Showing posts with label NSA. Show all posts
Showing posts with label NSA. Show all posts

Sunday, September 15, 2013

Glenn Greenwald: on Keith Alexander’s NSA Star Trek “Information Dominance Center”


Glenn Greenwald: on Keith Alexander’s NSA Star Trek “Information Dominance Center”
September 15, 2013
http://www.theguardian.com/commentisfree/2013/sep/15/nsa-mind-keith-alexander-star-trek


A lavish Star Trek room he had built as part of his 'Information Dominance Center' is endlessly revealing

It has been previously reported that the mentality of NSA chief Gen. Keith Alexander is captured by his motto "Collect it All". It's a get-everything approach he pioneered first when aimed at an enemy population in the middle of a war zone in Iraq, one he has now imported onto US soil, aimed at the domestic population and everyone else.

But a perhaps even more disturbing and revealing vignette into the spy chief's mind comes from a new Foreign Policy article describing what the journal calls his "all-out, barely-legal drive to build the ultimate spy machine". The article describes how even his NSA peers see him as a "cowboy" willing to play fast and loose with legal limits in order to construct a system of ubiquitous surveillance. But the personality driving all of this - not just Alexander's but much of Washington's - is perhaps best captured by this one passage, highlighted by PBS' News Hour in a post entitled: "NSA director modeled war room after Star Trek's Enterprise". The room was christened as part of the "Information Dominance Center":

"When he was running the Army's Intelligence and Security Command, Alexander brought many of his future allies down to Fort Belvoir for a tour of his base of operations, a facility known as the Information Dominance Center. It had been designed by a Hollywood set designer to mimic the bridge of the starship Enterprise from Star Trek, complete with chrome panels, computer stations, a huge TV monitor on the forward wall, and doors that made a 'whoosh' sound when they slid open and closed. Lawmakers and other important officials took turns sitting in a leather 'captain's chair' in the center of the room and watched as Alexander, a lover of science-fiction movies, showed off his data tools on the big screen.

"'Everybody wanted to sit in the chair at least once to pretend he was Jean-Luc Picard,' says a retired officer in charge of VIP visits."


Numerous commentators remarked yesterday on the meaning of all that (note, too, how "Total Information Awareness" was a major scandal in the Bush years, but "Information Dominance Center" - along with things like "Boundless Informant" - are treated as benign or even noble programs in the age of Obama).

But now, on the website of DBI Architects, Inc. of Washington and Reston, Virginia, there are what purports to be photographs of the actual Star-Trek-like headquarters commissioned by Gen. Alexander that so impressed his Congressional overseers. It's a 10,740 square foot labyrinth in Fort Belvoir, Virginia. The brochure touts how "the prominently positioned chair provides the commanding officer an uninterrupted field of vision to a 22'-0" wide projection screen":
 
The glossy display further describes how "this project involved the renovation of standard office space into a highly classified, ultramodern operations center." Its "primary function is to enable 24-hour worldwide visualization, planning, and execution of coordinated information operations for the US Army and other federal agencies." It gushes: "The futuristic, yet distinctly military, setting is further reinforced by the Commander's console, which gives the illusion that one has boarded
a star ship":


Other photographs of Gen. Alexander's personal Star Trek Captain fantasy come-to-life (courtesy of public funds) are here. Any casual review of human history proves how deeply irrational it is to believe that powerful factions can be trusted to exercise vast surveillance power with little accountability or transparency. But the more they proudly flaunt their warped imperial hubris, the more irrational it becomes.
 

Thursday, August 15, 2013

Smart Meters Exposed as part of NSA 'PRISM' Spying Scam


Smart Meters Exposed as part of NSA 'PRISM' Spying Scam
August 15, 2013

http://www.naturalnews.com/041446_smart_meters_national_mandate_surveillance.html


(NaturalNews) There is a sinister agenda underway to forcibly convert every standard electric meter in the U.S. to the "smart" variety under the guise of promoting renewable energy interests. And one of the latest pieces of Trojan horse legislation pushing for this ominous transformation is the Smart Grid Advancement Act of 2013, introduced by Representative Jerry McNerney (D-Cal.) and co-authored by Rep. Matt Cartwright (D-Penn.), which would force utilities all across the country to convert their customers to smart meters.

The new bill, as stated in a recent press release posted on Rep. McNerney's website, would require virtually all energy utility companies nationwide to implement so-called "smart grid technologies," which in turn would require the installation of smart meters on customers' homes and businesses. Smart meters, as you may already be aware, contain wireless communication components that are not only a serious threat to human health, but also a monumental detriment to personal privacy.

But crafty politicians like Rep. McNerney and Rep. Cartwright are couching the technology as a viable way to help save people money by lowering their electricity bills. This explanation, of course, is meant to divert attention away from the not-so-enticing fact that the technology is really nothing more than a massive, interconnected government spying and control apparatus.

"[The bill] would apparently require all electricity providers, including rural cooperatives and municipal utilities, to join the 'smart' grid and install 'smart' meters," explains the energy freedom advocacy group StopSmartMeters.org.

What else does this inauspicious bill aim to accomplish? According to a summary of the bill, posted as H.R. 2685 at GovTrack.us -- you need to read between the lines to really understand what is being stated in this summary -- certified Energy Star appliances and other energy-saving products will be required to contain wireless technologies capable of communicating with both energy providers and potentially even the government.

"[T]he bill would require appliances with the Energy Star label to include wireless transmitters that cannot be turned off, in order to communicate (and presumably cough up your private data and respond to orders from Big Brother Smart Grid to switch you off at a moment's notice, as happened to dozens of people in Northern California recently when their not-so-smart-AC program cut off their air conditioning at the height of the recent heat wave," adds StopSmartMeters.org.

"The bill would also establish a 'smart grid information center' that would presumably create pro-smart-grid propaganda at the taxpayer's expense."


Smart meters exposed as part of NSA 'PRISM' spying scam

Even worse is the fact that Landis Gyr, a major smart meter manufacturer that describes itself as a "world leader" in smart grid technology, let the cat out of the bag that the National Security Agency (NSA), which we now know actively spies on innocent Americans' phone calls and text messages, also uses smart meters to spy on Americans.

Thanks to a NaturalNews reader tip, we learned that Landis Gyr recently had a company voicemail message that admitted smart meter technology is part of the NSA's "PRISM" spying and surveillance program. Since gaining national attention about this admission, Landis Gyr has apparently altered its company voicemail message to omit this indicting information.


Your help needed to oppose HR 2685, the Smart Meter Trojan Horse Act

H.R. 2685 has been referred to the House Energy and Commerce Committee for consideration, which means this is the first point of contact in effectively killing this bill. StopSmartMeters.org has set up a helpful action page that you can use to contact not only the committee but also the bill's sponsors and the rest of your Congressmen:
http://stopsmartmeters.org

Sources for this article include:

http://mcnerney.house.gov

http://www.govtrack.us

http://stopsmartmeters.org

Learn more: http://www.naturalnews.com/041446_smart_meters_national_mandate_surveillance.html#ixzz2c5XUFfJP

Friday, July 26, 2013

Feds Tell Web Firms to Turn Over User Account Passwords


Feds Tell Web Firms to Turn Over User Account Passwords
July 26, 2013

http://news.cnet.com/8301-13578_3-57595529-38/feds-tell-web-firms-to-turn-over-user-account-passwords/

Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"

Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.

"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University


A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: "No, we don't, and we can't see a circumstance in which we would provide it."

Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has "never" turned over a user's encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. "We take the privacy and security of our users very seriously," the spokesperson said.

A Yahoo spokeswoman would not say whether the company had received such requests. The spokeswoman said: "If we receive a request from law enforcement for a user's password, we deny such requests on the grounds that they would allow overly broad access to our users' private information. If we are required to provide information, we do so only in the strictest interpretation of what is required by law."

Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.

Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn't recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, "we don't get a high volume" of U.S. government demands.

The FBI declined to comment.

Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. "The authority of the government is essentially limitless" under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.

Large Internet companies have resisted the government's requests by arguing that "you don't have the right to operate the account as a person," according to a person familiar with the issue. "I don't know what happens when the government goes to smaller providers and demands user passwords," the person said.

An attorney who represents Internet companies said he has not fielded government password requests, but "we've certainly had reset requests -- if you have the device in your possession, than a password reset is the easier way."

Cracking the codes

Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user's original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.

Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase "National Security Agency" into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.

But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.

The best practice among Silicon Valley companies is to adopt far slower hash algorithms -- designed to take a large fraction of a second to scramble a password -- that have been intentionally crafted to make it more difficult and expensive for the NSA and other attackers to test every possible combination.

One popular algorithm, used by Twitter and LinkedIn, is called bcrypt. A 2009 paper (PDF) by computer scientist Colin Percival estimated that it would cost a mere $4 to crack, in an average of one year, an 8-character bcrypt password composed only of letters. To do it in an average of one day, the hardware cost would jump to approximately $1,500.

But if a password of the same length included numbers, asterisks, punctuation marks, and other special characters, the cost-per-year leaps to $130,000. Increasing the length to any 10 characters, Percival estimated in 2009, brings the estimated cracking cost to a staggering $1.2 billion.

As computers have become more powerful, the cost of cracking bcrypt passwords has decreased. "I'd say as a rough ballpark, the current cost would be around 1/20th of the numbers I have in my paper," said Percival, who founded a company called Tarsnap Backup, which offers "online backups for the truly paranoid." Percival added that a government agency would likely use ASICs -- application-specific integrated circuits -- for password cracking because it's "the most cost-efficient -- at large scale -- approach."

While developing Tarsnap, Percival devised an algorithm called scrypt, which he estimates can make the "cost of a hardware brute-force attack" against a hashed password as much as 4,000 times greater than bcrypt.

Bcrypt was introduced (PDF) at a 1999 Usenix conference by Niels Provos, currently a distinguished engineer in Google's infrastructure group, and David Mazières, an associate professor of computer science at Stanford University.

With the computers available today, "bcrypt won't pipeline very well in hardware," Mazières said, so it would "still be very expensive to do widespread cracking."

Even if "the NSA is asking for access to hashed bcrypt passwords," Mazières said, "that doesn't necessarily mean they are cracking them." Easier approaches, he said, include an order to extract them from the server or network when the user logs in -- which has been done before -- or installing a keylogger at the client.




Sen. Ron Wyden, who warned this week that "the authority of the government is essentially limitless" under the Patriot Act's business records provision.(Credit: Getty Images)

Questions of law

Whether the National Security Agency or FBI has the legal authority to demand that an Internet company divulge a hashed password, salt, and algorithm remains murky.

"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?" said Jennifer Granick, director of civil liberties at Stanford University's Center for Internet and Society. "I don't know."

Granick said she's not aware of any precedent for an Internet company "to provide passwords, encrypted or otherwise, or password algorithms to the government -- for the government to crack passwords and use them unsupervised." If the password will be used to log in to the account, she said, that's "prospective surveillance," which would require a wiretap order or Foreign Intelligence Surveillance Act order.

If the government can subsequently determine the password, "there's a concern that the provider is enabling unauthorized access to the user's account if they do that," Granick said. That could, she said, raise legal issues under the Stored Communications Act and the Computer Fraud and Abuse Act.

The Justice Department has argued in court proceedings before that it has broad legal authority to obtain passwords. In 2011, for instance, federal prosecutors sent a grand jury subpoena demanding the password that would unlock files encrypted with the TrueCrypt utility.

The Florida man who received the subpoena claimed the Fifth Amendment, which protects his right to avoid self-incrimination, allowed him to refuse the prosecutors' demand. In February 2012, the U.S. Court of Appeals for the Eleventh Circuit agreed, saying that because prosecutors could bring a criminal prosecution against him based on the contents of the decrypted files, the man "could not be compelled to decrypt the drives."

In January 2012, a federal district judge in Colorado reached the opposite conclusion, ruling that a criminal defendant could be compelled under the All Writs Act to type in the password that would unlock a Toshiba Satellite laptop.

Both of those cases, however, deal with criminal proceedings when the password holder is the target of an investigation -- and don't address when a hashed password is stored on the servers of a company that's an innocent third party.

"If you can figure out someone's password, you have the ability to reuse the account," which raises significant privacy concerns, said Seth Schoen, a senior staff technologist at theElectronic Frontier Foundation.

Last updated at 8:00 p.m. PT with comment from Yahoo, which responded after this article was published.

Disclosure: McCullagh is married to a Google employee not involved with this issue.

Friday, June 28, 2013

Rappoport Connects the Dots re: Congress the Military IndustrialComplex, NSA, Endless War and of course what Fuels the Whole StinkinMess: BLACKMAIL

Rappoport Connects the Dots re: Congress the Military Industrial Complex, NSA, Endless War and of course what Fuels the Whole Stinkin Mess: BLACKMAIL:
June 28, 2013

I'm in the car on an right hour drive to the Grand Canyon (in the passenger seat) and just read this bombshell. Had to post so using my Blogger app to get this up. I had some previous awareness and understanding of how the system to wage wars worked prior to reading this.. Yet John connected some dots here for me that really helps out the pieces together. Enjoy. ~ BK

We are in the end-times. The dark curtain has been pulled away. And there sits the NSA Wizard of Oz, Master of War, Inc. blinking in the light while robotically pulling the levers of blackmail to foment endless war. His hand shakes. He tries not to notice. It doesn’t work. Not even the “wizard” can go back to sleep.

I told you to go to Rappoport’s blog, but I couldn’t help but repost just one more essay from this master writer and investigator of our current cultural conundrum.

Remember T.S. Eliot?

Things fall apart

The center does not hold.

The best lack all conviction.

And the worst are full of passionate intensity.

These lines kept grinding through my mind during the social and political ferment of the Vietnam War era, when Uranus conjuncted Pluto and all hell broke loose. And now that Uranus has pulled far enough ahead of Pluto so that the two planets are “square,” 90° apart, all hell breaks loose again. This time, however, rather than focus on a the perfidy of a single war, we dive into the roots of all war, what makes the whole sick dynamic go. Hopefully, we’re getting somewhere. Hopefully we can start over again.

But before we reconstruct, we must deconstruct. And it’s not going to be pretty. Top story in the local Herald-Times today: Crane Naval Surface Surface Center (the nearby military base) is furloughing 4500 civilian workers one day a week for a 20% pay cut. There will be more. As those who are affected (and we all are, whether by osmosis, psychosis, or symbiosis) feel the pinch, may they and we also see that the continuing pursual of endless war is both a massive dead end and an ethical travesty. Hopefully, thankfully, we are waking up in time to both consciously suffer the loss of our cozy little consumer comfort zone and be willing to fully surrender to a more or less harsh, more or less flowing, rebirth.

Harsh, or flowing? Just how we move through this difficult time depends upon our level of awareness. It behooves us to wake up to as wide and deep a perspective as our swelling hearts will allow. I can’t imagine any of us are really happy with the way this bullying nation has been acting in the world. I can’t imagine any of us are really okay with the idea is that the only way to get ahead is to destroy everything.

Is the NSA Blackmail Inc. for the military industrial complex?

June 28, 2013

by Jon Rappoport

www.nomorefakenews.com

Every director of the NSA is a general or an admiral.

The NSA is organized under the US Dept. of Defense.

Imagine that you are a powerful player who straddles two worlds—the Dept. of Defense and the private sector where corporate defense-contractors live and flourish.

You’ve served many times in both arenas. Your name is Mr. Military Industrial Complex.

Your mission is war.

The reasons for war don’t matter. Reasons can be invented at the drop of a hat. You want endless armed conflict.

That’s how you make your money. That’s how you express your impulses. That’s your single obsession. That’s how you forward Empire.

You don’t have to justify what you do or consult your conscience. Those days, if they ever existed, are long past. You’re a war-monger and you’re proud of it.

Your basic challenge, on behalf of the military industrial complex, is working the political machinery in Washington—the Congress, the president, the two major Parties—in order to make war happen.

One day, you look around and you say, “I have a whole super-agency at my disposal. It’s organized under the Dept. of Defense. It-called the NSA. It spies on everybody all the time.”

You realize you can use the NSA to collect endless amounts of information on Congress, the White House, the president, the press, and the Democratic and Republican leadership.

Well, the NSA is already doing that.

So the question is: will you use that explosive information, that very private information gained through spying, to coerce these politicians to go to war when you want to go to war?

Is the Pope Catholic?

Of course you’ll use it. You’d be a complete fool not to.

In fact, in the long run, this may well be the most important function of NSA.

Yes. Given your overriding mission in life, it is the most important function of NSA.

It’s job number one.

So you’re going to make sure the resources of the NSA are tuned up quite effectively to extract the information you need.

It’s called blackmail.

It’s called extortion.

It’s beautiful.

It’s the natural use of the NSA, within the overall structure of the military industrial complex.

There are always recalcitrant members of Congress and reluctant presidents who could use a push to go to war.

These politicians, the overwhelming majority of them, are criminals. Let’s face it. They’re remarkably indifferent to human life.

They cheat and lie and steal. They have private secrets. They commit acts that would, if exposed, embarrass them and destroy their pathetic careers.

They’re wonderfully fertile targets for spying and blackmail.

You have the spear. The leading point that can penetrate those secrets.

The NSA.

The logic is perfect and complete.

So you really have two enemies or targets. One, the foreign nation you intend to invade, and two, the politicians you need to convince to support that war.

In light of your latter target, the politicians, these words of Sun Tzu (The Art of War) take on new meaning:

“Attack [your enemy] where he is unprepared, appear where you are not expected.” For example, in a Senator’s hotel suite, with video capability, while he is in the arms of a hooker.

“The general who wins the battle makes many calculations in his temple before the battle.” For example, calculations focusing on politicians’ offshore bank accounts.

In the era of kings and queens, the monarch’s court was rife with intrigue and extortion. We labor under the misapprehension that this has all been cleared up and swept away in the time of “open government.”

Nothing could be further from the truth.

Only means and tools have changed.

Relentless PR projected at the public makes a case for honest, honorable, and embattled politicians. Secondary layers of PR make the case that rabidly morbid partisanship infects political life.

Both of these psyops are cover stories.

The core truth is harsher. Politicians are, overwhelmingly, creatures who have decided whom to sell their souls to.

That’s who they are. People of this stripe always wander off course in their private lives.

The NSA is there to record the wanderings and compile the secrets.

NSA is the elephant in the infested room called Washington.

It remembers everything.

War is war, and preparing to go to war is also war. The military industrial complex needs the NSA to close the deal.

Spying, blackmail.

This is how politicians’ arms are twisted and war is guaranteed.

Things aren’t left to chance. It isn’t, “Maybe some day we’ll go to war or maybe we won’t.”

The military industrial complex sells death. It’s backed up by the largest spying agency in the world, who has red-hot files on politicians’ scandalous private behavior.

From Russ Tice, former intelligence analyst with 20 years of experience at NSA, the US Air Force, the Office of Naval Intelligence, and the Defense Intelligence Agency, in a June 2013 interview with Boiling Frogs:

“They [NSA] went after [spied on] — and I know this because I had my hands literally on the paperwork for these sort of things — they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the — and judicial…

“They went after lawyers and law firms. All kinds of — heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House — their own people.

“Here’s the big one… this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois. You wouldn’t happen to know where that guy lives right now would you? It’s a big white house in Washington, D.C. That’s who they went after, and that’s the president of the United States now.”

Jon Rappoport

The author of two explosive collections, THE MATRIX REVEALED and EXIT FROM THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at www.nomorefakenews.com

Thursday, May 16, 2013

How did we become the Evil Empire?




I received this essay a few days ago. I have edited the text for readability, and corrected the English idioms and expression, English is not the author's first language, but it remains essentially as given in the narrative.  I think you can feel the love of the writer for his flawed and well meaning father who thought he was doing his patriotic duty for his country but awakened too late to realize he was working for corrupt bankers and business interests.  Particularly interesting is how his father's love for his son caused him to confess the true nature of his work and that kept his son from following in the same awful footsteps.  I apologize for the quality of the black and white photos, if I get better versions I will update them.  Perhaps its just as well we can't see all the carnage that is in the photos. The photos below have never been published before, the photo above is a stock photo of the invasion of Iwo Jima.  -AK

How did we become the Evil Empire?
by "A light warrior"
editing and photo enhancement by AK

How did we become the Evil Empire? How did it come to this? The following story it is based in true facts, which I have decided to share with all of you because it is time to spread the truth to the four winds.

Human liberation is at stake.  Every single human being who has information needs expose the iron hands behind the curtains.  This will help end the tyranny we all have been subject to for so long.

You should feel obligated to do so NOW!  The "real truth" if you do not know it by now, is that we have been lied to, duped, used, abused, mind controlled, poisoned and mass murdered for millenniums. Most of us now know our lives are illusion!  It’s an illusion of the most nightmarish kind. So lets all start speaking hard and loud until the veil of ignorance completely falls.

This story is based on my fathers life experiences, his entire life history, the challenges, accomplishments and discoveries throughout his entire life ... an entire lifetime window of wisdom is now opening with the writing of this letter.

I choose to keep his name a mystery because I know he would have liked it that way. I will refer to him as "FATHER".  I know he would have approve of me sharing of this information with you today because he could have not done it itself while alive.  He had "fear" due to his secrecy vows and especially after all he had witnessed through out his military career years. He was constantly tortured by daunting weekly sweating nightmares, which I had to shake him real hard to wake him from.  It seem he was having convulsions while he slept.  He would just say "bad dreams"!

Father never had the opportunity to see how far down the rabbit hole goes. My commitment to my father in his last days was to always tell the truth and be an honorable man! I think father would be proud of me today.  I have seen how deep the rabbit hole goes thanks to him, so here is the "TRUTH" being presented to you today .

Father was a WWII veteran, fought all the way island hoping from the Philippines to Okinawa Japan, he also participated in the Korean war as part of the psychological warfare unit, a unit that secretly experimented on prisoners of war.

Among the experiments he was involved in was finding ways of keeping them complaint and docile while the prisoners were being kept in concentration camps under horribly inhumane conditions.
Our government during this heinous period perpetrated many war crimes, but that is another story in itself.

Related Posts Plugin for WordPress, Blogger...