Aletho News

ΑΛΗΘΩΣ

Richard Clarke: Hastings crash ‘consistent with a car cyberattack’

RT | June 25, 2013

A former cybersecurity advisor to President George W. Bush says a sophisticated computer hack could have been the cause of the automobile accident that claimed the life of journalist Michael Hastings last week in Los Angeles.

Richard Clarke, a State Department official-turned-special advisor to several United States presidents, said the early morning auto crash last Tuesday was “consistent with a car cyberattack,” raising new questions about the death of the award-winning journalist.

Hastings died last week when his 2013 Mercedes C250 coupe collided with a tree in Los Angeles, California on the morning of June 18. He was reportedly traveling at a high rate of speed and failed to stop at a red light moments before the single-car crash. He was only 33.

Speaking to Huffington Post this week, Clarke said that a cyberattack waged at the vehicle could have caused the fatal collision.

“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag,” Clarke told The Huffington Post. “You can do some really highly destructive things now, through hacking a car, and it’s not that hard.”

“So if there were a cyberattack on the car — and I’m not saying there was,” Clarke continued, “I think whoever did it would probably get away with it.”

The Los Angeles Police Department said they don’t expect foul play was involved in the crash, but an investigation has been opened nonetheless.

In an email reportedly sent by Hastings hours before the crash, he told colleagues that he thought he was the target of a federal investigation.

“Hey [redacted}, the Feds are interviewing my ‘close friends and associates,’” Hastings wrote 15 hours before the crash.

“Also: I’m onto a big story, and need to go off the rada[r] for a bit,” he added. “All the best, and hope to see you all soon.”

The email was supplied to KTLA News in Los Angeles by Staff Sgt. Joseph Biggs, who says he met Hastings while the journalist was embedded in Afghanistan in 2008. It was reportedly send to a handful of Hastings’ associates and was blind-copied to Biggs.

“I just said it doesn’t seem like him. I don’t know, I just had this gut feeling and it just really bothered me,” Biggs told KTLA.

Reporters at Buzzfeed where Hastings worked say they received an email from their colleague, but the Federal Bureau of Investigation issued a statement two days after Hastings’ death to quash rumors that they had been looking into the reporter.

“At no time was Michael Hastings under investigation by the FBI,” FBI spokeswoman Laura Eimiller said.

According to the Associated Press, however, Hastings’ fingerprints were on file with the FBI and were used by the bureau to identify his body after flames consumed much the auto wreckage last week.

“I believe the FBI when they say they weren’t investigating him,” Clarke told the Huffington Post. “That was very unusual, and I’m sure they checked very carefully before they said that.”

“I’m not a conspiracy guy. In fact, I’ve spent most of my life knocking down conspiracy theories,” he said. “But my rule has always been you don’t knock down a conspiracy theory until you can prove it . And in the case of Michael Hastings, what evidence is available publicly is consistent with a car cyberattack. And the problem with that is you can’t prove it.”

Clarke, 62, spent nearly two decades at the Pentagon before relocating to the White House where he served under President Ronald Reagan and both Presidents Bush. He served as special advisor to President George W. Bush on cybersecurity until leaving the administration in 2003 and is currently the chairman and CEO of Good Harbor Security Risk Management, LLC.

June 26, 2013 Posted by | Full Spectrum Dominance | , , , , | Leave a comment

Rafael Correa, the Press, and Whistleblowers

By ADAM CHIMIENTI | CounterPunch | June 25, 2013

Once again, we are witnessing a growing frustration with “tiny” Ecuador. The United States government is clearly not happy with what would be the latest diplomatic slap in the face coming from the South American country, i.e. the pending arrival of NSA whistleblower Edward Snowden in the coming days. Beyond the United States’ government though, the US press corps are also seemingly up in arms. Why are they so angry? Well, it appears that they are indignant over the perceived hypocrisy of President Rafael Correa.

According to an article from The Atlantic (and another similar one from NPR here), the Ecuadorian leader “has created a safe space for foreigners like Assange — and now possibly Snowden –[but] he doesn’t do the same for dissenters within his own country.” News agencies like NBC News and The Atlantic think this is “interesting” and want to know ‘Why Ecuador?’ Such inquiries naturally turn to the NGOs, who are also less than pleased with this unruly little country. Freedom House, the Committee to Protect Journalists and others are upset that this very week, the one-year anniversary of Assange being holed up in the Ecuadorian Embassy in London (and the same week that the Snowden asylum request is being reviewed), the Ecuadorian National Assembly has passed a Communications Bill that detractors claim is a major blow to a free press.

Claims of Hypocrisy

For several of the opposition figures and US-based observers, Ecuador’s new media legislation has sealed the deal on the stasi-like state that they imply or openly charge Correa has been dreaming about for years. In other words, transparency advocates like Assange and Snowden are compromising their credibility by associating with the Correa government. Ileana Ros-Lehtinen, the right-wing terrorist supporter/US Congresswoman representing Miami, has been busy tweeting as much. The Ecuadorian government, however, asserts that the bill is meant to place more media power in the hands of public groups and move away from privately owned media monopolies.

Meanwhile, the Council of Hemispheric Relations, Center for Strategic and International Studies, and the Heritage Foundation all say that Ecuador must be punished for this latest insult to the US government. James Roberts of Heritage lashed out at the South American leader on June 24, writing in the National Review Online:

“Rafael Correa has demonstrated a blatant disregard for international standards of justice. That kind of conduct may not be surprising from a man who seeks to don the mantle of Chávez, but it should not be rewarded with trade preferences.”

It doesn’t take much imagination to understand how a figure like Correa would have been dealt with a few decades back, but it appears that the more heavy-handed approach is not really possible at the moment, much to the dismay of the powerful and connected.

Returning to the issue of freedom, has the defiant president of Ecuador used the National Assembly to pass a law that NPR, The Atlantic and others tell us will be used to make the country less transparent and more hostile to journalists who only wish to be free to monitor the government and act as a check on state power? Well, let’s hold off on the most absurd elements of irony here for a moment and address the issue at hand.

About a Coup

It should certainly not be regarded as a good thing if the case was simply a cut-and-dry example of authoritarian overreach. Freedom of the press, as we are learning with the Snowden case, has seemingly never before been so important, or so contentious for that matter. However, the Ecuadorian issue is not so simple and it was certainly complicated after a day of crisis nearly three years earlier when factions of the National Police and armed forces attacked the president of Ecuador on September 30, 2010. The event was widely regarded as a coup attempt. What exactly went down is still somewhat unclear. There was a dramatic showdown between Correa himself and police officers that were angered by a supposed attempt to cut their pay. What is for certain, though, is that it was a countrywide, well-coordinated attempt to shut down the National Assembly, the two major airports in Guayaquil and Quito and eventually a hospital where the president was being treated for wounds. Furthermore, the plotters were also attacking journalists throughout the country, and most of these were pro-government reporters working for public media outlets.

The opposition press has taken an active role in attempts to discredit Correa since he first ran for president. He has elaborated on his views of the press and they are certainly not very congenial. In 2012, during a public TV interview in Spain, Correa said, “one of the main problems around the world is that there are private networks in the communication business, for-profit businesses providing public information, which is very important for society. It is a fundamental contradiction.”

One of the issues that NGOs and journalists have cited in their litany of complaints about Ecuador’s endangered freedom of the press actually stems from the 2010 police and military uprising. During the chaos that ensued during the alleged coup attempt, one reporter from the paper of record in Guayaquil took the opportunity to claim that Correa had ordered police to fire on a crowd of innocent onlookers caught up in the melee, presumably aiming to provoke anti-government sentiments. The claim turned out to be completely unsubstantiated. The government fined the journalist and his paper El Universo some $40 million for defamation but later withdrew the charges. Consider what might have happened in the US if the Los Angeles Times or Washington Post would have falsely claimed that Barack Obama had personally ordered military or police forces to fire on a crowd of protesters and innocent people were injured as a result somewhere in Washington, D.C It would be difficult to imagine a reporter and his editors ever committing such a stupid move, but if they had, there would have been some serious consequences. Alas, this is not really too shocking in the context of a sensationalist Latin American press.

Televised and Untelevised Revolutions

That dramatic Ecuadorian affair is reminiscent of the 2003 documentary film The Revolution Will Not Be Televised,directed by the Irish filmmakers Kim Bartley and Donnacha Ó Briai. The pair happened to be in Caracas, Venezuela during one of several 21st century Latin American coup attempts thus far. The film provided a key glimpse into the nature of media in the region, so often dominated by pro-US elites. It showed the efforts expended by private media outlets to incite anger and get people out in the streets in order to challenge the power of anti-Washington governments.

Right up until his death, it was a sort of requirement for US and European governments, journalists and NGOs to claim that Hugo Chávez Frías was a dictator for not renewing the license of RCTV. The outlet, owned by Marcel Granier, was one of the most virulent anti-government television stations operating on the state-owned airwaves and the Venezuelan government eventually forced them over to cable television. The criticism of the allegedly authoritarian leader served to cover up the very questionable coverage by corporate media. Indeed, one anti-Chávez commentator honestly noted six months ago that the idea that Chavez ever controlled the Venezuelan media was a myth. He pointed out that back in April 2002,

“Coup plotters collaborated with Venezuelan media figures before the coup. The media refused to show statements by officials condemning the coup d’état. When the coup d’état failed, the private Venezuelan networks refused to broadcast the news that Chávez had returned to power.”

“Correa is a Very Smart Guy”

The Venezuelan experience did not escape the attention of the rather astute and confident Correa. Neither did the fact that, only 15 months prior to the attempted coup in Ecuador, there was a successful coup in Honduras, removing the president of that country, Manuel Zelaya, by gunpoint in the middle of the night. This was considered to be illegal by President Obama himself, although soon after the offending and illegitimate new government of Roberto Micheletti was accepted by his administration and is still backed to this day by Washington (under current President Porfirio Lobo). This support comes despite a terrible record of human rights abuses and, yes, a genuine threat to a the flow of crucial information. Journalists have been censored and intimidated since the 2009 coup in Tegucigalpa and, what’s worse, have frequently been murdered by the government and its allies. Honduras consistently ranks as one of the most dangerous places in the world to be a journalist. The double standards are blatant and many would like to see the opinion-makers from the States take a closer look in the mirror.

Popular Support and Popular Media

Anyone who would have spent some time watching The Revolution Will Not Be Televised would have also learned what President Hugo Chávez, then only a mere three years into his presidency, meant to the millions of impoverished and the historically marginalized majority in Venezuela. This did not stop the State Department and its allies from focusing on how best to rid Venezuela of its president. (Incidentally, while doing an internship for the State Department in the fall of 2001, I was invited by the Public Diplomacy department to work on ideas on how to get the message out to Venezuelan people about the dangerous nature of President Chávez.) That coup attempt failed, as the one in Ecuador would eight and a half years later, mainly because the people staunchly backed the president of the Republic.

At the time of the 2002 coup attempt, Chávez was wildly popular and the same was true of Rafael Correa in September 2010; two weeks before the coup attempt, polls found that he had the support of 67% of respondents in the capital Quito and nearly 60% in his native Guayaquil, the second largest city. Correa actually got a nice bump in approval ratings after the whole affair and, more recently, he has just won a major reelection bid in February of this year precisely because he has brought political and economic stability to the country of 15 million people. Poverty has been reduced dramatically since Correa took office. Public works projects have resulted in huge improvements to the country’s infrastructure and, more importantly, there is a sense of independence from the yoke of neocolonialism so prevalent in years past.

It appears that Correa and the government may have some good reasons to increase the influence of publicly owned media companies and challenge private corporate media elites. This foray into press control is a dangerous game, however, especially since there appear to be some genuine concerns from indigenous and environmental activists who oppose the government’s expansive plans for an economy based primarily on extraction. Often, those who disagree with Correa are dismissed as childish Marxists, or more alarmingly, terrorists. There must be more attempts to reach a humane and considerate consensus on some of these crucial issues, especially as the Chinese enter the fray in search of resources to fuel their economic needs and a gateway into South America (and Ecuador recovers from two major oil spills so far this year). There are clearly opportunities, but also responsibilities to the environment and the people that live outside of the metropoles.

With such considerations in mind, is there a reason to agree with the opinion-makers in the US who would dub Correa as a dictator, increasingly revealing his dangerous nature?

One of Correa’s main antagonists is Martin Pallares, a senior political editor at one of the major national newspapers El Comercio. Pallares recently said, “I think freedom of press in Ecuador is gravely threatened by a system managed by the government. They have the objective to discredit the media, affect their credibility. And they also want to characterize the press like political adversaries and destabilization agents.” In a very important sense, the media should or even must by its nature act like political adversaries. Destabilization is a different story however. In the case of the coups in Latin America, there is typically interference by Western powers, especially the United States, and this often serves to destabilize governments Washington deems troublesome (through the funding of local civil society groups via the National Endowment for Democracy, USAID and, of course, the CIA). The message is often that these groups are just trying to further democratic causes, but this belies an obvious mission by colluding corporate and government powers that is evident throughout the many anti-democratic interventions and support of such leaders in postwar history (from Iran in 1953 to both the Maldives and Paraguay in 2012).

Felonious Journalists

Returning to the issue of irony, here you have several of the leading news outlets in the US reporting on the lack of media freedom in Ecuador, yet ignoring the major issues raised by leakers, journalists, and publishers such as Bradley Manning, Julian Assange, Glenn Greenwald and Edward Snowden. In effect, these major corporate outlets are legitimizing or are even themselves guilty of demonization of these individuals who have put everything on the line to get the public talking about some serious violations of human rights and privacy, and the dangerous encroachment of the corporate state. One has to wonder if the fact that many of these commentators themselves are getting paid major corporate money has anything to do with their take on the Snowden/Ecuador affair.

If you watched the Sunday morning talk show highlights, you should be able to draw your own conclusion. One jaw-dropping example of the corporate media’s lack of objectivity in this discussion was the meticulously staged interview that George Stephanopoulos did with General Keith Alexander, the man who has access to the personal data of nearly anyone he so chooses to target. There were several moments in which the responses to some of the host’s softball questions were so weak (lots of babbling about dots) that it was unbelievable that Stephanopoulos didn’t pounce. Yet, why he did not or would not do such a thing is evident considering the establishment’s treatment of the recently departed journalist Michael Hastings, loathed for his refusal to play footsie with the biggest fish in the game. That sort of behavior simply cannot be tolerated.

Also on the talk show rounds, there was David Gregory’s aggressive and ethically revealing accusation thrown at guest Glenn Greenwald in the form of a ‘tough question’. Gregory actually asked Greenwald why he shouldn’t be charged with a crime, and The Guardian columnist sharply replied that it was “pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies”, with no evidence of wrongdoing. But there you have the attitude that the establishment needs to maintain close ties; it mustn’t be overly adversarial and never threaten the stability of the government or a particular administration, even if that means sitting on stories such as the spying on US citizens, like The New York Times was guilty of in 2004 when it delayed publication of a story on government surveillance after being approached by the Bush Administration.

Indy (media) to the Rescue

Modern professional journalism often leaves us wanting for more. Thankfully, we have the independent media outlets that are often way ahead on exposing some of the more heinous crimes of the times. This helps millions around the world identify the mantras of the media elite in the United States: 1) the corporate bias is never to be exposed or acknowledged; 2) it should never be overly adversarial to the government; and 3) a “journalist” should always attempt to divert from important issues that arise from whistleblowing by attacking the whistleblower’s character.

Of course, all of these conventions go out the window when it comes to perceived enemies, in which case the media, NGOs, corporations and the US government always work together in delegitimization and destabilization efforts. Snowden has followed Assange’s lead and is headed to Ecuador not simply because, as The Atlantic has suggested, both parties feel persecuted or they want to ‘poke the US in the eye’. The reason why Ecuador has offered asylum and why Snowden was seeking it from them is because they believe that there is hope in the future, beyond the grossly excessive power of the United States and its presumed worldwide dominion. The whistleblowers and the Ecuadorian leaders, like countless others around the world, believe that the only hopeful way forward is to shatter the antiquated and dangerous notions inherent in establishment journalism, corporate supremacy, and US hegemony. I guess it is no surprise that the privileged classes vehemently disagree.

Adam Chimienti is a teacher and a doctoral student originally from New York. He can be reached at ajchimienti@gmail.com.

June 25, 2013 Posted by | Deception, Full Spectrum Dominance, Mainstream Media, Warmongering | , , , , , , , | Leave a comment

Mandatory Data Retention Defeated in Australia, For Now.

By Daniel Nazer | EFF | June 24, 2013

For the last few years, Australia’s security agencies have been pushing for the mandatory retention of the communications data of every citizen. If implemented, this policy would require private companies to keep communications metadata of all customers for two years. Essentially, it treats every person as a criminal suspect. Yesterday, a parliamentary committee issued a report declining to recommend data retention and strongly criticizing the government for failing to adequately explain and justify its proposal. In the wake of the report, the governing Labor Party announced it will not pursue data retention before the next election. So data retention in Australia has been defeated, for now.

The most recent push began last July, when the Attorney General’s Department submitted a list of security proposals, including data retention, to the Joint Parliamentary Committee on Intelligence and Security. The scheme met with overwhelming public opposition—98.9% of public submissions rejected data retention. Civil rights groups and individuals explained that the scheme sacrifices the privacy of all citizens. Contrary to the government’s claims, collecting metadata is highly intrusive as it reveals the most intimate connections between persons. In addition, the scheme would create a huge trove of data vulnerable to hacking while imposing significant costs on private companies dragooned to act as the government’s spies.

The government failed to rebut these objections. In a ham-fisted attempt to avoid criticism, the Attorney General’s Department initially refused to provide concrete details about its data retention scheme. The committee strongly criticized this lack of transparency:

[T]he Committee was very disconcerted to find, once it commenced its Inquiry, that the Attorney-General’s Department had much more detailed information on the topic of data retention. Departmental work, including discussions with stakeholders, had been undertaken previously. Details of this work had to be drawn from witnesses representing the [department].

Journalist Bernard Keane tweeted that he’d “never seen a government-controlled committee give a kicking to a department” like this report did. In addition to slamming the department for hiding the ball, the committee acknowledged public concern about privacy:

[A] mandatory data retention regime raises fundamental privacy issues, and is arguably a significant extension of the power of the state over the citizen. No such regime should be enacted unless those privacy and civil liberties concerns are sufficiently addressed.

The committee punted on the ultimate issue. It wrote that there was “a diversity of views within the Committee” as to the merits of a data retention regime and said it was “ultimately a decision for Government.” With an election scheduled for later this year, the governing Labor Party announced that it is dropping the unpopular scheme.

Green Party Senator Scott Ludlam cautioned that, even with the defeat of this proposal, Australia’s security agencies might achieve the same result by other means. He warned that, in light of the recent NSA Spying news, agencies may bypass domestic due process through the “wholesale importing of content and non-content data from colleagues in the U.S.” We need greater oversight of the security establishment to ensure that international cooperative agreements are not enabling the evasion of domestic legal restrictions.

Senator Ludlam also predicted that, regardless of who wins the next election, the data retention plan will be back. Security agencies will not abandon their campaign to treat every person like a criminal suspect. Privacy advocates in Australia and around the world need to keep up the fight.

June 25, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , | Leave a comment

Bulgarian scholars call for end to plutocracy

Press TV – June 24, 2013

Sixty prominent Bulgarian intellectuals have issued a special declaration against ‘plutocracy’ in the country, calling for an end to rule by the wealthy and a return to democracy.

The so-called charter for disbanding the plutocratic model of the Bulgarian state was issued on Sunday amid the ongoing protests by Bulgarians to oust the three-week-old government.

“The protests of tens of thousands of people across the country were motivated by the desperate concern about the state system in Bulgaria. Beyond doubt, we are in a deep crisis of the social contract and a total discreditation of the state institutions,” the declaration read.

The protests began on June 14 after the appointment of controversial and inexperienced media mogul Delyan Peevski as chief of Bulgaria’s National Security Agency (DANS).

The declaration called Peevski’s career and public image “a synthesis of all pathological processes that led to the current degrading and seemingly dead-end situation.”

“The Peevski case laid bare the growing seizure of the political system, media, justice, security and banking sectors by a network of hidden dependencies that does not respect the rule of law and separation of powers, empties the institutions from democratic legitimacy and substitutes public interest [with] corruption and moral degradation,” the declaration stated.

The new Socialist-backed Prime Minister Plamen Oresharski withdrew Peevski’s nomination immediately after the protests erupted.

However, the move failed to appease both the protesters and President Rosen Plevneliev, who said he had lost confidence in the government and demanded an immediate review of the controversial appointment.

In addition, the declaration addressed a number of other instances over the past years that proved “the adhesion of oligarchy and power,” urging the public to launch a process to clearly define the problems in the functioning of Bulgaria’s democracy and to draft reforms to abolish them.

It also listed some of the most striking problems, including alienated institutions, easily swayed by corruption, nepotism and weakened judiciary, police and media.

The sixty scholars behind the declaration include lawyers, journalists, political analysts, sociologists and human rights activists.

June 24, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Solidarity and Activism | , , , , , , | Leave a comment

Israel and the NSA Scandal

By Kevin MacDonald | Occidental Observer | June 19, 2013

Steve Sailer has an article on the tie-in between Israeli high tech firms and the NSA spying on American citizens (“Does Israel Have a Backdoor to US Intelligence?“). It’s always seemed very suspicious that Amdocs, an Israeli firm, was responsible for billing for US phone companies, and that two Israeli firms, Narus and Verint, are involved in wiretapping AT&T and Verizon for the NSA. It’s also not surprising that, as noted by James Bamford in his April 2012 article for Wired,  someone with close connections to Israel secretly gave software designed by NSA to Israel:  “the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country.” Bamford’s source describes him as “a very strong supporter of Israel.”

This is likely yet another example of a long list of American Jews who are credibly believed to have spied for Israel, including pretty much the entire roster of prominent neocons (Perle, Wolfowitz, Stephen Bryen, Douglas Feith, and Michael Ledeen; see here, p. 47ff)—none of whom, with the exception of Jonathan Pollard, have been convicted, and many of whom, like the person mentioned here, have never been indicted.  And given this long list, it is certainly reasonable to think that Israel is using its connections with the NSA to mine US data for its own purposes. In fact, it would be silly to think otherwise.

The NYTimes, The Washington Post, and the LATimes have completely ignored the Israeli connection, and you certainly won’t hear about it on FOX news. So, as often happens, one must read Israeli papers. Haaretz (but not neocon The Jerusalem Post) has several articles on the Israeli connection. On the PRISM program that collects data from companies like Google, Facebook, Microsoft and AOL:

The data, gathered by the U.S. National Security Agency’s PRISM surveillance program, came from email accounts, Internet chats, browsing and search histories. The aim was to amass a database through which the NSA could learn whether terror suspects had been in contact with people in the United States.

In contrast to similar cases revealed in the past, the program involved thorough and continuous collection of data, even when no particular person or communications had aroused the authorities’ suspicions. …

Behind the scenes are a host of Israeli companies that have almost certainly taken part in the program as suppliers of technology. They may yet find themselves in the maelstrom, warns Nimrod Kozlovski, head of Tel Aviv University’s program for cyber studies.

“The exposure of PRISM underscores the feeling that communications networks and Internet companies have become the main tool for governments to gather information,” he says. “It is critical for the United States at all times to put a wall of separation between the government and commercial enterprises in order to quiet concerns that it has secret relationships with these companies.”

The concern is not just that the local government is spying on its citizens but that the manufacturers themselves have the ability to spy from afar.

Telecommunications systems almost always feature components that can be operated remotely so that software can be updated and routine maintenance chores can be conducted. … But these same systems can be used to penetrate the user country’s communications network as well. With the United States at the center of the world’s Internet traffic that problem is magnified. (“In U.S. snooping affair, Israeli firms at risk “)

Right. It’s quite possible that Gen. Keith Alexander is telling the truth when he says that the NSA is not mining these data on American citizens, but there’s nothing to stop the Israelis from doing so. The assumption must be that Israel has access to American’s emails and internet usage—very useful for all kinds of reasons, including providing ammunition for those who would destroy anti-Zionists, providing insider information in financial transactions, stealing technology, etc. When someone like Gen. David Petraeus, who had been targeted by the ADL for his statements on Israel,  is suddenly compromised by leaked emails to his mistress, it’s not surprising  that people are wondering at the involvement of the Lobby.

The  Haaretz article continues:

Israeli companies are particularly vulnerable to such suspicions [of spying] because they have such close ties to the country’s security establishment.

“Graduates of the IDF’s technology units and those who have worked in other security bodies have created business opportunities for themselves based in no small part on their previous employment,” said Udi Shani, a former Defense Ministry director general, at the Herzliya Conference last March.

That’s one way to say it. But it’s also quite reasonable that the MOSSAD decided to allow its programmers to use the technology created for MOSSAD’s Unit 8200 and then set up companies that would be able to secure foreign contracts which would be impossible for MOSSAD itself to secure for obvious reasons. Indeed, “Hanan Gefen, a former commander of the unit, told Forbes magazine in 2007 that Comverse’s technology was directly influenced by the technology of 8200.”

MOSSAD doesn’t seem too worried about its technology falling into the hands of its ex-employees. In other words, these companies are likely to be MOSSAD operations in all but name.

And in the U.S., because of the power of the Israel Lobby, there would be no outcry in the media, from politicians, or even from the defense establishment when an Israeli company is awarded a contract to do the spying for the NSA. James Petras says as much:

The domestic spy apparatus operates with impunity because of its network of powerful domestic and overseas allies. The entire bi-partisan Congressional leadership is privy to and complicit with its operations. Related branches of government, like the Internal Revenue Service, cooperate in providing information and pursuing targeted political groups and individuals. Israel is a key overseas ally of the National Security Agency, as has been documented in the Israeli press (Haaretz, June 8, 2013). Two Israeli high tech firms (Verint and Narus) with ties to the Israeli secret police (MOSSAD), have provided the spy software for the NSA and this, of course, has opened a window for Israeli spying in the US against Americans opposed to the Zionist state. The writer and critic, Steve Lendman points out that Israeli spymasters via their software “front companies” have long had the ability to ‘steal proprietary commercial and industrial data” with impunity . And because of the power and influence of the Presidents of the 52 Major American Jewish organizations, Justice Department officials have ordered dozens of Israeli espionage cases to be dropped. The tight Israeli ties to the US spy apparatus serves to prevent deeper scrutiny into its operation and political goals – at a very high price in terms of the security of US citizens. In recent years two incidents stand out: Israeli security ‘experts’ were contracted to advise the Pennsylvania Department of Homeland Security in their investigation and ‘Stasi-like’ repression of government critics and environmental activists (compared to ‘al Queda terrorists’ by the Israelis) – the discovery of which forced the resignation of OHS Director James Powers in 2010. In 2003, New Jersey governor, Jim McGreevy appointed his lover, an Israeli government operative and former IDF officer, to head that state’s ‘Homeland Security Department and later resigned, denouncing the Israeli, Golan Cipel, for blackmail in late 2004. These examples are a small sample illustrating the depth and scope of Israeli police state tactics intersecting in US domestic repression.

From hearing media accounts of NSA spying, the only data on Americans that are collected are the times of phone calls and the identities of the parties in the phone call. But, as noted above, the data collected go well beyond that to include “email accounts, Internet chats, browsing and search histories.” Another Israeli company mentioned in the Haaretz article with very broad-based spying capabilities is NICE, yet another Israeli company with close ties to the Israeli government. NICE “has technology that is used to monitor some 1.5 billion people. In a brochure published by the company itself, it describes how its system can analyze conversations (including technology to make transcripts of phone calls), and gather and analyze data from public sites. With these tools it can build an intelligence file from millions of communications.” NICE’s website describes itself:

NICE solutions capture interactions, transactions and video surveillance from multiple sources, including telephones, CCTV video feed, emergency services radio communications, emails, chat, social media, and more.

In other words, pretty much all communications can be monitored and, if you represent a threat to the people with access to these operations, you must assume that you are being monitored. (I know of no evidence that the NSA employs NICE.)  Although the company claims that its operations are aimed at “customers, criminals and terrorists, or fraudsters,” it’s not at all far-fetched to be suspicious that the information obtained could be used in a very wide range of operations, including insider information on financial affairs. Sailer suggests that fear of having conversations recorded may account for the concentration of elites in urban centers like Washington, DC and New York, and he pointedly links to  his previous article on Jewish wealth, implying that insider information is a key to Jewish wealth. However, even voice conversations are susceptible to NICE’s technology. And the other side of the coin is that it would not be at all surprising to learn that Jewish trading networks are privy to information obtained by companies like NICE.

The situation with the NSA is yet another example of what it means to have a Jewish elite in the  U.S.: Jewish  spies who deliver vital computer  programs to Israel are not indicted. And despite a long history of aggressive spying against the U.S., the NSA hires Israeli firms to do its data collection, with nary a word heard in Congress or the media about the obvious problems that  presents.

It’s good to be king.

June 23, 2013 Posted by | Civil Liberties, Corruption, Deception, Economics, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Timeless or most popular | , , , , , , , , , , , | Leave a comment

New Snowden leak reveals US hacked Chinese cell companies, accessed millions of sms – report

RT | June 23, 2013

US government has been hacking Chinese mobile operator networks to intercept millions of text messages, as well as the operator of region’s fibre optic cable network, South China Morning Post writes citing Edward Snowden.

More information on National Security Agency activity in China and Hong Kong has been revealed by SCMP on Sunday, shedding light on statements Snowden made in an interview on June 12.

“The NSA does all kinds of things like hack Chinese cell phone companies to steal all of your SMS data,” Snowden was quoted as saying on the SCMP website.

In a series of reports the paper claims Snowden has provided proof of extensive US hacking activity in the region.

The former CIA technician and NSA contractor reportedly provided to the paper the documents detailing specific attacks on computers over a four-year period, including internet protocol (IP) addresses, dates of attacks and whether a computer was still being monitored remotely. SCMP however did not reveal any supporting documents.

The US government has been accused of a security breach at the Hong Kong headquarters of the operator of the largest regional fibre optic cable network operator, Pacnet. Back in 2009, the company’s computers were hacked by the NSA but since then the operation has been shut down, according to the documents the paper claims to have seen.

Pacnet’s network spans across Hong Kong, China, Korea, Japan, Taiwan, the Philippines and Singapore and provides connections to 16 data centers for telecom companies, corporations and governments across the region.

The whistleblower has also allegedly revealed the US had viewed millions of text messages by hacking Chinese mobile phone companies. That is a significant claim since the Chinese sent almost billion text messages in 2012 and China Mobile is the world’s largest mobile network carrier.

In his very first leak to the media, Snowden had already exposed the scale of the American government spying operation on its domestic mobile network operators. He later revealed that the US and the UK possessed technology to access the Blackberry phones of delegates at two G20 summit meetings in London in 2009.

In a third article, SCMP claims that the US on a regular basis has been attacking the servers at Tsinghua University, one of country’s biggest research institutions. The whistleblower said that information obtained pointed to hacking activities, because it contained such details as external and internal IP addresses in the University’s network, which could only have been retrieved by a security breach.

Tsinghua University is host to one of Chinas’ six major backbone networks, the China Education and Research Network (CERNET) containing data about millions of Chinese citizens.

June 23, 2013 Posted by | Civil Liberties, Deception, Economics, Full Spectrum Dominance | , , , , , , , , , | Leave a comment

Spying on the World From Domestic Soil

By Katitza Rodriguez | EFF | June 21, 2013

The world is still reeling from the series of revelations about NSA and FBI surveillance. Over the past two weeks the emerging details paint a picture of pervasive, cross-border spying programs of unprecedented reach and scope: the U.S. has now admitted using domestic networks to spy on Internet users both domestically and worldwide. The people now know that foreign intelligence can spy on their communications if they travel through U.S. networks or are stored in U.S. servers.

While international public outrage has justifiably decried the scope and reach of these revelations, carte blanche foreign intelligence surveillance powers over foreigners are far from new. In the U.S., foreign intelligence has always had nearly limitless legal capacity to surveil foreigners because domestic laws and protections simply don’t reach that surveillance activity.

This legal framework, with no protection for foreigners and little oversight besides, has been exacerbated by the growth in individuals now living their lives online, who conduct their most intimate communications in cloud services that are hosted in the U.S. and across different jurisdictions. To make matters worse, the vast amount of Internet traffic globally is routed through the U.S. Last but not least, logistical barriers to powerful, mass surveillance have lowered and the application of existing legal principles in new technological contexts has become unclear and shrouded in secrecy, especially in a extra-territorial surveillance context. The US government’s FISA powers, which in 2008 opened the door to broad surveillance of communications where one side is an American and the other side is a foreigner, represent just an example of an increasing state capacity to conduct nearly limitless invasive extra-territorial surveillance from domestic soil.

International Backlash

On June 18, Germans rallied at a well-known Berlin Wall crossing point called Checkpoint Charlie. Under the motto: “Yes We Scan!” German activists protested against PRISM and NSA surveillance in response to President Barack Obama’s Berlin visit. Pictures of the rally show protest signs claiming that the Obama administration has become “Stasi 2.0” with the quote “All your data belong to us”.

The Stasi 2.0 campaign was originally designed in 2007 to fight Germany’s mandatory data-retention law, a law implementing an EU Directive that force ISPs and telecom providers to continuously collect and store records documenting the online activities of millions of ordinary Europeans. Roughly 34,000 citizens filed a lawsuit against the mandatory data retention in protest. The campaign was successful and in March 2010 a German court declared the law unconstitutional and ordered the deletion of the collected data. Now, the Stasi 2.0 campaign has shifted focus on calling upon their government to protect them against overreach scope of NSA foreign surveillance practices, Sandra Mamitzsch from Digitale Gesellschaft told EFF.

Germany has also increased its capacity to conduct sweeping and invasive extra-territorial surveillance from its domestic soil. As we noted, the German government has leveraged its ability to remotely compromise computer systems in order to spy on its citizens. The government has used commercial malware to hack private data. While there has been no confirmation that Germany is deploying these investigative techniques against persons outside German territories, extra-territorial surveillance is feasible because infection occurs via email and other Internet transmissions.

Campaigns against the NSA spying overreach are now being planned for July 6 all around Australia. Australians can get involved here: http://ourprivacy.org.au/

Micheal Vonn, policy director at the B.C. Civil Liberties Association in Canada, told to the Global News in Canada: “[w]e fully intend to get some pointed questions to the Canadian government about knowledge, complicity, alliance with this program. And whether, in fact, very, very quietly, the Canadian security establishment has been harvesting the fruits of this program for some time.”

EFF is demanding Internet companies to join our cause and protect the privacy of their international customers calling on Congress to create a committee to uncover the truth about the NSA alarming allegations. You can take action here. Current foreign intelligence surveillance targetting foreigners must be challenged to ensure strong human rights safeguards, transparency and accountability across the world. A global dialogue on extra-territorial foreign intelligence surveillance among all nations is much needed.

EFF will continue blogging about the impact of the NSA leaks on Internet users abroad in our Spies Without Borders series. Next, we will examine what implications the government’s use of these FISA powers has for Internet users abroad, with an eye to other jurisdictions and the requirements of international law.

This is the 5th article of our Spies Without Borders series. The series are looking into how the information disclosed in the NSA leaks affect Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks.

Image: Digitale Gesellschaft, licensed under a Creative Commons BY SA 3.0 license.

June 23, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , | Leave a comment

Four Injured, Palestine TV Reporters Kidnapped In Kufur Qaddoum

By Saed Bannoura | IMEMC | June 22, 2013

The Popular Committee Against the Wall and Settlements in Kufur Qaddoum village, near the northern West Bank city of Qalqilia, reported Friday that dozens of Israeli soldiers attacked the weekly nonviolent protest, wounding four residents, and kidnapped reporters of the official Palestine TV.

The Committee said that the soldiers violently attacked and beat reporter Ahmad Shawar and cameraman Bashar Nazzal, working for the Palestinian TV, confiscated their cameras, and threw the rest of their equipment in the trash.

An  Israeli army spokesperson claimed that the kidnapped journalists “attacked the soldiers”, and that they have been transferred to an interrogation facility.

Morad Shteiwy, coordinator of the Popular Committee in the village, has reported that the army surrounded the village since early morning hours Friday, and invaded it in an attempt to prevent the residents from holding their weekly protest against the illegal Annexation Wall and settlements.

“The large number of soldiers deployed in the village could not prevent the determined residents from holding their protest”, Shteiwy said, “the soldiers violently attacked the protesters and fired dozens of gas bombs, concussion grenades, and rubber-coated metal bullets”.

He further said that resident Aqel Mahmoud Shteiwy, 25, was shot with a rubber-coated bullet in his hand, and that one of his fingers was amputated, and added that resident Yousef Mustafa Shteiwy, 21, was shot in the chest, Bassam Ayyoub Shteiwy, 26, was shot in the back and Bashar Mahmoud Shteiwy, 22, was shot in the abdomen.

Also on Friday, soldiers used tear gas, chemical water and rubber-coated steel bullets to attack the weekly protests at the villages of Bil’in and Ni’lin, near the central West Bank city of Ramallah, where residents and their international and Israeli supporters, managed to reach the wall; two protesters were injured and many were treated for the effects of tear gas inhalation.

In Bil’in, gas bombs fired by Israeli troops caused a fire that damaged olive trees owned by local farmers. Soldiers also fired tear gas at residents who tried to put out the fire.

At the nearby village of al Nabi Saleh, Israeli soldiers attacked the villagers and their supporters before leaving the village.

Dozens of soldiers stormed the village and fired gas bombs into resident’s homes. Many were treated for the effects of tear gas inhalation.

In al Ma’sara village, near Bethlehem, dozens of soldiers stopped the villagers and their supporters at the village entrance and then forced them back, using rifle-buts and batons to push people back, no injuries were reported.

June 22, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Solidarity and Activism, Subjugation - Torture | , , , , , | Leave a comment

Reassured by NSA’s Internal Procedures? Don’t Be. They Still Don’t Tell the Whole Story.

By Kurt Opsahl and Mark Rumold | EFF | June 21, 2013

Yesterday, the Guardian released two previously-classified documents describing the internal “minimization” and “targeting” procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA’s vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren’t reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant.

Which would be bad enough, if it were the end of the story. But it’s not.

The targeting and minimization documents released yesterday are dated a few months after the first publicly known scandal over the new FAA procedures: In April 2009, the New York Times reported that Section 702 surveillance had “intercepted the private e-mail messages and phone calls of Americans . . . on a scale that went beyond the broad legal limits established by Congress.” In June 2009, the Times reported that members of Congress were saying NSA’s “recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged.” Rep. Rush Holt described the problems as “so flagrant that they can’t be accidental.”

Presumably, following these “flagrant” abuses (and likely in response to the Congressional criticism of the original procedures), the government refined the procedures. The documents released yesterday are the “improved” targeting and minimization procedures, which appear to have been reused the following year, in 2010, in the FISC’s annual certification.

But these amended procedures still didn’t stop illegal spying under Section 702.

Unless the government substantially changed the procedures between August 2010 and October 2011, these are the very procedures that the FISC eventually found resulted in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA’s classified minimization procedures was unconstitutional. The opinion remains secret, but it is very likely that yesterday’s leaked NSA documents show the very minimization procedures the Director of National Intelligence admitted the FISC had found resulted in surveillance that was “unreasonable under the Fourth Amendment” and “circumvented the spirit of the law.”

And for good reason: the procedures are unconstitutional. They allow for the government to obtain and keep huge amounts of information it could never Constitutionally get without a warrant based on probable cause. As we explained, the procedures are designed such that the NSA will routinely fail to exclude or remove United States persons’ communications, and the removal of those communications are wholly entrusted to the “reasonable discretion” of an analyst.

EFF has been litigating to uncover this critical FISC opinion through the Freedom of Information Act and to uncover the “secret law” the government has been hiding from the American public. And EFF isn’t alone in fighting for the release of these documents. A bipartisan coalition of Senators just announced legislation that would require the Attorney General to declassify significant FISC opinions, a move they say would help put an end to precisely this kind of “secret law.”

When the government, and others, claim these procedures ensure your privacy is respected, know this: they’re only telling you half the story.

Take action now — to put an end to secret law, to demand the American public gets the full story, and to finally put an end to the NSA’s domestic spying program.

June 22, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

Obama picks official who approved of dragnet NSA surveillance to head FBI

RT | June 21, 2013

e1d59-showpicturePresident Barack Obama announced Friday afternoon that he’s selected James Comey to head the Federal Bureau of Investigation.

Comey, 52, worked as the deputy attorney general for the United States under President George W. Bush and will replace outgoing FBI Director Robert Mueller when he steps down later this year after he is confirmed by the Senate.

All three men were on hand at the White House Friday afternoon when President Obama formally made his pick after weeks of speculation suggested Comey would be the likely nominee.

Comey, said Obama, embodies the “core principals of fidelity, bravery and integrity” expected of FBI agents and applauded “his fierce independence and his deep integrity.”

In fact, that independence is the focus of perhaps the most widely reported instance from the Bush White House involving Comey. While serving as deputy attorney general in the Department of Justice, Comey rejected the administration’s warrantless wiretapping program that has recently reemerged as the center of controversy.

“In a confrontation he has called the most difficult night of his career, [Comey] rushed to the hospital bedside of his boss, John Ashcroft, in 2004 to stop two senior Bush White House aides from getting the ailing attorney general’s approval to reauthorize a post-9/11 program that allowed government wiretaps to be used without warrants,” the Associated Press recalled this week.

Comey’s insistence in keeping the program off the books was made notwithstanding an earlier decision to favor the surveillance program, though. Glenn Greenwald reported for The Guardian last month that Comey “approved a legal memorandum in 2004 endorsing radical executive power theories and warped statutory interpretations, concluding that the Bush NSA warrantless eavesdropping program was legal, thus making it more difficult to prosecute the Bush officials who ordered it.”

The internal conflict within the administration that erupted years later over that program almost led to Comey, Ashcroft and Mueller offering their resignation, apparently. As Greenwald noted, though, the then-deputy attorney general declined to follow up on his threat after slight adjustments were made to the NSA spy program.

“But the reason they didn’t end up resigning ,” he wrote, “was because Bush officials ‘modified’ that NSA program into something those lawyers could and did endorse: the still-illegal, still-radical NSA eavesdropping program that spied on the communications of Americans without warrants and in violation of the law.”

Those practices have come under question in recent weeks after Edward Snowden, a 29-year-old former intelligence contractor, leaked documents showing the size and scope of the surveillance programs. Mr. Mueller said those disclosures caused “significant harm” to the nation’s security and that the admitted leaker is the “subject of an ongoing criminal investigation.”

“One of the great vulnerabilities terrorists understand is their communications,” Mueller told the House Judiciary Committee last week. “If we lose our ability get their communications, we are going to be exceptionally vulnerable.”

After being picked by Pres. Obama to replace Mueller on Friday, Comey said, “I don’t know whether I can fill those shoes.” Mueller was FBI chief for 12 years, making him the second-longest serving official to ever head the bureau.

June 22, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , , | Leave a comment

British spy agency has access to global communications, shares info with NSA

RT | June 21, 2013

The British spy agency GCHQ has access to the global network of communications, storing calls, Facebook posts and internet histories – and shares this data with the NSA, Edward Snowden has revealed to the Guardian in a new leak.

GCHQ’s network of cables is able to process massive quantities of information from both specific targets and completely innocent people, including recording phone calls and reading email messages, it was revealed on Friday.

“It’s not just a US problem. The UK has a huge dog in this fight,” Snowden told the Guardian. “They [GCHQ] are worse than the US.”

The Government Communications Headquarters agency has two different programs, aimed at carrying out this online and telephone monitoring – categorized under ‘Mastering the Internet’ and ‘Global Telecoms Exploitation.’ Both have been conducted in the absence of any public knowledge, reports the Guardian.

“If you remember, even the NSA said that they did not record phone calls, but according to these latest revelations by Edward Snowden, that up to ‘600 million’ telephone events last year were recorded a day by the GCHQ,” said RT’s Tesa Arcilla from London.

“There’s no doubt as to what the objectives of these programs were, having put them in place,” she said, emphasizing the titles.

The agency is able to store the volumes of data it amasses from fiber-optic cables for up to 30 days in an operation codenamed Tempora. The practice has been going on for around 18 months.

GCHQ which was handling 600m telephone ‘events’ a day, according to the documents, had tapped into over 200 fiber-optic cables and had the capacity to analyze data from over 46 of them at a time.

The cables used by GCHQ can carry data at 10 gigabits per second, which in theory, means they could deliver up to 21petabytes of information per day. The program is continuing to develop on a daily basis with the agency aiming to expand to the point it is able to process terabits (thousands of gigabits) of data at once.

By May last year, some 300 GCHQ-assigned analysts and 250 from the NSA had been specially allocated large quantities of data to trawl through as a result of the operations.

The Guardian reports that 850,000 NSA and outside contractors had potential access to the databases. However, the paper does not explain how it came to such an enormous figure

“These revelations reveal the scale of and the scope of cooperation between UK and US intelligence services,” said RT’s Gayane Chichakyan from Washington. “From these revelations we learned how dramatically it has expanded over the years.”

“The document shows the FISA court lets the NSA use data snagged ‘inadvertently.’ They basically give a warrant to target suspects,” she said, recalling Lieutenant General Keith Alexander’s quote after a 2008 visit to the Menwith RAF base in England: “Why can’t we collect all the signals all the time? Sounds like a good summer project for Menwith,” he had said.

The GCHQ project was first trialed in 2008. The intelligence organization has been labeled an ‘intelligence superpower’ on account of its technical capabilities, which by 2010 gave it the strongest access to internet communications out of the ‘Five Eyes’ – an international intelligence sharing alliance, including Australia, Canada, New Zealand, the UK and US, brought into existence in 1946.

The mass-surveillance has seen the interception of data from transatlantic cables that also carry data to western Europe through ‘intercept partners’ commercial companies that had entered into private agreements with GCHQ. Many have been paid off for their cooperation.

GCHQ feared that exposure of the names of the companies involved could lead to “high-level political fallout,” and took measures to ensure names were kept secret. Warrants had reportedly been issued to compel the companies to cooperate so that GCHQ could engage in spying through them.

“They have no choice,” said a Guardian intelligence source.

Snowden previously warned that he would be releasing further information pertaining to mass security operations carried out on the unwary public, stating in a previous Q & A with the Guardian that the “truth is coming, and it cannot be stopped.”

June 22, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance | , , , , , , | Leave a comment

Federal Ban on School Prayer Widely Ignored

By Noel Brinkerhoff | AllGov | June 21, 2013

Half a century after the U.S. Supreme Court banned prayer in public classrooms, religion is nonetheless very present in schools these days.

7f06ecc9-300d-4d9e-9166-98f0b20b9f1bIn two landmark decisions (Engel v. Vitale and Abington School District v. Schempp), the Supreme Court in 1962 and 1963 declared school-sponsored prayer and Bible readings unconstitutional.

But the rulings applied only to public school teachers and administrators.

Students were free to say grace in the cafeteria, meet outside class to study the Bible, Quran, or Torah, and participate in religious after-school programs on their campuses.

“We’ve gone from virtual silence about religion in the curriculum and virtually no student religious expression in many schools,” Charles Haynes, a scholar at the First Amendment Center and head of the Religious Freedom Education Project in Washington, DC, told the Christian Science Monitor, “to today, when social studies and other standards are fairly generous to religion, and students are expressing their faiths in many different ways in many public schools, if not most.”

Consider the following facts:

Good News Clubs, organized by the Child Evangelism Fellowship, hold Sunday school-like classes in some 3,200 public elementary schools for 156,000 students.

One million to two million students participate in “See You at the Pole” prayer services every September beneath their campus flagpoles.

The Fellowship of Christian Athletes has more than 8,000 chapters on junior and high school campuses across the country.

Campus Crusade for Christ has about 200 clubs, almost all of them in public schools.

Youth for Christ, an evangelical missionary organization, has on- and off-campus clubs at 1,200 schools, most of them public.

Meanwhile, a poll conducted in 2012 by the National Opinion Research Center showed that 57% of Americans disapprove of the Supreme Court prohibition against public schools requiring the reading of Bible verses or the Lord’s Prayer, while 39% approve. However, there were sharp regional differences. A majority in the Northeast and the West did approve of the prohibition, while in the South 73% disapproved. In addition, Americans age 18-29 differed from their elders, approving of the prohibition 56% to 38%.

To Learn More:

School Prayer: 50 Years after the Ban, God and Faith more Present than Ever (by Lee Lawrence, Christian Science Monitor)

School Prayer 50 Years Later: What Do Americans Believe? (by Jaweed Kaleem, Huffington Post)

High School Valedictorian Sues to Stop Graduation Prayer (by Noel Brinkerhoff, AllGov)

June 21, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , | Leave a comment