Bibliography and NOTES
- Home
- WALL Street Voodoo Economics?
- MESOPOTAMIA /ANE
- Egypt
- Religious Right
- USA History
- War On Terror
- Islam
- Christianity
- Books: History
- Christian Anti-Semitism
- Lost Cause Myth , Confederacy , White Supremacy
- Judaism, NAzism & The Final Solution
- Iraq , Iran (Persia ), Saudi Arabia and Syria
- Theocracy/ Dominionism
- Islamophobia
- Egypt
- Lynching , White Mob Violence and The KKK
Friday, May 30, 2014
Tuesday, May 27, 2014
Monday, May 26, 2014
Sunday, May 25, 2014
Friday, May 23, 2014
Thursday, May 22, 2014
Wednesday, May 21, 2014
Tuesday, May 20, 2014
Monday, May 19, 2014
Sunday, May 18, 2014
Thursday, May 15, 2014
Glenn Greenwald Interview at DemocracyNow!
from interview at DemocracyNow!
GLENN GREENWALD: You know, one of the interesting things is, obviously, people are very aware of the COINTEL abuses. I know you’ve had people on your show who actually participated in the break-in of the FBI and took the documents that unveiled that program. People are aware of J. Edgar Hoover’s abuses. The nature of that series of events is that the United States government looks at people who oppose what they do as being, quote-unquote, "threats." That’s the nature of power, is to regard anybody who’s a threat to your power as a broad national security threat. And a lot of times people will say, "We don’t yet have the reporting in this case that shows that kind of abuse." And a lot of that reporting is still reporting that we’re working on and that I promise you is coming.
But there has already been reporting that shows that—the document, for example, in the book that shows the NSA plotting about how to use information that it collected against people it considers, quote, "radicalizers." These are people the NSA itself says are not terrorists, do not belong to terrorist organizations, do not plan terrorist attacks. They simply express ideas the NSA considers radical. The NSA has collected their online sexual activity, chats of a sexual nature that they’ve had, pornographic websites that they visit, and plans, in the document, on how to use this information publicly to destroy the reputations or credibility of those people to render them ineffective as advocates. There are other documents showing the monitoring of who visits the WikiLeaks website and the collection of data that can identify who they are. There’s information about how to use deception to undermine people who are affiliated with the online activism group Anonymous.
Glenn Greenwald: U.S. Corporate Media is Neutered, Impotent and Obsolete
Glenn Greenwald: U.S. Corporate Media is Neutered, Impotent and Obsolete
on DemocracyNow!
" Greenwald joins us in the studio to talk about this and other new revelations about the NSA, including its global economic espionage, spying at the United Nations, and attempting to monitor in-flight Internet users and phone calls.
The NSA is doing invasive, stealth surveillance on its allies in their own consulates and embassies, even breaking into their offices and implanting surveillance devices within the machine. That’s the extreme lengths to which the NSA goes for spying that has always been deemed essentially illegitimate.
Posted May 14, 2014"
on DemocracyNow!
" Greenwald joins us in the studio to talk about this and other new revelations about the NSA, including its global economic espionage, spying at the United Nations, and attempting to monitor in-flight Internet users and phone calls.
The NSA is doing invasive, stealth surveillance on its allies in their own consulates and embassies, even breaking into their offices and implanting surveillance devices within the machine. That’s the extreme lengths to which the NSA goes for spying that has always been deemed essentially illegitimate.
Posted May 14, 2014"
Subscribe to:
Posts (Atom)