Tag Archive: IP address


Published time: August 06, 2013 16:17
Edited time: August 07, 2013 14:14

Reuters / Ueslei Marcelino

Reuters / Ueslei Marcelino

Someone in the Senate isn’t a fan of Edward Snowden, and they’re using Wikipedia to get their point across.

The Wikipedia page for the man responsible for leaking classified National Security Agency files to the media has been updated hundreds of times since he started sharing sensitive documents in early June, but one of those revisions — and a questionable one at that — comes courtesy of someone in the United States Senate.

On Friday, someone logged into Wikipedia and changed a line in Snowden’s biography from “American dissident” to “American traitor.” Joe Klock at The Daily Dot website was the first one to report on the edit, and quickly noticed that the revision was made from a computer connected to the Internet from within the walls of a US Senate building.

The word change only stayed on the Snowden page for around one minute, but it still managed to create quite a stir.

On a discussion page for the entry, one Wikipedia editor confirmed that the change was made by someone with access to a Senate computer.

The edit was made by this IP and the IP does belong to the US Senate. The edit was reverted within 1 minute due to the fact that it does not reflect a neutral point of view which is one of the Five Pillars that governs how Wikipedia operates. In that way, Wikipedia not only performed as it should but it did so incredibly quickly,” the post reads.

Nailing the perpetrator responsible for that single edit will likely be task all too impossible, though. While the IP address behind the change is indeed registered to the Senate, it isn’t restricted to one particular user.

If the agency or facility uses proxy servers, this IP address may represent many users at many personal computers or devices,” the discussion page acknowledges.

Screenshot from wikipedia.org

Screenshot from wikipedia.org

Read More  Here

Enhanced by Zemanta

In the  Administrations  own  words  cyber  attacks  against the  United  States  would  be  interpreted  as  a  declaration of   war. 

Are  we   then to  understand that   cyber  attacks  perpetrated  by the  United  States  against other  countries (Mostly  allies)  are  a  declaration of  war  as  well?

Are  we  also to  understand that  the United  States government (including those in  Congress  who legitimize the  Prism  program) have now  openly  declared  war  upon the  American  people with this  attack on the Tor Network being used  to escape  their snooping and  ever increasing  invasion of  privacy?

Are  we  not  to  use the  same  measure  that  they have  reserved  for  themselves  in the  name  of  National  Security?

How  long and  how  far  will  this  be allowed to  continue without  being  called into  question?

~Desert Rose~

***************************************************

NSA’s Cyber Army Attacks the Navy’s Tor Network, Gives Spoils to the FBI

Dees Illustration

Eric Blair
Activist Post

It was reported earlier this week that the FBI won a great victory by stopping the largest child porn distributor on the Internet. The FBI’s victory lap was cut short when some of the details of how they did it were more closely examined.

What the FBI actually did was seize a hosting service on the hidden TOR Network.  The owner of the hosting service Freedom Hosting was not directly involved in the production or distribution of child porn, he just provided anonymous hosting used by pedophile pornographers.

The bigger question became how the FBI penetrated the supposedly anonymous TOR Network. That’s where the story gets interesting.

TOR, short for The Onion Router, was originally developed by the Navy Research Laboratory to provide an anonymous secondary internetwork for the government to use.  Supposedly the project was abandoned by the Navy only to be picked up by open-source volunteers who now run the Tor Project.

Despite its beginnings as a government project, most believe TOR to be the best current option for online anonymity.  But does this recent compromise of TOR reveal that it’s also part of the surveillance grid?  The long answer is complicated, but the short answer is no.

First, the NSA has been identified as the source of the malware bomb used to take down Freedom Hosting – not the FBI who claimed victory in the investigation and apprehension.

Arstechnica writes:

Malware planted on the servers of Freedom Hosting—the “hidden service” hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).

Read More Here

Enhanced by Zemanta

This serves as a strong warning to those who value their anonymity. If you aren’t already accessing the Internet through VPN or another deidentifying service, you may be ‘on the list.’ Go silent today! VPN is one effective option. I use TOR. VPN will allow you to use some services that TOR blocks to protect you, but VPN costs money and TOR is free.

Important Message From JWR: The FBI’s Cookie Caper and the VPN Imperative

It has just come to my attention that from August of 2011 to November of 2011, the FBI secretly redirected the web traffic of more than 10% of SurvivalBlog’s US visitors through CJIS, a sprawling data center situated on 900 acres, 10 miles from Clarksburg, West Virginia. There, the Feebees were surreptitiously collecting the IP addresses of my site visitors. In all, 4,906 of 35,494 connections ended up going to or through the FBI servers. (Note that this happened several months before we moved our primary server to Sweden.) Furthermore, we discovered that the FBI attached a long-lived cookie that allowed them to track the sites that readers subsequently visited. I suspect that the FBI has done the same to hundreds of other web sites. I find this situation totally abhorrent, and contrary to the letter of 4th Amendment as well as the intent of our Founding Fathers.

I recognize that I am making this announcement at the risk of losing some readers. So be it. But I felt compelled to tell my readers immediately, because it was the honorable and forthright course of action.

Working on my behalf, some volunteer web forensics experts dissected some cached version histories. (Just about everything is available on the Internet, and the footprints and cookie crumb trails that you leave are essentially there for a lifetime.) The volunteers found that the bulk of the FBI redirects were selected because of a reader’s association with “Intellectual Property” infringing sites like the now defunct Megaupload. But once redirected, you were assigned a cookie. However, some of these were direct connections to the SurvivalBlog site (around 4% of the total.) So if they had kept this practice up long enough and if you visited us enough times then the FBI’s computers would have given you a cookie. This has been verified with sniffer software.

Bad Cop, No Cookies

For your privacy, I strongly recommend that you disable cookies when web browsing. Here are some detailed instructions on how to do so for the most popular web browsers:
•Disabling Cookies in MS Internet Explorer
•Disabling Cookies in Firefox
•Disabling Cookies in Safari
•Disabling Cookies in Netscape
•Disabling Cookies in Google Chrome
•Disabling Cookies in Opera
•Disabling Cookies in Konqueror

But beyond that, more must be done to protect your privacy. You need to be proactive.

Install and Use VPN!

I am now imploring all SurvivalBlog readers to immediately install and use Virtual Private Network (VPN) on their computers. This will allow you to surf the Internet anonymously. Anyone that tries to track web site visitors e-mails will see your visit as originating from one of dozens of anonymous URLs in Europe, or elsewhere in the United States. (With most VPN services, you may pick the city of your choice.) With VPN active, your connection to the Web is “tunneled”, emerging at a far-distant IP address, and it it would be very difficult to track back to your home IP address. Setting up VPN takes just a few minute to accomplish. Once installed, you can set VPN to turn on automatically by default when you start your PC, Mac, or Linux computer. Most VPN providers charge $5 to $20 per month. You can toggle off VPN with the click of your mouse. (You will find this necessary if you visit any of the few web site that disallow overseas IP addresses, such as Netflix). But I recommend that you leave VPN turned on, as much as possible. Set it up to turn on each time that you start up your computer. It is crucial that you use VPN whenever you visit web sites, blogs, and forums that are deemed politically incorrect, or whenever you purchase storage food or firearms accessories on the Web. For those of you that are not tech savvy, ask a friend or relative under age 25 to set up VPN for you. It is not difficult.

Some recommended VPN service providers include:

  • StrongVPN ($55 to $240 per year. One of the most flexible in reassigning the far end of your tunnel on the fly. Superior speed.)
  • 12VPN ($79 per year.)
  • AceVPN ($55 per year. A bare bones service, but one of the least expensive.)
  • HideMyAss. (Just under $79 per year.)
  • PureVPN. ($75 per year for their basic service.)

(Some reviews of the various services are available here. )

Note that some of the lower cost services might see your connection speed suffer. Your Internet connect will seem noticeably slower than using your original ISP, alone.

It is my hope that in the next two months SurvivalBlog’s site visit map will shift substantially, giving the appearance that most of my readership has moved to Switzerland. Say “Ein Glück, dass wir den los sind” to the FBI’s snooping! It would warm my heart to soon see SurvivalBlog ranked as one of the most popular web sites for readers with Swiss IP addresses.

Beyond VPN

Because government agencies have access to lots and lots of computing power, VPN is not completely impenetrable. It is vulnerable to penetration during the key exchange phase. With the resources available to a state actor, sniffing the entirety of the traffic into and out of a web site is trivial these days. (They can use massively scalable horizontally-scaled virtual sniffers — i.e. using a visualization engine and a template they can keep adding more virtualized instances of a windows or Linux based sniffer program and not even impact the performance of the connections.) I believe that the next loop of the threat spiral in the privacy wars will be Quantum Key Distribution (QKD). But I must clarify that this will become important only for the most high profile media commentators, bloggers, and activists. This is because all the spook legions with all of the mainframe computers in the world simply cannot backtrack everyone’s VPN tunnels. (And, as VPN becomes more and more popular, this supposed goal will become even more elusive.) And if you are high profile, don’t worry. Some very bright people are already working on QKD. Stay tuned.

Our Liberty is Stake

I want apologize for the cost, inconvenience and time required in implementing the foregoing security measures. But you can sleep a little better, knowing that you’ve added a layer of anonymity to your Internet presence. We need to recognize that the early 21st Century is a delicate time for individual liberty. Technology is leapfrogging while at the same time databases are filling at an alarming rate. These databases could provide dossiers on demand, for nefarious purposes. How you vote and how you “vote with your feet” (physically or virtually) are both of tremendous importance. Pray hard. Choose wisely. Act accordingly.

P.S.: For those who are web software savvy, I had originally planned to post the latest version of the actual “foresee-alive.js” Javascript code that the FBI used to attach the cookies. But then it was pointed out to me that ironically, revealing this might constitute copyright infringement, opening me up to a intellectual property lawsuit. That has an odd sort of irony that got me thinking. This predicament somehow dovetails with two bits of history. The first instance is from the First World War: I have read that the U.S. Government paid patent license fees to Mauser before and during the hostilities of the Great War with Imperial Germany. This was because the M1903 Springfield rifle was correctly adjudged a patent infringement on the Mauser Model 1898. During the war, the patent payments continued, conveniently handled by Swiss bankers, acting as middlemen. The U.S. taxpayers paid Mauser of Germany about $1 per rifle plus additional penalties that would have eventually totaled $250,000 USD, up until the U.S. entered the war. It has also been rumored that some payments continued to arrive even after the U.S. Congress declared war on the Kaiser’s Germany. (We’ll have to wait for the release of Jon Speed’s next Mauser book to read the details.) This historical tidbit is just once notch below what happened two decades later when Germany’s Nazi regime had the temerity to sell full fare train tickets to some Jews, to cover the costs of their forced relocation to the designated ghettos before their planned extermination. Oh, but the Nazi bureaucrats were so conciliatory. They only charged children half fare to be sent to their deaths. (If you doubt this, then read the book Fathoming the Holocaust by Ronald J. Berger.)

http://survivalblog.com/2012/03/impo…mperative.html

Crossroads News : Changes In The World Around Us And Our Place In It

 

 

 

 

IT :  Internet News / New Technology – Security

 

 

 

 

Researchers uncover the full scale and weaknesses of the monitoring of illegal file sharers

 

Research by computer scientists at the University of Birmingham has found that the monitoring of online file sharing is more prevalent than previously thought. They also conclude that in many cases, the evidence gathered through monitoring is not admissible in court. This research will be presented tomorrow at the SecureComm Conference in Padua.

To provide legal evidence of file sharing, a monitoring company must make a direct connection to a suspected file sharer and log their activity. This three-year study is the first to look at the behaviour of monitors that make direct connections.

The researchers’ findings include:

Massive monitoring of all of the most popular illegal downloads from the PirateBay has been taking place over the last 3 years.
On average an illegal file sharer, using BitTorrent to download the most popular content, will be connected to and have there IP address logged within 3 hours of starting a download.
Poor collection methods mean the evidence collected by monitors may not stand up in court.

The research was carried out by developing software that acted like a BitTorrent file sharing client, and logged all the connections made to it. Careful analysis of the logs revealed the presence and behaviour of file-sharing monitors.

Most large-scale monitors hide their identity by using third party hosting companies to run the searches for them, but other monitors are identifiable as copyright enforcement organisations, security companies and even government research labs. The researchers also found that the use of third party hosting companies allowed the monitors to avoid ‘block lists’,that attempted to stop known monitors from connecting to file sharers.

Dr Tom Chothia, researcher at the University of Birmingham’s School of Computer Science, says, “This work reveals the full scale of the monitoring of illegal file sharers. Almost everyone that shares popular films and music illegally will be connected to by a monitor and will have their IP address logged. What is done with this information in the long term only time will tell”.

With the number of prosecutions of file sharers increasing there is a legitimate concern of the standard of evidence used in these cases.  Dr Chothia continued: ‘All the monitors observed during the study would connect to file sharers believed to be sharing illegal content and verify that they were running the BitTorrent software, however they would not actually collect any of the files being shared. Therefore, it is questionable whether the monitors observed would actually have evidence of file sharing that would stand up in court.’

This work was carried out by Tom Chothia, Marco Cova, Chris Novakovic, and Camilo Gonzalez Toro at the University of Birmingham’s School of Computer Science.

Provided by University of Birmingham

Environmental

earthrise : Episode one

Uploaded by on Oct 1, 2011

As the population booms and demand strains the world’s meat supply, there is a need for alternatives to animal proteins. Plus, Britain’s Pearl Mussels and stopping the Sahara Desert to extend its reach.

Seed Balls in Cambodia

Published on May 4, 2012 by

http://permacultureplanet.com/
Itinerant permaculture teacher Rico Zook and local Khmer permaculturist Hoeuy Han join Ockenden Cambodia to make seedballs.
This film was recorded at a 10 hectare potential permaculture demonstration site in Cambodia’s Banteay Meanchey province.

Human genes engineered into experimental GMO rice being grown in Kansas

By Ethan A. Huff, 
(NaturalNews) Unless the rice you buy is certified organic, or comes specifically from a farm that tests its rice crops for genetically modified (GM) traits, you could be eating rice tainted with actual human genes. The only known GMO with inbred human traits in cultivation today, a GM rice product made by biotechnology company Ventria Bioscience is currently being grown on 3,200 acres in Junction City, Kansas — and possibly elsewhere — and most people have no idea about it. Since about 2006…
Read Full Article Here

**********************************************************************************************************

Cyber Space

John McAfee, Antivirus Pioneer, Arrested by Belize Police

By John E Dunn, techworld.com

McAfee antivirus founder John McAfee is reportedly taking legal advice after a raid on his Belize home by police resulted in the software entrepreneur’s arrest and the death of his pet dog.

The raid in the early morning of 1 May by the country’s armed ‘Gang Suppression Unit’ (GSU) allegedly involved the doors to McAfee’s house being smashed down, his property ransacked, and his dog shot.

After searching the house for drugs and firearms and handcuffing him and his 12 employees, the police detained McAfee for a number of hours before releasing him at 2am the following morning.

The police haven’t given a reason for the raid but did reportedly find a cache of weapons including 12 gauge shotguns, handguns, rifles with scopes and ammunition. McAfee said he’d presented permits for all but one of the weapons which were for his company’s security.

“The entire day was an incredible nightmare. This is clearly a military dictatorship where people are allowed to go and harass citizens based on rumor alone and treat them as if they are guilty before any evidence whatsoever is obtained,” McAfee was reported as telling a local TV station after the raid.

McAfee blamed events on his refusal to donate money to “the local political boss” in his locality. No charges have been made.

Read Full Article Here

Judge Throws out Mass John Doe Porn Copyright Lawsuits

By Grant Gross, IDG News

A judge in New York has shot down the attempt of three pornography studios to sue nearly 80 people for allegedly downloading movies on BitTorrent, with the judge slamming the studio’s efforts to file lawsuits against multiple anonymous defendants.

Magistrate Judge Gary Brown denied the studio requests to subpoena the names associated with 79 IP addresses, with Brown arguing that IP addresses aren’t enough evidence to pinpoint who actually downloaded a file from BitTorrent.

“The assumption that the person who pays for Internet access at a given location is the same individual who allegedly downloaded a single sexually explicit film is tenuous, and one that has grown more so over time,” Brown wrote in his ruling, first noted by the Fight Copyright Trolls blog. “An IP address provides only the location at which one of any number of computer devices may be deployed, much like a telephone number can be used for any number of telephones.”

Brown, of U.S. District Court for the Eastern District of New York, allowed the lawsuits to move forward against only one defendant in each of four so-called John Doe lawsuits targeting anonymous Internet users.

Brown’s 26-page order, issued Tuesday, could be a turning point in a massive effort to sue BitTorrent users for copyright infringement, said Mitch Stoltz, an attorney with the Electronic Frontier Foundation, a digital rights group that has opposed the John Doe lawsuits.

Since mid-2010, movie studios and other content producers have sued more than 220,000 BitTorrent users for copyright infringement, Brown noted in his ruling, citing a U.S. News and World Report story.

Brown’s ruling was broader than BitTorrent decisions from most other judges, and could be a model for future court decisions, Stoltz said. There’s been a “huge split” among judges on whether to grant subpoena requests in these mass John Doe infringement lawsuits, although judges in California, Illinois and Washington, D.C., have taken similar stances to Brown’s, he said.

“Many [judges] will see this as confirmation,” Stoltz said of Brown’s ruling. “There absolutely is a trend toward shutting down this sort of abuse of discovery.”

Read Full Article Here

NASA acknowledged Friday an attack on one of its websites by “The Unknowns,” a group that has been publicly trickling information on websites it has hacked over the last few weeks.

The Unknowns claimed to have hacked a NASA website hosted at the Glenn Research Center on May 1, said Sally V. Harrington, a public affairs specialist with the center in Cleveland, Ohio, in an email statement.

“NASA security officials detected an intrusion into the site on April 20 and took it offline,” she said. “The agency takes the issue of IT security very seriously and at no point was sensitive or controlled information compromised.”

The Unknowns posted a wrap up of several weeks of hacking on Pastebin earlier this week, claiming to have also hit a sub domain belonging to the U.S. Air Force, the French Ministry of Defense and the European Space Agency, among others.

The group also claimed to have hacked the Bahrain Ministry of Defense, but the website actually belongs to the Ministry of Development in Brunei, a small nation on Borneo next to Malaysia.

The Unknowns released about 215MB of documents that it said came from the U.S. Air Force. The information varied from receipts for expense reports to documents related to emergency communications plans. Many documents were dated 2012, and some carried the label “unclassified.” U.S Air Force officials did not have an immediate comment.

The Unknowns wrote on its Twitter feed on Thursday that “we’re soon going to e-mail our victims informing them on how we penetrated…their databases, they will get all the info they need.”

On its Pastebin post, the group gave a bit more insight into its motives, saying to the websites affected “we probably harmed you a bit but that’s not really our goal.” They said if they wanted to do harm, the websites would have been defaced.

Send news tips and comments to jeremy_kirk@idg.com

Could The Pirate Bay suffer the same fate as MegaUpload?

Published on May 4, 2012 by

Internet freedom has suffered another blow. In the United Kingdom, The Pirate Bay website was blocked to millions of users. A UK high court ruled that the country’s leading Internet Service Providers had to censor the site, claiming that both the Bay and its users were breaking copyright laws. David Seaman, journalist and host of The DL Show, joins us to take a closer look at the case.

**********************************************************************************************************

Survival / Sustainability

Fresh Farm Cheese in 4 Easy Steps

Tess Pennington
Ready Nutrition

For some time, it has been a goal of mine to make fresh cheese. In all honesty, I was a bit intimidated by the process, but I found this simple recipe that I wanted to share.

It uses plain milk, requires no special equipment, and produces a homemade soft and spreadable cheese. The best part is you can substitute powdered milk for the whole milk and make fresh cheese using your emergency food supply items!

After learning the basic recipe, you can begin changing the flavor and adding your favorite spices, zest, extracts or herbs. My favorite is fresh cracked pepper, garlic powder and Italian herbs.

This recipe only takes about 15 minutes to make and is delicious. So get creative and enjoy!

Fresh Farm Cheese

Ingredients:

2 quarts whole organic milk (use pasteurized, instead of ultra-pasteurized, if available)
2 cup buttermilk
1 tablespoon white vinegar or lemon juice
1 1/2 tsp sea salt
cheesecloth, rinsed

Preparation:

In a heavy-bottomed pot, over low heat, slowly heat the milk up, stirring often, until it is just about to simmer (about 180 degrees F). Stir in the buttermilk, and then the vinegar, and turn off the heat. Very slowly stir until you see the milk separating into curds (the solids) and whey (the liquid). Leave undisturbed for 10 minutes.

Line a large strainer with 2-3 layers of cheesecloth, and place over a stockpot to catch the whey. After the 10 minutes, ladle the curds into the cheesecloth, and allow the whey to drain for 10 minutes. Gather up the edges of the cheesecloth, and tie a string around the top to form bundle.

Tie the string to a wooden spoon or dowel, and hang the cheese curds over the stockpot and continue draining for 30 minutes

After draining, remove the cheese from the cloth, and transfer into a container. Stir in the salt and refrigerate. This fresh cheese can be used for up to 5 days. Use as a spread, or as you would use cream cheese, or cottage cheese.

Author: Tess Pennington
Web Site: http://www.ReadyNutrition.com/

Date: March 20th, 2012

Related Categories: Homesteading, Recipes

Week 7 of 52: Basic Home Security

Tess Pennington
Ready Nutrition
Everyone wants to believe that they are safe and sound when they latch the windows and lock the doors. We even experience an added security boost when we live in an expensive neighborhood, a home with a security system, and an active neighborhood watch program. Today, we would all love to have Gladys Kravitz (Bewitched) as our next door neighbor. In reality, security gadgets can protect the outside of your home, but it’s meaningless if you cannot protect what’s inside. People can still be mugged, burglarized, and attacked simply by opening the door to a stranger or by leaving vulnerable areas of their home exposed. I’m going to ask you a question. Have you ever placed a key under a mat? I ask this because we all have placed the spare key under the mat at one time, and the burglars know that trick. It is not my intention to promote fear, but to awaken you to potential hazards. You want to make breaking into your home difficult.

Designing a home defense system that includes multiple security layers is a proactive way to protect your home, family, and belongings. Security layers are preventative measures that will advertise to intruders that they should avoid your home altogether. The more layers you have in and around your home, the less likely a criminal is going to choose your home as his/her next “job.”

Read Full Article Here

***********************************************************************************************************

Activism

Egypt clashes video: Troops water-cannon protesters at Cairo rally

Published on May 4, 2012 by

Egyptian armed forces and protesters clashed in the capital Cairo on Friday, with troops firing water cannon and tear gas at demonstrators who threw stones as they tried to march on the Defense Ministry in the Abbasiyah district, a flashpoint for a new cycle of violence only weeks ahead of presidential elections. The troops fired water cannon at protesters and hurled stones at them to keep them from advancing. The protesters took shelter behind metal sheets snatched from a nearby construction site and hurled back stones. Others climbed the roof of a nearby university and showered soldiers with rocks from above. The troops then opened up with heavy volleys of tear gas that pushed the demonstrators back. The Health Ministry reported eight protesters were injured. The security forces also appeared to sustain casualties.

Demonstrators In Suez Peacefully March Against Military Rule

Published on May 4, 2012 by

Today, about a thousand demonstrators marched in Egypt’s port-city of Suez in protest against the country’s military rulers.

Hundreds injured as police storm Cairo rally

Published on May 4, 2012 by

Egypt’s military rulers have imposed an overnight curfew after a day of fighting between protesters and troops in the country’s capital.

Almost 300 people have been injured in the clashes and one soldier was killed. Demonstrators rallying outside the ministry of defence were angry about the killing of 11 protesters on Wednesday.

Protesters gathered at al-Abesseya square had been trying to march to the defence ministry.

They were blocked by security forces firing tear gas and water cannon, reportedly after they tried to breach the barriers on the road to the ministry.

Many were pushed back into neighbouring streets and the nearby Ain Shams university.

State media said some people who had been protesting peacefully in Tahrir Square had then started to march towards the Defence Ministry.

Al Jazeera’s Steve Chao reports.

***********************************************************************************************************

Whistle blowers

“We are Preparing for Massive Civil War,” Says DHS Informant

Posted by

In a riveting interview on TruNews Radio, Wednesday, private investigator Doug Hagmann said high-level, reliable sources told him the U.S. Department of Homeland Security (DHS) is preparing for “massive civil war” in America.

“Folks, we’re getting ready for one massive economic collapse,” Hagmann told TruNews host Rick Wiles.

“We have problems . . . The federal government is preparing for civil uprising,” he added, “so every time you hear about troop movements, every time you hear about movements of military equipment, the militarization of the police, the buying of the ammunition, all of this is . . . they (DHS) are preparing for a massive uprising.”

Hagmann goes on to say that his sources tell him the concerns of the DHS stem from a collapse of the U.S. dollar and the hyperinflation a collapse in the value of the world’s primary reserve currency implies to a nation of 311 million Americans, who, for the significant portion of the population, is armed.

Uprisings in Greece is, indeed, a problem, but an uprising of armed Americans becomes a matter of serious national security, a point addressed in a recent report by the Pentagon and highlighted as a vulnerability and threat to the U.S. during war-game exercises at the Department of Defense last year, according to one of the DoD’s war-game participants, Jim Rickards, author of Currency Wars: The Making of the Next Global Crisis.

Through his sources, Hagmann confirmed Rickards’ ongoing thesis of a fear of a U.S. dollar collapse at the hands of the Chinese (U.S. treasury bond holders of approximately $1 trillion) and, possibly, the Russians (threatening to launch a gold-backed ruble as an attractive alternative to the U.S. dollar) in retaliation for aggressive U.S. foreign policy initiatives against China’s and Russia’s strategic allies Iran and Syria.

“The one source that we have I’ve known since 1979,” Hagmann continued.  “He started out as a patrol officer and currently he is now working for a federal agency under the umbrella of the Department of Homeland Security; he’s in a position to know what policies are being initiated, what policies are being planned at this point, and he’s telling us right now—look, what you’re seeing is just the tip of the iceberg.  We are preparing, we, meaning the government, we are preparing for a massive civil war in this country.”

Read Full Article Here

Related Links

DAILY TRUNEWS BROADCAST

Before It’s News

************************************************************************************************************
[In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit, for research and/or educational purposes. This constitutes ‘FAIR USE’ of any such copyrighted material.]