Italy’s Bloodiest Mafia – Full Movie

Italy’s Bloodiest Mafia – Full Movie

 

 

The Camorra, the Naples mafia, is Italy’s bloodiest organised crime syndicate. It has killed thousands and despite suffering many setbacks is as strong as ever. It is into drug trafficking, racketeering, business, politics, toxic waste and even the garbage disposal industry. Naples’s recent waste crisis was in part blamed on the crime syndicate. Its grip on the city is far reaching.

Talking to Camorra insiders who have never spoken to the media before, and drawing on interviews with Camorra victims who are fighting back, reporter Mark Franchetti investigates Italy’s deadliest mafia to learn how it has survived so long in a country at the heart of Europe and what it will take to defeat it.

Film – STASI – Mielke und die Freiheit

Film – STASI – Mielke und die Freiheit

 

 

 

Fünfzehn Jahre nach der Wiedervereinigung ist die DDR wieder in den Fokus des öffentlichen Interesses gerückt. „Ostalgie”-Shows haben sich, zum Teil affirmativ, den Lebensbedingungen im zweiten deutschen Staat gewidmet. Der komplexen historischen Realität sind diese Sendungen nicht immer gerecht geworden. Umfragen haben ergeben, dass die heutige Schülergeneration nur noch wenig über die DDR weiß. In Magdeburg etwa konnte nur noch eine Minderheit befragter Gymnasiasten sagen, wann die Mauer gebaut wurde, viele von ihnen hielten Siegmund Jähn für einen Fußballer und vermuteten Schwerin im Westen. Vor allem der Alltag in der DDR ist vielen fremd. Wer wissen will, wie man gelebt, geliebt und überlebt hat in der DDR, muss deren Widerspruch erfassen. Die Dokumentation schildert in vier Folgen die DDR-Geschichte von der Staatsgründung 1949 bis zur friedlichen Revolution und zum Mauerfall 1989.

UNVEILED – Cyber Command Suffers Second Defeat, Dump It

UNVEILED – Cyber Command Suffers Second Defeat, Dump It

Cyber Command Suffers Second Defeat, Dump It

First Cyber Command Defeat:

http://cryptome.org/0002/uscybercom/uscybercom-defeat.htm

Cyber Command suffered its second defeat with the win of Edward Snowden. The first defeat was won by Bradley Manning. This suggests Cybercom deserves dissolution and a better command instituted, or, best, nothing like it.

The commander for both losses, General Keith Alexander, has to go. And a new, agile Cybercom, if it is to endure, needs to be separated from the venerable, deeply experienced, albeit sclerotic, National Security Agency. Different missions require different enabling legislation, leadership, funding, policy, staffing, training, operation and security.

An effective Cybercom may not be possible within the military culture of tradition, over-staffing, minutely specified military occupation specialty, heirarchical rank, medieval separation of officers from enlisted members, advancement in rank by longevity and favoritism, special training for combat, and further divided between military and civilian — the latter further fragmented between inside civilians and outside contractors with multiple sub-contractors.

The legislation and implementation of this complex traditional, command-driven organization assures it will not be capable of handling the challenges of cyber swarming, rapid evolution of technology and techniques — much of it grown outside established institutions — youthful contempt for authority, national and international disloyalty and disinterest, and most of all, ingrained insurgency.

For this insurgency, outwitting national security establishments is considered to be sport, a game, a test of prowess, bragging rights, and it is winning in cyber space, only periodically, laughingly infrequently, defeated, caputured and imprisoned by use of legacy, lumbering, clumsy, expensive, failure-and-excuse-prone mechanisms, in which legacy leaders like NSA, FBI, CIA, White House and Congress — supported by contractors, lobbyists and donors — can only dissimulate, apologize and promise to do better with more funding and more draconian crack-down on civil liberties.

Cyber Command is a failure — sibling of Department of Homeland Security — a boondoggle, a huge transfer of funds to the cybersecurity (and homeland security) industry from legacy military pork barrels. Thousands of suitably-skilled youngsters — most self-trained by a subversive culture hostile to authority — have been enlisted, hired and contracted to run cyber offensive and defensive operations under the rigidly ranked command of military officers accustomed to obedience and respect of rank.

Cybersecurity contracting — commercial and institutional — is an equally great failure. It too is a boondoggle, spoiled rotten with generous and laxly-overseen funding, often led by ex-military officers and those long accustomed to military grade perquisites, protected by secrecy, back-slapping, insider favoritism, laziness, lack of competition, forgiveness of corruption, shallow and classified IG investigation, all the attributes of its single customer, the national security consortium beloved of governments and autocrats.

No wonder the coddled and well-paid youngsters defy, dance around, ridicule and outrun these balloon-headed officers and liquored-contractors, this is what they have done most of their teenage and adult lives. Their loyalty is to their own culture, open, non-secret, disputatious, daring and fun-filled, most emphatically not venerated-military or rich-contractor grade.

What would a replacement for Cybercom be like? Not military, not commercial, not NGO, then what?

Plenty of cyber initiatives are underway which demonstrate effective alternatives to heirarchical military, commercial and NGO cyber deadwood. They have been created and are run by some of the most brilliant brains and imaginations in the world, agile, cheap, mostly volunteer and leaderless, disputatious, humorous, dismissive of authority of any kind, gov, mil, com, edu, org.

Don’t expect to hire or contract or academicize them. The best of them do not go inside institutions — except to social engineer and disclose the secrets of authoritative corruption.

Examples abound: just read the official demonizations of outsiders spilling insider secrets of gov, mil, com and ngo.

Instead of wasting treasure on dim-witted cybercommands listen to those secret-spilling demons, better understood as angels out-dancing the pinheads.

Unveiled – Inspire Al-Qaeda in the Arabian Peninsula Magazine Issue 11, June 2013

Unveiled – Inspire Al-Qaeda in the Arabian Peninsula Magazine Issue 11, June 2013

The following is the eleventh issue of “Inspire” magazine reportedly produced by Al-Qaeda in the Arabian Peninsula’s media organization Al-Malahem. There are ten previous issues of Inspire magazine, all of which have been published by this site, and we have continually expressed our desire for readers to scrutinize the authenticity of the material provided in this publication. We have removed password protection from the PDF to enable easier analysis, but have left the file’s original metadata intact. As with all ten previous issues of the magazine we must emphasize that this material is provided, as always, for educational and informational purposes.

Al-Malahem Media Foundation

39 pages
Spring 2013
40.5 MB

Download

https://publicintelligence.net/aqap-inspire-issue-11/

Unveiled – US Secret Service Visits Cryptome

Unveiled – US Secret Service Visits Cryptome
US Secret Service Visits Cryptome

 


7:30PM, June 18, 2013. Guccifer Bush Family Contact List Removed In Response to Two US Secret Service Agents Visit to Cryptome at Request of Bush Family. More Information Available at New York Office of the US Secret Service: 718-840-1000.

Original source of Cryptome’s mirror of Guccifer Bush Family Contact List remains online at 6:50AM 6/19/13 (and at 7:00AM 6/20/13):

https://drive.google.com/folderview?id=0B_WrF7_bWvgaVGszaTU1U3BhTXc&usp=sharing

An account of the visit provided to Gawker for its interview of Cryptome:

http://gawker.com/a-discussion-with-cryptome-514154708

Young and Nastios emailed this account of the visit:

Two USSS agents appeared at our door about 7:30PM, June 18, 2013 showed ID and badges.

They asked are you John Young of Cryptome holding up a NY motor vehicle photo.

We said yes that’s us.

They showed a Guccifer file listing Bush Family contacts said do you recognize this.

We said yes.

They said we are here at the request of the Bush Family to ask you to remove the Guccifer file, posting it is not illegal, “freedom of information,” it contains nothing secret, the family is concerned, some live in New York City, we are politely asking for its removal.

We asked what would happen if the file was not removed.

They said we don’t know, will report your response up the line.

We said we see what you are saying.

They asked if we had met or knew Guccifer.

We said no no.

They said he’s pretty active.

We said she or he.

They asked how did you get the file.

We said anonymously.

They asked by email?

We said cant tell.

They said understood.

We asked to see their IDs again.

They said you are not going to publish our names are you we know you do that.

We said yes we do and will.

They showed their badges while covering their photos and names.

They said this is not being recorded is it.

We said no lifted our shirt offered to drop our sweats.

They said not necessary this is not an NSA thing.

We said the NSA thing’s a hoot.

They said yes yes.

They said thank you for courtesy.

They said call NY Secret Service to vet us then departed.

We got NY SS number online made the call.

NY SS said we cannot answer questions call this number in DC.

We called DC got a number disconnected message with a number to call and called that number.

DC SS answered White House Operations Center.

We said NY SS told us to call you to vet agent visit.

DC SS said that makes no sense call NY SS again.

We called NY SS again and said what DC SS said.

NY SS went away for several minutes then asked are you at this NY address.

We said yes.

NY SS said we confirm two SS agents visited you.

End.

Cryptome removed the document, though a link to a copy hosted by a third-party remains prominently displayed on their website.

Another account:

http://www.examiner.com/article/cryptome-removes-guccifer-s-bush-family-contact-
list-after-secret-service-visit

In an email to Examiner, John Young said, “Cryptome has a gaggle of responses to removal requests and demands. Nothing is ever fully removed, not by us, not by the Net. The USSS acknowledged that, implying with a grimace that the Bush Family knows that too.”

 


 

Documentary – The Pain Project: Bureaucrats

Documentary – The Pain Project: Bureaucrats

The laws governing illicit drugs, enforced by UN Office of Drugs and Crimes, are unnecessarily blunt and curtail access to legitimate opiates for medical purposes. This segment is part of The Pain Project, a series produced by The International Reporting Program.

For more on The Pain Project series:
Imagine recovering from major surgery or suffering from advanced cancer without any painkillers. That’s the reality for patients in half the countries in the world. But unlike with so many global health problems, this one is not about money or a lack of drugs. Morphine, the gold standard for medical pain treatment, is simple and cheap to make and distribute. So why are so many people left in pain?

The International Reporting Program traveled to Ukraine, Uganda and India to find out, and to document the human toll of this hidden human rights crisis. It turns out a combination of bureaucratic hurdles and the chilling effect of the global war on drugs are largely to blame, leaving humanitarians scrambling to work outside the law — or change the law — to bring relief to suffering patients all over the world.

For more information visit:
http://www.internationalreporting.org…

Movie – Dirty Wars – Documentary Excerpt

Movie – Dirty Wars – Documentary Excerpt

Dirty Wars follows investigative reporter Jeremy Scahill, author of the international bestseller “Blackwater,” into the heart of America’s covert wars, from Afghanistan to Yemen, Somalia and beyond.

Part political thriller and part detective story, Dirty Wars is a global investigation of the secretive and powerful Joint Special Operations Command (JSOC).

In this excerpt, Scahill travels with a self-proclaimed general who was once an enemy of the US but is now on the Americans’ payroll.

For more information visit:
http://www.dirtywars.org

For more great stories, subscribe to The I Files: http://goo.gl/0Bc68

JOIN THE CONVERSATION ONLINE:
Like The I Files on Facebook: http://fb.com/theifiles
Follow on Twitter: http://twitter.com/ifiles
Reblog on Tumblr: http://theifiles.tumblr.com
Repin on Pinterest: http://pinterest.com/theifiles
+1 on Google+: http://gplus.to/ifiles