of the pre-1911 Standard Oil (SO = Esso) tillerson directed
1998, he became a vice president of Exxon Ventures (CIS) and president of Exxon Neftegas Limited with responsibility for Exxon's holdings in Russia and the Caspian Sea zerotrace - Yesterday at 11:15 PM
tillerson trustee The board of trustees includes many former senior government officials including Henry Kissinger, Zbigniew Brzezinski, CSIS to increase its research focus on international economics and issues concerning the North American Free Trade Agreement,
World Trade Organization, the International Monetary Fund, the World Bank
CSIS moved from its K Street headquarters to a new location on Rhode Island Avenue in Washington, D.C
"the Trump Administration should encourage other countries, and the European Union, to
join the United States in imposing sanctions on Venezuelan officials" MacArthur-supported project to develop and promote policy recommendations $600,000
sponsoring organization of the 2001 Dark Winter exercise
smallpox Personnel Homland Security
Conspicuously absent from the CSIS web-site are links of CSIS members to the Council on Foreign Relations. Once the links are added it becomes clear that the CSIS is run by the Council on foreign Relations. CSIS is part of the Council on Foreign Relations propaganda machine, that focuses well planned psycho-political operations at powerful individuals and the masses.
Tons of CFR
Like Council on Foreign Relations member Anne Armstrong*, former U.S. Ambassador to Great Britain; Chairman, CSIS Board of Trustees
rapid rise of third world debt. From 1976 to 1980 developing world debt rose at an average annual rate of 20% Jim Yong Kim 2012–present United States
South Korea (prev.)
Paul Romer 2016–present United States
The International Bank for Reconstruction and Development (IBRD) has 189 member countries, while the International Development Association (IDA) has 173 members. Each member state of IBRD should be also a member of the International Monetary Fund (IMF) and only members of IBRD are allowed to join other institutions within the Bank (such as IDA) Then they go into third worlds creating development that imprisons the country in debt slavery for life
promote world inflation
are a pillar of global apartheid(edited)
, international organizations began to admit that structural adjustment policies were worsening life for the world's poor.
credibility was damaged "when it forced school fees on students in Ghana in exchange for a loan; when it demanded that Tanzania privatise its water system; when it made telecom privatisation a condition of aid for Hurricane Mitch; when it demanded labour 'flexibility' in Sri Lanka in the aftermath of the Asian tsunami; when it pushed for eliminating food subsidies in post-invasion Iraq" country is forced to borrow its money
Forced Labor
World Bank’s investments in Uzbekistan help prop up a system that violates people’s rights — and particularly the rights of people living in poverty.
We have gone from the goldsmith's fraud being reproduced on a national scale through the Bank of England and the Federal Reserve, to a Global level with the IMF and the World Bank. Unless we together stop giving these exchange units their power by our collective faith in them, the future will probably see the Intergalactic Bank and the Federation of Planets Reserve set up in much the same way.
Take goods print paper Over the past decade an estimated 3.4 million people have been displaced by bank-funded projects In 2017 Jason founded the Unity and Security for America organization, a group dedicated to defending "Western Civilization". He currently serves as president.
He showed up at the counter-demonstration with a bullhorn to yell at demonstrators and “incite violence,” according to local police. Kessler assaulted a woman of color, resulting in her being thrown to the ground, and assaulted another woman, according to Charlottesville activist Pam Starsia, and he also walked over to attempt to pull down a banner.
is a contributor to the racist website VDare.com
At June’s Free Speech Rally in D.C., he told the crowd that America would be better off if the South had won the Civil War, and advanced conspiracy theories about Jews controlling Hollywood and the media and promoting “filthy propaganda.” Kessler has attempted to align himself with a violent biker gang for protection. At a recent press conference about the Unite the Right rally, Kessler was flanked by the outlaw 1% biker club the Warlocks for protection. A quick look at the history of the Warlocksreveals a group connected to violent crime, carrying out many of the same acts that Kessler states people of color are genetically predestined to commit
Despite Claiming to Bring Together Different Sections of the Right, Most of the Groups Organizing the Protest Are Part of White Supremacist and Neo-Nazi Groups
Identity Evropa: Formed by ex-Marine Nathan Damigo who after attacking a cab driver, became ‘racialized’ in prison from reading the works of KKK leader David Duke. Once out, Damigo transitioned the neo-Nazi group the Nationalist Youth Front (NYF) into Identity Evropa in order to appeal to a more upper-middle class and college educated demographic, largely borrowing from ‘white identity’ groups in Europe that took the language of identity politics and used it as a way to obscure neo-Nazi ideology. In May of 2017, a neo-Nazi associated with Identity Evropa was outed as a known pedophile. IE members have also been documented giving Nazi salutes at demonstrations and using white supremacist symbols. Damigo has referred to IE as the “SS” of the Alt-Right and claims that they have 450 members operating across the US, primarily based out of colleges. IE’s goal is to transition their members into leaders in positions of authority in order to further their white supremacist goals.
according to the African-American punk band, Negro Terror, in late July IE leader Nathan Damigo threatened to violently turn one of their shows into a “boot party.”
Vanguard America: After accusations of snitching and pedophila destroyed the group American Vanguard, which itself was a split from the “IronMarch” neo-Nazi web forum, Vanguard America (VA) was born. VA is much like Identity Evropa in that it tailors to a younger and internet based Alt-Right audience and spends much of it’s time putting up posters and stickers. However unlike IE, much of VA’s aesthetics borrow more from classical neo-Nazism and make more open reference to it. For instance, it’s website “Blood and Soil” is borrowed from the slogan of the Nazi Party, and their logo shows an eagle carrying the fasces, a weapon most associated with fascism.
banner up at a Holocaust memorial in New Jersey with the slogan, “Heebs Will Not Divide Us,” accompanied by the VA logo. Vanguard America is part of the Nationalist Front, which also includes the Traditionalist Worker Party and the National Socialist Movement, two of the largest neo-Nazi groups in the United States. Traditionalist Worker Party (TWP): The Traditionalist Worker Party (TWP) is one of the largest neo-Nazi groups in the US and grows out of the Traditionalist Youth Network (TYN). Both groups are led by Matthew Heimbach and his father-in-law Matthew Parrott. Unlike many within the Alt-Right, Heimbach wants to make alliances with a wide variety of factions, and also incorporates Leftist and populist themes into his rhetoric. National Socialist Movement (NSM): The National Socialist Movement (NSM) grows out of a series of splits from the American Nazi Party (ANP). The NSM, like the ANP, decided that instead of trying to hide their affinity for Adolf Hitler and Nazism, they instead should embrace https://www.youtube.com/watch?v=DjF5PYGqQ2A&feature=youtu.be Richard Spencer: Richard Spencer is considered the keynote speaker for the event and is perhaps the most well known white supremacist out of the entire lineup. Spencer has advocated for “peaceful ethnic cleansing” and calls for a white ethnostate.
Augustus Invictus: Real name, Austin Gillespie, Invictus describes himself as an “American Fascist,” Invictus has spent the last several years trying to build an Alt-Right pole within the Florida Libertarian Party. He has close links to the neo-Nazi skinhead organizations like the American Front and has spoken in front of a variety of neo-Nazi and Alt-Right groups. In April of this year, Invictus’ former partner filed charges against him for kidnapping, rape, and domestic abuse. When asked by police why she did not come forward sooner, she stated that Augustus had told her that people within the neo-Nazi movement would attack her if she spoke out
Dr. Michael Hill: Ironically, Hill stands out from other speakers as the only person representing the ‘neo-Confederate’ movement, despite the event being held in Virginia. Hill is President of League of the South (LoS) which is also part of the Nationalist Front. A quick look at this writings show that he’s lock-step with the rest of the neo-Nazis also speaking:
“[T]he evil genie of universal ‘human rights,’ once loosed from its bottle, can never be restrained because rights for women, racial and ethnic minorities, homosexuals, pedophiles, etc., can be manufactured easily.”
Pax Dickinson: Formerly of Business Insider, Dickinson was fired after a series of offensive tweets and his connection
https://itsgoingdown.org/wp-content/uploads/2017/08/1a-5.png Jason Kessler: The “local boy,” Kessler who we have discussed prior, is at the head of the rally and tasked with being the conduit between the larger group of neo-Nazis and the City of Charlottesville.
Alt-Right Neo-Nazi Websites Have Made a “Hit List” of Local Public Officials and Police
The notorious neo-Nazi and Alt-Right website The Daily Stormer (post entitled, Unite the Right Free Speech Rally [Basic Overview]), which is also helping to organize the demonstration and send people to Unite the Right, has created a ‘hit list’ of local Charlottesville leaders and police. In true Daily Stormer fashion, the list is filled with racial slurs
Some Neo-Nazis Are Denouncing ‘Unite the Right’ Because – ‘Jews’
Some on the Alt-Right claim that Unite the Right isn’t neo-Nazi enough, because Pax Dickinson, formerly of the crowdfunding site Wesearchr, (Dickinson left after he realized that Charles Johnson is stealing everyone’s money), is working with – you guessed it! Jews!
The Alt-Right aren’t victims – they are growing and benefiting from the Trump administration and the police giving them free reign to organize and build. They aren’t interested in free speech and having dialog, they want to provoke and attack anyone that stands in their way.
has called for "1,000 clergy and faith leaders to join" the counter-protest, and Cornel West has said he will attend.
silence is consent ZeroForgetting - Last Saturday at 6:02 PM
Kessler reportedly praised racist groups and a Holocaust denier
Police also arrested 33-year-old right-wing blogger Jason Kessler, who in turn did not obey officer commands to leave the area and to stop using a bull horn to incite others, according to police. Kessler remains out on bond and didn’t have any comment for CBS19 Wednesday afternoon, however a member of SURJ, Showing Up for Racial Justice, attended Sunday’s rally and had plenty to say.
Pam Starsia, an active member of SURJ, says she was standing right next to Kessler in Lee Park on Sunday. She alleges that Kessler assaulted a woman of color, who was violently thrown to the ground in full view of Charlottesville Police, and another white woman.
1013 Altavista Ave Apt B
Charlottesville, VA 22902
JAN 2009 - AUG 2017
Email
bigshow45@aol.com
weluvmo@aol.com
Age 33
Born September, 1983
PREVIOUS ADDRESSES
207 Pineridge Ln
Charlottesville, VA 22911
Show map JAN 2006 - OCT 2012(edited)
Jason Kessler pleaded guilty in Charlottesville Circuit Court on Thursday morning. Kessler raised his right hand and admitted to punching James Taylor, a Charlottesville man, in the face on the Downtown Mall back in January.
he has a legal defense fund https://www.wesearchr.com/bounties/jason-kessler-legal-defense-fund 501c4 http://www.unityandsecurity.org/ UNity and Security for America- big proponent of anti-immigration
Among other things
However even they are against war in Syria- even say Assad is doing the Lord's work
Back Tom Cotton
MIddle name Eric
There are big economic players in Chase, Bank One etc who are deep with the Republican party http://www.nndb.com/people/962/000128578/ http://www.zerohedge.com/news/2017-08-16/why-was-crowd-hire-company-recruiting-25-hour-political-activists-charlotte-last-wee
http://www.zerohedge.com/news/2017-08-14/report-‘unite-right’-organizer-jason-kessler-was-occupy-movement-obama-supporter-8-m http://yournewswire.com/putin-soros-civil-war/ https://www.rt.com/op-edge/372921-soros-eu-democracy-putin-merkel/