Friday, February 5, 2016

Code 291: Swedish Police Cover-Up Thousands of Crimes Involving “Refugees”

Rapes, assaults, terror threats kept secret

 
Swedish police have covered up thousands of crimes involving migrants over the past four months, all of which have been classified under a secret ‘291 refugee code’ designation, it has been revealed.
According to a report in Swedish newspaper Svenska Dagbladet, around 5,000 incidents have been kept secret, including 559 cases of violence, 194 assaults, two terror threats and four rapes.
The article explains that the incidents have been covered-up because of a directive from the National Operational Department that any information pertaining to the behavior of “refugees” be censored.
Official sources blamed the violence on “traumatized people” being kept in “overcrowded places,” with NOA commander Thomas Wallberg adding that it was “sad” the information wasn’t made available to the public.
Wallberg also “told the newspaper that there are even more incidents than the Swedish newspaper has (not) been given access to,” reports Speisa.
Police have also been ordered not to reveal how much resources they have used to deal with refugees entering Sweden, with one officer telling Dagens Nyheter that the secret code was “absolutely ridiculous”.
Last month, Svenska Dagbladet also reported on a directive that police were not to give descriptions of refugee criminals involved in “everything from minor traffic accidents to serious crimes like robbery, abuse and murder” so as not to appear “racist”.
However, accusations of Swedish police covering up crimes linked to migrants stretch back further, with details of the molestation of women by Muslim migrants at a music concert in Stockholm last summer being kept under wraps so as to “avoid an anti-immigrant backlash”.
Authorities have been caught hiding crimes committed by migrants from the public in several other European countries, including Germany, where details of the New Years Eve sex attacks on hundreds of women in Cologne were initially buried.
Police in Detmold also refused to divulge details about the rape of a 13-year-old girl at a migrant camp because they did not want to “give legitimacy to critics of mass migration”.
Germany’s top broadcaster ZDF is also refusing to run crime stories about Muslim rape suspects because, in the words of Editor in chief Ina-Maria Reize-Wildemann, “We don’t want to inflame the situation and spread the bad mood. [The migrants] don’t deserve it.”
Earlier this week, former head of ZDF Bonn Dr. Wolfgang Herles revealed that the station takes orders from the government on what to report and that journalists are, “not allowed to say anything negative about the refugees”.
As we highlighted back in October, police in Finland were also ordered by the country’s national police board not to publicly identify migrants as criminal suspects over concerns that doing so would encourage a ‘racist’ backlash against the wave of asylum seekers entering Scandinavia.


Thursday, February 4, 2016

Saudi Arabia Ready to Send Ground Troops into Syria

Saudi Arabia and Iran engaged in a proxy war in Syria and Yemen


The Saudi embassy posted to Twitter today saying it is ready to send ground troops into Syria, ostensibly to fight the Islamic State.
“The kingdom is ready to participate in any ground operations that the coalition (against Islamic State) may agree to carry out in Syria,” Brigadier General Ahmed Asseri, who is also the spokesman for the Saudi-led Arab coalition in Yemen, told the Saudi-owned al-Arabiya TV in an interview.
Asseri said in order to defeat IS in Syria ground operations will be needed in addition to airstrikes.
“If there was a consensus from the leadership of the coalition, the kingdom is willing to participate in these efforts because we believe that aerial operations are not the ideal solution and there must be a twin mix of aerial and ground operations,” he said.
State Department spokesman John Kirby said the United States is supportive of having coalition partners contribute to the fight against the Islamic State. “I would not want to comment specifically on this until we’ve had a chance to review it,” he said.
Saudi Arabia and Iran Are Fighting a Proxy War
Saudi Arabia is concerned about the presence of Iranian-backed troops in Syria. In October Iran deployed hundreds of ground troops in Syria to fight alongside forces loyal to President Bashar al-Assad.
It is generally agreed Saudi Arabia and Iran are conducting a proxy war in Syria and Yemen. In late January Riyadh and Tehran clashed during a closed door meeting at the World Economic Forum in Davos, Switzerland.
“The barbed exchange between Saudi Prince Turki al-Faisal and Iranian Foreign Minister Javad Zarif at an invitation-only meeting on Wednesday underlined the hostility between the two Gulf rivals, who are waging proxy wars in Syria, Yemen and Iraq,” Reuters reported.
The Saudis broke off diplomatic relations with Iran after protesters stormed the Saudi embassy in Tehran following the execution by Saudi Arabia of a leading Shia cleric, Sheikh Nimr al-Nimr.
The ongoing proxy war between the two Gulf rivals expanded into Nigeria in December when Nigerian government forces carried out a brutal massacre against the country’s minority Muslim Shia population. Prior to the attack, Nigerian President Muhammadu Buhari said he was considering joining a Saudi-led coalition to fight the Islamic State.
Steps Toward a Ground War in Syria
In October Obama’s Defense Secretary, Ashton Carter, told the Senate Armed Services committee the United States would begin “direct action on the ground” in Syria and Iraq. The move was recommended by Obama’s senior national security advisers.
The following month Sen. Lindsey Graham said ground forces, joined by troops from Turkey, Egypt, Saudi Arabia and other US allies in the region would be needed to topple al-Assad.
“If you don’t destroy ISIL in Syria, which is their headquarters, we’re going to get attacked at home,” Graham said. “There’s an opportunity here with some American leadership to do two things, which is to destroy ISIL before we get hit at home, and also to push Assad out.”


Countries Sign The TPP… Whatever Happened To The ‘Debate’ We Were Promised Before Signing?

Representatives from 12 different nations officially signed the Trans Pacific Partnership (TTP) agreement in Auckland, New Zealand...

About an hour ago, representatives from 12 different nations officially signed the Trans Pacific Partnership (TTP) agreement in Auckland, New Zealand. The date, February 4th (New Zealand time) is noteworthy, because it’s 90 days after the official text was released. There was a 90 day clock that was required between releasing the text and before the US could actually sign onto the agreement. The stated purpose of this 90 day clock was in order to allow “debate” about the agreement. Remember, the entire agreement was negotiated in secret, with US officials treating the text of the document as if it were a national security secret (unless you were an industry lobbyist, of course). So as a nod to pretend “transparency” there was a promise that nothing would be signed for 90 days after the text was actually released.
So… uh… what happened to that “debate”? It didn’t happen at all. The TPP was barely mentioned at all by the administration in the last 90 days. Even during the State of the Union, Obama breezed past the TPP with a quick comment, even though it’s supposedly a defining part of his “legacy.” But there’s been no debate. Because there was never any intent for an actual debate. The 90 day clock was just something that was put into the process so that the USTR and the White House couldpretend that there was more “transparency” and that they wouldn’t sign the agreement until after it had been looked at and understood by the public.
Of course, the signing is a totally meaningless bit of theater. The real fight is over ratification. The various countries need to ratify the TPP for the agreement to go into effect. Technically, the TPP will enter into force 60 days after all signers ratify it… or, if that doesn’t happen, within two years if at least six of the 12 participant countries ratify it and those six countries account for 85% of the combined gross domestic product of the 12 countries. Got that? In short, this means that if the US doesn’t ratify it, the TPP is effectively dead. The US needs a majority of both houses of Congress to approve it, similar to a typical bill. And that’s no sure thing right now. Unfortunately, that’s mainly because a group of our elected officials are upset that the TPP doesn’t go far enoughin helping big businesses block competition, but it’s still worth following.
Inevitably, there will be some debate during the ratification process, though there are enough rumors suggesting that no one really wants to do it until after the Presidential election, because people running for President don’t want to reveal that they’re happy to sell out the public’s interest to support a legacy business lobbyist agenda. But, even that debate will likely be fairly limited and almost certainly will avoid the real issues, and real problems, with the TPP.Either way, today’s symbolic signing should really be an exclamation point on the near total lack of transparency and debate in this process. The 90 day window was a perfect opportunity to have an actual discussion about what’s in the TPP and why there are problems with it, but the administration showed absolutely no interest in doing so. And why should it? It already got the deal it wanted behind closed doors. But, at least it can pretend it used these 90 days to be “transparent.”


Border agent: ‘We might as well abolish our immigration laws altogether’

"We might as well abolish our immigration laws altogether," agent says

In a shocking reversal of policy, U.S. Customs and Border Protection agents are being told to release illegal immigrants and no longer order them to appear at deportation hearings, essentially a license to stay in the United States, a key agent testified Thursday.
What’s more, the stand down order includes a requirement that the whereabouts of illegals released are not to be tracked.
“We might as well abolish our immigration laws altogether,” suggested agent Brandon Judd, president of the National Border Patrol Council.
Testifying on the two-year border surge of immigrant youths, Judd said the policy shift was prompted by Obama administration “embarrassment” that just over half of illegals ordered to appear in court actually do.
Read more

Sunday, January 31, 2016

Hackers Allegedly Hijack Drone After Massive Breach at NASA

Hackers release 631 aircraft and radar videos, 2,143 flight logs and data on 2,414 employees

Members of the AnonSec hacking group have released more than 276GB of data after allegedly spending months inside NASA’s internal network.
The collection of files, provided to Infowars by AnonSec admin Dêfãult Vírüsa prior to being made public Sunday, include 631 videos from aircraft and weather radars, 2,143 flight logs as well as the names, email addresses and phone numbers of 2,414 NASA employees.
A “zine,” or self-published paper detailing the hack, dubbed “OpNasaDrones,” reveals everything from AnonSec’s motives to the specific technical vulnerabilities that enabled the extensive breach.
AnonSec1
“NASA has been breached more times than most people can honestly remember… However, this hack into NASA wasn’t initially focused on drones [sic] data and upper atmosphere chemical samples. In fact the original breach into NASA systems wasn’t even planned, it was caught up in a gozi virus spread,” the hackers write, referring to an infamous Trojan that has infected more than 1 million computers to date.
The Hack
After purchasing an “initial foothold” from a hacker with knowledge of NASA servers over two years ago, the group says it began testing how many machines it could “break into” and “root” – a term referring to an account with complete control over a computer or network.
Brute forcing an administrator’s SSH password, which reportedly only took “0.32” seconds due to the credentials being left as default, AnonSec gained further access inside – allowing them to grab even more login data with a hidden packet sniffer (tcpdump).
The hackers say while some members mapped the network, others analyzed the “different missions, airbases and aircraft” listed by the agency. Public missions like “OIB – Operation Ice Bridge” and drones such as the “Global Hawk“ were among those mentioned.
Deleting records of their presence as they hacked deeper into the agency’s system, AnonSec, who even hacked security cameras and uncovered the schematics to one base’s camera layout, then infiltrated the networks at “Glenn Research Center, Goddard Space Flight Center and Dryden Flight Research Center.”
Once inside, the group says it began noticing numerous systems and networked devices “popping up in scans that were not previously visible…”
After sniffing a password belonging to the system administrator, the hackers say they were eventually able to gain full root access to three network-attached storage (NAS) devices tasked with compiling backups of aircraft flight logs.
“Now we had all 3 NAS devices automatically making copies of the logs as they are uploaded from the drones and renaming them to look like semi ordinary index files,” the group writes, mocking the system administrator responsible for protecting the data.
Hackers Attempt to Crash Drone into Pacific Ocean
As the information began flowing unsuspectingly to an AnonSec-controlled server outside of the NASA network, analysis of the data yielded what the hackers described as “weird traffic.”
According to the group, the traffic consisted of “pre-planned route option” files which allow NASA to upload specific flight paths prior to take off.
After protest from several hackers, the group says it decided to carry out a man-in-the-middle (MiTM) attack several months later that replaced the drone route file with one of their own in an attempt to crash the aircraft into the ocean.
“Several members were in disagreement on this because if it worked, we would be labeled terrorists for possibly crashing a $222.7 million US Drone… but we continued anyways lol,” the zine states.
A screenshot from the hackers shows their intended flight path, which they say was cut short after drone pilots on the ground likely noticed the aircraft’s unusual behavior, forcing NASA to restore manual control.
flightpath
“This recreated flight is from our attempt to crash the GlobalHawk [sic] into the Pacific Ocean but seemed to have been taken off of the malicious pre-planned route and was controlled via SatCom [sic] by a pilot once GroundControl [sic] realized,” the hackers write.
Soon after the alleged drone episode, the group says it was completely shut out from NASA’s networks.
“Whether it was the high amount of traffic sending drone logs across their compromised network or the attempted crashing of a GlowbalHawk [sic] that caused them to FINALLY inspect their networks, we don’t know. But it went down for a while soon after.”
“When they came back up several days later, we had completely lost access.”
unavay
Despite NASA’s ability to boot the hackers by changing passwords and patching critical vulnerabilities, vast amounts of information had already been exfiltrated.
“People might find this lack of security surprising but its [sic] pretty standard from our experience,” the group says. “Once you get past the main lines of defense, its [sic] pretty much smooth sailing propagating through a network as long as you can maintain access.”
Aircraft Footage & Flight Logs
The 631 videos siphoned out, filmed during 2012 and 2013, feature footage of weather radar readings as well as both manned and unmanned aircraft in multiple stages of flight.
One 59-minute video from May of 2012 shows one such drone taking off from a NASA runway before cutting out 30 minutes into its mission.
dronetakeoffsmall
Other videos appear to be above large bodies of ice, likely related to the agency’s climate studies.
NASAICESMALL1
Flight logs which seem to coincide with some of the video files include the location of take off, aircraft model, mission name, sensor readings and GPS coordinates.
A screenshot showing a small portion of one log file, possibly from 2014, details the flight of a DC-8 involved in the public “Alternative-Fuel Effects on Contrails and Cruise EmiSSions” project.
FlightLogSmall
The Dox
After examining the list of 2,414 employee names, emails and phone numbers, Infowars was able to confirm the legitimacy of several entries.
EmployeesBlur
Although no calls were answered, names mentioned on each answering machine matched those listed in the hack.
At the time of publishing, Infowars did not receive calls back from any employees on the list or representatives at the Glenn Research Center, Goddard Space Flight Center, Dryden Flight Research Center and the NASA Media Room.
Infowars briefly spoke to NASA’s IT Security Division but did not receive a call back for comment.
Infowars did not receive comment from the FBI after both calling and emailing the agency.
Method Behind the Madness
AnonSec’s zine specifically cites climate engineering methods such as cloud seeding and geoengineering as the main driver behind the hack.
“One of the main purposes of the Operation was to bring awareness to the reality of Chemtrails/CloudSeeding/Geoengineering/WeatherModification, whatever you want to call it, they all represent the same thing. NASA even has several missions dedicated to studying Aerosols [sic] and their affects on the environment and weather, so we targeted their systems.”
Cloud seeding, a weather modification method that uses silver iodide to create precipitation in clouds, was most famously used by the U.S. military under “Operation Popeye” during the Vietnam war. After seeding clouds in the northern part of the country, U.S. forces were able to thwart Viet Cong supply lines by creating heavy rain over the Ho Chi Minh Trail.
Geoengineering, according to NASA’s Erik Conway, involves “injecting sulfate particles into the upper atmosphere – essentially mimicking a large volcanic eruption,” in an attempt to reflect sunlight away from the planet.
A poll conducted by the Independent in 2009, outlined in the article “Climate scientists: it’s time for ‘Plan B,'” states that more than 50 percent of climate scientists support looking into geoengineering.
“Just over half – 54 per cent – of the 80 international specialists in climate science who took part in our survey agreed that the situation is now so dire that we need a backup plan that involves the artificial manipulation of the global climate to counter the effects of man-made emissions of greenhouse gases.”
The hackers link to several mainstream reports and patents as evidence of current weather modification programs.
A 2013 article from Slate entitled, “Climate Intelligence Agency: The CIA is now funding research into manipulating the climate,” examines a 21-month, $630,000 project carried out by The National Academy of Sciences.
“The goal of the CIA-backed NAS study is to conduct a ‘technical evaluation of a limited number of proposed geoengineering techniques,’ according to the NAS website,” the article reads. “Scientists will attempt to determine which geoengineering techniques are feasible and try to evaluate the impacts and risks of each (including ‘national security concerns’).”
Another article from The Telegraph listed by the hackers mentions how “The Chinese government covered Beijing in snow… after meteorologists seeded clouds to bring winter weather to the capital in an effort to combat a lingering drought.”
The hackers argue that if cloud seeding, geoengineering and weather modification “are all publicly acknowledged as real, why are Chemtrails [sic] discredited when its [sic] literally the same exact thing just with a different name?”
“We find it staggering how many people still dont [sic] believe the federal government is doing this when its [sic] already public knowledge that the CIA is funding studies, certain states and countries already have WeatherModification [sic] programs in place for the past several years, not to mention all the government whistleblowers,” the zine says.
AnonSec’s Dêfãult Vírüsa, who spoke with Infowars over encrypted communications, stated that no one involved in the NASA breach has been apprehended by law enforcement.


Krista Branch "Remember Who We Are" Official Video