The Underground Librarian

What cats do before meeting curiosity sellers….

Archive for the ‘The Underground Manuals’ Category

Tip Jar: No Cost or Tariff

Posted by N. A. Jones on February 11, 2017

I am posting for someone’s sake, not my own. My ultimate hope is that others will find todays blog useful. Before I begin the matter , let me frame in a quote from friend, “You’re damn if you do, damned if you don’t.”

From friend I found out it is a common practice between mother-daughter, father-son, mother-son, and father-daughter to commit murders. The connection between the two, besides blood, is usually incest. My first objection to friend’s recounting was the fact that some kids never fight their way out of such an obsessive and co-dependent relationship. Well, maybe, they can’t at a young age. Still, why they would not try again to leave at an older age is beyond my understanding. Continuing, the murders happen at homeless shelters. Friend says shelters are a hot spot for that to happen. Between the culprits, one said they were competing against each other for the most damage done.

I never thought about what security was like at a homeless shelter. I presumed there was more to be aware by getting to know the people inside the building. With this in mind, I remember doing someone an injustice. After dropping him off at a shelter one afternoon, I told him he would be alright. This I proffered after asking him what was wrong. “I’m scared,” he clearly spoke. “You’ll be fine,” I retorted getting back in the car. I may have sounded crass but in my defense little did he know I was about to lose everything. I did not want to burden him with my subsequent crash and burn. Besides, if I had know he was homeless to begin with, conversation the night before would have been different. In the distance and aftermath, I am apologizing. I never glamourized life on the street for or through anyone. I never knew the dangers of living to the bone had another face to know.

Safety first, Health second, Tell third.

~W.H. Tespid ERT

BTW: I also heard women in secure shelters are getting stalked and harassed by lesbians. They are demanding to be taken care of and supported. Several murders from both points of view have also been committed by that method.

Posted in How to be a Perp, The Underground Manuals, Tip Jar | Comments Off on Tip Jar: No Cost or Tariff

Tip Jar Freebie (+)

Posted by N. A. Jones on February 5, 2017

I was told this one is too hot, but I’ll keep typing anyway. Toyota has a cadre of former employees trying to take over a row of certain towns in Texas. The former employees turned social activists are African American. I have also been told that they are all pedophiles. How they lost their jobs I do not know. I was told they refused to show up for work. Other pedophiles are also working for Toyota. This cadre of individuals are also known as pedophiles, but are white.

From what I gathered first hand is a residency game they are playing. They pay the mortgage at the home they bought, but they are seeking refuge in other parts of towns. Namely, they are trying to force themselves into a shadow residency in the poorer areas of all of the towns they live. Still, that is not the thick of it. These home owners, who are never in their official residence, also have a safe house in another county. The safe house is never spoken of, but when the home is needed they take refuge there so no one will ever find them.

I heard this. I did not personally witness the divulge. The source is involved and I choose to preserve a distance. I do not know the labor and HR perspective on this, but the regaling caught my attention enough to post.

~Jain Sioux Anne Fellps TAMU

~W.H. Tespid ERT

BTW: I just heard from the neighborhood kids. Apparently what is popular for parents is starting a microbrewery to pair with brothel services. Friend says there is a high and frequent fire risk associated with home brewery. Maybe the occasion calls for the fire department and possibly CPS.

If these type of tips are what surround the new moon and new year, I am afraid of what the full moon will yield. Until then I will be thinking methodically, watching steps, and quieting rage through March.

Posted in The Underground Manuals, Tip Jar, Underground Economy, Underground Job Bank | Tagged: | Comments Off on Tip Jar Freebie (+)

Tidbit 2.0 The detailed quickie

Posted by N. A. Jones on January 16, 2017

Where is the VA Clinic?

VA North Texas Health Care System

Oct 31, 2016 – Home page for VA North Texas Health Care System, providing information about patient care and services provided for eligible Veterans and …

Texas VA Hospitals – VFW Texas – My VFW

myvfw.org/texas/texasvahospitals/

Veterans Health Administration – VISN 17: VA Heart of Texas Health Care … 549GD, Denton CBOC, 2223 Colorado Blvd. Denton, TX 76205, (940) 202-2187.

Denton VA Outpatient Clinic – Denton, Texas – Family Medicine …

https://www.facebook.com › Places › Denton, Texas › Family Medicine Practice

Rating: 3.5 – ‎31 votes

Phone, (940) 891-6350 · Address. 2223 Colorado Blvd; Denton, Texas 76205 … Michael Herd I try to be optimistic Aunt Gail but after being in the hospital …

Texas – Locations – US Department of Veterans Affairs

https://www.va.gov/DIRECTORY/guide/state.asp?STATE=TX&dnum=ALL

Kerrville: Kerrville VA Hospital. Waco: Doris Miller … Fort Worth: Fort Worth Outpatient Clinic. Harlingen … San Antonio: Frank M. Tejeda VA Outpatient Clinic.

Fort Worth Outpatient Clinic – Locations – US Department of Veterans …

www.va.gov/directory/guide/facility.asp?id=658

Jul 9, 2015 – Parent Facility: VA North Texas Health Care System Phone: (214) 742-8387 or (800) 849-3597Fort Worth VA Outpatient Clinic is the largest …

Map of va hospital fort worth

map expand icon
 
Martin Luther King Jr. Day might affect these hours

Fort Worth VA Outpatient Clinic
2.9 (70) · Doctor
Fort Worth, TX · (817) 335-2202

VA Fort Worth Clinic: Franks Susan F PHD
1 review · Psychologist
Fort Worth, TX · (817) 735-2228

Posted in The Underground Manuals, Tidbits | Tagged: | Comments Off on Tidbit 2.0 The detailed quickie

Tidbits 1.0 – the half quickie

Posted by N. A. Jones on January 16, 2017

courtesy of Spotted Johnny

http://www.homeslesssheltersdirectory.org

“Many of these shelters now have waiting lists. Please call before going to them. Many waiting lists are very long. Shelters and service also go out of business. Always call ahead to confirm that this location is still active. If you find that this location is no longer operating, please send us a comment using the form below.”

Excavate the page under the home tab. There are many alternatives and assistance programs available in some states. This website accumulates information for the whole United States including Alaska and Hawaii.

http://shelterlistings.org

Take a few moments to excavate the site. There is a page with brief information  for homeless veterans. I was able to locate shelters closer to my query compared to the homelesssheltersdirectory.

 

VA Housing Assistance-Texas

 AssistanceDonate to the VFWDonateMonthly GivingShop Store

Veterans Housing Help – VOA.org‎

http://www.voa.org/Veterans‎

 

We Provide Vets With Housing, Jobs and Health Care. Will You Help Us?

Veterans HousingVeterans EmploymentHelp Our VeteransDonate today

Assistance for Veterans – We Rescue Veterans in tough times‎

http://www.veteransnationalassistancefund.org/‎

 

We can only them if you help us.

All Volunteer Staff · We take NO salary · We are a genuine charity. · All Donations go to Vets.

Veterans Housing Vouchers – Homes For Those Who Served‎

http://www.buildinghomesforheroes.org/‎

 

http://www.texvet.com › Partners

 

The Rent Assistance website provides a directory of local rent assistance programs … We provide an online directory of rental assistance programs in Texas.

Housing Programs for Veterans on the Rise | Texas State Affordable …

http://www.tsahc.org/blog/post/housing-programs-for-veterans-on-the-rise

 

Nov 7, 2014 – TSAHC offers two programs to help Texas veterans become homeowners: … Affordable Communities of Texas Veterans Housing Initiative …

Housing Assistance For Veterans – Homeless Veterans

https://www.va.gov/homeless/housing.asp

 

Living here—this is a blessing,” says Emanuel Yates, one of several formerly homeless Veterans featured in this video, which discusses a VA program that is …

‎HUD-VASH Eligibility Criteria · ‎HUD-VASH · ‎Grant and Per Diem Program

Texas Residents – Texas Department of Housing & Community Affairs

https://www.tdhca.state.tx.us/texans.htm

 

Ongoing rental assistance up to two years or longer including Section 8 vouchers. If you are facing eviction and need emergency, short-term rental assistance, …

VLB Home Loans – The Texas Veterans Land Board

http://www.glo.texas.gov/vlb/loans/home-loans/

In 1983, the Legislature created the VLB Veterans Housing Assistance Program (VHAP), to aid Texas Veterans in purchasing a home. Eligible Texas Veterans …

 

Texas Veterans Land Board – Texas General Land Office

http://www.glo.texas.gov/vlb/

 

Provides loans to Texas veterans for the purchase of land, and other veterans’ housing assistance programs. Details of programs, downloadable forms, meeting …

Texas State Veteran’s Benefits | Military.com

http://www.military.com/benefits/veteran-state-benefits/texas-state-veterans-benefits.html

 

The state of Texas provides several veteran benefits. … The Land Loan Program, Veterans Housing Assistance Purchase Program, and the Veterans Home …

Emergency Financial Assistance for Texas Veterans – YWCA El Paso

http://www.ywcaelpaso.org/…/Emergency_Financial_Assistance_for_Texas_Veterans.htm

 

Through “The Fund for Veterans’ Assistance” program, we provide emergency financial assistance to qualified Texas Veterans and their family members, for …

Programs Serving Primarily Veterans | Housing Crisis Center

http://www.hccdallas.org/veterans-programs/

Three programs for the chronically homeless target different populations. Most clients in these programs are veterans who were typically on active duty between …

 

Texas Veterans Blog | Benefits for Veterans Who Are Buying Homes in …

http://www.texasveteransblog.com/benefits-for-veterans-who-are-buying-homes-in-texas/

In 1983, the Texas Legislature created the Texas Veterans Land Board (VLB) Veterans Housing Assistance Program (VHAP) to assist Texas veterans in …

 

 

 

 

Posted in The Underground Manuals, Tidbits | Tagged: | Comments Off on Tidbits 1.0 – the half quickie

Poverty #1 (Addendum)

Posted by N. A. Jones on January 13, 2017

All I can see is clarity fracturing into tiny squares. The shelf must have been designed to be shatter proof. My face and legs should be cut into a thousand shards.  I looked down at brown sugar feet capped with long toe nails that shred bed sheets into coleslaw like bedding. Angling my eyes up, I reserved panic at the vegetable drawer being filled with tiny pieces of glass. Nothing embedded into the tomatoes and lettuce. Chicken salad Friday night might still be in order. Bare handed I dug into the mess to assess the damage. The thick skinned fruit and wrapped cuts of meat would make it through the weekend. Meanwhile, I have an hour or two to clean up before running errands at the edge of sundown.

That was ten years ago and I am learning the other end of providing for myself – notably on a fixed income. Then, I gave up on my waistline and fad dieting. I fully gave into cooking. Learning my palate and local cuisine would go a long way to satisfying  hunger that I placed at Christ’s feet to surmise the winters and the loneliness. Sometimes we feed our fears and wanton natures throughout the dark nights with midnight cooking. The first time I made spaghetti with clam sauce after two in the morning, I knew I had a problem with balancing and fulfilling my appetites. Struggling through fasts and feasts still marks my back hucks and inner curves of skin gracing my hips. To me it is a mark of poverty that may finally disappear.  What it is, is a sign of inferiority crippling and vanity dictates. The men and boys around town admonished me as it is a sign of jealousy born of cravings for money. I caved in when Father admonished that this fascination with losing weight all succumbs to lust.

Since the thousand shards I am continually encouraged to cook and continue my studies. I never left the drive that put me in the kitchen then and the complimentary call of poverty suits me to be a little clever now with the meat, vegetables, grains, and sweets. Two years ago I asked God to keep me company in the kitchen while I cooked. The menu changed; the groceries changed; the methods expanded. Now I cook with the common and am finally filled. Passing the choice cuts and cooking in season bear intellectual as well as physical fruit.

Voices on the wind have been welcoming me into poverty. The welcome wagon was sincere enough for me to stay calm and understand the blessing. True, I am now a few levels up from street, but the breeze outside has been chilling my bones to make me think different. This month I have had more decisions to make complimented with an extensive amount of research and reading. Today the return on my investment began: a phone call from the oral surgeon’s office, a list of dental insurance companies to start with, and a mindfulness of what I already do to meter out the intermittent pain and inflammation. What I do with herbs and spices tends to turn a head in culinary and in medicinal applications. Late last night I got reminded to trust my education whether or not I am certified Naturopath. So, one cup of boiled water steeped with one clove of chopped garlic, ¼ teaspoon of turmeric, and ½ teaspoon of honey was started this afternoon. I steeped it for two minutes, followed by straining the solution. Furthermore, I cooled the liquid with several ice cubes to yield two cups. Gargle with 1/8 cup of solution three times a day to treat as an anti-bacterial and anti-inflammatory. I gargled after breakfast and felt a change in my mouth. I have been pretty calm since one o’clock this afternoon. Also, one aspirin grazes these lips with 8 ounces of water once a day. I do not know if I will make it 6 months let alone 12 before insurance covers the oral surgery, but for now, I am good and that is all I need give a damn about.

Trying not to feel overwhelmed in the rain.

More essays on poverty’s edge to follow,

Jain Sioux Anne Fellps

TAMU graduate

(That Ain’t Me University)

Poor #1.5

Sidetracked: I lost confidence. I almost poured the solution out. I began to doubt anything I learned or rationalized in and out of the grocery store, in and out of the metaphysical store, in and out of the forest. The weight and experience of first-hand knowledge almost got bulldozed. So, I ransacked the Internet and my bookshelf to prove to myself that the time and knowledge has not been wasted. The following notes are from research that may help you follow my logic in making the mouth rinse. Meanwhile, I am adding natural care for teeth to my proactive research list. Necessity is the mother of invention.

1.       The herbal mouth rinse recipes range from alcohol base, to oil, and finally water. Refrigerate the rinse from the essay. It will keep for a week.

2.       I tend to combine herbs that focus on the culinary as well as the medicinal. I have not ordered anything online or have shopped at a fancy boutique. Garlic, turmeric, and honey are fairly inexpensive and easily found in the produce and baking aisles at many grocery stores.

3.       Garlic functions with the body as an antibiotic, a carminative, a diuretic, an expectorant, and a vermifuge.

4.       An active ingredient in turmeric is called curcumin. It is known to function as an anti-oxidant and an anti-inflammatory. Cholesterol lower properties are also attributed to turmeric.

5.       Honey functions as an anti-inflammatory, anti-bacterial, and anti-fungal.

Primary Sources:

Medical Herbalism: The Science and Practice of Herbal Medicine by David Hoffmann FNIMH, AHG

 http://www.webmd.com/diet/features/medicinal-uses-of-honey#4

~Jain

 

 

Posted in Poverty, The Underground Manuals | Tagged: , , | Comments Off on Poverty #1 (Addendum)

Pa. Journals II 2016

Posted by N. A. Jones on January 21, 2016

Story image for underground cocaine trafficking allegheny county pennsylvania from WTAE Pittsburgh

‘Bricks R Us:’ Wide-reaching Western Pa. heroin operation broken up

WTAE PittsburghMay 29, 2014
It’s the biggest drug bust that the DA can remember in Allegheny County, and it’s from a … Called “Bricks R Us,” the drug ring was busted through bold shirts they wore that … Duquesne, Penn Hills, Monroeville, Pittsburgh and the counties of … “They brazenly conducted most of their drug trafficking along the …

Story image for texas pennsylvania drug trafficking from Natural Products INSIDER (blog)

Federal Prosecutors Target Marketers of Drug-Tainted ‘Dietary

Natural Products INSIDER (blog)14 hours ago
Federal Prosecutors Target Marketers of Drug-Tainted ‘Dietary Supplements’ … bars in Texas for trafficking and attempting to traffic in counterfeit versions of a … More recently, Cheryl Floyd of Harrisburg, Pennsylvania was …

California deputy busted with pot in York Co.

York Daily Record/Sunday NewsDec 31, 2015
The three men are scheduled for a preliminary hearing on the drug charges … 122 packages of marijuana from northern California to Pennsylvania. … Earlier this year, Heath traveled to Waco, Texas, to testify in a federal case against a man accused of participating in a family-run marijuana trafficking ring, …
Drug Agent Allegedly Moved 200 lbs of Pot
Officer.com (press release) (registration) (blog)Jan 1, 2016

Explore in depth (3 more articles)

DA commends police for $2 million drug bust

witf.orgJan 5, 2016
29 when police conducted a traffic stop, Kearney said. … Heath admitted to driving the marijuana from California to Pennsylvania, the affidavit states. … Earlier this year, Heath traveled to Waco, Texas, to testify in a federal case …
California Deputy Caught With 250lbs Pounds Of Marijuana
Highly CitedMintpress News (blog)Jan 5, 2016

Explore in depth (27 more articles)

More than 30 nabbed in Northern Tier drug sweep

Elmira Star-GazetteSep 23, 2015
The Mobile Street Crimes Unit was created to visit Pennsylvania municipalities where drug trafficking and related criminal activity are present.

‘Baby Doll’ drug lord busted; Ana Marie Hernandez oversaw Mexico

6abc.comOct 29, 2015
The U.S. Border at El Paso, Texas, is so porous that drug dealers are known … her cocaine trafficking organization supplied dealers in Chicago, …

Texas man arrested in Lancaster on drug charges sentenced to

PennLive.comOct 9, 2015
Texas man arrested in Lancaster on drug charges sentenced to federal prison … 144 months in federal prison for his role in a drug trafficking conspiracy, … the Lancaster Police Department and the Pennsylvania State Police.

Story image for texas pennsylvania drug trafficking from Monitor

Drug traffickers using mail carriers to deliver drugs during the holidays

MonitorDec 6, 2015
Drug traffickers using mail carriers to deliver drugs during the holidays …. to states such as Minnesota, Indiana, Pennsylvania, Georgia, Florida, …

Ringleader sentenced for holding disabled people captive in

fox8.comNov 6, 2015
… and medical care, and moved them between Pennsylvania, Texas, Virginia, … the captives were often isolated, in the dark, and sedated with drugs … violent crime in aid of racketeering, sex trafficking, kidnapping, theft of …

Report highlights the many ways drugs come into Houston

Chron.comJul 8, 2015
Drugs continue to move into the Houston by air, land and sea, and the region will remain a major drug trafficking corridor for the …. Texas on Thursday, and that it is the largest seizure of drug-cartel … Pennsylvania Gov.

Mexican Cartel Operation Discovered in Rural Pennsylvania …

http://www.breitbart.com/texas/…/mexican-cartel-operation-discovere…
Breitbart

Jun 4, 2014 – Mexican Cartel Operation Discovered in Rural Pennsylvania. … Hogan said, “Everybody knew that the Lemus’ [drug trafficking organization] … Sylvia Longmire, a Breitbart Texas contributing editor and border security expert, …

Oct 31, 2013 – Federal drug charges result from violations of the federal laws pertaining to … For drug trafficking and distribution, a sentence of three years is … Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming.

U.S. States Affected by Mexican Drug Trafficking … – CSG West

Drug Trafficking Organizations. Drug Trafficking. Arms Smuggling. Human Trafficking … follows I-70 and I-80 to New York, New York, and Philadelphia, Pennsylvania. … Corridor E follows I-25 north from El Paso, Texas to Billings, Montana.

DRUG-FREE ZONE LAWS: – The Sentencing Project

sentencingproject.org/…/sen_Drug-Free%20Zone%20…
Sentencing Project

Oregon. Pennsylvania. South Carolina. South Dakota. Tennessee. Texas. Utah. Virginia …. possession, and drug dealing—with the sentence for each offense …

Posted in Pennsylvania, The Underground Manuals, Underground Economy | Tagged: | Comments Off on Pa. Journals II 2016

Underground Manuals: Gitmo, et. alia

Posted by N. A. Jones on November 22, 2013

Web Extra | A prison camps primer

 Source for Full Article: http://www.miamiherald.com/2013/11/20/2558413/web-extra-a-prison-camps-primer.html

The Pentagon has built a series of facilities at Guantánamo Bay since it inaugurated its offshore detention and interrogation center for terrorist suspects in January 2002 by airlifting captives to remote Cuba from Bagram, Afghanistan. In early 2011, House Armed Services Committee chairman, Rep. Buck McKeon, R-Calif., declared the prison camp infrastructure had an overall capacity to confine 800 captives. Here’s a breakdown of the known lockups and other buildings, with best estimates of the current detainee population:

Posted in The Underground Manuals | Comments Off on Underground Manuals: Gitmo, et. alia

Non-terror Intelligence

Posted by N. A. Jones on August 4, 2013

NSA handing over non-terror intelligence

Published 4:15 pm, Sunday, August 4, 2013

WASHINGTON — The National Security Agency is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism.

This little-known byproduct of counterterrorism surveillance continues amid controversy over the NSA’s wide-ranging collection of domestic communications intelligence, including Americans’ telephone calling records and Internet use.

It is unclear whether the referrals have been built upon the content of telephone calls and emails. Administration officials have previously assured Congress that NSA surveillance focuses on so-called metadata and in the main does not delve into the content of individual calls or email messages.

Also, some in the legal community question the constitutionality of criminal prosecutions stemming from intelligence-agency eavesdropping.

Current and former federal officials say the NSA limits non-terrorism referrals to serious criminal activity inadvertently detected during domestic and foreign surveillance. The NSA referrals apparently have included cases of suspected human trafficking, sexual abuse and overseas bribery by U.S.-based corporations or foreign corporate rivals that violate the Foreign Corrupt Practices Act.

“We can’t task the collection of information for those purposes, and the Department of Justice can’t ask us to collect evidence of that kind of a crime,” said Robert Litt, general counsel for the Office of the Director of National Intelligence.

“If the intelligence agency uncovers evidence of any crime ranging from sexual abuse to FCPA, they tend to turn that information over to the Department of Justice,” Litt told an audience at the Brookings Institution recently. “But the Department of Justice cannot task the intelligence community to do that.”

Litt declined to discuss NSA referrals to the Justice Department when asked about the practice by Hearst Newspapers after a Senate Judiciary Committee hearing last week.

The super-secret NSA surveillance disclosed by fugitive leaker Edward Snowden has already sparked a public outcry and congressional hearings, and threatened congressional intervention to limit the programs.

Litt’s acknowledgement that the NSA is handing off intelligence to federal prosecutors could further stoke controversy and calls for action on Capitol Hill.

“If the information from surveillance or wiretaps is used by the NSA inconsistently with the warrant or other permission from the FISA court, certainly there would be a violation of law,” said Sen. Richard Blumenthal, D-Conn., a former U.S. Attorney and state attorney general. “Unfortunately we have no access to the FISA court opinions or orders that may authorize this activity because they’re largely secret. This presents yet another clear and powerful reason that we need more transparency in the FISA court.”

Sen. John Cornyn, R-Texas, a former Texas Supreme Court judge and state attorney general, said, “There’s certainly room to improve the process and to reassure the American people that their privacy rights are being protected while at the same time making sure that we have the tools in place to keep us safe.”

After intelligence-based information is referred to the FBI, the domestic law enforcement agency would have to prove probable cause to a federal judge to obtain a warrant to conduct electronic surveillance or a physical search as part of any domestic criminal investigation.

But some lawyers, particularly in the criminal defense community, see that process as constitutionally flawed.

“The NSA intercepts, whether they are mail covers, metadata or what have you, are in essence general warrants,” said Harold Haddon, a prominent criminal defense attorney from Denver. Using information from those warrants as the basis for a criminal prosecution “is a bright-line Fourth Amendment violation,” Haddon said, referring to the constitutional protection against unreasonable search and seizure.

Rep. Alan Grayson, D-Florida, a Harvard-trained lawyer who clerked for judges on the U.S. Court of Appeals in Washington, D.C., said it was “conceivable that by some kind of a fluke the NSA gets information that would lead to criminal prosecution of a U.S. citizen.” But Grayson said a substantial number of referrals would be “a strong indication that the NSA has overstepped its authority.”

The number of NSA referrals to the Justice Department is not publicly reported to Congress. A former federal official who served in the top echelons of both Bush administrations said there have been as many as 20 to 30 NSA referrals of non-terrorism criminal activity to the Justice Department.

The Justice Department did not respond to a request for comment for this story.

The “Patriot Act” enables the NSA to legally hand over information to the Justice Department about suspected criminal activity inadvertently derived from foreign intelligence surveillance, said Stewart A. Baker, a former general counsel for the NSA who later led the 250-person policy directorate at the Department of Homeland Security during the second Bush administration.

“Criminal activity really has to be as plain as the nose on your face before NSA will turn anything over to the Justice Department,” said Baker, now a partner at the powerhouse Washington, D.C. law firm Steptoe & Johnson. “The last thing an intelligence agency wants is to become enmeshed in the criminal justice system.”

NSA handoffs only occur in cases where there has been “substantial criminal activity” that meets a pre-defined Justice Department standard of evidence and passes review by senior officials, according to the former Justice Department official who spoke on condition of anonymity.

FBI investigators and Justice Department prosecutors protect the intelligence-agency origins of such investigations to prevent criminal defense lawyers from summoning intelligence agents into court to testify.

“The problem you have is that in many, if not most cases, the NSA doesn’t tell DOJ prosecutors where or how they got the information, and won’t respond to any discovery requests,” said Haddon, the defense attorney. “It’s a rare day when you get to find out what the genesis of the ultimate investigation is.”

The former Justice Department official agreed: “A defense lawyer can try to follow the bouncing ball to see where the tip came from — but a prosecutor is not going to acknowledge that it came from intelligence.”

Patrick Toomey, an attorney at American Civil Liberties Union headquarters in New York, said NSA surveillance is tipping off Justice Department investigations without any public accountability.

“The NSA ability to disseminate the information that it gathers is a serious concern because it allows the NSA to transform material gathered for foreign intelligence purposes into the basis for a criminal prosecution,” Toomey said.

NSA began making formal referrals to the Justice Department in response to enactment of the Foreign Intelligence Surveillance Act in 1978, said James Bamford, a scholar who has written three books about the NSA. It was NSA surveillance that initially detected that Billy Carter, the younger brother of President Jimmy Carter, had become a paid agent of Libya, visiting the rogue nation at least three times and reportedly receiving a $220,000 loan and as much as $2 million to press Libya’s case in Washington.

The president publicly disavowed his brother’s activities.

Bamford, author of “The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America,” said NSA referrals are ongoing.

“There are a lot of gray areas where eavesdropping uncovers suspected crime,” he said. “NSA hands the intercept to the Justice Department and it has to make a decision on whether to pursue it or not.”

NSA surveillance overseas occasionally trips across evidence of violating international sanctions against countries such as Iran or companies violating anti-bribery laws in hopes of securing multimillion dollar commercial or defense contracts.

Lucinda A. Low, another partner at Steptoe & Johnson, has defended clients in hundreds of cases involving alleged bribery or foreign corrupt practices.

“I haven’t come across any instances where this kind of intelligence was a factor,” Low said. But she added, “Most of us believe that those phone calls are monitored already.”

stewart.powell@chron.com

Posted in The Underground Manuals | Comments Off on Non-terror Intelligence

Reference and Exploration

Posted by N. A. Jones on August 4, 2013

60 Terrorist Plots Since 9/11: Continued Lessons In Domestic Counterterrorism

 

http://www.eurasiareview.com/30072013-60-terrorist-plots-since-911-continued-lessons-in-domestic-counterterrorism/

Posted in Appendix, The Underground Manuals, Trail Scout | Comments Off on Reference and Exploration

Source: Underground Documentaries

Posted by N. A. Jones on July 5, 2013

http://undergrounddocumentaries.com/

Free Movies.  Free Minds.

Underground Documentaries brings you the best selection of free documentaries on the web – with a special emphasis on independent films and documentaries ignored by the mainstream.  Through these films, we hope that viewers can make more informed decisions on how to live there lives – what to eat, what to buy, what to believe, and how to be happy.

According to a recent poll, only 21% of Americans place a great deal of confidence in television news to bring them the truth.  Americans, and people in every corner of the world, are turning off their TVs and heading online to find better, more reliable, and more relevant information.  Join this growing movement by visiting us here at Underground Documentaries and spreading the word about this resource.

Why Documentaries?

Documentaries empower.  They allow everyday people to tell a story without the big bucks of Hollywood or the mainstream TV networks.  In the age of electronic media, documentaries act like a village elder of old – telling stories, detailing facts, and spreading wisdom in the most meaningful and sincere way: from person to person, without the media mogul middleman to “interpret” the facts for you.  While documentaries tend to offer more down to earth information than other forms of media, check your facts, because there are two (and sometimes more) sides to every story.  You watch, you decide.

Free Minds. Free Speech.

Underground Documentaries allows and encourages lively and open discussion in the interests of truth-seeking and networking.  We encourage viewers to rate films, report broken links, write summaries and reviews, and counter facts and opinions expressed in these documentaries.  However, spamming the site with multiple or off-topic links in comments, unnecessarily rude or offensive posts, or personal attacks will not be tolerated.

Fair Use.

Underground Documentaries does not host any documentaries on our server – all films are hosted on third-party sites.   Links to documentaries are provided for educational and research purposes only.  We collect no fee from viewers to watch films.

“Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.”

 

Posted in The Underground Manuals | Comments Off on Source: Underground Documentaries

Standard Fair

Posted by N. A. Jones on February 22, 2013

No matter what their supposed purpose, there’s something inherently sinister about a secret society. Though most are formed with relatively realistic political and religious goals in mind, their focus on mystery and secrecy has made them the target of countless criticisms and conspiracy theories involving everything from aliens and the occult to world domination. Of course, the reality is usually much more innocuous, but that doesn’t mean that the groups don’t have some fascinatingly weird practices, or that they haven’t had an impact on world events.

With this in mind, the following are ten of the most famous and influential secret societies in history.

10. Ordo Templi Orientis


Famous Members
Aleister Crowley

Ordo Templi Orientis is a mystic organization that was started in the early twentieth century. The group was established along the same lines as the less secretive Freemasons, and supposedly relies on ritual and occult practices as a means for members to move from one level of prestige to another within the organization. The general philosophy of the group was a belief in new age esoteric principles and practices as a method of realizing one’s true identity. Famed occultist and all-around eccentric Aleister Crowley composed much of the group’s lore, including a manifesto called the Mysteria Mystica Maxima, and he later became its head. After his death, the influence and popularity of Ordo Templi Orientis began to wane, but it still exists today and has various chapters scattered across the world, chiefly in the United States, the U.K., and other parts of Europe.

Secret Practices
As Aleister Crowley’s popularity as a new age figure has continued to grow, more and more of the teachings of the Ordo Templi Orientis have come to light. As such, the group makes much less of an attempt to be secretive today than it did in the past. This doesn’t mean that they don’t still have some bizarre practices. Chief among these is the group’s fixation on the sexual, especially their teachings on the “adoration of the phallus” and the magic of masturbation.

9. The Bilderberg Group

Famous Members
No members, but attendees have included Ben Bernanke, the royal families of Spain and the Netherlands, World Bank officials, and representatives from major corporations

The Bilderberg Group is not a secret society per se, but it does operate under a similar veil of mystery, which has made it the subject of countless conspiracy theories and criticisms. The group was started in 1954, and since then it has convened every year as an exclusive, invitation-only conference of various world leaders, captains of industry, and media moguls. The group was originally started as a means of addressing a streak of anti-Americanism that was spreading through Europe following WWII, but over the years it appears to have morphed into a more broad discussion on reaching mutual understanding between cultures.

Secret Practices
The Bilderberg Group has become controversial for one key reason: no press is allowed in the conference and no significant details concerning the topics discussed are ever officially released to the public. That kind of secrecy, along with the intense security of the meeting sites, which often feature armed guards, police, and even fighter jets patrolling the skies overhead, has produced a number of conspiracy theories centered on the conference. The most popular is that the group tries to steer the direction of public policy, financial markets, and media in certain prescribed directions of their choosing, perhaps even with the goal of forming a so-called “one world government.” These claims have been brushed aside by the group, which claims global understanding and the end of nuclear proliferation as its main goals.

8. Hashshashin– The Order of Assassins


Famous Members
None of note

The Hashshashin, or Nizari, were a mysterious band of Muslim assassins that operated in the Middle East during the 13th century. The group was made up of Shia Muslims who broke off from a bigger sect and banded together in order to establish a utopian Shi’ite state. Because their number was small, the group used guerilla tactics in their battle against their enemies, including espionage, sabotage, and, most famously, political assassination. The Hashshashin would plant highly trained moles inside enemy strongholds, with instructions to only attack when the time was right. They were known for their extreme discretion in minimizing civilian casualties, as well as their penchant for using stealth to intimidate their targets. As the story goes, enemy leaders would often wake in the morning to find a Hashshashin dagger lying on their pillow, along with a note saying “you are in our grip.” Their legend soon grew, and before the Mongols finally destroyed the group, they became well known contract killers, supposedly performing jobs for the likes of King Richard the Lionheart.

Secret Practices
Around the time of their downfall, the library that contained all Nizari records was destroyed, so much of what is known about them today has taken on the status of myth. The most controversial legend centers of the group’s use of drugs and other intoxicants– “Hashshashin” translates roughly as “Hashish user”–which some have said were employed by the members in battle. This has been widely discredited, but the term “Hashshashin” as it refers to the Nizari is believed to be the origin of the modern word “assassin.”

7. The Black Hand


Famous Members
Gavrilo Princip (rumored)

The Black Hand was a secret society of anti-imperialist political revolutionaries that was started in Serbia in 1912. It formed as an offshoot from Narodna Adbrona, a group that sought to unite all of the Slavic people of Europe under one country. This required the separation of Serbia from the monarchy of Austria-Hungary, which had annexed the country some years before. With this in mind, the group began disseminating anti-Austrian propaganda and training saboteurs and assassins to disrupt political rule within the province. Their plan was to incite a war between Serbia and Austria, which would give them a chance to free their country and unite the different Slavic nations as one.

Secret Practices
Black Hand would be all but forgotten today if not for their unlikely involvement in one of the biggest events of the twentieth century. In 1914, the group engineered the assassination of the Austrian Archduke Franz Ferdinand. The job was badly botched, and was only completed when a low-level hood named Gavrilo Princip stumbled upon the Archduke’s car and shot him to death at close range (see photo). Still, the results of the assassination were catastrophic. Within days, Austria-Hungary had declared war on Serbia, and after the allies of both countries joined the fray, the small dispute managed to escalate into WWI.  The aftermath of WWI eventually led to WWII, and this led to the Cold War, which makes the Black Hand one of the most strangely influential forces of the twentieth century.

6. The Knights of the Golden Circle


Famous Members
John Wilkes Booth, Jesse James (above), Franklin Pierce (all rumored)

The Knights of the Golden Circle was a secret society that flourished in the U.S. during the American Civil War. In the beginning, the group sought to encourage the annexation of Mexico and the West Indies, which they believed would help the waning slave trade to once again flourish. But once the Civil War started, the group switched its focus from colonialism to fervent support of the newly established Confederate government. The Knights soon had thousands of followers, many of whom formed guerilla armies and began raiding Union strongholds in the West. In the Northern states, the mysterious order had an even bigger impact. Many newspapers and public figures engaged in witch-hunts where they accused supposed Southern sympathizers, including President Franklin Pierce, of being members of the Knights of the Golden Circle.

<SCRIPT LANGUAGE=’JavaScript’ TYPE=’text/javascript’ > document.write(‘<a href=”http://a.tribalfusion.com/h.click/aPmTR80qPp3dMASs7A4PJZdmtTmUWZbb0b3i1FbeXa6pSF3FUFB1Vdn1mrFrRFrtXEJn5aFa4EQQnq7A1rBbTtJPnPYZdnc7uptfG5EUj3Hmq3AfIpF3EYc7Q1c321VvunqjS2rY2VFjCWA3YRTYSSc3sQHUy0dbuVPbu4sZbUXUvBVAmo5mZb8PmfH2dFo0HrLndioNrasw8uGqDe9mDBJoUa0poyRtbMhVEfS34/http://clk.atdmt.com/CNT/go/429760144/direct;wi.300;hi.250/01/274635752/” target=”_blank”><img src=”http://view.atdmt.com/CNT/view/429760144/direct;wi.300;hi.250/01/274635752/” /></a>’);</SCRIPT> <NOSCRIPT> <A HREF=’http://a.tribalfusion.com/h.click/aPmTR80qPp3dMASs7A4PJZdmtTmUWZbb0b3i1FbeXa6pSF3FUFB1Vdn1mrFrRFrtXEJn5aFa4EQQnq7A1rBbTtJPnPYZdnc7uptfG5EUj3Hmq3AfIpF3EYc7Q1c321VvunqjS2rY2VFjCWA3YRTYSSc3sQHUy0dbuVPbu4sZbUXUvBVAmo5mZb8PmfH2dFo0HrLndioNrasw8uGqDe9mDBJoUa0poyRtbMhVEfS34/http://clk.atdmt.com/CNT/go/429760144/direct;wi.300;hi.250/01/274635752/’ TARGET=’_blank’ > <IMG SRC=’http://view.atdmt.com/CNT/view/429760144/direct;wi.300;hi.250/01/274635752/’ BORDER=’0′ > </A> </NOSCRIPT>

Secret Practices
Unlike most secret societies, the Golden Circle didn’t just concern itself with clandestine meetings and mysterious plans. Instead, the group often formed renegade armies and bands of bushwhackers in order to forward their agenda by force. In 1860, a group of the Knights made a failed attempt to invade Mexico. During the war, they robbed stagecoaches and attempted a blockade of the harbor in San Francisco, and a group of them even managed to briefly take control of southern New Mexico.

5. The Thule Society


Famous Members
Rudolf Hess, Arthur Rosenberg, Adolf Hitler (rumored)

Lots of secret organizations are suspected of having malevolent ulterior motives, but the Thule Society is one of the few where such suspicions have been proven. The group was unofficially started in Germany just after the end of WWI. It began as a kind of German heritage group that dabbled in the occult, but it quickly transformed into an organization that sought to forward the ideology of the Aryan race, and it took an outwardly racist approach toward Jews and other minorities. The group soon boasted over a thousand members, and even had its own propaganda newspaper. In 1919, members of the Thule Society formed a political organization called the German Workers’ Party. A young Adolf Hitler became a member, and eventually took over the party, which would later become known as the National Socialist German Workers’, or Nazi, party.

Secret Practices
Even before the Thule Society became a vehicle for Nazism, the members were involved in some pretty bizarre activities. The strangest was the group’s fascination with the Aryan race, whose origins they tried to trace back to the mythical land of Thule, which the Greeks had claimed was found north of Europe near Iceland and Greenland.

4. The Sons of Liberty


Famous Members
Paul Revere, John and Samuel Adams, John Hancock

The Sons of Liberty is the name for a loosely organized group of dissidents that existed in America prior to the Revolutionary War. The group did not exist as a secret society in the traditional sense; rather, it was made up of smaller factions of patriots from across the colonies that united in support of a common goal. When they did meet, it was usually in Boston around an elm tree that has since become known as the Liberty Tree. It was here that the group would formulate their resistance, which included the dissemination of pamphlets and even some sabotage and terrorist activity. This behavior led to the British branding the Sons of Liberty as seditious, and they were often referred to pejoratively as “The Sons of Violence.” The group is most notable today for sowing the seeds of revolution among the colonists with their protest of the Stamp Act, and for coining the now famous phrase “no taxation without representation.”

Secret Practices
The Sons of Liberty in Boston were the most famous arm of the group, but there were factions spread out all across the 13 colonies. One group in Rhode Island looted and burned the British trade ship Gaspee in protest of unfair trade practices, while others were known to tar and feather British loyalists. Still, the most famous event engineered by the Sons remains the Boston Tea Party in 1773, when members of the group dressed as Indians and dumped shiploads of overtaxed tea into Boston Harbor.

3. Skull and Bones


Famous Members
George H.W. Bush, George W. Bush, John Kerry

Ivy League Colleges are known for their many secret societies and student organizations, and of these Yale’s Skull and Bones is probably the most famous. The society taps new students for membership every spring, and the only real prerequisite for membership is that the initiate be a campus leader. As such, athletes, members of the student council, and fraternity presidents are often considered. Skull and Bones counts among its membership U.S. Presidents, Senators, and Supreme Court Justices, which has lead many to argue that the group works as some kind of underground organization for the high-powered political elite. There is no denying that the club is well funded: an alumni organization called the Russell Trust Association bankrolls its activities, and the group supposedly owns an island in upstate New York.

Secret Practices
Skull and Bones’ membership is no longer kept secret, but their practices still are. The order meets twice a week, but just what goes on at their meetings has never been revealed. To the disappointment of conspiracy theorists, what rumors have come out are relatively innocuous. The group has supposedly taken part in a number of pranks, and was once even sued by chairman of the Apache tribe, who claimed the Bonesmen were in possession of the skeleton of Geronimo. Beyond this, the group is known for allegedly forcing new members to relate their sexual history to the rest of the society, and for giving out nicknames to each initiate. In a widely reported rumor, President George H.W. Bush was supposedly known as “Magog,” a name given to the Bonesman with the most sexual experience.

2. The Illuminati


Famous Members
Goethe, Ferdinand of Brunswick, many others rumored

In popular culture and the realm of wild and weird conspiracy theories, no secret organization has become as well known as the Illuminati, who have made frequent appearances in books, movies, and television. The group as it is popularly understood is more or less a myth, but the legend of it dates back to a real organization that existed in Germany in the late 1700s. At the time, the members of the group presented themselves as an order of enlightened free thinkers. The press soon turned against them, and they came to be regarded by many as an underground force of dissidents intent on overthrowing the government, and they were even blamed for inciting the French Revolution. The group disbanded shortly thereafter, but their influence remained strong, and for years after their dissolution they were rumored to still be operating somewhere in the shadows.

Secret Practices
Thanks to its constant presence in popular culture, the Illuminati have continued to be feared to this day. Modern conspiracy theorists have asserted that the group survived and now operates as a sinister shadow government, directing world industry and politics as it sees fit. The Bush family, Winston Churchill, and President Barack Obama have all been named as prominent members, but no legitimate evidence of such a group has ever been uncovered. Still, the rumor lives on as one of the most popular, albeit bizarre, of all conspiracy theories.

1. The Freemasons


Famous Members
Winston Churchill, Mark Twain, James Buchanan, Bob Dole, Henry Ford, Ben Franklin

Although they are less influential and secretive today than they once were, the Freemasons remain one of the most famous fraternal organizations in the world, with a membership somewhere in the neighborhood of 5 million. The group was officially founded in 1717, but documents relating to its existence date back to the 1300s.  It was originally created to be a brotherhood whose members share certain key philosophical ideas, among them a belief in a supreme being. The group stresses moral uprightness, and as such many of the chapters have become known for their charitable work and community service. Despite these seemingly harmless practices, the Freemasons are not without their critics. Conspiracy theorists have long targeted them for supposedly being involved in nefarious occult practices, and there have even been whole political groups based around opposition to the group. Churches of all denominations have also criticized the organization, as its moral teachings and esoteric spiritual beliefs have been said to be in competition with more traditional religion.

The Stonecutters, a secret society featured on the Simpsons is based on the Freemasons.

Secret Practices
With its huge membership and different lodges scattered across the globe, modern Freemasonry no longer has the same universal principles as it did in the old days. One practice that has remained constant is the method for induction. Initiates must be recommended to the group by someone who is already a Mason, and once a member they must pass through three different degrees of standing before reaching the level of “Master Mason.” Members also have certain prescribed modes of greeting one another, including handshakes, gestures, and passwords, and non-masons are always banned from attending meetings.

Enhanced by Zemanta


Posted by on Wednesday, March 3, 2010 at 8:55 am
Filed under Bizarre, Podcasts, Politics, Religion

Read more: http://www.toptenz.net/top-10-secret-societies.php#ixzz2Lfrm6plK

Posted in The Underground Manuals, Uncategorized | Comments Off on Standard Fair

The Weather Underground

Posted by N. A. Jones on February 2, 2013

Documentary

Posted in The Underground Manuals | Tagged: | Comments Off on The Weather Underground

60’s Underground Press.us

Posted by N. A. Jones on August 26, 2012

What modern America is all about

Published: Sunday | August 26, 2012 0 Comments

A Jamaican’s take on the US at one of its most stimulating periods of political and social growth

Title: On The Ground, An Illustrated Anecdotal History of the Sixties Underground Press In the US

Book info: Edited by Sean Stewart, P M Press 2011, printed in the US on recycled paper, 203 pages, price US $20.

Reviewed by: Laura Tanna

This book, edited by a scion of the Jamaican Kennedy clan – though he prefers to be acknowledged on his individual credits – was given to me by a media colleague who knew that I had graduated from the University of California at Berkeley in 1969, hotbed of student radicalism in the ’60s, after meeting my future husband upon my arrival there in 1965.

Yes, can you imagine Dhiru Tanna giving a rousing speech on behalf of the movement against colonialism on the steps of Sproul Hall? But he did, and we both took the student movement at Berkeley in our strides as part of our education. We were global before most people knew what was entailed in that term.

But what my colleague here didn’t know was that although I started high school in a segregated town in Indiana, and then became the first American to ever attend the Shia Imami Ismailia Secondary School in Kampala, Uganda – a Muslim school for those of you who aren’t up on your Islamic terminology – I also ended my secondary school education at Friends Seminary – a private Quaker New York school where most of the students were Jewish or Episcopalian – while living in Greenwich Village, so that between Berkeley and the Village, while helping to edit The Journal of New African Literature and the Arts (JONALA) while in California.

I can probably appreciate Sean Stewart’s book better than most people in Jamaica or, for that matter, in the United States of America. Now, normally, I take a very low profile, usually eliminating myself from interviews to the extent that most people don’t even realise those which I have done. But in this case, I want you to know that I am qualified to tell you that this is a brilliant book.

One of my Jamaican friends in Miami picked it up and was mesmerised by the posters and magazine covers from the ’60s’ underground press reproduced in On The Ground.

Unfortunately, for copyright reasons, we can’t reproduce them for you here, but what Sean has done is to research the publications which were instrumental in fomenting the fight for human rights, whether they be against the war in Vietnam, or discrimination against people of colour, or discrimination against women or those whose sexual orientation is not that of most others. The underground press started on the former, but over the years, showed the way towards the liberation of all others.

Now Sean Stewart, born and raised in Kingston, then having migrated to North America, appreciated that in these small local presses, in some cases no more than mimeographed handouts on street corners, herein lay what press freedom and social progress is all about.

GOOD PERSPECTIVE

His editing takes a little time to grow on the reader, but it is useful. He selects excerpts from interviews with, or writings by, various underground editors or authors – whether they be Jewish high-school students, middle-class Midwesterners or members of the Black Panther movement – and isolates them into subjects within chapters.

After a while, you get to know the different personalities and move with the times and the themes that Stewart has selected. In so doing, he creates a superb history of America at one of its most stimulating periods of political and social growth. Anybody wanting to understand what modern America is all about should read this volume.

It’s not always easy. Some of it is disconcerting, discombobulating for those not familiar with this decade, but persevere. You will start to grasp what motivates the baby-boomer generation that now holds sway in positions of power, or that motivates those who resent the potential liberalism represented by the ideas put forth in the underground press.

Paul Buhle in his preface proclaims: “We changed journalism, battled repressive laws” and they had fun in the process. Jamaicans should especially appreciate this book because it speaks to individuality, neither conformist nor non-conformist. It deals with the sacredness of human life, examines the moral courage of direct action during the civil rights movement, and illustrates how journalism became a lifestyle of total immersion, both political and cultural.

GREAT READ

I have pages of quotations of relevance from this volume, too many to share with you here. For example, this quote from Ben Morea, of Black Mask, The Family, which illustrates the power of music, something Jamaicans understand, and these were free concerts.

“There was a certain cultural antagonism between the ghetto-dweller and the youth, the hippie. They didn’t quite have the same background, so our role was always to try and ease that tension … . We’d have black bands or steel drum bands, rock bands, and Latin bands all playing together so the audience would be all three. I mean that was our goal, it was conscious. We would try to bring together art and politics or ghetto and hippie – we were always trying to bridge gaps.”

On The Ground, available on Amazon.com, is probably going to be difficult for you to find in a local bookstore, but look for it, read it, and appreciate how Jamaicans of all backgrounds contribute to understanding our global culture and how it has evolved.

Posted in The Underground Manuals | 5 Comments »

Source: The Anarchist Underground

Posted by N. A. Jones on April 29, 2012

The Anarchist Underground

Posted in Activism, The Resistance, The Underground Manuals | 1 Comment »

The Underground Manuals: Cybersecurity Definitions

Posted by N. A. Jones on April 24, 2012

Who is Threatening the Security of Your Network?

By Michael Cooney, NetworkWorld    Apr 24, 2012 5:12 pm

The myriad threats to public, private and U.S. government networks is getting a ton of attention in Washington, D.C., this week as the House gets ready to debate yet another cybersecurity bill.

At a hearing — “America is Under Cyber Attack: Why Urgent Action is Needed” — a number of security experts spoke about the impact of attacks on the critical IT systems that make companies and the country run.

MORE: From Anonymous to Hackerazzi: The year in security mischief-making

“It is difficult to overstate the potential harm these threats pose to our economy, our national security, and the critical infrastructure upon which our country relies. The number and sophistication of cyber-attacks has increased dramatically over the past five years and is expected to continue to grow,” said Shawn Henry, former executive assistant director for the FBI’s Criminal, Cyber, Response, and Services. Henry is now president of CrowdStrike Services. “The threat has reached the point that, given enough time, motivation, and funding, a determined adversary will likely penetrate any system that is accessible directly from the Internet.”

As part of the hearing, the watchdogs at the Government Accountability Office laid out some of the basics of the security problems facing the industry.

“Cyber-based threats are evolving and growing and arise from a wide array of sources. These threats can be unintentional or intentional. Unintentional threats can be caused by software upgrades or defective equipment that inadvertently disrupt systems. Intentional threats include both targeted and untargeted attacks from a variety of sources, including criminal groups, hackers, disgruntled employees, foreign nations engaged in espionage and information warfare, and terrorists. These threat sources vary in terms of the capabilities of the actors, their willingness to act, and their motives, which can include monetary gain or political advantage, among others,” said Gregory Wilshusen, director, Information Security Issues, with the GAO.

According to the GAO, the most common sources of cyberthreats include:

• Bot-network operators: Bot-net operators use a network, or bot-net, of compromised, remotely controlled systems to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The services of these networks are sometimes made available on underground markets (e.g., purchasing a denial-of-service attack or services to relay spam or phishing attacks).

• Criminal groups: Criminal groups seek to attack systems for monetary gain. Specifically, organized criminal groups use spam, phishing, and spyware/malware to commit identity theft, online fraud, and computer extortion. International corporate spies and criminal organizations also pose a threat to the United States through their ability to conduct industrial espionage and large-scale monetary theft and to hire or develop hacker talent.

• Hackers: Hackers break into networks for the thrill of the challenge, bragging rights in the hacker community, revenge, stalking, monetary gain, and political activism, among other reasons. While gaining unauthorized access once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites. Thus, while attack tools have become more sophisticated, they have also become easier to use. According to the Central Intelligence Agency, the large majority of hackers do not have the requisite expertise to threaten difficult targets such as critical U.S. networks. Nevertheless, the worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage.

• Insiders: The disgruntled organization insider is a principal source of computer crime. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a target system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat includes contractors hired by the organization, as well as careless or poorly trained employees who may inadvertently introduce malware into systems.

• Nations: Nations use cyber tools as part of their information-gathering and espionage activities. In addition, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power — impacts that could affect the daily lives of citizens across the country. In his January 2012 testimony, the Director of National Intelligence stated that, among state actors, China and Russia are of particular concern.

• Phishers: Individuals or small groups execute phishing schemes in an attempt to steal identities or information for monetary gain. Phishers may also use spam and spyware or malware to accomplish their objectives.

• Spammers: Individuals or organizations distribute unsolicited email with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware or malware, or attack organizations (e.g., a denial of service).

• Spyware or malware authors: Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. Several destructive computer viruses and worms have harmed files and hard drives, including the Melissa Macro Virus, the Explore.Zip worm, the CIH (Chernobyl) Virus, Nimda, Code Red, Slammer, and Blaster.

• Terrorists: Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken the economy, and damage public morale and confidence. Terrorists may use phishing schemes or spyware/malware in order to generate funds or gather sensitive information. These sources of cyber threats make use of various techniques, or exploits, that may adversely affect computers, software, a network, an organization’s operation, an industry, or the Internet itself. Table 2 provides descriptions of common types of cyber exploits.

Follow Michael Cooney on Twitter: @nwwlayer8 and on Facebook.

Read more about wide area network in Network World’s Wide Area Network section.

Posted in Cyberwar, The Underground Manuals | Comments Off on The Underground Manuals: Cybersecurity Definitions