Disclaimer: This site is *not* affiliated with AIPAC, Ahmed Chalabi, K Street, ClearChannel, or Urban Moving Systems of Weehawken, NJ. In case you were curious. Full disclosure: I have a "long Apple position" and therefore I have an Apple bias.
Minneapolis residents hit the streets after Zimmerman acquitted in Florida murder trial. On Friday there was another march for late Terrance Franklin, killed by Minneapolis Police Department May 10th with five bullets to back of head according to a family member.
Video has several interviews including with Mel Reeves @17:20who has called for a rally on Monday at Hennepin Co. Government Center (Peoples Plaza). NOTE I heard earlier it was on SUNDAY but there is NOT a rally at Plaza on Sunday according to Mel. http://justiceforterrancefranklin.wor...
A network of direct action camps - and indeed a network of networks - continues to spread across North America uniting Natives, First Nations, meddling kids, even ranchers and activists vs corporate exploitation. Mercenaries have appeared in northern Wisconsin to protect dangerous & widely opposed taconite mining operations as well. As Winona LaDuke has highlighted, militarization of the fossil fuel scenario in the US & Canada is moving full speed ahead.
On July 6, 2013, hundreds of people gathered at the 4th Annual Tar Sands Healing Walk in Fort McMurray Alberta. During the Walk it was announced that a major oil spill occurred on the Athabasca River flowing into the Lake Athabasca in the Indigenous Community of Fort Chipewyan.
Later that evening at the Celebration Feast for the Healing Walk, Gitz Crazyboy of the Athabascan Chipewyan First Nation announced a call for action to stop traffic on Alberta highway 63 on August 24th, 2013.
Highway 63 is the main artery which carries workers to the Tar Sands production sites North of Fort McMurray.
The Youth of the Dene Nation are calling out for support to help them demonstrate to Industry and the Governments that the Tar Sands must be stopped for the sake of the future generations. On August 24th, 2013, join them by coming to the action in Fort McMurray or plan an action in solidarity with their plans.
For more information visit
or call Lionel Lepine
The Yinka Dene Alliance issues a cease-and-desist letter to Enbridge, saying their member's territory comprises 25% of the proposed Northern Gateway pipeline route.
BREAKING: The Yinka Dene Alliance warns the Enbridge against trespassing in their traditional territories as they seek temporary permits for drilling and tree removal.
In a news release issued this morning, the Yinka Dene Alliance said it has sent a cease-and-desist letter to Enbridge.
The alliance says its members' territories make up 25 per cent of the proposed pipeline route.
Join ICTV on a walk into the Penokee Mountains Heritage Park with relatives and grandchildren to take pictures of drill site #6 about 1 mile from the Lac Courte Oreilles Ojibwe Treaty Harvest and Education Camp on Moore Park Road in Iron County Wisconsin. #RFKvisitPenokeeHills photos by Rob Ganson
Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/
Much of this is old news but why not batch some of it in one place?
On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….
Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)
So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.
Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.
Global PR Manager, IOActive, Inc.
T: +1 206 462 2291
IOActive Uncovers Vulnerabilities in United States Emergency Alerting System
Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack
Seattle, WA―July 8, 2013 ― IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.
IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.
“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”
The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.
IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.
This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.
Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.
This vulnerability could be exploited remotely.
The following Monroe Electronics products are affected:
An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.
Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.
Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.
The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.
DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.
No known public exploits specifically target this vulnerability.
An attacker with a moderate skill level could exploit this vulnerability.
Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting firstname.lastname@example.org.
ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.
Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.
Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.
Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key
Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013
Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.
The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.
Compromised root SSH key(CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.
Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.
Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.
Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.
An attacker with the private key and SSH access can log in to a device with root privileges.
Predictable session IDs could allow an attacker to take control of an existing administrative web session.
Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.
Logs may disclose configuration information that can benefit an attacker.
Apply an update
On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.
DASDEC users can obtain updated firmware and release notes by contacting <email@example.com>. R189 One-Net users can contact <firstname.lastname@example.org>.
Disable compromised SSH key
The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.
Manually inspect SSH keys
To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:
Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:
If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.
Change default passwords
Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.
#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?
#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!
Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
This one is interesting, I don't know why anyone would trust any VPN in particular tho :/
Greetings, National "Security" Agency -- and our followers whom we love so much:
This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.
SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:
ns3-194.akamaiedge.net 56923 IN A 188.8.131.52
lar7.akamaiedge.net 64613 IN A 184.108.40.206
la11.akamaiedge.net 90000 IN A 220.127.116.11
lac1.akamaiedge.net 90000 IN A 18.104.22.168
la6.akamaiedge.net 70352 IN A 22.214.171.124
ns6-194.akamaiedge.net 90000 IN A 126.96.36.199
ns7-194.akamaiedge.net 90000 IN A 188.8.131.52
lar2.akamaiedge.net 84886 IN A 184.108.40.206
la1.akamaiedge.net 53942 IN A 220.127.116.11
lar6.akamaiedge.net 54809 IN A 18.104.22.168
la7.akamaiedge.net 39448 IN A 22.214.171.124
ns5-194.akamaiedge.net 35282 IN A 126.96.36.199
la3.akamaiedge.net 39672 IN A 188.8.131.52
R00tsh3ll - @r00tsh3ll1 (twitter)
Intro Written and Info PASTED by:
Luminary - @aluminary (twitter)
There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^
Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.
For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.
Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.
Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.
Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.
Stay Anonymous. Stay safe.
Keep it up and defeat PRISM. Together, we are strong.
Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.
"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me.Trust tor. I will not run dsniff or tcpdump. Its save. I will never abusethe logins you gave me for free. Afk now, that one guy is surfing onxhamster, nice video choice" -- "Alex"
Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 184.108.40.206 & 220.127.116.11
Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:
Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001
On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.
These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):
The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).
MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY
In the IG report these aforementioned companies at listed at Company A, B, and C.
There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.
See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)
The project and procurement code as: DXXXXX01XXXXX
19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.
Using a DUNS# of 790238638
The persons name under whom this was all listed is:
GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
At the same address is:
Hope L Biglow
Grafton Bigelow is also listed at various addresses in:
Cape May, NJ and West Cape May, NJ
Plus several addresses in:
West Palm Beach, FL
But, the name Grafton Biglow also turns up:
FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov
Hopefully he had his own phone checked for bugs.
Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"
Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.
The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.
The President of the United State is just a fucking moron, and utter and complete moron.
Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.
Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA
Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.
Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.
Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.
A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.
The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.
The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.
Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.
Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”
In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”
According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”
FOR IMMEDIATE RELEASE
FROM : PARASTOO
TO : DOD
RE : http://en.wikipedia.org/wiki/Iran_Air_Flight_655
HANDLE: OP655, PRE-RELEASE
PARASTOO IS SPEAKING.
YOU NEED TO BE INFORMED THAT WE HAVE SUCCESSFULLY LAUNCHED A SECOND
UAV FLIGHT ON U.S SOIL. THE RESULTS OF THIS OP WILL BE PUBLISHED
TIMELY AFTER OUR RELEASE REGARDING THE JFK OP, DURING THE UPCOMING
SO-CALLED GENEVA-2. OP655 TOOK PLACE OVER A DESERTED AREA IN
MARYLAND, FAR FROM CIVIL OR MILITARY BASES FOR THE PURPOSE OF THIS
BOTH UAV USED IN THESE OPS ARE MADE IN U.S POWERED BY iDIRECT SYSTEM,
WHICH WE MENTIONED IN OUR PREVIOUS MESSAGES. U.S NAVY USS VINCENNESE
WAS INSIDE IRANIAN TERRITORY WHEN FIRED MISSILE TO A CIVILIAN PLANE
RESULT IN 299 DEATH AMONG THEM 66 CHILDREN. LATER, THE CAPTAIN
RECEIVED A MEDAL FOR HIS HEROIC OPERATION.
TO HONOR THAT EVENT WITH A PROPER MEDAL BASED ON OUR STANDARDS, OP655
FULL RELEASE WILL HAVE A BONUS: TECHNICAL DETAILS OF RQ-170.
BESIDES THE GENEVA-2, WE HAVE SET DATES FOR FUTURE RELEASES ACCORDING
TO A LIST OF DATES IMPORTANT RESISTANT FIGURES HAVE BEEN TARGETED AND
ASSASSINATED BY THE ONLY REGIME WHO GET TO ENJOY A 6-DECADES DURABLE
"LICENSE TO KILL"  WHILE SUCKING UP FINANCIAL BLOOD OUT OF U.S
CITIZENS , WHO HAVE TO DEAL WITH THEIR OWN HONORABLE MEDAL
CARRYING OFFICIALS LIKE JAMES CLAPPER WHO JUST EMBARRASSED HIMSELF
ONCE AGAIN .
WHILE YOU ARE ENJOYING WATCHING A BIT OF UAV FUN FLYING OVER MONSTER
FLEETS  WE WOULD LIKE TO REMIND YOU NO MATTER WHERE YOU ARE,EVEN
INSIDE PROTECTED CUBES IN MARYLAND OR THE MOST NUCLEAR-POWER
DEPENDENT AREA -- VIRGINIA, YOU ARE NOT ANONYMOUS. EXPECT US.
03 JULY 2013
Some absolutely shocking threats and claims have emerged from a fairly new hacking group on the scene. DefCon’s “y3ti” tipped us off to the group that calls themselves Parastoo that first emerged at the end of last year. Their latest chilling release confirms their earlier claims with an incredible stash of sensitive intelligence that was announced on a series of Iranian activist sites and later found on world-wide filesharing sites. The bounty is big, the targets are bigger, and the list of items they have hacked is staggering. Among this data and the statements– nuclear intelligence, military information, satellite images, national infrastructure intelligence, and a thinly veiled threat on the vice-president of the United States Joe Biden.
IN TECHNICAL PART OF OUR LAST MESSAGE WE TALKED
ABOUT HOW PARASTOO GOT INTO C4ISR SYSTEMS BELONG
TO NATO AND USED A VSAT-BASED ATTACKS TO CONTROL
AND "PARASTOOJACK" A DRONE , LONG TIME AGO .
NOW THAT WE SLOWLY ARE WORKING THROUGH THE ROUTE
AND PARASTOOS , CYBER RESISTANCE GROUPS , AND
PEOPLE WHO ARE TIRED OF IMPERIALISTIC SHIT
BEING FED US AS POLITICS FOR A LONG TIME , IN
OUR NEXT MESSAGE WE WILL RELEASE A VIDEO OF HOW
THE ATTACH TO IDIRECT-CONTROLLED C4ISR SYSTEM
HAPPENED AND HOW PARASTOO BROKE INTO A FIPS 140-2
SECURE SATCOM ON THE MOVE . IT DEMONSTRATES , IN
A LIMITED WAY THAT PUBLIC WWW CAN HANDLE , WHAT
DID WE MEAN BY "AN EASY SPORT" IN OUR LAST MESSAGE .
IDIRECT DAYS ARE OVER FOR A LONG TIME , AND NOW
WE ARE CLOSING ITS FILE FOR GOOD , GIVE A BIT DATA
ABOUT THE JFK TEST AND TRY TO SPEAK "SERIOUSLY" TO
VICE PRESIDENT OF ANOTHER COUNTRY . DO NOT SUPPORT
ZIONIST-LED PLOTS. IT IS "SERIOUS" .
On the Turkish front, #occupygezi and protesters have been supported by Redhack, an apparently older Turkish communist-sympathetic hacker group with sturdy skilz at defeating Turkish government websites.
Red!, the world's agenda hacktivizm issues of weight and center of each year is increasing cyber-activism. It carries out actions in particular RedHack'in Anonymous'un and Turkey. At the same time contributing to the documentary ICT, academics, lawyers and politicians hacktivizmin through politics, explores the relationship between ethics and law. BSM-Independent Film Center, Red! founded an independent film exhibition and distribution network. Film screenings held across Turkey. documentary Who, Dr. Free Uçkan / Author-scholar Gökhan Ahi-IT Law Expert Professor. Dr. Aslı Tunç-Head of the Department at Istanbul Bilgi University Media Alper Stone-ODP Co-Chairman Dr. Rabun Kosar - Bogazici university for Data Processing Center Manager Özgür Murat-Lawyer -Attorney Bilgütay Durna Ilhan Cıhaner-MP - Former Republican Attorney General Ayhan Erdoğan-Attorney Asst. Assoc. Dr. Erkan Saka-Istanbul Bilgi University, Department of Communication
RED! « Independent Cinema Center: The movie RED! produced by BSM – Independent Cinema Center, focuses on two subjects that gain globally more and more attraction every year: cyber activism and hacktivism. In the movie, these subjects are principally treated through Anonymous and RedHack. At the same time, the movie examines the relations between hacktivism and politics, ethic and law.
This documentary does not conceal being biased. It approachs cyber activism and hacktivism from a class struggle perspective. Considering the cyber world as a new battlefield, the movie examines how the cyber struggle can be linked to the class struggle.
A report recently prepared by the National Police Department into the recent nationwide Gezi Park protests has stated that members of the Socialist hacker group RedHack (Kızıl Hackerlar) committed virtual terrorism by inciting people to commit criminal acts in the tweets posted on the account “@TheRedHack” during the protests.
The National Police Department launched a large-scale investigation into the online activities of Redhack during the Gezi Park protests and determined the identities of the members of the group from their IP addresses. The Sabah daily reported on Thursday that the National Police Department is seeking legal action against Redhack.
The police department stated in its report that Redhack posted many tweets that invited people to attend the protests and incited people to commit crimes during the Gezi Park protests. The police department also included some tweets posted on the Redhack account in the report. A tweet posted on June 14 states, “People from around the country will be on the streets as of 2.00 p.m.” In another tweet posed on June 15, Redhack stated: “We are protesting for a fair, non-exploitative and classless world, for brotherhood and freedom. If they are so brave, they can stop us.” In other tweet, again posted on June 15, Redhack stated: “They [Justice and Development Party (AK Party) government] provides people with free transportation or food for their rallies, but they give us tear gas, police batons and police attack car. Do you continue to be silent?”
According to the Sabah report, Prosecutor Muammer Akkaş will launch an investigation into Redhack based on the police report. The prosecutor will reportedly investigate members of Redhack on charges of virtual terrorism.
As you may be all aware, our actions are continuing non-stop since February. From that time our first action was against Ankara Security Headquarters and as a result seven innocent people got arrested and they are still imprisoned. The only evidence against them is a PlayStation Cd’s. The dominant powers then decided to transfer the investigation about us to a prosecutor who once managed the Sivas case to drop due to time-frame elapsed, where 33 intellectuals and artists got killed by mob of bigots. Despite this we didn’t stop and we were investigated by National Intelligence Agency (MIT) and complaint was made to Interpol. For disinformation reasons various news was made about us. We still did not stop. Ministry of Interior was hacked twice, 95% of police forces in Turkey were hacked, and other Ministry sites were hacked time to time. Lately we were declared “terrorists” after Ministry of Foreign Affairs was hacked where we have leaked document. All of a sudden cyber teams established against us have mushroomed up. Those couldn’t stop us with help of imperial powers such as USA, EU, Russia or China created “cyber counter-guerrillas” and created sites to vilify us. Also the government, that sees us as terrorists supported these people to attack other countries. They have tried various games to alienate people against us.
Very recently attacks started against opposition journalists that makes objective news and lawyers specialises on internet. With the helping hand of the government those fake sites published personal details of these freedom defenders and very harsh/degrading threats were made to them. Just today another dirty “cyber government” attack was made against Birgun (OneDay) newspaper. This must be the very “Cyber Army” that was established against us by establishments such as TUBITAK, TIB and BTK. One of their employee quite recently announced that they will use a different approach against us, this must be it. They will brand those fighting for the truth as a terrorist but will unleash their lamers against journalists, lawyers. This must be their so called “different approach”.
As these conditions were set by them and freedom defender’s details are published with the help of government, we have taken a decision. Since they are attacking those people fighting for freedom, we will not let them walk alone. Starting from the beginning, we will publish all the leaked documents we have managed to gather, uncensored.
We will only stop when they cease to treat these lamers with double standard and treat them as equal as us.
Tomorrow we will start to publish an uncensored police informants file of 70mb.
Since we are a “terrorist” and those who publish details of innocent people are heroes, then we will act with the language they understand. We won’t play the inoffensive any longer.
The choice is yours; either put the leash on these corrupted lamers that lacks knowledge of code or face the consequences.
Lastly, we will not let those take sides with us be alone. We have plenty of jokes and they are funny but they are all real.
We don’t ACQUIT We HACK!
We won’t embarrass those trust us and walks with us, we won’t leave them alone halfway through this struggle.
If we get arrested one day, we will defend our actions. Because bourgeois terrorists cannot judge us.
Date: Tue, 02 Jul 2013 12:20:37 +0100
From: Dan Meredith <meredithd[at]rfa.org>
Organization: Open Technology Fund
Subject: [cryptography] Open Solicitation for Concept Notes: Open Technology
We are excited to share that the Open Technology Fund (OTF) at Radio Free Asia's (RFA) ongoing solicitation of concept notes is open and receiving proposals. We seek to fund disruptive technology projects that advance global Internet freedom and human rights online. If you are interested in submitting a concept note for our consideration, the process begins by completing our short online form:
OTF utilizes public funds to support Internet freedom projects. We support projects that develop open and accessible technologies promoting human rights and open societies. We strive to advance inclusive and safe access to global communication networks.
Created in 2012, OTF is an RFA program supported by funds from the Broadcasting Board of Governors (BBG). The BBG’s mission is to inform, engage, and connect people around the world in support of freedom and democracy. RFA’s mission is to provide accurate and timely information to the people of Asia who lack adequate protections for freedom of expression, free speech, and a free press.
In a globally interconnected society, creating and protecting freedom of expression, free speech, and a free press requires cross-border technology tools that enable the exercise of human rights within repressive societies for the global population. OTF strives to incubate and support projects creating these tools around the world. More information on our program can be found at
Here is some more material on the Radio Free Asia / Broadcasting Board of Governors apparatus via alternative journalist Wayne Madsen, who himself is under a bit of pressure from nasty bloggers for reporting on EU NSA surveillance and other unorthodox stories….
An examination of the current 2013 budget for the U.S. government’s Broadcasting Board of Governors (BBG) that oversees the International Broadcasting Board (IBB) and which determines the slant taken by the U.S. government’s propaganda efforts on radio, television, and, increasingly on the Internet, illustrates the head-lock that George Soros and neo-conservative “soft power projection” interests have on the official state-sponsored information disseminated by the U.S. government to a global audience.
The new propaganda bias of such IBB-controlled outlets such as the Voice of America, Radio Free Asia, and Radio Free Europe should comes as no surprise, considering that former CNN chairman and chief executive officer Walter Isaacson laid down the gauntlet after he assumed the chairmanship of the Broadcasting Board of Governors in 2009 by calling for the United States to aggressively challenge what he termed anti-American “propaganda” emanating from such international broadcasters as RT (the former Russia Today), Iran’s Press TV, and China’s CCTV. Isaacson walks in lock-step with the goals of Soros and the Council on Foreign Relations as the head of the politically-connected Aspen Institute. Isaacson stepped down from his broadcasting chairmanship position in January 2012.
The priorities for U.S. propaganda include stepping up efforts to effect political change in what are termed the five remaining “Communist” countries in the world through Cold War-era dissemination of “news” and other content via the Voice of America (VOA), the Office of Cuba Broadcasting (OCB) , and “grantee” organizations RFE/RL (Radio Free Europe/Radio Liberty), Inc., and Radio Free Asia (RFA). Soros’s Open Society Institute holds a predominant role in the administration of the “grantee” broadcast arms, which were originally operated by the Central Intelligence Agency (CIA) before de facto control was passed to Soros after the collapse of communism in Europe. The targeted five remaining communist nations are China, Cuba, North Korea, Laos, and Vietnam.
The BBG claims that America’s propaganda efforts reach a global audience of 187 million people and that the 59 language broadcasts to over 100 nations costs less than a mere $5 million per year. The BBG budget request contains all the Soros code phrases in describing America’s “highest standards of journalistic independence, ethics, and objectivity” and support of “democracy, civil society, and transparent institutions around the world.”
Check in there for more infos. It's a nasty Soros pass thru fo sho! … Also check out LittleSis.org for more crowdsourced, cited info on these kinds of orgs and players..
I was glad to help publish live video from a panel and community discussion about the controversial and incredibly dangerous Trans Pacific Partnership secret treaty now being developed by corporate weasels and a trade representative unit of the White House, with almost all of Congress barred from reviewing the document.
US Rep. Keith Ellison (DFL-MN5) spoke out against the TPP as a secret process saying it should be occurring in public. Josh Wise from MN Fair Trade Coalition did a great job emceeing the panel and covering a lot of detailed ground including the intellectual property leaked provisions of the draft treaty of doom. (FB MN Fair Trade)
Full video unedited. Sorry about the bad sound sync. This video is licensed: CREATIVE COMMONS WITH ATTRIBUTION. Please Remix!! :)
Also I was able to get in the last question on the QA, proposing Rep. Ellison should post a bill to US Congress that would make it illegal for the trade representative to hold any secret documents longer than one month, which would neatly solve the authoritarian secret treaty problem, and enable all Americans to participate in US diplomatic policy processes on a far more equal basis than the current situation :)
The Obama administration is facing increasing scrutiny for the extreme secrecy surrounding negotiations around a sweeping new trade deal that could rewrite the nation’s laws on everything from healthcare and Internet freedom to food safety and the financial markets. The latest negotiations over the Trans-Pacific Partnership (TPP) were recently held behind closed doors in Lima, Peru, but the Obama administration has rejected calls to release the current text. Even members of Congress have complained about being shut out of the negotiation process. Last year, a leaked chapter from the draft agreement outlined how the TPP would allow foreign corporations operating in the United States to appeal key regulations to an international tribunal. The body would have the power to override U.S. law and issue penalties for failure to comply with its rulings.
We discuss the TPP with two guests: Celeste Drake, a trade policy specialist with the AFL-CIO, and Jim Shultz, executive director of the Democracy Center, which has just released a new report on how corporations use trade rules to seize resources and undermine democracy. "What is the biggest threat to the ability of corporations to go into a country and suck out the natural resources without any regard for the environment or labor standards? The threat is democracy," Shultz says. "The threat is that citizens will be annoying and get in the way and demand that their governments take action. So what corporations need is to become more powerful than sovereign states. And the way they become more powerful is by tangling sovereign states in a web of these trade agreements."
The Trans-Pacific Partnership Agreement & copyright. "Many of the same special interests that pushed for legislation like SOPA and PIPA have special access to this forum—including privileged access to the text as well as US negotiators."
Anyway leave it there for now. BIG DEAL, PEOPLE!! This is from the "secret government" if anything is, and will supersede whole swaths of the Constitution and assorted natural rights of people around much of the world Shock doctrine par excellence.
From Taksim to Tahrir, from Bulgaria to Brazil, we fight the same struggle against oppressive state structures that benefit only a tiny wealthy elite.
Open letter by the Egyptian activist collective ‘Comrades from Cairo’.
To you at whose side we struggle,
June 30 will mark a new stage of rebellion for us, building on what started on January 25 and 28, 2011. This time we rebel against the reign of the Muslim Brotherhood that has brought only more of the same forms of economic exploitation, police violence, torture and killings.
References to the coming of “democracy” have no relevance when there is no possibility of living a decent life with any signs of dignity and decent livelihood. Claims of legitimacy through an electoral process distract from the reality that in Egypt our struggle continues because we face the perpetuation of an oppressive regime that has changed its face but maintains the same logic of repression, austerity and police brutality. The authorities maintain the same lack of any accountability towards the public, and positions of power translate into opportunities to increase personal power and wealth.
June 30 renews the Revolution’s scream: “The People Want the Fall of the System”. We seek a future governed neither by the petty authoritarianism and crony capitalism of the Brotherhood nor a military apparatus which maintains a stranglehold over political and economic life nor a return to the old structures of the Mubarak era. Though the ranks of protesters that will take to the streets on June 30 are not united around this call, it must be ours — it must be our stance because we will not accept a return to the bloody periods of the past.
Though our networks are still weak we draw hope and inspiration from recent uprisings especially across Turkey and Brazil. Each is born out of different political and economic realities, but we have all been ruled by tight circles whose desire for more has perpetuated a lack of vision of any good for people. We are inspired by the horizontal organization of the Free Fare Movement founded in Bahía, Brazil in 2003 and the public assemblies spreading throughout Turkey.
In Egypt, the Brotherhood only adds a religious veneer to the process, while the logic of a localized neo-liberalism crushes the people. In Turkey a strategy of aggressive private-sector growth, likewise translates into authoritarian rule, the same logic of police brutality as the primary weapon to oppress opposition and any attempts to envision alternatives. In Brazil a government rooted in a revolutionary legitimacy has proven that its past is only a mask it wears while it partners with the same capitalist order in exploiting people and nature alike.
These recent struggles share in the fight of much older constant battles of the Kurds and the indigenous peoples of Latin America. For decades, the Turkish and Brazilian governments have tried but failed to wipe out these movements’ struggle for life. Their resistance to state repression was the precursor to the new wave of protests that have spread across Turkey and Brazil. We see an urgency in recognizing the depth in each other’s struggles and seek out forms of rebellion to spread into new spaces, neighborhoods and communities.
Our struggles share a potential to oppose the global regime of nation states. In crisis as in prosperity, the state — in Egypt under the rule of Mubarak, the Military Junta or the Muslim Brotherhood — continues to dispossess and disenfranchise in order to preserve and expand the wealth and privilege of those in power.
None of us are fighting in isolation. We face common enemies from Bahrain, Brazil and Bosnia, Chile, Palestine, Syria, Turkey, Kurdistan, Tunisia, Sudan, the Western Sahara and Egypt. And the list goes on. Everywhere they call us thugs, vandals, looters and terrorists. We are fighting more than economic exploitation, naked police violence or an illegitimate legal system. It is not rights or reformed citizenship that we fight for.
We oppose the nation-state as a centralized tool of repression, that enables a local elite to suck the life out of us and global powers to retain their dominion over our everyday lives. The two work in unison with bullets and broadcasts and everything in between. We are not advocating to unify or equate our various battles, but it is the same structure of authority and power that we have to fight, dismantle, and bring down. Together, our struggle is stronger.
On Monday June 24: Caught up on matters re deep politics & weirdness with the guys on TheRunDownLive - got to cover some good topics including domestic military operations under USNORTHCOM CONPLAN 3502 aka "Civil Disturbance Operations", the DRE drug scandal in Minneapolis, arcana of the covert ops legitimization framework such as Executive Order 12333 thanks to Al Martin. (links below). Once I got the chat stablized it was all good. Nice thumbnail pic too! Give em a subscription for more updates from Out There. A recent episode with Stew Webb describing getting attacked by Lucifer or Baphomet is worth seeing - of course Stew has cigarette in hand! The Rundown Live #45 Dan Feidt of Hongpong.com // See also Baran Hines WTFRLY: The Rundown Live #42 Baran Hines of wtfrly.com.
Also additionally in meta-news, I finally updated the sidebar on hongpong.com and added a bunch of friends and really excellent news projects on there. So look left once more.
I am on a bit of a riff against a common food additive azodicarbonamide. I sent this to a local sandwich maker/distributor that has a pretty good hold on the Minneapolis independent coffee shop sandwich market. I won't name the sandwich company for now. I think I will assume that azodicarbonamide is actually an alien mind control agent ;) Azodicarbonamide is a major element of Chicken McNuggets and other toxic pseudofoods in the United States.
Hi, I like your sandwiches but when I noticed that azodicarbonamide is added as a dough conditioner in some of them I have stopped purchasing them. This particular additive is banned in many countries, it is also lethal at certain levels.
Europe, Australia and Singapore have all banned azodicarbonamide because as the UK puts it "In the UK, the Health and Safety Executive has identified azodicarbonamide as a respiratory sensitizer (a possible cause of asthma) and determined that products should be labeled with "May cause sensitisation by inhalation." http://en.wikipedia.org/wiki/Azodicarbonamide
I understand there are economic reasons to use additives like this, however it is an element that is considered unsafe for food use across much of the world and it would improve the safety & health effects of your sandwiches to quit using it. [...]
EPISODE BREAKDOWN: On this episode of Breaking the Set, Abby Martin talks to BTS producer, Ameera David, about the mounting death toll stemming from increased violence in Iraq, as well as the rules the NSA is using to spy on Americans. Abby then talks to Karen Hudes, former senior executive at the World Bank, about her experience blowing the whistle on the high level corruption within the international financial system and how her story was censored. Abby then breaks down the grievances behind the Brazilian protests that have resulted in over one million people taking to the streets in over 100 cities. BTS wraps up the show with an interview with Michelle Cornette, Subject Matter Expert: Military Suicide at the Center for Deployment Psychology, about the factors contributing to the drastic rise of military suicides.