Policing for Profit Slavery-Private Prison Guard”: Shane Bauer

Part 1: “My Four Months as a Private Prison Guard”: Shane Bauer Goes Undercover to Expose Conditions

 Report Finds Two-Thirds of Private Prison Contracts Include “Lockup Quotas”

Report Finds Two-Thirds of Private Prison Contracts Include “Lockup Quotas”

by Joe Watson

An analysis of private prison contracts from across the United States reveals that state and local governments commonly enter into agreements that require them to keep prisons filled or pay for unused, empty beds.  Prison Legal News

2013_09_privateprisons

BUSINESS

Prison Quotas Push Lawmakers To Fill Beds, Derail Reform

09/19/2013 11:54 am ET | Updated Sep 20, 2013

After three violent inmates escaped from an Arizona private prison in July 2010, prompting a two-week, multi-state manhunt, state corrections officials demanded improvements and stopped sending new inmates to what they called a “dysfunctional” 3,300-bed facility.

Less than a year later, the company that runs the prison, Management & Training Corp., threatened to sue the state. A line in their contract guaranteed that the prison would remain 97 percent full. They argued they had lost nearly $10 million from the reduced inmate population.

State officials renegotiated the contract, but ended up paying $3 million for empty beds as the company continued to address problems, according to state documents and local news accounts.

Huffungton Post

Three Ways of Thinking – Steiner

Three Ways of Thinking – Steiner – Letter From Peter

Know your Enemy, The Machiavelli Mindset

Who Was Niccolò Machiavelli?

He is the lie that the end justifies the means, when in fact your means are your end.

niccolo_machiavelli_by_tahaalkan-d5l1w04

Machiavelli.The Prince. 1/5

A “new normal” for Radioactivity Allowed in Drinking Water in US again

 

EPA Proposes Shocking Thousand-Fold Increase in Radioactivity Allowed in Drinking Water

7 Best Geiger Counters 2017

Proposal would permit radiation exposures equivalent to 250 chest X-rays a year

radiation5

Fukushima News; DRINKING WATER IN United States now legally KILLS YOU,

Holocene extinction, The Sixth Extinction?

There have been five great die-offs in history. This time, the cataclysm is us.

Of the many species that have existed on earth—estimates run as high as fifty billion—more than ninety-nine per cent have disappeared. In the light of this, it is sometimes joked that all of life today amounts to little more than a rounding error.

The Sixth Extinction

Out Flanked; The Virtual End of Cable Monopolies

Ammon’s Model: The Virtual End of Cable Monopolies

New World Technocracy Introduction

 Our New Technocratic Lords

Technocracy & The New World Order

How Government Agents Destroy Reputations On and Offline

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Glenn Greenwald – Feb. 24 2014, 6:25 p.m.

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”


 How The Government Can Destroy Your Reputation (Report)

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, (continued);

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

Disgusting read further:

Documents referenced in this article:

Contact the author:

Glenn Greenwaldglenn.greenwald@theintercept.com@ggreenwald

35zjc-vv_400x400

P2P The Poor eat the rich

OLYMPUS DIGITAL CAMERA

Socioeconomic bootcamp & a real discussion of bitcoins and blochchains

Published on Jun 10, 2016

Reggie Middleton discusses class, welath and socioeconomic mobility on the Black Health and Wealth Show


Reggie Middleton on P2P Economy & Predicts Bank Demise: Pipeline vs Veritaseum-style Platforms

Hidden Colors 4 Sneak Preview-The Culture of Harming Black people

Published on Apr 17, 2016

Hidden Colors 4: The Religion of White Supremacy will be in theaters nationwide May 26th 2016

http://hiddencolorsfilm.com


Gore Vidal famously said, “We live here in the United States of Amnesia. No one remembers anything before Monday morning. Everything is a blank. They have no history.”


Police from various departments stand guard on Aug. 18, 2014, in Ferguson, Mo., just days after a grand jury decision not to indict the white police officer who had shot and killed an 18-year-old African-American sparked protests.

Police from various departments stand guard on Aug. 18, 2014, in Ferguson, Mo., just days after a grand jury decision not to indict the white police officer who had shot and killed an 18-year-old African-American sparked protests. (Christian Gooden/St. Louis Post-Dispatch via AP)

A Must Listen 24:39

*Warning Disturbing Content*

The past few years in the United States has been characterized by many as a period of unrest in the black community. Media coverage of demonstrations like the 2014 Ferguson protests often refer to rage by African-Americans towards police shootings.

In her new book White Rage: The Unspoken Truth of Our Racial Divide, Carol Anderson offers an entirely different explanation for racial tension in America. She claims the recent violence in protests and civil unrest is not a product of black rage, but rather white rage towards black empowerment.  Read further at the Current

hidden-2

Tariq Nasheed Discusses Hidden Colors 4 On The Keiser Report

hqdefault

%d bloggers like this: