If you live in the United States of America, you live in a giant prison where liberty and freedom are slowly being strangled to death. In this country, the control freaks that run things are obsessed with watching, tracking, monitoring and recording virtually everything that we do. Nothing is private anymore. Everything that you do on the Internet is being monitored. All of your phone calls are being monitored. In fact, if law enforcement authorities suspect that you have done something wrong, they will use your cell phone microphone to listen to you even when you think your cell phone is turned off. In many areas of the country, when you get into your car automated license plate readers track you wherever you go, and in many major cities when you are walking on the streets a vast network of security cameras and “smart street lights” are constantly watching you and listening to whatever you say. The TSA is setting up “internal checkpoints” all over the nation, Homeland Security is encouraging all of us to report any “suspicious activity” that our neighbors are involved in and the federal government is rapidly developing “pre-crime” technology that will flag us as “potential terrorists” if we display any signs of nervousness. If you are flagged as a “potential terrorist”, the U.S. military can arrest you and detain you for the rest of your life without ever having to charge you with anything. Yes, the United States of America is rapidly being turned into a “Big Brother” prison grid, and most Americans are happily going along with it.
The sad thing is that this used to be “the land of the free and the home of the brave”.
So what in the world happened?
A fundamental shift in our culture has taken place. The American people have eagerly given up huge chunks of liberty and freedom in exchange for vague promises of increased security.
Our country is now run by total control freaks and paranoia has become standard operating procedure.
We were told that the terrorists hate our liberties and our freedoms, and that we needed to fight the terrorists so that we could keep our liberties and our freedoms.
But instead, the government keeps taking away all of our liberties and our freedoms.
How in the world does that make any sense?
Have the terrorists won?
As a country, we have moved so far in the direction of communist China, the USSR and Nazi Germany that it is almost impossible to believe.
Yes, turning the United States of America into a giant prison may make us all slightly safer, but what kind of life is this?
Do we want to be dead while we are still alive?
Is this the price that we want to pay in order to feel slightly safer?
Where are the millions of Americans that still yearn to breathe free air?
America is supposed to be a land teeming with people thirsting for independence. For example, “Live Free or Die” is supposedly the official motto of the state of New Hampshire.
But instead, the motto of most Americans seems to be “live scared and die cowering”.
We don’t have to live like this.
Yes, bad things are always going to happen. No amount of security is ever going to be able to keep us 100% safe.
We need to remember that a very high price was paid for our liberty and we should not give it up so easily.
As one very famous American once said, when we give up liberty for security we deserve neither.
The following are 30 signs that the United States of America is being turned into a giant prison….
#1 A new bill that is going through the U.S. Senate would allow the U.S. military to arrest American citizens and hold them indefinitely without trial. This new law was recently discussed in an article posted on the website of the New American….
In what may be a tale too bizarre to be believed by millions of Americans, the U.S. Senate appears ready to pass a bill that will designate the entire earth, including the United States and its territories, one all-encompassing “battlefield” in the global “war on terror” and authorize the detention of Americans suspected of terrorist ties indefinitely and without trial or even charges being filed that would necessitate a trial.
U.S. Senator Lindsey Graham is a big supporter of the bill, and he says that it would “basically say in law for the first time that the homeland is part of the battlefield”.
According to the PPJ Gazette, the following are three things that this new law would do….
1) Explicitly authorize the federal government to indefinitely imprison without charge or trial American citizens and others picked up inside and outside the United States;
(2) Mandate military detention of some civilians who would otherwise be outside of military control, including civilians picked up within the United States itself; and
(3) Transfer to the Department of Defense core prosecutorial, investigative, law enforcement, penal, and custodial authority and responsibility now held by the Department of Justice.
#2 U.S. Senator Joe Lieberman is asking Google to install a “terrorist button” on all Blogger.com blogs so that readers can easily flag “terrorist content” for authorities.
#3 Most Americans have no idea how sophisticated the “Big Brother” prison grid has become. For example, in Washington D.C. the movements of every single car are tracked using automated license plate readers (ALPRs). The following comes from a recent Washington Post article….
More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.
With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.
Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.
#4 In some American schools, RFID chips are now being used to monitor the attendance and movements of children while they are at school. The following is how one article recently described a program that has just been instituted at a preschool in California….
Upon arriving in the morning, according to the Associated Press, each student at the CCC-George Miller preschool will don a jersey with a stitched in RFID chip. As the kids go about the business of learning, sensors in the school will record their movements, collecting attendance for both classes and meals. Officials from the school have claimed they’re only recording information they’re required to provide while receiving federal funds for their Headstart program.
#5 Increasingly, incidents of misbehavior at many U.S. schools are being treated as very serious crimes. For example, when a little girl kissed a little boy at one Florida elementary school recently, it was considered to be a “possible sex crime” and the police were called out.
#6 But what happened to one very young student in Stockton, California earlier this year was even worse….
Earlier this year, a Stockton student was handcuffed with zip ties on his hands and feet, forced to go to the hospital for a psychiatric evaluation and was charged with battery on a police officer. That student was 5 years old.
#7 In the United States today, police are trained to respond to even the smallest crimes with extreme physical force. For example, one grandfather in Arizona was recently filmed laying unconscious in a pool of his own blood after police rammed his head into the flood inside a Wal-Mart on Black Friday night. It was thought that he was shoplifting, but it turns out that he says that he was just trying to tuck a video game away so other crazed shoppers would not grab it out of his hands.
#8 Did you know that the government actually sets up fake cell phone towers that can intercept your cell phone calls? The following is how a recent Wired article described these “stingrays”….
You make a call on your cellphone thinking the only thing standing between you and the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your calls.
So-called stingrays are one of the new high-tech tools that authorities are using to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to a real cellphone tower.
The government maintains that the stingrays don’t violate Fourth Amendment rights, since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower.
#9 U.S. border agents are allowed by law to search any laptop being brought into the United States without even needing any reason to do so.
#10 In the United States of America, everyone is a “potential terrorist”. According to FBI Director Robert Mueller, “homegrown terrorists” represent as big a threat to American national security as al-Qaeda does.
#11 Most Americans are not that concerned about the Patriot Act, but that might change if they understood that the federal government has a “secret interpretation” of what the Patriot Act really means. U.S. Senator Ron Wyden says that the U.S. government interprets the Patriot Act much more “broadly” than the general public does….
“We’re getting to a gap between what the public thinks the law says and what the American government secretly thinks the law says.”
#12 The FBI is now admittedly recording Internet talk radio programs all over the United States. The following comes from a recent article by Mark Weaver of WMAL.com….
If you call a radio talk show and get on the air, you might be recorded by the FBI.
The FBI has awarded a $524,927 contract to a Virginia company to record as much radio news and talk programming as it can find on the Internet.
The FBI says it is not playing big brother by policing the airwaves, but rather seeking access to what airs as potential evidence.
#13 The federal government has decided that what you and I share with one another on Facebook and on Twitter could be a threat to national security. According to a recent Associated Press article, the Department of Homeland Security will soon be “gleaning information from sites such as Twitter and Facebook for law enforcement purposes”.
#14 What you say on your cell phone is never private. The truth is that that the FBI can demand to see your cell phone data whenever it wants. In addition, according to CNET News the FBI can remotely activate the microphone on your cell phone and listen to whatever you are saying….
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations.
The technique is called a “roving bug,” and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
#15 In some areas of the country, law enforcement authorities are pulling data out of cell phones for no reason whatsoever. According to the ACLU, state police in Michigan are now using “extraction devices” to download data from the cell phones of motorists that they pull over. This is taking place even if the motorists that are pulled over are not accused of doing anything wrong.
The following is how a recent article on CNET News described the capabilities of these “extraction devices”….
The devices, sold by a company called Cellebrite, can download text messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to work with different models and can even bypass security passwords and access some information.
#16 The federal government has become so paranoid that they have been putting GPS tracking devices on the vehicles of thousands of people that have not even been charged with committing any crimes. The following is a short excerpt from a recent Wired magazine article about this issue….
The 25-year-old resident of San Jose, California, says he found the first one about three weeks ago on his Volvo SUV while visiting his mother in Modesto, about 80 miles northeast of San Jose. After contacting Wired and allowing a photographer to snap pictures of the device, it was swapped out and replaced with a second tracking device. A witness also reported seeing a strange man looking beneath the vehicle of the young man’s girlfriend while her car was parked at work, suggesting that a tracking device may have been retrieved from her car.
Then things got really weird when police showed up during a Wired interview with the man.
The young man, who asked to be identified only as Greg, is one among an increasing number of U.S. citizens who are finding themselves tracked with the high-tech devices.
The Justice Department has said that law enforcement agents employ GPS as a crime-fighting tool with “great frequency,” and GPS retailers have told Wired that they’ve sold thousands of the devices to the feds.
#17 New high-tech street lights that are being funded by the federal government and that are being installed all over the nation can also be used as surveillance cameras, can be used by the DHS to make “security announcements” and can even be used to record personal conversations. The following is from a recent article by Paul Joseph Watson for Infowars.com….
Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.
#18 If you choose to protest in the streets of America today, there is a good chance that you will be brutalized. All over the United States law enforcement authorities have been spraying pepper spray directly into the faces of unarmed protesters in recent weeks.
#19 In many areas of the United States today, you will be arrested if you do not produce proper identification for the police. In the old days, “your papers please” was a phrase that was used to use to mock the tyranny of Nazi Germany. But now all of us are being required to be able to produce “our papers” for law enforcement authorities at any time. For example, a 21-year-old college student named Samantha Zucker was recently arrested and put in a New York City jail for 36 hours just because she could not produce any identification for police.
#20 According to blogger Alexander Higgins, students in kindergarten and the 1st grade in the state of New Jersey are now required by law to participate “in monthly anti-terrorism drills”. The following is an excerpt from a letter that he recently received from the school where his child attends….
Each month a school must conduct one fire drill and one security drill which may be a lockdown, bomb threat, evacuation, active shooter, or shelter-in place drill. All schools are now required by law to implement this procedure.
So who in the world ever decided that it would be a good idea for 1st grade students to endure “lockdown” and “active shooter” drills?
To get an idea of what these kinds of drills are like, just check out this video.
#21 With all of the other problems that we are having all over the nation, you would think that authorities would not be too concerned about little kids that are trying to sell cups of lemonade. But sadly, over the past year police have been sent in to shut down lemonade stands run by children all over the United States.
#22 The federal government has decided to invest a significant amount of time, money and energy raiding organic farms. The following example comes from Natural News….
It is the latest case of extreme government food tyranny, and one that is sure to have you reeling in anger and disgust. Health department officials recently conducted a raid of Quail Hollow Farm, an organic community supported agriculture (CSA) farm in southern Nevada, during its special “farm to fork” picnic dinner put on for guests — and the agent who arrived on the scene ordered that all the fresh, local produce and pasture-based meat that was intended for the meal be destroyed with bleach.
#23 It is an absolute disgrace that all of us (including grandmothers and young children) must either go through body scanners that reveal the intimate details of our naked bodies or endure “enhanced pat-downs” during which our genitals will be touched before we are allowed to get on an airplane.
It is also an absolute disgrace that the American people are putting up with this.
#24 Invasive TSA security techniques are not just for airports anymore. Now, TSA “VIPR teams” are actively conducting random inspections at bus stations and on interstate highways all over the United States. For example, the following comes from a local news report down in Tennessee….
You’re probably used to seeing TSA’s signature blue uniforms at the airport, but now agents are hitting the interstates to fight terrorism with Visible Intermodal Prevention and Response (VIPR).
“Where is a terrorist more apt to be found? Not these days on an airplane more likely on the interstate,” said Tennessee Department of Safety & Homeland Security Commissioner Bill Gibbons.
Tuesday Tennessee was first to deploy VIPR simultaneously at five weigh stations and two bus stations across the state.
#25 More than a million hotel television sets all over America are now broadcasting propaganda messages from the Department of Homeland Security promoting the “See Something, Say Something” campaign. In essence, the federal government wants all of us to become “informants” and to start spying on one another constantly. The following comes from an article posted by USA Today….
Starting today, the welcome screens on 1.2 million hotel television sets in Marriott, Hilton, Sheraton, Holiday Inn and other hotels in the USA will show a short public service announcement from DHS. The 15-second spot encourages viewers to be vigilant and call law enforcement if they witness something suspicious during their travels.
#26 Certain “types” of American citizens are being labeled as potential threats in official U.S. government documents. An unclassified Department of Homeland Security report published a couple years ago entitled “Right-wing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment” claims that a belief in Bible prophecy “could motivate extremist individuals and groups to stockpile food, ammunition and weapons.” The report goes on to state that such people are potentially dangerous.
#27 Back on February 20, 2009, the State of Missouri issued a report entitled “MIAC Strategic Report: The Modern Militia Movement“. That report warned that the following types of people may be potential terrorists….
*anti-abortion activists
*those that are against illegal immigration
*those that consider “the New World Order” to be a threat
*those that have a negative view of the United Nations
#28 As I have written about previously, a very disturbing document that Oath Keepers has obtained shows that the FBI is now instructing store owners to report many new forms of “suspicious activity” to them. According to the document, “suspicious activity” now includes the following….
*paying with cash
*missing a hand or fingers
*”strange odors”
*making “extreme religious statements”
*”radical theology”
*purchasing weatherproofed ammunition or match containers
*purchasing meals ready to eat
*purchasing night vision devices, night flashlights or gas masks
Do any of those “signs of suspicious activity” apply to you?
#29 Soon you may get labeled as a “potential terrorist” if you are just feeling a little nervous. A new “pre-crime” technology system that is currently being tested by the U.S. Department of Homeland Security will soon be in use all over the nation. It is called “Future Attribute Screening Technology” (FAST), and it is very frightening. The following description of this new program comes from an article in the London Telegraph….
Using cameras and sensors the “pre-crime” system measures and tracks changes in a person’s body movements, the pitch of their voice and the rhythm of their speech.
It also monitors breathing patterns, eye movements, blink rate and alterations in body heat, which are used to assess an individual’s likelihood to commit a crime.
The Future Attribute Screening Technology (FAST) programme is already being tested on a group of government employees who volunteered to act as guinea pigs.
Once again, despite all of this outrageous “security”, it is inevitable that a lot of really bad things are going to happen in the United States in the years ahead.
When there are incidents of violence, it is also inevitable that there will be calls for even more “Big Brother” security measures.
We are going to be caught in a never ending spiral of tyranny where the “solution” is always even tighter security.
Eventually, we will have lost all of our liberties and freedoms, and we will probably be even less safe than we are today.
Do not be deceived. We could put a soldier on every corner, a video camera in every room of every home and an RFID chip in every citizen but that would not make us “safe”.
Every single lawmaker that is backing these laws which strip our liberties and freedoms away deserves to be voted out of office.
If you love the United States of America, please stand up and say something while you still can.
Please use this article and other articles like it as tools. Share them with your friends and your family. If we can get enough people to wake up, perhaps there is still enough time to turn the direction of this country around.
Will the final chapters of the history of the United States of America be mentioned in the same breath as communist China, the USSR and Nazi Germany, or will the final chapters of the history of the United States of America be the greatest chapters of all?
You can judge a tree by its fruit. In the case of Wikileaks, its low-hanging fruit.
There is only one thing more dangerous than a fundamentalist Neo-conservative, and that’s a naive liberal. In the wake of the demolition of the modern, somewhat mythological illusory icon Barrack Obama, people who identify themselves as liberal watchdogs have been left wanting for a new hero.
Enter the Messiah 2.0, the silver haired saviour, one Julian Assange. The ascent and timing of the Wikileaks phenomenon could not be more scripted and perfect. This magnificent digital cloud has literally captured the minds of eternally frustrated people the world over- frustrated by war, corruption and the endless cloak and dagger exploits of our leaders. The uploading of 250,000 “secret cables” threatened to bring down the corrupt Washington Establishment. In reality however, it has done nothing of the sort, bizarrely bolstering the status quo.
What exactly is Wikileaks? The pieces are now coming together.
The soil was readied for the arrival of Wikileaks by a decade of anonymous postings on highly questionable Islamic websites featuring pixelated avatars of Osama Bin Laden, Ayman al–Zawahiri and Abu Musab al–Zarqawi and similar theatrical villains in the West’s staged production of the Global War on Terror. What the anonymous Islamic dot.com boom achieved was to validate all manner of mysterious postings and virtual events online as something purporting to be modern historical record. Washington, London and Tel Aviv validated these internet episodes with official State Dept reactions and high level addresses. Hence, foreign policies, domestic security state measures and war-time decisions could now be based on this new virtual theatre of events. Enter stage left, the anamorphic character, crusader for free speech, Mr Julian Assange, alleged founder of the free liberal world’s latest beacon of light, Wikileaks.
In the complexed world of intelligence leaks, counter leaks, false leaks and misinformation it is often difficult for the casual observer to separate the wheat from the chaff. Leaks are used by the Establishment to out rogue agents, settle political scores or create timely diversions needed by intelligence services to maintain an air of chaos on the front pages of the major daily rags. But the real clues to the political functions of these leaks are often hidden in plain sight. Case inpoint: this past summer’s Wikileaks cache which featured former Pakistani ISI Chief, Hamid Gul, portaying him as an active puppet master working in cahoots with Al Qaeda and the Taliban to attack US and NATO forces in the region, was one of the clearest giveaways as to the real function and dark pedigree of the so-called intelligence pouring out of this seemingly trustworthy Icelandic online oracle. In the years running up to this US ’leak’, General Hamid Gul was one of the most consistent and relentless critics of the US foreign policy and the military occupations in the region, as well as its often duplicitous relationship with its client state Pakistan. Gul even went so far as to accuse elements within the US intelligence structure as being either responsible or involved in the planning and execution of the infamous September 11th attacks of 2001. This of course, was a bombshell at the time and placed Hamid Gul in the crosshairs of Washington’s military and intelligence establishments. It was, afterall, Gul- the old inside man in the pay of the CIA, who worked for Washington in the 1980′s to train and arm the mujahedeen in Soviet occupied Afghanistan. The July 2010 Wikileaks file on General Gul repositioned him from whistleblower into a new member of the revised ’Al Qaeda camp’, an ememy of the state, thus priming the engines of the CIA Gulfstream Jet that could now pick up the retired Pakistani General as an enemy combatant in the War on Terror, black sack and all. From annoying inside to demonised outsider. Job done.
Watch Hamid Gul’s reaction to the Wikileak release
More importantly, however, what this supposed Wiki-revelation did was to fuel the new idea that there is now ”mistrust” between these two close allies in the war on terror, and “without each other’s support they cannot win the war on terror”. Bare in mind that during this time, US drone attacks and Blackwater encroachments into Pakistani territory had reached a new high. This is only one example, but certainly a telling one, and virtually identical in execution to Osama bin Laden’s fabled timely election messages and Christmas addresses to the world, further demonstrating the uncanny timing and disinformation coming out of many of these Wikileaks doc dumps.
A d v e r t i s e m e n t
Many, if not all of those warm timely Bin Laden festive messages have been debunked, and exposed as contrived fakes put out by the CIA’s shadowy media arm Intel Center, but again viewers need to bare in mind the importance of these messages in the formation of public opinion and feeling on issues surrounding both domestic and foreign policy. These controlled items are invalueable and serve a real PR purpose. Wikileaks can be analysed in a similar fashion by noting the timing of the content, the material released, the subsequent predictable media reaction to them, and also noting what is ommitted from these supposed ‘tell all’ mega files.
The Business of Leaking
In the case of Washington, when real world events become difficult to manage in PR terms, a diversion is essential. The old formula of staging fake terror plots, or even real terror bombs has reached its end with the public, so what is better than combing through the Pentagon’s back catalogue of PDF files and adding a few new files for good measure, then uploading them to an off-shore server? It’s cheap, fast and best all, it’s easy to controlled. A junior officer could do the job. Amazingly, nowhere in any of these sinister cables appears any implications of criminal wrong doing by Herrs Bush, Cheney, Rumsfeld, Obama or Blair. Nowhere is there any trace of implications or criticism of the US’s number one ally and moral/material partner in the illegal Middle East occupations- Israel. One secret cable even numbered Iraqi civilian deaths since the invasion at a mere 66,000- in effect rewriting previous UN and independent estimates of 1.5 million deaths. Can we take this seriously? So we get 250,000 ‘secret’ files dumped and the prevailing Establishment remains firmly in tact with no real change in the status quo? Interesting.
Webster Tarpley breaks down the problem with Julian Assange and Wikileaks
Time will tell what policy and law changes will be rushed into place as a Neo-conservative reaction against Wikileaks’ staged embarrassment of the US State Dept. Perhaps Washington and London will enact new security measures and authorities to take down hundreds of ‘rogue’ websites that threaten the interests of National Security. That would of course be an own-goal for liberal watchdogs and fans pining for Assange and Wikileaks, but this is precisely the kind of reaction we can expect in the media circus surrounding the flimsy internet Wikileak phenomenon.
If it all goes south for Wikileaks and free speech online, you can expect Assange to be hard on the lecture circuit promoting his new book, which you can buy in hardback on Amazon for $24.99.
Whether the new liberal cult hero Julian Assange is in fact a “useful idiot” helping to propagate fake leaks for the Establishment, or is a bona fide covert intelligence operative, remains to be seen. His recent detention in the UK for alleged sexual abuse in Sweden is providing endless media columns which will focus on the international legal circus of these charges, and further propel the cult of personality forward. One thing is fairly certain though, that Wikileaks is a corrupt oracle putting out a mix of light-to-middleweight intelligence and outright misinformation, in order to direct public opinion on a variety of issues. One needs only to look at the initial George Soros-type funding vessels and early support for Wikileaks, and tie these association together to trace its genealogy. This is complexed and not for amateurs, but utterly fascinating for those willing to look deeper into this virtual off-shore Conintelpro organ of the 21st century.
Our advice to readers: be vigilant when analysing your Wikileaks. Watch for the low-hanging fruit… look but don’t bite!
The story on the surface makes for a script for a new Oliver Stone Hollywood thriller. However, a closer look at the details of what has so far been carefully leaked by the most ultra-establishment of international media such as the New York Times reveals a clear agenda. That agenda coincidentally serves to buttress the agenda of US geopolitics around the world from Iran to North Korea. The Wikileaks is a big and dangerous US intelligence Con Job which will likely be used to police the Internet.
Voltaire Network | Frankfurt (Germany)
It is almost too perfectly scripted to be true. A discontented 22-year old US Army soldier on duty in Baghdad, Bradley Manning, a low-grade US Army intelligence analyst, described as a loner, a gay in the military, a disgruntled “computer geek,” sifts through classified information at Forward Operating Base Hammer. He decides to secretly download US State Department email communications from the entire world over a period of eight months for hours a day, onto his blank CDs while pretending to be listening to Lady Gaga. In addition to diplomatic cables, Manning is believed to have provided WikiLeaks with helicopter gun camera video of an errant US attack in Baghdad on unarmed journalists, and with war logs from Iraq and Afghanistan.
Bradley Manning
Manning then is supposed to have tracked down a notorious former US computer hacker to get his 250,000 pages of classified US State Department cables out in the Internet for the whole world to see. He allegedly told the US hacker that the documents he had contained “incredible, awful things that belonged in the public domain and not on some server stored in a dark room in Washington, DC.” The hacker turned him in to US authorities so the story goes. Manning is now incommunicado since months in US military confinement so we cannot ask him, conveniently. The Pentagon routinely hires the best hackers to design their security systems.
Then the plot thickens. The 250,000 pages end up at the desk of Julian Assange, the 39-year-old Australian founder of a supposedly anti-establishment website with the cute name Wikileaks. Assange decides to selectively choose several of the world’s most ultra-establishment news media to exclusively handle the leaking job for him as he seems to be on the run from Interpol, not for leaking classified information, but for allegedly having consensual sex with two Swedish women who later decided it was rape.
He selects as exclusive newspapers to decide what is to be leaked the New York Times which did such service in promoting faked propaganda against Saddam that led to the Iraqi war, the London Guardian and Der Spiegel. Assange claims he had no time to sift through so many pages so handed them to the trusted editors of the establishment media for them to decide what should be released. Very “anti-establishment” that.
The New York Times even assigned one of its top people, David E. Sanger, to control the release of the Wikileaks material. Sanger is no establishment outsider. He sits as a member of the elite Council on Foreign Relations as well as the Aspen Institute Strategy Group together with the likes of Condi Rice, former Defense Secretary William Perry, former CIA head John Deutch, former State Department Deputy Secretary and now World Bank head Robert Zoellick among others.
Indeed a strange choice of media for a person who claims to be anti-establishment. But then Assange also says he believes the US Government version of 9/11 and calls the Bilderberg Group a normal meeting of people, a very establishment view.
Not so secret cables…
The latest sensational Wikileaks documents allegedly from the US State Department embassies around the world to Washington are definitely not as Hillary Clinton claimed “an attack on America’s foreign policy interests that have endangered innocent people.” And they do not amount to what the Italian foreign minister, called the “September 11 of world diplomacy.” The British government calls them a threat to national security and an aide to Canada’s Prime Minister calls on the CIA to assassinate Assange, as does kooky would-be US Presidential hopeful Sarah Palin.
Most important, the 250,000 cables are not “top secret” as we might have thought. Between two and three million US Government employees are cleared to see this level of “secret” document, [1] and some 500,000 people around the world have access to the Secret Internet Protocol Router Network (SIPRnet) where the cables were stored. SIPRnet is not recommended for distribution of top-secret information. Only 6% or 15,000 pages of the documents have been classified as even secret, a level below top-secret. Another 40% were the lowest level, “confidential”, while the rest were unclassified. In brief, it was not all that secret. [2]
Most of the revelations so far have been unspectacular. In Germany the revelations led to the removal of a prominent young FDP politician close to Guido Westerwelle who apparently liked to talk too much to his counterpart at the US Embassy. The revelations about Russian politics, that a US Embassy official refers to Putin and Medvedev as “Batman and Robin,” tells more about the cultural level of current US State Department personnel than it does about internal Russian politics.
But for anyone who has studied the craft of intelligence and of disinformation, a clear pattern emerges in the Wikileaks drama. The focus is put on select US geopolitical targets, appearing as Hillary Clinton put it “to justify US sanctions against Iran.” They claim North Korea with China’s granting of free passage to Korean ships despite US State Department pleas, send dangerous missiles to Iran. Saudi Arabia’s ailing King Abdullah reportedly called Iran’s President a Hitler.
Excuse to police the Internet?
What is emerging from all the sound and Wikileaks fury in Washington is that the entire scandal is serving to advance a long-standing Obama and Bush agenda of policing the until-now free Internet. Already the US Government has shut the Wikileaks server in the United States though no identifiable US law has been broken.
What is emerging from all the sound and Wikileaks fury in Washington is that the entire scandal is serving to advance a long-standing Obama and Bush agenda of policing the until-now free Internet. Already the US Government has shut the Wikileaks server in the United States though no identifiable US law has been broken.
The process of policing the Web was well underway before the current leaks scandal. In 2009 Democratic Senator Jay Rockefeller and Republican Olympia Snowe introduced the Cybersecurity Act of 2009 (S.773). IIt would give the President unlimited power to disconnect private-sector computers from the internet. The bill “would allow the president to ’declare a cyber-security emergency’ relating to ’non-governmental’ computer networks and do what’s necessary to respond to the threat.” We can expect that now this controversial piece of legislation will get top priority when a new Republican House and the Senate convene in January.
The US Department of Homeland Security, an agency created in the political hysteria following 9/11 2001 that has been compared to the Gestapo, has already begun policing the Internet. They are quietly seizing and shutting down internet websites (web domains) without due process or a proper trial. DHS simply seizes web domains that it wants to and posts an ominous “Department of Justice” logo on the web site. See an example at http://torrent-finder.com. Over 75 websites were seized and shut in a recent week. Right now, their focus is websites that they claim “violate copyrights,” yet the torrent-finder.com website that was seized by DHS contained no copyrighted content whatsoever. It was merely a search engine website that linked to destinations where people could access copyrighted content. Step by careful step freedom of speech can be taken away. Then what?
“Laurel and Hardy, that’s John and Yoko. And we stand a better chance under that guise because all the serious people like Martin Luther King and Kennedy and Gandhi got shot.” John Lennon
Part 1
Bresler begins by questioning the “lone nut” theory. Since 1835, 15 men and 2 women have attacked “nationally prominent political leaders in sixteen separate incidents.” Of those 17, only 3 have been ruled insane by law. Mark David Chapman was never found to be legally insane. “The ‘lone nut’ theory simply does not stand up as an all-embracing explanation covering all — or even most — instances of American political assassination.”
Bresler offers the possibility that “Lennon, the politically most active rock star of his generation… was shot dead outside his own home by a killer who was merely a tool, a human gun used and controlled by others to destroy a uniquely powerful radical figure who was likely to prove a rallying point for mass opposition to the policies soon to be implemented… by the new United States government headed by Ronald Reagan.”
Bresler quotes the late radio journalist Mae Brussell, who broke the Watergate story 2 months before the Woodward-Bernstein expose’. Brussell had no doubts: “It was a conspiracy. Reagan had just won the election. They knew what kind of president he was going to be. There was only one man who could bring out a million people on demonstration in protest at his policies — and that was Lennon.”
Bresler speculates that Chapman was a “Manchurian Candidate,” brainwashed and pre-programmed to kill on command. When the moment had arrived, Chapman received his signal and performed his task.
The CIA and Mind Control
In April 1950, the CIA began work on PROJECT BLUEBIRD, the agency’s fledgling attempt at mind control. “Within two years this had progressed into the substantially enlarged PROJECT ARTICHOKE. According to a later CIA internal memorandum, PROJECT ARTICHOKE was intended to ‘exploit operational lines, scientific methods and knowledge that can be utilized in altering the attitudes, beliefs, thought processes and behaviour patterns of agent personnel. This will include the application of tested psychiatric and psychological techniques including the use of hypnosis in conjunction with drugs.’ In turn, only one year later, in April 1953, PROJECT ARTICHOKE became MKULTRA, the generic name for a series of on-going investigations by the agency’s Technical Services Staff.”
Some might object that pre-programming a subject to be a “killer on command” violates the common wisdom that one cannot be hypnotised to do something that is contray to one’s individual morals. Yet not all “experts” are in agreement on this. For example Milton Kline, a New York psychologist and former president of the American Society for Clinical and Experimental Hypnosis believes it is *not* impossible to create a “Manchurian Candidate.” According to Kline, “It cannot be done by everyone. It cannot be done consistently, but it can be done.”
“There seems little doubt that sophisticated techniques have now reached the stage where, if murder is desired, a killer, once programmed and ‘on hold’, can be triggered into action.”
Sirhan Sirhan
Bresler suggests that Sirhan Sirhan, the supposed lone assassin of Robert F. Kennedy, was a pre-programmed killer. Seven years after the RFK assassination, Sirhan was interviewed by psychiatrists. These recorded interviews were analyzed with the help of a Psychological Stress Evaluator (PSE), a device which measures micro-tremors in the voice. Based on the PSE, former high-ranking intelligence officer Charles McQuiston stated: “I’m convinced that Sirhan wasn’t aware of what he was doing. He was in a hypnotic trance when he pulled the trigger… Everything in the PSE charts tells me that someone else was involved in the assassination — and that Sirhan was programmed through hypnosis to kill RFK. What we have here is a real live ‘Manchurian Candidate.'”
After examining Sirhan’s PSE charts, Dr. John W. Heisse, Jr., president of the International Society of Stress Analysis, agreed with McQuiston: “Sirhan kept repeating certain phrases. This clearly revealed he had been programmed to put himself into a trance.”
Who Killed John Lennon?
by Fenton Bresler Part 2 of 2 [Excerpts]
“Listen, if anything happens to Yoko and me, it was not an accident.” John Lennon
Part 2
Government Surveillance
During a December, 1971 rally at the University of Michigan (Ann Arbor), undercover FBI agents recorded remarks made by Lennon and others. This is only one case of many, all pointing to a pattern of consistent governmental spying upon Lennon. Under the Freedom of Information Act, Bresler obtained U.S. government files on Lennon. The files show that Lennon was under constant government surveillance, especially during the years 1971-1972.
For example, in an April 10, 1972 memorandum from J. Edgar Hoover to the FBI’s New York office, Hoover orders his agents to “…promptly initiate discrete efforts to locate subject [Lennon] and remain aware of his activities and movements. Handle inquiries only through established sources… Careful attention should be given to reports that subject is heavy narcotics user and any information developed in this regard should be furnished to narcotics authorities and immediately furnished to bureau in form suitable for dissemination.”
“Lennon knew from early in 1972 that he was under constant surveillance, being followed in the streets and with his telephone tapped.” The ex-Beatle was aware of the surveillance by secret police agencies and so stated on several occasions. For example, in December 1975 he told one interviewer, “We knew we were being wire-tapped… there was a helluva lot of guys coming in to fix the phones.”
“Moral Turpitude”
One of the methods used by the U.S. government to harass Lennon was the threat of deportation. The government had extra leverage in its efforts due to a previous conviction against Lennon which charged him with “moral turpitude.” On October 18, 1968, in Britain, Lennon and Ono had been arrested and charged with possession of 1.5 ounces of marijuana. Two weeks before the bust, Lennon had been warned that the police were out to get him because he was a “loudmouth.” As a precaution, he had (as he put it) “cleaned the house out [of drugs].” Nevertheless, marijuana was found in the house by the police. According to Lennon, he had been set up. His opinion is backed up by the fact that the arresting officer was later sentenced to two years in prison for planting evidence in other cases.
In order that Ono would not be charged, Lennon “copped a plea”. Charges against Yoko Ono were dropped and Lennon was fined and found guilty of “an offence of moral turpitude.”
At the time of their arrest, Yoko Ono was pregnant and almost suffered a miscarriage. Although she was immediately hospitalized, a month later she lost the baby. “On being told the end of their child’s unborn life was near, Lennon had a tape recorder brought into the hospital room and, with a stethoscope microphone, he recorded his second son’s failing heartbeats before he died.”
Political Activism
Examples of Lennon’s political activism are seen in songs such as “Give Peace a Chance,” “Power to the People,” and “Working Class Hero.” In an interview published in *Rolling Stone* (and later as a book entitled *Lennon Remembers*), Lennon called the song “Working Class Hero” a “…song for the revolution… It’s for the people like me who are working class.”
In the interview, Lennon further states that “…the people who are in control and in power, and the class system and the whole bullshit bourgeois scene is exactly the same except that there are a lot of middle-class kids with long hair walking around in trendy clothes… The same bastards are in control, the same people are runnin’ everything… They’re doing exactly the same things, selling arms to South Africa, killing blacks on the street, people are living in fucking poverty with rats crawling all over them. It’s the same. It just makes you puke.”
“With Lennon, rock had become revolutionary — and for real. He and Yoko took part in demonstrations, they campaigned for a public inquiry into the case of James Hanratty, convicted of murder and hanged in the early 1960s… they marched for the IRA [Irish Republican Army] and they called for help for striking shipbuilders.”
The Invisible Assassins
Bresler interviewed Arthur O’Connor, the lieutenant who was commanding officer of the twentieth precinct of the New York police that dealt with Lennon’s murder. He quotes O’Connor as saying, “As far as you are trying to build up some kind of conspiracy, I would support you in that line. Like I said originally over the phone, if this gentleman [Chapman] wanted to get away with it, he could have got away with it. There was the subway across the road and no one around to stop him.”
Instead, once Chapman had accomplished his task, he calmly sat and waited for police to come.
“Why one method rather than the other, the amateur as against the professional? Because that way you avoid any awkward questions. If Lennon had been gunned down by a professional killer, the whole world would have known: such swift expert assassinations carry their own individual hallmark. It would have been obvious what had happened and, with Lennon’s history of anti-government radical political activity, there would have been [an in-depth investigation].”
“But if you program an amateur to do the job, a so-called ‘nut’, very few questions are asked.”
An official working within the recently established UN Human Rights Council is under fire from an NGO closely affiliated with Israel for suggesting that the official explanation of the 9/11 attacks is a cover up.
Richard Falk, a former professor of international law emeritus at Princeton University, and an expert on human rights made the comments in a blog post last week, noting that the mainstream media is “unwilling to acknowledge the well-evidenced doubts about the official version of the events: an al Qaeda operation with no foreknowledge by government officials.”
Falk described this version of the 9/11 story as an “apparent cover up” containing “gaps and contradictions”.
The group UN Watch, which describes itself as “an independent Geneva-based watchdog organization”, pounced on the comments, in a letter to UN Secretary-General Ban Ki-moon, calling for Falk to be removed from his post immediately. The group described Falk’s comments as an insult to the victims of the attacks and their families and loved ones.
Ban Ki-Moon responded Monday by publicly condemning Falk’s comments, but added that he was not in a position to fire Falk from the Human Rights Council.
The UN Watch group is closely affiliated with the American Jewish Committee and has been described as “a lobby group with strong ties to Israel”. The group has been after the head of Richard Falk and others like him for years, purely because he and other human rights experts alike continue to criticize and condemn the Israeli government’s treatment of the Palestinian people.
Falk’s appointment to the Human Rights Council, as a monitor on human rights issues relating to the ongoing conflict between Israel and the Palestinian Arabs, hit headlines in 2008 owing to the fact that he has previously slammed the Israeli occupation of Palestine and compared the Zionist government’s treatment of Palestinian Arabs to the Nazi treatment of Jews in the holocaust.
As a result, the Israeli government has routinely denied Falk a visa to enter Israel, Gaza and the West Bank.
This legitimate criticism of the Zionist Israeli government gets boiled down to “Richard Falk believes that Jews are Nazis” in pieces such as this op ed in last Friday’s New York Daily News. This disgusting piece of tabloid trash suggests that Falk and his contemporaries are “apologists for dictatorships”, ironically for criticizing the actions of a vehemently racist government regime.
A d v e r t i s e m e n t
Despite this and the now customary attacks from the Anti-Defamation League, Falk has stood by his criticisms, previously telling the BBC: “If this kind of situation had existed for instance in the manner in which China was dealing with Tibet or the Sudanese government was dealing with Darfur, I think there would be no reluctance to make that comparison.”
Falk’s position on 9/11 has remained constant. Just over two years ago he called for a fresh investigation into 9/11 in order to examine the possible role that neoconservatives may have played in the attacks.
Indeed, two days prior to his appointment to the UN Human Rights Council in March 2008, Falk appeared on former University of Wisconsin lecturer Kevin Barrett’s radio show and spoke of how he was keen to see a fresh investigation into 9/11 in order to address inconsistencies in the official account of what happened.
Mr. Falk told Barrett, “It is possibly true that especially the neoconservatives thought there was a situation in the country and in the world where something had to happen to wake up the American people. Whether they are innocent about the contention that they made that something happen or not, I don’t think we can answer definitively at this point. All we can say is there is a lot of grounds for suspicion, there should be an official investigation of the sort the 9/11 commission did not engage in and that the failure to do these things is cheating the American people and in some sense the people of the world of a greater confidence in what really happened than they presently possess.”
Falk previously penned the preface to Professor David Ray Griffin’s groundbreaking 2004 book The New Pearl Harbor, in which the theologian catalogued scores of unexplained facets surrounding 9/11 and inconsistencies in the official government version of events.
Richard Falk has continually acted as a thorn in the side of the establishment. He has published a number of notable books and essays analyzing the legality of the Vietnam War and other military operations, including the Iraq invasion.
“inescapable that an objective observer would reach the conclusion that this Iraq war is a war of aggression, and as such, that it amounts to a Crime against Peace of the sort for which surviving German leaders were indicted, prosecuted and punished at the Nuremberg trials conducted shortly after the Second World War.”
The UN Human Rights Council has been afforded little opportunity to function in any meaningful way. It has met stiff opposition at every turn from the US Congress and was recently described by the chairman of the House Committee on Foreign Affairs as a “rogues’ gallery” for “pariah states”.
There is a clear worry within the establishment that like Falk, some of the officials within the Human Rights Council are legal experts that recognize war crimes and illegitimate attacks when they see them and are actually attempting to do something about it.
This is one instance where some are attempting to work within and through the establishment left arm of the global elite system to meter out some justice.
In a 2008 interview, Japanese member of Parliament Yukihisa Fujita told the Alex Jones Show that there are numerous individuals within the UN structure that are significantly interested in pursuing the coordination of a new 9/11 investigation in order to address unanswered questions.
However, it remains to be seen whether the Human Rights Council is composed of enough well meaning individuals to have a significant impact, or whether, like much of the rest of the UN, it will merely become a powerless part of the overall establishment control mechanism.
Sirhan Sirhan is taken into custody after the fatal shooting of Sen. Robert F. Kennedy in 1968.
Sirhan Sirhan, convicted of the 1968 assassination of presidential candidate Sen. Robert F. Kennedy, should be freed from prison or granted a new trial based on “formidable evidence” asserting his innocence and “horrendous violations” of his rights, defense attorneys said in federal court papers filed this week.
In a U.S. District Court brief, Sirhan’s lawyers also say that an expert analysis of recently uncovered evidence shows two guns were fired in the assassination and that Sirhan’s revolver was not the gun that shot Kennedy.
Attorneys William F. Pepper and Laurie D. Dusek also allege that fraud was committed in Sirhan’s 1969 trial when the court allowed a substitute bullet to be admitted as evidence for a real bullet removed from Kennedy’s neck.
The attorneys further assert that Sirhan was hypno-programmed to be a diversion for the real assassin and allege that Sirhan would be easily blamed for the assassination because he is an Arab. Sirhan, 67, is a Christian Palestinian born in Jerusalem whose parents brought him and his siblings to America in the 1950s.
Sirhan “was an involuntary participant in the crimes being committed because he was subjected to sophisticated hypno programming and memory implantation techniques which rendered him unable to consciously control his thoughts and actions at the time the crimes were being committed,” court papers said.
The California Attorney General’s office declined to comment Saturday on Sirhan’s court filings, said spokeswoman Lynda Gledhill.
Court papers filed by Sirhan’s attorneys say the state “refuses to acknowledge that hypno programming/mind control is not fiction but reality and has been used for years by the U.S. military, Central Intelligence Agency and other covert organizations.
“Though the practices of hypno programming/mind control is hardly new, the public has been shielded from the darker side of the practice. The average person is unaware that hypnosis can and is used to induct antisocial conduct in humans,” Sirhan’s court filings say.
Pepper and Dusek represented Sirhan earlier this year in his unsuccessful request for parole from Pleasant Valley State Prison in Coalinga, California, 200 miles northwest of downtown Los Angeles. He is serving a life sentence.
Sirhan was convicted of killing Kennedy and wounding five other people during the June 5, 1968, shooting inside the kitchen service pantry of the former Ambassador Hotel in Los Angeles.
CAMP WILLIAMS — Thursday’s groundbreaking for a $1.5 billion National Security Agency data center is being billed as important in the short term for construction jobs and important in the long term for Utah’s reputation as a technology center.
“This will bring 5,000 to 10,000 new jobs during its construction and development phase,” Sen. Orrin Hatch, R-Utah, said on Wednesday. “Once completed, it will support 100 to 200 permanent high-paid employees.”
The U.S. Army Corps of Engineers and National Security Agency host a joint groundbreaking ceremony for the first Intelligence Community Comprehensive National Cyber-security Initiative (CNCI) Data Center Thursday, Jan. 6, 2011, at Camp Williams. Construction of the $1.2 billion Data Center is scheduled to be completed in October 2013.
Officially named the Utah Data Center, the facility’s role in aggregating and verifying dizzying volumes of data for the intelligence community has already earned it the nickname “Spy Center.” Its really long moniker is the Community Comprehensive National Cyber-security Initiative Data Center — the first in the nation’s intelligence community.
A White House document identifies the Comprehensive National Cyber-security Initiative as addressing “one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter.” The document details a number of technology-related countermeasures to the security threat.
Hatch said Utah was chosen for the project over 37 other locations. He characterized the cyber-security center as the “largest military construction project in recent memory.”
Hatch said he promoted Utah’s favorable energy costs, Internet infrastructure, thriving software industry and proximity to the Salt Lake City International Airport in the bid process that ended up with Camp Williams earning the data center.
The Army Corps of Engineers is overseeing the project that is under contract to a joint venture between Big-D Construction in Salt Lake City, U.K.-based Balfour Beatty Construction and DPR Construction out of California.
“This project is going to give an opportunity for an awful lot of Utahns” who have seen construction jobs in Utah drop from 100,000 in 2008 to about 66,000 today, said Rob Moore, president and COO of Big-D and chairman of the Associated General Contractors in Utah. “My subcontractors, suppliers and vendors are very appreciative of the work that will be available on this project.”
Grading work is already under way for the complex, which is scheduled to include 100,000 square feet for the data center and 900,000 square feet for technical support and administrative space. The center is designed to be capable of generating all of its own power through backup electrical generators and will have both fuel and water storage. Construction is designed to achieve environmentally significant LEED Silver certification.
“It is so unique and so intensive,” Hatch said. “This will establish our state as one of the leading states for technology.”
When the pilotless, wing-shaped warplane lifted off a runway at California’s Edwards Air Force Base for the first time on the morning of April 27, it was like the resurrection of the dead. The Boeing Phantom Ray — one of the most advanced drones ever built — came close to never flying at all.
In late 2007, according to company insiders, U.S. military officials ordered Boeing to destroy an earlier version of the Phantom Ray, the X-45C. Exactly why the feds wanted the robotic aircraft dismantled has never been fully explained.
Boeing had just lost out to rival aerospace firm Northrop Grumman in a contest to develop a so-called “Unmanned Combat Air System” for the Navy, capable of taking off from, and landing on, aircraft carriers. That contest, known by its acronym N-UCAS — “N” for “Navy” — was actually the third time in five years Boeing had gone toe-to-toe with Northrop over a government contract to build killer drones, and the second time it had lost.
With each round of competition, Boeing had made enemies.
Even so, the kill order came as a shock to the Chicago-based company. Rare if not unprecedented in the world of military contracting, the command represented the climax of a nearly decade-long drama pitting a rotating field of corporations and government agencies against each other and, bizarrely, even against themselves — all in an effort to develop a controversial, but potentially revolutionary, pilotless jet fighter.
The UCAS development story has all the trappings of a paperback technothriller: secret technology, a brilliant military scientist, scheming businessmen, and the unseen-but-decisive hand of the military’s top brass.
And the story’s not over. The X-45C barely survived the government’s alleged assassination attempt. And after three years of clandestine development, a modified version of the flying-wing ‘bot leaped into the air that day in late April, an event depicted in the video above. The Boeing drone’s first flight opened a new chapter in the ongoing struggle to build a combat-ready, jet-powered robot warplane — and to convince the military to give the new unmanned aircraft a place on the front lines of aerial warfare.
What follows is the Phantom Ray’s secret history, reconstructed from news reports, interviews with government and corporate officials, leaked documents, and a treasure trove of information from Boeing insiders who spoke to Danger Room on condition of anonymity. Officials at Northrop largely declined to answer in-depth questions about their unmanned aircraft’s development.
This isn’t a complete retelling of the competition to build the combat drone. By virtue of its subject and sources, this portrays largely Boeing’s point of view over those of its rivals and customers. And Boeing played just one role, however prominent, in the continuing drama.
With traditional manned fighters growing more expensive — and consequently rarer — by the day, unmanned warplanes are rising to take their place. Boeing isn’t alone in testing pilotless jet fighters. Northrop Grumman, Lockheed, General Atomics, European firm EADS, British BAE Systems and Swedish plane-maker Saab are also working on killer drones. Each company’s UCAS surely has its own secret history.
The future of aerial warfare is more robotic than ever. Boeing’s decade-long struggle to launch the Phantom Ray, and the drone’s ultimate takeoff, is one reason why.
Desert Storm Origins
The X-45 and other UCAS can trace their roots to the first Gulf War. In January and February 1991, a U.S.-led air armada hammered Iraqi positions in occupied Kuwait. In the course of around 100,000 sorties, 42 coalition airplanes were lost to Iraqi air defenses, and 38 aviators died.
An Air Force officer named Mike Leahy was determined to make future aerial assaults safer for pilots — by removing the pilots from the most dangerous missions. Leahy’s ambition was bound to face opposition from the Air Force establishment, symbolized by the white linen scarf worn by World War II aviators, that was determined to keep men behind the yokes of America’s warplanes.
Leahy was an unlikely pioneer. In an Air Force dominated by fighter pilots with perfect eyesight, he was a glasses-wearing, ground-bound engineer — the opposite of a white-scarfer. Leahy started his Air Force career in 1980 in a laser laboratory. He eventually published 50 academic papers and earned four degrees, including a doctorate in engineering. He was, in short, a nerd.
And a revolutionary. In the middle of his career, Leahy’s concentration shifted toward robotics, and in the late 1990s he was temporarily assigned to Defense Advanced Research Projects Agency, the Pentagon’s fringe-science wing, to continue his efforts. There, Leahy led an alphabet’s soup of programs that guided the gradual evolution of combat drones from neat idea to deadly weapon. “The father of the X-45,” is how one Boeing insider described Leahy.
On April 16, 1998, the Air Force and Darpa, under Leahy’s guidance, awarded $4 million contracts to four companies: Boeing, Northrop, Lockheed and Raytheon. Each company had 10 months to come up with a preliminary UCAS design for the “post-2010″ time frame.
Boeing produced the best studies, and in April 1999 the plane-maker was awarded a contract to continue its killer-drone work. It was a so-called “cost-share” contract, with the government ponying up $131 million. Any additional cost, Boeing would have to cover itself, to the tune of at least $300 million over the first six years.
Northrop, meanwhile, beat out Boeing in a parallel contest launched by Darpa and the Navy to produce a killer drone that could take off of, and land on, aircraft carriers. In 2001, Northrop snagged government cash to build several of its X-47A drone prototypes; Boeing said it was looking at ways of “navalizing” the X-45, likely by strengthening the landing gear for hard carrier landings.
The first of two X-45As took off on its inaugural flight on May 22, 2002, reaching an altitude of 7,500 feet and a top speed of around 200 mph. It was a modest flight for an airplane, but “a significant jump” for a combat drone, to borrow one Air Force official’s description.
At a Darpa conference in Anaheim, California, in 2002, Leahy described his strategy for developing pilotless fighters in an Air Force still proudly wearing its figurative white scarf. He directed the drone designers to optimize their robots for destroying enemy air defenses — easily the most dangerous job in all of aerial warfare. “It is a mission that doesn’t directly threaten the white scarf crowd,” Leahy said, “but enables them to better perform their primary mission of air supremacy” — that is, dogfighting.
At that point in the UCAS’ development, Leahy aimed for Boeing to build a dozen or so test drones by 2007, wring them out in a series of tough exercises, then begin manufacturing combat-ready bots around the year 2010, at a unit price lower than the roughly $100 million a typical manned fighter would cost. It was an plan: It’s rare for American warplanes to go from blueprint to flight-line in fewer than 20 years, and even rarer for per-plane price to decrease from one generation of technology to the next.
The Hive Mind
Building the robot planes themselves was relatively easy. Much tougher was writing the software needed to fly the drones. “The operating system is the part that’s hardest to deal with,” Michael Francis, Leahy’s successor, said later. Ideally, killer drones would fly in a choreographed “swarm,” swooping down to overwhelm an enemy’s defenses. But swarm behavior required a fast-reacting blend of navigation, communication, targeting and formation-flying that had never been demonstrated before.
Leahy was aware of the difficulty of pulling off what he called “multi-vehicle, coordinated control,” even using the latest data-links, GPS, sensors and algorithms. But without it, the X-45 would never match human pilots, and would go nowhere. “Demonstration of that capability will culminate in a graduation exercise” for the Boeing drone, Leahy said. He hoped that would occur sometime in 2003.
But the Pentagon had other ideas. In April 2003, before Boeing and Darpa could complete the X-45′s final graduation, the military decided what was good enough for the Air Force should work for the Navy, too. Even in the flush years following 9/11, the idea of two combat drone programs seemed a little excessive for the Pentagon. The two UCAS programs were ordered to combine into one, competitive effort, known as “Joint-UCAS.”
Blending the two initiatives essentially overturned Boeing’s and Darpa’s carefully-laid plans for the X-45. Now Boeing would have to compete again with Northrop. And there was another catch — one that planted a ticking time-bomb inside the Boeing drone team, the J-UCAS program and, arguably, the Pentagon’s entire warplane plan stretching for decades. The military required that Boeing and Northrop jointly develop common drone-control software that would be compatible with the X-45 and the X-47, pictured above.
That seemingly innocuous requirement put Boeing in an awkward position. With unmanned aircraft like the Hunter and the high-flying Global Hawk, Northrop had a proven track record as a drone-maker. Boeing, in contrast, hadn’t built many robotic planes. Their advantage lay in the software, company insiders felt.
With at least a year’s head-start on Northrop, in 2003 Boeing was in possession of a mostly complete control software, while Northrop was not. Working together basically meant Boeing handing over to its biggest rival, for free, what Leahy had described as the most important part of the drone architecture — and, by, extension the foundation of the future’s unmanned air force.
The way the Chicago company handled that awkward edict made a huge splash in the U.S. aerospace industry. The ripples are still spreading.
Strange Bedfellows
At the time of the merger, Boeing believed it was on the way to achieving Leahy’s goal of debuting swarming, combat-capable drones around 2010. The key to this progress was the company’s Distributed Information-Centralized Decision mission-control software. “Dice,” as it’s known inside Boeing, is a software suite that allows human operators on the ground to feed, via radio, mission parameters to drones in the air: Go here, do this, attack that.
Dice’s first big test was already in the works when the Navy and Air Force killer-drone programs merged in 2003. On Aug. 1 the following year, the two X-45As rolled down the runway at Edwards Air Force Base in California. The two drones took to the air and performed a series of preplanned moves, “autonomous[ly] maneuvering to hold their relative positions,” according to the company press release. A full swarm, it wasn’t — but it was the “first ever multiple air vehicle control flight demonstration,” Boeing trumpeted.
Over the next year, Boeing steadily expanded the X-45A’s autonomy and formation-flying skill. An X-45 flying solo had already dropped bombs, back in March 2004. By 2005, Boeing was flying the two X-45s simultaneously with two simulated drones that existed only in Dice’s computer brain, and doing it “over the horizon” — that is, with the drones in California and the ground-based operator sitting at a console in Seattle.
On the drones’ 50th test flight in February 2005, they orbited a simulated battlefield, scanning for “enemy” activity below. Simulated surface-to-air radars flickered on and pretend missiles arced into the sky, all merely impulses inside Dice, following a digital script prepared by Boeing engineers. The drones executed pre-programmed tactics to swoop in and drop mock satellite-guided bombs. It was the long-delayed graduation exercise that Leahy — now promoted out of the UCAS program — had hoped for years earlier.
With growing confidence in its ‘bot design — and, more importantly, in Dice — Boeing began building two larger, more powerful X-45C versions of its killer drone. They would be faster, longer-ranged, fully radar-evading like an F-117 stealth fighter and fitted with probes for in-air refueling.
As the X-45, pictured above with program officials, moved from strength to strength, the X-47 appeared to lag behind. Northrop’s diamond-shaped drone flew for the first time in January 2004, two years after the X-45′s aerial debut. Northrop’s second-generation killer drone, the X-47B, wouldn’t appear until 2007.
But because of the government’s edict that the two drones share a common operating system, Boeing was expected to help Northrop catch up. “Darpa wanted us to give Northrop all our key products,” the Boeing source said. “We felt it was criminal, but the company knew the backlash [from refusing] would have killed us.”
The U.S. military was funding a big chunk of Boeing’s killer drone work. So the sharing edict may seem perfectly reasonable. But since the Chicago company had paid for most of Dice using company funds, it could argue that all the software was proprietary until the J-UCAS program identified a clear, specific need for Boeing to share. “This led to an unusual working relationship,” the source said. “We answered questions,” but if Boeing employees saw Northrop doing something wrong with regards to its own drone, they “couldn’t say anything.”
Northrop declined to comment on the company’s work on the common operating system.
With every bit of knowledge Boeing handed over, Northrop caught up. More and more, the only major differences between the two killer drones were in the airframes themselves, as their control software — based mostly on Boeing’s Dice — converged.
Different Strokes
Though competing for the same contract according to the same requirements and with increasingly similar control systems, the X-45 and X-47 airframes could not have been more different. The X-47 originated with a Navy program; the X-45 was a response to an Air Force need. Each was optimized for its original customer.
So the X-45 was smaller, ostensibly more nimble and stealthier thanks to its thin wing and body. For long-range missions, the X-45 would rely on aerial refueling, rather than carrying lots of gas on its own. The X-47, by contrast, was built tougher to survive the brutal carrier landings. Since the Navy doesn’t have large aerial tankers of its own, to reach distant targets the X-47 had to have big fuel tanks. That increased the thickness of the Northrop drone’s wing and body, compromising its stealth.
In 2011, Navy Capt. Jaime Engdahl, the officer overseeing the X-47B, carefully described the drone as “LO-relevant.” “LO” stands for “low-observable,” or stealthy. Pressed for an explanation of the unwieldy term, Engdahl admitted that the X-47B was not actually radar-evading, per se. Rather, its design could accommodate stealthy enhancements in the future.
The X-45, by contrast, is an inherently stealthy design, Boeing officials insist — especially in its C model, pictured above. “I expect it will beat the others in that department, both heading into and away from a threat radar,” a company source said.
As long as both the Navy and Air Force were in the killer-drone business, jointly sponsoring the UCAS program, each company had reason to hope its design would win out when the two drones went head to head in a planned 2007 fly-off. As long as the two military branches were equal partners, neither bot had a clear advantage based on its origins. In principle, either could eventually be modified to satisfy — however imperfectly — the needs of the Navy and Air Force.
With the common software slowly coming together and no fewer than four war-bots buzzing around hitting test points, in 2005 Darpa decided to hand over the J-UCAS program to full Air Force and Navy control, in order to speed along the process of bringing the robots into front-line service. The transfer had unintended consequences, however, that nearly killed off the program’s original drone.
Cancelled, Once
Just a few months after Darpa bowed out of J-UCAS, the Air Force did, too. After investing a decade and several billion dollars of government money, the flying branch had changed its mind about killer drones — and just as the X-45 was proving itself ready for combat and a second generation of the drones was taking shape. J-UCAS would survive in a different form, as a Navy-only program renamed N-UCAS.
J-UCAS’ abrupt ending came as a shock to Boeing, in particular. Northrop clearly had a leg up in a Navy-only competition. Boeing had reason to fear J-UCAS’ collapse would start a domino effect that could lock the firm out of any major killer drone business for the foreseeable future.
So in March 2006, Dave Koopersmith, then Boeing’s X-45 program manager, and his boss Darryl Davis met with military officials to discuss J-UCAS’ collapse — and figure out if the company still had a future in killer drones.
The men made a powerful team. Koopersmith is tall and lean. Easygoing but inscrutable, he’s earned a reputation for technical savvy, and for being an excellent manager of engineers. Koopersmith knew his killer drones, and their makers, inside and out.
Davis is, in many ways, Koopersmith’s opposite. Small in stature, Davis is a politician and salesman more than an engineer — the kind of guy you can find forging strategic partnerships through a well-played game of golf.
The two were ready to give a pitch for the X-45, covering all possible bases, from the technical to the political. Instead, they just listened as the Air Force explained its rationale for abandoning the killer drone. To hear the Boeing employees tell it, the Air Force killed off J-UCAS to protect its new, ultra-pricey manned fighters, the F-22 and the F-35 Joint Strike Fighter, or JSF.
“The reason that was given was that we were expected to be too good in key areas and that we would have caused disruption to the efforts to ‘keep F-22 but moreover JSF sold,’” the Boeing employee said. “If we had flown and things like survivability had been assessed and Congress had gotten a hold of the data, JSF would have been in trouble.”
In other words, Leahy’s strategy had backfired. The former combat drone champion had hoped that the unmanned aircraft’s improving performance would overcome any opposition by the “white scarf crowd,” determined to preserve a human being’s place inside U.S. warplanes. Instead, the Boeing drone spooked the old guard with its advanced capabilities, provoking what seemed like an emotional, irrational backlash — one that shattered the Air Force-Navy alliance and doomed the Air Force-optimized drone.
Cancelled, Twice
Boeing made an effort to keep the X-45 viable in the Navy-run N-UCAS program, but the company knew the X-47 was the assumed winner. To beat the Northrop drone, Boeing would need to demonstrate superior technical performance and offer a lower price. “The challenger in a title fight rarely wins by decision, they must win via TKO or knock-out,” Koopersmith explained in a letter to his UCAS team.
The Navy required the winning company to launch and land its drone on an aircraft carrier no later than 2013. It’s a harder task than it sounds. Carrier decks are small and crowded by airfield standards, and constantly moving. And the airspace around a flattop teems with helicopters, fighters and resupply planes. Threading a pilot-less aircraft through this aerial tangle represents “a big challenge,” Engdahl said, as does maneuvering the bot around the carrier deck without running into anyone or anything. “Unmanned operations on the carrier: That is the big shift.”
The company prepared what it viewed as a thorough and realistic bid based on what it knew about the difficulties of perfecting drone software. The cost, according to Boeing: $1.2 billion over five years.
The answer came back from the Pentagon on August 3, 2007. It was a gut punch. Northrop had won the UCAS-N contract with a $650-million bid — just over half the price Boeing believed was realistic.
The Boeing engineers weren’t shocked that they lost, but they were shocked how they lost. How could Northrop, with what they strongly believed was inferior software, possibly pull off a robotic carrier landing cheaper than Boeing? The X-45 team was already hurt and suspicious when the Navy allegedly made their final, shocking demand. According to a company insider, the Navy ordered the company to destroy the two X-45Cs then under construction in St. Louis.
In late 2007, Koopersmith and Davis, along with corporate lawyers, went to the Pentagon, looking for an explanation.
“It got very heated,” according to a company source. When asked why the Navy had ordered the destruction of the two Boeing X-45C systems, the answer was that they didn’t “meet the mission requirements or otherwise have usefulness.” Boeing then asked: If that was true, was [Northrop’s] X-47 system developed in the same period going to be destroyed, too? A military lawyer told the Navy official not to answer.
It got worse. Just hours after the meeting, Northrop practically admitted that it had under-bid the contract. Rick Ludwig, Northrop Grumman’s director of business development, told Aviation Week that the company was still negotiating the “funding profiles.” After adding aerial refueling and other capabilities the X-45 already possessed, the cost of the X-47 carrier demonstration could, Ludwig said, rise to $1.2 billion. Exactly the price Boeing had proposed.
At Boeing, there were all kinds of threats about lawsuits in the days afterwards. But the threats never materialized. Northrop, for its part, declined to comment further on the bidding controversy.
Boeing Goes Undercover
After that, Boeing didn’t try to fight the N-UCAS award, despite the huge ramifications for an aerospace company struggling to stay in the warplane design game. To many industry insiders, it appeared Boeing had given up on killer bots, essentially surrendering the future combat drone market.
The X-45As wound up in museums. Ground equipment was placed in storage. The X-45 team disbanded and its members moved to other Boeing programs. For two years following the N-UCAS drama, not a word was heard from Boeing regarding its once record-setting killer drone.
Then in mid-2008, Boeing quietly rebuilt the X-45 team and, in May 2009, surprised everyone by announcing the UCAS’ resurrection, in the form of the bigger, smarter, more powerful X-45C, now called Phantom Ray.
The Navy never followed through on the alleged order to destroy the X-45Cs. In St. Louis, engineers were putting finishing touches on two of the enlarged killer drones. A special Boeing 747, usually used to transport the Space Shuttle, carried the first Phantom Ray on its back from St. Louis to California. First flight was slated for 2010, but some last-minute modifications delayed that to April 27 of this year.
The Dice control system was mostly unchanged. It was revolutionary in 2005, and despite Northrop’s recent advancements, remains some of the best drone-control software in the world.
In an echo of Boeing’s very first UCAS effort in the late 1990s, the revitalized killer drone was entirely company-funded, and not exclusively associated with a single government requirement. Instead of tying itself to the Air Force, Navy or Darpa for development and risk getting burned again, Boeing would refine the Phantom Ray on its own terms and at its own pace.
The approach carried a bit of a stigma; in the Pentagon’s weapons-development community, anything that’s not a military-funded “program of record” runs the risk of being seen as an ugly stepsister. But there were advantages, too. “Since we’re not a government program of record, we’re able to do some things in a rapid fashion,” Davis said. He added that the Phantom Ray would probably compete for the Navy’s follow-on program to N-UCAS and maybe the robot component of the Air Force’s next-generation bomber program.
Koopersmith had unknowingly predicted the Phantom Ray’s resurrection. “You have laid the foundation for the future of Boeing with all of the technology you developed and the aviation firsts you accomplished,” Koopersmith wrote to the drone team in 2007.
The X-45 drama has also laid the foundation of a new approach to warplane development — and to aerial warfare. Stung by the Boeing’s and Northrop’s UCAS spats and other weapons-buying disasters, the Pentagon wants more companies to pay for their own prototypes, rather than relying on the military bureaucracy to lead and fund every effort. That could have the effect of producing better weapons, faster.
With Boeing back in the UCAS game on its own terms – and with Northrop and General Atomics testing their next-generation, jet-powered drones – unmanned aircraft could be in a position to gradually gain the support that Leahy envisioned all those years ago. Drones may finally win a position in the ranks of front-line U.S. warplanes. Air combat may never be the same.
Photos, videos: Boeing, Northrop Grumman, Air Force, Darpa
A lawsuit filed against the U.S. National Security Agency reveals a frightening array of technologies and programs designed to keep tabs on individuals.
.
John St Clair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449)
.
The following document comprises evidence for a lawsuit filed at the U.S. Courthouse in Washington, DC, by John St Clair Akwei against the National Security Agency, Ft George G. Meade, Maryland (Civil Action 92-0449), constitutes his knowledge of the NSA’s structure, national security activities proprietary technologies and covert operations to monitor individual citizens Ed.
1. THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION
Communications Intelligence (COMINT)
Blanket coverage of all electronic communications in the US and the world to ensure national security. The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the early 1960s.
NSA technology is developed and implemented in secret from private corporations, academia and the general public.
Signals Intelligence (SICINT)
The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and track persons with the electrical currents in their bodies. Signals Intelligence is based on fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves.
The NSA/DoD [Department of Defense] developed proprietary advanced digital equipment which can remotely analyze all objects whether manmade or organic, that have electrical activity.
Domestic Intelligence (DOMINT)
The NSA has records on all US citizens. The NSA gathers information on US citizen who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.
Tracking individuals in the US is easily and cost-effectively implemented with NSA’s electronic surveillance network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously . Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track.
NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.
Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA Personnel NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses.
The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen.
NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.
The above symptoms highlight a fraction of the vast array of Neuro-Electromagnetic Frequency Assaults perpetuated by the Police and Military Intelligence Agencies toward Remote Mind Control Experiments, Behavioral Manipulation and Murder.
2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK
As of the early 1960s, the most advanced computers in the world were at the NSA, Ft Meade. Research breakthroughs with these computers were kept for the NSA.
At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the US by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists.
These computers monitor all communications at the transmitting and receiving ends.
This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF (electromagnetic frequency) spectrum.
This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.
Signals Intelligence Remote Computer Tampering The NSA keeps track of all PCs and other computers sold in the US.
This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF (remote frequency) emissions from personal computer circuit boards (while filtering out emissions from monitors and power sup- plies).
The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.
Detecting EMF Fields in Humans for Surveillance A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.
With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours a day.
The NSA can pick out and track anyone in the US.
3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION
NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL).
EMF Brain Stimulation has been in development since the MKULTRA program of the early 1950s, which included neurological research into radiation (non-ionizing EMF) and bioelectric research and development.
The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence“, defined as,
“information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation”.
Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the US Government.
The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.
The NSA has proprietary electronic equipment that analyze electrical activity in humans from a distance. NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously. The NSA records and decode individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for brain-to-computer link (in military fighter aircraft, for example).
For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex, thus allowing audio communications direct to the brain (bypassing the ears). NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.
Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.
NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.
Capabilities of NSA Operatives Using RNM There has been a Signals Intelligence network in the US since the 1940s.
The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control.
Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.
The above is a simple flowchart of Nuero-Electromagnetic Frequency Assaults
showing methods that can be perpetuated by the Police and Military Intelligence Agencies
toward Remote Mind Control Experiments, Behavioural Manipulation and Murder.
4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY
NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields.
The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.
Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave.
Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials”. Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials”. The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.
NSA SIGINT uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).
EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.
Two-way electronic Brain Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes). The images appear as floating 2D screens in the brain.
Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system.
It is used by a limited number of agents in the US Intelligence Community.
The above is a simple flowchart of Nuero-Electromagnetic Frequency Assaults
showing methods that can be perpetuated by the Police and Military Intelligence Agencies toward Remote Mind Control Experiments, Behavioral Manipulation and Murder.
5. [NO HEADING IN ORIGINAL DOCUMENT]
RNM requires decoding the resonance frequency of each specific brain area.
That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. (See Table 1 below)
This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.
The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft Meade.
They used RNM 3D sound direct to the brain to harass the Plaintiff from October 1990 to May 1991.
As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to the authorities about their activities against the Plaintiff in the last 12 years. The Kinnecome group has about 100 persons working 24 hours a day at Ft Meade.
They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated.
This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.
Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country.
A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.
Remote RNM Devices NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous systems to affect their performance. RNM can electronically identify individuals and track them anywhere in the US.
This equipment is on a network and is used for domestic intelligence operations, government security and military base security, and in case of bioelectric warfare.
Spotters and Walk-Bys in Metropolitan Areas Tens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.
Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA’s thousands of subjects in public. NSA agents in remote offices can instantly identify (using~ RNM) any individual spotted in public who is in contact with surveillance subject.
Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines. The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs).
This is an outgrowth of CIA pharmapsychology (psychopharmacology).
Brief Overview of Proprietary US Intelligence/Anti-Terrorist Equipment Mentioned Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country. All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.
Editor’s Note:
I tried ringing Mr Akwei to find out what was the out-come, if any, of his court case. He firmly but kindly told me that he could not speak about anything to do with the case over the phone and hung up. A subsequent conversation of similar length resulted in the information that he did not wish his address or phone number published with this article.
So, if we hear of any developments, we’ll let you know.
Its totally obvious from the above article that the US National Security Agency is none other than a covertly run terrorist organization.
Their highly sophisticated technology that is used to monitor and manipulate the minds of millions of innocent people daily, is a blatant expression of the dominating and authoritarian mentality that exists behind the facade of our so called democratic society.
George Orwell’s “THOUGHT POLICE” is an absolute reality in today’s world.
Whether we realize it or not, every individual within our society is negatively effected by this dictatorship attitude.
It has to change – It will change – It starts with you!
These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept of Justice, etc.) of Public Corruption by named NSA employees.
When no action was taken against the NSA employees, I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications.
The Body Electric: Electromagnetism and the Foundation of Life, by Robert Becker, M.D. Monitoring neuroelectric information in the brain ESB. (p. 265,313,318)
Cross currents, by Robert Becker. Simulating auditory hallucinations. Remote computer tampering using RF emissions from the logic board. (p. 70,78,105,174,210,216,220,242,299,303)
Currents of Death, by Paul Brodeur. Driving brain electrical activity with external EM; magnetophosphenes; Delgado. (p. 27,93)
The Zapping of America, by Paul Brodeur. DoD EM ESB research; simulating auditory hallucinations.
Of Mice, Men and Molecules, by John H. Heller 1963 Bioelectricity; probing the brain with EM waves. (p, 110)
The Three-Pound Universe, by Judith Hooper. CIA EEG research; EEGs for surveillance. (p.29,132,137)
In the Palaces of Memory, by George Johnson. EM emissions from the brain; the brain as an open electromagnetic circuit.
The Puzzle Palace, by James Bamford. Signals Intelligence; most advanced computers in the early ‘sixties.
The US Intelligence Community. Glossary terms at National Security Archives; Radiation Intelligence (information from unintentionally emanated electromagnetic energy, excluding radioactive sources).
Secret Agenda, by Jim Hougan. National security cult groups.
Crimes of the Intelligence Community, by Morton Halperin. Surreptitious entries; intelligence agents running operations against government workers.
War in the Age of Intelligent Machines, NSA computer supremacy, complete control of information.
Alternate Computers, by Time-Life Books. Molecule computers.
The Mind, by Richard Restak, M.D. EEG Systems inc.; decoding brain EM emanations, tracking thoughts on a computer. (p. 258)
MedTech, by Lawrence Galton. Triggering events in the brain, direct to auditory cortex signals.
Cyborg, by D.S. Halacy, Jr, 1965. Brain-to-computer link research contracts given out by the US government.
Psychiatry and the CIA: Victims of Mind Control, by Harvey M. Weinstein M.D. Dr. Cameron; psychic driving; ultraconceptual communications.
Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, Intelligence R&D; Delgado; psychic driving with radio telemetry. (p. 127,276,116,168,169)
Mind Manipulators, by Alan Scheflin and Edward M. Opton. MKULTRA brain research for information-gathering.
The Brain Changers, by Maya Pines. Listening to brain EM emissions. (p.19)
Modern Bioelectricity. Inducing audio in the brain with EM waves; DoD cover-up; EM wave ESB; remote EEGs
Magnetic Stimulation in Clinical Neurophysiology, by Sudhansu Chokroverty. Magnetophosphenes; images direct to the visual cortex.
The Mind of Man, by Nigel Calder. US intelligence brain research.
Neuroelectric Society Conference, 1971. Audio direct to the brain with EM waves; 2-way remote EEGs.
Brain Control, by Elliot S. Valenstein. ESB., control of individuals.
Towards Century 21, by C.S. Wallia. Brain Stimulation for direct-to-brain communications (p21)
Mind Wars, by Ron McRae (associate of Jack Anderson). Research into brain-to-brain electronic communications., remote neural EM detection (PP. 62 106, 136).
Mind Tools, by Rudy Rucker. Brain tapping; communications with varying biomagnetic fields (p82).
US News and World report, January 2nd 1984. EM wave brain stimulation; intelligence community hi-tech (p38).
Ear Magazine. Article on extremely low frequencies radio emissions in the natural environment; radio emissions from the human body.
City Paper, Washington DC January 17, 1992. Article FCC and NSA “complete radio spectrum” listening posts.
Frontiers in Science, by Edward Hutchings Jr 1958 (p48).
Beyond Bio Feedback, by Elmer and Alyce Green, 1977 (p118)
The Body Quantum, by Fred Alan Wolf
Cloning; A Biologist Reports, by Robert Gillmore McKinnell. Ethical review of cloning humans.
Hoovers’ FBI, by Former agent William Turner. Routines of electronic surveillance work. (p280).
July 20th 2019, by Arthur C. Clarke LIDA; Neurophonics; Brain-computer link.
MegaBrain, by Michael Hutchison. Brain stimulation with EM waves; CIA research and information control. (pp.107,108,117,120,123).
The Cult of Information, by Theodore Rosnak, 1986. NSA Directive #145; personal files in computers; computer automated telephone tapping.
The Body Shop, 1986 implantation of an electrode array on the visual cortex for video direct to the brain; other 1960′s research into electronically triggering Phosphenes in the brain, thus bypassing the eyes.
Evoked Potentials, by David Regan. Decoding neuroelectric information in the brain.
Following up on my story on the FBI’s computer-monitoring malware, the most interesting question unanswered in the FBI affidavit (.pdf) is how the bureau gets its “Computer and Internet Protocol Address Verifier” onto a target PC.
In the Josh Glazebrook case, the FBI sent its program specifically to Glazebrook’s then-anonymous MySpace profile, Timberlinebombinfo. The attack is described this way:
The CIPAV will be deployed through an electronic messaging program from an account controlled by the FBI. The computers sending and receiving the CIPAV data will be machines controlled by the FBI. The electronic message deploying the CIPAV will only be directed to the administrator(s) of the “Timberinebombinfo” account.
It’s possible that the FBI used social engineering to trick Glazebrook into downloading and executing the malicious code by hand — but given the teen’s hacker proclivities, it seems unlikely he’d fall for a ruse like that. More likely the FBI used a software vulnerability, either a published one that Glazebrook hadn’t patched against, or one that only the FBI knows.
MySpace has an internal instant messaging system, and a web-based stored messaging system. (Contrary to one report, MySpace doesn’t offer e-mail, so we can rule out an executable attachment.) Since there’s no evidence the CIPAV was crafted specifically to target MySpace, my money is on a browser or plug-in hole, activated through the web-based stored messaging system, which allows one MySpace user to send a message to another’s inbox. The message can include HTML and embedded image tags.
There are several such holes to choose from. There’s an old hole — patched early last year — in the way Windows renders WMF (Windows Metafile) images. Cyber crooks are still using it to install keyloggers, adware and spyware on vulnerable machines. Last year it even popped up in an attack on MySpace users delivered through an ad banner.
Roger Thompson, CTO of security vendor Exploit Prevention Labs, says he’d bet on the fresher Windows animated cursor vulnerability, which was discovered being exploited by Chinese hackers last March, “and was quickly picked up by all the blackhats everywhere,” he says.
For a couple weeks, there wasn’t even a patch available for the animated cursor hole — in April, Microsoft rushed one out. But, of course, not everybody jumps on every Windows security update, and this hole remains one of the most popular browser bugs among black hats today, he says.
There are also holes in Apple’s QuickTime browser plug-in — fixing it means downloading and reinstalling QuickTime. Like the animated cursor hole, some of the QuickTime vulns allow an attacker to gain complete control of a machine remotely. “They might have embedded something in a QuickTime movie or something,” says Thompson.
If you have any theories, let me know. (If you know something for certain, there’s THREAT LEVEL’s secure feedback form) .
Update:
Greg Shipley, CTO of security consultancy Neohapsis, says it’s no surprise that anti-virus software didn’t protect Glazebrook (assuming he even ran any). Without a sample of the FBI’s code from which to build a signature, AV software would have a tough time spotting it.
Some of the more “heuristic” techniques that profile application behavior might flag it … maybe. However, IMO one of the most basic signs of good Windows Trojan design is an awareness of installed packages and default browsers, both alluded to in the text. If the trojan is browser-aware (and in turn, potentially proxy-aware) and HTTP is used as the transport protocol, heh, you’re pretty fscked. That’s the makings of a great covert-communications channel, and one that will do quite nicely in 99.9% of the environments out there …
In short, stock AV probably isn’t gonna flag this thing unless they got a copy of it and built a sig, neither of which is likely.
Last Thursday, the House Judiciary Committee held a hearing focused on law enforcement surveillance of modern Internet services.
Although both the New York Times and CNET have stories on the hearing, I don’t think either publication covered the important details (nor did they take the time to extract and post video clips).
CALEA Hearing: Rep. Johnson asks about the impact of encryption backdoors
Re: Encryption, Warrants And The FBI
CALEA Hearing: FBI GC praises Gmail encryption, still wants users’s private data
Re: Encryption, Warrants And The FBI
FBI GC: Most criminals are dumb and won’t use crypto
~Dreams are like stars…you may never touch them, but if you follow them they will lead you to your destiny.~
Re: Encryption, Warrants And The FBI
What happens next?
Last week’s hearing was just the first step in what will likely be a long battle. There will be more hearings, and eventually, the FBI will return with draft legislation. In the mean time, all the major tech companies in Silicon Valley will no doubt continue to engage in private, high-pressure negotiations with senior FBI officials who will tell them they can avoid new legislation by voluntarily building new surveillance capabilities into their products.
~Dreams are like stars…you may never touch them, but if you follow them they will lead you to your destiny.~
Re: Encryption, Warrants And The FBI
If they can shut down bank accounts for folks who have not even been charged with a crime, any thinking person can see where this is all leading.
~Dreams are like stars…you may never touch them, but if you follow them they will lead you to your destiny.~
In its unending effort to find more technologically innovative ways to accomplish things most of the government agencies that are its clients can’t do at all, DARPA called a conference this week to ask for help security military and government networks against hackers.
Who did it invite?
Hackers.
Not, fortunately, the divisions of Chinese military hackers who have been digitally marching one by one through military and government installations with impunity for anywhere from five to ten years.
“DARPA seeks the elite of the cyber community—visionary hackers, academics and professionals from small and large businesses—to change the dynamic of cyber defense,” the invitation read.
U.S. government and military networks are built on the same model as the Internet – with redundant pathways, little restriction or ablity to identify the source of traffic and quick acceptance of new sources of identical data. The Internet was built to recover from holes blown in it by nuclear bombs, not to secure one portion against unauthorized access without impeding anything else running across it, DARPA director Regina Dugan told the crowd.
To solve a cyber-security problem the General Accountability Office reported had been so low on the Dept. of Defense’s agenda during the past 21 years that the DoD had no coherent central policy, procedures or even identified leaders in the process of stopping the leak of information from its servers and those of its defense contractors.
Did DARPA get the fresh ideas and offers of help it was hoping for when it put the colloquium together?
Will the $208 million it is asking that Congress give it for cybersecurity research next year do any good?
Probably. You can’t wave that much cheese around – while promising it will continue to grow – without getting a few rodents sniffing after it.
It also reported most of the “hackers” in the room wore nametags from existing defense companies, or academic institutions already funded by DARPA.
It may have been difficult for hackers who are outside the defense-industry clique to even have heard about the conference, let alone gotten themselves an invite without cracking the server holding the guest list and adding their own names.
It doesn’t sound like this one conference broke much ice, but it does show DARPA and the DoD at least know what the problems are and that they’re going outside their comfort zone to find solutions.
It’s not surprising that DARPA would recruit from the counterculture for technical skills it needs.
It is surprising that the super-secret, super-conservative National Security Agency would, let alone the U.S. Cyber Command – the recently minted wing of the U.S. military charged with securing the U.S. against Cyber attack would do so. The DoD, at least, has a very heavy bias toward those already in uniform or contractors working for established defense suppliers.
That’s rare for a DoD security guy; it’s unheard of for one from the NSA.
It, and the DARPA conference, could be real-world indications the two are changing the way they think about, react to and build security systems and expectations online.
By coming out in public with so unguarded a request for help, DARPA and the DoD are doing more than just recruiting hackers.
They’re doing the political prep work to raise the issue in the public eye and fertilize the political ground so any seeds they manage to plant with lawmakers have a better chance to grow.
It’s not, strictly speaking, security work, which tends to be done most often in the shadows, where both tactics and weaknesses can be better hidden.
It is the way change is begun in Washington. Slowly, with lots of talk, lots of bluster, lots and lots of fertilizer and, according to Wired’s rundown of the DARPA conference’s menu, “bowls of M&Ms and blueberry-infused lemonade.”
There’s a tool for everything. Sometimes it’s a hacker and, I guess, sometimes it’s lemonade with blueberries.
The Nubian Sandstone Aquifer System (NSAS) is the world´s largest ‘fossil’ water aquifer system meaning that the water is ancient and non-renewable, much like the mineral resources on which countries rely for their prosperity. Lying beneath the four African countries of Chad, Egypt, Libyan Arab Jamahiriya (Libya), and Sudan, it covers some two million square kilometers. Groundwater has been identified as the biggest future source of water to meet growing demands and development goals in each country. But can the NSAS meet such demand? Over-abstraction has already started, at times leading to desertification. Other major human pressures include agricultural irrigation and climate change.
For many years, the IAEA has been working with NSAS countries through national, and regional projects to try and understand the complexities of the aquifer. However, there remains a gap in understanding how the NSAS works. Improving the information base is thus the key first step. In response, the ‘IAEA/UNDP/GEF Nubian Project’ is ground-breaking, cutting-edge and challenging. Most likely, it´s also a new frontier for the world. Project partners include UNDP/GEF, IAEA, UNESCO and the four NSAS countries. Its long-term goal is to establish a rational and equitable management of the NSAS for sustainable socio-economic development and the protection of biodiversity and land resources.
Judge Patrick J. FiedlerThose raw milk proponents advocating “teach, teach, teach” may want to enroll Wisconsin Judge Patrick J. Fiedler in their first class–in the kindergarten section.
In response to a request from the Farm-to-Consumer Legal Defense Fund, the judge issued a clarification of his decision last week regarding his assessment of the constitutionality of food rights. The judge expanded on his original statement that such constitutional issues are “wholly without merit.”
He explained that the FTCLDF arguments were “extremely underdeveloped.” As an example, he said the plaintiffs’ use of the Roe v Wade abortion rights case as a precedent does “not explain why a woman’s right to have an abortion translates to a right to consume unpasteurized milk…This court is unwilling to declare that there is a fundamental right to consume the food of one’s choice without first being presented with significantly more developed arguments on both sides of the issue.” Gee, I thought they both had to do with the right to decide what to do with your own body.
As if to show how pissed he was at being questioned, he said his decision translates further that “no, Plaintiffs do not have a fundamental right to own and use a dairy cow or a dairy herd;
“no, Plaintiffs do not have a fundamental right to consume the milk from their own cow;”
And in a kind of exclamation point, he added this to his list of no-nos: “no, Plaintiffs do not have a fundamental right to produce and consume the foods of their choice…”
You have to wonder if maybe even the regulators are getting a tad uncomfortable with the rulings coming from the nation’s judiciary on food rights. Many of these individuals, biased as they are against raw milk, dabble in farming to some extent, or grew up on farms. This judge has gone way beyond what many of them have come to assume–that everyone has the right to own a cow and consume its milk Even in places that ban raw milk sales, there’s nearly always a provision in state law that anyone who owns a cow has the right to consume its milk.
It seems Judge Fiedler is saying it’s not a “fundamental right,” but rather a right granted us by the state.
According to the judge’s interpretation of Wisconsin law under the original decision, only “a license holder” or an individual “who has a bona fide ownership interest in the milk producer” can make milk available. The judge added in this new interpretation: “Finally, it is clear from their motion to clarify that the Plaintiffs still fail to recognize that they are not merely attempting to enforce their ‘right’ to own a cow and board it at a farm. Instead, Plaintiffs operate a dairy farm (Emphasis added). As this court already said in its decision and order, if Plaintiffs want to continue to operate their dairy farm then they must do so in a way that complies with the laws of Wisconsin.”
Is it safe to say that under the judge’s interpretation, anyone who owns a cow operates a dairy farm? I don’t think I want the judge’s answer to that question. If you live in Wisconsin, it seems you have only one remaining choice, a highly personal choice, if you truly do believe you have certain “fundamental rights.”
***
At long last, a major media outlet is giving credence to European studies suggesting that raw milk reduces the incidence of asthma and allergies in children. (This is a followup study indicating that it’s a protein killed in pasteurization that provides the allergies/asthma protection.) Yes. Fox News plays up all the warnings about raw milk’s dangers, but discerning consumers will get the message. If the scientific research says it’s good, and the FDA and CDC say it’s bad, well, it must be good.
When you use the Internet, you entrust your online conversations, thoughts, experiences, locations, photos, and more to companies like Google, Yahoo and Facebook. But what happens when the government asks these companies to hand over your private information? Will the company stand with you? Will it tell you that the government is looking for your data so that you can take steps to protect yourself?
It’s often up to the companies to decide whether to stand with their users.
While some Internet companies have stepped up for users in particular situations, it’s time for all companies who hold your private data to promise to do so. Sign our petition to urge leading Internet companies to:
Promise to inform users when their data is sought by the government
Internet companies should promise to tell users when their data is being sought by the government and give users a chance to defend themselves, unless prohibited by law — like Twitter promises to do and did in the Wikileaks investigation.
Be transparent about when you hand over data to the government
Companies should publish reports on how often they provide user data to governments worldwide, like Google does. These reports should include all demands that can be disclosed under the law. Companies should also make public the policies they have about sharing data with the government such as guides for law enforcement, like Twitter does.
Fight for users’ privacy rights in the courts and in Congress
Companies should resist overbroad demands, like Yahoo did recently, and should disclose no more information than required by law. Internet companies should support efforts to modernize electronic privacy laws to defend users in the digital age, like the Digital Due Process Coalition members do.
Users shouldn’t be left in the dark. They have a right to know when the government is seeking their data and deserve a chance to stand up for themselves. But they can’t do it unless companies are willing to make a commitment take a stand with them. As stewards of our digital lives, companies need to promise to be transparent and help users fight for stronger, clearer protections and standards in the law.
On June 8, 2011 the following unfortunate arrest took place in Canton, OH. Notifying the policy when you have a firearm is required by Ohio Law, but when this individual with a thirty-day old license tries to do that he is repeatedly ordered to look away, shut up, or interrupted and “forced” to change what he is speaking about by the actions of an aggressive cop who maintains verbal control of the situation. A two man car dealing with three people put itself at risk when one officer started what appears to be an illegal search of the rear of the car without extracting or securing the driver – which would have given him an opportunity to notify. What follows is horrific example of a police officer losing all self-control, threatening to beat the female, threatening to beat the driver and eventually saying he should have executed him “and wouldn’t have lost any sleep over it” that night.” – Ohio. Submitted by http://www.facebook.com/thugmidget
In the days before last week’s Patriot Act reauthorization vote, members of the Senate Intelligence Committee raised concerns — see here and here — about the way that the Justice Department has interpreted and used the Patriot Act’s Section 215, which is perhaps the most controversial of the provisions that Congress reauthorized. “When the American people find out how their government has secretly interpreted the Patriot Act,” Colorado Senator Mark Udall said, “they will be stunned and they will be angry.”
Today we filed a Freedom of Information Act (FOIA) request demanding that the Justice Department release information about the government’s use and interpretation of Section 215. We anticipate litigating the request. Those of you who have followed the Patriot Act debate since 2001 will know that this isn’t the first time we’ve sought information about the government’s use of this provision. Back in 2002, we filed litigation under the Freedom of Information Act that eventually resulted in the release of a few hundred documents — including this, this, and this. But now the FBI is using Section 215 much more aggressively. It’s using it more often. And statements by Obama administration officials raise the distinctpossibility that the government is using the provision to support entire surveillance programs.
The secrecy surrounding the government’s use of new surveillance powers is unwarranted and fundamentally antidemocratic. The public should know, at least in general terms, how the government interprets its surveillance authority and how that authority is being used. It’s shameful that Congress didn’t insist that the Obama administration release this information before the reauthorization vote. We’ll ask the courts to do what Congress failed to.
Italy’s CIA crackdownWhy would U.S. ally Italy convict 22 CIA operatives for nabbing a Muslim cleric off the streets of Milan?
November 5, 2009 theweek.com
An Italian court sentenced 22 CIA operatives, including former Milan station chief Robert Lady, and one U.S. Air Force colonel in absentia for the 2003 abduction of Muslim cleric Hassan Moustafa Osama Nasr (or Abu Omar) in Milan. Nasr was flown to Egypt, where he claims he was tortured. Why would Italy, a U.S. ally, threaten to jail CIA agents for nabbing a suspected terrorist?
Italy is laying down the law: Why did the CIA use “extraordinary rendition” in an allied nation like Italy? asks Annie Lowrey in Foreign Policy. The “somewhat queasy” answer is: because it could. “At the time, the CIA operated in extralegal channels with impunity.” But times have changed, and the Italian court is “ensuring the CIA knows there’s no impunity now.”
“Italian court convicts CIA agents in absentia”
No impunity for Americans—but for Italians? The Italian prosecutor certainly spun this as a victory for “Italian laws,” says Kevin Drum in Mother Jones. But then why did three high-ranking Italians implicated in the case get off scot-free? Count me unimpressed. “Convicting a bunch of foreigners is easy. It’s holding your own people to account that’s hard.”
“Italy’s rendition trial”
The CIA gets off easy, too: The verdict is also “where the damage ends for the CIA,” says Jeff Stein in Foreign Policy. None of the agents are likely to see the inside of an Italian jail cell—although, with European arrest warrants out for their arrest, they “can forget about spending the summer in Provence.” But the last laugh may go to Nasr: for compensation, he could be awarded the “title to an Italian country house that Lady bought for retirement.”
“Rendered guilty”
Ex-CIA spy admits to kidnapping Muslim cleric
July 1, 2009
Former US CIA agent Robert Seldon Lady has confessed to his role in the abduction of a Muslim Egyptian cleric for questioning.In an interview with the Italian Il Giornalenewspaper, the former CIA operative admitted to his involvement in the 2003 kidnapping of Egyptian cleric Osama Moustafa Hassan Nasr known as Abu Omar under the suspicion that he had links to ‘terror’ groups.The former US spy said that Abu Omar was temporarily held in US bases in Italy and Germany before being transferred to Egypt for interrogation.
He acknowledged that Abu Omar had been tortured as part of CIA’s ‘rendition program’ in Egypt before being released.
The CIA launched the scheme in the aftermath of 9/11 in a bid to arrest dissidents viewed by the US as ‘terrorists.’
In his telephone interview from an undisclosed location, however, the former agent pleaded not guilty for the operation, which has prompted an Italian court to press charges against him in absentia.
“I am not guilty. I am only responsible for following an order I received from my superiors,” Lady said. “It was not a criminal act. It was a state affair.”
However, the ex-CIA operative conceded to having committed illegal acts, “I have worked in intelligence for 25 years, and almost none of my activities in these 25 years were legal in the country in which I was carrying them out,” Il Giornale quoted him as saying.
Lady and 25 of his accomplices are now being prosecuted in Milan for their role in the abduction of Abu Omar.
The prosecution of a US spy is an unprecedented incident as no previous trials involving an American secret agent have been held before.
The CIA has not commented on the latest development in the case.
McChrystal was Cheney’s chief assassin May 15, 2009
presstv.ir
Lieutenant General Stanley McChrystal and Dick Cheney
Seymour Hersh says that Dick Cheney headed a secret assassination wing and the head of the wing has just been named as the new commander in Afghanistan.
In an interview with GulfNews on May 12, 2009 Pulitzer prize-winning American investigative journalist, Seymour Hersh, said that there is a special unit called the Joint Special Operations Command (JSOC) that does high-value targeting of men that are known to be involved in anti-American activities, or are believed to be planning such activities.
According to Hersh, the Joint Special Operations Command (JSOC) was headed by former US vice president Dick Cheney and the former head of JSOC, Lieutenant General Stanley McChrystal who has just been named the new commander in charge of the war in Afghanistan.
McChrystal, a West Pointer who became a Green Beret not long after graduation, following a stint as a platoon leader in the 82nd Airborne Division, is currently director of Staff at the Pentagon, the executive to Joint staff to the Joint Chiefs of Staff.
Most of what General McChrystal has done over a 33-year career remains classified, including service between 2003 and 2008 as commander of the Joint Special Operations Command, an elite unit so clandestine that the Pentagon for years refused to acknowledge its existence.
On July 22, 2006, Human Rights Watch issued a report titled “No blood, no foul” about American torture practices at three facilities in Iraq. One of them was Camp Nama, which was operated by the Joint Special Operations Command (JSOC), under the direction of then Major General Stanley McChrystal.
McChrystal was officially based at Fort Bragg in North Carolina, but he was a frequent visitor to Camp Nama and other Special Forces bases in Iraq and Afghanistan where forces under his command were based.
An interrogator at Camp Nama known as Jeff described locking prisoners in shipping containers for 24 hours at a time in extreme heat; exposing them to extreme cold with periodic soaking in cold water; bombardment with bright lights and loud music; sleep deprivation; and severe beatings.
When he and other interrogators went to the colonel in charge and expressed concern that this kind of treatment was not legal, and that they might be investigated by the military’s Criminal Investigation Division or the International Committee of the Red Cross, the colonel told them he had “this directly from General McChrystal and the Pentagon that there’s no way that the Red Cross could get in.”
In the July 2, 2006 report, When Human Rights Watch asked whether the interrogator knew whether the colonel was receiving orders or pressures to use the abusive tactics, Jeff said that his understanding was that there was some form of pressure to use aggressive techniques coming from higher up the chain of command; however neither he nor other interrogators were briefed on the particular source.
“We really didn’t know too much about it. We knew that we were only like a few steps away in the chain of command from the Pentagon, but it was a little unclear, especially to the interrogators who weren’t really part of that task force.”
The interrogator said that he did see Gen. Stanley McChrystal, commander of US Joint Special Operations forces in Iraq, visiting the Nama facility on several occasions. “I saw him a couple of times. I know what he looks like.”
The International Committee of the Red Cross (ICRC) is the international body charged under international law with monitoring compliance with the Geneva Conventions, and it, therefore, has the right to inspect all facilities where people are detained in a country that is at war or under military occupation.
To hide prisoners or facilities from the ICRC or to deny access to them is a serious war crime. But many US prisons in Iraq have held “ghost” prisoners whose imprisonment has not been reported to the ICRC, and these “ghosts” have usually been precisely the ones subjected to the worst torture. Camp Nama, run by McChrystal’s JSOC, was an entire “ghost” facility.
The decision by Obama’s administration to appoint General McChrystal as the new commander in charge of the war in Afghanistan and retaining the military commission for the US war-on-terror detainees held in the Guantanamo Bay prison are the latest examples of the new US administration walking in Bush’s foot steps with regards to torture and denial of habeas corpus.
In the Exhibit – B – picture above you can see the same barefoot and blindfolded hostage from Exhibit – A – being interrogated by an American. Look at the hostage being interrogated in Exhibit – B -, see the sleeve of his right arm with blood stains on it? Now look at Exhibit – A – again, do you see any blood stains on the sleeve of the hostage?
The United States government says the American interrigator “Jack Idema” in Exhibit – B – does not work for or represent the United States of America. Then who in the hell do the United States Soldiers in Exhibit – A – taking the man hostage work for? Bull Crap after Bull Crap from the United States Government.
EXHIBIT – (D) Click here
This is another example of a secret prison and a Interrogation room being operated by The United States Armed Forces. Exhibit (C) and (D) Pictures are very disturbing because it is obvious that that the thick blood stains on the wall are human brains. Look at the corner wall, do you see how there is thick blood stains and thick human tissues in the corner of the wall? The hostages were probably hanged in that corner, while the CIA and Zionist Mossad mercenaries were torturing and murdering the hostages. I can only assume that the CIA and Mossad mercenaries paint the walls often and they have the floors covered.
_______________________
The pictures above is Nicholas Berg sitting on a white plastic chair for interrogation just before his execution in Iraq. Look at the color of the wall in the background.
The picture above are U.S. soldiers torturing hostages in Iraq (Abu Ghraib Prison). Look at the color of the walls, and look at the the top of the picture off center to the right, there is a white plastic chair.
The pictures above was taken at Abu Ghraib Prison in Iraq. Look at the color of the walls.
The pictures above are U.S. soldiers sitting on white plastic chairs in Iraq (Abu Ghraib Prison). You do the math.
The picture above is Nicholas Berg being executed. Common sense says he was murdered at Abu Ghraib Prison in Iraq.
_____________________
From a Yahoo message board…
Word is spreading around Kodak Park here in Rochester NY. And will break on national News tonite that Kodak film experts have analyzed the Nick Berg video and some of the Abu Grhaib Prison videos comparing them for certain encrypted recording signatures.
Each video camera leaves a certain signature mark, much like a fingerprint or striation markings on bullets in gun barrels. Same goes for CD-ROM Burners, they leave a trace or type of Cookies on the finished product.
These are tested by computer and not visible by the naked eye. Experts here after lunch have concluded that one of the 2 video cameras used in the Nick Berg “beheading” was also used to film US troop abuses of Iraqi detainees.
THIS is BAD news for BushCorp., Military, and CIA.
REPORT: KODAK EXPERTS SAY BEHEADING AND TORTURE VIDEO TAKEN WITH SAME CAMERA!
Posted on Tuesday, May 25 @ 14:04:52 EDT by Hal_Turner
THE HAL TURNER SHOW HAS RECEIVED A REPORT WHICH SAYS THE NICHOLAS BERG BEHEADING VIDEO WAS TAKEN WITH THE SAME DIGITAL CAMERA AS THE ABU GHRAIB PRISON TORTURE VIDEOS!
Apparently, digital camera manufacturers install a “digital watermark” on each digital imaging device, which is as unique as a fingerprint. Experts have reportedly analyzed the videos and compared the digital watermarks and determined that the same imging device took the Nicholas Berg beheading video and the Prison torture videos!
The exact text of the report is as follows:
Today new pictures were released of prison torture at Abu Ghraib prison.
But not just still pictures. Today video was released showing prisoners being tortured by Americans.
Aparently Kodak film experts at Kodak Park in Rochester New York have compared the digital watermarks of the torture video and the beheading video and have determined that one of the cameras used in the Nick Berg beheading is THE SAME CAMERA that took the prison torture video.
The US Defence Secretary Robert Gates has blocked the publication of further images of US soldiers abusing foreign detainees.
The US administration filed a request with the Supreme Court late on Friday preventing the release of the photos.
The order refers to some 40 images, including some of prisoners being abused in Afghanistan and Iraq.
Last month, Congress gave Mr Gates new powers to prevent their release under a law signed by the US president.
A Pentagon spokesman said that the order covers images related to investigations into allegations of abuse carried out outside the US between 11 September 2001 and 22 January 2009.
Accountability
He suggested that releasing the pictures would put US soldiers at risk.
“Public disclosure of these photographs would endanger citizens of the US, members of the US armed forces, or employees of the US government deployed outside the US,” Mr Gates said in the order filed with the court.
The American Civil Liberties Union (ACLU) had sued for the release of 21 of the images.
The group says it will continue to press for the release of the images, arguing they represent “an important part of the historical record”.
“They are critical to the ongoing national conversation about accountability for torture,” ACLU’s director Jameel Jaffer said.
Initially, Mr Obama had suggested that he would not attempt to block the release of the photographs but he reversed this decision in May.
He said then that the release of such images would be “of no benefit” and might inflame opinion against the US.
CIA death squads ‘copied Mossad’ July 15, 2009
presstv.ir
Former US officials claim CIA was to hire assassination teams modeled after the Israeli intelligence agency Mossad’s targeted killing specialist squads.
On Tuesday, Newsweek quoted some former senior officials as saying that in the aftermath of the September 11, 2001 attacks, the former administration approached the Central Intelligence Agency to form the teams.
The officials, requesting anonymity due to the sensitivity of the issue, said the White House broached the issue with CIA’s espionage wing, the Directorate of Operations.
The program was recently exposed by the agency’s director Leon Panetta, who claimed that he had stopped it last month upon hearing about it.
On Monday, The Wall Street Journal quoted intelligence sources as saying that the program also included capturing or killing al-Qaeda operatives.
“There was some initial involvement by the CIA in this program early on and it was described to me by US intelligence officials as a modern-day Phoenix program that was during the Vietnam War. The CIA and US military special forces cooperated to assassinate (the National Liberation Front of South Vietnam) Viet Cong leaders,” investigative journalist Wayne Madsen told Russia Today earlier on Wednesday.
The Israeli model for the brigades were Mossad’s infamous ‘Wrath Of God’ teams who employed themselves in taking down the suspects for the killing of Israeli athletes during the 1972 Munich Olympics. The summer event witnessed the capture and murder of the members of the Israeli Olympic team.
Accusing Palestinians of committing the murders, the Mossad men trawled through Europe for suspects, killing an innocent Moroccan man by mistake in one surge.
Pete Hoekstra on the House Intelligence Committee claims little money was spent on the project that allegedly never became fully operational.
Newsweek concluded that the plans, however, never completely hit cold storage and continued to be refurbished so the president can use them when necessary.
______________________
‘US planted Taliban in Pakistan’ June 17, 2009
presstv.ir
The US has interfered in Afghanistan since 1960s and increased its role in 1980s after the former Soviet Union invaded the country in 1979, a Pakistani journalist says.
“The US will pursue its plans for Afghanistan with the help of Taliban and al-Qaeda until 2012 in order to achieve its objectives against interests of China and Iran. The US will unveil its [ultimate] plans only when it achieves its objectives,” Jang Daily’s Javid Rashid told IRIB.
He claimed that the US and Pakistan would continue their cooperation in Afghanistan in the future. “I see Afghanistan’s future as very dim.”
According to Rashid, the US and the Pakistani army jointly organized pro-Taliban militants in Pakistan because they want Pakistan under the current government to retain its chaotic situation.
“As they have introduced al-Qaeda as an emblem of terror in the Muslim world, they have also established Taliban in an effort to weaken Pakistan,” Rashid noted.
________________________
Taliban defectors: US, Israel funding militants
June 19, 2009
presstv.irTwo militants’ leaders who defected from notorious Taliban chief in Pakistan have revealed that their comrade was pursuing a US-Israeli agenda across the country.A prominent militant leader, Turkistan Bittani, who broke away from Baitullah Mehsud, called him “an American agent”.
Mehsud, a warlord in his late 30s, has claimed responsibility for dozens of devastating string attacks on both civilians and security forces throughout the feared region.
Moreover, Baetani emphasized that Mehsud was being funded by US and Israeli intelligence services for brainwashing innocent youths.
The insurgents’ chief has recruited several teenagers who have carried out dozens of suicide attacks on Pakistani mosques and educational institutes over some past months.
Baetani also noted that al-Qaeda and Taliban’s leadership was never targeted in the dozens of US drone strikes in the country’s troubled north-west region.
Another defector, Qari Zainuddin, said that Mehsud had established strong links with Israeli intelligence services which were destabilizing the nuclear armed country. “These people (Mehsud and his men) are working against Islam.”
Insurgents have stepped up their attacks on civilian and religious centers in major cities across Pakistan which has fueled anti-Taliban sentiments among the Pakistani people.
The US invasion of Afghanistan in 2001 has prompted militants to focus their attention across the border in Pakistan, turning the restive tribal belt between the two neighbors into a scene of daily violence.
The US invaded Afghanistan more than seven years ago to allegedly eradicate insurgency and arrest Taliban and al Qaeda leaders.
Mossad-Taliban whistleblower killed in Pakistan June 23, 2009
presstv.ir
Qari Zainuddin (centre), surrounded by his armed guard in northwestern Pakistan
A tribal leader who earlier defected from Pakistani Taliban chief Baitullah Mehsud and revealed the militants group’s ties with the US and Israel has been shot dead.
The assassination of Qari Zainuddin comes days after he revealed that their comrade was pursuing a US-Israeli agenda across the violence-wracked country.
Zainuddin, a 26-year-old rising tribesman who had called Mehsud “an American agent” was killed by a gunman in northwestern town of Dera Ismail Khan on Tuesday.
Zainuddin, who broke away from Mehsud, was also increasingly critical of Mehsud’s use of suicide bombings targeting civilians.
In an interview with local media the defector said that Mehsud had established strong links with Israeli intelligence services, which were destabilizing the nuclear armed country. “These people (Mehsud and his men) are working against Islam.”
Mehsud, a warlord in his late 30s, has claimed responsibility for dozens of devastating string attacks on both civilians and security forces throughout the feared region.
Insurgents have stepped up their attacks on civilian and religious centers in major cities across Pakistan, which has fueled anti-Taliban sentiments among the Pakistani people.
The US invaded Afghanistan more than seven years ago to allegedly eradicate insurgency and arrest Taliban and al Qaeda leaders.
The US invasion of Afghanistan in 2001 has resulted in the spread of violence into neighboring Pakistan. Taliban militants have turned the restive tribal belt between the two neighbors into a scene of daily