Archive
The elephant in the room
Common sense says to me that the Espionage Act of 1917, by which former President Donald Trump was charged it is a way to intimidate him to abandon aspirations to run again in 2024.

Donald Trump at CPAC 2011 in Washington, D.C.”Donald Trump” by Gage Skidmore is licensed under CC BY-SA 2.0.
Trump has all the classified documents in his possession for 4 years. Trump has those documents and meant nothing for him. He could have used them, read them, unclassified them, copied them, and stored them, wherever he wanted to.
There is so much he had to do when he was president that it’s little he did. Other than sign executive orders that nobody enforced. And endless rants on TV exposing mainstream media aka Fake News, as he called them, and trying to fix the economy.
He had the power to use them and create a strategy to better out our country. If they were really useful. I believe they were just rubish. If they were of any use. Old stuff classified by the previous US administrations and its agencies.
Important documents like the Iraq documents leak by WikiLeaks, and the Afgan war documents leaks. Both of the leaks were military logs, which tell me the Pentagon has its own set of classified documents that don’t share with the White House or Congress and did not classify using the National Archives.
Trump took some boxes of “classified material,” just because he could. Because all presidents take some when they leave office. I’m sure he was ill adviced about the Presidential Records Act. After all, he had nothing but enemies, except for Rudolph Giuliani, who had been by his side all these years.
We might question what is exactly, that Trump took from the White House, when the sensitive information is kept by the Department of Defense and the 18 intelligence agencies.
Let’s explore those agencies. Were those agencies helping Trump or undermining Trump.
The US intelligence community is composed of 18 agencies, and each of them keep their own classified material. Remember 911, the chaos in the country, because the various intelligence agencies didn’t share information between them?
How did Trump end up taking classified documents when the chain of custody must be followed. Each agency has to authorize the documents before they are declassified and leave the archives.
Did Trump choose and pick the documents, or were they provided to him?
Democrats are talking about important documents related to nuclear professionals. Is that so? Did Trump take the blueprints of nuclear weapons progeams? Or perhaps he took the golden codes
The National Security Agency (NSA) generates the codes every day. So, it couldn’t be the codes
The Gold Codes are generated daily and provided by the National Security Agency (NSA) to the White House, The Pentagon, United States Strategic Command and TACAMO.
Anyway, I doub that Trump has any allies in those agencies. There are too many secrets to hide, too many agendas to follow.
The whole Indictment charade is controlled by higher-ups. Jack Smith is only the pawn. He has no power to have come out with all those charges. Who is really directing the whole spectacle? It has to be a group of very powerful people who are controlling the DOJ, FBI, WH. Democrats, and some Republicans.
Let’s address an important agency director; The Directors of National Intelligence is an independent agency. It advises the president but doesn’t answer the president. Even though the DNI is appointed by the president. All complicated stuff.
“The National Security Council initiated a review this summer to determine how to overhaul the elaborate and often arbitrary classification system that Democrats and Republicans contend is undermining democracy and national security. ” Politico, August 23, 2023.
Who is the National Security Council?According to White House(.)gov, The National Security Council (NSC) is the president’s principal forum for considering national security and foreign policy matters with his or her senior advisors and cabinet officials. Since its inception under President Truman, the Council’s function has been to advise and assist the president and to coordinate matters of national security among government agencies.
Trump might be an arrogant fool, but since his interviews from 40 years ago, Trump has been talking about China taking over our economy. And Trump was right. China is stronger than the US, and it’s making alliances with powerful states. Russia, India, Iran, and lately The African countries are siding with China as well.
China has been building relations, helping countries with real infrastructure. China is buying and building.
Trump was right to try to strengthen relations with China and North Korea. But top weapons manufacturers are fighting against each other to see who can get the more lethal weapons. President’s are not that strong against those monsters.
Whoever is behind the takeover of our republic has much to lose if Trump is found innocent.
Forget about Democrats and Republicans, and focus on what is at stake with Trump indictments.
As it is, our dollar is losing value in the global economy. China and Russia, two of the most powerful states, are trading in their respective currencies.
US is making a fool of itself. It is undermining our democracy, the only tool the US has used to intervene in the internal policies of foreign countries. Either to promote a coupe or to serve as a guarantor in the International Monetary Fund.
Think about it, and come to your senses. Demand from the leaders’ accountability instead of censorship and intimidation.
The spoils are Earth’s natural resources.
Trump wanted to make peace with China, Russia, and North Korea. Well, except with Cuba and Venezuela, he is under the ideological spell of 75 years of resentment due to indoctrination. And Syria and Iran, which is a much priced fish for him to handle. Syria is an Israel Target, and Iran is an ennemy of Israel. Those two countries are out of the reach of any president.
Peace is the enemy number one of the war industrial complex.

by Kevin M. Gill
Revealed: how Microsoft handed the NSA access to encrypted messages
Posted on July 11, 2013 by Akashma Online News

Hours after CNBC reported that ValueAct Capital Management threw nearly $2 billion into Microsoft Corporation, April 22, 2013
ValueAct Capital, LLC is a San Francisco based hedge fund. The firm offers its services to high net worth individuals and institutions while investing in the public equity and hedging markets of the United States.
• Files released show scale of Silicon Valley co-operation on Prism
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply
Microsoft has collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption, according to top-secret documents obtained by the Guardian.
The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.
The documents show that:
• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;
• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;
• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;
• Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;

Skype has been acquired by Microsoft for a whopping $8.5 billion. News.com
• Skype, which was bought by Microsoft in October 2011, worked with intelligence agencies last year to allow Prism to collect video of conversations as well as audio;
• Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a “team sport”.
The latest NSA revelations further expose the tensions between Silicon Valley and the Obama administration. All the major tech firms are lobbying the government to allow them to disclose more fully the extent and nature of their co-operation with the NSA to meet their customers’ privacy concerns. Privately, tech executives are at pains to distance themselves from claims of collaboration and teamwork given by the NSA documents, and insist the process is driven by legal compulsion.
In a statement, Microsoft said: “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” The company reiterated its argument that it provides customer data “only in response to government demands and we only ever comply with orders for requests about specific accounts or identifiers”.
In June, the Guardian revealed that the NSA claimed to have “direct access” through the Prism program to the systems of many major internet companies, including Microsoft, Skype, Apple, Google, Facebook and Yahoo.
Blanket orders from the secret surveillance court allow these communications to be collected without an individual warrant if the NSA operative has a 51% belief that the target is not a US citizen and is not on US soil at the time. Targeting US citizens does require an individual warrant, but the NSA is able to collect Americans’ communications without a warrant if the target is a foreign national located overseas.
Since Prism’s existence became public, Microsoft and the other companies listed on the NSA documents as providers have denied all knowledge of the program and insisted that the intelligence agencies do not have back doors into their systems.
Microsoft’s latest marketing campaign, launched in April, emphasizes its commitment to privacy with the slogan: “Your privacy is our priority.”
Similarly, Skype’s privacy policy states: “Skype is committed to respecting your privacy and the confidentiality of your personal data, traffic data and communications content.”
But internal NSA newsletters, marked top secret, suggest the co-operation between the intelligence community and the companies is deep and ongoing.
The latest documents come from the NSA’s Special Source Operations (SSO) division, described by Snowden as the “crown jewel” of the agency. It is responsible for all programs aimed at US communications systems through corporate partnerships such as Prism.
The files show that the NSA became concerned about the interception of encrypted chats on Microsoft’s Outlook.com portal from the moment the company began testing the service in July last year.
Within five months, the documents explain, Microsoft and the FBI had come up with a solution that allowed the NSA to circumvent encryption on Outlook.com chats
A newsletter entry dated 26 December 2012 states: “MS [Microsoft], working with the FBI, developed a surveillance capability to deal” with the issue. “These solutions were successfully tested and went live 12 Dec 2012.”
Two months later, in February this year, Microsoft officially launched the Outlook.com portal.
Another newsletter entry stated that NSA already had pre-encryption access to Outlook email. “For Prism collection against Hotmail, Live, and Outlook.com emails will be unaffected because Prism collects this data prior to encryption.”
Microsoft’s co-operation was not limited to Outlook.com. An entry dated 8 April 2013 describes how the company worked “for many months” with the FBI – which acts as the liaison between the intelligence agencies and Silicon Valley on Prism – to allow Prism access without separate authorization to its cloud storage service SkyDrive.
The document describes how this access “means that analysts will no longer have to make a special request to SSO for this – a process step that many analysts may not have known about”.
The NSA explained that “this new capability will result in a much more complete and timely collection response”. It continued: “This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established.”
A separate entry identified another area for collaboration. “The FBI Data Intercept Technology Unit (DITU) team is working with Microsoft to understand an additional feature in Outlook.com which allows users to create email aliases, which may affect our tasking processes.”
The NSA has devoted substantial efforts in the last two years to work with Microsoft to ensure increased access to Skype, which has an estimated 663 million global users.
One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.
Eight months before being bought by Microsoft, Skype joined the Prism program in February 2011.
According to the NSA documents, work had begun on smoothly integrating Skype into Prism in November 2010, but it was not until 4 February 2011 that the company was served with a directive to comply signed by the attorney general.
The NSA was able to start tasking Skype communications the following day, and collection began on 6 February. “Feedback indicated that a collected Skype call was very clear and the metadata looked complete,” the document stated, praising the co-operation between NSA teams and the FBI. “Collaborative teamwork was the key to the successful addition of another provider to the Prism system.”

Janus Friis-Niklas Zennstrom founders
ACLU technology expert Chris Soghoian said the revelations would surprise many Skype users. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.”
The information the NSA collects from Prism is routinely shared with both the FBI and CIA. A 3 August 2012 newsletter describes how the NSA has recently expanded sharing with the other two agencies.
The NSA, the entry reveals, has even automated the sharing of aspects of Prism, using software that “enables our partners to see which selectors [search terms] the National Security Agency has tasked to Prism”.
The document continues: “The FBI and CIA then can request a copy of Prism collection of any selector…” As a result, the author notes: “these two activities underscore the point that Prism is a team sport!”
In its statement to the Guardian, Microsoft said:
We have clear principles which guide the response across our entire company to government demands for customer information for both law enforcement and national security issues. First, we take our commitments to our customers and to compliance with applicable law very seriously, so we provide customer data only in response to legal processes.
Second, our compliance team examines all demands very closely, and we reject them if we believe they aren’t valid. Third, we only ever comply with orders about specific accounts or identifiers, and we would not respond to the kind of blanket orders discussed in the press over the past few weeks, as the volumes documented in our most recent disclosure clearly illustrate.
Finally when we upgrade or update products legal obligations may in some circumstances require that we maintain the ability to provide information in response to a law enforcement or national security request. There are aspects of this debate that we wish we were able to discuss more freely. That’s why we’ve argued for additional transparency that would help everyone understand and debate these important issues.
In a joint statement, Shawn Turner, spokesman for the director of National Intelligence, and Judith Emmel, spokeswoman for the NSA, said:
The articles describe court-ordered surveillance – and a US company’s efforts to comply with these legally mandated requirements. The US operates its programs under a strict oversight regime, with careful monitoring by the courts, Congress and the Director of National Intelligence. Not all countries have equivalent oversight requirements to protect civil liberties and privacy.
They added: “In practice, US companies put energy, focus and commitment into consistently protecting the privacy of their customers around the world, while meeting their obligations under the laws of the US and other countries in which they operate.”
National Security Letters
Posted on June 11, 2013 by Akashma Online News
National Security Letters
Source: Electronic Frontier Foundation
Defending Your Rights in the Digital World
Of all the dangerous government surveillance powers that were expanded by the USA PATRIOT Act the National Security Letter (NSL) power under 18 U.S.C. § 2709 as expanded by PATRIOT Section 505 is one of the most frightening and invasive. These letters served on communications service providers like phone companies and ISPs allow the FBI to secretly demand data about ordinary American citizens’ private communications and Internet activity without any meaningful oversight or prior judicial review. Recipients of NSLs are subject to a gag order that forbids them from ever revealing the letters’ existence to their coworkers to their friends or even to their family members much less the public.
The FBI’s systemic abuse of this power has been documented both by a Department Of Justice investigation and in documents obtained by Electronic Frontier Foundation through a Freedom of Information Act request.
EFF has fought for years to spread awareness of National Security Letters and add accountability and oversight to the process.
In 2007 EFF filed Freedom of Information Act litigation seeking documentation of National Security Letter misuse by the FBI. Thousands of pages of documents were released over a period of four years leading to repeated revelations of government abuses of power. An EFF report based on these documents led to tough questions for the FBI before Congress. The documents also helped prompt the Senate Judiciary Committee to investigate whether Attorney General Alberto Gonzales lied to Congress.
In 2008 EFF defended the Internet Archive from an inappropriate National Security Letter. Because NSLs come with a gag order most recipients are unable to ever reveal their existence. However with the help of EFF and the ACLU the Internet
Archive fought back and won the right to speak publicly about the letter. As a result it’s become one of the few well-documented and publicly-known cases of NSL use.
And in 2013, EFF won a landmark decision in the Northern District of California in which Judge Susan Illston declared one of the statutes unconstitutional in its entirety. EFF’s petition, brought on behalf of an unidentified telephone service provider, challenged both the underlying authority to obtain customer records as well as the concurrent gag provision that prevented the recipient from disclosing even that it had receiving an NSL.
EFF has been fighting in Congress for legislative reform of National Security Letters since 2005. In 2009 many hoped that President Obama having run for office promising to reform Bush-era surveillance abuses would work with Congress to curb NSL abuse. Unfortunately the Obama Administration has instead continued to block reform and has even sought to expand NSL powers.