Interview on the Rundown Live re NSA, covert ops, Minnesota drug war policy, CONPLAN 3502 US martial law framework & moar

On Monday June 24: Caught up on matters re deep politics & weirdness with the guys on TheRunDownLive - got to cover some good topics including domestic military operations under USNORTHCOM CONPLAN 3502 aka "Civil Disturbance Operations", the DRE drug scandal in Minneapolis, arcana of the covert ops legitimization framework such as Executive Order 12333 thanks to Al Martin. (links below). Once I got the chat stablized it was all good. Nice thumbnail pic too! Give em a subscription for more updates from Out There. A recent episode with Stew Webb describing getting attacked by Lucifer or Baphomet is worth seeing - of course Stew has cigarette in hand! The Rundown Live #45 Dan Feidt of Hongpong.com // See also Baran Hines WTFRLY: The Rundown Live #42 Baran Hines of wtfrly.com.

Also additionally in meta-news, I finally updated the sidebar on hongpong.com and added a bunch of friends and really excellent news projects on there. So look left once more.

The Rundown Live #45 Dan Feidt of Hongpong.com

http://bigpzone.com/live LIVE M-F 8C/9E

Dan - http://hongpong.com

http://publicintelligence.net/the-mil...

http://www.scribd.com/collections/272...

http://www.theatlanticwire.com/global...

http://www.hongpong.com/archives/2010...

http://almartinraw.com - Al Martin the Conspirators Secrets of an Iran Contra Insider

Executive Order 12333 http://www.archives.gov/federal-regis...legalizes privatized covert operations via shell companies



http://fb.com/therundownlive



http://www.facebook.com/wearechangemi...

http://www.twitter.com/bigpzone

http://www.facebook.com/bigpzone



Subscribe to "The Awakening" List here:

http://bit.ly/TheAwakeningOnFB

(2,000+ Truth LIKE Pages)

A polite notification about toxic/lethal food additive azodicarbonamide

I am on a bit of a riff against a common food additive azodicarbonamide. I sent this to a local sandwich maker/distributor that has a pretty good hold on the Minneapolis independent coffee shop sandwich market. I won't name the sandwich company for now. I think I will assume that azodicarbonamide is actually an alien mind control agent ;) Azodicarbonamide is a major element of Chicken McNuggets and other toxic pseudofoods in the United States.

Hi, I like your sandwiches but when I noticed that azodicarbonamide is added as a dough conditioner in some of them I have stopped purchasing them. This particular additive is banned in many countries, it is also lethal at certain levels.

http://www.sciencelab.com/msds.php?msdsId=9922989

Acute oral toxicity (LD50): >6400 mg/kg [Rat]. Acute dermal toxicity (LD50): >500 mg/kg [Rat].

Europe, Australia and Singapore have all banned azodicarbonamide because as the UK puts it "In the UK, the Health and Safety Executive has identified azodicarbonamide as a respiratory sensitizer (a possible cause of asthma) and determined that products should be labeled with "May cause sensitisation by inhalation." http://en.wikipedia.org/wiki/Azodicarbonamide

I understand there are economic reasons to use additives like this, however it is an element that is considered unsafe for food use across much of the world and it would improve the safety & health effects of your sandwiches to quit using it. [...]

Best regards -

Dan Feidt

World Bank whistleblower flags laundering money & impending gold backwardation "whole system come to screeching halt"

Another interesting whistleblower item. Very quick post. Karen Hudes from World Bank notes major crises including something related to the major disruption of gold markets. I suspect this is the COMEX paper gold situation.... This is a pretty big deal. Starts around 6 minutes. Also covers Brazil. Google around for "COMEX" and "backwardation", allocated vs registered gold etc. ie. Why Is Gold Draining Out of COMEX Warehouses? | Keith Weiner | FINANCIAL SENSE && Risk of continuing gold backwardation.

EPISODE BREAKDOWN: On this episode of Breaking the Set, Abby Martin talks to BTS producer, Ameera David, about the mounting death toll stemming from increased violence in Iraq, as well as the rules the NSA is using to spy on Americans. Abby then talks to Karen Hudes, former senior executive at the World Bank, about her experience blowing the whistle on the high level corruption within the international financial system and how her story was censored. Abby then breaks down the grievances behind the Brazilian protests that have resulted in over one million people taking to the streets in over 100 cities. BTS wraps up the show with an interview with Michelle Cornette, Subject Matter Expert: Military Suicide at the Center for Deployment Psychology, about the factors contributing to the drastic rise of military suicides.

Sprawling interview w wtfrly.com on activist news, next week on The Rundown Live

Alright here's a link if you want to check out. Super long like 2.3hr interview with WTFRLY.com editor Baran Hines covering lots of stuff on police state materials, local goings on including DRE.

Had a mention of the shady MnSCU shutdown of organic agriculture training, Turkey, Brazil, activist media organizing you name it. I have been trying to help out WTFRLY now and then, there is no shortage of stuff getting put through there including some fun deep research items.

Also talked about Syria, middle eastern scenario, name dropped Graham Fuller, a key CIA figure apparently involved in 9-11 and close to the Chechen family accused of running the recent attacks in Boston. [Sibel Edmonds named Fuller in her rogue's gallery of 9-11 people as well]

Includes also a little bit at the end about the Integral Community Exchange System for alternative time banking and barter that I have been working on cleanup / Drupal basics this summer in my spare time.

On Monday I am scheduled to do an interview with The RunDownLive with Mike P - sort of We Are Change Milwaukee, therundownlive.com , bigpzone.com, twitter.com/bigpzone. There was funny stuff with Stew Webb on here earlier.

Also the Drug Recognition Evaluator program lawsuit is going to federal court in July. Get info on it at http://nathanmhansen.blogspot.com from my friend Nathan Hansen who is pursuing the case. [disclosure: I did a bit of design work for Hansen in years past. Not very much but worth noting.]

Anyway nothing too grand but I figure it's good to do some casual long form interviews about some deep subjects for a change.

BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

The disgusting world of nuclear power: Pandora's Promise

There is some movie called Pandora's Promise which is more-or-less nuclear industry cheerleading in town with a full blown event going on. People will be nibbling on delicious cesium tainted tea leaves straight from Fukushima Prefecture I would assume. [ https://twitter.com/PandorasPromise ]

Someone posted, Come to the Republic in Calhoun Square to meet, eat, and discuss the film after the 4:50pm showing on Fathers' Day, June 16. http://www.republicmn.com/ And some UN panel said that everything is fine, the accident is over, no real risk of disease or doom from this thing. etc. See: http://www.unis.unvienna.org/unis/en/pressrels/2013/unisinf475.html

Okay let's check out whats the latest in the happy world of Nuclear News. This whole UN report is based on a false premise: Unlike Chernobyl which popped, burned and was contained relatively quickly, Fukushima is not even done leaking yet, and radiation has turned up in fish, fallout across Pacific Northwest. etc.

See ENEnews.com for US, world & Japanese energy & contamination news: http://enenews.com/

http://enenews.com/japanese-diplomat-we-are-facing-global-catastrophe-ov...

Akio Matsumura, Diplomat: "Let me clarify. We are facing global disaster — catastrophe — occurring. From that perspective, over 40 years, 50 years, or maybe 100 years. We cannot escape from this fact. …. This radioactive material, or contaminated water, any cases, reach out to your west coast as well. If you are counting on Japan, I can assure you now they do not take serious action."

"Pandora's Promise: "actually an infomercial… the film is dishonest to its core" http://enenews.com/cnns-nuclear-propaganda-film-is-dishonest-to-its-core...

See Fukushima Diary for tons of high frequency detailed, sourced local info: http://fukushima-diary.com/

Let's see how their nationwide nightmare goes in last few DAYS:

Most recently http://fukushima-diary.com/2013/06/260-bqm3-of-sr-90-measured-in-30m-nor... 260 Bq/m3 of Sr-90 measured in 30m north of reactor5, 6 discharge channel and the UN panel fails to mention Strontium at all.

http://fukushima-diary.com/2013/06/average-tumor-size-of-fukushima-child...

12 Fukushima children diagnosed to have thyroid cancer, 15 more suspected to have cancer, “300% up since February” [URL]

According to Fukushima prefectural government, the average tumor size was bigger by 28% in 2012 than 2011.

In 2011, 12 malignant or possibly malignant cases were found (One of them turned out to be benign nodule from surgery.). The average diameter of the tumor was approximately 14.1 mm.

In 2012, 16 malignant or possibly malignant cases were found. The average diameter of the tumor was approximately 18.1 mm, which is bigger than 2011 by 28%.

27,000 Bq/Kg from the soil in front of the swings for children of Fukushima city. Atmospheric dose : 1.17 μSv/h (1m above the ground), 2.35 μSv/h (on the ground) http://fukushima-diary.com/2013/06/27000-bqkg-from-the-soil-in-front-of-...

PLUTONIUM one of the world's most carcinogenic substances : 0.0084 Bq/m3 of Pu-239/240 measured from 15km offshore Fukushima plant,

http://fukushima-diary.com/2013/06/0-0084-bqm3-of-pu-239240-measured-fro...

54 Bq/Kg of Cs-134/137 measured from Shiitake mushroom in Osaka http://fukushima-diary.com/2013/06/54-bqkg-of-cs-134137-measured-from-sh...

Radiation level spiked from 57.1 μSv/h to 90 μSv/h within 3 months in an elementary school of Fukushima city

http://fukushima-diary.com/2013/06/radiation-level-spiked-from-57-1-%CE%...

222,495 Bq/Kg from street gutter mud of public hall in Fukushima city, 66km from Fukushima nuclear plant http://fukushima-diary.com/2013/06/222495-bqkg-from-street-gutter-mud-of...

40,000 Bq/Kg from farm soil in Fukushima city http://fukushima-diary.com/2013/06/40000-bqkg-from-farm-soil-in-fukushim...

Radiation level increasing in leakage detector hole of “nearly empty” reservoir No.1

http://fukushima-diary.com/2013/06/radiation-level-increasing-in-leakage...

Xe-133/135 detected from gas sample of reactor1,2,3, amount not announced, Tepco “Spontaneous fission” Xenon another element leaking actively NOW http://fukushima-diary.com/2013/06/xe-133135-detected-from-gas-sample-of...

Medical expert, “Thyroid cancer rate in Fukushima is obviously too high, related to the distance from the plant”

http://fukushima-diary.com/2013/06/medical-expert-thyroid-cancer-rate-in...

http://fukushima-diary.com/2013/06/radioactive-density-in-seawater-spike...

Radioactive density in seawater spiked 20 times much after opening the silt fence for only 40 mins

Cs-137 jumped up to be 42,000 Bq/m3 and Cs-134 spiked up to be 20,000 Bq/m3.

Radioactive Silver! Ag-110m detected from gas sample of reactor1 and 3,

http://fukushima-diary.com/2013/06/ag-110m-detected-from-gas-sample-of-r...

Flowchart showing all these various radioactive water pools spilling all over the place: Tepco still transferring contaminated water to the spare tank even after the leakage of 6/5/2013 http://fukushima-diary.com/2013/06/tepco-still-transferring-contaminated...

102.5 Bq/Kg of Cs-134/137 from Sayama green tea leaves for sale http://fukushima-diary.com/2013/06/102-5-bqkg-of-cs-134137-from-sayama-g...

shadiness: English version of Fukushima plant survey map shows atmospheric dose lower than Japanese version by 90% http://fukushima-diary.com/2013/06/english-version-of-fukushima-plant-su...

18,756 Bq/kg of Cs-134/137 measured from the mud in street gutter in Setagaya Tokyo http://fukushima-diary.com/2013/06/18756-bqkg-of-cs-134137-measured-from...

[Survey] 20% of over 18y.o in Fukushima feel unhealthy or very unhealthy in 2012 http://fukushima-diary.com/2013/06/survey-20-of-over-18y-o-in-fukushima-...

Spare tank for leaking reservoirs started leaking too, Tepco didn’t weld it http://fukushima-diary.com/2013/06/spare-tank-for-leaking-reservoirs-sta... 400 tones of ground water flow into the plant on the daily basis. In order to manage the shortage of contaminated water storage, they built 7 reservoirs. However, 3 of them leaked highly contaminated water.

These are merely some headlines going back to June 5th. This monster is still oozing all over the place and contaminating tons of food and water.

////

Overall we need to quit building fission related technology, it is a mess on many levels, particularly if any of them are hit by disasters like tsunamis, earthquakes, tornadoes, hurricanes etc.

Probably a release of energy technology from the military industrial complex, along with winding down energy consumption as much as possible, [aka downshifting civilization before it implodes] would be a good place to start looking at this.

Careers at Booz Allen Hamilton: Honolulu Junior Systems Administrator

There appears to be a vacancy at Booz Allen Hamilton's work site in Hawaii (the NSA.gov site also has lots of jerbs at Honolulu).

Glenn Greenwald Destroys MSNBC's Attempted Propaganda - YouTube

So the word on the street is that this job has root logins to both the email server AND the web server. Apache Hadoop is a party to all this mess somehow.

Honolulu Systems Administrator, Junior Job - HI, 96801

http://careers.boozallen.com/job/Honolulu-Systems-Administrator%2C-Junior-Job-HI-96801/2653617/

Systems Administrator, Junior Job

Apply now »

Date: Jun 10, 2013

Location: Honolulu, HI, US

Systems Administrator, Junior-01134820

Description

Key Role:

Support current information security technology disciplines and practices to ensure the confidentiality, integrity, and availability of corporate information assets in accordance with established standards and procedures. Conduct daily operations of Windows based environment on unclassified systems and document configuration changes to systems and networks. Execute system administration and desktop support projects, including desktop troubleshooting, network switchport troubleshooting, and peripheral support. Analyze, interpret, and recommend solutions for system shortfalls, discrepancies, or improvements in technologies and access requirements and work closely with team members concerning changes to network security measures and protocols. Install PC hardware and software for end-users, work with end-users to develop an understanding of the needs and uses of their PC's, including hardware, software, and printers, and analyze and diagnose problems reported by end-users. Track and update all problem calls through corporate tracking systems and assist in the evaluation of new computer hardware and software. Update workstations with latest software and patches, design engineering solutions to meet client needs, troubleshoot performance problems, maintain baseline images for desktops, and perform system backup and recovery measures. This position is located in Honolulu, HI.

Qualifications

Basic Qualifications:

-3+ years of experience with system administration

-Experience in a Windows 2008 R2 or Windows 7 environment

-Experience with Windows Deployment Services or other relevant imaging technology

-Experience with DNS administration and troubleshooting

-Experience with vSphere virtual environment, including virtual servers, virtual switching, and management

-Knowledge of AD and GPO’s at an advanced proficiency level

-Secret clearance required

Additional Qualifications:

-Knowledge of DoD Secure System Configuration tools and methods, including STIG’s, VMS, and Gold Disk to scan and remediate systems to maintain compliancy

-AA or AS degree in CS preferred

-DoD 8570.2 IAT Level 2 or 3 Certification preferred

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required.

Integrating the full range of consulting capabilities, Booz Allen is the one firm that helps clients solve their toughest problems, working by their side to help them achieve their missions. Booz Allen is committed to delivering results that endure.

We are proud of our diverse environment, EOE, M/F/D/V.

Job: Information Technology

Primary Location: United States-Hawaii-Honolulu

Travel: Yes, 50 % of the Time

Nearest Major Market: Honolulu

Nearest Secondary Market: Hawaii

Job Segments: System Administrator, Consulting, Engineer, Secret Clearance, Security Clearance, Technology, Engineering, Government

Adrian Lamo testimony at Bradley Manning trial

This is worth posting as it is a pivotal section of the case. I can appreciate that Lamo candidly points out Manning did *not* want to funnel this information to foreign powers, which is important to the case. Ugh snitches… Lamo is @6 on Twitter.

Locally there is a rally downtown on Thursday June 6th. Check it out!

UPDATE: Moar Transcripts: https://pressfreedomfoundation.org/bradley-manning-transcripts

MOAR: Bradley Manning Support Network. Follow . Latest today from the Truck: "The CFAA charges are being disproven rapidly."

Art here from Clark :

BL7WoYMCYAEseGE.jpeg

via Jenna:

DAVID COOMBS: He told you he was an intelligence analyst?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said to you, he thought he would reach out to somebody like you who would possibly understand?

ADRIAN LAMO: Yes.

DAVID COOMBS: During this initial chat conversation he told

you about his life and his upbringing?

ADRIAN LAMO: In some amount of detail, yes.

DAVID COOMBS: He told you that he was being challenged due to a gender identity issue?

ADRIAN LAMO: Yes.

DAVID COOMBS: He also told you that he had been questioning his gender for years, but started to come to terms with that with his gender during the deployment?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you he believed he had made a huge mess?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: And he confessed that he was emotionally fractured?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said he was talking to you as somebody that needed moral and emotional support?

ADRIAN LAMO: Yes.

DAVID COOMBS: At this point he said he was trying not to end up killing himself?

ADRIAN LAMO: That is also correct.

DAVID COOMBS: He told you that he was feeling desperate and

isolated?

ADRIAN LAMO: Yes.

DAVID COOMBS: He described himself as a broken sole?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He said his life was falling apart and he didn't have anyone to talk to?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: And he said he was honestly scared?

ADRIAN LAMO: He also said that.

DAVID COOMBS: He told you that he had no one he could trust?

ADRIAN LAMO: Correct.

DAVID COOMBS: And he told you he needed a lot of help?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He ended up apologizing to you on several occasions for pouring out his heart to you since you were total strangers?

ADRIAN LAMO: Correct.

DAVID COOMBS: Now at one point he asked you if you had access to classified networks and so on, incredible things, awful things, things that belonged to the public domain, not on some servers dark room in Washington, D.C. What would you do? Do you recall him asking you that question?

ADRIAN LAMO: Yes, I did.

DAVID COOMBS: He told you he thought that the information that he had would have impact on entire world?

ADRIAN LAMO: That is also correct.

DAVID COOMBS: He said the information would disclose casualty figures in Iraq?

ADRIAN LAMO: Yes.

DAVID COOMBS: He believed the State Department, First World Countries exploited the Third World Countries?

ADRIAN LAMO: He made that representation, yes.

DAVID COOMBS: And he told you that the cables detailed what was criminal political fact dealings?

ADRIAN LAMO: Yes.

DAVID COOMBS: He believed that everywhere there was a U.S. post there was a diplomatic scandal?

ADRIAN LAMO: That he did.

DAVID COOMBS: He told you that he believed it was important that the information got out?

ADRIAN LAMO: Correct.

DAVID COOMBS: He thought that if the information got out, it might actually change something?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you he did not believe in good guys versus bad guys anymore?

ADRIAN LAMO: Yes.

DAVID COOMBS: He only believed in a plethora of states acting in self-interest?

ADRIAN LAMO: Correct.

DAVID COOMBS: He told you he thought he was maybe too idealistic?

ADRIAN LAMO: Correct.

DAVID COOMBS: He told you that he was always a type of person that tried to investigate to find out the truth?

ADRIAN LAMO: Something I could appreciate, yes.

DAVID COOMBS: And based upon what he saw, he told you he could not let information just stay inside?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said he could not separate himself from others?

ADRIAN LAMO: Correct.

DAVID COOMBS: He felt connected to everybody?

ADRIAN LAMO: Yes.

DAVID COOMBS: Even told you it felt like we were all distant family?

ADRIAN LAMO: Engagement.

DAVID COOMBS: And he said he cared?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he thought he would keep track -- keep track of people that his job impacted?

ADRIAN LAMO: Correct.

DAVID COOMBS: And he wanted to make sure that everybody was okay?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that the way he separated himself from other analysts was, he cared about people?

ADRIAN LAMO: He said that, yes.

DAVID COOMBS: PFC Manning told you he followed humanist values?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He said he had dogs tags saying "humanist" on it?

ADRIAN LAMO: Yes.

DAVID COOMBS: Do you know what it means to be a humanist?

ADRIAN LAMO: From my understanding the importance of human life and human beings and has a structure of morality.

DAVID COOMBS: PFC Manning told you that at the time he was feeling (inaudible) and no one seemed to see that or care?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he was bothered that nobody seemed to care?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He said he thought apathy was far worse than active participation?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he preferred the truth (Inaudible)?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He also told you that he was maybe too traumatized to really care about the consequences to him?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he wasn't brave. He was weak?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said he was not so much scared of getting caught and facing consequences as he was of being misunderstood?

ADRIAN LAMO: Yes.

DAVID COOMBS: At one point you asked him what his end game was, correct?

ADRIAN LAMO: Yes, I did.

DAVID COOMBS: And he told you, hopefully worldwide discussions, debates and reforms?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He told you that the reaction to the (Inaudible)?

ADRIAN LAMO: Yes.

DAVID COOMBS: And he said he wanted people to see the truth?

ADRIAN LAMO: Correct.

DAVID COOMBS: He said without information you can't make informed decision as a whole?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: And he told you to, he was hoping that people would actually change if they saw the information?

ADRIAN LAMO: Correct.

DAVID COOMBS: He also told you that he recognized that he may be just young, naive and stupid?

ADRIAN LAMO: Yes.

DAVID COOMBS: And at one point you asked him why he didn't just sell the information to Russia or China?

ADRIAN LAMO: Correct.

DAVID COOMBS: And he told you that the information belonged in the public domain?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He believed that information was in the public domain and should be for the public good?

ADRIAN LAMO: Yes.

DAVID COOMBS: You asked him how long he had been helping out WikiLeaks at one point?

ADRIAN LAMO: Yes, I did.

DAVID COOMBS: He told you that he essentially had been --

THE COURT: Sustained. Hearsay.

MR. COOMBS: Very well, Your Honor.

BY MR. COOMBS:

DAVID COOMBS: At one point he told you that his belief or his feelings were that he wanted to eventually go into politics?

ADRIAN LAMO: Yes.

DAVID COOMBS: And at the time he was thinking that humanity could accomplish a lot, if smart people with ideas cooperated with each other?

ADRIAN LAMO: Correct.

DAVID COOMBS: At anytime did he say he had no loyalty to America?

ADRIAN LAMO: Not in those words, no.

DAVID COOMBS: At anytime did he say the American flag didn't mean anything to him?

ADRIAN LAMO: No.

DAVID COOMBS: At anytime did he say he wanted to help the enemy?

ADRIAN LAMO: Not in those words, no.

Drupal 8 & Drupalcon 2013, Open Source content management grabs brass ring; Weather.com, e-commerce linkdump & much moar

drupalcon_pdx_icon_2.png

So North America's Drupalcon 2013 is happening in Portland this week - a lot of people are bringing the A-Game. I got out to the 2011 & 2012 Drupalcons in Chicago & Denver, but can't this year.

Regardless here are a bunch of links I quickly slammed together about what's cropping up in the Drupal world nowadays. Roughly formatted for my own note-keeping, this may make very little sense to non-techies.

WTF IS Drupal? [drupal.org] It's an open source [Linux style GPL license] Content Management System (CMS) & framework, which can be used to build many different types of websites, including e-commerce & social networks. See INTRO to: Introduction to drupal slideshow, excellent.

I've mostly been working as a Drupal developer or done jobs involving Drupal site building work since 2007. Contact me hongpong AT hongpong.com re Drupal stuff if interested.

Drupal 8 is being developed in the community with a number of different major initiatives - as critical bugs get closed out and various ambitious plans, APIs etc shakes out. It will take a while to get sorted out, but brings really major, and indeed overdue, end user and site building enhancements, along with major simplification of the often crufty code inside Drupal's core module set.

Probably a great headliner, Weather.com has committed bigtime, making this the highest-traffic Drupal site to date.Weather.com Moving to Drupal | Acquia. Well done people - 100,000,000 unique visitors/month is the win! Also: Twitter Blog Running on Drupal not WordPress | LevelTen. And the Louvre!

Drupal community: Many of the following links are from the main commercial sites of major Drupal consultancies like Acquia. In some ways the Drupal community consists of consultancies, academics as well as people not engaged with Drupal commercially.

Overall the major organizing principle involves mutually providing very sophisticated free software to build up a large digital commons - while running businesses around designing, maintaining & developing that software. Some issues like "module X is pushed by consultant Y, module Z by group A," can bubble up, but this interesting balance of cooperation and competition results in plenty of free code for any takers, as well as increasingly spiffy SaaS (software as a service) vendors.

Evolution of Drupal governance: See Creating a structure for Drupal governance and Community Working Group.

The raising of skrillos for core: Funding Drupal Core Development | Lullabot

///////

In the Web Scene: There are many competitors & rivals in the CMS world and beyond. Drupal is Among the Big Boys in Open Source Communities | Forum One. And the general market: The 2013 Future of Open Source Survey Results. Reg reqd: Is It Time To Consider Open Source WCM For Digital Experience? | Acquia.

Here Google Trends shows Wordpress buzzing bigtime, and the decline of Joomla. Google Trends - Web Search Interest: drupal, wordpress, joomla - Worldwide, 2004 - present. Also the world map of interest in Drupal shows a pretty slid geography, with India, Africa, South America etc interested. See localize.drupal.org for crowd sourced translation services. See also Propeople | Spreading the magic of Drupal in Latin America. well attended!

Wordpress is complementary to Drupal in a lot of ways - used for blogging, open source and PHP based, with a really impressive market share and reach. Lol this and followed by The epic failure of "The RedHut of Drupal" :) and april foolz.

Publishing on interwebs: getting pretty good these days. webinar viewable w free login: Drupal for Publishers: How to Build a Better Newsroom CMS [May 14, 2013] | Acquia.

///////

All over the Government: Drupal is now a major accepted website development option for both the US federal & assorted international, regional, local governments. Drupal Gov Days 2013 | drupal4gov August 14-15 8:30am-5pm at NIH Campus, Natcher Auditorium.

Drupal for the European Commission: BoFSession at DrupalCon Portland 2013 | Pronovix interesting stuff.

Digital Agenda for Europe - European Commission powered by Drupal. Lol how can this be copyrighted [see footer]? Ohh EU :/

Georgia Peaches: Georgia.gov | drupal.org developed by Phase2, Mediacurrent, Acquia, and the OpenPublic Drupal distribution. Very detailed infos including the use of the Features module across many state government agencies! Good list of modules here. Georgia Technology Authority: Leading the way for Drupal in State Government | Phase2. 52 agencies? Damn skippy!

////////

D8 Core projects: See this all here.Drupal 8 Updates and How to Help | drupal.org. Also: Reducing risk in the Drupal 8 release schedule | Dries and Want more features in Drupal 8? Help fix bugs! | Dries. On May 16, "Currently, we have 27 critical bugs, 41 critical tasks, 155 major bugs, and 149 major tasks. ". Usually at Drupalcon a lot of major design issues get hashed out. There are also sprints ie: Participate in a Global Drupal Sprint this weekend. Dated but relevant: Updated Drupal 8 release schedule | Dries

Entity API & now Entity Reference in D8 core: a big deal for Drupal Commerce as well, with Entity Reference now in Drupal 8 core. It's a toolkit using pointers between nodes and entities - like "X is a member of Y" relationships.

Also you can use Entity API & Entity Reference to build fancy data dashboards. This is super cool: Using Drupal 7 Entity Reference to help Create User Dashboards | LevelTen | Dallas, TX. and How to Create Single-Page Apps With Drupal | Acquia. and If you aren't using Entity API to create nodes, you are doing it wrong | LevelTen // Working with Entities in Drupal 7 Series

E-Commerce: A Lot needs to be said. This is indeed probably going to turn into New Hotness with major market demand as people dump crumby old shopping carts and un-integrated forum software, Drupal offers a far better all around suite without licensing fees. See Sponsored blog post: Where should Drupal professionals focus for the next phase of growth? | Drupal Association

Part of the theory is here: Customer Experience: Where Content, Commerce & Community Collide

Drupal Commerce 2.x Roadmap Posted | Drupal Commerce - very successful and going to become more so. Drupal Commerce uses the Rules module for business logic - meaning you don't need to be a coder to make different commercial processes or functions happen. Drupal Commerce 2.x Roadmap | Drupal Commerce

Social Media stuff: Because a lot of modules bring third party services to bear, social media Drupal integration is a well coded & supported area. Socialize your Drupal site in 5 Easy Steps | LevelTen.

One popular module: Social media | drupal.org and Widgets | drupal.org

Social media presence On The Web | drupal.org

Distributions: Much like with Linux you can get different Drupal distributions for different purposes - auto-configured upon installation with different themes, workflows, etc than generic Drupal. Open Enterprise | drupal.org uses a new Apps style approach for various website features.

/////////

MISCELLANEOUS: Sandbox projects are not officially approved by the Drupal community in any sense, though you can obtain them via drupal.org. There are some very cool ideas lurking in sandboxes.

jcarballo's sandbox: Diffbot | drupal.org. Scan the news. 3rd party integration

Drupal 8, aural interfaces and groundbreaking accessibility at Drupalcon Portland | Rootwork | Nonprofit Technology. Excellent news here.

Twig - a kind of dynamic theme markup technique - may not make it into D8 - I'm unclear about the topic. But anyway follow up here: pixelmord's sandbox: Drupal 8 Twig Sandbox | drupal.org. Improving all HTML markup, also re TWIG: [meta] Creating Dream Markup [#1980004] | Drupal

General performance testing: Round 5 results - TechEmpower Framework Benchmarks. Symfony2 not so hot. hmmm

D8 Translation big now. A bug thread involving Russian for example - getting more non-English into core: Use new Transliteration functionality in core for machine names [#1842718] | Drupal. Also RTL fixed for one theme! another bit.

Meet the Larks at DrupalCon Portland | Exaltation of Larks

Tumblr, hell we can make our own microblogz dangit. One BILLION Dollaz phaw...Hell No, Tumblr Users Won’t Go To Yahoo! | TechCrunch

Breaking up the Monolithic Drupal Site with a Subdomain Multisite | LevelTen | Dallas, TX - very interesting, we will see what they do about single sign on. Perhaps LDAP? Lightweight Directory Access Protocol (LDAP) | drupal.org

internal to community is the bug threads. let's polish: Drupal.org D7 - improving issue pages | Drupal Association

Looks fantastic for subscription based anything: Easily integrate subscription billing on your Drupal site with Recurly

Perfect infographic does show why Pantheon is attractive - far fewer hosting and Linux tuning hassles which indeed often divert focus: Pantheon-Drupal-Developers-Road-to-Server-Hell-Infographic.jpg (1000×3946)

WSCCI is one of the D8 core initiatives. [META] WSCCI Home Stretch [#1983534] | Drupal. The new config system and javascript ie. JavaScript settings moved from Drupal.settings to global drupalSettings variable | drupal.org. . Integrate config schema with locale, so shipped configuration is translated [#1905152] | Drupal

Coherency in UI evolution: [meta] New visual style for Seven [#1986434] | Drupal and Proposal: A Style Guide for Seven | Drupal Groups

For developers: drupal_array_merge_deep | Drupal every day recursive merge. good site too. HOOKS people: How to invoke a new hook in a Drupal module | BeFused. Project mgmt: Planning Your Drupal Site | Mediacurrent Blog Post

SPARK for UI: Spark | drupal.org This has helped field test new D8 UI fixes and polishes. Webinar Wrap Up: Drupal 8 and Spark Simplify Responsive Design | Drupal Association. Drupal Association Webinar: Drupal 8 and Spark Simplify Responsive Design, Mobile | Acquia

MAPS. ARCgis for MapFreaks: energee's sandbox: ArcGIS | drupal.org. there is tons of other map stuff including OpenLayers and Mapbox.com as well worth looking at.

Creating Passionate Users: Attenuation and the suck threshold - saying that Pantheon helps: Drupalista Kelly Bell Shares the New Way of Developing on Drupal | Pantheon

it takes a half dozen people or moar to cover webchick's workload for maternity leave! Heads up: Maternity leave starting next week | webchick.net. Learn MOAR: "My job is to make Drupal awesome": meet Angie Byron - part 1 | Acquia. Very informative.

Looking for a Few New Site Builders | Drupal Association

Helper | drupal.org handy utilities from Dave Reid including a mail logger!

Menu Link Bundles. Confusing? Perhaps but gabor has a chart: Introduce menu link bundles per menus [#1966298] | Drupal

Typical local sprint: Village of Oak Park DUG Community Cultivation Grant report for the DA | Drupal Association

What is up with Fields: New Field Bases and Instances in Features | Phase2. This appears to be a big deal for Features building hmmm..

GIT. Learn your git. this is key. A recipe for a sane git process in Drupal's patch based workflow | PreviousNext. One branch per issue champs!

My Review of Frontend United 2013 | Darren Mothersele - brit conference.

Online event registration setup: Event Registration Site with Panopoly, Drupal Commerce Registration and Stripe: A Drupal, Awesome-sause Mashup. Spinoff. http://myeventsite.co/

////////

REST and Data plumbing; To Guzzle data: now in D8 core: Propeople | Introduction to Service Guzzle module. They're trying to integrate much more than just serving up webpages in the conventional sense. So how do you run iPhone, Android apps etc?

REST and other technologies break down yr internets data into smaller, more dynamic chunks than basically the old "load an HTML page" experience. Ensuring a certain basic level of REST design is a major part of D8. Guzzle is in D8. This is an outgrowth of the powerful Services module - for example see Propeople on Services.

Also LOL WebVisions 2013: Putting the Web in constant motion - WOOSHY STUFF!

////////

Theming: Looks nice. Aurora | drupal.org anyone tried it? Aurora 3.0 - Magic Birds and Boars | Snug.ug

And Best Drupal 7 Responsive Themes and 10 Free Drupal Themes for 7.x

7 modules to help with your Drupal responsive design | Web Omelette. Includes IOS Retina stuff.

More acquia snippets: The Three C’s of Modern Web Site Management | Acquia & Best Practice Checklist for Building a Drupal Website | Acquia // White paper: Resource Guide: Developing for Mobile on Drupal | Acquia. Controlling Your Site Layout Using The Mobile-First Omega Theme | Acquia

Clutch for forms with AJAX: unwieldy Drupal forms are an issue. could be win here? Yet another method to simplify making multipage/multistep Drupal forms | Sina Salek Official Site and Field Group Ajaxified Multipage | drupal.org

LOL unrelated: "I Contribute to the Windows Kernel. We Are Slower Than Other Operating Systems. Here Is Why." - Zorinaq

Anyway I will leave this linkdump there for now - hopefully this points to a few helpful areas.

Make Great Hack Cartel: CyberWar Afloat!! DIB to 2511 Wiretap All Da Networks! SAIC signs deal with Homeland Security, to get Feds' classified hoarded zero-day exploits

"10 providers serve 80 percent of the market. We have classified relationships with a good number of them." -- US Rep Mike Rogers, reminding us how the government creates cartel structures [source Reuters]

One of the more interesting news elements concerns how the federal goverment is going to hand out teh very tastiest candy to contractors - specifically SAIC it now appears - in the form of classified undisclosed hacker attack goodies.

Interestingly AT&T would get get very very important info about vulnerabilities on Apple and other major corporate rivals, providing them with a colossal competitive edge in the so-called "marketplace".

Basically you have the introduction of a cartel system for hacking, reminiscent perhaps of the cartel system for distributing drugs so profitably for the powers-that-be. And of course Homeland Security in the middle, the keystone.

The government/contractor class is entering a more demented, less sound phase of the information age by hoarding important software bugs instead of getting them fixed.

Foreign spooks will surely get their hands on tons of hacks and way more systems will end up getting seriously assaulted. Putting up large cash bounties for responsible disclosure (i.e. telling people who can issue security patches to the public, then telling the public) is almost certainly a better way to approach the problem.

This current policy direction will probably cause far more havoc on the Internet than it will prevent, shocking an outcome as that may be.

Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

[...] Sec. 2. Critical Infrastructure. As used in this order, the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.[......]

Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the "Secretary"), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.

(b) The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates the reports produced pursuant to section 4(a) of this order to the targeted entity. Such process shall also, consistent with the need to protect national security information, include the dissemination of classified reports to critical infrastructure entities authorized to receive them. The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a system for tracking the production, dissemination, and disposition of these reports.

(c) To assist the owners and operators of critical infrastructure in protecting their systems from unauthorized access, exploitation, or harm, the Secretary, consistent with 6 U.S.C. 143 and in collaboration with the Secretary of Defense, shall, within 120 days of the date of this order, establish procedures to expand the Enhanced Cybersecurity Services program to all critical infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and technical information from the Government to eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.

(d) The Secretary, as the Executive Agent for the Classified National Security Information Program created under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities), shall expedite the processing of security clearances to appropriate personnel employed by critical infrastructure owners and operators, prioritizing the critical infrastructure identified in section 9 of this order.

/////

So "critical infrastructure" includes plenty of big corporate interests and anything that would affect their economic well-being is a threat. As always, regulations which make institutions more permanent, as opposition to the "critical" elements of society becomes blended with "terrorism".

U.S. gives big, secret push to Internet surveillance | Politics and Law - CNET News - April 24, Declan McCullaugh (who probably doesn't talk to sources on the f&!!ing telephone that much these days)

Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws.

The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12.

Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.

The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books.

The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department.

In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.

//////

So you have a pilot program that covered the "Defense Industrial Base" or DIB. The security measures used to keep tabs on contractor computers are now rolled out across the interwebs. More on DIB below.

But military-style wiretapping America with fancy 2511 loopholes isn't enough! Let's hand out hacks too! Not surprisingly the NSA's main digital plumbing people, specifically SAIC, are jumping aboard the classified Goodie Gravy train.

//////

SAIC, Inc. : SAIC Signs Agreement With Department of Homeland Security To Be A Commercial Service Provider

05/15/2013| 04:10pm US/Eastern

MCLEAN, Va., May 15, 2013 /PRNewswire/ -- Science Applications International Corporation (SAIC) (NYSE: SAI) signed a Memorandum of Agreement (MOA) with the Department of Homeland Security (DHS) Enhanced Cybersecurity Services (ECS) program to become a Commercial Service Provider (CSP) of approved ECS services that will strengthen protection of U.S. critical infrastructure against imminent cyber attacks. In accordance with the MOA, SAIC is developing the capability and security certifications to utilize threat indicators for securing critical infrastructure customers against cyber threats.

Securing the Future is a guiding mission for SAIC. For decades, SAIC professionals have served the U.S. government and corporate America with expertise and technology to better protect our citizens, our military and our networks. SAIC is currently collaborating with community leaders and building key technologies and architectures that enable trusted sharing of threat information in real-time to protect against both the known and unknown threat landscape.

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS develops indicators based on this information and shares them with qualified CSPs, thus enabling them to better protect their customers who are critical infrastructure entities.

Key Quotes:

John Thomas, National Security Sector Acting President
"We must work together to protect our infrastructure, our economy, and our security from cyber attacks. If we don't work together, we won't succeed. This is why SAIC is proud to be a part of this endeavor to share valuable threat information between government and critical infrastructure providers."

Julie Taylor, Cybersecurity Operation Manager for National Security Services
"This collaboration between SAIC and DHS puts in place a new approach to threat sharing across public and private sectors that offers a positive shift in the threat landscape. Each step we take to cultivate our cyber ecosystem with trusted information sharing relationships will have a direct return on stabilizing our national security and our economy. Now that the doors of communication are open, we can further the cyber mission with valuable action as a team. "

David Lacquement, Cybersecurity Program Director
"As a former government executive in cyber threat management, I have seen firsthand the immense value that threat information sharing at network speed can offer to sustaining trusted channels for online transactions and communications. This public-private collaboration is strategically vital to significantly raising the level of cyber awareness, vigilance, and protection across our nation's critical infrastructure."

About SAIC
SAIC is a FORTUNE 500(®) scientific, engineering, and technology applications company that uses its deep domain knowledge to solve problems of vital importance to the nation and the world, in national security, energy and the environment, critical infrastructure, and health. The Company's approximately 40,000 employees serve customers in the U.S. Department of Defense, the intelligence community, the U.S. Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. Headquartered in McLean, Va., SAIC had annual revenues of approximately $11.2 billion for its fiscal year ended January 31, 2013. For more information, visit www.SAIC.com. SAIC: From Science to Solutions®

Statements in this announcement, other than historical data and information, constitute forward-looking statements that involve risks and uncertainties. A number of factors could cause our actual results, performance, achievements, or industry results to be very different from the results, performance, or achievements expressed or implied by such forward-looking statements. Some of these factors include, but are not limited to, the risk factors set forth in SAIC's Annual Report on Form 10-K for the period ended January 31, 2013, and other such filings that SAIC makes with the SEC from time to time. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements, which speak only as of the date hereof.

Contact: Melissa Koskovich Jennifer Gephart

(703) 676-6762 (703) 676-6389

Melissa.l.koskovich@saic.com Jennifer.a.gephart@saic.com

SOURCE SAIC

/////

Here is the Department of Homeland Security page on it: Enhanced Cybersecurity Services | Homeland Security. See also Office of Cybersecurity and Communications and Stakeholder Engagement and Cyber Infrastructure Resilience. I wonder if someone gets applause for these titles, whew...

Enhanced Cybersecurity Services

Protecting critical infrastructure against growing and evolving cyber threats requires a layered approach. The Department of Homeland Security (DHS) actively collaborates with public and private sector partners every day to respond to and coordinate mitigation efforts against attempted disruptions and adverse impacts to the nation’s critical cyber and communications networks and infrastructure.

As the federal government’s lead agency for coordinating the protection, prevention, mitigation, and recovery from cyber incidents, DHS works regularly with business owners and operators to strengthen their facilities and communities. To accomplish this, the DHS Enhanced Cybersecurity Services (ECS) program was expanded in February 2013 by Executive Order - Improving Critical Infrastructure Cybersecurity.

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS develops indicators based on this information and shares them with qualified Commercial Service Providers (CSPs), thus enabling them to better protect their customers who are critical infrastructure entities. ECS augments, but does not replace, an entities’ existing cybersecurity capabilities.

The ECS program does not involve government monitoring of private networks or communications. Under the ECS program, information relating to threats and malware activities detected by the CSPs is not directly shared between the critical infrastructure CSP customers and the government. However, when a CSP customer voluntarily agrees, the CSP may share limited and anonymized information with ECS. See the Privacy Impact Assessment below for more details.

Critical Infrastructure Entities

Most critical infrastructure entities already utilize cybersecurity providers to protect their networks. The ECS program offers an enhanced approach to protecting these entities by supplementing existing services and commercial capabilities with U.S. Government cyber threat information. This approach supports the delivery of enhanced capabilities to eligible participants from all sectors.

Participation in the program is voluntary and is designed to protect government intelligence, corporate information security, and the privacy of participants, while enhancing the security of critical infrastructure. Validated entities from all critical infrastructure sectors are eligible to participate in the ECS program and receive ECS services from qualified CSPs.

To learn more about becoming a validated critical infrastructure entity, please contact the ECS Program Management Office at ECS_Program@HQ.DHS.gov.

Commercial Service Providers

CSPs receive threat information from DHS and use it to offer specified services to their critical infrastructure customers in a secure environment in order to ensure the security of government furnished information.

CSPs deliver services to eligible customers through commercial relationships. The ECS program is not involved in establishing the commercial relationships between CSPs and validated critical infrastructure entities. As of February 2013, the following CSPs are approved to provide ECS services to critical infrastructure entities:

DHS is working with several additional providers who seek to offer enhanced cybersecurity services to entities. To learn about becoming a CSP, please contactECS_Program@HQ.DHS.gov.

Sector Specific Agencies

Sector Specific Agencies (SSAs) and DHS form a critical partnership within the ECS program. The role of the SSA is to leverage existing relationships with critical infrastructure entities to expand and improve ECS. The SSA is also responsible for helping to characterize risks and threats unique to critical infrastructure entities in their respective sectors. This characterization will enable the federal government to deliver the most effective indicators relevant to ECS protected entities based upon the unique threat environment of their sector. SSAs also serve as a vital conduit to DHS for data leading to requirements that will drive the development of ECS program capabilities.

Privacy and Civil Liberties

DHS embeds and enforces privacy protections and transparency in all its activities and uses the Fair Information Practice Principles (FIPPs) to assess and mitigate any impact on an individual’s privacy.   DHS has conducted and published a Privacy Impact Assessment for the ECS program. DHS also ensures that ECS and all of its cybersecurity activities are structured in a way that ensures individual rights are protected.

Contact Information

For more information, contact ECS_Program@HQ.DHS.gov.

//////

Once you poke around on FedBizOpps.gov a little bit it's easier to see how they blow so much money in DC.

Fun FEMA Pork tangent: Here are some FEMA satellite phone sole source contract. On the one hand, it's good someone has a satellite phone in emergencies, but someone is profiting off this sale...

https://www.fbo.gov/index?s=opportunity&mode=form&id=4a1af0e4e2942226816...

FEMA seeks to acquire on an other than full and open competition basis MSAT satellite terminals. These terminals are primarily utilized in Disaster Operations for mission critical communications within FEMA, as well as for communicating with strategic partners to support disasters. There is currently only one commercial satellite operator in North America offering two-way radio, push-to-talk (PTT) capability integrated with telephone. This feature makes it possible to communicate with another terminal in a specific talk group anywhere in CONUS. Authority is FAR 6.302-1 The anticipated period of performance is for one year. THIS NOTICE OF INTENT IS NOT A REQUEST FOR COMPETITIVE QUOTES. NO TELEPHONE INQUIRIES WILL BE ACCEPTED. A determination by the Government not to compete this acquisition based upon responses to this notice is solely within the discretion of the Government.

Contracting Office Address:

500 C Street SW

Patriots Plaza -- 5th Floor

Washington, District of Columbia 20472

United States

Primary Point of Contact.:

Christine Thomas

christine.thomas@associates.fema.dhs.gov

/////

Anyway here is the Reuters story central to this whole turn of narrative, a new system "Outside of the Military Industrial Complex" indeed.

REUTERS: Government to Share Cyber Security Information with Private Sector - By Joseph Menn | May 15, 2013

SOURCE http://www.insurancejournal.com/news/national/2013/05/15/292065.htm

The U.S. government will use classified information about software vulnerabilities for the first time to protect companies outside of the military industrial complex, top officials told Reuters this week.

Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs that the general population does not realize are possible.

“It is a way to share information about known vulnerabilities that may not be commonly available,” Napolitano said at the Reuters Cybersecurity Summit in Washington, D.C.

The information would come from “a variety of sources” including intelligence agencies, she said on Tuesday.

The National Security Agency and other intelligence agencies develop and acquire knowledge about software flaws in order to penetrate overseas networks. Until now, there has been no straightforward way for these agencies to share that classified data with U.S. companies outside the defense sector, even though those companies could become victims of cyber attacks.

The plan is to discreetly share the data through what the government calls Enhanced Cybersecurity Services. Under a February presidential order, those services will be offered by telecommunications and defense companies to utilities, banks and other critical infrastructure companies that choose to pay for them.

Napolitano’s Department of Homeland Security will take the information from the NSA and other sources, and relay it to service providers with security clearances. The service providers would then use these “attack signatures” – such as Internet routing data and content associated with known adversary groups – to screen out malicious traffic.

Napolitano’s comments were the first disclosure that the screening would also cover attacks on software using methods known to the government that have not been disclosed to the software manufacturers or buyers.

While U.S. intelligence agencies have at times warned software manufacturers, such as Microsoft Corp. and Google Inc., or Homeland Security officials of specific, declassified problems, the new system will be machine-to-machine and far more rapid.

It reflects the realization that many espionage attacks from overseas are aimed at the private sector and that future destructive attacks may arrive the same way. (Classified attack signatures have been used to protect defense manufacturers under a Pentagon program.)

House of Representatives Intelligence Committee Chairman Mike Rogers said he was glad about the plan to share more broadly information about vulnerabilities, while maintaining control of the process to avoid tipping off rival countries or criminals.

“This can’t happen if you post it on a website,” Rogers, a Republican and lead author of a cybersecurity information-sharing bill that has passed the House, told the Summit. “We have to find a forum in which we can share it, and 10 providers serve 80 percent of the market. We have classified relationships with a good number of them.”

Among those that have agreed to provide the classified security services are AT&T Inc. and Raytheon Co. Northrop Grumman Corp. said this week it had also joined the program.

The secret but widespread U.S. practice of buying up tools leveraging unknown or “zero-day” software flaws for spying or attacks was the subject of a Reuters Special Report last week, in which former White House cybersecurity advisors said more flaws should be disclosed for defensive reasons.

Michael Daniel, the White House cybersecurity policy coordinator, told the Summit the Enhanced Cybersecurity Services program was still evolving and the type of information shared would change as threats do.

“We want to use the full capabilities that we have to protect as much of the critical infrastructure as we can with that program,” he said.

(Reporting by Joseph Menn; Editing by Tiffany Wu and Leslie Gevirtz)

/////////

Here is the earlier Zero Day story: Booming 'zero-day' trade has Washington cyber experts worried | Reuters

(Reuters) - The proliferation of hacking tools known as zero-day exploits is raising concerns at the highest levels in Washington, even as U.S. agencies and defense contractors have become the biggest buyers of such products.

White House cybersecurity policy coordinator Michael Daniel said the trend was "very worrisome to us."

Asked if U.S. government buying in the offensive market was adding to the problem, Daniel said more study was needed. "There is a lot more work to be done in that space to look at the economic questions...so we can do a better job on the cost-benefit analysis," he said.

Some security experts say the government's purchasing power could help instead of hurt. They argue the U.S. government should bring the market into the open by announcing it will pay top dollar for zero-days and then disclosing all vulnerabilities to the companies concerned and their customers.

"Given that people are now buying vulnerabilities, the U.S. should simply announce that it is cornering the market, that they will pay 10 times anyone else," said Dan Geer, chief information security officer at In-Q-Tel, the U.S. intelligence community's venture capital firm. He said he was speaking outside of his official capacity.

IN-Q-TEL TROLLING. FACK... This story is going all over the place. In-Q-Tel is the CIA's venture capital wing, worth noting for those unfamiliar. They use government money to make private venture capitalists tons of profits - for example building up Keyhole into Google Earth, which, when installed on your computer phones home constantly.

See: https://www.cia.gov/library/publications/additional-publications/in-q-tel/

In-Q-Tel - Wikipedia. Among other things: "In-Q-Tel sold 5,636 shares of Google, worth over $2.2 million, on Nov 15, 2005.[6] The stocks were a result of Google’s acquisition of Keyhole, the CIA funded satellite mapping software now known asGoogle Earth."

Exclusive: Google, CIA Invest in 'Future' of Web Monitoring | Danger Room | Wired.com: "The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future."

In-Q-Tel: The CIA's Tax-Funded Player In Silicon Valley : All Tech Considered : NPR && 25 Cutting Edge Companies Funded By The Central Intelligence Agency - Business Insider

/////

Batchez of linx follow when diving into this newest gravy train. Here is a plain setup showing a bunch of classified stuff about to go out the door to shady contractors, I'm sure none of them sketchballs with foreign intelligence angles who will sell out and use the good stuff to attack for massive profit.

DIBS ON YOUR INTERNETS: This is probably the original DIB thing now foisted on America at large, or closer to it:

www.dc3.mil/dcise/DIB Enhanced Cybersecurity Services Procedures.pdf
DIB Enhanced Cybersecurity Services (DECS)

The Department of Defense (DoD) in coordination with the Department of Homeland Security (DHS) is actively engaged in multiple efforts to foster mutually beneficial partnerships with the Defense Industrial Base (DIB) to protect DoD information residing on or passing though DIB company systems. One such effort is the DIB Cyber Security/Information Assurance (CS/IA) Program, including its optional DIB Enhanced Cybersecurity Services (DECS) component.

Under the optional DECS component of the DIB CS/IA Program, the Government will furnish classified cyber threat and technical information either to a DIB company or to the DIB company’s Commercial Service Provider (CSP). This sensitive, Government-furnished information enables these DIB companies, or the CSPs on behalf of their DIB customers, to counter additional types of known malicious cyber activity, to further protect DoD program information.

///////

This is also nuts: www.uscg.mil/hq/cg5/cg544/docs/ECS_Fact_Sheet.pdf

And: Raytheon, Lockheed Get U.S. Secrets as Cybersecurity Go-Betweens

Cyber Security, Critical Infrastructure, and Obama’s Executive Order - Deloitte CIO - WSJ

Northrop, US DHS team up to support enhanced cybersecurity services :: Strategic Defence Intelligence

U.S. gives big, secret push to Internet surveillance | Politics and Law - CNET News

///////

Other Major Moves of Note right now: Of course the Bitcoin ecosystem got a major swipe at it from Department of Homeland Security's new uber-agency, Homeland Security Investigations. Warrant Reveals Homeland Security Seized Mt. Gox’s Dwolla Account for ‘Unlicensed Money Transmitting’ | Betabeat. I covered some key notes on the ever-spreading DHS-HSI organization in April 2012.

Associated Press situation is a big deal too. via @johnknefel: What's at Stake When the Department of Justice Seizes AP Phone Records | Politics News | Rolling Stone

Anyway I will leave it there for now. The Hack Cartel rides high today, but as with all these corrupt authoritarian bubbles they tumble sooner or later.

The Cyberwar fleet of fools will sink of its own accord, but how many innocent fishing boats will get capsized in the wake of their fooling about?

Syndicate content