Friday, July 18, 2014

BREAKING : Malaysian Airliner Shot Down Over Ukraine - Malaysia MH17 Plane Crash Images In East Ukraine Appear Online

Obama's murdering CIA shoots down airliner as cover for Israeli invasion of Gaza, blames Russia; White House killers rush to "secure" crash site in order to destroy evidence of U.S. munitions used in shoot-down:  CNN explodes in anti-Russian propaganda fest, directly blames Putin for downing of plane - CNN's spies in Ukraine should be rounded up, summarily shot    


Malaysia Airlines flight MH17 was traveling from Amsterdam to Malaysia when it went missing near Donetsk in eastern Ukraine on Thursday. There were 285 people and 15 crew members aboard the Boeing-777.

The passenger plane was expected to enter Russian airspace at 5:20pm local time - but the plane had failed to do so.

“The last known position was over Ukrainian airspace,” the airline tweeted shortly after early news of the plane’s disappearance began to emerge.

The Boeing 777 was carrying 285 passengers and 15 crew members on board.

All 295 people aboard were killed in the disaster, Interfax-Ukraine news agency reported a Ukrainian Interior Ministry official as saying.

Donetsk People's Republic PM Aleksandr Boroday has termed the incident a provocation by the Ukrainian military, noting that forces in the east have no air defense that could target an aircraft at the height of 10,000 meters, while Ukranian President Petro Poroshenko noted: “We stress that Ukraine did not carry out any action to destroy targets in the air.”

Immediate investigations were launched by Malaysian PM Najib Razak. “I am shocked by reports than an MH (Malaysian Airlines) plane crashed. We are launching an immediate investigation,” Razak wrote on Twitter.

Russian President Vladimir Putin informed US President Barack Obama about the crash immediately by phone, on the basis of air controller data, but so far neither the Kremlin nor the White House have commented on whether the Boeing-777 was downed.

International airlines including Lufthansa, Aeroflot, Transaero, Virgin, and Turkish Airlines have announced that their flights will be avoiding Ukrainian airspace.

At least seventy-one Dutch nationals were on board, reported RTL. It has also been reported by the media that 23 US nationals could have been on board, as well as four French nationals and "between five and 10 Britons" according to a Whitehall source who spoke to Mail Online.

This news bureau contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

WAYNE MADSEN INTERVIEW : Americans Swept Up in NSA Spying ; FIVE EYES Assault On Social Media - Video

With the inevitable fall of the Obama criminals the NSA, CIA and other "OGA" scum must be dismantled permanently; their murderers tried, convicted and publicly executed

By Wayne Madsen

The latest release of documents from the Ed Snowden cache reveal that the British Government Communications Headquarters (GCHQ), the National Security Agency's British counterpart, has spearheaded the development of tools to manipulate, disrupt, and collect personal information from social media, including Facebook, PalTalk, and YouTube.

The Internet surveillance and disruption tools were developed by GCHQ's Joint Threat Research Intelligence Group (JTRIG) and are identified on page views from GCWiki, a classified Wikipedia clone developed by GCHQ for internal use by GCHQ and other FIVE EYES signals intelligence alliance partner agencies, including NSA. GCWiki bears the classification TOP SECRET STRAP 1 COMINT.

The similarity of GCWiki to Wikipedia is so striking the question arises as to what assistance Wikipedia "volunteer" personnel provided to GCHQ in the development of GCWiki. As has been previously reported by WMR, Wikipedia has been used by intelligence agencies, including the CIA, to engage in psychological warfare operations directed against countries, institutions, and individuals. The CIA has been caught red-handed directing its personnel to become Wikipedia volunteer editors.

As an example of some of the disruptive tactics used by FIVE EYES, the POISON ARROW too, which was under development on July 5, 2012, but believed to be operation now, permits the signals intelligence agencies to download disruptive and destructive malware -- safe to NSA and its partners' computers and networks -- to targeted computers and networks. WMR has been affected by malware that cannot be removed by commercial programs. Therefore, we have gone to a "sneaker net" environment in which our production computer is off-line and physically separated from our Internet-accessible computer. However, other Snowden documents have revealed that NSA has managed to get around such "air gaps" with different surveillance and disruption technology.

Other NSA/GCHQ tools include DANCING BEAR, which collects WiFi access points used by targeted individuals. HACIENDA uses GEOFUSION to pinpoint targets using IP locations. MINIATURE HERO collects Skype-to-Skype and Skype-to-external call records, instant messaging content, and contact lists. The vulnerability of cloud databases is exemplified by MOUTH, which collects user files from RESERVOIR collects a wealth of information from Facebook, however SPRING BISHOP targets and collects private photographs on Facebook. SODAWATER collects Gmail messages.

Perhaps the most destructive tool used by NSA and GCHQ is ANGRY PIRATE, which permanently disables accounts stored in a target's computer. BUMPERCAR automatically reports on offensive materials on YouTube, with the intention that such videos will be taken down.

SKYSCRAPER permits NSA and its partners to widely distribute videos and other multimedia content on the web.

SPACE ROCKET is used to insert media into targeted networks. BOMB BAY is used to increase the rankings and hits of selected websites. SLIPSTREAM permits the inflation of page views on web sites. BADGER allows for the mass mailing of e-mail to support information operations campaigns, in effect, spamming. BURLESQUE permits SMS messages to be spoofed. 

Another spamming tool is CANNONBALL, which permits repeated text messages to be sent to a target. GATEWAY permits the artificial increase of traffic to a website. SERPENTS TONGUE broadcasts fax messages to multiple target numbers.

CLEAN SWEEP permits Facebook Wall postings to be counterfeited for individuals or entire countries. CHINESE FIRECRACKER permits brute force logins of on-line forums. CONCRETE DONKEY allows repeated recorded messages to bombard a target's phone or the same message can be sent to a large number of phones.

DEER STALKER permits the geo-location of satellite and GSM phones by the silent calling of the targeted phone's number. VIPERS TONGUE targets GSM and satellite phones with denial of service attacks. WARPATH permits SMS messages to be sent to a large number of phones. LUMP is used to discover the names that are associated with avatars.

Intrusion into on-line gaming systems was accomplished by SECOND LIFE in 2012 but GLITTERBALL was due to replace the program. ELATE is used to monitor the United Kingdom's E-Bay auction website.

IMPERIAL BARGE is used for connecting two target phone numbers. SCARLET EMPEROR denies service by call bombing targeted phones. SCRAPHEAP CHALLENGE spoofs messages from Blackberry devices. TANGLEFOOT determines whether a target is on-line. CHANGELING spoofs email addresses and permits phony messages to be sent from the addresses.

PREDATORS FACE is used to disrupt servers through denial of service attacks. STEALTH MOOSE disrupts Windows-based computers. SUNBLOCK denies a target the ability to send and receive email and to view content on the Internet. SWAMP DONKEY encrypts files on targeted computer systems making them inaccessible to the user. TORNADO ALLEY permits Excel spreadsheet documents to contain executable files that can be run on a target's computer. 

The ability to change the outcome of on-line polls was conducted by NUBILO in 2012 but UNDERPASS was on tap to replace it.

 AustraliaAustralian Secret Intelligence ServiceASISHUMINT
Australian Signals DirectorateASDSIGINT
Defence Intelligence OrganisationDIODefence Intelligence
 CanadaChief of Defence IntelligenceCDISDefence Intelligence
Communications Security Establishment CanadaCSECSIGINT
Canadian Security Intelligence ServiceCSISHUMINT
 New ZealandDirectorate of Defence Intelligence and SecurityDDISDefence Intelligence
Government Communications Security BureauGCSBSIGINT
New Zealand Security Intelligence ServiceNZSISHUMINT
 United KingdomDefence IntelligenceDIDefence Intelligence
Government Communications HeadquartersGCHQSIGINT
The Security ServiceMI5Security intelligence
Secret Intelligence ServiceMI6HUMINT
 United StatesCentral Intelligence AgencyCIAHUMINT
Defense Intelligence AgencyDIADefence Intelligence
Federal Bureau of InvestigationFBISecurity intelligence
National Security AgencyNSASIGINT

QUINCY is used to exploit seized media. The JTRIG document does notr explain what constitutes "seized media" but laptops, smart phones, and other devices are routinely seized not only as part of criminal investigations but by customs and immigration officials at U.S., British, Canadian, and other FIVE EYES border control points.

Programs listed under "Shaping and Honeypots" use various programs that appear designed to entrap targets with downloaded files and images. Images are hosted by PISTRIX. DEADPOOL is an NSA/GCHQ-provided URL shortening service. WURLITZER is used to distribute files to multiple websites. 

Big Brother, which is not one of the JTRIG code-named programs, but should be, is alive and doing well in Cheltenham, England and Fort Meade, Maryland.


Wayne Madsen
Investigative journalist, author and syndicated columnist, Madsen has over twenty years experience in security issues. 

As a U.S. Naval Officer, he managed one of the first computer security programs for the U.S. Navy.Madsen has been a frequent political and national security commentator on Fox News and has also appeared on ABC, NBC, CBS, PBS, CNN, BBC and MS-NBC. He has been invited to testify as a witness before the US House of Representatives, the UN Criminal Tribunal for Rwanda, and an terrorism investigation panel of the French government. A member of the Society of Professional Journalists (SPJ) and the National Press Club, Madsen is based and reports from Washington, D.C.



The real truth on 9/11 slowly continues to bleed out

Technical experts are mounting major challenges to official U.S. government accounts of how three World Trade Center skyscrapers collapsed in near-freefall after the 9/11 attacks 15 years ago.

Many researchers are focusing especially on the little-known collapse of



The Geopolitics Of The United States, Part 1: The Inevitable Empire

The Empire and the inevitable fall of the Obama criminal regime

STRATFOR Editor’s Note: This installment on the United States, presented in two parts, is the 16th in a series of STRATFOR monographs on the geopolitics of countries influential in world affairs.

Like nearly all of the peoples of North and South America, most Americans are not originally from the territory that became the United States.



Geopolitics Of The United States Part 2: American Identity And The Threats of Tomorrow

A look back at 2011 predictions for the future in order to put events of today into perspective

 photo capitalism_zpsah78uy5p.jpg
We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset.



By Robert S. Finnegan

This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation...



UPDATED 01/07/2015 : New Analysis Challenges Tamiflu Efficacy; Hong Kong Corona Virus Outbreak


 photo TAMIFLU_small_zpssojx6okt.jpg

Obama criminals now resulting to biowarfare in quest to destroy Chinese and ASEAN economy; "novel virus substrain" points directly to a Kawaoka / Fouchier / Ernala-Ginting Kobe lab virus weaponized and genetically altered to specifically target and infect the Asian population: Ribavirin...



 photo WHO02_zpsplmhtlpr.jpg
The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .



By Robert S. Finnegan

On October 12, 2002 the Indonesian island of Bali experienced a terrorist attack that rocked the world. It was unquestionably well-coordinated and executed, the largest in the country's history.