All posts by alternativefreepress

Neo-Nazis in Ukraine, Obama Administration supporting Fascists?

By Prof Michel Chossudovsky
Global Research: February 24, 2014

Svoboda is a Neo-Nazi Party, Ukraine’s fourth biggest party holding 36 seats out of 450 in parliament.

They’re also part of the Alliance of European National Movements along with the BNP and Jobbik.

Svoboda is supported directly by Washington.

This is Svoboda, the Neo-Nazi group that is doing the fighting in Ukraine.

Update February 24. The BBC headlines read: “We are putting our hopes in a new generation of politicians” amidst unconfirmed reports that an arrest warrant has been issued for the democratically elected president.

Speaker of the Parliament Oleksandr Turchynov who allegedly issued the arrest warrant directed against President Viktor Yanukovych stated “We must move towards a national government by Tuesday”. That government, were it to be formed, would be integrated by Svoboda.

Visit Global Research to meet the “new generation of politicians” supported and financed by the Obama administration.

—-
Alternative Free Press -fair use-

Gates Foundation Collecting Private Info on 11 Million Students

Gates Foundation Launches Giant Database on School Children ‘inBloom’

By Trey Sanchez
Truth Revolt: February 24, 2014

Private information for over 11 million students is being collected

The Bill and Melinda Gates Foundation gave $100 million to fund a giant database to collect private information of American school children starting in early education and extending all the way through high school.

Promoted as a technological tool to help teachers tailor education to the individual needs of students, inBloom is a database that stores student’s scores, attendance, special needs, disabilities, etc. The intent is to exploit the technology that is available today to replace antiquated paper records.

Launched in February of 2013, inBloom is working with nine states representing over 11 million students. The nonprofit organization was launched to help educators keep up with the ever changing standards of state Common Core education.

So far, the states include Colorado, Delaware, Georgia, Illinois, Kentucky, Louisiana, Massachusetts, New York and North Carolina.

(Read the full article at Truth Revolt)

—-
Alternative Free Press -fair use-

More radiation detected near New Mexico nuke site

AP: February 24, 2014

CARLSBAD, N.M. (AP) — More airborne radiation has been detected in southeastern New Mexico from a leak at the nation’s first underground nuclear waste dump.

The U.S. Department of Energy said Monday the results are from samples collected last week at numerous air monitoring stations at and around the Waste Isolation Pilot Plant near Carlsbad.

Last week, DOE officials confirmed the first-ever leak at the facility. It stores plutonium-contaminated waste from Los Alamos National Laboratory and other government nuclear sites.

The results are consistent with the kinds of waste stored at the plant, but officials say there’s no public health threat.

(Read the full article at Yahoo)

—-
Alternative Free Press -fair use-

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By Glenn Greenwald
The Intercept: February, 24, 2014

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations”.

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world”, including “information ops (influence or disruption)”.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human being can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

(Read the full report at The Intercept)

Full Source Documents: HERE
—-
Alternative Free Press -fair use-

Cyber-Security Experts Ask If Apple “Flaw” Was Really NSA Backdoor

Security hole appeared just one month before NSA bragged it had penetrated Apple servers

By Steve Watson
Infowars: February 24, 2014

Following an admission by Apple that a “bug” in its operating system had left devices open to potential hacking, experts are questioning whether the security hole was intentional, in order to allow the NSA backdoor access as part of its mass spying program.

On Friday Apple acknowledged that a “goto fail” command in the company’s SecureTansport protocol had left iPhones, iPads, and MacBooks vulnerable to data intercept on networks and wireless connections. Anyone who had knowledge of the security flaw, could have accessed secure data, Apple noted, declaring that ” a software fix will be released very soon.”

Johns Hopkins University cryptography professor Matthew Green told Reuters that the flaw (see below) was “as bad as you could imagine.”

Several coding experts are now raising their eyebrows over the matter, noting that the timeline of the inception of the security flaw matches up with leaked NSA slides that document how the spy agency had managed to gain access to Apple’s severs.

According to coder and App developer Jeffrey Grossman, who has studied the code in question, the flaw only appeared in iOS 6.0 and was not present in iOS 5.11.

Immediately, tech experts began to note that iOS 6.0 was released in September 2012, just one month before Apple was added to the NSA’s list of penetrated servers, according to slides leaked by Edward Snowden.

Noting that while the evidence is circumstantial, blogger John Gruber, a computer scientist, says that “the shoe fits” where the NSA’s Apple breakthrough is concerned.

“Sure would be interesting to know who added that spurious line of code to the file,” he notes. “Conspiratorially, one could suppose the NSA planted the bug, through an employee mole, perhaps. Innocuously, the Occam’s Razor explanation would be that this was an inadvertent error on the part of an Apple engineer. It looks like the sort of bug that could result from a merge gone bad, duplicating the goto fail; line.”

Gruber has laid out five potential scenarios, personally leaning toward number three:

1. Nothing. The NSA was not aware of this vulnerability.
2. The NSA knew about it, but never exploited it.
3. The NSA knew about it, and exploited it.
4. NSA itself planted it surreptitiously.
5. Apple, complicit with the NSA, added it.

“…once the bug was in place, the NSA wouldn’t even have needed to find the bug by manually reading the source code. All they would need are automated tests using spoofed certificates that they run against each new release of every OS.” Gruber states.

“Apple releases iOS, the NSA’s automated spoofed certificate testing finds the vulnerability, and boom, Apple gets “added” to PRISM. ([It] wasn’t even necessarily a fast turnaround — the NSA could have discovered the vulnerability over the summer, while iOS 6 was in developer program beta testing.)” Gruber concludes.

Other tech bloggers concur that it is strange how such a major flaw wasn’t spotted or fixed sooner. “The timing is rather odd, and it makes you wonder how such a serious bug went undiscovered for over a year.” writes Cody Lee of iDownloadblog.

Ashkan Soltani, another security expert has compiled a list of current Apple applications that he believes are vulnerable to security hole that is still open on the current version of OS X for the Mac. The list includes basic apps such as mail, safari, twitter, facetime and calender. These apps transmit and store exactly the type of information NSA has targeted.

Just one month ago, a new Snowden leak revealed that the NSA had infiltrated iPhones with a program known as DROPOUT JEEP, which allowed the agency access to text messages, voicemails and other personal data.

(Read more at Infowars)

—-
Alternative Free Press -fair use-

Conservative MP Brad Butt admits he lied in House of Commons

Tory MP Brad Butt retracts claim he saw voter cards stolen

CBC: February 24, 2014

Conservative MP Brad Butt is stepping back from his assertion earlier this month that he saw voter information cards taken from the garbage and given to a candidate’s supporters to be used by people without identification.

The MP for the Ontario riding of Mississauga-Streetsville sits on the procedure and House affairs committee that is looking at proposed changes to Canada’s election laws. One of the changes would eliminate the voter information cards sent by Elections Canada as an acceptable form of identification.

On Feb. 6, Butt described seeing the voter information cards wrongly used by others to cast ballots.

“On mail delivery day when the voter cards are delivered to community mailboxes in apartment buildings, many of them are discarded in the garbage can or the blue box. I have actually witnessed other people picking up the voter cards, going to the campaign office of whatever candidate they support and handing out these voter cards to other individuals, who then walk into voting stations with friends who vouch for them with no ID,” Butt said in the House.

He repeated the story an hour later in response to a question from New Democrat MP Mike Sullivan as debate continued on C-23, the bill containing the proposed changes.

“I will relate to him something I have actually seen,” Butt said.

“On the mail delivery day when voter cards are put in mailboxes, residents come home, pick them out of their boxes, and throw them in the garbage can. I have seen campaign workers follow, pick up a dozen of them afterward, and walk out. Why are they doing that? They are doing it so they can hand those cards to other people, who will then be vouched for at a voting booth and vote illegally. That is going to stop.”
‘I misspoke’

On Monday, Butt retracted that statement in the House.

Butt said on Twitter simply that he “misspoke.”

“I misspoke during debate and corrected the record,” he said.

In an email to CBC News, Butt didn’t respond to questions about what led him to believe he had seen the cards stolen.

“I think you saw that I clarified that I did not personally see it. Over the years I have heard stories about voter cards being collected in common mailrooms. That’s it,” Butt said.

It wasn’t just on the floor of the House of Commons that Butt suggested the voter information cards were used fraudulently. He later told a similar story, this time attributing it to his 12 years as president and CEO of the Greater Toronto Apartment Association, representing owners and operators of apartment buildings.

(Read more at CBC)

—-
Alternative Free Press -fair use-

The Ukraine: Neo-Nazi criminal state looming in the centre of Europe

By Oriental Review: February 24, 2014

“There are many who do not know they are fascists but will find it out when the time comes.” -Ernest Hemingway, For Whom the Bell Tolls

After signing a void agreement on “crisis settlement” on Friday, the situation in Ukraine has rapidly got out of control of its signatories and “witnesses”. No provisions of this document were fulfilled. The legitimate authorities fled (or tried to flee) the country, the governmental buildings in Kiev are taken by the revolutionary mob. The radicals are dictating the new rules to façade opposition “leaders” who desperately try to bridle the Maidan.

What happened to Ukraine on February 21, 2014 is essentially a criminal coup committed by the radical armed anarchists and Ukrainian Nazis who have been enjoying a comprehensive financial, military, diplomatic and even religious support and instigation from the Western power groups for the last two decades. Many of Ukraine’s cities are now falling into the chaos of lootings, unprovoked violence, lynch law and political repressions.

The first signs of upcoming chaos were clearly seen as the Ukrainian authorities wavered at the three-month siege of the centre of Kiev by the radical guerrilla elements from Galicia and local criminal gangs. They watched silently when furious fanatics were burning unarmed riot police Berkut officers alive, lynching them and pulling out their eyes. They did nothing to stop frantic “freedom fighters” from storming regional administrations, humiliating the officials and looting police and military arsenals in the West Ukraine. They were paralyzed when unidentified snipers were cool-bloodily killing militia personnel, protesters and casual passer-bys from the roofs of Kiev’s buildings. They even declared amnesty (twice!) to those guilty of the brutal crimes against policemen and public order. Thus Yanukovych’s regime itself paved the way for a sinister ghost of the war-torn Libya to come to Ukraine.

Is the guerrilla side a self-organized and self-indoctrinated popular movement tired of a corrupt and inefficient state? That is hardly the case.

Since the collapse of the Soviet Union the international power groups have invested billions of the Federal Reserve notes (aka US$) into Ukrainian “pro-democratic” NGOs and politicians. While preaching “Ukrainian commitment to the European choice and democratic values” in the meantime they clearly saw that there is no short-term historical perspective for making Ukraine a state hostile to Russia, which is evidently the final goal of the globalist Eastern policy. The stakes were placed on the ultranationalist elements in the Western Ukraine and in the Uniate Church, a minority religious Greek-Catholic community of the Eastern rite, created by the Holy See in XVI century in a desperate attempt to weaken close ties of Rzeczpospolita’s Orthodox with Moscow. Since the early 1990s the Uniates enjoyed silent support of the newly-independent central authorities in Kiev. Theit tactic was to aggressively occupy Orthodox cathedrals on the canonic territory of the Moscow Patriarchate. The last thing the Uniate clergy used to preach in the occupied churches for all these years was the Christian call for repentance and peace. Instead they propagated a new crusade against the Orthodox and directly instigated and justified race-motivated prosecutions and even killings, acting exactly like radical jihadist preachers of the militant pseudo-Islamic sects. Suffice to watch a “Sunday sermon” by Mykhailo Arsenych, the clergyman from a local Uniate church in Ivano-Frankovsk region, Ukraine saying: “Today we are really ready for a revolution.The only effective methods of combat are assassination and terror! We want to be sure that no Chinese, Negro, Jew or Muscovite will try to come and grab our land tomorrow!”

The products of such indoctrination were not long in coming. A number of NATO-sponsored training centers for the Ukrainian ultranationalist militants were opened on the territory of the Baltic states immediately after they joined NATO in 2004. The detailed photo report on a Ukrainian group taking a course of subversive activities at a NATO training center in Estonia in 2006 is available here (texts in Russian).

Abundant financial and human resources were directed to bolster the paramilitary units of the radical UNA-UNSO, Svoboda and other ultranationalist organizations in the Ukraine. Since 1990s these thugs were participating in the Chechen and Balkan wars on the side of radical Wahhabi (!) militants and committing war crimes against captured Russian and Serbian soldiers and civilian population. One of the notorious guerilla fighters of the Ukrainian origin in Chechnya, Olexander Muzychko (aka criminal leader Sasha Biliy) today is heading a brigade of “Pravyi Sector”, the radical militant driving force of the ongoing coup d’état in Kiev. According to his “official” biography, in 1994 he was awarded by the then top commander of terroristIchkeria enclave Dzhohar Dudayev with the order “Hero of Nation” for “outstanding military successes against Russian troops”. His “military skills” were quite specific: he used to lure the Russian units operating in remote Chechen locations to guerilla ambushes. Then he personally participated in tortures and beheadings of the captured Russian soldiers. After returning to the Ukraine in 1995, he led a criminal gang in Rovno. Eventually he was prosecuted and sentences for 8 years term for kidnapping for ransom and attempted assassination of a Ukrainian businessman. He entered politics after release from prison in late 2000s.

After the end of Chechen and Balkan wars the British and American private military contractors were routinely recruiting Ukrainian mercenaries for operations in Afghanistan, Iraq, Syria and elsewhere.The Britam Defense scandal revealed the way and scale of how the Ukrainian personnel of the private military contractors were used in provocative clandestine actions to meet Western political goals in the Middle East. Many of them were sent to Kiev to make the job they are paid for – to target both policemen and protesters on “Euromaidan” from the roofs of surrounding buildings.

The real leaders of the protest have already clearly expressed their radical views to the European press (read e.g. the interview with the Pravyi Sector leader Dmitro Yarosh and several recent Guardian’s publications).

(Read more & find links to sources at Oriental Review)

—-
Alternative Free Press -fair use-

Oil Spill Shuts Down 65 Miles Of The Mississippi River

River Closed at New Orleans After Barge Spills Oil

THE ASSOCIATED PRESS: February 24, 2014

NEW ORLEANS — A 65-mile stretch of the Mississippi River remained closed at New Orleans on Monday following a weekend collision that resulted in crude oil spilling from a barge.

Authorities involved in the cleanup and investigation planned a Monday morning conference call as they worked on estimates of how much oil spilled and when the river would re-open, a Coast Guard spokesman, Petty Officer Bill Colclough, said.

At last count Sunday night, the river closure affected 26 vessels — 16 waiting to go downriver and 10 waiting to go upriver.

Officials reported only a light sheen following the accident but river traffic was halted to avoid contaminating passing vessels and to prevent oil from spreading downriver.

(Read more at NY Times)

—-
Alternative Free Press -fair use-

NSA increases spying on government aids

No spying on friends: NSA bugs Merkel aides instead of chancellor

RT: February 24, 2014

In the wake of President Obama’s promise to stop spying on German Chancellor Angela Merkel, the US intelligence has switched its attention to her top government officials, a German newspaper reported.

Washington’s relations with Germany were strained last year after revelations that the US National Security Agency (NSA) was conducting mass surveillance in Germany and even tapped the mobile phone of Chancellor Merkel.

Facing the German outrage, President Barack Obama pledged that the US would stop spying on the leader of the European country, which is among the closest and most powerful allies of America.

After the promise was made, the NSA has stepped up surveillance of senior German officials, German newspaper Bild am Sonntag (BamS) reported on Sunday.

“We have had the order not to miss out on any information now that we are no longer able to monitor the chancellor’s communication directly,” it quoted a top NSA employee in Germany as saying.

BamS said the NSA had 297 employees stationed in Germany and was surveying 320 key individuals, most of them German decision-makers involved in politics and business.

(Read more at RT)

—-
Alternative Free Press -fair use-

Enbridge Line 9: W5 uncovers unreported spills, alarming communities along 830-km pipe

Investigation unveils 35 spills along Enbridge’s suddenly controversial 830-km pipeline, many not revealed to communities until now.

By Jessica McDiarmid (News reporter) & Annie Burns-Pieper (CTV W5): February 22, 2014

An aging Enbridge pipeline that runs across Ontario has had at least 35 spills — far more than reported to federal regulators — but many municipalities along its route have never been informed of the incidents, a CTV W5 investigation reveals.

The National Energy Board, which regulates pipelines in Canada, has records of seven spills, while Enbridge told the investigative program there had been 13.

But W5’s analysis of information from the energy board, the company and Ontario’s Ministry of the Environment showed 35 spills associated with the 830-kilometre Line 9. (The Quebec government refused to provide W5 with any information).

The company is seeking federal approval to increase and reverse flow on the 38-year-old pipeline and use it to transport, in part, diluted bitumen from Alberta’s oilsands.

“It’s quite alarming,” said Brian McHattie, a city councillor in Hamilton, where seven leaks over the years have released nearly 3,000 litres of crude oil at company facilities northwest of the city. “This is new information for me.”

McHattie said the information raises concern about what is shared with municipalities. Hamilton staff met regularly with Enbridge officials since the company submitted its application, but none, to McHattie’s knowledge, were ever informed of the spills.

“They just haven’t been very forthcoming with us,” said McHattie. “It just makes you less confident in their integrity as a company and their willingness to share information and be above-board.”

Companies are required only to report hydrocarbon spills to the National Energy Board that are larger than 1,500 litres — equivalent to about 25 tanks of gas in an average car — or could have a “significant adverse effect” on the environment.

Enbridge spokesperson Graham White wrote in an email to the Star that the 13 leaks and ruptures noted in pipeline engineering assessments refer to mainline spills. The remainder were spills at facilities, he wrote.

Ontario’s Ministry of the Environment requires all spills to be reported, both those occurring on the main line and those within associated facilities. The ministry recorded 22 spills between 2003 and 2013. Just one occurred on the main line, spokesperson Kate Jordan told the Star.

Provincial law also requires that all spills be reported to municipalities in which they occur, but there are many exceptions. Spills such as those occurring at company facilities are usually exempt.

Cramahe Mayor Marc Coombs said he first learned of five spills that together leached 1,824 litres of oil when he was contacted by a W5 reporter.

“We were not notified of any of them,” said Coombs. “It does (raise concerns), from the point of view of transparency.”

The Calgary pipeline company raised the ire of Terrebonne, just outside Montreal, when municipal officials learned of a 2011 spill of 4,000 litres at Enbridge’s local facility — more than two years later. The revelation came in the midst of controversial public hearings in front of the National Energy Board.

“Terrebonne was surprised (by) the Enbridge attitude in this file, you know, because according to us Enbridge, as a good corporate citizen, has a moral responsibility to inform the city that a spill was occurring in that sector, a sector where there is a college, professional training centre, sports complex, daycare and several more businesses,” spokesperson Joël Goulet told W5.

Goulet said the company was willing to notify Terrebonne of similar incidents in the future.

Sarnia Mayor Mike Bradley said the city isn’t usually notified when spills are contained within facilities and don’t require municipal staff to be involved in containment or cleanup. He said the city hadn’t heard about the nine spills linked with Line 9 facilities in the past decade — but it should.

“It’s just a good practice to notify, and then we can make our own judgment whether we need to do anything further,” said Bradley. “Just tell us. That’s all we want — to know.”

(read the rest at The Star)

Watch Pipeline War on CTV’s W5.

Source: http://www.thestar.com/news/gta/torontopipeline/2014/02/22/enbridge_line_9_w5_uncovers_unreported_spills_alarming_communities_along_830km_pipe.html

….
Alternative Free Press -fair use-