On YouTube:

YouTube Preview Image

Published on May 9, 2013 by zefrank1
The diary of sad cats everywhere :(
Tweet This :: http://bit.ly/1a8AnDP (you can add text !)
Post To FB :: http://on.fb.me/19wNCLy
Music : http://bit.ly/1479bzw
Inspired by : http://www.buzzfeed.com/copyranter/the-best-of-first-world-cat-problems
(i am also the EVP of video for Buzzfeed)

Credits ::

Film Footage courtesy of Shutterstock, Inc., Used by Permission

Watering the Cat (bowl)/Kiwithing
flickr.com

Closeup portrait photo of a CPA cat looking out through a window/Xiaojiao Wang
shutterstock.com

Poor lonely kitten lays on the floor waiting for his friends to come back/Xiaojiao Wang
shutterstock.com

Closeup portrait photo of a CPA cat looking out through a window/Xiaojiao Wang
shutterstock.com

Silver Persian kitten hiding in a paperbag./Jane Howard
gettyimages.com

scotitish fold grey cat/5464316719
shutterstock.com

But wait, there’s more Caturday:

Orange cat hugging black cat: 'Aww, you're not bad luck. Don't listen to them!'

{ 1 comment }

National Report: Dearborn Michigan Public School Adopts Strict Islamic Halal Dietary Regime

Charlton Middle School in Dearborn, Michigan have removed all haram foods from their lunch menu, and replaced them with ones that follow the strict dietary laws of the Islamic faith.  These new halal meal options are a bid to accommodate their largely Muslim student body. The school, located in Wayne County, is resident to 40,000 Arab Americans, and is one of the largest Islamic communities in all of the United States.  Charlton alone teaches close to 400 pupils, and students from Muslim families outnumber the other children 7-1.

Previously the school had offered a wide array of Americanized food staples, such as pizza, hamburgers, tacos, mixed fruit, and milk. Many of these meals however contained items that were considered to be “inedible” by Muslim standards.

The local Islamic community recently contacted the school board with complaints about the issue,  accusing the school of religious discrimination. School officials quickly yielded to their requests, and removed all offending foods from their cafeteria and in turn began serving meals approved by the Islamic faith.

The school now serves a vast array of Arabic foods made entirely from ingredients that are permitted under Islamic law. They have even taken the extra step of implementing religious fasting during Islamic holidays such as Ramadan. Children also have the option to pause from their studies at a predetermined time of day so that they may pray to Mecca as instructed in their Holy Book, the Quran.

Continue reading…

Just askin’…

What would happen if Christians were to demand that public schools allow their students an opportunity to pray before snacks or meals? Or to pray for the safety of players and spectators before each sports event? Or that public schools stop their indoctrination in polymorphous perversity under the guise of “sensitivity training” and/or “sex education”?

Peter Ingemi explains why Muslims are protected and Christians are not:

…The answer is simple, the incentive system isn’t there.  Black Masses at harvard produce Eucharistic Processions, Obamacare mandates against religious groups produce lawsuits, bans against Pam’s ads produce TV clips and lawsuits.

However speaking against Islam produces murder and threats of murder

Oh, and by the way…

Halal food funds and promotes terrorism.

{ 3 comments }

Tehreek-e-Khilafat image
The image sent by Tehreek-e-Khilafat with their announcement of allegiance to al-Baghdadi

Telegraph (UK) has the story:

(h/t: Jawa)

A Pakistani terror group has become the first in the region to break ranks and declare allegiance to the Islamic State that has seized power across Iraq and Syria.

It represents a breakthrough for Abu Bakr al-Baghdadi as he tries to win support for his caliphate, potentially extending his influence into South Asia and bolstering his challenge to al-Qaeda for leadership of the global jihadist movement.

Little is known about the Tehreek-e-Khilafat group other than that it has claimed responsibility for a string of attacks in Karachi.

This week it pledged to raise the Islamic State’s flag in South Asia and Khurasan – the historic name used by Islamist militants for an area covering Afghanistan and Pakistan.

Using the poetic language often favoured by jihadist groups, it said in a statement: “From today, Sheikh Abu Bakr al-Baghdadi shall consider Tehreek-e-Khilafat and Jihad mujahideen fighters of Pakistan as one of the arrows among his arrows which he has kept for his bow.

“We are praying from the almighty Allah to give us chance in our lives to see the expansion of Islamic State boundaries toward the Sub­Continent and Khurasan region in order to hoist the flag of Islamic State here.”

It is thought to be the first group beyond the Middle East to have offered support.

Pakistan is home to dozens of militant groups with greater or lesser ties to al-Qaeda or the Taliban.

Tehreek-e-Khilafat and Jihad is considered part of the Pakistan Taliban, an umbrella movement linked to al-Qaeda containing dozens of terrorist groups, racketeers and sectarian outfits.

Its statement was passed on through trusted sources.

Continue reading…

{ 0 comments }

Telegraph (UK) has the story:

French police stumbled on terror plans after decrypting coded messages between Algerian butcher living in southern France and high-ranking members of al-Qaeda in the Maghreb

France foiled an Islamist terrorist plot to target the Eiffel Tower, the Louvre and even a nuclear power plant, it emerged on Wednesday, as the country unveiled new, tougher anti-terror rules.

French police stumbled on the plans after decrypting coded messages between a 29-year-old Algerian butcher living in the Vaucluse, southern France, known only as Ali M, and one of the highest-ranking members in al-Qaeda in the Islamic Maghreb, or AQIM.

According to Le Parisien newspaper, in April last year, the married father of two who went by the pseudonym Abu Jaji was asked by his AQIM contact, whose web alias was Redouane18, to make “suggestions concerning how to conduct jihad in the place you are currently”.

Ali M suggested targeting nuclear power plants, “planes at the moment of take-off”, and a string of French landmarks, including the Eiffel Tower and the Louvre museum in Paris.

Failing that, he suggested launching terror attacks on “the modest and poor French population” in markets or nightclubs, as well as police patrols.

In an apparent reference to the famed Avignon theatre festival, he also singled out “cultural events that take place in the south of France in which thousands of Christians gather for a month”.

“The main walkways become black with people and a simple grenade can injure dozens of people, not to mention a booby trapped device,” he said.

His contact then asked him to travel with a fellow would-be terrorist to Algeria to “benefit from a military training and training in combat techniques”.

After that, he would return to France, stake out targets and “await your instructions”.

“I am fully ready and prepared,” he replied.

Although the plans were still at the discussion stage, French police arrested the Algerian in June last year, a month before he was due to fly to Tunisia and then onto Algeria for training.

Continue reading…

Sticker: Beware! Halal food funds terrorists
T-shirt available from Restore Australia.
(h/t: Bare Naked Islam)

Update: We told you so!

The terror suspect is an Algerian Muslim butcher, which means he is a halal butcher. 1389 Blog has previously warned of the dangers of halal butchers immigrating into non-Muslim countries, and of income from halal food sales and certification funding Islamic terrorism. This is in addition to the public health hazards posed by poor sanitation in halal abbatoirs and warehouses.

{ 2 comments }

On YouTube:

YouTube Preview Image

Published on Jun 25, 2014 by CBN News
CBN News contributor Raymond Ibrahim explains the Islamic terrorists’ goal of restoring the caliphate and what it means for Christians and the West.

Follow: http://twitter.com/CBNNews
Like: http://www.facebook.com/cbn
Website: http://www.cbn.com/cbnnews/

{ 0 comments }

Syria-Abu Sayyaf connection

The Star (Malaysia): Syrian with false Malta passport fined RM8,000

BY MUGUNTAN VANAR

SANDAKAN: A Syrian man, who used a false Malta passport to leave Sandakan on a ferry to Zamboanga City in southern Philippines was fined RM8,000 or eight months jail by a Sessions Court here.

Khaled Abdul Rahman Mohamad, 32, pleaded guilty Monday to the offence under Section 12(1) (a) of the Passport Act 1966 (Act 150) before Sessions Court Judge Egusra Ali.

According to the facts of the case, Khaled had entered Malaysia via Kuala Lumpur International Airport using a Syrian Passport on June 6, this year.

Khaled was detained at the Immigration Control Post at the Sandakan seaport trying to board the passenger ferry to Zamboanga City with a Malta passport on June 17.

Further investigation conducted by the Immigration Department showed the accused is a Syrian national and had paid certain sum of money to obtain the fake Malta passport, deputy public prosecutor Mohd Fillany Siji told the court.

Malaysia security has been on high alert in Sandakan following suspected movement of militants to southern Philippines via Sandakan to undergo training with the Al Qaeda linked Abu Sayyaf group.

On June 14 this year, Bukit Aman counter terrorism arrested a Royal Malaysian Navy officer among three men arrested in Sandakan for being part of a militant group planning to undertake suicide bombings and attack missions in Syria and Iraq.

They were linked to rebel groups called the Islamic State of Iraq and Sham (ISIS) in the Middle East and Abu Sayyaf.

Malaysia map

Also see:

{ 0 comments }

  • For a larger view of the photo, please click here.
  • Charles C. W. Cooke at National Review has more about this photo.

{ 2 comments }

He’s wearing the looted watch in the video below. It doesn’t quite fit his wrist.

First Appearance of ISIS Caliph Abu Bakr Al Baghdadi (English Subtitles)

YouTube Preview Image

Published on Jul 5, 2014 by MMEMonitorMideast

Excerpts from the speech at the Grand Mosque in Mosul by ISIS Caliph Abu Bakr al-Baghdadi.

ISIS emir and newly, self-appointed Caliph for all Muslims blesses mankind with his first public appearance in a video recorded at a mosque in Mosul. In his first appearance, Abu Bakr Al Baghdadi enlightens misguided Muslims and informs them that he too is, in fact, imperfect.

Excerpts from his speech were translated exclusively for Monitor Mideast.

Al Baghdadi’s first lecture consists of interpretations he gave to Quranic verses, whilst some other quotes were plagiarized from the first speech held by the first Sunni Caliph, Abu Bakr.

Taken from The Telegraph:

Abu Bakr al-Baghdadi, the leader of the Islamic State, emerged from the shadows to lead Friday prayers at Mosul’s Great Mosque, calling on the world’s Muslims to “obey” him as the head of the caliphate declared by the Sunni jihadist group.

The notoriously secretive jihadi, who has never before been seen in public, chose the first Friday prayer service of Ramadan to make an audacious display of power in the city that Salafist Islamists have now controlled for three weeks.

Speaking from the balcony in his new incarnation as self-anointed “Caliph Ibrahim”, al-Baghdadi announced himself as “the leader who presides over you”, urging Muslims to join him and “make jihad” for the sake of Allah.

Under his direction, the Islamic world would be returned to “dignity, might, rights and leadership”, he said.

“I am the wali (leader) who presides over you, though I am not the best of you, so if you see that I am right, assist me,” he said, dressed in a black turban and robe reminiscent of the last caliphs to rule from Baghdad.

Like us: www.facebook.com/monitormideast
Subscribe to us: http://www.youtube.com/user/MMEMonitorMideast
Follow us: http://www.twitter.com/MonitorMideast
Read us: http://www.monitormideast.com

The black turban shows that al-Baghdadi claims descent from Muhammad through the male line.

Daniel Greenfield: ISIS Caliph of All Muslims Wears Stolen $6000 Watch

While ISIS leader Abu Bakr al-Baghdadi, who has proclaimed an Islamic State, was telling Muslims they had to obey him, he showed off some of the loot that his followers could expect to pick up along the way.

The Islamic State leader spoke publicly for the first time at Mosul’s Great Mosque of Friday, an intervention in which he called on the world’s Muslims to “obey” him as “the leader who presides over you”.
But the self-anointed ‘Caliph Ibrahim’ also brought a touch of branding into the bloody conflict, with many who have seen the 20-minute sermon commenting on his bulky and expensive wristwatch.

Appearing in black robes and a turban in an attempt to evoke memories of the last Caliphs to rule from Baghdad, the jihadist broke with the tradition to sport an ill-fitting chrome watch with a dark face.

His choice of accessory, which is believed to be either a Rolex, Sekonda or £3,500 Omega seamaster…

Some are calling this a misstep, but looting was the core of Mohammed’s conquests. His followers weren’t all that devout, they were looking for stuff to steal. That is why many of Mohammed’s original targets, including the Jews, were well off.

Like most thieves, Mohammed went where the money was.

“Allah made booty lawful and good. He used it to incite the Muslims to unity of purpose. So enjoy what you have captured.

Ishaq:327

“Allah saw what was in their hearts [what they coveted] so he rewarded them with victory and with as much spoil as they could take. Allah promised that they would soon capture a great deal of booty.”

Ishaq:503

Allah taught them how to divide the spoil. He made it lawful and said, ‘A fifth of the booty belongs to the Apostle. (Mohammed)’

Ishaq:324

On the Badr expedition, the Messenger took the sword of Dhu al-Faqar as booty. It had belonged to Munabbih. On that day he also took Abu Jahl’s camel as booty. It was a Mahri dromedary on which he used to go on raids. It is said that he wrote ‘Ma’aqil’ [Blood-Money] on his sword.”

Religion was a means for Mohammed to rob people. It’s not that different from what Al-Bagdadi is doing. The “spiritual” aspect of martyrdom simply promised those of the Mohammedan bandits who died in the process of robbing people that they would enjoy the spoils of victory, e.g. food, women, wealth, in Islamic paradise.

Islam, as I have said before, is innately a gang religion. Its faith is in its ability to steal from others.

Islam always reverts back to the gang. It comes out of the desert and returns to the desert. It begins with a handful of men raiding civilized towns and cities. And no matter how much time must pass and how the world turns, it always reverts back there. Over a thousand years later, the climactic struggle of Islam is almost indistinguishable from what it was in the time of Mohammed.

The gang can only think of fighting more, killing more and doing the same things it did last week again. It finds meaning in the ethos of the fight and in the comradeship of fellow gang members. That is why Jihad is so central to Islam. It is why women occupy such an inferior position. Jihad is the gang culture of Islam. Its bonding rituals are central to Islam whose original elements derive mainly from the raids of Mohammed and his companions against the more civilized peoples of the region.

Islam finds its meaning from fighting and killing non-Muslims. It is the only meaning that it can ever have.

Continue reading…

Walid Shoebat: Behold The New Muslim Caliph Eyes Saudi Arabia For Its Ultimate Destruction

Abu Bakr al-Baghdadi was on video openly rallying the adepts of the new Islamic state he had just pronounced in the largest city that his fighters had taken. Clad in black robes that invoked a distant, almost mythical phase of Islamic history, Baghdadi gave a half-hour sermon during Friday prayers in Mosul and led worship inside one of the most important Islamic sites in Iraq in open defiance of the US intelligence officials who have put a $10m bounty on his head.

In doing so, he laid down for the first time after the fall of the Ottoman Caliphate, a new Caliphate in Iraq.

What he mimicked was the first Caliph in Islam Abu Bakr who on the day following the meeting at Saqeefa Bani Salida, all the Muslims of Madina assembled in the Prophet’s mosque for Zuhr prayer, and for offering allegiance to Abu Bakr as the Caliph.

In a surprise, those present at the grand mosque in Mosul had no idea who would be preaching on Friday. But as the bearded figure made his entrance, he was introduced to them simply as “your new caliph Ibrahim”.

“I am not better than you or more virtuous than you,” Baghdadi says in the video. “If you see me on the right path, help me. If you see me on the wrong path, advise me and halt me. And obey me as far as I obey God.”

Everything, statements, attire, setting and message comes from the Inaugural address to the first Muslim Caliph Abu Bakr and is why Al-Baghdadi chose the name Abu Bakr and even used the same statements of the historic Abu Bakr:

“When all the Muslims, gathered in the mosque, had offered their allegiance to Abu Bakr, Abu Bakr rose to address them. After praising Allah and offering his tribute to the Holy Prophet of Islam, Abu Bakr addressed the congregation in the following terms: “O people, I swear by Allah that I never coveted the caliphate either by day or by night … Now, it is beyond doubt that I have been elected your Amir, although I am not better than you. Help me, if I am in the right; set me right if I am in the wrong …”

Al-Baghdadi’s choice of attire and language showed he was trying to liken himself to the earliest caliphs, especially those who ruled during the Abbasid period, a flourishing but brutal time in Islamic history. Al-Baghdadi in his sermon was relying heavily on verses from the Qur’an and the words of other caliphs, in particular Abu Bakr the first caliph, who led the Islamic world after the death of the prophet Muhammad.

All the worshippers had to perform Friday prayers and give allegiance to the new Caliph or face 50 lashes.

To understand this allegiance Shoebat.com explained in detail how Islam coined the Sharia ruling of Mubaya’at or “Bay’at”, which is giving an allegiance to the Prince of the Faithful, which currently Al-Baghdadi, Da’ish’s leader pledged to establish the Caliphate (read here).

The besieged prime minister, Nouri al-Maliki, has constantly claimed to be making gains on the battlefields, but his forces are yet to claw back any of the losses to Isis.

Scholars in Baghdad say the fact that Baghdadi can trace his lineage back to the Muslim prophet gives him significant leverage under sharia law, making it difficult for any senior cleric to contest his legitimacy as an Islamic leader.

“He is trying to seize a moment,” said Hashimi, a scholar on Islam. “He truly does believe he is a man worthy of historical comparison. He has all the all the criteria and the conditions. He belongs to the family tree.”

Officials have attempted to suggest that Baghdadi is a deluded figure overcome by hubris. Some even suggested that he was the contemporary equivalent of a Jonestown cult leader, brainwashing followers into blindly following him in a nihilistic grab for power and influence.

However, the gains that Isis has made over two countries in such a short time suggest that its leadership is highly organised and efficient. “He is rational,” said Hashimi.

“He thinks very clearly about what he is doing. He is deeply ideological and committed.

“He is also very determined to make himself into the one true ruler of Sunni Islam.”

In Baghdad, the appearance of the video was met with alarm and curiosity in equal measure.

Azima Zahra, a resident of the capital, said Baghdadi’s image would give her nightmares for weeks.

“He is what I thought he would be: a cold, mean and cruel man who thinks he is a prophet,” she said. “He will lead us all to ruin.”

The gestures of support from Saudi Arabia primarily take the form of anonymous individuals holding placards declaring admiration for ISIS.

[...]

Saudi Arabia is aware that its a main target of al-Baghdadi. Saudi King Abdullah bin Abdulaziz recently met with Abdel Fattah el-Sisi of Egypt to obtain assistance in case of an attack on the kingdom.

And just this week, Saudi Arabia has deployed 30,000 troops to its border with Iraq.

The Caliphates army are well-armed and well-funded and has already seized control of most of western Iraq, is now effectively at the kingdom’s doorstep. Nearly half the 900km (560 mile) Saudi-Iraq border is with Iraq’s Anbar province where The Caliph’s army now is able to move its fighters around at will and officials fear that the attack on Saudi Arabia is only a matter of time.

The Harlot of Babylon, Saudi Arabia is realizing finally that funding the Syrian revolution created a curse, that the same Jihdist fighters in Syria are now about to terrorize Arabia.

Saudi is also a major source of support for ISIS. Since the latest offensive in Iraq, hashtags have overwhelming been originating from Saudi Arabia with 95 percent emanated from Saudi Arabia over the last week, by far eclipsing those from Iraq and Syria, where the ISIS is actually operating at present.

Continue reading…

Also see:

{ 1 comment }

Issuing passports is part of the process of making a putative sovereign political entity look legitimate. The question is, which countries and/or jihadi warlords will recognize these ISIS passports? Or are they merely identity cards whose function is primarily to lure jihadis to move to ISIS-held territory and join the jihad?

Al Arabiya has the story:

Alleged ISIS passport

(h/t: Blazing Cat Fur)

Militant members and sympathizers of the Islamic State of Iraq and Syria (ISIS) have circulated pictures of what they said was the passport of the so-called “caliphate” declared last week by the militant group.

The “State of the Islamic Caliphate” appears to be inscribed at the top of the purported passport. At the bottom, it says: “The holder of the passport if harmed we will deploy armies for his service.”

ISIS reportedly said the new document will be distributed to 11,000 citizens living in cities bordering Iraq and Syria.

The militant group, which operates in both Iraq and Syria, said their caliphate would spread from Aleppo in northern Syria to Diyala in eastern Iraq.

The passport is reportedly being printed in a government facility in Mosul that was built in 2011.

The facility known as the “Identification and Passport Center” was scheduled by the Maliki’s government to start issuing new ID card next week, according to Iraqi media reports.

Last week, ISIS leader Abu Bakr al-Baghdadi called on Muslims with military, medical and managerial skills to flock to its newly-declared pan-Islamic state, in an audio recording.

“Those who can immigrate to the Islamic State should immigrate, as immigration to the house of Islam is a duty,” said Baghdadi.

Continue reading…

{ 0 comments }

NSA
NSA headquarters in Fort Meade, Maryland. Photo: NSA

Wired Threat Level: The NSA Is Targeting Users of Privacy Services, Leaked Code Shows

If you use Tor or any of a number of other privacy services online or even visit their web sites to read about the services, there’s a good chance your IP address has been collected and stored by the NSA, according to top-secret source code for a program the NSA uses to conduct internet surveillance.

There’s also a good chance you’ve been tagged for simply reading news articles about these services published by Wired and other sites.

This is according to code, obtained and analyzed by journalists and others in Germany, which for the first time reveals the extent of some of the wide-spread tracking the NSA conducts on people using or interested in using privatizing tools and services—a list that includes journalists and their sources, human rights activists, political dissidents living under oppressive countries and many others who have various reasons for needing to shield their identity and their online activity.

The source code, for the NSA system known as XKeyscore, is used in the collection and analysis of internet traffic, and reveals that simply searching the web for privacy tools online is enough to get the NSA to label you an “extremist” and target your IP address for inclusion in its database.

But the NSA’s analysis isn’t limited to tracking metadata like IP addresses. The system also conducts deep-packet inspection of emails that users exchange with the Tor anonymizing service to obtain information that Tor conveys to users of so-called Tor “bridges.”

Legal experts say the widespread targeting of people engaged in constitutionally protected activity like visiting web sites and reading articles, raises questions about the legal authority the NSA is using to track users in this way.

“Under [the Foreign Intelligence Surveillance Act] there are numerous places where it says you shouldn’t be targeting people on the basis of activities protected by the First Amendment,” says Kurt Opsahl, deputy general counsel for the Electronic Frontier Foundation. “I can’t see how this activity could have been properly authorized under FISA. This is suggesting then that they have come up with some other theory of authorizing this.”

The findings also contradict NSA longstanding claims that its surveillance targets only those suspected of engaging in activity that threatens national security.

“They say ‘We’re not doing indiscriminate searches,’ but this is indiscriminate,” Opsahl notes. “It’s saying that anyone who is looking for those various [services] are suspicious persons.”

He notes that the NSA actions are at clear odds with statements from former U.S. Secretary of State Hilary Clinton and others in the government about the importance of privacy services and tools to protect First Amendment freedoms.

“One hand of the government is promoting tools for human rights advocates and political dissidents to be able to communicate and is championing that activity,” he says. “While another branch of the government is determining that that activity is suspicious and requires tracking. This may intimidate people from using these very important tools and have a chilling effect that could undermine the free expression of ideas throughout the world.”

The findings were uncovered and published by Norddeutscher Rundfunk and Westdeutscher Rundfunk—two public radio and TV broadcasting organizations in Germany. An English-language analysis of the findings, along with parts of the source code for the XKeyscore program—was also published by Jacob Appelbaum, a well-known American developer employed by the Tor Project, and two others in Germany who play significant roles in Tor.

Secrets Revealed in the Code

XKeyscore is the collection system the NSA uses to scoop up internet data and analyze it. It has been described in NSA documents leaked by Edward Snowden as a crucial tool that the NSA can use to monitor “nearly everything a user does on the internet.”

Embedded in the code they found rules describing what XKeyscore is focused on monitoring. The rules indicate that the NSA tracks any IP address that connects to the Tor web site or any IP address that contacts a server that is used for an anonymous email service called MixMinion that is maintained by a server at MIT. XKeyscore targets any traffic to or from an IP address for the server. The NSA is also tracking anyone who visits the popular online Linux publication, Linux Journal, which the NSA refers to as an “extremist forum” in the source code.

Tor was originally developed and funded by the U.S. Naval Research Laboratory in the late ’90s to help government employees shield their identity online, but it was later passed to the public sector for use. Tor has since been completely rebuilt by developers, and is now overseen by the Tor Project, a non-profit in Massachusetts, though it is still primarily funded by government agencies.

Tor allows users to surf the internet as well as conduct chat and send instant messages anonymously. It works by encrypting the traffic and relaying it through a number of random servers, or nodes, hosted by volunteers around the world to make it difficult for anyone to trace the data back to its source. Each node in the network can only see the previous node that sent it the traffic and the next node to which it’s sending the traffic.

In documents released by Edward Snowden, NSA workers discussed their frustration in spying on people who use Tor. “We will never be able to de-anonymize all Tor users all the time,” one internal NSA document noted.

But the XKeyscore source code reveals some of the ways the NSA attempts to overcome this obstacle.

Tor isn’t the only target of XKeyscore, however. The system is also targeting users of other privacy services: Tails, HotSpotShield, FreeNet, Centurian, FreeProxies.org, and MegaProxy.

Tails is an operating system used by human rights activists, as well as many of the journalists who have access to the Edward Snowden documents, to protect sensitive computer activity. It runs from a USB stick or CD so that it’s not stored on the system, and uses Tor and other privacy tools to protect user activity. At the end of each session, when the user reboots it, Tails erases any data pertaining to that session—such as evidence of documents opened or chats—except for data the user has specifically saved to an encrypted storage device. The NSA clearly regards Tails as a sinister tool, however, referring to it in one comment in the source code as “a comsec mechanism advocated by extremists on extremist forums.”

The XKeyscore rule for monitoring Tails users indicates that it is designed to identify users searching for the software program, as well as anyone “viewing documents relating to TAILs, or viewing websites that detail TAILs.”

Continue reading…

WaPo: In NSA-intercepted data, those not targeted far outnumber the foreigners who are

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by theNational Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.

Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.

Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.

The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address.

Among the most valuable contents — which The Post will not describe in detail, to avoid interfering with ongoing operations — are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks.
[...]
Months of tracking communications across more than 50 alias accounts, the files show, led directly to the 2011 capture in Abbottabad of Muhammad Tahir Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the Indonesian island of Bali. At the request of CIA officials, The Post is withholding other examples that officials said would compromise ongoing operations.

Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless.

In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach.

The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.

The material spans President Obama’s first term, from 2009 to 2012, a period of exponential growth for the NSA’s domestic collection.

Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks.

No government oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court, intelligence committees in Congress or the president’s Privacy and Civil Liberties Oversight Board, has delved into a comparably large sample of what the NSA actually collects — not only from its targets but also from people who may cross a target’s path.
[...]
Among the latter are medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren. In one photo, a young girl in religious dress beams at a camera outside a mosque.

Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and kissed by their mothers. In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam or striking risque poses in shorts and bikini tops.

“None of the hits that were received were relevant,” two Navy cryptologic technicians write in one of many summaries of nonproductive surveillance. “No additional information,” writes a civilian analyst. Another makes fun of a suspected kidnapper, newly arrived in Syria before the current civil war, who begs for employment as a janitor and makes wide-eyed observations about the state of undress displayed by women on local beaches.

By law, the NSA may “target” only foreign nationals located overseas unless it obtains a warrant based on probable cause from a special surveillance court. For collection under PRISM and Upstream rules, analysts must state a reasonable belief that the target has information of value about a foreign government, a terrorist organization or the spread of nonconventional weapons.

Most of the people caught up in those programs are not the targets and would not lawfully qualify as such. “Incidental collection” of third-party communications is inevitable in many forms of surveillance, but in other contexts the U.S. government works harder to limit and discard irrelevant data. In criminal wiretaps, for example, the FBI is supposed to stop listening to a call if a suspect’s wife or child is using the phone.

There are many ways to be swept up incidentally in surveillance aimed at a valid foreign target. Some of those in the Snowden archive were monitored because they interacted directly with a target, but others had more-tenuous links.

Continue reading…

{ 1 comment }

Understanding Bayes’ Theorem

YouTube Preview Image

Published on Jul 3, 2014 by Acts17Apologetics
http://www.acts17.net
Many people are intimidated by Bayes’ theorem, because it looks like a complicated mathematical equation. However, once we understand what the symbols represent, Bayes’ theorem turns out to be based on the sort of math we all learned in elementary school. To prove it, here’s a video of me teaching Bayes’ theorem to two of my sons (ages nine and ten). If they can learn it, you can learn it!

Bayes' Theorem
It’s explained above.

 

{ 0 comments }

Why Jesus In The Quran Makes No Sense – David Wood

YouTube Preview Image

Published on Jul 1, 2014 by The Truth Shall Set You Free
Why Jesus in the Quran makes no sense – David Wood

Support the great Jesus or Muhammad show of abn at https://www.abnsat.com Visit also: https://www.trinitychannel.com

Jesus Accepts Worship

YouTube Preview Image

Published on Jul 6, 2014 by Acts17Apologetics
http://www.answeringmuslims.com
Muslims claim that Jesus was only a prophet. Yet Jesus accepts worship and even demands worship. Would a mere prophet allow people to worship him?

{ 1 comment }

On YouTube:

YouTube Preview Image

Published on Jul 5, 2014 by Coffee with Sr. Vassa
Subtitles: ENGLISH. Theology with a bit of humor. A weekly, brief reflection on the church calendar, hosted by Dr. Sr. Vassa Larin of the University of Vienna, Austria. Ep.30 on the Apostle Peter.

{ 0 comments }

On YouTube:

YouTube Preview Image

Published on Jul 3, 2014 by yazakchattiest
Tempers flare at California town hall meeting on illegal immigration.
Fox News: Your World with Neil Cavuto
http://www.foxnews.com/on-air/your-world-cavuto/index.html
Fox News
http://www.foxnews.com/
Fox News Insider: The Official Live Blog of Fox News Channel
http://foxnewsinsider.com/
Fox News Live Wall Chat
http://foxnewsinsider.com/live-wall/
Fox News Tweets
http://foxnewsinsider.com/fox-news-channel-on-twitter
Fox Business
http://foxbusiness.com/
Fox Nation
http://nation.foxnews.com/

{ 0 comments }

On YouTube:

YouTube Preview Image

Published on Jul 3, 2014 by PJ Media
• Share this Afterburner on Facebook: http://goo.gl/t3vxza

Why should Washington be a slur any longer? Our first President has nothing to do with the way the town named for him has become synonymous with narcissism, overburdening regulation and cowardice. No, this city looks more like Obama’s vision, rather than Washington’s. Join Bill Whittle for this Afterburner.

Bill Whittle delivers a masterful mix of intellect and passion in every episode of “Afterburner.” Now you can enjoy all of his videos — from 2008 to now. Click here to buy the Best of Afterburner video package that’s right for you: http://bit.ly/AfterburneronPJTV

{ 0 comments }