The stunning accusations, dated August 27, reveal a startling story by the claimant as having been visited at home by police chief Dan Oates and Dist. Atty. Carol Chambers where they forced the unnamed individual to testify as a fake victim of the shootings, under the threat of being arrested for prostitution and escort services and charity fraud, for the purposes of garnering an easy conviction against alleged shooter James Holmes. But not before being shot by the police chief in “non-life-threatening areas” of the body, according to the motion, to appear as having been shot by James Holmes himself. The motion also claims that it is likely some of the victims in the theater were merely paid actors working on behalf of the conspirators and wants multiple individuals involved in the situation to take polygraph tests to prove their innocence.
The Cipher Bureau otherwise known as The Black Chamber was the United States’ first peacetime cryptanalytic organization, and a forerunner of the National Security Agency. The only prior codes and cypher organizations maintained by the US government had been some intermittent, and always abandoned, attempts by Armed Forces branches prior to World War I.
With the announcement that the United States is planning to begin providing small arms to rebel groups in Syria, Bearden is blunt as to what the CIA’s experience in Afghanistan in the 1980s should teach us. “The lesson here is that once we start providing anything to the rebels, we better understand that if they win, we own it,” he told Foreign Policy on Friday, June 14. “The big cheerleaders on the Hill for doing this aren’t focused on this. The biggest lesson from the Afghan thing was that over a 10-year period we supplied all this stuff and then walked away once the Soviets left. The same Congress that was cheerleading the brave freedom fighters against the Soviet occupation — and they were brave and they did suffer brutally — just walked away and wouldn’t give them a nickel. If we start arming anyone in this enterprise, implicit in that is that we own it once the Assad regime falls.”
In a House Armed Services Committee hearing at the end of April, California Republican Congressman Duncan Hunter, a former Marine, leveled serious charges against high-level Army officers. He accused them of blocking the use of Palantir technology, the company the military has hired to watch the US public’s every online move for signs of potential terrorist activity.
But the House had concerns of its own: In a letter dated August 1, 2012, the House Committee asked why the $2.3 billion had been spent on research and development of the DCGS-A, a global surveillance and intelligence super platform, that despite the mind-boggling sum, failed to work as planned. Reports submitted to House Armed Services Committee outlining serious issues with the global surveillance and intelligence super platform indicated that DCGS-A is “unable to perform simple analytical tasks.” More specifically, military intelligence analysts from the Army and Air Force have both expressed that DCGS-A does not “provide intuitive capabilities to see the relationships between a wide variety of disparate data sets of information.”
A yurt is a portable, bent dwelling structure traditionally used by nomads in the steppes of Central Asia. The structure comprises a crown or compression wheel usually steam bent, supported by roof ribs which are bent down at the end where they meet the lattice wall (again steam bent). The top of the wall is prevented from spreading by means of a tension band which opposes the force of the roof ribs. The structure is usually covered by layers of fabric and sheep’s wool felt for insulation and weatherproofing.
CBS News announced Friday that correspondent Sharyl Attkisson’s computer was hacked by “an unauthorized, external, unknown party on multiple occasions,” confirming Attkisson’s previous revelation of the hacking.
CBS News spokeswoman Sonya McNair said that a cybersecurity firm hired by CBS News “has determined through forensic analysis” that “Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions in late 2012.”
“Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion. CBS News is taking steps to identify the responsible party and their method of access.”
Several months ago, Attkisson had reported suspected intrusions of her computers, including her CBS News work computer, prompting CBS News to hire a firm to look into the hacking.
Friday’s announcement comes on the heels of last month’s revelation that the Justice Department had seized the emails and phone records of Fox News correspondent James Rosen.
To be clear, the federal government has not been accused in the intrusion of Attkisson’s computer; CBS News is continuing to work to identify the responsible party.