Tuesday, January 28, 2014

NSA’s Revealed Surveillance State: Hacking Keyboards, USB Drives, Firmware, Monitors and More


http://benswann.com/nsas-revealed-surveillance-state-hacking-keyboards-usb-drives-firmware-monitors-and-more/

NSA’s Revealed Surveillance State: Hacking Keyboards, USB Drives, Firmware, Monitors and More

Article submitted by guest contributor Ezra Van Auken.
What’s been said so far about the National Security Agency (NSA) is certainly frightening to privacy and civil libertarian advocates; but with the newest revelations of them all, it’s clear that more of the revealing leaks have only arrived. Whether the leaks are a positive or negative move by whistleblower Edward Snowden is debatable, but the fact remains that what Snowden did has changed the landscape of government discussion.
Digging right in, computer hackers and gurus converged on Brazil for the 2013 Chaos Communication Conference (CCC), the thirtieth year in a row the event has taken place. Of course though, this year around, government spying revelations have hit tech junkies and privacy backers like a ton of bricks. Featured at the CCC event were speakers well known to the current tech community such as Jacob Applebaum and Julian Assange.
Given the current government surveillance debate, Applebaum and Assage were pretty much expected, considering both have dealt heavily with intrusive spying. During the event, Assange video-chatted into the Brazilian conference and offered solution, telling hackers and computer gurus to fight against state-sanctioned surveillance. What Applebaum had to offer though, is what brought down the house for listeners.
Just moments before Applebaum’s CCC speech, Germany’s newspaper Der Spiegel dropped new revelations – probably the most revealing yet – showing the NSA’s vast backdoor access into systems worldwide. Applebaum, member of the Tor project, which is an Internet web browser dedicated to increasing anonymity, decided to gear his speech around the latest revelations. What came during Applebaum’s hour-long speech turned wake-up call, shook the room and YouTube views.
To begin, Applebaum revealed a handful of programs, tools and backdoor hacks, which the NSA uses to monitor people’s systems and data. Let’s take a detailed look into each.
The first newly leaked NSA component called “RAGEMASTER” is a hardware implant that detects and seizes image signals from VGA monitors. The implant itself is hidden in the ferrite insulation of the monitor cable, behind the plug. What is even more mind numbing is the way it works.
When RAGEMASTER is illuminated by the radar unit, the signal is inflected with the red video information. As explained on the released slide, “This information is re-radiated, where it is picked up at the radar, demodulated, and passed onto the processing unit and an external monitor,” which then recreates the horizontal and vertical sync of the monitor, giving NSA personnel the ability to see exactly what’s on the monitor.
Now that we’ve learned how the NSA is able to view exactly what is on your monitor, let’s take a look at “SURLYSPAWN”. This particular hack allows NSA personnel to record and analyze keystrokes, even when the computer isn’t connected to the Internet. SURLYSPAWN is a hardware implant as well, and assists in the transmitting of what a user is typing. The slide noted that “An invisible signal emitted by the implant is modified by every keystroke, and then a radar signal emitted by a device located outside the building makes the implant’s invisible signal visible.
Once the signal is visible, personnel around the target can see everything being stroked on the keyboard. Using similar processes as RAGEMASTER, the SURLYSPAWN hack requires the implant onto a keyboard.
Then there’s “COTTONMOUTH”: another hardware implant inserted into a USB drive. It is disguised as either a keyboard’s USB plug or a USB extension cord that can be connected between a device and the intended computer. Its role is either to intercept communications or to interject Trojans, while also being able to respond to other already-implanted COTTONMOUTH implants. COTTONMOUTH can monitor the network as well as command the computer and network.
Switching over to the computer in its entirety, “GINSU” is a software hack, which allows other NSA hardware and software programs like BULLDOZER and KONGUR to maintain its stay in the system. When installed, GINSU can catch system reboots and upgrades, so that when the upgrade or reboot takes place, the software is restored to the system. Leaving the target entirely infected, rebooted or not.
And don’t think your wireless LAN is free from constraint. Der Spiegel explains, “The NSA’s ANT division also develops methods for gaining access to wireless LAN networks from the outside, allowing them to tap into these networks and plant their own software on them.” This brings us to the NSA’s “NIGHTSTAND”, which can remotely insert data packets into various Windows systems. The list includes insertions of malware into the wireless networks’ traffic. NIGHTSTAND’s process is mobile and works up to 8 miles.
Some of the targets that NIGHTSTAND can successfully exploit include Win2k, WinXP and WinXPS1P2 running IE, and the packet injection can go after either one target or multiple targets, remaining undetectable by users. Overall, the NIGHTSTAND packet injection would be used during situations when the intended target has no access to a wired connection.
Unfortunately for the privacy advocates and opponents to the surveillance state, Der Spiegel, its journalists involved and Applebaum didn’t stop here. Other NSA backdoors include phone software/hardware hacks, which allow the remote ability to control the hotmic, camera, voicemail details and other areas in the mobile phone. In addition, it’s been revealed that the NSA’s personnel have successfully exploited larger server systems and firewalls with programs such as IRONCHEF and JETPLOW.
At the same time of hype however, those concerned with state spying are only confirming their previously unsure speculation. From reading a user’s monitor, to keyboard stroke detection, to hacking wireless LANs, your footsteps on the Internet are being constantly preserved and stored by the watchers: the NSA. In the end, as government spying grows, it’ll be left up to the market of hackers, computer gurus and other specialists to block, exploit and encrypt around the NSA’s prying eyes, which even now seems like a stretch.


Read more: http://benswann.com/nsas-revealed-surveillance-state-hacking-keyboards-usb-drives-firmware-monitors-and-more/#ixzz2rl5lGtLF
Follow us: @BenSwann_ on Twitter


Tuesday, November 19, 2013

Cops bust Portland steroids ring tied to China


by Michael Rollins and Kyle Iboshi, KGW Staff
Posted on November 14, 2013 at 9:05 AM
Updated Friday, Nov 15 at 7:50 AM

http://www.kgw.com/news/Feds-local-police-bust-steroids-ring-231922281.html

PORTLAND -- Police fanned out through the Portland area early Thursday morning and raided more than half a dozen homes connected to a steroids sales ring with ties to China.
Authorities allege the group bought powdered steroids in raw form from China, then repackaged them and then sent them all across America. The indictment say the group used a used car dealership called SJ Motors to launder money while distributing the illegal drugs.
The indictment says the group imported anabolic steroids in powder form, changed them into liquid and cap form and labeled and distributed them.
The doses used a variety of added drugs including human growth hormone, Viagra, Cialis and Arimadex, a cancer treatment drug for post-menopausal women that reduces estrogen levels.
Sixteen people have been indicted in the case but Shane Jack and Landon Britt were described as the ringleaders.Court papers show that Britt sent nearly a half-million dollars to Chinese companies for steroids over the course of a seven-year period.
The indictment says money was sent between the conspirators and factories in several Chinese cities with banks in Hong Kong acting as a financial intermediary.
Financial transactions and shipments date back to 2006, with most listed in the past two years. The drugs were shipped from a post office on Southeast 82nd Avenue to as far east as North Carolina.
The indictment lists counts of conspiracy to import and distribute illegal drugs; carrying or using a firearm during the commission of a drug trafficking crime and international money laundering.
Named in the indictment were Shane Jack and wife Georgia Jack of the Duke address; Landon Britt of the Harold address; Ronald Stoltenberg of the Vancouver address; Brandon Lyons, who lives in Portland and Clackamas and is the son of defendant Rebecca Erickson and step-son of Doug Erickson, both of Portland.
The accused also include James Longoria Jr., of Clackamas, Matthew Bowen of Tualatin, Christopher Bowden of Beaverton, Travis Monteith of Fairview, Bradley Hollibaugh of Otis Orchards, Wash., Ali Shaghaghi of Seattle, Benjamin Luck and German Martin McCubbin, who live in California and Keith Kofoed who lives in California and North Carolina.
Buildings raided were in Portland at 8116 SE Duke St.; 12523 SE Harold St.,Unit 106 of the Altamont Luxury Apartments,9701 SE Johnson Creek Blvd; 7185 Los Verdes Drive, Gladstone and Vancouver at 518 SE 102nd Drive.
The agencies involved in the investigation included the Drug Enforcement Administration, Homeland Security, U.S. Marshals, the U.S. Postal Service and Portland Police.

Sunday, September 15, 2013

Asia Pharma Targeted by Obama

President Obama is now targeting Asia Pharma distributor as KingPin, under the Foreign Narcotics Kingpin Act.


I started writing about this subject a while back, and ended up putting it off due to time constraints. As I was looking through the blog today I figured I better finish the article as to remind people of the possible consequences. The scary thing is, the US is classifying steroid dealers like the violent drug cartels importing the most dangerous of drugs. This is not new breaking news. Caveat Emptor ~ Buyer Beware

Mihael Karner owner and operator of Asia Pharma in the eyes of the US government is now as dangerous as violent Columbian and Mexican drug cartels. Steroids have now basically been classified as much a threat as Cocaine, Heroin, and Meth.

This means that the US can now seize Karners properties and assets under US jurisdiction. What this also means is any Americans, or US companies who conduct business with Asia Pharma or any other companies Karner owns are also subject to seizures and sanctions.

Karner has sold steroids world wide for over a decade. He has shell companies in tax heavens to protect his millions in profits. Karner, his wife and his brother were indicted in Massachusetts  federal court in 2010 on three counts of money laundering, conspiracy, and distributing and importing steroids. He and his wife were detained in Austria in December of 2010, made bail in April of 2012 and fled to his Native Slovenia while fighting extradition. Slovenia currently has no extradition treaty with the US.

The next month, he was declared a fugitive by the U.S. Justice Department, and by August, Austria issued arrest warrants for them both. Treasury’s spokesman said that though his trafficking organization has been disrupted, Karner continues to operate from Slovenia. The steroids are made in India and Greece, the spokesman said, and they’re shipped to customers in Eastern Europe and the U.S. Hundreds of websites advertising the steroids are managed in Malaysia under his umbrella company, which is called Asia Pharma. "Dear Mr. Chairman: (Madam Chairman:) (Dear Representative:) (Dear Senator:) (Dear Mr. Vice Chairman:) This report to the Congress, under section 804(a) of the Foreign Narcotics Kingpin Designation Act, 21 U.S.C. 1903(b)(1) (the "Kingpin Act"), transmits my designations of the following six foreign individuals and groups as appropriate for sanctions under the Kingpin Act and reports my direction of sanctions against them under the Act: Mihael Karner (Slovenia) Haji Khotwal Noorzai (Afghanistan) Luis Fernando Sanchez Arellano (Mexico) Los Caballeros Templarios (Mexico) Los Urabeños (Colombia) Los Cachiros (Honduras) Sincerely, BARACK OBAMA"

Sunday, September 8, 2013

Careful what You Put in Your body 'It Could Be From the Gutter'

I find this article interesting, and it makes me wonder just how many AAS coming out of China are manufactured in the same way. Scary to think that one may be injecting oils that may have been in a McDonalds fryer in down town Beijing just moments before the AAS oils were manufactured. Read this article, it will really make you think about what you could be putting into your body. - NML

Chinese pharmaceutical manufacturers caught using 'gutter oil' to make antibiotics

Sunday, September 09, 2012 by: J. D. Heyes

As China continues to rise as the new Asian powerhouse, there has been a steady stream of reports which have detailed the country's staggering lack of standards when it comes to producing manufactured goods, so it was only mildly shocking to learn that authorities there are now looking at charges that some of the country's pharmaceutical companies are using disgusting "gutter oil" to make antibiotics.

For the uninformed (which included me before I came across this story), gutter oil is essentially reprocessed kitchen waste dredged from restaurant drains.

While you're getting a mental picture, read on: Chinese authorities are responding to reports that drug makers may have used it to manufacture antibiotics instead of the more expensive (and, most likely, much cleaner) soybean oil.

What's more, the gutter oil has apparently been at the heart of several food-safety scandals in China in recent months, the BBC reported, quoting Chinese officials - though in typical fashion, the government was secretive, saying it would release its findings soon without providing additional details.

Disgusting gutter oil prevalent throughout Chinese manufacturing

Disgust factor aside, it wasn't clear whether the gutter-oiled antibiotics posed any risk to public health. But nonetheless, the incident highlights how thoroughly Beijing, while remaining socialistic and authoritarian, has nonetheless embraced quasi-capitalist principles of cutting corners to control costs and boost profits.

The British news giant reported that repeated food-contamination scandals, with gutter oilbeing only the most recent of them, have roiled China's massive population and have caused no small amount of alarm and mistrust.

In April, for instance, state-run media outlets reported on how authorities had begun cracking down on underground workshops that utilized decomposing animal fat and organs to produce more of the gutteroil, which apparently can be "manufactured" from a number of equally disgusting sources.

Police then said most of that oil had been sold to oil manufacturers for food production, no less, and for making hotspot soup - a local cuisine - in restaurants.

A year ago, meanwhile, Chinese police arrested 32 people in connection with an operation to prevent the sale of gutter oil as cooking oil. In that case, more than 100 tons of oil was produced by six underground factories; authorities seized the massive amount in raids that stretched across 14 provinces.

And in 2008, at least six infants died and a staggering 300,000 more were made ill after drinking baby formula that had been tainted with the chemical melamine.

'Made in China' is a detriment here in the U.S. as well

An earlier report by NaturalNews documented how the food chain "Whole Foods," which built its reputation in large part on selling organic food, provided details about how many of that company's signature products came not from U.S. farms but from China.

At more than 175 stores nationwide, Whole Foods promotes a homegrown concept, but many of the supermarket chain's goods are marked "Product of China."

What's wrong with that? Well; for one, importing food from China is anathema to Whole Foods' concept of "locally grown" and "organic." For another, China's agricultural development regulations are nowhere near as stringent as they are in the U.S.

And finally, despite Whole Foods' assurances to the contrary, how is a consumer - or the company, for that matter - to know whether all of its Chinese-grown products are indeed pesticide-free?

It should be noted that food sold in the U.S. has to first be approved by the U.S. Department of Agriculture before it can display the "organic" label, by regulation. That not only ensures it's safe but that it was grown in the manner advertised.

Wednesday, August 7, 2013

Feds tell Web firms to turn over user account passwords

Here we go again. The US government abusing their powers to exploit the American public. Demanding passwords from ISP's? Are you kidding me? I am not sure how to stop this or even begin to fight these problems we face today with the tyrannical government we have adopted. All I can do is help educate the people. Help get the word out. - NoMoreLies

Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.

(Credit: Photo illustration by James Martin/CNET)              













The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.
If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.
"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."
A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"
Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.

This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University 

A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: "No, we don't, and we can't see a circumstance in which we would provide it."
Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has "never" turned over a user's encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. "We take the privacy and security of our users very seriously," the spokesperson said.
A Yahoo spokeswoman would not say whether the company had received such requests. The spokeswoman said: "If we receive a request from law enforcement for a user's password, we deny such requests on the grounds that they would allow overly broad access to our users' private information. If we are required to provide information, we do so only in the strictest interpretation of what is required by law."
Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.
Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn't recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, "we don't get a high volume" of U.S. government demands.
The FBI declined to comment.
Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. "The authority of the government is essentially limitless" under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.
Large Internet companies have resisted the government's requests by arguing that "you don't have the right to operate the account as a person," according to a person familiar with the issue. "I don't know what happens when the government goes to smaller providers and demands user passwords," the person said.
An attorney who represents Internet companies said he has not fielded government password requests, but "we've certainly had reset requests -- if you have the device in your possession, than a password reset is the easier way."

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.
(Credit: Photo by Declan McCullagh)


Cracking the codes
Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user's original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.
Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase "National Security Agency" into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.
But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.
The best practice among Silicon Valley companies is to adopt far slower hash algorithms -- designed to take a large fraction of a second to scramble a password -- that have been intentionally crafted to make it more difficult and expensive for the NSA and other attackers to test every possible combination.
One popular algorithm, used by Twitter and LinkedIn, is called bcrypt. A 2009 paper (PDF) by computer scientist Colin Percival estimated that it would cost a mere $4 to crack, in an average of one year, an 8-character bcrypt password composed only of letters. To do it in an average of one day, the hardware cost would jump to approximately $1,500.
But if a password of the same length included numbers, asterisks, punctuation marks, and other special characters, the cost-per-year leaps to $130,000. Increasing the length to any 10 characters, Percival estimated in 2009, brings the estimated cracking cost to a staggering $1.2 billion.
As computers have become more powerful, the cost of cracking bcrypt passwords has decreased. "I'd say as a rough ballpark, the current cost would be around 1/20th of the numbers I have in my paper," said Percival, who founded a company called Tarsnap Backup, which offers "online backups for the truly paranoid." Percival added that a government agency would likely use ASICs -- application-specific integrated circuits -- for password cracking because it's "the most cost-efficient -- at large scale -- approach."
While developing Tarsnap, Percival devised an algorithm called scrypt, which he estimates can make the "cost of a hardware brute-force attack" against a hashed password as much as 4,000 times greater than bcrypt.
Bcrypt was introduced (PDF) at a 1999 Usenix conference by Niels Provos, currently a distinguished engineer in Google's infrastructure group, and David Mazières, an associate professor of computer science at Stanford University.
With the computers available today, "bcrypt won't pipeline very well in hardware," Mazières said, so it would "still be very expensive to do widespread cracking."
Even if "the NSA is asking for access to hashed bcrypt passwords," Mazières said, "that doesn't necessarily mean they are cracking them." Easier approaches, he said, include an order to extract them from the server or network when the user logs in -- which has been done before -- or installing a keylogger at the client.
Sen. Ron Wyden, who warned this week that "the authority of the government is essentially limitless" under the Patriot Act's business records provision.
(Credit: Getty Images)
Questions of law
Whether the National Security Agency or FBI has the legal authority to demand that an Internet company divulge a hashed password, salt, and algorithm remains murky.
"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?" said Jennifer Granick, director of civil liberties at Stanford University's Center for Internet and Society. "I don't know."
Granick said she's not aware of any precedent for an Internet company "to provide passwords, encrypted or otherwise, or password algorithms to the government -- for the government to crack passwords and use them unsupervised." If the password will be used to log in to the account, she said, that's "prospective surveillance," which would require a wiretap order or Foreign Intelligence Surveillance Act order.
If the government can subsequently determine the password, "there's a concern that the provider is enabling unauthorized access to the user's account if they do that," Granick said. That could, she said, raise legal issues under the Stored Communications Act and the Computer Fraud and Abuse Act.
Orin Kerr, a law professor at George Washington University and a former federal prosecutor, disagrees. First, he said, "impersonating someone is legal" for police to do as long as they do so under under court supervision through the Wiretap Act.
Second, Kerr said, the possibility that passwords could be used to log into users' accounts is not sufficient legal grounds for a Web provider to refuse to divulge them. "I don't know how it would violate the Wiretap Act to get information lawfully only on the ground that the information might be used to commit a Wiretap violation," he said.
The Justice Department has argued in court proceedings before that it has broad legal authority to obtain passwords. In 2011, for instance, federal prosecutors sent a grand jury subpoena demanding the password that would unlock files encrypted with the TrueCrypt utility.
The Florida man who received the subpoena claimed the Fifth Amendment, which protects his right to avoid self-incrimination, allowed him to refuse the prosecutors' demand. In February 2012, the U.S. Court of Appeals for the Eleventh Circuit agreed, saying that because prosecutors could bring a criminal prosecution against him based on the contents of the decrypted files, the man "could not be compelled to decrypt the drives."
In January 2012, a federal district judge in Colorado reached the opposite conclusion, ruling that a criminal defendant could be compelled under the All Writs Act to type in the password that would unlock a Toshiba Satellite laptop.
Both of those cases, however, deal with criminal proceedings when the password holder is the target of an investigation -- and don't address when a hashed password is stored on the servers of a company that's an innocent third party.
"If you can figure out someone's password, you have the ability to reuse the account," which raises significant privacy concerns, said Seth Schoen, a senior staff technologist at the Electronic Frontier Foundation.
Last updated on July 26 at 12 p.m. PT with comments from Orin Kerr. A previous update added comment from Yahoo, which responded after this article was published.
Disclosure: McCullagh is married to a Google employee not involved with this issue.

Declan McCullagh is the chief political correspondent for CNET. Declan previously was a reporter for Time and the Washington bureau chief for Wired and wrote the Taking Liberties section and Other People's Money column for CBS News' Web site.

Tuesday, August 6, 2013

DHS ‘Constitution Free’ Zones Inside US Ignored By Media

How does this happen in the land of the free? How does this go on in the United States of America? Do we really need the government to protect us to the point it violates our rights as Americans? Wake up people.  We are living in in a time where our freedoms are being challenged. The government has the ball and their headed for the endzone. It's time we wake up and take that ball back along with our freedoms. We need to send a message to Washington, and we can do this by exercising the rights we still hold. Get out out and vote people. Tell Washington that were sick and tired of being sick and tired. Read your Constitution, know the rights that were fought for and granted to us as Americans. It's time we take things like this seriously - NoMoreLies


Anthony Gucciardi
Infowars.com
August 6, 2013
In what should be front page news blasted out nationwide as a breaking news alert, the DHS has openly established extensive ‘Constitution free zones’ in which your Fourth Amendment does not exist.
It’s not ‘conspiracy’ and it’s not fraud, the DHS has literally created an imaginary ‘border’ within the United States that engulfs 100 miles from every single end of the nation. Within this fabricated ‘border’, the DHS can search your electronic belongings for no reason. We’re talking about no suspicion, no reasonable cause, nothing. No reason whatsoever is required under their own regulations. The DHS is now above the Constitution under their own rules, and even Wired magazine authors were amazed at the level of pure tyranny going on here.

 


This ‘border’ even includes where the US land meets oceans in addition to legitimate borders with Mexico and Canada. As a result, you have over 197 million citizens suffocated in these 100 mile ‘border zones’ that include major cities like New York City, Houston, Los Angeles, and Philadelphia. Checkout the graphic below for a visual representation, with the orange area representing the Constitution free zone as designated by the DHS:


What’s even more amazing, is that this has been going on since 2008. That’s about 5 years of absolute unconstitutional abuse of power by the Department of Homeland Security that the media fails to even document. That’s 197 million citizens living without a Constitution as far as the DHS is concerned, and apparently the Department of Justice (DOJ) must be pretty content too. Amazingly, no one has challenged this besides the ACLU, which was contacted following the case of a man who was actually detained within the 100 mile ‘border’ area.

Not only was this man’s laptop searched for no reason, as is ‘allowed’ under DHS code now, but they ended up finding pictures designated to be linked up with ‘terrorist’ groups. In response, the man was thrown in a cell while DHS agents went through every piece of data on his entire laptop. The ACLU is now suing over this event, but there’s no telling how the case will go with such limited media exposure. The DHS is literally gutting the Constitution and declaring itself higher than the law of the land by doing this, and it spells out major trouble for the entire Bill of Rights at large.

DHS DISMISSES CONSTITUTION, BILL OF RIGHTS
Because if the DHS can simply ‘overrule’ the Fourth Amendment for 197 million citizens, it can also ‘overrule’ the First and Second Amendments as well. What’s stopping them? It’s highly illegal under the Constitution, but it appears they truly don’t care. And to demonstrate just how little they truly care, they have even gone and ‘reviewed’ themselves for their own actions following outcry from some legal experts.
To break it down: back in 2008 there was outrage from those who actually value the Constitution and understand how the bloated DHS entity works, so the DHS promised to prove within 120 days that what they were doing was constitutional and legal. Years later, the report came out to reveal that the DHS actually reviewed itself and determined that it was acting 100% properly. It also founds that everything it was doing was ‘constitutional’ because it was not actually removing the Constitution from United States soil, only the ‘border’.
The ‘border’ that expands 100 miles and includes 197 million people.
This news should be on the front page of every single news organization in the world, but the sad reality is that it’s not. It’s up to the alternative news, the real news, to report on this. It’s up to me to make videos about this, it’s up to the alternative news to syndicate it out, and it’s up to you to share this. It’s time to reclaim our Constitution and tell the DHS we won’t live in Constitution free zones any longer.
Orignally appeared at Story Leak

Monday, July 22, 2013

Brian Wainstein Fighting Extradition to the United States

The man dubbed the “steroid king” is fighting to stay out of jail pending a decision by the minister of justice to deport him to the US where he is wanted for allegedly dealing in steroids worth R76 million. Brian Wainstein’s extradition inquiry was heard in the Cape Town Magistrate’s Court on Thursday. It is alleged that Wainstein, 48, who is wanted by Interpol, smuggled steroids worth about R76m for more than a decade. He had been living in Cape Town for months but was arrested after an altercation with a neighbor at his luxury flat at the V&A Waterfront on January 19. When he appeared in court two days later, he was granted bail of R500 000 on condition that he hand his passport to police, and report to the Sea Point police station every day. This was later relaxed to twice a week. According to the charge sheet, a warrant for his arrest was issued by the District of Tennessee in the US. South Africa and the US have an extradition treaty. On Thursday, Anton Katz SC, for Wainstein, opposed the extradition inquiry, saying Dave Damerell, for the State, had to prove each aspect presented to the court. “There is a man whose liberty is at stake and a State who wants to take it. They must prove it (the documents),” Katz said. “Accuracy and attention to detail is important regarding the documents and evidence relied upon.” Katz argued that the documents which formed part of the extradition request were not authentic and therefore could not form part of the evidence before magistrate Caron Lehman. He called on her to rule that the documents were inadmissible. But Damerell said assistant US attorney Brent Hannafin had made an affidavit and confirmed under oath that the documents were genuine. A US clerk attested that the documents were genuine and US special agent Alex Davis had also made an affidavit. “Davis’s affidavit is also made under oath. So you have affidavits and supporting documents,” Damerell said.