May 282017
 

I met my friend, Morpheus (now in federal custody), in 2005 at a meeting of the Libertarian Party of Palm Beach County in Florida. At the time I was struck by how quickly he understood the ethics lessons that I was teaching then. We quickly became good friends and stayed in touch after he moved to Arizona about 6 months later.

In 2012, just 12 months to the day after my wife’s death, I pulled up stakes and moved to the Phoenix area to become part of the freedom activist community in which Morpheus was a well known participant. Since then I’ve had many opportunities to admire his honesty, courage and fortitude in resisting the evils of mala prohibita (victimless “crimes”) enforcement.

The price he has paid for his extraordinary freedom has been severe. He has been robbed of multiple vehicles, beaten, tased, cuffed, kidnapped, strait-jacketed, prosecuted, fined, and caged just for being free – NOT for harming anyone. In fact, he is currently in prison for buying and selling BitCoins – a commodity comprised of strings of numbers and letters. What could be more absurd?

He was arrested on April the 20th while making a BitCoin deal, and then his apartment was raided and he was charged with owning a handful of ammunition that was found in his apartment (no guns though). So now the feds are trying to build a case against him, probably for “money laundering”, but they have as yet not charged him and have not specified a “probable cause” for his arrest. Meanwhile they won’t let him bail because they consider him a “flight risk” – which in fact he is NOT. And he is languishing in prison until a hearing or trial scheduled for August.

So I am appealing to all you freedom-loving, anarchist, libertarian, or constitutionalist, “activists” to ante-up for Morpheus’s defense – because if you don’t step up and help him, there will likely be no one to come to your defense when the Nazi thugs come for YOU… and they will I can guarantee.
I’ve talked to attorney  Marc Victor on Morpheus’s behalf, and he will charge $800 just to go out to where Morpheus is being held and do an initial interview. His actual defense in court is likely to run tens of thousands of dollars.

This case is likely to be a precedent setter. The federal government cannot afford to let anyone buy, sell, or financially transact anything without their demanding a slice of the revenue (in taxes).  So the outcome of this case could result in your total financial enslavement, OR it could set a precedent that will legitimize the first truly free market on the planet in over 8,000 years.

Make no mistake. Unless we defend Morpheus with every resource available to us, his fate will eventually become ours. If you don’t want to rot in some gulag, donate for his defense while you still can.

Via PayPal: borisheir@yahoo.com

Via Bitcoin: 1CnMqpF3dUoHSUg3r4ngAsJoNhSTBU7TY

If you’d like to write to him, here is his address in captivity:
Thomas Costanzo
#373285408
CAFCC WEST
P.O. BOX 6300
Florence, AZ 85132

Live free,

Jun 142013
 

Encrypted e-mail: How much annoyance will you tolerate to keep the NSA away?

How to to encrypt e-mail, and why most don’t bother.

by – June 14 2013, 6:00am USMST

Aurich Lawson

In an age of smartphones and social networking, e-mail may strike many as quaint. But it remains the vehicle that millions of people use every day to send racy love letters, confidential business plans, and other communications both sender and receiver want to keep private. Following last week’s revelations of a secret program that gives the National Security Agency (NSA) access to some e-mails sent over Gmail, Hotmail, and other services—and years after it emerged that the NSA had gained access to full fiber-optic taps of raw Internet traffic—you may be wondering what you can do to keep your messages under wraps.

The answer is public key encryption, and we’ll show you how to use it.

The uses of asymmetry

The full extent of the cooperation between the NSA and various technology companies is unclear. It will probably remain that way for the foreseeable future. For the time being, however, it seems likely that the standard cryptographic tools used to secure data “in flight”—that is to say, the SSL that protects data traveling between machines on the Internet—remain secure as long as certain best practices are used.

That protects against some threats, such as wholesale monitoring of Internet traffic of the kind the NSA is known to engage in, but it doesn’t do anything to protect data that’s “at rest.” That is to say, SSL doesn’t do anything to prevent a company like Google or Microsoft from handing over an archive of your e-mail in response to a court order. The e-mails are just lying around on some Google server somewhere.

If you don’t want a government, service provider, employer, or unauthorized party to have access to your mail at rest, you need to encrypt the mail itself. But most encryption algorithms are symmetric, meaning that the encryption key serves a dual purpose: it both encrypts and decrypts. As such, people encrypting mail with a symmetric key would be able to decrypt other mail that used the same symmetric key. While this would protect against anyone without the key, it wouldn’t be very useful as an encrypted e-mail system.

The solution to this is asymmetric cryptography. In asymmetric encryption there are two opposite keys, and a message encrypted with one key can only be decrypted with the other. The two keys are known as a private key, which as the name might suggest is kept private, and a public key, which is broadcast to the world. Each time you want to send an e-mail to someone, you encrypt it with the recipient’s public key.

Asymmetric encryption is also used to perform mail signing. For this, the mail sender encrypts a hash, or mathematical fingerprint, of their file, producing a signature. Hashes are designed so that any small change to the message’s text will produce a different hash value. Anyone reading the mail can then decrypt the signature using the sender’s public key, giving them the original hash value. They can then compute the hash value of the mail they received and compare the two. If the values are the same, the message hasn’t been modified. If they’re not, it has—and we’ll see the uses of this later on.

Making things even more complex, having encryption support isn’t itself enough. To a great extent, you don’t control the things that are in your own inbox. That’s all mail that someone else has sent you. If you want your inbox to contain encrypted mail that only you can read, you need to be sure that people sending you mail are encrypting that mail when they send it. And if you want to be sure that everything in your sent mail folder is encrypted, you’ll need to send other people encrypted mail.

As a result, e-mail encryption is not something you can impose unilaterally. To protect the contents of your account, you need to ensure that everyone you communicate with is in a position to handle encrypted mail—and is willing to use that ability.

Finally, e-mail encryption doesn’t encrypt everything. Certain metadata—including e-mail addresses of both sender and recipient, time and date of sending, and the e-mail’s subject line—is unencrypted. Only the body of the mail (and any attachments) gets protected.

If you’re happy with these constraints, e-mail encryption is for you. Unfortunately, it can be complicated to use.

Cutting through the complexity

Few e-mail programs have PGP encryption features enabled by default. And even if they do, end users must still navigate a series of mazes that are long and confusing. Tasks include generating the key pair that will lock and unlock the communications and storing the private key in a location where no one else can get it. It also requires securely sharing a public key with every single person who wants to send you a private e-mail and securely getting a unique public key from each person you want to send encrypted e-mail to. No wonder most people—reportedly including Glenn Greenwald, the Guardian reporter who exposed aspects of the secret NSA dragnet—need time getting up to speed.

Fortunately, free e-mail encryption programs are available for all major operating systems, and the ability to use them effectively isn’t out of the grasp of average computer users if they know where to look. What follows is a set of step-by-step instructions for using GnuPG, the open-source implementation of the PGP encryption suite, to send and receive encrypted e-mails on machines running Microsoft Windows and Mac OS X.

After that, we’ll show readers how to use a similar crypto standard called S/MIME, which may prove simpler to deploy because it is already built into many desktop and mobile e-mail clients, including Outlook and Thunderbird. (Interested in S/MIME? Skip directly to page three.)

Linux will be touched on only briefly because much of the functionality is already included in various distributions and because many Linux users already have PGP down cold. (Users are invited to provide Linux instructions and screenshots in the comments following this article.)

PGP on Windows

The basic element you’ll need to encrypt mail is software to generate and manage your key pair and make them work with whatever e-mail program you happen to use. On Windows, there’s no shortage of proprietary apps that will do both, with Symantec’s PGP Desktop E-mail being perhaps the best known. There’s nothing wrong with this offering, but it’s almost $200 for a single-user license. This tutorial will instead focus on the open-source Gnu Privacy Guard, which is available for free on Windows, Mac, and Linux platforms.

GnuPG, or simply GPG, is still available mostly as a command-line tool, meaning there’s no graphical interface many end users would feel more comfortable using. Rather than learn a long list of GPG commands, many e-mail users are better off installing graphical implementation of GPG. On Windows, Gpg4win will give you everything you need to generate strongly encrypted messages that can be sent and later decrypted by the intended receiver using standard e-mail programs.

Enlarge / Download Gpg4win 2.1.1

At time of writing, the most recent version of Gpg4win is 2.1.1 and it’s available here. After downloading such a sensitive piece of software you’ll want to confirm the installer hasn’t been tampered with and truly came from Gpg4win rather than a site masquerading as gpg4win.org. To do that, we’ll need to check the SHA1 checksum for the downloaded file and make sure it matches the hash—a94b292c8944576e06fe8c697d5bb94e365cae25—listed on the Gpg4win download page. For those who prefer a graphical interface, use HashCalc. Install HashCalc and then open the program. In the “data” box, navigate to the folder where the downloaded gpg4win-2.1.1.exe file is located. In our case, since the SHA1 hash calculated by HashCalc matches the SHA1 digest provided on the Gpg4win download page, we have a high degree of confidence the file we’re about to install is genuine.

For readers who prefer command lines, Microsoft’s File Checksum Integrity Verifier may be a better way to check the SHA1 hashes. You’ll need to download and extract the FCIV package and follow the instructions in the readme text file, including making sure the folder containing the FCIV executable file has been added to the system path of Windows. With that out of the way, open a Windows command window and navigate to the folder containing the Gpg4win installer.

Once you’re sure you have the real gpg4win-2.1.1.exe, double-click on the file and click Yes to the User Access Control dialogue. When presented with the Gpg4win installation welcome screen, click Next, and then click Next at the following window to accept the Gpg4win license agreement. The next screen will allow you to choose the precise GPG components you want to install. Make sure you install all available components, including GPA, which is short for the GNU Privacy Assistant. Click Next at the Choose Components screen and again at the Destination and Install Options screens.

The Choose Components screen displayed during the Gpg4win installation.

At the Install Options screen, makes sure the “start menu” box is checked, click Next, and at the next window click Install. We won’t be using S/MIME for now, so if you see any screens referring to Trustable Root Certificates, you can click the box to skip configuration and click Next. The installation is now complete.

When you click on your Start menu and choose All Programs, you should now see a Gpg4win folder. Highlight it and choose GPA. This is the GNU Privacy Assistant. We’ll use it to generate our key pair, and later we’ll use it to store the public keys of people who will receive our encrypted messages. The first time you open GPA, you’ll see a screen asking if you want to generate a private key. That’s exactly what we want to do, so click “Generate key now.”

The Generate Key Now dialog presented by GPA.

In the screens that follow, enter your name and e-mail address. When asked if you want to back up your key, choose “Do it later.” It’s not that this step isn’t important, but we’ll want to back up the key only after we’re satisfied that we’ve done everything correctly. Next, you’ll need to choose a passphrase to protect your key. Your passphrase is like the password protecting an e-mail or Web account. Except rather than preventing an unauthorized person from accessing your account, it prevents the person from using your private key should it ever be lost or stolen. In other words, the password is extremely sensitive. It should have a minimum of nine characters, but 18, 27, or even 36 characters are even better. For more tips on generating a strong password, see Ars Senior Reporter Jon Brodkin’s discussion of master passwords here. When you’re finished, you’ll have generated your first key pair: the public key you will share with other people so they can send encrypted messages that only you can read, and the private key you’ll use to decrypt those messages.

While generating your key, be sure to set an expiration date, rather than allowing it to remain valid forever. This way, keys that new users abandon, lose or never end up using won’t remain on public servers indefinitely. Remember also to backup your private key somewhere that’s extremely safe. Storing it on a USB stick that’s stored in lock box is one suitable method. You may also want to upload your public key to one or more public key servers. These servers give crypto users a way to make their keys available to others and to fetch other people’s public keys.

Now that we’ve generated our first key pair, let’s import the public key of someone else so we’ll have it later when we’re ready to send them our first encrypted e-mail. For this, get someone to give you their public key, preferably in person. It will look something like this:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.17 (MingW32)

mQENBE/FhJ8BCADGhV//J7rdAKow2YlX2SwK5WtouAKnSncsw0gUc59zfMau95xA
dCR/0zhZKUIVA9mvRthJ8YLnFQvaPyoiWq/rZJXRgA3ywA5Bi8aj/TJhHlTRRVIm
llPMmaiKIrCJSG3oC7EXcGHK/ErfgnxIz/4ZGH4SEX9b7ERcjd5HVNgMizeKwNmJ
ml5mUeKDd47H3uTeHkV9Ii5m7T2YHCklgtXtfPV0iIGAI48l3i3CUKiUYdOr96SM
6hglvSI3zOLNOHBDWHO0eRN9g7WDyX2o3GhlXK8B9m631hcyPieqZ7sIKy8O1EYR
u78j5ASB9rvGc07FBCScIpXhkAKbsUet06TTABEBAAG0J0RhbiBHb29kaW4gPGRh
bi5nb29kaW5AYXJzdGVjaG5pY2EuY29tPokBOAQTAQIAIgUCT8WEnwIbAwYLCQgH
AwIGFQgCCQoLBBYCAwECHgECF4AACgkQxc+lYXUQQmw9CggAn5n3zOtWZkGEYOP4
IbTM0l10DEc0gucjFL0wfYqJXv6H7hi9j3K9zxCgBef6EIYRdWtAZScldfX9C1oD
fwJIdSsPJecr3FJ6ia3O6CgilOMQo56kLMp2EzFMJSTog7jxd3MqANHclByVmwZe
6xFvhy+6lCYufDVlNgIAPewOTxzmoXBXWlXHj6ozJhJWEFcBZNB699rhpp9/ZmSY
IePpJJNhFM4pSpKToxZNSvULWC6UNamnPxx/fGEb1HHhf/W276sxny7TzL1P5PAM
J2VrdQHbHPt4LFeTMu/T7j8rs0WYrwAnu2sBZuovPnXcK6JWvm5+k2FSHBCIlbD6
F1zOCbkBDQRPxYSfAQgAyIsC4E4Jbry1SWfNzgUZ3KaXc/yHpKWvXK3iajj0l2gK
BvxbIdWKd1S6Zu3rgLDLzTwWWhR5yMAh5GSXIzUOM8s2DxBDfKUwrYnJeK/AlQrS
hIWEmM+38+q/i4Q65pTJnWkAPQmeoQk8j0DhmPaSPGYXZWFZh6i3ErNQ1IsdE2u4
aNeNW2UZdmjRnK0ys01yrCwF4MC1Y+m74G0UHfpj2i0Esj0YeDR2wnYVMxjhLEkz
SklKYm1j8Tv3CWGaYluQUtn1AGAA6wtM714pLn5DRKuvpu0p/jcY4GajFTTzB3Nj
Kubd61OOvwZfIOw/MyEM3l1DfJSOhjgGwCzPEpGbzwARAQABiQEfBBgBAgAJBQJP
xYSfAhsMAAoJEMXPpWF1EEJsBBMH/jexz65+EnSS49H1q3p8qoM5LygP9b8K2cI4
1vPl3falThGV9EuQ3LifqXOg9BjyitYB09O+ARckzNd81j5kS9HFGJh3PaAbhHkn
IUrCK46Rjz76zOkuunbInkc6Pbg4nHjl/wIHSFQXs7I+4khDJtBh0yFW5rV7yFIG
v8zHSuZJqQ0FpwSJ19gBoBOtAVMKdJYvJRaw+JZcf2xqcYPOZIa/iCSe3LSVnIMV
CXA28ZKQB10tZTm0y1V8fXXLuJd24+bN9hFr3fP1dj/w21EPQP1bCMGtNKCJ1DwR
KTxdheirEBmS/0LO5nS561Y2UMQGhiK3Iku3RVCm7+qZLthAf7Q=
=na8+
-----END PGP PUBLIC KEY BLOCK-----

Take the public key of a real-world contact and save it to a file named something like key.txt. If you don’t have a real-world contact who has a public key, save the above public key to a file and name it key.txt. Now, with GPA open, choose the “Import” icon, navigate to the disk location of key.txt, highlight the file, and click Open. Congratulations. You’ve just imported your first public key. Don’t get too excited just yet. You’ll need to import a public key for each person you want to send encrypted mail to.

Jun 132013
 

Building America’s secret surveillance state

By James Bamford

Wed Jun 12, 2013 3:05pm EDT

(Reuters) – “God we trust,” goes an old National Security Agency joke. “All others we monitor.

First, the Guardian reported details on a domestic telephone dragnet in which Verizon was forced to give the NSA details about all domestic, and even local, telephone calls. Then the Guardian and the Washington Post revealed another massive NSA surveillance program, called Prism, that required the country’s major Internet companies to secretly pass along data including email, photos, videos, chat services, file transfers, stored data, log-ins and video conferencing.

While the Obama administration and Senate intelligence committee members defend the spying as crucial in its fight against terrorism, this is only the latest chapter in nearly a century of pressure on telecommunications companies to secretly cooperate with NSA and its predecessors. But as stunning technology advances allow more and more personal information to pass across those links, the dangers of the United States turning into a secret surveillance state increase exponentially.

The NSA was so flooded with billions of dollars from post-September 11, 2001 budget increases that it went on a building spree and also expanded its eavesdropping capabilities enormously. Secret rooms were built in giant telecom facilities, such as AT&T’s 10-story “switch” in San Francisco. There, mirror copies of incoming data and telephone cables are routed into rooms filled with special hardware and software to filter out email and phone calls for transmission to NSA for analysis.

New spy satellites were launched and new listening posts were built – such as the recently opened operations center near Augusta, Ga. Designed to hold more than 4,000 earphone-clad eavesdroppers, it is the largest electronic spy base in the world.

Meanwhile, at Oak Ridge National Laboratory in Tennessee, where top-secret work was done on the atomic bomb during World War II, the NSA is secretly building the world’s fastest and most powerful computer. Designed to run at exaflop speed, executing a million trillion operations per second, it will be able to sift through enormous quantities of data – for example, all the phone numbers dialed in the United States every day.

Today the NSA is the world’s largest spy organization, encompassing tens of thousands of employees and occupying a city-size headquarters complex on Fort Meade in Maryland. But in 1920, its earliest predecessor, known as the Black Chamber, fit into a slim townhouse on Manhattan’s East 37th Street.

World War One had recently ended, along with official censorship, and the Radio Communication Act of 1912 was again in effect. This legislation guaranteed the secrecy of electronic communications and meted out harsh penalties for any telegraph company employee who divulged the contents of a message. To the Black Chamber, however, the bill represented a large obstacle to be overcome—illegally, if necessary.

So the Black Chamber chief, Herbert O. Yardley, and his boss in Washington, General Marlborough Churchill, head of the Military Intelligence Division, paid a visit to 195 Broadway in downtown Manhattan, headquarters of Western Union. This was the nation’s largest telegram company – the email of that day.

The two government officials took the elevator to the 24th floor for a secret meeting with Western Union’s president, Newcomb Carlton. Their object was to convince him to grant them secret access to the private communications zapping through his company’s wires.

It was easier achieved than Yardley had ever imagined. “After the men had put all our cards on the table,” Yardley later described, “President Carlton seemed anxious to do everything he could for us.'”

Time and again over the decades, this pattern has been repeated. The NSA, or a predecessor, secretly entered into agreements with the country’s major telecommunications companies and illegally gained access to Americans’ private communications.

In a much-cited story, the influential Republican statesman, Henry L. Stimson, was described as deeply offended by the very notion of snooping into people’s private communications. As the new secretary of state in 1929, Stimson shut down the Black Chamber with the now immortal phrase, “Gentlemen do not read each other’s mail.”

But when President Franklin D. Roosevelt later appointed Stimson secretary of war during World War Two, Stimson changed his mind. He wanted to eavesdrop on every possible communication, especially on the Germans and Japanese.

Once the guns of World War Two began falling silent, however, the communications privacy laws again took effect. Thus, Brigadier General W. Preston Corderman, the chief of the Signals Intelligence Service – another pre-NSA iteration — faced the same dilemma Yardley confronted after World War One: a lack of access to the cables flowing into, out of and through the country.

So, once again, deals were made with the major telegraph companies – the Internet providers of the day – to grant the SIS (and later the NSA) secret access to their communications.

Codenamed “Operation Shamrock,” agents would arrive at the back door at each telecom headquarters in New York around midnight; pick up all that days telegraph traffic, and bring it to an office masquerading as a television tape processing company. There they would use a machine to duplicate all the computer tapes containing the telegrams, and, hours later, return the original tapes to the company.

The secret agreement lasted for 30 years. It only ended in 1975, when the nation was shocked by a series of stunning intelligence revelations uncovered by a congressional investigation led by Senator Frank Church.

The illegality and vast breadth of this one operation stunned both the left and the right, Republicans as well as Democrats. The parties came together to create a new law to make sure nothing like it could ever happen again. Known as the Foreign Intelligence Surveillance Act, the legislation created a secret court, the Foreign Intelligence Surveillance Court, to ensure that the NSA only eavesdropped on Americans when there was probable cause to suspect they were involved in serious national security crimes — such as espionage or terrorism.

For more than a quarter-century, the NSA obeyed this law. The intelligence agency turned its giant ears outward — away from the everyday lives of Americans. But that all changed soon after September 11, 2001, when the Bush administration began its warrantless wiretapping program.

Once again, an NSA director sought the secret cooperation of the nation’s telecom industry to gain access to its communications channels and links. Again, the companies agreed — despite violating the laws and the privacy of their tens of millions of customers. Eventually, when the operation was discovered, a number of groups brought suit against the companies, Congress passed legislation granting them immunity.

Thus, for roughly 100 years, whenever the government knocked on the telecommunications industry’s door and asked them to break the law and turn over millions upon millions of private communications, the telecoms complied. Why not, since they knew that nothing would ever happen to them if they broke the law.

Now, as a result of these new revelations, it appears that the NSA has again gone to Verizon and other telephone companies, as well as many of the giant Internet companies, and obtained secret access to millions, if not billions, of private communications. There are still many questions as to what, if any, legal justification was used.

But unlike with Yardley and the Black Chamber, the dangers today of secret cooperation between the telecom and Internet industry and the NSA are incomparable. Because of technology back then, the only data the government was able to obtain were telegrams — which few average people sent or received.

Today, however, access to someone’s telephone records and Internet activity can provide an incredibly intimate window on their life.

Phone data reveals whom they call, where they call, how often they call someone, where they are calling from and how long they speak to each person. Internet data provides e-mail content, Google searches, pictures, and personal and financial details.

We now live in an era when access to someone’s email account and web searches can paint a more detailed picture of their life then most personal diaries. Secret agreements between intelligence agencies and communications companies should not be allowed in a democracy. There is too much at risk.

In a dusty corner of Utah, NSA is now completing construction of a mammoth new building, a one-million-square foot data warehouse for storing the billions of communications it is intercepting. If the century-old custom of secret back-room deals between NSA and the telecoms is permitted to continue, all of us may digitally end up there.

Contrary to what Simpson may have asserted, gentlemen (and women) do read each other’s mail — at least if they work for the National Security Agency.

And in the future, given NSA’s unrestrained push into advanced technologies, the agency may also be able to read your thoughts as well as your mail.

(James Bamford is a Reuters columnist but his opinions are his own.)

(James Bamford writes frequently on intelligence and produces documentaries for PBS. His latest book is “The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America.”)

Apr 292013
 

The BORG is ready for War with YOU!

By Morpheus – with Bob Podolsky

Fargo is North Dakota’s largest city, yet its placid lifestyle seldom sees the chaos common in other urban communities.  This quiet city has averaged fewer than two homicides a year since 2005, and there’s not been a single international terrorism prosecution in the last decade.

But that hasn’t stopped BORG Agents in Fargo and its surrounding county from going on an $8 million buying binge to arm police officers with the sort of gear once reserved only for soldiers fighting foreign wars.

Borg Police armored truck

Every paramilitary BORG squad car in Fargo, is equipped today with an assault rifle and Kevlar helmets, able to withstand incoming fire from battlefield-grade ammunition. BORG officers can now summon a new $256,643 armored truck, complete with a rotating turret. The truck is used at the annual city picnic, where it’s been parked near the children’s bounce house. This way the BORG can CON-vince the populace what a great investment it has made by spending stolen funds, known to the BORG as taxes, granted to the city by the federal government.

“Most people are so fascinated by it [the armored truck], because nothing happens here,” says Carol Archbold, a Fargo resident and criminal justice professor and spokesperson for the BORG at North Dakota State University. “There’s no terrorism here.”  In reality the eyesore activates the Reticular Activating System in the brain that stimulates levels of FEAR in the minds of unawakened people in the quiet town.

Thousands of other local police departments nationwide have been amassing stockpiles of military-style equipment in the name of homeland security, aided by more than $34 billion in Stolen Funds by federal grants since the False Flag terrorist attacks on Sept. 11, 2001.

The buying spree has continued the transformation of local peace keeping departments into paramilitary-like forces, and using intimidating equipment to strike fear into the minds of civilians is no doubt part of the overall psychology of the BORG agents.  Without this constant low level of fear, concerning a problem that the BORG created in the first place, what need for this parasite would there be?

“The argument for up-armoring is always based on the least likely of terrorist scenarios,” says Mark Randol, a former BORG terrorism expert at the Congressional Research Service, the nonpartisan research arm of Congress. “Anyone can get a gun and shoot up stuff. No amount of SWAT equipment can stop that.”  It needs to be noted that the government’s passage of such freedom destroying legislation such as SB 1867, turns all Americans into potential terrorists. SB 1867 follows in the footsteps of Bill of Rights nullifying “Patriot Act” with provisions to murder and detain INDEFINITELY any malcontented American to places like Guantanamo, Cuba without trial or due process.

BORG Agents and their PR firms known as “The News”, aptly known as the “Lame Stream Media” (LSM), become hostile at the mere suggestion that police agencies have become “militarized”.  They justify the need by citing examples for these upgrades in firepower and other equipment by claiming it is necessary to combat criminals with more lethal capabilities. Or at least criminals not franchised by the BORG.  They never seem to mention that governments kill more people than all other criminals combined!  They point to the 1997 Los Angeles bank robbers who pinned police for hours with assault weapons, the gun-wielding student who perpetrated the Virginia Tech massacre in 2007.  The LSM are generally complacent in mentioning examples where armed members of We the people have thwarted criminal activity.

The new weaponry and battle gear, they insist, helps save lives in the face of such threats. “I don’t see us as militarizing police; I see us as keeping abreast with society,” former Los Angeles Police Chief (and BORG Agent) William Bratton says. “And we are a gun-crazy society.”  In reality, the BORG is scared to death of the populace, as one day they may wake up from their mass hypnosis and realize the BORG is the problem – not the solution.

BORG agent and Police Lt. Ross Renner, who commands the regional SWAT team: “It’s foolish to not be cognizant of the threats out there, whether it’s New York, Los Angeles, or Fargo. Our residents have the right to be protected. We don’t have everyday threats here when it comes to terrorism, but we are asked to be prepared.”  Actually the BORG asked themselves and they agreed with the decision they made already:  to continue to inspire FEAR into the hearts and minds of people everywhere as a mechanism to continue the extortion by stealing money from We The People to “protect us” from the boogeyman they, the BORG, created in the first place.  It is Paramount to note when the populace WAKES UP and gets uppity about being robbed from, their rights being turned into privileges, and being turned into SLAVES, the BORG have all the necessary hardware to quell any SLAVE rebellion.

The skepticism about the Homeland spending spree is less severe for Washington, D.C., Los Angeles and New York, which the BORG, have determined to be their likely targets. The nagging question persists:  is the stolen tax money handed out without any regard for risk assessment or need?  Adding insult to injury is gap in accounting for the decade-long spending spree. The BORG-U.S. Homeland Security Department says it doesn’t closely track what’s been bought with its tax dollars or how the equipment is used. BORG in State and local governments don’t maintain uniform records either.  The BORG have no problem monitoring every single phone call, email and financial transaction We The People make; but when it comes to monitoring how the money (taxes) stolen from We the People is spent on military hardware, that’s not even a little bit necessary.

Mar 052013
 

BORG DHS Purchases 2,700 Light-Armored Tanks

Adds to 1.6 Billion Bullet Stockpile

This is getting a little creepy.
According to one estimate, since last year the Department of Homeland Security has stockpiled more than 1.6 billion bullets, mainly .40 caliber and 9mm.

DHS also purchased 2,700 Mine Resistant Armor Protected Vehicles (MRAP).
homeland security mrap

Modern Survival Blog reported:

The Department of Homeland Security (through the U.S. Army Forces Command) recently retrofitted 2,717 of these ‘Mine Resistant Protected’ vehicles for service on the streets of the United States.

Although I’ve seen and read several online blurbs about this vehicle of late, I decided to dig slightly deeper and discover more about the vehicle itself.

The new DHS sanctioned ‘Street Sweeper’ (my own slang due to the gun ports) is built by Navistar Defense (NavistarDefense.com), a division within the Navistar organization. Under the Navistar umbrella are several other companies including International Trucks, IC Bus (they make school buses), Monaco RV (recreational vehicles), WorkHorse (they make chassis), MaxxForce (diesel engines), and Navistar Financial (the money arm of the company).

DHS even released a video on their newly purchased MRAPs.
Via Pat Dollard:

The MRAP featured in this video is was in Albuquerque, New Mexico for Law Enforcement Day which was held at a local area Target Store. This MRAP is stationed in El Paso, Texas at The Homeland Security Investigations Office. MRAP is a Mine Resistant Armor Protected Vehicle.