Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.
But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.
The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
Spying on international telephone calls has always been a staple of NSA surveillance, but the requirement that an actual person do the listening meant it was effectively limited to a tiny percentage of the total traffic. By leveraging advances in automated speech recognition, the NSA has entered the era of bulk listening.
And this has happened with no apparent public oversight, hearings or legislative action. Congress hasn’t shown signs of even knowing that it’s going on.
The USA Freedom Act — the surveillance reform bill that Congress is currently debating — doesn’t address the topic at all. The bill would end an NSA program that does not collect voice content: the government’s bulk collection of domestic calling data, showing who called who and for how long.
Even if becomes law, the bill would leave in place a multitude of mechanisms exposed by Snowden that scoop up vast amounts of innocent people’s text and voice communications in the U.S. and across the globe.
Civil liberty experts contacted by The Intercept said the NSA’s speech-to-text capabilities are a disturbing example of the privacy invasions that are becoming possible as our analog world transitions to a digital one.
“I think people don’t understand that the economics of surveillance have totally changed,” Jennifer Granick, civil liberties director at the Stanford Center for Internet and Society, told The Intercept.
“Once you have this capability, then the question is: How will it be deployed? Can you temporarily cache all American phone calls, transcribe all the phone calls, and do text searching of the content of the calls?” she said. “It may not be what they are doing right now, but they’ll be able to do it.”
And, she asked: “How would we ever know if they change the policy?”
Indeed, NSA officials have been secretive about their ability to convert speech to text, and how widely they use it, leaving open any number of possibilities.
That secrecy is the key, Granick said. “We don’t have any idea how many innocent people are being affected, or how many of those innocent people are also Americans.”
I Can Search Against It
NSA whistleblower Thomas Drake, who was trained as a voice processing crypto-linguist and worked at the agency until 2008, told The Intercept that he saw a huge push after the September 11, 2001 terror attacks to turn the massive amounts of voice communications being collected into something more useful.
Human listening was clearly not going to be the solution. “There weren’t enough ears,” he said.
The transcripts that emerged from the new systems weren’t perfect, he said. “But even if it’s not 100 percent, I can still get a lot more information. It’s far more accessible. I can search against it.”
Converting speech to text makes it easier for the NSA to see what it has collected and stored, according to Drake. “The breakthrough was being able to do it on a vast scale,” he said.
More Data, More Power, Better Performance
The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s.
What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds.
In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited.
Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
“I would tell you we are not very good at that,” he said.
In an ideal environment like a news broadcast, he said, “we’re getting pretty good at being able to do these types of translations.”
A 2008 document from the Snowden archive shows that transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing:
(U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing.
Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.
And the Snowden documents show that the same kinds of leaps forward seen in commercial speech-to-text products have also been happening in secret at the NSA, fueled by the agency’s singular access to astronomical processing power and its own vast data archives.
In fact, the NSA has been repeatedly releasing new and improved speech recognition systems for more than a decade.
The first-generation tool, which made keyword-searching of vast amounts of voice content possible, was rolled out in 2004 and code-named RHINEHART.
“Voice word search technology allows analysts to find and prioritize intercept based on its intelligence content,” says an internal 2006 NSA memo entitled “For Media Mining, the Future Is Now!”
The memo says that intelligence analysts involved in counterterrorism were able to identify terms related to bomb-making materials, like “detonator” and “hydrogen peroxide,” as well as place names like “Baghdad” or people like “Musharaf.”
RHINEHART was “designed to support both real-time searches, in which incoming data is automatically searched by a designated set of dictionaries, and retrospective searches, in which analysts can repeatedly search over months of past traffic,” the memo explains (emphasis in original).
As of 2006, RHINEHART was operating “across a wide variety of missions and languages” and was “used throughout the NSA/CSS [Central Security Service] Enterprise.”
But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.”
The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states.
A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
Extensive Use Abroad
Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.
The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America.
For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.”
The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
Keyword spotting extended to Iranian intercepts as well. A 2006 memo reported that RHINEHART had been used successfully by Persian-speaking analysts who “searched for the words ‘negotiations’ or ‘America’ in their traffic, and RHINEHART located a very important call that was transcribed verbatim providing information on an important Iranian target’s discussion of the formation of a the new Iraqi government.”
“Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
The memo offers an example from NSA Texas, where an analyst newly trained on the system used a keyword search to find previously unreported information on a target involved in drug-trafficking. In another case, an official at a Special Collection Service site in Latin America “was able to find foreign intelligence regarding a Cuban official in a fraction of the usual time.”
Analysts in Texas found the new technology a boon for spying. “From finding tunnels in Tijuana, identifying bomb threats in the streets of Mexico City, or shedding light on the shooting of US Customs officials in Potosi, Mexico, the technology did what it advertised: It accelerated the process of finding relevant intelligence when time was of the essence,” he wrote. (Emphasis in original.)
The author of the memo was also part of a team that introduced the technology to military leaders in Afghanistan. “From Kandahar to Kabul, we have traveled the country explaining NSA leaders’ vision and introducing SIGINT teams to what HLT analytics can do today and to what is still needed to make this technology a game-changing success,” the memo reads.
Extent of Domestic Use Remains Unknown
What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.”
The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
US-led air strike in Syria kills 52 civilians, including seven children; death toll continues to rise | 02 May 2015 | The death toll from an air strike by US-led forces on the northern Syrian province of Aleppo has risen to 52 including seven children, a group monitoring the conflict said on Saturday. Rami Abdulrahman, who runs the British-based Observatory for Human Rights, said the death toll from Friday’s strike was the highest civilian loss in a single attack by US and Arab forces since they started air raids against hardline Islamist militant groups in Syria such as Islamic State [I-CIA-SIS]. US-led forces are also targeting the group in Iraq.
The recent scandal involving the sexual abuse of African children carried out by members of a UN peacekeeping mission, despite numerous efforts of this international organization to play it down, will not be ignored. And the international community must finally recall what was the original purpose of the UN as established by allied powers after the Second World War in the name of peace and security for all people on the planet.
According to a series of publications by Bruxelles2, France Info, Guardian and a number of other media outlets, a number of French and Georgian soldiers that were employed in the UN peacekeeping operation “Sangaris” in Central Africa, are responsible of child sexual abuse.
It should be recalled that an armed conflict between the government of the Central African Republic and Muslim rebels, many of which took part in the civil war of 2004-2007, resulted in the French Defense Minister Jean-Yves Le Drian announcing that France would deploy a thousand soldiers in CAR to carry out a UN peacekeeping mission. On December 9, 2013 the United States decided to take part in this operation, while the Georgian parliament also agreed to send its soldiers to CAR a year later, on February 22, 2014. By June 2014 the number of Georgian Armed Forces in the Central African Republic reached 140 members.
According to the French news agency France Info, French and Georgian soldiers were raping children aged 8 to 15 years in the area near M’Poko airport and were subjecting them to sexual exploitation.
Some of the incidents that occurred between December 2013 and June 2014 in a refugee camp at M’Poko airport were depicted in a special UN closed report that was titled “Sexual Abuse on Children by International Armed Forces.” In particular, the document contains witnesses of local boys that were subjected to sexual exploitation, including rape and homosexual relations in exchange for food and water. The majority of the victims were orphans, increasing their vulnerability. In the summer of 2014 this report was handed over to the office of the UN High Commissioner for Human Rights in Geneva, however no action was taken to investigate the factual findings.
In these circumstances and in order to stop systematic child rape in CAR, one of the staff members of the Geneva Branch of the United Nations Anders Kompass had given those documents to French authorities on his on initiative, in hopes that they would take effective measures to investigate the described incidents and punish those responsible. However, the highest ranks of the United Nations didn’t seem willing to “wash their dirty linen in public”, instead they are now planning to sack the “snitch” for an “unauthorized disclosure of proprietary information.”
In this regard, one must note that in the past the United Nations has been caught trying to conceal incidents of pedophilia numerous times, including sexual exploitation of children in the Democratic Republic of Congo, Kosovo and Bosnia, along with concealing incidents involving sexual harassment in Haiti, Burundi and Liberia.
Recently, some serious accusations against the UN were made by James Wasserstrom, a former US diplomat that was fired from the UN once he expressed his suspicions about the corruption among senior officials of the former UN mission in Kosovo. In particular, this former diplomat stressed the fact that instead of punishing Anders Kompass, this international organization must have taken all possible measures to prevent such abuse in the future, along with punishing all responsible figures in a timely manner. A responsible official of the Swedish Foreign Ministry Anders Ronquist, has also raised his voice in the defense of Anders Kompass, stating that those incidents must never again occur in the future. There’s little doubt that those crimes along with the UN’s attempts to hide them do not erode the credibility of this international organization.
But the fact is that this credibility has already been jeopardized by numerous cases of unjustified use of force initiated by certain UN members to achieve their own geopolitical goals. Once the UN became a political servant of Washington, it has started serving US military contractors that hungry for even more bloodshed all across the globe. This policy has already led to the death and suffering of hundreds of thousands of civilians in Afghanistan, Iraq, Libya, Syria and other countries of the Middle East, along with Africa and the former Yugoslavia.
If there’s going to be no change in the policies and actions of the United Nations officials now, it is possible that this organization may suffer the sorry fate of its predecessor – the League of Nations, that was just as unable to prevent conflicts and global threats to humanity on the basis of respect to international laws.
The recent shooting in Garland Texas could now justify the unprecedented military Drill this summer titled “Jade Helm 15″. It also justifies the phony War on Terror, increased Budgets for DHS, FBI, NSA etc…. And will be used to usurp the guaranteed Constitutional freedoms of all Americans. It has MUCH in common with the Paris and Boston Attacks, in that it was a p2OG, Gladio style attack where the FBI knew the alleged ‘Terrorists”. The fact that “ISIS” has claimed responsibility is just further proof that ISIS is (Like Al Qaeda) is being run by Global Intelligence.
Below you can read the Information even the MSM is reporting + a historical overview of Gladio style ops. Spread it far and wide.
Texas police were warned about ISIS attack TWO DAYS days before deadly shootout by Anonymous activist| 05 May 2015 | An activist linked to the international hackers’ collective Anonymous tipped off police in Garland, Texas, about an imminent attack on an anti-Islam event two days before it happened – but the red flag went unnoticed. Police and the FBI say Elton Simpson, 30, and his roommate, 34-year-old Nadir Soofi, from Phoenix, Arizona, opened fire Sunday evening on an unarmed security guard outside a contest featuring cartoons of the Prophet Muhammad. The Daily Dot reported Monday that the Garland Police Department had received advance warning of the attack two days earlier, courtesy of a woman living outside the US who has identified herself as an affiliate of the Anonymous network.
Gunman in Mohammad cartoon attack in Texas was monitored for years by federal agents | 04 May 2015 | Federal agents for years monitored one of the two gunmen who were shot dead after opening fire with assault rifles at a heavily guarded Texas exhibit of caricatures of the Prophet Mohammad. Two government sources who asked not to be named said the shooters were roommates Elton Simpson and Nadir Soofi, of Phoenix. Court documents show that Simpson had been under surveillance since 2006 and was convicted in 2011 of lying to FBI agents over his desire to join violent jihad in Somalia.
A *blatant* false flag in Garland, Texas:Accused Texas Gunman Well-Known to FBI Before Attack [And SWAT was already there, waiting.] | 04 May 2015 | Since at least 2007, the FBI has been able to recognize the voice of Elton Simpson — one of the men suspected in the Texas shootings outside a contest featuring [racist] cartoons of the Muslim Prophet Muhammad. Agents recorded the young man from Phoenix talking about fighting nonbelievers for Allah…Simpson was arrested in 2010, one day before authorities say he planned to leave for South Africa. But despite more than 1,500 hours of recorded conversations, the government prosecuted him on only one minor charge — lying to a federal agent. Years spent investigating Simpson for terrorism ties resulted in three years of probation and 600 in fines and court fees.
Garland Shooting: Gladio – Texas-Style
Garland shooting involved troupe of practiced war propagandists and patsies long on the FBI’s watch list.
May 4, 2015 (Tony Cartalucci – LD) – ABC News confirms that one of the suspects of the Garland Texas shooting incident, featuring professional war propagandists of the so-called “American Freedom Defense Intitiative” (AFDI), has been under FBI surveillance and investigation since at least as early as 2007.
Followers of ISIS had been sending messages about the event in Texas for more than a week, calling for attacks. One referenced January’s Charlie Hebdo massacre in France and said it was time for “brothers” in the United States to do their part. Simpson was well known to the FBI. Five years ago he was convicted for lying to federal agents about his plans to travel to Africa where investigators alleged he planned to join a terror group. The investigation into Simpson reached back to July 2007, when he was recorded saying of fighting with Islamists, “I know we can do it, man. But you got to find the right people that… Gotta have connects.”
Despite the event allegedly increasing chatter amongst “Islamic State” (ISIS) groups online, and despite the suspect Elton Simpson being long under FBI surveillance and even sentence to 3 years of probation resulting from a terror-related investigation, he was still able to conveniently conspire and carry out an attack on a highly provocative propaganda stunt in the state of Texas.
Garland Shooting Fits Pattern of Larger Staged Terror Campaign
As with all other staged provocations, including similar shootings in Paris, France, Copenhagen, Denmark, and Sydney, Australia, the suspects were well known to state security agencies for years, but allowed to conspire and carry out predictable, deadly, and politically highly convenient attacks. All of this echos the similar and long-since exposed staged provocations of the notorious “Operation Gladio,” carried out by NATO.
In Paris, France, the suspects in the so-called “Charlie Hebo Shooting” were under the watch of security forces for years, were in and out of jail specifically for terrorism, were known to have left France to join terrorists fighting with Western-backing in Syria and return, only to be left “unwatched” for precisely the 6 months they would need to plan, assemble the weapons for, and prepare to execute the attack.
In Copenhagen, an assailant who attacked a synagogue killing 2, was also well known to security agencies. The Washington Post would report in their article, “Danish attacks echo France,” that:
The assailant in this weekend’s attacks was well known to Danish intelligence, Madsen said. In November 2013, Hussein stabbed a teenager in the thigh while aboard a commuter train, and according to Danish media, he had recently been released from prison following his conviction. But it was unclear whether this weekend’s assailant was under surveillance and, if so, how he managed to slip free long enough to plan an attack with an assault rifle.
Once again, suspects under surveillance and even arrested and imprisoned as violent offenders or as terrorists, managed to conveniently “slip free” of security agencies just in time to carry out attacks that just so happen to help the West continue its extraterritorial wars raging abroad, and continue building an abhorrent police state back at home.
Finally, in Australia, a suspect who held up a cafe in a deadly hostage crisis, was literally brought to Australia from Iran for the purpose of waging a propaganda war on Iran. When this failed to materialize, the “shape-shifting sheik” would morph to fit the villain necessary to match whatever narrative was currently being floated around the Western media. His final performance would help bolster the illusion that ISIS is an enemy of the West, rather than a creation and perpetuation of it, and to this day serving as the West’s extraterritorial mercenary forces in nations like Syria and Iraq.
A Modern Day Gladio
NATO’s Operation Gladio, and its larger “stay behind” networks established after World War II across Europe and at the center of multiple grisly assassinations, mass shootings, and terrorist bombings designed to demonize the Soviet Union as well as criminalize and crush support for left-leaning political parties growing in popularity in Western Europe. It would be determined that NATO’s own covert militant groups were killing innocent Western Europeans in order to effect a “strategy of tension” used to instill fear, obedience, and control over Western populations.
A similar campaign of staged terror has been and is still being carried out not only across Europe but also now in the Americas - including in Canada. The purpose of this campaign is to divide society socially and politically, while helping to radicalize young people to join the ranks of US-British-Saudi armed and funded mercenary groups abroad in nations like Syria, Iraq, Yemen, Egypt, and Libya, and then return to commit staged provocations to inspire fear, hatred, and obedience at home.
It is a conflict of which both sides are controlled by the same criminal special interests. While it is clear that Western security forces maintain a large pool of potential terrorists they intentionally allow to roam free until needed, it may not be clear to many of what the backgrounds are of those who organized the event in Garland, Texas that allegedly provoked this most recent attack.
Neo-Con Propagandists Are Hiding Behind Freedom of Speech, Not Defending It
The supposed trigger for this provocation was a “draw Mohammad” contest organized by the American Freedom Defense Intitiative (AFDI), a performing Neo-Conservative propaganda troupe consisting of the Bush-era US Ambassador to the UN John Bolton, full-time propagandist Pamela Gellar and Robert Spencer, and Dutch politician Geert Wilders.
Their debut performance was in 2010, where they came out to protest the so-called “Ground Zero Mosque” supposedly to be built near the ruins of the destroyed World Trade Center in New York City. The mosque was never actually built, not because of the public backlash, but because the entire controversy was manufactured. The “imam” allegedly behind the mosque, was in fact a member of the Council of Foreign Relations, funded and backed by the very same corporate-funded think tanks that set out to protest against the planned “mosque.” In other words, the entire scandal was manufactured on both sides by the same special interests for the purpose of manipulating the public.
Since then, with little success, AFDI and its various affiliates in North America and Europe have attempted to stoke hatred not toward “radical Islam,” terrorists, or the US-backed regimes arming and funding them, but against all Muslims. Dutch politician Geert Wilders, for his part, while claiming to be defending “free speech” in Texas, has been busy trying to infringe on the rights of Muslims back in his home country.
The Koran should be banned as a “fascist book” alongside Mein Kampf because it urges Muslims to kill non-believers, says Dutch populist MP Geert Wilders.
Wilders and the rest of AFDI are not exercising free speech, but are in fact attempting to inspire fear, suspicion, hatred, and tangible violence against not just “terrorists,” but all 1 billion plus practitioners of the Islamic faith, many of whom are fighting and dying this very moment battling real terrorists, ironically armed, funded, and fully backed by the very Neo-Cons that have assembled AFDI.
Not only does AFDI hold freedom of speech in contempt and actively set out to destroy it for others, they are now hiding behind it to further strip the rights, peace, and stability away from people both in the West and abroad. The so-called “War on Terror” that AFDI’s rhetoric actively supports has served as the impetus to do everything from expanding warrantless surveillance and an ever expanding police state at home, to help garner support for wars of geopolitical conquest abroad.
Not About “Free Speech”
With these facts in mind, it is clear that “free speech” is a canard used by both the “left” and “right” to distract from the real purpose of the Garland shooting, and other acts of provocation like it. It distracts from the fact that all of the perpetrators have been well-known to security agencies for years, even sentenced and/or imprisoned by various courts, as well as investigated and kept under surveillance. It distracts from the fact that the event at the center of the attacks was organized and carried out by those who themselves have actively sought to curtail the freedoms of others, not to mention foster wars that have ended or otherwise destroyed the lives of millions. It distracts from the fact that the very Neo-Cons telling the world to fear “Islam” represent the same special interests arming and funding literal Al Qaeda and ISIS terrorists across North Africa, the Middle East, and even Central and East Asia.
The AFDI represents one insidious arm of a larger criminal conspiracy that has verifiably helped end the lives of tens of thousands in Syria, Iraq, Libya, Egypt, and Yemen since 2011. It also represents the same special interests that lied to the world to justify invading Iraq in 2003, ending the lives of some 1 million people and leaving the country, to this very day, in constant deadly chaos.
The Garland shooting is not about freedom of speech, but rather about criminal special interests playing both sides of a manufactured strategy of tension to achieve further bloodshed, death, and conquest abroad, while inviting fear, division, and a growing police state stripping us all of our rights here at home.
Neither the AFDI nor the patsies involved in the shooting deserve the public’s sympathy or defense. Rather, they both demand the scrutiny and vigilance required to break the rhetorical back of this conspiracy, and strip away the support it receives from both sides of a mass-manipulated public.
Bastrop County in Texas recalled the U.S. Army to Bastrop to answer questions regarding the upcoming exercise Jade Helm 15. The court room was overflowing into other areas of the building as citizens turned out in mass to grill a Lieutenant Colonel (LTC) representing the U.S. Army Special Operations Command. A civilian contractor was present who represented the training exercise earlier in the year to Bastrop County Commissioners but he fielded no direct questions.
o Exercise is DOD and Department of State operation – not affiliated with DHS nor FEMA
o Exercise is not Martial Law training
o Exercise locations were chosen to offer unfamiliar terrain to the students
o Walmart closings are not part of exercise
o No training will occur outside of private property other than transportation of personnel to other private property locations.
o No road blocks or stopping of citizens requesting ID
o No intelligence gathering of locals and no direct law enforcement training
o Drones will be used
o Texas was supposedly not listed as hostile due to DHS labeling most Texans as “Domestic Terrorists”
o LTC said this is strictly a training exercise regardless of the current political and economic climates
Several veterans were outspoken when they were chosen to ask questions. One former Texas Spec Ops stood up and asked the LTC from Bragg ‘why they are not in DC running real ops?”. Another, a former Texas Green Beret stood up and turned slighty to the crowd and said “to not trust what they are saying because he served under the current command”. This Green Beret referenced an unspecified OP for his distrust.
They switched committee members before the vote! One did vote no, however.
The two senators who voted against the bill — Sen. Connie Leyva, D-Chino (San Bernardino County) and Sen. Sharon Runner, R-Lancaster (Los Angeles County) — said the amendments were a step in the right direction, but didn’t go far enough to address their concerns.
“I firmly believe in vaccines,” Leyva said. “I still have a concern that this will not go far enough to help a two income family who cannot homeschool their child or a single working parent.” – SF Gate
After California’s vaccine mandate bill SB277 was halted last week with an outcry of public outrage against it, the pro-vaccine mafia machine went to work. Democratic Sens. Ben Allen of Santa Monica and Richard Pan of Sacramento helped pursue a vote rigging agenda to replace seats on the committee with pro-vaccine industry sellouts. A new democrat, Sen. Bill Monning, was chosen to fill a vacant seat, and with his vote in favor of stripping Californians of vaccine exemption rights, SB277 was approved today.
The California Coalition for Health Choice branded the action as, “a rare act of outright rigging the results…” CCHC’s press release also explains, “Adding one vote in favor of the bill wasn’t enough. He also removed the Vice Chair of the committee, Senator Huff, an ardent opponent of the bill, and replaced him with Senator Runner.”
From the press release:
That bill should have died in committee last Wednesday. Instead of taking a vote and letting it die, the bill gets postponed for a week so the author can work on amendments. It’s currently scheduled as a “vote only item” Wednesday. That means no one in opposition will get to testify on whatever amendments the author proposes. How is that good government,” asked Sylvia Pimentel, State Director of the Canary Party, and member of the California Coalition for Health Choice (CCHC).
Arrogant California Senate silences the public, then forces toxic vaccines on them
“This time no public testimony was allowed,” reports the Sacramento Bee, confirming that the California Senate conspired to not just rig the vote, but also silence the public outrage so that Senate “representatives” didn’t have to hear their constituents’ testimony.
How’s that for transparency in California government? When the outcry of the public becomes too much to bear, just silence the public and vote against them!
As soon as this bill gets signed into law by Gov. Brown, it will deny public education to all children who are not vaccinated.
Capitol lobbyists, staff jump security line during California vaccine debate | 22 April 2015 | The controversy surrounding California’s mandatory vaccine bill has brought the Capitol long lines, crowded hallways and signs asking visitors to use the stairs as anti-vaccine advocates fill committee hearings to demand the state keep its personal belief exemption in place. Now you can add a special entrance for staff and lobbyists to the list. With Senate Bill 277 facing a crucial vote on Wednesday, the Joint Rules Committee sprung into action to keep disruptions to a minimum for those who work in the building the pharma-terrorists and their henchmen.
The recent arrests of two New York women for allegedly planning an Islamic State-inspired attack in America has brought the spotlight onto controversial literature, specifically a 1970s book known as ‘The Anarchist Cookbook.’ While people like Senator Dianne Feinstein (D-Calif.) have condemned the work and believes things like it should be banned, critics are more concerned with the methods and lack of accountability in America’s security community.
In addition, what corporate media will not discuss is that the the FBI informant who reportedly recruited the women, was also the one who introduced the book to the women.
Ben Swann interviews author and critic Heidi Boghosian about this trend of FBI informants who recruit terror suspects only to “foil” the plot.
Despite President Obama’soutspokenpraise for the intelligence community in the wake of revealing a pair of Western hostages killed in January, the drone war which has become a centerpiece of his foreign policy is often carried out in an intense fog.
There have been occasional inquiries in the past about “signature strikes,” the administration’s policy of carrying out strikes on totally unidentified people they think are acting like terrorists might act.
The January hostage killings reveal this in more ways than one, as the US struck what it figured was an “al-Qaeda compound,” which is the official way of saying they blew up a house. They had no idea who was inside, except that there might be al-Qaeda.
And in this case there were. The strike killed six people, including the two hostages. Also killed were a pair of American al-Qaeda members, neither of whom had been put on the president’s already legally dubious kill list, meaning they were likewise extrajudicial killings of American citizens.
Indeed, after all this we still don’t know who the other two out of the six were, though the fact that the administration isn’t presenting this as an “all’s well that ends well” situation indicates they, like most of the victims of US drone strikes, were nobody of any consequence.
That’s the US drone war all over. A lot of people are killed, only a handful are ever identified at all, and when the US does happen to kill some real al-Qaeda leader, they seem as surprised as anybody, because they sure didn’t know they were aiming at him.
19.5% reserves is still double what Fed Member banks allegedly need in the USA. These banks will also get low or NO interest rates to receive fiat currency credits they can loan out AT INTEREST more than 5 times. This is the 3rd cut in the last year, indicating that the Chinese global powerhouse economy is in trouble. Most news orgs are calling this a “Stimulus” – (Jack)
BEIJING (AP) — China’s Central Bank said Sunday that it will cut its bank reserve requirement ratio by 1 percentage point to stimulate more lending into a slowing economy.
The new reserve requirement will take effect Monday, the bank said in a statement. The move allows banks to hold onto less of their money and lend more of it out. The Communist Party-run People’s Daily said the cut will release 1.2 trillion yuan ($194 billion) into the world’s second-biggest economy.
The Central Bank also said it will cut an extra 1 percentage point for commercial banks providing agricultural financing and an extra 2 percentage points for the Agricultural Development Bank of China. It will also cut the requirement by an additional half a percentage point to eligible banks that lend a certain share of loans to agricultural borrowers and small businesses.
The Central Bank last cut its reserve requirement in February, when it slashed the rate to 19.5 percent for big banks and 16 percent for small- and medium-sized banks.
Official data showed last week that China’s economy grew by 7 percent in the first quarter of the year, the lowest level since the financial crisis of 2009.
After 19 years of broadcasting on stations owned by others, being blackballed, used, and put through the ringers….. I finally did what I should have done back in 2007. Starting my own stream!
WE ARE NOW OFFICALLY INTRODUCING RADIO FREE BLOOD!
Radio Free Blood carries the exclusive broadcast of The Jack Blood Show, Monday though Friday at 3 PM ET. On our newly formatted show, you will hear NO commercial interruptions, No censorship, No agendas…. Just a near perfect peer to server quality broadcast of Talk, News bytes, and music production. The show can go as long as our usual 2 hours, or it has gone as long as 9 hours. (That’s right, no more crappy re-Skype quality used on nearly every other alternative radio station now.!)
Other than the 3PM ET (M – F) edition of THE JACK BLOOD SHOW, nothing else is “Scheduled” because there is no schedule. We just pop up when something is cool, or important is happening.
We have been keeping this all relatively quiet until we could work out some of the bugs. Close enough. Now we want you to join us, and help promote this unique radio airscape.
HERE IS HOW IT WORKS + A BRIEF LISTING OF THE PERKS
1) We have a LIVE Chat room, so you can make requests, share real time info, enter questions, and meet and greet other listeners of the live pop up format.
2) When you sign up to “follow us”, we notify you every time we are on the air. On some computers, the show will just “pop up” and start playing without you doing anything. Every time.
3) You can download the APP for phones.
4) You can raid our “SHOWREEL” (archives) to hear what we have done anytime you are ready to hear it.
5) You can embed our player anywhere you like.
6) You can share our player on social media, and your friends can listen from there.
7) You will also get to hear LIVE simulcasts of ALL Jack Blood shows, and radio appearances! (Including the monthly edition of “Blood n Guts” with Meria Heller, and The Power Hour w/ Jack Blood (and Guests / callers), every Thursday Morning on GCN…)
8) Its free, though if you like what you are getting, it is suggested that you freely donate every month. (AKA: The honor system) Most people send e payments to JackBlood@Hotmail.com or write us there for mailing details. We should have a repetitive pay button there very soon.
WHAT ELSE WILL I HEAR ON RADIO FREE BLOOD?
RFB can POP UP anytime. We have guest DJs, hours long blocks of uncensored music you are not getting anywhere else… RFB will also POP UP to cover and analyze breaking news, impromptu celebrity interviews, or live protests.
You might hear audio books, classic radio dramas, or audio documentaries…
Its as easy as signing in to follow RADIO FREE BLOOD, and we do the rest. No more buttons to push, searching around, or setting your watch.
We greatly appreciate your support in this new endeavor, and know you will find that this is about the coolest thing we have done in at least 11 years. With your help we can continue our outreach, and consistently go forward, and not back.
I also wish to thank all of the people that helped us, and supported us through the years. Without YOU we would have been eradicated long ago.