Here Come the Raids: Contractors Seek to Legalize Private Police in the U.S.

Here Come the Raids: Contractors Seek to Legalize Private Police in the U.S.

mendocino-paramilitary-raid-cannabis-cropsThere are very few news stories about government overreach that shock me these days, but this week there were two — both in California. Each came and went with barely a whisper in the media, even from the “liberty” news.

Perhaps we’re so bombarded with mafia tactics by the government that some events just get lost in the chaos. And no, one of these developments is NOT the Los Angeles School District acquiring tanks and grenade launchers, although that’s probably of equal significance. Below is the first of these local stories. The second will be in a follow-up article.

This is probably the scariest development in law enforcement, ever, and I don’t say that lightly. If you thought no-knock SWAT raids to serve warrants for non-violent crimes was the epitome of tyranny, wait until you get a load of private mercenaries conducting special forces-type raids on American citizens.

That’s right, a report out of Mendocino, California admits that Blackwater-like private “security” contractors are now being used to “police pot.” Mysterious soldiers repelled out of unmarked helicopters fully armed for war to raid legal medical cannabis gardens last month. They didn’t identify themselves or present paperwork of any kind. They just destroyed the garden and left. Other witnesses claim this invading army is also “confiscating” product.

Here’s the local CBS news report:
http://sanfrancisco.cbslocal.com/video?autoStart=true&topVideoCatNo=default&clipId=10576466

This is the ultimate “feeler” story in the unfolding Totalitarian Tip-Toe if I’ve ever seen one. A quirky local story of “mystery men” used to raise the public threshold of acceptable tyranny, a.k.a. legitimizing private-sector soldiers for law enforcement.

The war machine seems to be gauging how much terror they can inflict on peaceful Americans before they say WTF (See Ferguson) and, perhaps more importantly, to see if the public will allow this vast new market for war profiteers.

It should be a massive media story “private war profiteering at home to terrorize citizens fight crime”. Helicopters, weapons of war, and tactical gear are expensive. Who’s seeding these start-ups anyway?

The manipulation continued a day after this story was reported, when Alex Altman of TIME wrote “Californians Turn to Private Security to Police Pot Country” as if all the citizens of California have agreed to this type of policing. Subtle manipulation.

TIME writes:

Over the summer, residents claimed men in military gear had been dropping onto private property from unmarked helicopters and cutting down the medicinal pot gardens of local residents. Local law enforcement have conducted helicopter raids in the area, but some worried the culprit this time was different: a private-security firm called Lear Asset Management.

The confusion was easy to understand. In the wildlands of California’s pot country, the workings of law enforcement are hard to track, and the rules for growing pot are often contradictory. To add to the mess, the various local, county, state and federal enforcement efforts don’t always communicate with each other about their efforts. The added possibility of private mercenaries, with faceless employers, fast-roping from helicopters raised alarm bells for many farmers.

TIME legitimizes Lear Asset Management and the practice of private policing with a matter-of-fact job description:

They are hired by large land owners to do the work of clearing trespass gardens from private property, and perform forest reclamation, sometimes funded by government grant. Deep in the woods, they cut down illegal pot plants and scrub the environmental footprint produced by the backwoods drug trade. They carry AR-15 rifles, lest they meet armed watchmen bent on defending their plots.

I really don’t have a problem with securing private property from vandals, but did you catch that slip “sometimes funded by government grant”?  That’s when “private security” becomes “law enforcement.” This is the RED ALERT buried in this story. At best our tax dollars are being used to fund private armies for large land owners. At worst, when will we see these warriors policing BLM land (aka National Parks)? Wait for it…

Altman quotes official statistics about how successful Lear and law enforcement are in raiding marijuana farmers, measured in the “street value” of the forbidden crop seized at gunpoint, as if that is still acceptable behavior by society’s peace keepers in the era of legal weed. But Altman just uses it as a segue into a broader “problem” of policing environmental vandalism on large stretches of open land, including “public” land.

More recently, the trespass grow sites have migrated from public land onto the vast plots owned by private citizens and timber companies. Some of them have hired Lear to deal with the problem. The company has run about nine missions across California’s pot country this year, with more planned this fall, Trouette says. And while the company’s special-ops aspect gets much of the attention, most of the work focuses on environmental reclamation.

The public is supposed to believe Lear is merely an environmental clean-up team doing community service who just so happens to have military special ops capability. How quaint. I didn’t know litter maintenance required AR-15s. But who would be opposed protecting the environment? Smart marketing.

TIME goes for the hard close to sell this tyranny by providing legal cover for these raids without warrants, before ending the article as a sponsored post for “regulation” of Lear’s “flourishing” domestic mercenary business as the “best thing for locals.”

Reports of vigilante marijuana raids on private property may simply stem from a lack of legal clarityUnder the so-called “open fields doctrine” set forth by the U.S. Supreme Court, the Fourth Amendment does not protect undeveloped property from warrantless searches. As a result, police may be permitted to cut down private gardens without a warrant. (my emphasis because your need to read and reread every word)

In the meantime, Lear has flourished, despite the concern among some local growers. But like most people in the Emerald Triangle, Trouette thinks thebest thing for the locals would be for the feds to sort out all the confusion. “I think the federal government would do everybody a big favor,” he says, “by regulating this industry.” (my emphasis)

So let me get this straight: a criminal gang of armed thugs commits violence and theft, and the best way to solve that problem is to legalize and regulate those thugs? Sounds like ISIS.

The creepiest thing about this development is that it’s a clever, more professional repackaging of a previous attempt to introduce private police in America. Some of you liberty lovers may recall it being rolled out once before in an eerily similar manner.

In 2009, FOX News wrote U.S. Mystery ‘Police’ Force Has Small Montana City on Edge after a local news report aired showing an extremely well-funded private security contractor going by the name American Police Force (APF) rolling into the town of Hardin in black Mercedes tagged as “Harding Police Department”.

Hiring a private firm for domestic policing caused massive outrage not just locally in Montana but also around the United States. APF is now referred to as a well-funded fraud perpetuated by a petty con man and the event was swiftly dumped into the dustbin of history.

The Wikipedia entry on APF states:

American Police Force (APF), and under its revised name American Private Police Force, was a fraudulent entity claiming to be a private military company. It never possessed any legitimacy to operate in the United States. The company’s previous logo was an exact copy of the Serbian state coat of arms which caused some controversy and resulted in the Serbian government threatening legal action against APF if it did not remove or change the logo.

In September 2009, US government contract databases showed no record of the company, while security industry representatives and federal officials said they had never heard of it.

APF was registered as a corporation in California by convicted con man Michael Hilton on 2 March 2009.

Interestingly, there are absolutely no follow-up reports of “Michael Hilton” or anyone else being prosecuted or convicted in the APF case. They simply vanished. Think about that for a moment. A heavily-armed foreign force invades a small town in America on false pretenses committing dangerous fraud and the U.S. government does absolutely nothing about it. What does that tell you?

Well, we know the U.S. military uses private contractors in foreign wars, and we know the Pentagon is arming and militarizing domestic police, and we know the U.S. Army is training to enter law enforcement. It seems to me that it’s all part of the plan to keep the war machine churning and to control the population.

Now with a more polished version of private security, minus the flashy Mercedes and foreign accents, and sold to us as environmental guardians, this story has gone largely unnoticed. Yet, if these raid allegations are true, Lear’s actions already far exceed anything APF did in Montana.

Stay tuned for my next article on the second unreported tyrannical event that happened in California this past week to be released later today or early tomorrow.

Eric Blair
Activist Post
The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM

The NSA Was Going to Fine Yahoo $250K a Day If It Didn’t Join PRISM

yahoo-nsa-prism-fineWhen we first learned about NSA metadata collection, we wondered how readily the biggest tech companies acquiesced to the government. Today we start to find out. This is the story of how Yahoo was coerced into PRISM, as told by court documents cited by the Washington Post today.

According to the documents, corroborated by a blog post made public today by Yahoo—the U.S. government first approached the company in 2007 asking for user metadata. The request was unprecedented: The U.S. government was no longer interested in obtaining a court review before requesting metadata on an individual target. The order simply asked for data on targets located outside of the U.S. at the time, be they foreign or U.S. citizens.

Yahoo challenged the government requests several times, citing the limits of the U.S. Constitution, but was denied in the Foreign Intelligence Court of Review, the “secret courts” that oversee surveillance requests regarding national security. The repeated denials, plus the threat of losing $250,000 a day, forced Yahoo to comply with the NSA’s PRISM program.

For its part, the U.S. government used Yahoo as an example to coerce other American tech giants, sharing the rulings against Yahoo with companies like Google, Facebook, and Apple.

This information comes to light today, as roughly 1,500 pages of documents pertaining to Yahoo’s failed legal battle were released by Federal Judge William C. Bryson, who presides over the Foreign Intelligence Surveillance Court of Review. Yahoo requested the unsealing of the documents, and the company’s Ron Bell says in this blog post that Yahoo is working to make these never-before-released documents available on Tumblr.

Now that the courts are unsealing documents surrounding PRISM and other national surveillance programs, it’s possible that we’ll hear about other tech companies and whether they resisted the NSA’s requests for sweeping data dumps. Judging by what we’ve learned today, Yahoo tried to stick up for its users’ privacy—until it couldn’t afford to. [The Washington Post]

EXCLUSIVE: Origins of the Zombie Apocalypse Hollywood Narrative

EXCLUSIVE: Origins of the Zombie Apocalypse Hollywood Narrative

George A. Romero’s Vital Role in Paving the Road for Today’s Zombie Film

zombiesThe first feature length film to employ zombies as a vehicle for social commentary was Abel Gance’s J’Accuse (1919), which is also memorable for featuring authentic footage from the battlefields of the first World War. In the 1930’s, many zombie films were inspired by mostly misinterpreted Haitian mythology. Today, zombie film and culture now permeate virtually all mass media, everything from video games, to TV shows, to graphic novels. Zombies are used as a narrative device to discuss any number of issues, from oppressive, military states, to contagions and pandemics, to xenophobia and social stigma. We owe most of this to George A. Romero.

Zombie films, and indeed exploitation films in general, would not exist as we know them today if not for Romero’s influence. From his early work with the groundbreaking films Night of the Living Dead (1968), Dawn of the Dead (1978), and Day of the Dead (1985) that set the zombie genre in motion to his recent works like Land of the Dead (2005), Diary of the Dead (2007), and Survival of the Dead (2010) Romero set the standard for the zombie movie in ways that changed how we watch the genre entirely.

Night of the Living Dead, although black and white and also shot on a shoestring budget, has a depth that was surprising for the time. Although the film didn’t shy away from explicit onscreen violence, it wasn’t the blood and guts alone that made this film revolutionary. After all, by 1968, exploitation filmmakers like Herschell Gordon Lewis had already been churning out over-the-top gory films like Blood Feast (1963) for a few years. What distinguished Romero’s film was that it didn’t rely exclusively on sensational gimmicks, but it endeavored to tell a meaningful story with characters that elicited emotional responses from viewers. The film focused more on the human relationships during the post apocalyptic backdrop, and it offered poignant commentary about humanity’s inability to reconcile conflicting self-interests in crisis situations. The film is also notable for featuring a black actor (Duane Jones) as its male lead. What’s more, the film had the audacity to have its main character killed off — and what’s more, the black male lead is shot by a white militia. Bear in mind that Martin Luther King Jr. was assassinated around the time of the film’s release, and Malcolm X had been assassinated a mere three years prior.

His next installment in the Dead saga was Dawn of the Dead (1978), which mostly takes place inside an overrun shopping mall and also focuses on the survivors of a zombie outbreak. We are told that the zombies flock to the mall because they have vague memories of the site holding personal significance for them. It’s Romero’s stab at consumer culture, and the unhealthy degree of importance assigned to material wealth.

In 1985’s Day of the Dead Romero envisions an underground military base where zombies have been kept for experimentation. It evokes sympathy for the zombies, and vilifies the power-crazed military officials (especially the psychopathic Captain Rhodes, who meets an especially gruesome end). Day, with it’s scaything criticism of governmental abuse of power and ethical issues surrounding military service, is perhaps the most socially relevant of all the Dead films. Not only is it attracting fresh attention because of regular screenings on TV, particularly the new grindhouse/horror-oriented El Rey cable network (more info here), but the film also laid the groundwork for modern zombie productions like The Walking Dead, and 28 Days Later. And moreover, his films have been remade and adapted, proving that they are still as relevant as ever to a modern day audience.

While his film Land of the Dead (2005) did offer unique criticism of the Bush administration, his follow-ups, Diary of the Dead (2007), and Survival of the Dead (2010) failed to gain widespread attention like his earlier works did but they still prove to be potent additions to the zombie film genre catalog. His most recent outings lack the potency as the earlier films. However, these movies were not totally without merit and, in fact, only upheld the idea that Romero is an incredibly important figure in the zombie genre who had an integral role shaping what it is today.

In more recent, unrelated works like The Walking Dead and 28 Days Later, the very ideas those films were founded upon are the same ideas that Romero laid out in his earlier works and upheld in his later films. Surely, if not for Romero’s works and contributions, the zombie genre that we know and love to today would seem infinitely less-thrilling, and considerably less relevant, than  it is today.

Martin John Rogers

Martin John Rogers

Martin-John-RogersMartin John Rogers was found with his wrecked car down an embankment in western Maryland on Thursday, September 4, 2014, after disappearing on August 21, 2014 when he left home for work at the world-renowned research center near Washington, D.C. No word yet on the cause of death, an autopsy will be performed to determine the manner of death, according to LA Times and The Baxter Bulletin. Here is where the mystery comes in. According to the report, the search for Rogers didn’t start until a few days after he failed to show up for work, but on the day he disappeared he is seen on surveillance footage and used a credit card at a Motel 8 a few hours after he left home. Martin Rogers had worked at the National Institutes of Health for 15 years and specialized in tropical diseases.

 InfoGraphic: Where Does Gitmo Fit In? The Long, Winding History of Prison Camps

 InfoGraphic: Where Does Gitmo Fit In? The Long, Winding History of Prison Camps

The history of prison camps dates way back to the dawn of time, with victorious battles leading to enslavement and eventual death for the defeated. In the middle ages, these practices moved to trades and ransoms. From those ancient times until now, civilizations have battled on how to properly treat prisoners of war, and Gitmo is no different. www.infographicworld.com has created an infographic exploring the history of prisoners of war, along with the present conditions – and the future – of Gitmo.

Gitmo has a sordid history, which was brought prominently into light after the September 11th attacks. Gitmo is a financial hog, costing $454 million in 2013 alone. Since 2002, the naval station has amassed over $5 billion in total costs to the U.S. Since 2002, 779 prisoners have been held at Gitmo, costing $3 million per prisoner per year.

From political lines, to the overall public perception of the prison, this infographic from www.infographicworld.com covers everything you need to know about Gitmo.

Gitmo-and-the-history-of-prison-camps

Glenn Thomas

Glenn Thomas

Glenn-ThomasGlenn Thomas, AIDS and Ebola expert and spokesperson for the World Health Organization. Ebola expert Glenn Thomas was among the 298 people who were killed when Malaysia Airlines flight MH17 was shot down and crashed in Ukraine. It is understood he was one of more than 100 researchers who were aboard the flight on their way to an international Aids conference in Australia. Among the other delegates aboard the plane was Joep Lange, a leading AIDS researcher and former president of the International AIDS Society (IAS).

Critical Facts All US Citizens Should Know Abut Israel & Palestine

Critical Facts All US Citizens Should Know Abut Israel & Palestine

israel-palestine-wall

“Desparation”

    • Gaza (along with the West Bank and East Jerusalem) is occupied Palestinian territory under international law, determined by the vast majority of the world, as well as the highest court in the world, the UN’s International Court of Justice. Gaza cannot commit aggression against Israel, since Israel is in constant and continual commission of illegal aggression against Palestine by occupying it (illegally and sadistically blockading it and frequently committing terrorism against its civilians, including by targeting them with chemical weapons provided by US taxpayers – see “Rain of Fire” by Human Rights Watch). As documented by Amnesty Int’l, Human Rights Watch, and many others, Israel intentionally targets and murders civilians, including children, en masse.

 

palestine_children_abuse_by_israeli_solders

Israeli Child Abusers At Work

  • But, even ignoring international law and that Gaza is under illegal Israeli occupation, Gaza did not initiate this current round of violence; Israel did:
    • Western/US/Israeli propaganda says the violence started with the kidnapping and killing of three Israeli youths on June 12th. That is a lie:
    • On May 20th, the Israeli government murdered 2 unarmed Palestinian teens, one on video, and wounded a third.
    • The firing of pathetic scrap metal rockets from impoverished Gaza, which have killed no one, were in fact launched in response to earlier Israeli bombings, killings, assassinations, and arrests of Palestinians, including children.
  • Since the year 2000, Israel has killed 1,500 Palestinian children, while Palestinians have killed 132 Israeli children. That means Israel has killed over 1,000% percent more Palestinian children than vice versa.
  • According to a landmark, comprehensive study of all of Israel’s wars, by Zeev Maoz, Professor of Political Science at the University of California, Davis, former head of the Graduate School of Government and Policy and of the Jaffee Center for Strategic Studies at Tel Aviv University, and former academic director of the M.A. Program at the Israeli Defense Forces’ National Defense College:
    • “. most of the wars in which Israel was involved were the result of deliberate Israeli aggressive design . None of these wars – with the possible exception of the 1948 War of independence – was what Israel refers to as Milhemet Ein Berah (war of necessity). They were all wars of choice . ” – Defending the Holy Land, pg. 35, (bold added)
    • “I review a number of peace-related opportunities ranging from the Zionist-Hashemite collusion in 1947 through the collapse of the Oslo Process in 2000. In all those cases I find that Israeli decision makers – who had been willing to embark upon bold and daring military adventures – were extremely reluctant to make even the smallest concessions for peace . I also find in many cases Israel was engaged in systematic violations of agreements and tacit understandings between itself and its neighbors.” – Defending the Holy Land, pg. 40
  • Israel has violated more UN resolutions than any other country. That includes Iraq under Hussein.
  • Hamas is the government elected by Gaza in elections that Jimmy Carter (and many others) observed and said were completely fair and free. Israel constantly says Hamas uses human shields. But in Israel’s biggest massacre of Gaza, the one in 2009, all the human rights organizations, including Amnesty, HRW, and the jurist Richard Goldstone, found that Hamas DID NOT use human shields. On the contrary, Israel used human shields, which is a regular practice for Israel. Israel uses civilians as human shields.
    • Israel forced Palestinian civilians to dig and lay naked in trenches around Israeli tanks. See here at 6:45.
          • XIV. THE USE OF PALESTINIAN CIVILIANS AS HUMAN SHIELDS

Israel-using-human-shield-boy
israel-uses-human-shields

 

      • “The Mission received allegations that in two areas in north Gaza Israeli troops used Palestinian men as human shields… The Mission found the foregoing witnesses to be credible and reliable. It has no reason to doubt the veracity of their accounts and found that the different stories serve to support the allegation that Palestinians were used as human shields.”
  • Noam Chomsky: “Hamas is regularly described as ‘Iranian-backed Hamas, which is dedicated to the destruction of Israel.’ One will be hard put to find something like ‘democratically elected Hamas, which has long been calling for a two-state settlement in accord with the international consensus’—blocked for over 30 years by the US and Israel. All true, but not a useful contribution to the Party Line, hence dispensable.”
  • In the history of all rocket and mortar fire into Israel, 26 people, total, have been killed. And remember, Palestine breaks ceasefires far less often than Israel, as documented above.
    • This number of 26 is in contrast to the minimum number of 1,400 people who were murdered by Israel in a single one of its terrorist atrocities, the 2009 Gaza Massacre.
    • Noting that in the current massacre, zero Israelis and over 100 Palestinians have thus far been killed, and noting that Gaza is a concentration camp – Israel allows no one to enter or leave – Dan Sanchez gives a perfect description of the disparity in arms between the US/Israeli war machine and Palestinian scrap metal projectiles: “They [the Gazans] are like fish in a barrel, being blasted by a shotgun from above. It’s like some of the fish in the barrel pathetically spitting water at the gunman, and [US media calls] that a “shooting battle.”
  • The rhetoric and tactics of Hamas and other groups resisting Israeli occupation and colonization can be brutal (though far less so than Israel). Propagandists try to attribute this to anti-Semitism, to distract from the fact that these groups are resisting having their country stolen and their people dispossessed and annihilated. Native American resistance to European colonizers was sometimes extremely brutal, as was their rhetoric, but everyone universally recognizes that this was not because of “anti-White-ism”, or “anti-European-ism”, but because they were having their land stolen and their people massacred, the same thing that Israel is doing to the Palestinians.
    • Palestinians have the right under international law to resist occupation, ethnic cleansing, colonization, aggression, and annexation. Miko Peled, son of an Israeli general, recently stated that if Israel doesn’t Like rockets, they should decolonize Palestine. Dr. Norman Finkelstein notes that “The Palestinians have the right to use arms to resist an occupation . However, the fact that morally and legally they have that right doesn’t mean that it’s the most prudent strategy. In my opinion, a national Palestinian leadership committed to mobilizing nonviolent resistance can defeat the Israeli occupation if those of us living abroad lend support to it.”
  • In 1948, the people who wanted to form a Jewish state carried out a massive terror and ethnic cleansing campaign against the occupants of Palestine, expelling about half of them (750,000) from their land and into concentrated areas (Gaza and West Bank). Israel has slowly continued colonizing even those areas, which were specifically reserved by the UN for Palestinians. Israel takes all the best land and resources, such as water. Here is a visualization of what has happened, and is currently happening with massive support from Obama:
map-story-of-palestinian-nationhood

Genocide – GET IT!?

  • Israeli settlement building in Palestine is a war crime under international law. Under Obama, Israeli settlement building is up over 130%.
  • For about 40 years, there has been an international consensus that Israel must stop colonizing territory outside its 1967 borders. The consensus has been blocked by the United States, in isolation from the international community (much like the USA’s isolated, strong support for South African Apartheid). Every year there is a UN vote on the issue, and every year it goes about 165 to 2, the world against the US and Israel. This continues under Obama. All human rights groups support the consensus, as does Hamas, the Arab League, Iran, the Organization of the Islamic Conference… Virtually everyone, except the US and Israel. (More details on this page.)
FreePalestine_Anti-Semitism

Hypocricy Defined

  • Palestinians are brutalized, repressed and impoverished by Israel. To get a quick visual understanding of the difference between Gaza and Israel, take a look at the images of people and cities being wantonly pummeled by Israeli terrorism when you search the word “Gaza“, and the images of opulence, wealth and luxury that come up when you search “Tel Aviv“.
  • Israel, whose government intentionally targets, tortures, and murders civilians, including children, including with chemical weapons, and whose government uses Palestinian civilians as human shields, and whose government is the last entity on Earth carrying out old-style ethnic cleansing and colonization of foreign countries, is the single biggest recipient of US aid, at over three billion dollars a year and huge amounts of lethal weaponry such as attack helicopters and white phosphorous chemical explosives.
  • To reiterate, Obama requested more military aid for Israel than any president ever. This is not because Obama and the USA love Jewish people. Obama was recently an accomplice in a literal neo-Nazi-led coup d’etat in Ukraine, and is currently fully supporting the junta-integrated Ukrainian government, which is staffed with several neo-Nazis in high ministries, and which uses neo-Nazi paramilitaries to carry out massacres (and possibly genocide) against people resistant to the junta. The actual reason the US supports Israel is discussed below.
  • As Amnesty International has noted, all aid to Israel is illegal under international (and US) law, because Israel is a consistent violator of human rights.

Amnesty International also noted that Israel’s 2009 massacre of Gaza would not have been possible without the illegal funding (money and weapons) and support Israel gets from the USA.

This is also true of the current massacre Israel is committing in Gaza.

However, in a way, that is good news.

That means US citizens can STOP the massacres.

stop-killing-palestinians

MSM Refuses to Cover Anti-Israel War Crime Protests

If we stop our money and weapons-flow to Israel, which is illegal anyway, we stop Israeli terrorism! All we have to do is stop committing a crime, and we will stop more crimes! That’s great news.

Here is a previous example of how this has worked: When the USA cut its funding for Indonesia’s genocide against East Timor, which the USA was funding almost exclusively, Indonesia was forced to stop and withdraw. All it took was cutting off our illegal flow of money and weapons to the criminals.

The same thing would happen if we cut our illegal funding for Israel’s genocides and acts of terrorism, ethnic cleansing, colonization, and annexation against Palestine.

But since the USA is an anti-democratic country, the only way to stop US plutocrats from using our money to fund Israeli terrorism is to force it through massive, non-violent pressure.

One way it happens is when it becomes too politically costly for the plutocracy to keep funding genocide and terror, meaning the costs of their illegal support outweigh the benefits, as in Indonesia. In that case, massive publicity and indigenous resistance accomplished the goal.

But Israel is the USA’s main imperial – and nuclear – base for controlling the Middle East, which US planners, in 1945, called the greatest material prize in world history, due to the oil and gas. Thus, it might require more, as in non-violently making our country into a democracy so that people control their own institutions and money, and thus the way we operate as a society and interact with the world.

Last note: To be clear, Israel is a legal state, but only within the borders allotted to it by the United Nations – the Pre-1967 borders, which existed before Israel started eating away, through terror, ethnic cleansing, colonization, and annexation, at the areas reserved by the United Nations for Palestinians, as well as areas of other countries, such as Syria (the Golan Heights).

Per international law, US domestic law, and common sense, Israel doesn’t deserve any support until it abandons isolationism and accepts that it can’t steal other people’s countries, and stops blockading and withdraws its soldiers and settlers, all there illegally, from those countries.

Israel is, militarily, the most powerful country in the Middle East, by far. Removing our support for the Israeli government (which we are legally required to do) will not put Israelis in danger. It will pressure the Israeli government to stop doing what endangers Israelis, which is committing aggressive acts against Israel’s neighbors.

If Israel ends its status as a consistent violator of human rights, decolonizes Palestine, and respects its neighbors, it could be a pleasure – and legal – to work with and support Israel.

Germany, Japan, and South Africa went from being the most reviled countries on Earth to being some of the most admired. Maybe Israel could undergo the same transformation, but not unless we, US citizens, help by ceasing to enable Israeli terrorism and war crimes by illegally supporting them.

Why “One Gun” or “Three Guns” for TSHTF Is a Bad Idea

Why “One Gun” or “Three Guns” for TSHTF Is a Bad Idea

freedom-vigilanceWe’ve all been part of these discussions, and we’ve all read a ton of them on forums and blogs over the years: “if you could have only one gun for TEOTWAWKI, what would it be?” A more enlightened-seeming variant on this same theme are discussions that start with, “if you could pick only three guns for TSHTF…”

Here’s what’s wrong with so many of these discussions: no matter what flavor of civilization-ending apocalypse you contemplate — meteor strike, supervolcano, global pandemic , EMP blast, etc. — a SHTF scenario is likely to play out in phases, and for each phase you’re going to need a different skill set and a different load-out — not just a gun, but a complement of tools and skills.

Below is my brief attempt to sketch out the three phases that society would go through in a total collapse, and to think about some load-out options for each. Sure, you could read this and then pick three guns — one gun per phase — but by the end you’ll see that this attitude is putting the cart before the horse. The smarter thing to do is to put together a set of load-outs that will give you multiple options for dealing with each phase. You may still end up with three guns, but the point is that “which three guns… ” is not the question that you start with. Instead, the right question is “what mix of weapons and accessories are the best fit for each of the scenarios I’m envisioning?”

Phase 1: martial law and trigger-happy authorities

In the initial phase of a catastrophe, a phase that admittedly may last only a day or two depending on the swiftness and severity of the cataclysm, there will be some attempt by authorities to maintain law and order. During this phase, if you’re walking around with an AR or AK strapped to your back, you’re likely to be taken for a looter and shot on sight.

This is the red dot or reflex sight + polymer frame pistol phase. Mobile, concealable, accurate, quiet, and 100% reliable are what you’re looking for. Don’t worry about how long the batteries will last in your Aimpoint right now — you just have to get through this phase without getting arrested or shot.

If you think you’re going to get through this phase with a bow or a crossbow, then all I can say is that I’ll be glad to use your bow in phase 3 when I stumble across your corpse clutching it.

My personal fantasy load-out for this phase would be a suppressed Glock 17 paired with something like the Daniel Defense ISR-300 (a short-barreled rifle chambered in .300 Blackout with an integrally attached suppressor).

boston-swatWhy the focus on stealth? Because if you do have to shoot someone or something during this phase, there’s a good chance that you may not want the whole neighborhood to know that shots were fired at your house. The authorities will be dealing with mass chaos and won’t have time to sort out who shot first, so if they show up at your house and you’re armed to the teeth and standing over a pile of corpses, then it may not go well for you. So a suppressed short-barreled rifle is your best bet for home defense here, because at least you have the option of not involving an organized gang of heavily armed, yet frightened and confused people (i.e. the police or whoever is trying to maintain order) who may decide that you’re a threat.

Note that now is the time for you to either start your NFA paperwork, or obtain the theoretical know-how to build a homemade can. I’m not saying go out and build a silencer, because that’s illegal. But maybe download the info and print it out, and store it as part of your bug-out gear. Do not under any circumstances attempt to actually make a homemade silencer, though, because that’s a felony. You do it, you get caught, you go to jail — end of story. I’m not winking or smiling here — do not do it, and in fact don’t even gather the materials for it because you don’t want to be guilty of constructive possession of such a thing.

Experienced pistol shooters (which does not describe me) will no doubt be fine skipping the CQB personal defense weapon (PDW) and using a suppressed semi-auto pistol for this phase. This is great, because as I mentioned above, you’ll need a pistol anyway.

So get your phase 1 load-out together, and learn to shoot and move with it. And for God’s sake just pick the best tools for the immediate job at hand, without worrying about whether or not the batteries will last another 20 years. You’ll need every technological advantage, no matter how fragile and/or short-lived that technology may seem, to fight your way through this temporary phase. If you can afford some good night-vision equipment, then by all means add it to your phase 1 load-out, and quit worrying about whether your grandchildren will still be able to use it to defend the homestead.

Phase 2: lawlessness and die-off

This is the open-carry assault rifle phase. Very few people are going to make it past this phase, but if you do, it’s because you have reliable long gun, plenty of ammo, a good optic, some training, and a few capable allies at your side.

The people who have survived phase 1 are not going to be happy campers. They’ll be hungry, justifiably terrified, and aggressive. They’ll also be gathered together in groups and gangs, which is exactly how you should plan to roll during this phase. More allies with guns means a better chance for you and yours to survive, which is why the training that you do for this phase should involve learning to shoot and move as part of a group.

You’ll want carbine and shotgun options — the pistol that got you through phase 1 will probably become a rarely used backup weapon, and your long guns will become your primary weapons. My personal pick for phase 2 is an AR-15 with a Trijicon ACOG, but that’s because I know the AR platform pretty well. Others will choose the AK. There’s also the Tavor, SCAR, and numerous other options. I won’t wade into this debate, because this is what most people are thinking of when they post “what gun and optic should I get for SHTF?” in various forums.

Phase 3: long-term survival

At some point your optics will run out of batteries, and depending on your stockpiles you may run out of ammo even before then. When this happens, it’s all about trapping and snares, fishing, farming, and finding ways to harvest a few thousand calories per day per family member.

Note that taking wild game of any kind is difficult, and it involves a lifetime of practice. Depending on the terrain you’re in and your skill set, hunting for food will range from very difficult to downright impossible. Farming is an order of magnitude easier and more predictable, so if you really want to be prepared then you should learn to grow your own food.

Of course, you will still do some shooting — this is the phase where you get to bust out that double-barreled shotgun with the multi-caliber barrel inserts, and go scavenging for ammo. If that shotgun was your phase 1 weapon, then you probably didn’t make it this far, but it will make a fine phase 3 hunting and home/farm defense gun.

This is the phase where a lot of people plan to rely on archery to take game. Please. Bowhunting is hard. Trapping isn’t a cakewalk, but it’s a vastly easier and more reliable way to get protein that stalking around in the woods with a bow; it also relies far less on expensive consumables (i.e arrowheads and strings) that you’d need to stockpile.

I personally think that .once-again-cheap 22LR ammo is the best thing to stock up on for this phase, and judging by the recent shortage, plenty of people agree with me.

Conclusion

Many of you will disagree with some, or even all, of my recommendations. But I hope if you take away anything from this article, it’s the idea that any catastrophe will unfold in series of distinct phases or stages, and you’ll need to prepare for each one. The tools and skills that will get you through the initial phase won’t necessarily be the best suited for the next phase, and so on. So the answer is to have specialized load-outs for different types of situations. You want to have options, so that you can improvise, adapt, and overcome. Don’t think in terms of “one gun” or “three guns” — think in terms of scenarios and loadouts.

This is actually how US Special Forces operate. They have different load-outs that fit different mission profiles; sometimes this involves selecting different weapons and tools, and sometimes it involves reconfiguring the same weapon or tool. But the main thing is that they have options, and they adapt their load-out to fit their situation.

What types of scenarios do you imagine that you’ll face in a catastrophe, and what type of load-out (gun, optic, ammo, clothing, tools) would be the best fit for each scenario? Don’t get sucked into the game of trying to put together one single loadout that will fit every scenario, because I promise you, when you’re watching the chaos unfold and you’re wetting your pants, you’re going to wish dearly that you hadn’t tied yourself to a one-size-fits-all, jack-of-all-trades-master-of-none solution. You’re going to want to reach for the very best tool for the job that is immediately staring you in the face, and you won’t be happy if you’re stuck with the second- or third-best tool for wide a range of jobs that you may or may not encounter.

via AllOutDoor.com

11 Shocking Facts About America’s Militarized Police Forces

11 Shocking Facts About America’s Militarized Police Forces

police-militarized

The militarization of police is harming civil liberties, impacting children, and transforming neighborhoods into war zones.

The “war on terror” has come home–and it’s wreaking havoc on innocent American lives.  The culprit is the militarization of the police.

The weapons used in the “war on terror” that destroyed Afghanistan and Iraq have made their way to local law enforcement. While police forces across the country began a process of militarization complete with SWAT teams and flash-bang grenades when President Reagan intensified the “war on drugs,” the post-9/11 “war on terror” has added fuel to the fire.

Through laws and regulations like a provision in defense budgets that authorize the Pentagon to transfer surplus military gear to police forces, local law enforcement are using weapons found on the battlefields of South Asia and the Middle East.

A recent New York Times article by Matt Apuzzoreported that in the Obama era, “police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft.”  The result is that police agencies around the nation possess military-grade equipment, turning officers who are supposed to fight crime and protect communities into what look like invading forces from an army. And military-style police raids have increased in recent years, with one count putting the number at 80,000 such raids last year.

In June, the American Civil Liberties Union (ACLU) brought more attention to police militarization when it issued a comprehensive, nearly 100-page (appendix and endnotes included) report titled, “War Comes Home: The Excessive Militarization of American Policing.”  Based on public records requests to more than 260 law enforcement agencies in 26 states, the ACLU concluded that “American policing has become excessively militarized through the use of weapons and tactics designed for the battlefield” and that this militarization “unfairly impacts people of color and undermines individual liberties, and it has been allowed to happen in the absence of any meaningful public discussion.”

The information contained in the ACLU report, and in other investigations into the phenomenon, is sobering. From the killing of innocent people to the lack of debate on the issue, police militarization has turned into a key issue for Americans. It is harming civil liberties, ramping up the “war on drugs,” impacting the most marginalized members of society and transforming neighborhoods into war zones.  Here are 11 important–and horrifying–things you should know about the militarization of police.

1. It harms, and sometimes kills, innocent people. When you have heavily armed police officers using flash-bang grenades and armored personnel carriers, innocent people are bound to be hurt.  The likelihood of people being killed is raised by the practice of SWAT teams busting down doors with no warning, which leads some people to think it may be a burglary, who could in turn try to defend themselves. The ACLU documented seven cases of civilians dying, and 46 people being injured.  That’s only in the cases the civil liberties group looked at, so the number is actually higher.

Take the case of Tarika Wilson, which the ACLU summarizes.  The 26-year-old biracial mother lived in Lima, Ohio.  Her boyfriend, Anthony Terry, was wanted by the police on suspicion of drug dealing.  So on January 4, 2008, a SWAT team busted down Wilson’s door and opened fire.  A SWAT officer killed Wilson and injured her one-year-old baby, Sincere Wilson. The killing sparked rage in Lima and accusations of a racist police department, but the officer who shot Wilson, Sgt. Joe Chavalia, was found not guilty on all charges.

2. Children are impacted. As the case of Wilson shows, the police busting down doors care little about whether there’s a child in the home.  Another case profiled by the ACLU shows how children are caught up the crossfire–with devastating consequences.

In May, after their Wisconsin home had burned down, the Phonesavanh family was staying with relatives in Georgia. One night, a SWAT team with assault rifles invaded the home and threw a flashbang grenade–despite the presence of kids’ toys in the front yard.  The police were looking for the father’s nephew on drug charges.  He wasn’t there.  But a 19-month-old named Bou Bou was–and the grenade landed in his crib.

Bou Bou was wounded in the chest and had third-degree burns. He was put in a medically induced coma.

Another high-profile instance of a child being killed by paramilitary police tactics occurred in 2010, when seven-year-old Aiyana Stanley-Jones was killed in Detroit.  The city’s Special Response Team (Detroit’s SWAT) was looking for Chauncey Owens, a suspect in the killing of a teenager who lived on the second floor of the apartment Jones lived in.

Officers raided the home, threw a flash-bang grenade, and fired one shot that struck Jones in the head.  The police agent who fired the fatal shot, Joseph Weekley, has so far gotten off easy: a jury trial ended in deadlock last year, though he will face charges of involuntary manslaughter in September.  As The Nation’s Mychal Denzel Smith wrote last year after Weekley was acquitted: “What happened to Aiyana is the result of the militarization of police in this country…Part of what it means to be black in America now is watching your neighborhood become the training ground for our increasingly militarized police units.”

Bou Bou and Jones aren’t the only case of children being impacted.

According to the ACLU, “of the 818 deployments studied, 14 percent involved the presence of children and 13 percent did not.”

3. The use of SWAT teams is unnecessary.  In many cases, using militarized teams of police is not needed.  The ACLU report notes that the vast majority of cases where SWAT teams are deployed are in situations where a search warrant is being executed to just look for drugs. In other words, it’s not even 100% clear whether there are drugs at the place the police are going to.  These situations are not why SWAT was created.

Furthermore, even when SWAT teams think there are weapons, they are often wrong. The ACLU report shows that in the cases where police thought weapons would be there, they were right only a third of the time.

4. The “war on terror” is fueling militarization. It was the “war on drugs” that introduced militarized policing to the U.S.  But the “war on terror” has accelerated it.

A growing number of agencies have taken advantage of the Department of Defense’s “1033” program, which is passed every year as part of the National Defense Authorization Act, the budget for the Pentagon.  The number of police agencies obtaining military equipment like mine-resistant ambush protected (MRAP) vehicles has increased since 2009,according to USA Today, which notes that this “surplus military equipment” is “left over from U.S. military campaigns in Iraq, Afghanistan and elsewhere.”  This equipment is largely cost-free for the police agencies who receive them.

In addition to the Pentagon budget provision, another agency created in the aftermath of 9/11 is helping militarize the police.  The Department of Homeland Security’s (DHS) own grants funnel military-style equipment to local police departments nationwide.  According to a 2011 Center for Investigative Reporting story published by The Daily Beast, at least $34 billion in DHS grants have gone to police agencies to buy military-style equipment.  This money has gone to purchase drones, tactical vests, bomb-disarming robots, tanks and more.

5. It’s a boon to contractor profits. The trend towards police militarization has given military contractors another lucrative market where they can shop their products.  Companies like Lockheed Martin and Blackhawk Industries are making big bucks by selling their equipment to agencies flush with Department of Homeland Security grants.

In addition to the actual selling of equipment, contractors also sponsor training events for SWAT teams, like Urban Shield, a major arms expo that has attracted increasing attention from activists in recent years.  SWAT teams, police agencies and military contractors converge on Urban Shield, which was held in California last year, to train and to promote equipment to buy.

6. Border militarization and police militarization go hand in hand. The “war on terror” and “war on drugs” aren’t the only wars helping police militarization.  There’s also the war on undocumented immigrants.

The notorious Sheriff Joe Arpaio, infamous for brutal crackdowns on undocumented immigrants, is the paradigmatic example of this trend.  According to the ACLU, Arpaio’s Maricopa County department has acquired a machine gun so powerful it could tear through buildings on multiple city blocks.  In addition, he has 120 assault rifles, five armored vehicles and ten helicopters. Other law enforcement agencies in Arizona have obtained equipment like bomb suits and night-vision goggles.

Then there’s a non-local law enforcement agency on the border: the Border Patrol, which has obtained drones and attack helicopters.  And Border Patrol agents are acting like they’re at war.  A recent Los Angeles Times investigation revealedthat law enforcement experts had found that that the Border Patrol has killed 19 people from January 2010-October 2012, including some of whom when the agents were under no lethal, direct threat.

7. Police are cracking down on dissent. In 1999, massive protests rocked Seattle during the World Trade Organization meeting.  The police cracked down hard on the demonstrators using paramilitary tactics. Police fired tear gas at protesters, causing all hell to break loose.

Norm Stamper, the Seattle police chief at the time, criticized the militarized policing he presided over in a Nation article in 2011.  “Rocks, bottles and newspaper racks went flying. Windows were smashed, stores were looted, fires lighted; and more gas filled the streets, with some cops clearly overreacting, escalating and prolonging the conflict,” wrote Stamper.

More than a decade after the Seattle protests, militarized policing to crack down on dissent returned with a vengeance during the wave of Occupy protests in 2011. Tear gas and rubber bullets were used to break up protests in Oakland.Scott Olsen, an Occupy Oakland protester and war veteran, was struck in the head by a police projectile, causing a fractured skull, broken neck vertebrae and brain swelling.

8. Asset forfeitures are funding police militarization. In June, AlterNet’s Aaron Cantuoutlined how civil asset forfeiture laws work.

“It’s a legal fiction spun up hundreds of years ago to give the state the power to convict a person’s property of a crime, or at least, implicate its involvement in the committing of a crime. When that happened, the property was to be legally seized by the state,” wrote Cantu.  He went on to explain that law enforcement justifies the seizing of property and cash as a way to break up narcotics rings’ infrastructure.  But it can also be used in cases where a person is not convicted, or even charged with, a crime.

Asset forfeitures bring in millions of dollars for police agencies, who then spend the money for their own uses.  And for some police departments, it goes to militarizing their police force.

New Yorker reporter Sarah Stillman, who penned a deeply reported piece on asset forfeitures,wrote in August 2013 that“thousands of police departments nationwide have recently acquired stun grenades, armored tanks, counterattack vehicles, and other paramilitary equipment, much of it purchased with asset-forfeiture funds.”  So SWAT teams have an incentive to conduct raids where they seize property and cash.  That money can then go into their budgets for more weapons.

9. Dubious informants are used for raids. As the New Yorker’s Stillman wrote in another piece,informants are “the foot soldiers in the government’s war on drugs. By some estimates, up to eighty per cent of all drug cases in America involve them.”  Given SWAT teams’ focus on finding drugs, it’s no surprise that informants are used to gather information that lead to military-style police raids.

A 2006 policy paper by investigative journalist Radley Balko, who has done the most reporting on militarized policing, highlighted the negative impact using informants for these raids have. Most often, informants are “people who regularly seek out drug users and dealers and tip off the police in exchange for cash rewards” and other drug dealers, who inform to gain leniency or cash from the police.  But these informants are quite unreliable–and the wrong information can lead to tragic consequences.

10. There’s been little debate and oversight.  Despite the galloping march towards militarization, there is little public debate or oversight of the trend.  The ACLU report notes that “there does not appear to be much, if any, local oversight of law enforcement agency receipt of equipment transfers.” One of the group’s recommendations to change that is for states and local municipalities to enact laws encouraging transparency and oversight of SWAT teams.

11. Communities of color bear the brunt. Across the country, communities of color are the people most targeted by police practices.  In recent years, the abuse of “stop and frisk” tactics has attracted widespread attention because of the racially discriminatory way it has been applied.

Militarized policing has also targeted communities of color. According to the ACLU report, “of all the incidents studied where the number and race of the people impacted were known, 39 percent were Black, 11 percent were Latino, 20 were white.” The majority of raids that targeted blacks and Latinos were related to drugs–another metric exposing how the “war on drugs” is racist to the core.

via Intellihub.com

War Against Illuminati + Dark Forces with Project Camelot’s Kerry Cassidy

War Against Illuminati + Dark Forces with Project Camelot’s Kerry Cassidy

Conspiracy fact and witnesses to the dark side of aliens, reptilians, illuminati and personal links to the pleiadians are all discussed with Kerry Cassidy of Project Camelot. We discuss the silver star, illuminati, and many of the connections between the higher orders of influence and both light and darkness. The vatican connections to illuminati, chakra work, and whistleblowers alike are examined with the veteran interviewer in the uncensored talk with Sean Stone for Buzzsaw.

GUEST BIO:
Kerry Lynn Cassidy is the CEO and co-Founder of Project Camelot. Kerry has a BA in English with graduate work in Sociology, an MBA certificate from the UCLA Anderson Graduate School of Management, and was competitively selected to attend a year of film school at the UCLA Extension Short Fiction Film Program as one of their first “hyphenates”: a writer-director-producer.
Kerry conducts interviews documenting the testimony of whistleblowers with above top secret clearances as well as researchers and experiencers covering all aspects of reality both on and off planet. She speaks at conferences around the world on the subjects of ETs, the Illuminati agenda, mind control, the matrix, prophecies, Kundalini activation and more. Kerry is an intuitive and spent years researching the occult and studying Eastern philosophy. While spending dedicated time in meditation, she linked her chakras in her 20s and has had multiple samadhi experiences since then.
Kerry Cassidy is also a well known radio talk show host, hosts events and speaks around the world. She writes groundbreaking articles and commentary on current events from a Big Picture standpoint involving black projects, secret space and conspiracies.

ADD’L LINKS:
http://projectcamelotportal.com/
http://thelip.tv/show/buzzsaw/
Buzzsaw Full Episodes:
https://www.youtube.com/watch?v=Fs7mc…
Buzzsaw Short Clips Playlist:
https://www.youtube.com/watch?v=7GJZk…
https://www.facebook.com/EnterTheBuzz…
https://www.facebook.com/thelip.tv
http://www.youtube.com/theliptv

EPISODE BREAKDOWN:
00:01 Welcome to Buzzsaw.
00:30 Introducing Kerry Cassidy.
01:00 What was the inspiration behind Project Camelot?
07:00 The last pope?
09:00 Illuminati, freemasons, templars, and dark magicians.
13:30 Whistleblowing, the reptilian agenda. and the many different reptilian races.
21:00 The war between humans and the various extraterrestrial factions.
28:30 Truth in certain sci-fi features and black magic in Hollywood.
42:10 Thanks and goodbye.

DEA Gets Unchecked Access To Call Records; Taught To Lie About Where They Got Them

DEA Gets Unchecked Access To Call Records; Taught To Lie About Where They Got Them

nsa_eyeShortly after the Snowden leaks began exposing the NSA’s massive collection efforts, the New York Times uncovered the DEA’s direct access to AT&T telecom switches (via non-government employee “analysts” working for AT&T), from which it and other law enforcement agencies were able to gather phone call and location data.

Unlike the NSA’s bulk records programs (which are limited to holding five years worth of data), the Hemisphere database stretches back to 1987 and advertises instant access to “10 years of records.” And unlike the NSA’s program, there’s not even the slightest bit of oversight. All law enforcement needs to run a search of the Hemisphere database is an administrative subpoena — a piece of paper roughly equivalent to calling up Hemisphere analysts and asking them to run a few numbers. Administrative subpoenas are only subject to the oversight of the agency issuing them.

It’s highly unlikely these administrative subpoenas are stored (where they could be accessed as public records) considering the constant emphasis placed on parallel construction in the documents obtained by Dustin Slaughter of MuckRock — documents it took the DEA ten months to turn over.

Unlike the documents obtained by the New York Times (possibly inadvertently), these do contain a few redactions, including some apparent success stories compiled at the end of the presentation. But like the earlier documents, the documents show that the DEA and law enforcement have unchecked access to a database that agents and officers are never allowed to talk about — not even inside a courtroom.

It is expected that all Hemisphere requests will be paralleled with a subpoena for CDRs from the official carrier for evidentiary purposes.

It’s spelled out more explicitly on a later slide, listed under “Official Reporting.”

DO NOT mention Hemisphere in any official reports or court documents.

Judging from the request date, it would appear that this version of the Hemisphere presentation possibly precedes the New York Times’ version. However, this one does not name the cooperating telco, although that appears to be a deliberate choice of the person writing the presentation, rather than due to redaction. At one point the document declares Hemisphere can access records “regardless of carrier,” but later clarifies that it will only gather info that crosses certain telecom switches — most likely AT&T’s. Additional subpoenas will be needed to gather info from other carriers, as well as to obtain subscriber information linked to searched numbers. This small limitation plays right into the DEA’s insistence that HemispheDEAre be “walled off” from defendants, court systems and the public.

If exigent circumstances make parallel construction difficult, Hemisphere analysts (non-government liaisons within the telco) will “continue to work with the investigator throughout the entire prosecution process in order to ensure the integrity of
Hemisphere and the case at hand.” Analysts are allowed to advise investigators on report writing, presentations to prosecutors and issues occurring during the trial phase. The word “integrity” seems out of place when it describes non-government employees assisting government agencies in hiding the origin of evidence from other government agencies.

Cross-referencing what’s been redacted in this one with the unredacted document published earlier, it appears as though the DEA is trying to (belatedly) hide the fact that its Hemisphere can also search IMSI and IMEI data (for wireless connections). Although this document states (after a long redaction) that Hemisphere does not collect subscriber information, that’s only partially true. As of July 2012, subscriber information for AT&T customers can be obtained from the database. This information may have been redacted or it may be that this presentation pre-dates this added ability.

What this shows is that the DEA has access to loads of information and a policy of “parallel construction in all things.” Tons of other government agencies, including the NSA, FBI and CIA are funneling information to the DEA and instructing it to hide the origin. The DEA then demands law enforcement agencies around the nation to do the same thing. This stacks the deck against defendants, who are “walled off” from the chain of evidence, preventing them from challenging sources, methods or the integrity of the evidence itself.

HEMISPHERE DOCUMENT 

via TechDirt.com

Blackwater Threatens to Kill State Dept Investigator, Trying to Investigate

Blackwater Threatens to Kill State Dept Investigator, Trying to Investigate

blackwater_xe_academiEven the mightiest have their come-uppance when their internal logic spews out destructiveness returning on the self—“blowback” in a way perhaps not seen before. I refer to James Risen’s extraordinary article in the New York Times, “Before Shooting in Iraq, a Warning on Blackwater,” (June 30), in which the customary meaning of “blowback” refers to policies, e.g., the invasions of Iraq and Afghanistan, the confrontation with Russia over Ukraine, the “pivot” of military power to the Pacific intent on the encirclement, containment, isolation of China, produce unintended, or if intended, still unwelcome, consequences for the initiator of the policy or action.

Thus: Iraq, out-of-control (from the US standpoint, a raging civil war negating massive intervention and alerting the world to America’s hegemonic purposes); Afghanistan, original support of the Taliban against the Soviet Union, resulting in their material strengthening now turned against the US, endangering its power-position in the region; use of Ukraine as a basis for bringing NATO forces to the Russian border, now an overreach which may disrupt the EU and weaken US dominance over it; and blatant confrontation with China, both military and trade, with potential for war leading to nuclear annihilation. The status and role of world policeman is losing its blackjack, its reputation as global bully being challenged through the rise of multiple power-centers and industrial-commercial-financial patterns no longer defined, supervised, indeed controlled, by American global interests and military implementation.

That is blowback in its familiar guise. Less so, the self-chosen instruments of repression spilling out of behemoth’s mouth because America’s dependence on repression to secure its aims makes it dependent as well on the executors of repression, in this case, given the extreme stress on privatization (the core of the monster’s functional existence), Blackwater at your service, a private army on hire to USG for pursuit of the dirty work, deemed necessary, yet, delegated to official forces, the cause of embarrassment and shame. Browbeating indigenous populations, with an overwhelming swagger and display in the grand tradition of conquerors, in addition to protecting representatives of the conquerors, is a mission worthy, as here, of billion dollar contracts to the private militias (euphemism: “security guards”) as insurance the military victory and occupation will hold.

Here Blackwater is, and is treated as, inseparable from the intervention (read: conquest) itself, at times assisting in the fighting on an informal basis—it has not yet been invited to join NATO(!)—but more to the point, the intimidating presence in the post-military phase, as though instilling the message: You Iraqis think the military is bad, well don’t mess around, for far worse awaits you, we former Navy SEALS know nothing can touch us. Our motto might as well be, A Law Unto Ourselves, even USG—beyond the status-of-forces agreement it forced your government to sign—afraid of us. Blowback: the cancer in the bowels of behemoth rapidly spreading to the extremities, spinal column, brain. Soon we shall all be made over in the image of Blackwater, or rather, as Blackwater would like to see, as its actions show, America become, a nation subservient to its thugs, extolling martial glory for its own sake and for the sake of global dominance. Authoritarianism once off the ground knows no limits and demands the complete adherence of its subjects. America has lived with CIA for decades; Blackwater is icing on the cake.

***

Before turning to the evidence contained in James Risen’s article, it is important to see how events from the past are converging on the present. His credentials as a whistleblower are borne out by his previous record (exposure of CIA dirty tricks, in his book State of War, with respect to Iran’s nuclear program) and current circumstances (he faces a possible jail sentence for refusing to disclose, from that account, the identity of an anonymous source). In the Bush doghouse for exposing the use of warrantless wire taps in 2005, and now, Obama contemplating more serious action, jail time for not complying with a DOJ subpoena, possibly leading to an Espionage Act prosecution, for which Obama excels over all of his predecessors combined (liberals, of course, furiously denying the sordid record), Risen not only stares down his persecutors, Obama, Holder, DOJ, but here presents an exposure in some ways more damning of US baseness from the top down, nurturing a murderous nest in the structure of government.

As for the administration hounding, Jonathan Mahler’s New York Times article, “Reporter’s Case Poses Dilemma for Justice Dept.,” (June 27), implies that Risen’s refusal to be intimidated is causing Obama and Holder second thoughts about pushing for his imprisonment. According to John Rizzo, CIA’s acting general counsel, Bush people wanted State of War kept off the market—too late, however. Risen then was subpoenaed to testify against the suspected leaker—and refused. “More than six years of legal wrangling,” in what Mahler terms “the most serious confrontation between the government and the press in recent history,” is coming to a head. Risen “is now out of challenges. Early this month, the Supreme Court declined to review his case, a decision that allows prosecutors to compel his testimony.”

But The Times, in defending its own man, cannot strongly protest, lest it antagonize the White House. Yes, Obama appears to be in a bind: “Though the court’s decision looked like a major victory for the government, it has forced the Obama administration to confront a hard choice. Should it demand Mr. Risen’s testimony and be responsible for a reporter’s being sent to jail? Or reverse course and stand down, losing credibility with an intelligence community that has pushed for the aggressive prosecution of leaks?” If Obama and USG were truly democratic (small “d”), there should not be a choice but only one course of action, moreover reigning in the “intelligence community” serving under their control.

The reporter, I believe reflecting the paper’s view, however, credits the Obama administration with actually weighing alternatives and being capable of making moral choices: “The dilemma comes at a critical moment for an administration that has struggled to find a balance between aggressively enforcing laws against leaking and demonstrating concern for civil liberties and government transparency.” What balance? What concern? Everything points the other way, on both civil liberties (e.g., due process and habeas corpus rights for detainees) and government transparency (simply, a thick protective shield in place, symbolized by the high art of redaction—and, as with Blackwater’s killing sprees, the refusal or half-heartedness about prosecution). Its reporter’s back against the wall, NYT ignores the Espionage Act prosecutions of whistleblowers.

Mahler succinctly describes the reporting: “The failed C.I.A. action at the heart of Mr. Risen’s reporting was intended to sabotage Iran’s nuclear weapons program. Intelligence officials assigned a former Russian scientist who had defected to the United States to deliver a set of faulty blueprints for a nuclear device to an Iranian scientist. But the Russian scientist became nervous and informed the Iranians that the plans were flawed.” One readily appreciates the dangers to the National Security State, especially revelations of the stupidity and dangerousness of its crown jewel, CIA, posed by investigative journalism. The Times, to its everlasting shame, bowed to Coldoleezza Rice’s request to withhold publication of the article. As a Times spokesperson later declared, “We weighed the government’s concerns and the usual editorial considerations and decided not to run the story.” Hence, James Risen—enemy of National Security; he “broke the story” later in State of War. Yet Bush is not the only culprit in this story; Obama ordered two additional subpoenas to force Risen to testify, his DOJ going after him hammer-and-tongs: “After a trial court largely quashed his third subpoena [the first under Bush] in late 2010, the Justice Department successfully challenged the ruling in a federal appeals court, arguing that the First Amendment does not afford any special protections to journalists.” Enough said about the dedication to civil liberties and freedom of the press: “The administration then urged the Supreme Court not to review Mr. Risen’s case.”

***

iraq-blackwater-civilians-killedI have already discussed the mass killings in Nisour Square, Baghdad, in a previous article. Now we learn that this was part of a pattern in Blackwater’s behavior—again, Risen’s reporting. Even for one who is a seasoned critic, it is painful for me to write about. Organized thuggery knows no limits particularly when working for the highest authority, immunity from punishment worn as a badge of honor, as meanwhile government officials hide their eyes. Risen writes, “Just weeks before Blackwater guards fatally shot 17 civilians in Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: ‘that he could kill’ the government’s chief investigator and ‘no one could or would do anything about it as we were in Iraq,’ according to department reports.” A private contractor threatens the life of a State Department investigator! No reprisal, punishment, cancellation of the contract, not even disclosure of the threat—yet Blackwater still in place years later, as part of the silence on atrocities in the Obama-Hillary era.

Those 17 killed are on America’s hands, bloody hands. There was a clear warning about what to expect: “After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created ‘an environment full of liability and negligence.’” Even more outrageous, Risen notes, the investigators become the criminals gumming up the security works: “American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country, according to the reports.”

Jean Richter, lead investigator, wrote, in a memo to the State Department only weeks prior to Nisour Square: “’The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves. Blackwater contractors saw themselves as above the law…. ‘hands off’ [management meant that] the contractors, instead of Department officials, are in command and in control.’” Now, nearly seven years later, four Blackwater guards are on trial, facing, if ever convicted, watered down charges, this being “ the government’s second attempt to prosecute the case in an American court [I wonder how serious the effort under Holder and Obama] after previous charges against five guards were dismissed in 2009.” Much of the time this is on Obama’s watch, yet, “despite a series of investigations in the wake of Nisour Square, the back story of what happened with Blackwater and the embassy in Baghdad before the fateful shooting has never been fully told.”

So much for transparency, civil liberties, and prosecuting the crimes of a predecessor (the cardinal rule of presidents, at least this one, cover-up WAR CRIMES past and present, a solemn command of the National Security State). Silence and deniability, in all matters large and small, characterize the responses of USG and private principals: “The State Department declined to comment on the aborted investigation. A spokesman for Erik Prince, the founder and former chief executive of Blackwater, who sold the company in2010, said Mr. Prince had never been told about the matter.” The $1B contract itself testifies to the fusion of patriotism, secrecy, repression, and yes, corporate profit: “After Mr. Prince sold the company, the new owners named it Academi. In early June, it merged with Triple Canopy, one of its rivals for government and commercial contracts to provide private security. The new firm is called Constellis Holdings.” Like war, private security stands to make a killing (pardon the pun), no doubt in flight from the original name for damage-control and public-relations purposes.

Previous to Nisour Square (Sept. 16, 2007) Blackwater guards “acquired a reputation…for swagger and recklessness,” but complaints “about practices ranging from running cars off the road to shooting wildly in the streets and even killing civilians typically did not result in serious action by the United States or the Iraqi government.” After firing in the Square, there was closer scrutiny, the Blackwater claim that they were fired on even US military officials denied, and “[f]ederal prosecutors later said Blackwater personnel had shot indiscriminately with automatic weapons, heavy machine guns and grenade launchers.” To no avail, given the symbiotic relationship between the company and the government. In fact, Blackwater had itself been run by Prince as a nation in microcosm, its people shortly before Nisour Square gathered by him at company headquarters in Moyock, North Carolina and made to “swear an oath of allegiance” like the one required of enlistees in the US military. They were handed copies of the oath, which, after reciting the words, were told to sign.

The State Department investigation into Blackwater in Iraq, which began Aug. 1, 2007 and was slated for one month, led early to the “volatile” situation (including the death threat), our knowledge coming from “internal State Department documents” furnished “to plaintiffs in a lawsuit against Blackwater that was unrelated to the Nisour Square shootings,” seemingly by accident then and fleshed out by Risen. In that month—or that part of it before being forced to leave– the investigators discovered “a long list of contract violations by Blackwater,” staffing changes of security details “without State Department approval,” reducing the number of guards on details, “storing automatic weapons and ammunition in their private rooms, where they were drinking heavily and partying with frequent female visitors,” and, for many, failing “to regularly qualify on their weapons” or “carrying weapons on which they had never been certified” nor “authorized to use.” Extravagance for mayhem abroad, less than peanuts for critical needs at home, education, health care, employment, beyond the means or reach of Imperial grandeur as the national obsession.

In addition to “overbilling the State Department by manipulating its personnel records, using guards assigned to the State Department contract for other work and falsifying other staffing data on the contract,” (no wonder the investigators’ poor reception by Blackwater’s resident head in Iraq), one of its affiliates forced “third country nationals” who did the dirty work at low wages “to live in squalid conditions, sometimes three to a cramped room with no bed,” according to the investigators’ report. Their conclusion: “Blackwater was getting away with such conduct because embassy personnel had gotten too close to the contractor.”

Ah, the denouement; we have a name to go with the face of the project manager who threatened Richter’s life, Daniel Carroll, who said he could kill him without anything happening to himself “as we were in Iraq” (this was witnessed by Donald Thomas, the other investigator), and Richter, in his memo to the Department stated: “I took Mr. Carroll’s threat seriously. We were in a combat zone where things can happen unexpectedly, especially when issues involve potentially negative impacts on a lucrative security contract.” Nicely put, and corroborated by Thomas, who wrote in a separate memo that “others in Baghdad had told the two investigators to be ‘very careful,’ considering that their review could jeopardize job security for Blackwater personnel.” The wonder perhaps is that Richter and Thomas were not prosecuted under the Espionage Act for spoiling the show. It didn’t matter. No one at State listened.

The two men were ordered to leave (Aug 23), and “cut short their inquiry and returned to Washington the next day.” Finally, on Oct. 5, after the Nisour Square scandal, State Department officials responded to Richter’s “August warning,” and took statements from him and Thomas about “their accusations of a threat by Mr. Carroll, but took no further action.” A special panel convened by Rice on Nisour Square “never interviewed Mr. Richter or Mr. Thomas.” The official who led the panel “told reporters on Oct. 23, 2007, that the panel had not found any communications from the embassy in Baghdad before the Nisour Square shooting that raised concerns about contractor conduct.” Voila, vanished in thin air. This State Department officer deserves the last word: “We interviewed a large number of individuals. We did not find any, I think, significant pattern of incidents that had not—that the embassy had suppressed in any way.” And my last word: fascism. Beyond all structural-cultural-societal considerations about wealth-concentration, industrial-financial consolidation, foreign expansion through preponderant power and the spirit of militarism, the rampaging privatization with government consent witnessed here, which has wreaked havoc on another people, only to be covered over by the state, aka, the National Security State, disregarding its Constitutional protections to the individual, as in sponsoring massive surveillance, is enough for me to satisfy the working definition of that single word.

via Norman Pollack has written on Populism. His interests are social theory and the structural analysis of capitalism and fascism. He can be reached at [email protected].

NSA and FBI Duck Dive Dodge Accountabilty, Absolute Figures on Search

NSA and FBI Duck Dive Dodge Accountabilty, Absolute Figures on Search

NSA says it has no idea how much US info it collects, but FBI searches for it so much it can’t count how many times.

 

NSAgoogleThe blowback against the National Security Agency has long focused on the unpopular Patriot Act surveillance program that allows the NSA to vacuum up billions of US phone records each year. But after a rush of attention this week, some much deserved focus is back on the surveillance state’s other seemingly limitless program: the warrantless searches made possible by Section 702 of the Fisa Amendments Act, which allows the NSA to do all sorts of spying on Americans and people around the world – all for reasons that, in most cases, have nothing to do with terrorism.

The long awaited draft report from the independent Privacy and Civil Liberties Board (PCLOB) on this subject was finally released Tuesday night, and it gives Americans a fairly detailed look unclassified at how the NSA spies through its notorious Prism program – and how it snoops “upstream” (a euphemism for the agency’s direct access to entire internet streams at telecoms like AT&T). The board issued a scathing report on the Patriot Act surveillance months ago, but oddly they went the opposite route this time around.

While many of the details are interesting, the board’s new report recommends no systematic changes to the several disturbing privacy issues covered therein. The Electronic Frontier Foundation (my former employer) issued a scathing PCLOB review late Tuesday night, calling the report “legally flawed and factually incomplete” and saying it ignored the “essential privacy problem … that the government has access to or is acquiring nearly all communications that travel over the Internet.”

As usual, it’s the Edward Snowden revelations that give context to all the snooping – and provide the impetus to keep pushing for real reform. Some 36 hours before the latest PCLOB report was made public, the Washington Post’s Ellen Nakashima and Barton Gellman disclosed previously unreleased Snowden documents showing that true scope of “702”-style information sweeps:

Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information from individuals ‘concerning’ all but four countries on Earth.

As the Post reports, the Foreign Intelligence Surveillance Court’s interpretation of the the Fisa Amendments Act is so broad, it “could allow for surveillance of academics, journalists and human-rights researchers.”

Fisa Amendments Act surveillance also includes scanning the emails of Americans never even accused of a crime. It’s the Snowden revelations that originally led the New York Times to report last year any conversation you’ve ever had with someone outside the country may be fair game under the act, as the NSA “is searching the contents of vast amounts of Americans’ e-mail and text communications into and out of the country who mention information about foreigners under surveillance.”

Perhaps in an attempt to pre-empt the PCLOB report, Director of National Intelligence James Clapper finally just released what he promised Sen Ron Wyden months ago: the number of warrantless searches by the US government on American communications in its vast databases of information collected under the Fisa Amendments Act. This is the second giant problem with 702 surveillance. Wyden refers to these as “backdoor” searches since they’re performed using data supposedly collected for “foreign intelligence” purposes – even though they still suck up huge amounts of purely US information. And it’s exactly the type of search the House overwhelmingly voted to ban in its surprise vote two weeks ago.

The NSA conducted “backdoor” searches 198 times in 2013 (and another 9,500 for internet metadata on Americans). Curiously, the CIA conducts far more warrantless searches of American information in the NSA databases than the NSA itself – almost 10 times more. But the FBI was the worst culprit, querying data on Americans so many times it couldn’t even count. The DNI left it at this: “the FBI believes the number of queries is substantial.”

The FBI has always been the NSA’s silent partner in all its surveillance and has long been suspected of doing the dirty work on Americans’ data after it’s been collected by NSA.

Wyden, who has for years repeatedly pushed for this information to be released to the public, responded:

When the FBI says it conducts a substantial number of searches and it has no idea of what the number is, it shows how flawed this system is and the consequences of inadequate oversight. This huge gap in oversight is a problem now, and will only grow as global communications systems become more interconnected.

The PCLOB also went on to reveal in its report that the FBI can search the vast Prism database for crimes that have nothing to do with terrorism, or even national security. Oh, and how many US persons have had their data collected through Prism and other 702 programs? That government has no idea.

Unfortunately, the PCLOB chickened out of making any real reform proposals, leading Politico’s Josh Gerstein to point out that the Republican-controlled House already endorsed more aggressive reforms than the civil liberties board. More bizarrely, one of the holdouts on the panel for calling for real reform is supposed to be a civil liberties advocate. The Center for Democracy and Technology’s vice president, James Dempsey, had the chance to side with two other, more liberal members on the five-person panel to recommend the FBI get court approval before rummaging through the NSA’s vast databases, but shamefully he didn’t.

Now, as the Senate takes up a weakened House bill along with the House’s strengthened backdoor-proof amendment, it’s time to put focus back on sweeping reform. And while the PCLOB may not have said much in the way of recommendations, now Congress will have to. To help, a coalition of groups (including my current employer, Freedom of the Press Foundation) have graded each and every representative in Washington on the NSA issue. The debate certainly isn’t going away – it’s just a question of whether the public will put enough pressure on Congress to change.

via Trevor Timm at TheGuardian.com

 

Drones for Thought – Taking UAV Technology to New Heights

Drones for Thought – Taking UAV Technology to New Heights

killer-uavThe history of pilotless aircraft in the United States military stretches back to the days of the Wright brothers. It’s difficult to describe any good that emerges from warfare, but many modern technological advancements — computers, zippers, microwaves — can be traced back to conflicts of a bygone era. Today unmanned aerial vehicles are being used by a whole slew of people, the U.S. Department of Defense being just one primary example. While drones have been used routinely to support or undertake lethal force abroad for over a decade, their domestic applications are just now being given more serious consideration. The capabilities and contributions of UAVs have, up until recently, been propelled more or less exclusively by the defense community. UAV technology may currently be associated with what some would consider secretive and nefarious militarism, but in examining the range of practical, commercial applications we can only hope that drone technology will begin to move away from the dark side.   

President Obama’s approach to counterterrorism has been marked by his embrace of drone technology to target terrorist operatives. But they’ve come a long way since their first strike operations: drone backpacks are now used by soldiers, and Predator drones come equipped with even more powerful warheads. U.S. DOD spending on drones increased from $284M in 2000 to $3.3B in October of 2012. Small surveillance drones, called Cicadas, are now being released from balloons to collect data on the ground in Iraq. In short, the military has a seemingly infinite range of uses for unmanned aerial vehicles, large and small. And the scope of drone missions only continues to expand, as the technology necessary to program and operate them becomes at once more commonplace and versatile. Over the next decade, the Pentagon anticipates that the number of “multirole” UAVs (those capable of both spying and striking) will nearly quadruple.

As of October 2013, the Federal Aviation Administration had issued 285 clearance certificates for drones inside the United States. Under pressure from the Unmanned Systems Caucus (or drone lobby) the Department of Homeland Security has accepted eight Predator drones for use along the U.S.-Canada and U.S.-Mexico borders. The FAA is set to further open skies to commercial drones by 2015, allowing civilians to finally explore and expand upon the uses of UAV technology. But even with the law by their side, can civilian companies ever hope to utilize drones to the extent in which they are employed by the military? Many recognize the civil potential of flying robots, but recognize that with certain valuable contributions also comes the possibility of tighter law enforcement and increased government surveillance.

The dualistic nature of drones is being explored by hobbyists and venture capitalists alike. Mark Zuckerberg of Facebook is even developing a program that will employ drones and satellite internet to deliver internet to disenfranchised communities throughout the world. While this probably speaks to Zuckerberg’s opportunism (and his desire to compete in the marketplace against Google’s Loon Project and HughesNet Internet) that isn’t to say that people in underserved communities don’t stand to benefit. The U.S. government already uses drones to protect endangered wildlife species, like the sandhill crane, and researchers in Indonesia and Malaysia are also using unmanned aerial devices to monitor the activity of similarly threatened orangutan populations. UAV systems are emerging as key tools in agricultural innovation and the monitoring of natural resources. Search and rescue missions, 3-D mapping and surveying projects, and hurricane tracking projects are also being carried out by UAVs. With unmanned aircraft, it seems the sky’s the limit for civil and commercial usage.

But the business of drones still comes with plenty of risks. The American Civil Liberties Union has warned of a “dystopian future” in which “mass, suspicionless searches of the general population” are the norm. Given the history of drones as advanced tools of the government and military, this doesn’t seem like an empty threat. And for now, the law still stands in the way of any real development on the commercial end. Despite the fact that many ideas for drones, from the delivery of Amazon parcels to Domino’s pizzas, have been suggested, the military still holds the key to their innovation from an American standpoint. Their function as a militaristic tool remains at the forefront of their continued growth, resulting in large spending increases for advanced cameras, sensors, and systems with attack capabilities. But the integration of drone technology into domestic airspace by law enforcement — and later, by corporations — seems inevitable. As technological improvements continue to catapult the UAV industry into the future, the true beneficiaries of these developments remain to be seen.

Raw List of NSA Nicknames and Codewords

Raw List of NSA Nicknames and Codewords

istock_000004093101small

Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets.

NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA they usually consist of two separate words, with the first word selected from alphabetical blocks that are assigned to different agencies by the Joint Staff. Usually, nicknames are printed using all capital letters.

CODEWORDS are always classified and always consist of a single word. Active codewords, or their three-letter abbreviations, which identify a classification compartment always need to be shown in the classification or banner line. Normally, codewords are printed using all capital letters.

Due to very strict secrecy, it’s not always clear whether we see a nickname or a codeword, but terms mentioned in public sources like job descriptions are of course unclassified nicknames.

Please keep in mind that a listing like this will always be work in progress (this list has been copied on some other websites and forums, but only this one is being updated frequently!).

See also the lists of Abbreviations and Acronyms and GCHQ Nicknames and Codewords

A

ACIDWASH – Covert access point for a mobile phone network in Afghanistan

ACORN – Retired SIGINT product codeword

ACCORDIAN – Type 1 Cryptographic algorithm used in a number of crypto products

AETHER – ONI tool “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns”

AGILITY – NSA internet information tool or database

AGILEVIEW – NSA internet information tool or database

AIRGAP – Database which deals with priority DoD missions

AIRHANDLER – NSA-G operations center for producing intelligence from Afghanistan

AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO)

AIRWOLF – ?

ALAMITO – The mission of Mexico at the United Nations in New York

ALPHA – Retired SIGINT Exchange Designator for Great Britain

ALTEREGO – A type of Question-Focused Dataset based on E.164

AMBERJACK – SIGINT/EW collection and exploitation system

AMBLE – Retired SIGINT product codeword

AMBULANT (AMB) – SI-ECI compartment related to the BULLRUN program

ANCHORY – NSA software system which provides web access to textual intelligence documents

ANGRYNEIGHBOR – Family of radar retro-reflector tools used by NSA’s TAO division

APALATCHEE – The EU mission in New York

APERIODIC – SI-ECI compartment related to the BULLRUN program

APEX – IP packet reconstruction tool(?)

APPLE1 – Upstream collection site

APSTARS – NSA tool that provides “semantic integration of data from multiple sources in support of intelligence processing”

ARKSTREAM – Implant used to reflash BIOS, installed by remote access or intercepted shipping

ARTIFICE – SSO corporate partner (foreign?)

AUTOSOURCE – NSA tool or database

AQUACADE – A class of SIGINT spy satellites (formerly RHYOLITE)

AQUADOR – Merchant ship tracking tool

ARCA – SIGINT Exchange Designator for ?

ARGON – Satellite mapping program

ARTIFICE – SSO corporate partner under the STORMBREW program

ASPHALT – Project to increase the volume of satellite intercepts at Menwith Hill Station

ASPHALT-PLUS – See above

ASSOCIATION – NSA analytical tool or database

ATALANTA – EU anti-piracy operation

ATLAS – CSEC database

AUNTIE – SI-ECI compartment related to the BULLRUN program

AUTO ASSOCIATION – Second party database

B

BAMBOOSPRING – ?

BANANAGLEE – Software implant that allows remote Jetplow firmware installation

BANISTER – The Columbian trade bureau in New York

BANYAN – NSA tactical geospatial correlation database

BASECOAT – Program targeting the mobile phone network on the Bahamas

BASTE – Retired SIGINT product codeword

– Type 1 Block cipher algorithm, used with many crypto products

BEACHHEAD – Computer exploit delivered by the FERRETCANON system

BEAMER – ?

BELLTOPPER – NSA database

BELLVIEW – SIGINT reporting tool

– List of personnel cleared for access to highly sensitive information or operations

BINOCULAR – Former NSA intelligence dissemination tool

BIRCHWOOD – Upstream collection site

BLACKBOOK – ODNI tool for large-scale semantic data analysis

BLACKFOOT – The French mission at the United Nations in New York

BLACKHEART – Collection through FBI implants

BLACKMAGIC – NSA database or tool

BLACKPEARL – NSA database of survey/case notations(?)

BLACKWATCH – NSA reporting tool

– Program for intercepting phone and internet traffic at switches in the US (since 1978)

BLINDDATE – Hacking tools for WLAN collection, plus GPS

BLUEANCHOR – Partner providing a network access point for the YACHTSHOP program

BLUEFISH (BLFH) – Compartment of the KLONDIKE control system

BLUEZEPHYR – Sub-program of OAKSTAR

BOOTY – Retired SIGINT product codeword

– DNI and DNR metadata visualization tool

BOURBON – Joint NSA and GCHQ program for breaking Soviet encryption codes (1946-?)

BROKENRECORD – NSA tool

BROKENTIGO – Tool for computer network operations

BROADSIDE – Covert listening post in the US embassy in Moscow

BROOMSTICK – ?

BRUNEAU – Operation against the Italian embassy in Washington DC using LIFESAVER techniques

BRUTUS – Tool or program related to MARINA

BUFFALOGREEN – The name ORANGECRUSH was known to Polish partners

BULLDOZER – PCI bus hardware implant on intercepted shipping

– An NSA COI for decryption of network communications

BULLSEYE – NSG High-Frequency Direction-Finding (HF-DF) network (now called CROSSHAIR)

(BYE) – Retired SCI control system for overhead collection systems (1961-2005)

BYZANTINE – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

BYZANTINE ANCHOR (BA) – A group of Chinese hackers which compromised multiple US government and defense contractor systems since 2003

BYZANTINE CANDOR (BC) – A group of Chinese hackers which compromised a US-based ISP and at least one US government agency

BYZANTINE FOOTHOLD (BF) – A group of Chinese hackers who attacked various international companies and internet services providers

BYZANTINE HADES (BH) – A concerted effort against Chinese hackers who attacked the Pentagon and military contractors. Probably renamed to the LEGION-series

C

CADENCE – NSA database with tasking dictionaries

CAJABLOSSOM – Automated system for analysing and profiling internet browsing histories

CALYPSO – Remote SATCOM collection facility

CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets

– Class of COMINT spy satellites (1968-1977)

CANOE – Retired SIGINT product codeword

CANNON LIGHT – Counterintelligence database of the US Army

CAPRICORN – (former?) database for voice data

CAPTIVATEDAUDIENCE – Computer implant plug-in to take over a targeted computer’s microphone and record conversations taking place near the device

CARBOY – Second Party satellite intercept station at Bude, England

CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels

CARILLON – NSA high performance computing center, since 1976 made up of IBM 360s and later four IBM 3033s

CASport – NSA user authorization service

– Computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community

CENTER ICE – Data center for the exchange of intelligence regarding Afghanistan among the members of the 14-Eyes/SSEUR

CENTERMASS – NSA tool or database

CERF CALL MOSES1 – Contact Event Record Format – for certain telephony metadata

CHALKFUN – Analytic tool, used to search the FASCIA database

CHASEFALCON – Major program of the Global Access Operations (GAO)

CHEER – Retired SIGINT product codeword

CHESS – Compartment of TALENT KEYHOLE for the U-2 spy plane

CHEWSTICK – NSA tool or database

CHIMNEYPOOL – Framework or specification of GENIE-compliance for hardware/software implants

CHIPPEWA – Some communications network, involving Israel

CHUTE – Retired SIGINT product codeword

CIMBRI – Probably a metadata database

CINEPLEX – NSA tool or database

CLASSIC BULLSEYE – Worldwide ocean SIGINT surveillance system (1960’s-?)

CLEVERDEVICE – Upstream collection site

CLOUD – NSA database

COASTLINE – NSA tool or database

COBALTFALCON – Sub-program of OAKSTAR

COBRA FOCUS – NSA-G operations center for producing intelligence from Iraq

COGNOS – NSA tool or database

CORDOBA – Type 2 Cryptographic algorithm used in a number of crypto chips

COMBAT SENT – Reconaissance operation

COMMONDEER – Computer exploit for looking whether a computer has security software

COMMONVIEW – NSA database or tool

CONFIRM – NSA database for personell access

CONJECTURE – Network compatible with HOWLERMONKEY

CONTRAOCTAVE – NSA telephony tasking database Used to determine ‘foreigness’

CONVEYANCE – Voice content ingest processor

COPILOT – System that automatically scans digital data for things like language, phone and creditcard numbers and attachments

COPSE – Retired SIGINT product codeword

CORALINE – NSA satellite intercept station at Sabena Seca at Puerto Rico (closed)

CORALREEF – Database for VPN crypto attack data

– A series of photographic surveillance satellites (1959-1972)

CO-TRAVELER – Set of tools for finding unknown associates of intelligence targets by tracking movements based upon cell phone locations

COTTONMOUTH (CM) – Computer implant devices used by NSA’s TAO division

COTTONMOUTH-I (CM-I) – USB hardware implant providing wireless bridge into target network and loading of exploit software onto target PCs, formerly DEWSWEEPER

COTTONMOUTH-II (CM-II) – USB hardware host tap provides covert link over USP into target’s network co-located with long haul relay; dual-stacked USB connector, consists of CM-I digital hardware plus long haul relay concealed in chassis; hub with switches is concealed in a dual stacked USB connector and hard-wired to provide intra-chassis link.

COTTONMOUTH-III (CM-III) – Radio Frequency link for commands to software implants and data infiltration/exfiltration, short range inter-chassis link within RJ45 Dual Stacked USB connector

COURIERSKILL – NSA Collection mission system

COWBOY – The DICTIONARY computer used at the Yakima station of ECHELON

CRANKSHAFT – Codename for Osama bin Laden

CREAM – Retired SIGINT product codeword

CREDIBLE – Transport of intelligence materials to partner agencies

CREST – Database that automatically translates foreign language intercepts in English

CRISSCROSS – Database of telecommunications selectors

CROSSBEAM – GSM module mating commercial Motorola cell with WagonBed controller board for collecting voice data content via GPRS (web), circuit-switched data, data over voice, and DTMF to secure facility, implanted cell tower switch

CROSSHAIR – NSG High-Frequency Direction-Finding (HF-DF) network (formerly BULLSEYE)

CROSSBONES – Analytic tool

CRUMPET – Covert network with printer, server and desktop nodes

CULTWEAVE – Smaller size SIGINT database

CYBERTRANS – A common interface to a number of underlying machine translation systems

CYCLONE Hx9 – Base station router, network in a box using Typhon interface

D

DAFF – Codeword for products of satellite imagery

DAMEON – Remote SATCOM collection facility

DANCINGOASIS (DGO) – SSO program collecting data from fiber optic cables between Europe and the Far East (since 2011)

DANDERSPRITZ – Software tool that spoofs IP and MAC addresses, intermediate redirector node

DANGERMOUSE – Tactical SIGINT collecting system for like cell phone calls

DARDANUS – Remote SATCOM collection facility

DAREDEVIL – Shooter/implant as part of the QUANTUM system

DARKTHUNDER – SSO Corporate/TAO Shaping program

DARKQUEST – Automated FORNSAT survey system

DAUNT – Retired SIGINT product codeword

DECKPIN – NSA crisis cell activated during emergencies

DEEPDIVE – An XKEYSCORE related method

DEITYBOUNCE – Provides implanted software persistence on Dell PowerEdge RAID servers via motherboard BIOS using Intel’s System Management Mode for periodic execution, installed via ArkStream to reflash the BIOS

DELTA – Former SCI control system for intercepts from Soviet military operations

DENIM – Retired SIGINT product codeword

DESPERADO – NSA software tool to prepare reports

DEWSWEEPER – Technique to tap USB hardware hosts

DIKTER – SIGINT Exchange Designator for Norway

DINAR – Retired compartment for intercepts from foreign embassies in Washington

DIONYSUS – Remote SATCOM collection facility

DIRESCALLOP – Method to circumvent commercial products that prevent malicious software from making changes to a computer system

DISCOROUTE – A tool for targeting passively collected telnet sessions

– NSA database for text messages (SMS)

DISTANTFOCUS – A pod for tactical SIGINT and precision geolocation (since 2005)

DIVERSITY – SIGINT Exchange Designator for ?

DOBIE – The South African consulate and mission at the UN in New York

DOCKETDICTATE – Something related to NSA’s TAO division

DOGCOLLAR – A type of Question-Focussed Dataset based on the Facebook display name cookie

DOGHUT – Upstream collection site

DOUBLEARROW – One of NSA’s voice processing databases?

DRAGGABLEKITTEN – An XKEYSCORE Map/Reduce analytic

DREADNOUGHT – NSA operation focused on Ayatollah Khamenei

– Passive collection of emanations (e.g. from printers or faxes) by using a radio frequency antenna

DROPOUTJEEP – STRAITBIZARRE-based software implant for iPhone, initially close access but later remotely

– System for processing data from mobile communication networks

DRUID – SIGINT Exchange Designator for third party countries

– A US military numeral cipher/authentication system

DRYTORTUGAS – Analytic tool

DYNAMO – SIGINT Exchange Designator for Denmark

E

EAGLE – Upstream collection site

– A SIGINT collection network run by Australia, Canada, New Zealand, the United Kingdom, and the United States

ECHO – SIGINT Exchange Designator for Australia

ECRU (EU) – Compartment of the ENDSEAL control system

EDEN – Upstream collection site

EGOTISTICALGIRAFFE (EGGI) – NSA program for exploiting the TOR network

EGOTISTICALGOAT (EGGO) – NSA tool for exploiting the TOR network

EIDER – Retired SIGINT product codeword

EINSTEIN – Cell phone network intercepting equipment used by SCS units

– Intrusion detection system for US government network gateways (deployed in 2004)

EINSTEIN 2 – Second version of the EINSTEIN program for detecting malicious network activity

EINSTEIN 3 – Third version of the EINSTEIN program that will monitor government computer traffic on private sector sites too

ELEGANTCHAOS – Large scale FORNSAT data analysis system

EMBRACEFLINT – Tool for computer network operations

ENDSEAL (EL) – SCI control system

ENDUE – A COI for sensitive decrypts of the BULLRUN program

ENTOURAGE – Directional finder for line of bearing for GSM, UMTS, CDMA, FRS signals, works with NEBULA active interrogator within GALAXY program

EPICSHELTER – Sophisticated data backup system designed by Edward Snowden

ERRONEOUSINGENUITY (ERIN) – NSA tool for exploiting the TOR network

EVENINGEASEL – Program for surveillance of phone and text communications from Mexico’s cell phone network

EVILOLIVE – Iinternet geolocation tool

EVOLVED MUTANT BROTH – Second party database

EYESPY – System that scans data for logos of companies, political parties and other organizations, as well for pictures with faces for facial recognition

F

FACELIFT – Codeword related to NSA’s Special Source Operations division

– NSA corporate partner with access to international cables, routers, and switches (since 1985)

FAIRVIEWCOTS – System for processing telephony metadata collected under the FAIRVIEW program

FALLENORACLE – NSA tool or database

FALLOUT – DNI metadata ingest processor/database

– DNR metadata ingest processor/database

FASCINATOR – Series of Type 1 encryption modules for Motorola digital-capable voice radios

FASHIONCLEFT (FC) – Wrapper used to exfiltrate data of VPN and VoIP communications

FASTBAT – Telephony related database?

FASTFOLLOWER – Tool to identify foreign agents who might tail American case officers overseas by correlating cellphone signals

FASTSCOPE – NSA database

FEEDTROUGH – Software implant for unauthorized access to Juniper firewall models N5XT, NS25, NS50, NS200, NS500, ISG1000

FERRETCANON – Subsystem of the FOXACID system

FINKDIFFERENT (FIDI) – Tool used for exploiting TOR networks

FIRE ANT – Open Source visualisation tool

– NSA key generation scheme, used for exchanging EKMS public keys

FIRETRUCK – SIGINT tool or database

FIREWALK -Bidirectional network implant, passive gigabit ethernet traffic collector and active ethernet packet injector within RJ45 Dual Stacked USB connector, digital core used with HOWLERMONKEY, formerly RADON

– NSA program for securing commercial smartphones

FLARE – Retired SIGINT product codeword

FLATLIQUID – TAO operation against the office of the Mexican president

FLEMING – The embassy of Slovakia in Washington DC

FLINTLOCK – The DICTIONARY computer used at the Waihopai station of ECHELON

FLUXBABBITT – Hardware implant for Dell PowerEdge RAID servers using Xeon processors

FOGGYBOTTOM – Computer implant plug-in that records logs of internet browsing histories and collects login details and passwords used to access websites and email accounts

FOREMAN – Tactical SIGINT database? Used to determine ‘foreigness’

FOURSCORE – (former?) database for fax and internet data

FOXACID (FA?) – System of secret internet servers used to attack target computers

FOXSEARCH – Tool for monitoring a QUANTUM target which involves FOXACID servers

FOXTRAIL – NSA tool or database

FRIARTUCK – VPN Events tool or database (CSEC?)

FREEFLOW-compliant – Supported by TURBULENCE architecture

FREEZEPOST – Something related to NSA’s TAO division

FRONTO – Retired SIGINT Exchange Designator for ?

FROSTBURG – Connection Machine 5 (CM-5) supercomputer, used by NSA from 1991-1997

FROTH – Retired SIGINT product codeword

FRUGALSHOT – FOXACID servers for receiving callbacks from computers infected with NSA spying software

G

GALACTICHALO – Remote SATCOM collection facility

GALAXY – Find/fix/finish program of locating signal-emitting devices of targets

GAMMA (G) – Compartment for highly sensitive communication intercepts

GAMUT – NSA collection tasking tool or database

GARLIC – The NSA satellite intercept station at Bad Aibling (Germany)

GATEKEEPER – NSA user account management system

GAVEL – Retired SIGINT product codeword

GECKO II – System consisting of hardware implant MR RF or GSM, UNITEDRAKE software implant, IRONCHEF persistence back door

GEMINI – Remote SATCOM collection facility

GENESIS – Modified GSM handset for covert network surveys, recording of RF spectrum use, and handset geolocation based on software defined radio

GENIE – Overall close-access program, collection by Sigads US-3136 and US-3137

GHOSTMACHINE – NSA’s Special Source Operations cloud analytics platform

GINSU – Provides software persistence for the CNE implant KONGUR having PCI bus hardware implant BULLDOZER on MS desktop PCs

GILGAMESH – Predator-based NSA geolocation system used by JSOC

GISTQEUE (GQ) – NSA software or database

GJALLER – NSA tool or database

GLINT – Retired SIGINT product codeword

GLOBALBROKER – NSA tool or database

GM-PLACE – Database for the BOUNDLESSINFORMANT tool

GODLIKELESION – Modernization program for NSA’s European Technical Center (ETC) in Wiesbaden in 2011

GODSURGE – Runs on FLUXBABBITT circuit board to provide software persistence by exploiting JTAG debugging interface of server processors, requires interdiction and removal of motherboard of JTAG scan chain reconnection

GOPHERSET – Software implant on GMS SIM phase 2+ Toolkit cards that exfiltrates contact list, SMS and call log from handset via SMS to user-defined phone; malware loaded using USB smartcard reader or over-the-air.

GOSSAMER – SIGINT/EW collection and exploitation system

GOTHAM – Processor for external monitor recreating target monitor from red video

GOURMETTROUGH – Configurable implant for Juniper NetScreen firewalls including SSG type, minimal beaconing

GOUT – Subcompartment of GAMMA for intercepts of South Vietnamese government communications

GOVPORT – US government user authentication service

GRAB – SIGINT satellite program

GREY FOX – The 2003 covername of the Mission Support Activity (MSA) of JSOC

GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs

GROK – Computer implant plug-in used to log keystrokes

GUMFISH – Computer implant plug-in to take over a computer’s webcam and snap photographs

GUPY – Subcompartment of GAMMA for intercepts from Soviet leadership car phones (1960’s-70’s)

H

HALLUXWATER – Software implant as boot ROM upgrade for Huawei Eudemon firewalls, finds patch points in inbound packet processing, used in O2, Vodafone and Deutsche Telekom

HAMMERCHANT – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAMMERMILL – Insertion Tool controls HEADWATER boot ROM backdoor

HAMMERSTEIN – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software

HAPPYFOOT – Program that intercepts traffic generated by mobile apps that send a smartphone’s location to advertising networks

HARD ASSOCIATION – Second party database

– An IBM supercomputer used by NSA from 1962-1976

HAVE BLUE – Development program of the F-117A Stealth fighter-bomber

HAVE QUICK (HQ) – Frequency-hopping system protecting military UHF radio traffic

HEADWATER – Permanent backdoor in boot ROM for Huawei routers stable to firmware updates, installed over internet, capture and examination of all IP packets passing through host router, controlled by Hammermill Insertion Tool

HEMLOCK – Operation against the Italian embassy in Washington DC using HIGHLANDS techniques

HERCULES – CIA terrorism database

HERETIC – NSA tool or database

HEREYSTITCH – Collaboration program between NSA units T1222 and SSG

HERMOS – Joint venture between the German BND and another country with access for NSA (2012)

HERON – Retired SIGINT product codeword

HIGHCASTLE – Tactical database?

HIGHLANDS – Technique for collection from computer implants

HIGHTIDE – NSA tool or database

HOBGOBLIN – NSA tool or database

HOLLOWPOINT – Software defined radio platform

HOMEBASE – Database which allows analysts to coordinate tasking with DNI mission priorities

HOMEMAKER – Upstream collection site

HOMINGPIGEON – Program to intercept communications from airplane passengers

HOTZONE – ?

HOWLERMONKEY (HM) – Generic radio frequency (RF) transceiver tool used for various applications

HUFF – System like FOXACID?

HYSON – Retired SIGINT product codeword

I

ICEBERG – Major NSA backbone project

ICREACH – Tool that uses telephony metadata

IDITAROD (IDIT) – Compartment of the KLONDIKE control system

INCENSER – A joint NSA-GCHQ high-volume cable tapping operation, part of the WINDSTOP program

INDIA – SIGINT Exchange Designator for New Zealand (retired)

– Satellite intercept station near Khon Khaen, Thailand (1979-ca. 2000)

INTREPID SPEAR – The 2009 covername of the Mission Support Activity (MSA) of JSOC

– Series of ELINT and COMINT spy satellites (since 2009)

IRATEMONK – Hard drive firmware providing software persistence for desktops and laptops via Master Boot Record substitution, for Seagate Maxtor Samsung file systems FAR NRFS EXT3 UFS, payload is implant installer, shown at internet cafe

IRONAVENGER – NSA hacking operation against an ally and an adversary (2010)

IRONCHEF – Provides access persistence back door exploiting BIOS and SMM to communicate with a 2-way RF hardware implant

IRONSAND – Second Party satellite intercept station in New Zealand

ISHTAR – SIGINT Exchange Designator for Japan (retired)

ISLANDTRANSPORT – Internal messaging service, as part of the QUANTUM system

IVORY – Retired SIGINT product codeword

IVY BELLS – NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables

J

JACKKNIFE – The NSA satellite intercept station at Yakima (US)

JACKPOT – Internal NSA process improvement program (early 1990s – early 2000s)

JETPLOW – Persistent firmware back door for Cisco PIX and ASA firewall and routers, modifies OS at boot time

JOLLYROGER – NSA database

JOSEKI-1 – Classified Suite A algorithm

JOURNEYMAN – Major NSA backbone project

JUGGERNAUT – Ingest system for processing signals from (mobile?) phone networks

– Class of SIGINT reconnaissance satellites (1971-1983)

JUNIORMINT – Implant digital core, either mini printed circuit board or ultra-mini Flip Chip Module, contains ARM9 micro-controller, FPGA Flash SDRAM and DDR2 memories

K

KAMPUS – SIGINT Exchange Designator for ? (retired)

KANDIK (KAND) – Compartment of the KLONDIKE control system

KARMA POLICE – Second party database

KATEEL – The Brazilian embassy in Washington

KEA – Asymmetric-key Type 2 algorithm used in products like Fortezza, Fortezza Plus

KEELSON – Internet metadata processing system

KEYCARD – Database for VPN key exchange IP packet addresses

KEYRUT – SIGINT Exchange Designator for ? (retired)

KILTING – ELINT database

KIMBO – Retired SIGINT product codeword

KLIEGLIGHT (KL) – Tactical SIGINT reports

KLONDIKE (KDK) – Control system for sensitive geospatial intelligence

KLONDIKE – The embassy of Greece in Washington DC

KNIGHTHAWK – Probably a military SIGINT tool

– Method for summarizing very large textual data sets

KONGUR – Software implant restorable by GINSU after OS upgrade or reinstall

KRONE – Retired SIGINT product codeword

L

(LAC) – Retired NSA dissemination control marking

LADYLOVE – The NSA satellite intercept station at Misawa, Japan (since 1982)

LANYARD – Reconaissance satellite program

LARUM – Retired SIGINT product codeword

LEGION AMBER – Chinese hacking operation against a major US software company

LEGION JADE – A group of Chinese hackers

LEGION RUBY – A group of Chinese hackers

LEGION YANKEE – Chinese hacking operation against the Pentagon and defense contractors (2011)

LEMONWOOD – NSA satellite intercept station in Thailand

LEXHOUND – Tool for targeting social networking?

LIBERTY – First word of nicknames for collection and analysis programs used by JSOC and other sensitive DOD activities

LIBERTY BLUE – Modified RC-12 Guardrail surveillance airplane used by JSOC’s Mission Support Activity (MSA)

LIFESAVER – Technique which images the hard drive of computers

LIONSHARE – Internal NSA process improvement program (2003-2008)

LITHIUM – Facility to filter and gather data at a major (foreign?) telecommunications company under the BLARNEY program

LODESTONE – NSA’s CRAY-1 supercomputer

LOGGERHEAD – Device to collect contents of analog cell phone calls (made by Harris Corp.)

LOMA – SCI control system for Foreign Instrumentation and Signature Intelligence

LOPERS – Software application for Public Switched Telephone Networks or some kind of hardware

LOUDAUTO – An ANGRYNEIGHBOR radar retro-reflector, microphone captures room audio by pulse position modulation of square wave

M

MACHINESHOP – ?

MADCAPOCELOT – Sub-program of STORMBREW for collection of internet metadata about Russia and European terrorism

MAESTRO-II – Mini digital core implant, standard TAO implant architecture

MAGIC – Codeword for decrypted high-level diplomatic Nazi messages

– A keystroke logging software developed by the FBI

MAGNES – Remote SATCOM collection facility

MAGNETIC – Technique of sensor collection of magnetic emanations

– Series of SIGINT spy satellites (since 1985)

MAGOTHY – The embassy of the European Union in Washington DC

MAILORDER – Data transfer tool (SFTP-based?)

– Federal database of personal and financial data of suspicious US citizens

– NSA database of bulk phone metadata

MANASSAS – Former NSA counter-encryption program, succeeded by BULLRUN

– NSA database of bulk internet metadata

MARKHAM – NSA data system?

MARTES – NSA software tool to prepare reports

MASTERLINK – NSA tasking source

MASTERSHAKE – NSA tool or database

MATRIX – Some kind of data processing system

MAYTAG – Upstream collection site

MEDLEY – Classified Suite A algorithm

MENTOR – Class of SIGINT spy satellites (since 1995)

MERCED – The Bulgarian embassy in Washington DC

MERCURY – Soviet cipher machine partially exploited by NSA in the 1960’s

MERCURY – Remote SATCOM collection facility

MESSIAH – NSA automated message handling system

METAWAVE – Warehouse of unselected internet metadata

METROTUBE – Analytic tool for VPN data

METTLESOME – NSA Collection mission system

MIDAS – Satellite program

MIDDLEMAN – TAO covert network

MILKBONE – Question-Focused Dataset used for text message collection

– A sister project to Project SHAMROCK (1967-1973)

MINERALIZE – Technique for collection through LAN implants

MIRANDA – Some kind of number related to NSA targets

MIRROR – Interface to the ROADBED system

MOCCASIN – A hardware implant, permanently connected to a USB keyboard

MONKEYCALENDAR – Software implant on GMS SIM cards that exfiltrates user geolocation data

MONKEYROCKET – Sub-program of OAKSTAR for collecting internet metadata and content through a foreign access point

MOONLIGHTPATH (EGL?) – SSO collection facility

MOONPENNY – The NSA satellite intercept station at Harrogate (Great Britain)

MORAY – Compartment for the least sensitive COMINT material, retired in 1999

MORPHEUS – Program of the Global Access Operations (GAO)

MOTHMONSTER – NSA tool for exploiting the TOR network

MOVEONYX – Tool related to CASPORT

MULBERRY – The mission of Japan at the United Nations in New York

(JPM?) – Joint NSA-GCHQ operation to tap the cables linking Google and Yahoo data clouds to the internet Part of WINDSTOP

MUSKET – Retired SIGINT Exchange Designator for ?

MUSKETEER – NSA’s Special Signal Collection unit

– SSO unilateral voice interception program

– Presidential Global Communications System

N

NASHUA – The mission of India at the United Nations in New York

NAVAJO – The mission of Vietnam at the United Nations in New York

NAVARRO – The embassy of Georgia in Washington DC

NEBULA – Base station router similar to CYCLONE Hx9

NECTAR – SIGINT Exchange Designator for ? (retired)

NELEUS – Remote SATCOM collection facility

NEMESIS – SIGINT satellite

– Operation to kill or capture Osama bin Laden (2011)

NETBOTZ – Remote monitoring tool

NEWSDEALER – NSA’s internal intelligence news network

NIAGARAFILES – Data transfer tool (SFTP-based?)

NIGHTSTAND – 802.11 wireless packet injection tool that runs on standalone x86 laptop running Linux Fedora Core 3 and exploits windows platforms running Internet Explorer, from 8 miles away

NIGHTWATCH – Portable computer in shielded case for recreating target monitor from progressive-scan non-interlaced VAGRANT signals

NINJANIC – Something related to TURMOIL

NITESURF – NSA tool or database

NITRO – Remote SATCOM collection facility

NOCON – NSA dissemination marking or COI

NONBOOK (NK) – Compartment of the ENDSEAL control system

NORMALRUN – NSA tool or database

NUCLEON – Database for contents of phone calls

NYMROD – Automated name recognition system

O

– Umbrella program to filter and gather information at major telecommunications companies (since 2004)

OCEAN – Optical collection system for raster-based computer screens

OCEANARIUM – Database for SIGINT from NSA and intelligence sharing partners around the world

OCEANFRONT – Part of the communications network for ECHELON

OCEAN SHIELD – NATO anti-piracy operation

OCEANSURF – Engineering hub of the Global Access Operations (GAO)

OCELOT – Actual name: MADCAPOCELOT

OCTAVE – NSA tool for telephone network tasking (succeeded by the UTT?)

OCTSKYWARD – Collection of GSM data from flying aircraft

OILSTOCK – A system for analyzing air warning and surveillance data

– CSEC tool for discovering and identifying telephone and computer connections

OLYMPIC – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare

OLYMPIC GAMES – Joint US and Israel operation against the Iranian nuclear program (aka Stuxnet)

OLYMPUS – Software component of VALIDATOR/SOMBERKNAVE used to communicate via wireless LAN 802.11 hardware

OMNIGAT – Field network component

ONEROOF – Main tactical SIGINT database, with raw and unfiltered intercepts

– Newer units of the LACROSSE reconaissance satellites

ORANGEBLOSSOM – Sub-program of OAKSTAR for collection from an international transit switch (sigad: US-3251)

ORANGECRUSH – Sub-program of OAKSTAR for collecting metadata, voice, fax, phone and internet content through a foreign access point

ORION – SIGINT satellite

ORLANDOCARD – NSA operation thtat attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 by using a ‘honeypot’ computer

OSAGE – The embassy of India in Washington DC

OSCAR – SIGINT Exchange Designator for the USA

OSWAYO – The embassy annex of India in Washington DC

– The Lockheed A-12 program (better known as SR-71)

P

PACKAGEDGOODS – Program which tracks the ‘traceroutes’ through which data flows around the Internet

PACKETSCOPE – Internet cable tapping system

PACKETSWING – NSA tool or database

PACKETWRENCH – Computer exploit delivered by the FERRETCANON system

PADSTONE – Type 1 Cryptographic algorithm used in several crypto products

PAINTEDEAGLE – SI-ECI compartment related to the BULLRUN program

PALANTERRA – A family of spatially and analytically enabled Web-based interfaces used by the NGA

PANGRAM (PM) – Alleged SCI control system

PANTHER – The embassy of Vietnam in Washington DC

PARCHDUSK (PD) – Productions Operation of NSA’s TAO division

PARTNERMALL PROGRAM (PMP) – A single collaboration environment, to be succeeded by the Global Collaboration Environment (GCE)

PARTSHOP – ?

PATHFINDER – SIGINT analysis tool (developed by SAIC)

PATHWAY – NSA’s former main computer communications network

– Call chaining analysis tool (developed by i2)

PAWLEYS – SI-ECI compartment related to the BULLRUN program

PEARL – Retired SIGINT product codeword

PEDDLECHEAP – Computer exploit delivered by the FERRETCANON system

PENDLETON – SI-ECI compartment related to the BULLRUN program

PEPPERBOX – Tool or database for targeting Requests (CSEC?)

PERDIDO – The mission of the European Union at the United Nations in New York

PERFECTMOON – An out-sites covering system

PHOTOANGLO – A continuous wave generator and receiver. The bugs on the other end are ANGRYNEIGHBOR class

PIEDMONT – SI-ECI compartment related to the BULLRUN program

PICARESQUE (PIQ) – SI-ECI compartment related to the BULLRUN program

PICASSO – Modified GSM handset that collects user data plus room audio

PINUP – Retired SIGINT product codeword

– Database for recorded signals intercepts/internet content

PITCHFORD – SI-ECI compartment related to the BULLRUN program

PIVOT – Retired SIGINT product codeword

PIXIE – Retired SIGINT product codeword

PLATFORM – Computer system linking the ECHELON intercept sites

PLUS – NSA SIGINT production feedback program

POCOMOKE – The Brazilian Permanent Mission to the UN in New York

POISON NUT – CES VPN attack orchestrator

POLARBREEZE – NSA technique to tap into nearby computers

POPPY – SIGINT satellite program

POPTOP – Collection system for telephony data

POWELL – The Greek mission at the United Nations in New York

PREFER – System for identifying and extracting text messages (SMS) from the DISHFIRE database

PRESSUREPORT – Software interface related to PRESSUREWAVE

PRESSUREWAVE – NSA cloud database for VPN and VoIP content and metadata

PRIMECANE – American high-tech company cooperating in providing a network access point for the ORANGECRUSH program

– Program for collecting foreign internet data from US internet companies

PROFORMA – Intelligence derived from computer-based data

– Mobile tactical SIGINT collection system

PROTEIN – SIGINT Exchange Designator for ?

PROTON – SIGINT database for time-sensitive targets/counterintelligence

PROTOSS – Local computer handling radio frequency signals from implants

PURPLE – Codename for a Japanese diplomatic cryptosystem during WWII

– US military OPSEC program (since 1966)

PUTTY – NSA tool or database

PUZZLECUBE – NSA tool or database

PYLON – SIGINT Exchange Designator for ?

Q

QUADRANT – A crypto implementation code

QUADRESPECTRE PRIME – ?

– A consolidated QUANTUMTHEORY platform to reduce latencies by co-locating passive sensors with local decisioning and traffic injection (under development in 2011)

– Secret servers placed by NSA at key places on the internet backbone; part of the TURMOIL program

QUANTUMBISCUIT – Enhancement of QUANTUMINSERT for targets which are behind large proxies

QUANTUMBOT – Method for taking control of idle IRC bots and botnets)

QUANTUMBOT2 – Combination of Q-BOT and Q-BISCUIT for webbased botnets

QUANTUMCOOKIE – Method to force cookies onto target computers

QUANTUMCOPPER – Method for corrupting file uploads and downloads

QUANTUMDNS – DNS injection/redirection based off of A record queries

QUANTUMHAND – Man-on-the-side technique using a fake Facebook server

QUANTUMINSERT (QI) – Man-on-the-side technique that redirects target internet traffic to a FOXACID server for exploitation

QUANTUMMUSH – Targeted spam exploitation method

QUANTUMNATION – Umbrella for COMMONDEER and VALIDATOR computer exploits

QUANTUMPHANTOM – Hijacks any IP address to use as covert infrastructure

QUANTUMSKY – Malware used to block targets from accessing certain websites through RST packet spoofing

QUANTUMSMACKDOWN – Method for using packet injection to block attacks against DoD computers

QUANTUMSPIN – Exploitation method for instant messaging

QUANTUMSQUEEL – Method for injecting MySQL persistant database connections

QUANTUMSQUIRREL – Using any IP address as a covert infrastructure

QUANTUMTHEORY (QT) – Computer hacking toolbox used by NSA’s TAO division, which dynamically injects packets into target’s network session

QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset

QUARTERPOUNDER – Upstream collection site

– Relay satellite for reconaissance satellites

QUEENSLAND – Upstream collection site

R

RADIOSPRING – ?

RADON – Host tap that can inject Ethernet packets

RAGEMASTER – Part of ANGRYNEIGHBOR radar retro-reflectors, for red video graphics array cable in ferrite bead RFI chokers between video card and monitor, target for RF flooding and collection of VAGRANT video signal

(RGT) – ECI compartment for call and e-mail content collected under FISA authority

RAILHEAD – NCTC database project

RAISIN – NSA database or tool

RAMPART – NSA operational branches that intercept heads of state and their closest aides. Known divisions are RAMPART-A, RAMPART-I and RAMPART-T. Also mentioned as a suite of programs for assuring system functionality

RAVEN – SIGINT satellite

REACTOR – Tool or program related to MARINA?

REBA – Major NSA backbone project

REDHAWK – NSA tool

REDROOF – NSA tool

REMATION – Joint NSA-GCHQ counter-TOR workshop

RENOIR – NSA telephone network visualization tool

REQUETTE – A Taiwanese TECO in New York

RESERVE (RSV) – Control system for the National Reconnaissance Office (NRO)

RESERVEVISION – Remote monitoring tool

RESOLUTETITAN – Internet cable access program?

RETRO – see RETROSPECTIVE

RETROSPECTIVE – 30-day retrospective retrieval tool for SCALAWAG

RETURNSPRING – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

RHINEHEART – NSA tool or database

– Class of SIGINT spy satellites (in 1975 changed to AQUACADE)

RICHTER – SIGINT Exchange Designator for Germany

RIPCORD – ?

RIVET JOINT – Reconaissance operation

ROADBED – Probably a military SIGINT database

ROCKYKNOB – Optional DSP when using Data Over Voice transmission in CROSSBEAM

RONIN – NSA tool for detecting TOR-node IP-addresses

RORIPA – SIGINT Exchange Designator for ?

ROYALNET – Internet exploitation tool

RUFF – Compartment of TALENT KEYHOLE for IMINT satellites

RUMBUCKET – Analytic tool

RUTLEY – Network of SIGINT satellites launched in 1994 and 1995

S

SABRE – Retired SIGINT product codeword

SALEM – ?

SALVAGERABBIT – Computer implant plug-in that exfiltrates data from removable flash drives that connect to an infected computer

SAMOS – Reconnaissance satellite program

SAPPY – Retired SIGINT product codeword

SARATOGA – SSO access facility (since 2011)

SARDINE – SIGINT Exchange Designator for Sweden

– Narrow band voice encryption for radio and telephone communication

SAVIN – Retired SIGINT product codeword

SCALAWAG – Collection facility under the MYSTIC program

SCALLION – Upstream collection site

SCAPEL – Second Party satellite intercept station in Nairobi, Kenia

SCHOOLMONTANA – Software implant for Juniper J-series routers used to direct traffic between server, desktop computers, corporate network and internet

SCIMITAR – A tool to create contact graphs?

SCISSORS – System used for separating different types of data and protocols

SCORPIOFORE – SIGINT reporting tool

SEABOOT – SIGINT Exchange Designator for ?

SEADIVER – Collection system for telephony data

SEAGULLFARO – High-side server shown in UNITEDRAKE internet cafe monitoring graphic

SEARCHLITE – Tactical SIGINT collecting system for like cell phone calls

SEASONEDMOTH (SMOTH) – Stage0 computer implant which dies after 30 days, deployed by the QUANTUMNATION method

SECONDDATE – Method to influence real-time communications between client and server in order to redirect web-browsers to FOXACID malware servers

SECUREINSIGHT – A software framework to support high-volume analytics

SEMESTER – NSA SIGINT reporting tool

– Transportable suite of ISR equipment (since 1991)

– Radome on top of the U2 to relay SIGINT data to ground stations

SENTINEL – NSA database security filter

SERENADE – SSO corporate partner (foreign?)

SERUM – Bank of servers within ROC managing approvals and ticket system

SETTEE – SIGINT Exchange Designator for ?

– Operation for intercepting telegraphic data going in or out the US (1945-1975)

SHAREDVISION – Mission program at Menwith Hill satellite station

SHARKFIN – Sweeps up all-source communications intelligence at high speed and volumes

SHARPFOCUS (SF2) – Productions Operation of NSA’s TAO division

SHELLTRUMPET – NSA metadata processing program (since December 2007)

SHENANIGANS – Aircraft-based NSA geolocation system used by CIA

SHIFTINGSHADOW – Sub-program of OAKSTAR for collecting telephone metadata and voice content from Afghanistan through a foreign access point

SHILLELAGH – Classified Suite A algorithm

SHORTSHEET – NSA tool for Computer Network Exploitation

SHOTGIANT – NSA operation for hacking and monitoring the Huawei network (since 2009)

SIERRAMONTANA – Software implant for Juniper M-series routers used by enterprises and service providers

SIGINT NAVIGATOR – NSA database

SIGSALY – The first secure voice system from World War II

SILKWORTH – A software program used for the ECHELON system

SILLYBUNNY – Some kind of webbrowser tag which can be used as selector

SILVER – Soviet cipher machine partially exploited by NSA in the 1960’s

SILVERCOMET – SIGINT satellites?

SILVERZEPHYR (SZ) – Sub-program of OAKSTAR for collecting phone and internet metadata and content from Latin and South America through an international transit switch

SIRE – A software program used for the ECHELON system(?)

– Type 2 Block cipher algorithms used in various crypto products

SKOPE – SIGINT analytical toolkit

SKYSCRAPER – Interface to the ROADBED system

SKYWRITER – NSA tool to prepare (internet) intelligence reports

SLICKERVICAR – Used with UNITEDRAKE or STRAITBIZARRE to upload hard drive firmware to implant IRATEMONK

SLINGSHOT – End Product Reports (CSEC?)

SMOKEYSINK – SSO access facility (since 2011?)

SNICK – 2nd Party satellite intercept station in Oman

SNORT – Repository of computer network attack techniques/coding

SOAPOPERA – (former?) database for voice, end product and SRI information

SOMBERKNAVE – Windows XP wireless software implant providing covert internet connectivity, routing TCP traffic via an unused 802.11 network device allowing OLYMPUS or VALIDATOR to call home from air-gapped computer

SORTING HAT – ?

SORTING LEAD – ?

SOUFFLETROUGH – Software implant in BIOS Juniper SSG300 and SSG500 devices, permanent backdoor, modifies ScreenOS at boot, utilizes Intel’s System Management Mode

SOUNDER – Second Party satellite intercept station at Cyprus

SPARKLEPONY – Tool or program related to MARINA

SPARROW II – Airborne wireless network detector running BLINDDATE tools via 802.11

SPECTRE – SCI control system for intelligence on terrorist activities

SPECULATION – Protocol for over-the-air communication between COTTONMOUTH computer implant devices, compatible with HOWLERMONKEY

SPHINX – Counterintelligence database of the Defense Intelligence Agency

SPINNERET (SPN) – SSO collection facility

SPLITGLASS – NSA analytical database

SPLUNK – Tool used for SIGINT Development

SPOKE – Compartment for less sensitive COMINT material, retired in 1999

SPOTBEAM – ?

SPORTCOAST – Upstream collection site

SPRIG – Retired SIGINT product codeword

SPRINGRAY – Some kind of internal notification system

SPYDER – Analytic tool for selected content of text messages from the DISHFIRE database

STARBURST – The initial code word for the STELLARWIND compartment

STARLIGHT – Analyst tool

STARPROC – User lead that can be uses as a selector

STARSEARCH – Target Knowledge tool or database (CSEC?)

STATEROOM – Covert SIGINT collection sites based in US diplomatic facilities

STEELFLAUTA – SSO Corporate/TAO Shaping program

STEELKNIGHT – (foreign?) partner providing a network access point for the SILVERZEPHYR program

STEELWINTER – A supercomputer acquired by the Norwegian military intelligence agency

STELLAR – Second Party satellite intercept station at Geraldton, Australia

STELLARWIND (STLW) – SCI compartment for the President’s Surveillance Program information

STEPHANIE – Covert listening post in the Canadian embassy in Moscow (est. 1972)

STINGRAY – Device for tracking the location of cell phones (made by Harris Corp.) STONEGHOST – DIA network for information exchange with UK, Canada, Australia and New Zealand (TS/SCI)

STORMBREW – Program for collection from an international transit switches and cables (since 2001)

STRAIGHTBIZARRE – Software implant used to communicate through covert channels

STRATOS – Tool or databse for GPRS Events (CSEC?)

STRAWHAT – NSA datalinks between field sites and processing centers (1969-?)

STRIKEZONE – Device running HOWLERMONKEY personality

STRONGMITE – Computer at remote operations center used for long range communications

STRUM – (see abbreviations)

STUCCOMONTANA – Software implant for Juniper T-Series routers used in large fixed-line, mobile, video, and cloud networks, otherwise just like SCHOOLMONTANA

STUMPCURSOR – Foreign computer accessing program of the NSA’s Tailored Access Operations

SUBSTRATUM – Upstream collection site

SUEDE – Retired SIGINT product codeword

SULPHUR – The mission of South Korea at the United Nations in New York

SUNSCREEN – Tool or database

SURFBOARD – NSA tool or database

SURLEYSPAWN – Data RF retro-reflector, gathers keystrokes FSK frequency shift keyed radar retro-reflector, USB or IBM keyboards

SURPLUSHANGAR – High to low diode, part of the QUANTUM system

SURREY – Main NSA requirements database, where tasking instructions are stored and validated, used by the FORNSAT, SSO and TAO divisions

SUTURESAILOR – Printed circuit board digital core used with HOWLERMONKEY

SWAMP – NSA data system?

SWAP – Implanted software persistence by exploiting motherboard BIOS and hard drive Host Protected Area for execution before OS loads, operative on windows linux, freeBSD Solaris

– NSA data model for analyzing target connections

T

TACOSUAVE – ?

TALENT KEYHOLE (TK) – Control system for space-based collection platforms

TALK QUICK – An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM

TAPERLAY – Covername for Global Numbering Data Base (GNDB), used for looking up the registered location of a mobile device

TARMAC – Improvement program at Menwith Hill satellite station

TAROTCARD – NSA tool or database

TAWDRYYARD – Beacon radio frequency radar retro-reflector used to positionally locate deployed RAGEMASTER units

TEMPEST – Investigations and studies of compromising electronic emanations

– GCHQ program for intercepting internet and telephone traffic

THESPIS – SIGINT Exchange Designator for ?

THINTREAD – NSA program for wiretapping and sophisticated analysis of the resulting data

THUMB – Retired SIGINT product codeword

THUNDERCLOUD – Collaboration program between NSA units T1222 and SSG

TIAMAT – Joint venture between the German BND and another country with access for NSA

TICKETWINDOW – System that makes SSO collection available to 2nd Party partners

TIDALSURGE – Router Configurations tool (CSEC?)

TIDEWAY – Part of the communications network for ECHELON

TIMBERLINE – The NSA satellite intercept station at Sugar Grove (US)

TINMAN – Database related to air warning and surveillance

TITAN POINTE – Upstream collection site

– Presumably Chinese attacks on American computer systems (since 2003)

TITLEHOLDER – NSA tool

TOPAZ – Satellite program

TOTECHASER – Software implant in flash ROM windows CE for Thuraya 2520 satellite/GSM/web/email/MMS/GPS

TOTEGHOSTLY – Modular implant for windows mobile OS based on SB using CP framework, Freeflow-compliant so supported by TURBULENCE architecture

TOWERPOWER – NSA tool or database

TOXICARE – NSA tool

TOYGRIPPE – NSA’s CES database for VPN metadata

TRACFIN – NSA database for financial data like credit card purchases

TRAFFICTHIEF – Part of the TURBULENCE and the PRISM programs

TRAILBLAZER – NSA Program to analyze data carried on communications networks

TRAILMAPPER – NSA tool or database

TRANSX – NSA database

TREACLEBETA – TAO hacking against the Pakistani terrorist group Lashkar-e-Taiba

TREASUREMAP – NSA internet traffic visualization tool

TREASURETROVE – Analytic tool

TRIBUTARY – NSA provided voice threat warning network

TRIGGERFISH – Device to collect the content of digital cell phone calls (made by Harris Corp.)

TRINE – Predecessor of the UMBRA compartment for COMINT

TRINITY – Implant digital core concealed in COTTONMOUTH-I, providing ARM9 microcontroller, FPGA Flash and SDRAM memories

TRITON – Tool or database for TOR Nodes (CSEC?)

– Series of ELINT reconnaissance satellites (1994-2008)

TRYST – Covert listening post in the British embassy in Moscow

TUBE – Database for selected internet content?

TUMULT – Part of the TURBULENCE program

TUNINGFORK – Sustained collection linked to SEAGULLFARO, previously NSA database or tool for protocol exploitation

TURBINE – Active SIGINT: centralized automated command/control system for managing a large network of active computer implants for intelligence gathering (since 2010)

TURBOPANDA – The Turbopanda Insertion Tool allows read/write to memory, execute an address or packet; joint NSA/CIA project on Huawei network equipment

TURBULENCE (TU) – Integrate NSA architecture with several layers and sub-programs to detect threats in cyberspace (since 2005)

TURMOIL – Passive SIGINT sensors: high speed collection of foreign target satellite, microwave and cable communications, part of the TURBULENCE program Maybe for selecting common internet encryption technologies to exploit.

TURTLEPOWER -NSA tool

TUSKATTIRE – Ingest system for cleaning and processing DNR (telephony) data

TUTELAGE – Active defense system to monitor network traffic in order to detect malicious code and network attacks, part of the TURBULENCE program

TWEED – Retired SIGINT product codeword

TWISTEDKILT – Writes to Host Protected area on hard drive to implant Swap and its implant installer payload

TWISTEDPATH – NSA tool or database

TYPHON HX – GSM base station router network in box for tactical Sigint geolocating and capturing user

U

ULTRA – Decrypted high-level military Nazi messages, like from the Enigma machine

UMBRA – Retired compartment for the most sensitive COMINT material

UNIFORM – SIGINT Exchange Designator for Canada

UNITEDRAKE – Computer exploit delivered by the FERRETCANON system

USHER – Retired SIGINT product codeword

V

VAGRANT – Radar retro-reflector technique on video cable to reproduce open computer screens

VALIDATOR – Computer exploit delivered by the FERRETCANON system for looking whether a computer has security software, runs as user process on target OS, modified for SCHOOLMONTANA, initiates a call home, passes to SOMBERKNAVE, downloads OLYMPUS and communicates with remote operation center

– Decrypted intercepts of messages from Soviet intelligence agencies

VERDANT (VER) – Alleged SCI control system

VESUVIUS – Prototype quantum computer, situated in NSA’s Utah Data Center

VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen

VIEWPLATE – Processor for external monitor recreating target monitor from red video

VINTAGE HARVEST – Probably a military SIGINT tool

VITALAIR – NSA tool

VOICESAIL – Intelligence database

– Class of SIGINT spy satellites (1978-1989)

VOXGLO – Multiple award contract providing cyber security and enterprise computing, software development, and systems integration support

W

WABASH – The embassy of France in Washington DC

WAGONBED – Hardware GSM controller board implant on CrossBeam or HP Proliant G5 server that communicates over I2C interface

WALBURN – High-speed link encryption, used in various encryption products

WARPDRIVE – Joint venture between the German BND and another country with access for NSA (2013)

WATERWITCH – Hand-held tool for geolocating targeted handsets to last mile

WAVELEGAL – Authorization service that logs data queries

WEALTHYCLUSTER – Program to hunt down tips on terrorists in cyberspace (2002- )

WEASEL – Type 1 Cryptographic algorithm used in SafeXcel-3340

WEBCANDID – NSA tool or database

WESTPORT – The mission of Venezuela at the United Nations in New York

WILLOWVIXEN – Method to deploy malware by sending out spam emails that trick targets into clicking a malicious link

WISTFULTOLL – Plug-in for UNITEDRAKE and STRAITBIZARRE used to harvest target forensics via Windows Management Instrumentation and Registry extractions, can be done through USB thumb drive

WHIPGENIE (WPG) – ECI compartment for details about the STELLARWIND program

WHITEBOX – Program for intercepting the public switched telephone network?

WHITELIST – NSA tool

WHITETAMALE – Operation for collecting e-mails from Mexico’s Public Security Secretariat

WINDCHASER – Tool or program related to MARINA

WINDSORBLUE – Supercomputer program at IBM

WINDSTOP – Joint NSA-GCHQ unilateral high-volume cable tapping program

WINTERLIGHT – A QUANTUM computer hacking program in which Sweden takes part

WIRESHARK – Database with malicious network signatures

WITCH – Retired SIGINT product codeword

WITCHHUNT – ?

WOLFPOINT – SSO corporate partner under the STORMBREW program

WORDGOPHER – Platform to enable demodulation of low-rate communication carriers

WRANGLER – Database or system which focuses on Electronic Intelligence

X

– Program for finding key words in foreign language documents

XKEYSCORE (XKS) – Program for analysing SIGINT traffic

Y

YACHTSHOP – Sub-program of OAKSTAR for collecting internet metadata

YELLOWPIN – Printed circuit board digital core used with HOWLERMONKEY

YELLOWSTONE – NSA analytical database

YUKON – The embassy of Venezuela in Washington DC

Z

ZAP – (former?) database for texts

ZARF – Compartment of TALENT KEYHOLE for ELINT satellites, retired in 1999

ZESTYLEAK – Software implant that allows remote JETPLOW firmware installation, used by NSA’s CES unit

– See also this list of NSA codewords from 2002

Links and Sources

– List of NSA Code Names Revealed

– About What the NSA’s Massive Org Chart (Probably) Looks Like

– About Code Names for U.S. Military Projects and Operations

– National Reconnaissance Office: Review and Redaction Guide (pdf)

– About How Codes Names Are Assigned

– Wikipedia article about the Secret Service codename

– List of crypto machine designators

– Wikipedia article about the CIA cryptonym

– Article about Security Clearances and Classifications

– Listing in German: Marjorie-Wiki: SIGDEV

– William M. Arkin, Code Names, Deciphering U.S. Military Plans, Programs, adn Operations in the 9/11 World, Steerforth Press, 2005.

via Electrospaces.Blogspot.com

Smoking Gun: The HAARP and Chemtrails Connection

Smoking Gun: The HAARP and Chemtrails Connection

dance_obama-chemtrails-oil-spill-dees
No matter how deeply disturbing the thought of using the environment to manipulate behavior for national advantage is to some, the technology permitting such use will very probably develop within the next few decades. – Dr. Gordon J.F. MacDonald 1968

In order to increase functionality and effectiveness, ionospheric heaters are used in combination.Peter A. Kirby, Contributor
Activist Post

Located on an United States Air Force site near Gakona, Alaska, the High-frequency Active Auroral Research Project (HAARP) is the world’s largest and most functional ionospheric heater. Construction began in 1993. Today, HAARP can generate super high powered beams of directed energy. HAARP is designed to shoot these energy beams 200 kilometers up into the sky; affecting an area known as earth’s ionosphere. In doing this, HAARP can perform a number of functions.

The known uses of HAARP are: weather modification, power beaming, earth tomography (mapping of our planet’s interior), Star Wars-type defense capabilities, enhanced communications, communication disruptions and mind control. For an in-depth discussion about what HAARP does and how it does it, you must read the 1995 book Angels Don’t Play this HAARP by Dr. Nick Begich and journalist Jeane Manning. You can freely access a searchable .pdf here: http://freedomfchs.com/adpthaarp.pdf 

Although lesser ionospheric heaters do not generate energy beams as powerful or possess the same functionality as HAARP, similar facilities are located around the world. Along with a smaller facility located near Fairbanks, Alaska, other ionospheric heater locations include: Puerto Rico, Norway, Russia, Tajikistan, Peru and the Middle East. The latest word is that Russia, China and the United States have set up HAARP-like facilities in Antarctica. (Source)


The HAARP website explains the differences between HAARP and other ionospheric heaters like this, “HAARP is unique to most existing facilities due to the combination of a research tool which provides electronic beam steering, wide frequency coverage and high effective radiated power collocated with a diverse suite of scientific observational instruments.” HAARP can be remotely operated. HAARP employs technology originally envisioned and demonstrated by 
American inventor Nikola Tesla.


HAARP is jointly managed by the U.S. Air Force, the U.S. Navy and the Defense Advanced Research Projects Agency (DARPA) in conjunction with the Geophysical Institute of the University of Alaska, Fairbanks. Here’s more from the HAARP website:

Technical expertise and procurement services as required for the management, administration and evaluation of the program are being provided cooperatively by the Air Force (Air Force Research Laboratory), the Navy (Office of Naval Research and Naval Research Laboratory), and the Defense Advanced Research Projects Agency. Since the HAARP facility consists of many individual items of scientific equipment, both large and small, there is a considerable list of commercial, academic and government organizations which are contributing to the building of the facility by developing scientific diagnostic instrumentation and by providing guidance in the specification, design and development of the IRI [HAARP]. BAE Advanced Technologies (BAEAT) is the prime contractor for the design and construction of the IRI. Other organizations which have contributed to the program include the University of Alaska, Stanford University, Cornell University, University of Massachusetts, UCLA, MIT, Dartmouth University, Clemson University, Penn State University, University of Tulsa, University of Maryland, SRI International, Northwest Research Associates, Inc., and Geospace, Inc.

The HAARP website notes that, “…major construction at the facility was completed during 2007.”

12 U.S. patents are commonly recognized as applicable. A man named Dr. Bernard Eastlund is listed as the inventor on two of these patents and a co-inventor on another. Dr. Eastlund is commonly acknowledged as the inventor of HAARP.

The 12 HAARP patents were all assigned to ARCO Power Technologies Incorporated (APTI); a subsidiary of Atlantic Richfield Company (ARCO). APTI also won the initial contract to build HAARP. In 1994, APTI was sold to a company called E-Systems. E-Systems then changed APTI’s name to Advanced Power Technologies Incorporated. Largely involved in communications and information systems, E-Systems gets most of its business from and has extensive ties to the National Security Agency and the Central Intelligence Agency. In 1995, Raytheon acquired E-Systems. Raytheon, the defense contracting behemoth, now holds all 12 HAARP patents. 

chemtrails_zombiesWeather Modification

As far back as 1958, the chief White House advisor on weather modification, Captain Howard T. Orville, said the U.S. defense department was studying “ways to manipulate the charges of the earth and sky and so affect the weather” by using an electronic beam to ionize or de-ionize the atmosphere over a given area.The seminal 1996 Air Force report ‘Owning the Weather 2025’ outlines a weather modification program utilizing ground based support such as HAARP.Let us reference a passage from Nick Begich and Jeane Manning’s book Angels Don’t Play this HAARP:

Eastlund’s enthusiasm for planetary-scale engineering came through just as clearly in an interview with Omni Magazine. While acknowledging that many of the uses of his invention are warlike, he also talked about ‘more benign’ uses. His view of benign included using the technology to reroute the high-altitude jet stream, which is a major player in shaping global weather. Another way to control the weather with his technology would be to build ‘plumes of atmospheric particles to act as a lens or focusing device’ for sunlight, he told Omni. With this, the people controlling the antennae could aim in such a way that the return beams would hit a certain part of the earth. With the heating ability, they could experiment until they could control wind patterns in a specific place.

The Omni article explained. ‘What this means, he says, is that by controlling local weather patterns one could, say, bring rain to Ethiopia or alter the summer storm pattern in the Caribbean.’

United States patent #4,686,605 ‘Method and Apparatus for Altering a Region in the Earth’s Atmosphere, Ionosphere and/or Magnetosphere’ is one of the 12 HAARP patents. Dr. Eastlund is credited as the inventor. It states, “Weather modification is possible by, for example, altering upper atmosphere wind patterns or altering solar absorption patterns by constructing one or more plumes of atmospheric particles which will act as a lens or focusing device.”I know that quote on the surface looks like a connection between HAARP and chemtrails, but, before we think we have the smoking gun, realize that they are probably talking about particles precipitated from the ionosphere forming a lens without the need of chemtrails; as outlined elsewhere in the patent. The good news is, the patent goes on:

Also as alluded to earlier, molecular modifications of the atmosphere can take place so that positive environmental effects can be achieved. Besides actually changing the molecular composition of an atmospheric region, a particular molecule or molecules can be chosen for increased presence. For example, ozone, nitrogen, etc. concentrations in the atmosphere could be artificially increased. Similarly, environmental enhancement could be achieved by causing the breakup of various chemical entities such as carbon dioxide, carbon monoxide, nitrous oxides, and the like. Transportation of entities can also be realized when advantage is taken of the drag effects caused by regions of the atmosphere moving up along diverging field lines. Small micron sized particles can be then transported, and, under certain circumstances and with the availability of sufficient energy, larger particles or objects could be similarly affected.

That, my friends is a smoking gun. They are talking about introducing small particles into the atmosphere and then using HAARP to move them and the matter around them for the purpose of weather modification.

HAARP can be used in conjunction with chemtrails in order to modify the weather. Disbursed metallic particles such as aluminum, barium and strontium (the main chemtrail ingredients) may increase the atmosphere’s conductivity and therefore enhance HAARP’s weather modification performance.

A grand history of releasing stuff into the atmosphere as part of scientific research exists.

In the early 1960s our U.S. military dumped 350,000 2-4cm copper needles into the ionosphere attempting to create a ‘telecommunications shield.’

The HAARP executive summary says:

DOD [Department of Defense] agencies already have on-going efforts in the broad area of active ionospheric experiments, including ionospheric enhancements. These include both space and ground based approaches. The space-based efforts include chemical releases (e.g., the Air Force’s Brazilian Ionospheric Modification Experiment, BIME; the Navy’s RED AIR program; and multi-agency participation in the Combined Release and Radiation Effects Satellite, CERES).

Patent #4,686,605’s description states, “It has also been proposed to release large clouds of barium in the magnetosphere so that photoionization will increase the cold plasma density, thereby producing electron precipitation through enhanced whistler-mode interaction.” Barium is the second most common chemtrail ingredient.

These chemical releases are not all necessarily chemtrails, but they show our military’s extensive atmospheric chemical release activities involving ground and space based monitoring and support.

Lastly, let us refer again to Angels Don’t Play this HAARP:

…there is a super-powerful electrical connection between the ionosphere and the part of the atmosphere where our weather comes onstage, the lower atmosphere. Furthermore, scientific theories describe how the electrical energetic levels of the atmosphere are connected to cloud processes.

Chemtrails may enhance this connection between the lower and upper atmosphere. Then, when HAARP manipulates the ionosphere, the lower areas of the atmosphere (where our weather happens) can be manipulated accordingly.

Power Beaming

United States patent #5,068,669 titled ‘Power Beaming System’ outlines the technical details of how to remotely power airplanes.

Let us refer to a passage from ‘Angels Don’t Play this HAARP.’ Dr. Nick Begich and Jeane Manning reference an ‘Aviation Week’ article:

This ‘Star Wars’ technology developed by ARCO Power Technologies, Incorporated [patent #5,068,669’s assignee] was used in a microwaved-powered aircraft. The aircraft was reported to be able to stay aloft for up to 10,000 hours at 80,000 foot altitudes in a single mission. This craft was envisioned as a surveillance platform. The craft had no need for refueling because the energy was beamed to it and then converted to electrical energy for use by the aircraft. Flight tests were undertaken at Tyendinga Airport near Kingston, Ontario, Canada in the early 1990’s. This test by APTI most likely involved this patent…

If HAARP is powering the chemtrail airplanes, this would be a great logistical advantage as the planes would not need to be grounded for fueling. The airplanes would probably only need to be grounded for payload and maintenance and therefore could remain in the sky, performing their functions without interruption for long periods of time. This would also be an advantage because the more time these planes spend in the air, the less chance there is of the program being exposed. It’s incredibly difficult (as this author has learned) to expose something going on at 40,000 ft. in the sky. The power beaming need not be constant as the airplanes could utilize capacitors.

Little HAARPs

It is reported that smaller, mobile versions of HAARP exist.

Let us refer again to Angels Don’t Play this HAARP:

Is it possible that the HAARP scientists could have miniaturized the technology so that they don’t need such a large area of land and electrical power as called for in Eastlund’s pattents? Manning asked him.

“It’s entirely possible,” he [Eastlund] replied. “They have had a lot of good engineers working on it for some time. I would hope they have improved it.”

Aviation Week reports in 2008 that the United States Defense Advanced Research Projects Agency (DARPA) is developing an airborne version of HAARP. BAE Systems, the article tells us, is to demonstrate this unit by towing it, ‘behind a helicopter.’

Here is a picture of what is described as a mobile HAARP ship:

It has been speculated that this HAARP ship was used to trigger the March 2011 magnitude 9.0 Japan earthquake.

There may be many HAAARP-like facilities of which we are not aware. There may be HAARP-like technology all around us! As noted earlier, ionospheric heaters such as HAARP are used in combination to increase capabilities and effectiveness.

A little HAARP atop the Rocky Mountains at North American Aerospace Defense Command (NORAD) might work well. This is also the location from which I speculate the airplanes are commanded.

A Pattern of Deception

When it comes to HAARP, our government has shown a pattern of denial and obfuscation. In many instances, the HAARP website and the military contradict each other and/or the authors of ‘Angels Don’t Play this HAARP.’

The HAARP website claims that HAARP is not used for weather modification and the military has never admitted to these capabilities. The patents, Nick Begich, Jeane Manning and the European parliament say HAARP can modify the weather.

Although the HAARP website claims experiments are only being carried out in a relatively small portion of the ionosphere directly over the facility, the HAARP executive summary says, “For broader military applications, the potential for significantly altering regions of the ionosphere at relatively great distances (1000 km or more) from a [ionospheric] heater is very desirable.”

The HAARP website claims that HAARP does not make holes in the ionosphere. The European parliament and the authors of Angels Don’t Play this HAARP say it does.

The HAARP website and the military deny that HAARP is a ‘Star Wars’ defense type weapon. The European parliament and the authors of Angels Don’t Play this HAARP insist it is; the patents support their position. Angels says:

In February, 1995, the Star Wars missile defense shield was supposed to be dead. The United States House of Representatives by a 218 to 212 voted to kill the program. Yet HAARP continues on while the motives of the military are hidden from the world.

The military and the HAARP website both claim that HAARP is not a classified project, but leaked documents show that the military planners intend to keep the program under wraps.

The HAARP website contradicts itself about military involvement. In their self-description, they say they are a military project, but in the FAQs, they say HAARP is, “not designed to be an operational system for military purposes.” All this while the military’s executive summary says HAARP is to ‘exploit’ ionospheric processes for Department of Defense purposes.

Dr. Eastlund has contradicted the official military position many times. Even though they have been exhaustively proven, our military denies connections between Eastlund, APTI and HAARP. Eastlund himself said in a 1988 NPR interview that the military had tested some of the ideas presented in the patents. According to Dr. Begich and Jeane Manning:

Eastlund said in a 1988 radio interview that the defense department had done a lot of work on his concepts, but he was not at liberty to give details. He later told Manning that after he had worked within ARCO for a year and applied for patents, Defense Advanced Research Project agency (DARPA) had combed through his theories then gave out a contract for him to study how to generate the relativistic (light speed) electrons in the ionosphere.

Here’s more about Eastlund from Angels:

Eastlund told Chadwick of National Public Radio that the patent should have been kept under government secrecy. He said he had been unhappy that it was issued publicly, but, as he understood it, the patent office does not keep basic ‘fundamental information’ secret. ‘You don’t get a patent if you don’t describe in enough detail to another person how to use it,’ he said. Specifics of military applications of his patent remain proprietary (secret), he added.

I guess it’s just a matter of who you trust. I choose to trust the patents, Nick Begich and Jeane Manning because, about HAARP, the government has been caught lying. To my knowledge, the authors of ‘Angels Don’t Play this HAARP’ have not once yet been found to be lying. The patents speak for themselves.

Conclusions

Even the technocratic European parliament found serious concerns about HAARP. A 1999 European parliament committee report, after hearing Dr. Nick Begich and others, concluded:

[the Committee on the Environment, Public Health and Consumer Protection] Regards the US military ionospheric manipulation system, HAARP, based in Alaska, which is only a part of the development and deployment of electromagnetic weaponry for both external and internal security use, as an example of the most serious emerging military threat to the global environment and human health, as it seeks to interfere with the highly sensitive and energetic section of the biosphere for military purposes, while all of its consequences are not clear, and calls on the Commission, Council and the Member States to press the US Government, Russia and any other state involved in such activities to cease them, leading to a global convention against such weaponry;

I speculate that HAARP, when and if used for nefarious purposes (such as weather modification in co-operation with chemtrails), is remotely operated from Lawrence Livermore National Laboratory, Los Alamos National Laboratory and/or Wright-Patterson Air Force Base. During my humble investigation, I found that these three locations have produced much of the leading research and development. HAARP is an incredibly high-tech machine. You need highly skilled scientists and engineers to run the thing. The best place to run HAARP would be from a laboratory where the technology was developed. Also, most people (top scientists included) are generally not so hot about relocating to the wilds of Alaska. As noted earlier, HAARP can be remotely operated.

We know HAARP can modify the weather. If one could, don’t you think they would? Weather control is god-like power. Chemtrails may be sprayed to enhance the effectiveness of these operations. If this is the case, our government’s pattern of lying and obfuscation about HAARP makes perfect sense and is consistent with behavior exhibited by others associated with every aspect of chemtrails, geoengineering and the related activities I outline.

 


Notes:
– Unless Peace Comes book edited by Nigel Calder, Viking Press 1968

– Angels Don’t Play this HAARP book by Dr. Nick Begich and Jeane Manning, Earthpulse Press 1995

-United States patent #4,686,605 ‘Method and Apparatus for Altering a Region in the Earth’s Atmosphere, Ionosphere and/or Magnetosphere’ assigned to ARCO Power Technologies Incorporated 1987

-United States patent #5,068,669 ‘Power Beaming System’ assigned to ARCO Power Technologies Incorporated 1991

-‘HAARP HF Active Auroral Research Program: Joint Services Program Plans and Activities’ report by the Air Force Geophysics Laboratory and the Navy Office of Naval Research 1990

-‘Equatorial Ionospheric Irregularities Produced by the Brazilian Ionospheric Modification Experiment (BIME)’ report by J.A. Klobuchar and M.A. Abdu Journal of Geophysical Research vol. 94, no. A3 1989

-‘Clouds and the Earth’s Radiant Energy System CERES’ report by the National Aeronautics and Space Administration 1999

-‘DARPA at 50’ Aviation Week Aug. 18, 2008

-European parliament report on the environment, security and foreign policy: Committee on Foreign Affairs, Security and Defense Policy January 14, 1999

-‘Weather as a Force Multiplier: Owning the Weather 2025’ report by the United States Air Force 1996

-‘Holes in Heaven: HAARP and Advances in Tesla Technology’ video by Paula Randol-Smith Productions and Gallina Projects 1998*

-‘Angels Still Don’t Play this HAARP’ video by Dr. Nick Begich, Earthpulse Press, Swenson Media Group 2006*

*available for free on YouTube

Websites:
haarp.alaska.edu/haarp
aviationweek.com
raytheon.com
earthpulse.com
darpa.mil
onr.navy.mil
naic.edu
wpafb.af.mil
norad.mil
llnl.gov
lanl.gov
wpafb.af.mil
gi.alaska.edu
nwra.com
bellgeo.com
sri.com

Peter A. Kirby is a San Rafael, CA author and activist. Check out his ebook Chemtrails Exposed.

 

Rumsfeld Documentary Reveals What an Unaccountable Slippery Bastard He Is

Rumsfeld Documentary Reveals What an Unaccountable Slippery Bastard He Is

Director Errol Morris’s ‘The Unknown Unknown’ shows Rumsfeld as unapologetic.

RUMSFELDSo what do we know now that we didn’t after documentarian Errol Morris’s 100-minute Q&A with Donald “I Don’t Do Quagmires” Rumsfeld in  “The Unknown Known”? Only that the former U.S. secretary of defense is still a master strategist of evasion, contradiction, misdirection and malapropism.

As a footnote, here’s what we do know to date about that dirty little Iraq War that “Rummy,” the George W. Bush White House and their nincompoop Pentagon neo-cons cooked up and spoon fed to the omnivorous American public: more than 4400 U.S. military deaths and 32,000 wounded, at least 100,000 to as many as 500,000 Iraqi fatalities, millions more displaced, and an estimated price tag of $3 trillion, give or take a few hundred billion.

Yet like most of the questions that Morris tosses—gently—at his subject, any such factual horrors are sidestepped, parried and danced around by a fitfully nimble Rumsfeld. Relaxed, nattily dressed and imperiously self-assured as ever, Morris’ hollow yet overstuffed man does his imitation of “Hogan’s Heroes” Sgt. Schultz (“I know nothing, nothing”) while implausibly denying personal culpability for any stink that blew back from the Iraq War, whether the phony Weapons of Mass Destruction raison d’être, prisoner torture or the fictitious links between Saddam Hussein and the 9/11 World Trade Center attacks.

In his Oscar-winning “The Fog of War,” Morris at least got Lyndon Johnson-era Defense Secretary Robert McNamara to shoulder some of blame for the Vietnam War quagmire. But Rumsfeld is impishly unapologetic, even as his own words are shot down by Morris’ juxtapositions with TV news footage culled from the run-up and catastrophic letdown to the 2003 Iraq invasion and subsequent U.S. occupation. Yet it’s clear that Morris’ mission isn’t to catch his subject in a Captain Queeg-style meltdown that would cause Rummy to shout “Good gracious” or “Henny-penny” and storm off the set.

Rather, Morris is chiefly interested in the infernal meta-narrative of how those in the pinnacles of power can delude themselves for so long and so often that—perhaps—they don’t even know what the truth is anymore. This is a man seemingly without an ounce of introspection and one who surely sleeps well at night, confident he did all the right things, from his time as the youngest (44) secretary of defense, during the Gerald Ford presidency, to his Freddy Krueger-like return to the Pentagon as prime architect of the shock-and-awe Iraq and Afghanistan U.S.-led invasions.

Morris goes out of his way to humanize Rumsfeld, including humdrum details of his marriage while tracing his long career as Republican White House insider and go-to warhorse who trumpeted “peace through strength” and other hawkish mantras. We hear Morris’ off-camera questions, but the slippery answers are challenged only indirectly via news footage and period headlines, not by contrary interviews that would offer known arguments to Rumsfeld’s self-serving explanations.

The film’s title is a quote from one of the enormous number of official memos Rumsfeld generated over the decades. In one wacky rumination from 2004 (Subject: What You Know), he writes of the “things that you think you know that it turns out you do not.” For Morris, this is a four-star analogy for his subject, a polarizing public figure who indeed is a riddle wrapped in an enigma—and cloaked in an impenetrable armor of Orwellian double-talk. As running metaphor, Morris cuts back and forth to images of a deep blue sea, significantly more fathomable than Rumsfeld himself.

As to any possible policy misfires during his Washington tenures, Rumsfeld blithely chalks them up to the unintended consequences of war, executive decision-making and the inevitable inability for leaders like him to anticipate everything, for Pete’s sake: i.e., heck, Stuff Happens. This expedient philosophy can rationalize pretty much any horrors stretching from Abu Ghraib to Gitmo. If only Emily Littella were still on active duty, I know she’d just say, “Never mind.”

And so it goes in Rummy-speak, as Morris sends his cameras down the rabbit hole into an upside-down universe where government morality and mea culpas have no standing, yet mad tautologies like “the absence of evidence is not the evidence of absence” do. In the question of those well-known phantom WMDs, such inane statements can justify anything, including interminable wars in which bodies are still piling up, peace is not won, and mass Mideast destruction marches on.

 

via Alternet.org

Palantir 101: InfoSec Gov Deployed Malware Explained

Palantir 101: InfoSec Gov Deployed Malware Explained

War

 

For those who are completely new to the Palantir Platform or could simply use a refresher, this talk will start from scratch and provide a broad overview of Palantir’s origins and mission. A live demonstration of the product will help to familiarize newcomers with Palantir’s intuitive graphical interface and revolutionary analytical functionality, while highlighting the major engineering innovations that make it all possible.  -Palantir

Two Lawmen, Two Stories of a Boston Marathon Witness Killing

Two Lawmen, Two Stories of a Boston Marathon Witness Killing

The Florida State’s Attorney for the Orlando region, Jeffrey Ashton, yesterday released his conclusion at the end of a 10-month investigation into the FBI slaying of Ibragim Todashev, a suspected witness in the Boston bombing case, saying that he will not be prosecuting the agent. Ashton ruled that the killing, in which the agent, at the end of a nearly 5-hour May 21 interrogation in Todashev’s Orlando apartment, fired seven bullets into Todashev, killing him justifiably, after being attacked.

However the evidence submitted to Ashton’s office by the FBI, the local coroner’s office and his own investigators, on examination, actually leads to a different conclusion from the one of justifiable homicide which he, and the FBI in its own internal probe, have reached.

 

CoronersDiagramFor one thing, the two accounts of what happened offered by the FBI agent who shot Todashev, and by a Massachusetts State Trooper who was also in the room at the time of the shooting, are significantly at odds.

Why should we care about the FBI slaying of a Russian Chechen immigrant during an investigation into a Boston murder case? Because, as I wrote recently in Counterpunch magazine, Todashev was actually also a close friend of Tamerlan Tsarnaev, the elder of the two brothers suspected of being the Boston Marathon bombers. The FBI had started investigating Todashev a day after the bombing when it learned he was a friend of the elder brother, but perhaps were more interested in preventing him from talking about what he knew than in learning what he had to say.

First a scene setter: According to all witnesses who came onto the scene after the shooting, Todashev’s body ended up in a foyer leading to the front door from the apartment’s living room, where the interrogation happened, his feet pointing to the front door, and his head and shoulders on the floor in the living room. He was found positioned face down by an investigator from the local Medical Examiner’s office lying there on top of a red broomstick, a point made by every witness to the scene.

The Massachusetts State Trooper, in a May 29 interview with FBI internal investigators of the shooting, explains that stick in his account of the shooting. He says that late in the evening, towards midnight, Todashev had begun to confess to having been involved in a 2011 triple murder in Waltham, Mass., which the a Massachusetts prosecutor was investigating, and had agreed to write a confession, when he suddenly yelled, flipped the table he was writing on at the FBI agent questioning him, and raced towards the front door. He says Todashev, a martial arts expert, ran toward the door, but then “grabbed a rod, approximately five-foot-long pole that was lying against the wall near the door,” and then “raised the pole in his hands kind of with both hans which appeared to me to be a trained fighting position and charged me as if he was going to impale me with the pole.”

At that point the trooper says he heard shots fired from his right as he was standing in the living room facing the charging Todashev, and “saw Todashev make two movements which indicated he had been injured by the shots. “He fell to his hands and knees, and then, almost instantly, he sprang forward, coming up in a fighting stance. I heard more shots and he fell to the ground, this time apparently incapacitated.”

But the FBI agent who shot Todashev has a different story. Interviewed a day earlier in the course of same FBI investigation, he says Todashev was just at the point of writing out a confession and continues:

“I was reading my notepad when I heard a loud noise and suddenly felt a blow to the back of my head. I was knocked partially off my chair but I caught myself. I saw Todashev running past me and I tried to grab him. I removed my weapon from the holster and aimed the gun at Todashev, who had run towards the kitchen (actually a kitchen unit separated from the living room area by a waist-high counter). I shouted ‘Show your hands!’ I saw the trooper to my left, but didn’t know if he had his weapon. I stood in the middle of the room and saw Todashev partially in the kitchen. I constantly yelled for Todashev to show me his hands, but he did not comply. I heard the sound of metal banging together like knives in a very hurried fashion. I believe that Todashev was trying to retrieve a weapon and that he was successful in doing so. Todashev instantly ran at full speed from the kitchen towards me and the trooper. I saw Todashev’s left shoulder drop as he rounded the corner from the kitchen to the living room. It was obvious that Todashev was in an attacking pattern.”

He continues:

“In the split second available to me to assess the threat posed by Todashev’s wholly non-compliant actions I was in fear for my life and the life of the trooper. In order to stop the threat I shot Todashev three to four times. Todashev fell backwards (my emphasis) but did not go to the ground. He then re-established his footing and suddenly rushed toward us. I then shot him three to four more times in order to stop his clearly deadly threat. This time, Todashev fell to the ground face first and I believed the threat had been eliminated.”

These two tales don’t work together of course. Either one taken alone, if true, would certainly justify the shooting of the suspect, but when they diverge so wildly — in one version Todashev remains in the foyer, and grabs the red broomstick, while in the other he rummages through a drawer in the kitchen and evidently finds a weapon, presumably a knife — it’s a red flag that something’s amiss.

And when the only two eye-witnesses to this killing, only a week after the event, cannot get their stories straight, we have to assume that something is badly wrong with the whole scene.

It’s also worth noting that an expert from the Medical Examiner’s Office, who arrived only at about 2 am on May 22 almost two hours after the shooting, was prevented from entering the room until an FBI unit, which had arrived at 12:30 am, shortly after the agent shooting of the suspect, had finished “documenting the room.”

If the FBI’s agent were telling the truth, there would be no broom handle lying under Todashev’s dead body. Perhaps “documenting the room” meant slipping that rod under Todashev’s body?

On the other hand, if the Massachusetts State Trooper was telling the truth, how did Todashev get shot three times in the back and once in the top back of the head — a shot that the Medical Examiner says would have immobilized him instantly?

It is agreed by most witnesses, including those outside the apartment, that the sequence of shots was three and then four. According the Medical Examiner’s report, two shots hit Todashev in the arm. One hit him in the chest near the right nipple, which perforated the left ventricle of the heart and the aorta. And two hit his left upper arm, also from the front — one a bullet that re-entered the chest cavity and also perforated the left ventricle.

The head shot was clearly among the last or the last shot to hit Todashev, as it would have caused his total collapse instantly, according to the Medical Examiner. Yet if Todashev were first shot as he was charging the trooper, running through the foyer from the direction of the door with his arms raised holding a broomstick, the shots hitting him would have had to come from the front. That would necessarily be the one shot to the chest, which perforated not just his heart, but his aorta and esophagus, plus the two shots to the left arm, one bullet of which also ricocheted hitting his left ventricle. That would explain Todashev dropping to his knees, but makes the claim that he rose again and attacked hard to imagine. The aorta, remember, is the main artery out of the heart carrying blood to the body under maximum pressure. Ruptured, it causes an almost instant precipitous and debilitating drop in blood pressure. But even if Todashev somehow managed through sheer will to rise from his hands and knees and charge his antagonists again after those grievous wounds, how did the three subsequent shots end up hitting his back?

We could imagine the head shot if he were charging low down, but not the other three bullets to the back in that scenario.

Meanwhile, back to the agent’s quite different account. He claims Todashev, not armed with a five-foot pole, but with whatever he succeeded in finding in a kitchen drawer, was shot as he ran at the agent and staggered backwards, clearly indicating that he had been hit from the front. Again we had three shots, so it had to be the chest and the left arm. Now he “rights himself” and charges forward again, taking four more shots. But these, remember, are all either into the back, near the centerline of the body, or into the top of the head. The head shot couldn’t have been number one in the second volley, because that would have been the shot that dropped him. So what would have caused his body to turn around exposing his back?

Never mind. The FBI investigators (who have managed to exonerate 150 out of 150 agent shootings of suspects and witnesses over the last 18 years) managed to conflate the two accounts, subtly shifting each, and changing some of the witness statements, to create one smooth “alternative reality” in which the shots all fit together nicely.

Here’s the FBI’s summary of what happened, in a document provided to the Medical Examiner and the State’s Attorney’s Office by the Bureau:

“When Todaschev ran to the kitchen he frantically grabbed at the counter but came out empty handed and instead grabbed a long metal pole, similar to a mop handle next to the kitchen.”

And the shooting itself? From the FBI internal investigation, as provided to the State’s Attorney on a “do not share” basis:

“He flipped the table he was writing on which was believed to have struck BS SA [the Boston Special Agent] in the head and ran to the kitchen. Todaschev was heard frantically grabbing items in the kitchen and reappeared in the doorway wielding a long metal handle of a mop or broom. He took an attack stance with the weapon, [Special Agent BLANK] issued verbal commands, to which Todaschev did not comply, and violently lunged towards SA and MSP Trooper . Having already been wounded and fearing for his safety, [Special Agent] fired 3-4 rounds striking Todaschev. Todaschev went down on his knees momentarily then “sprang” to his feet and launched to attack again. [Special Agent] fired another 3-4 rounds dropping Todaschev to the floor. SA fired seven shots in total, Todaschev was hit seven times with fatal shots to his head and piercing his heart. He was instantly incapacitated and died on the scene.”

There are so many things wrong with this merged and massaged account it is hard to see how Florida State’s Attorney Ashton could have accepted them, but he apparently has. Firstly, Todashev wasn’t just “heard” grabbing items in the kitchen, he wasvisible over the countertop, according to the agent’s initial report of the incident. And in that initial account he never grabbed that broom handle, which the trooper said had been leaned against the front door jamb, not “next to the kitchen.” In any case, the trooper never said anything about Todashev going into the kitchen area, but rather had him running straight to the front door for the stick. He also claimed Todashev had fallen on hands and knees, not just his knees, while the agent had him staggering backwards, not falling forward.

State’s Attorney Ashton’s office declined to take a call asking for a chance to ask questions about his report.

A key witness in this case was never questioned. That is Khusen Taramov, who even the two agents and two state troopers who went to Todashev’s home to interrogate him agree was there for most of the evening, being kept at bay from the interview by a local Orlando FBI agent known to Todashev and his friends as agent “Chris.” Taramov had said on several video interviews including one with a local television station, that he had gone to the apartment at the request of Todashev, who wanted him around when the agents came, as he suspected “something bad” might happen to him.

He reported that Agent “Chris” had kept him in the parking lot from 7:30 to 11:30, talking about meaningless things (a claim the agent supports in his own interview). Then, according to Taramov, “Chris” told him he had to leave, and, as I wrote earlier, accompanied him in his car to a remote restaurant, then calling another car to return to the scene. When Taramov himself, concerned about his friend, drove back, arriving after midnight, he found a crime scene and Todashev dead.

He wasn’t questioned by Ashton because when he went back to Russia to attend Todashev’s funeral he found upon trying to return to Orlando that the FBI had gotten him barred from re-entry to the US, despite his having a valid Green Card and no criminal record. He is only one of many Todashev friends and family members who were driven out or deported from the the US by the FBI and ICE following Todashev’s slaying, rendering them all unavailable for questioning.

Taramov’s unavailability to Ashton, assuming the State’s Attorney really wanted to conduct an independent inquiry, is a critical issue. This is because it gets to the question of why, if the FBI was investigating Todashev, who was a close friend of Tamerlan Tsarnaev, one of the Boston bombing suspects, only one agent was in that apartment doing the questioning, along with a state trooper. The FBI always works interviews and interrogations in pairs because the agency doesn’t tape interviews. It has the interrogating agent fill out a Form 302 report, and the second agent witnesses the interview and signs the first agent’s write-up verifying it as accurate.

Perhaps, as the troopers claim, this was all about their case — a three-year-old unsolved triple murder of three small-time drug dealers in Waltham in which Tsarnaev, and possibly Todashev, was a suspect. But if that was the case, why was the FBI doing the questioning and not a trooper? The FBI had been investigating Todashev as at least a witness in the Boston Marathon bombing. Indeed one document sent to Ashton’s office by the FBI is from the Supervising Agent for the case, who is listed as being the supervisor of the Tampa Joint Terrorism Task Force.

Suspiciously, the troopers too didn’t seem too concerned about documenting their interview of Todashev. They say they brought along a JVC recorder, but its battery ran out of juice well before the confession, and just when they claim Todashev was getting to the good stuff in his alleged “confession” prior to allegedly writing it down, one of the two troopers in the room, who said he had been recording the session on his cell phone as a backup, turned off the recording function and went outside to use his phone to call the Massachusetts Assistant Attorney on the murder case “for instructions.”

So there is no confession, oral or written, except for the word of the trooper and the FBI agent who witnessed and participated in Todashev’s slaying.

As for that fatal head-shot, the FBI claims, in its investigation into its agent’s shooting of Todashev, that everything comports with the official merged story of how the shooting went down. Indeed, they write:

“The Chief ME advised the trajectory of the head and shoulder wounds, the combination of the seven entrance wounds to include the paths of the bullets, were inconsistent with other possible scenarios. First, due to the extreme downward trajectory of the wounds to the head and upper shoulder were inconsistent with the shooter being behind Todashev as if Todashev was running away. Rather, those extreme downward trajectories could have occurred when Todashev had his back to the shooter, only if:

1.) Todashev leaned backwards at a severe angle toward the shooter; or

2.) Todashev was standing below a shooter who was above him; or

3.) Todashev was shot while both he and the shooter were prone on the floor.”

They left out one other possibility, though: namely that Todashev, who fell face forward in the foyer, with his head and shoulders ending up protruding inside the living room, was shot by the FBI agent one more time, with the agent firing that final shot from his position five to 10 feet into the living room, straight into the back of Todashev’s head.

 

 

Science Faction II:  Does Monsanto Know the Secret of Soylent Green?

Science Faction II:  Does Monsanto Know the Secret of Soylent Green?

 

Science fiction novels and films, historically speaking, provide writers and directors with imaginative vessels for social commentary. And even though they are always a reflection of the idiosyncrasies and anxieties which permeate society in the present, they do, on occasion, manage to predict something about the future with startling accuracy.

Previously, we’ve looked at the degree to which Orwellian projections of a dystopian future have come true, particularly fears about the misapplication of technology as a means of oppressing the general public. Another set of issues that science-fiction auteurs of the past have managed to predict relates to the proliferation of genetically modified, factory produced food.

Consider Richard Fleischman’s cult-classic film Soylent Green (1973), which was an adaptation of Harry Harrison’s novel Make Room! Make Room! (1966). The story takes place in New York City in the year 2022. The world is in shambles. Overpopulation, abject poverty, depleted natural resources, scarce food, and general demoralization and desperation, have all created for a world that is fraught with tension. Things are especially bad in NYC, where the population totals around 40 million. The general public has become entirely dependent upon the Soylent Corporation, who disperse food rations. Their latest advance is a product called Soylent Green, which is said to be made chiefly of plankton, and is also said to be more nutrient dense than any of the company’s earlier products. Robert Thorn (Charlton Heston) is a NYPD detective who is tasked with investigating the mysterious death of a man who, we learn, discovered the grim secret about Soylent Green. Soylent Green wasn’t made from Plankton…but from human remains.

Within the context of these speculative fiction narratives, it all sort of makes sense in a macabre way. Post-World War II science fiction commonly depicted future societies which struggled with both population surpluses and food shortages. Thanks to Soylent Green, accidental cannibalism has become something of a trope unto itself.

cloud-atlas-human-consumptionThe recent film Cloud Atlas(2012) dealt with a similar theme. The film was directed by Tom Tykwer and the Wachowski’s (the latter of whom are clearly not strangers to making thrillers with subversive undertones, having made The Matrix series and V for Vendetta). The film skips around quite a bit, historically and geographically. The story begins with a violent voyage along the South Pacific during the 1800’s, and addresses mounting fears about nuclear proliferation in the seventies, and ends up showing a dystopian vision of the future wherein people are routinely “recycled” to make food.

The issues, in both real life and the classic science fiction tropes, have everything to do with the scarcity of resources. As natural resources are depleted, governments resort to ethically dubious practices at mass scale. What is somewhat comforting today is that companies who offer more ecologically friendly alternatives are gaining traction in the marketplace. In terms of nutrition and agribusiness, there have been several alternative farms sprouting up all over the country, and some smaller farmers have even become confident enough to take legal action against Monsanto. In terms of eco-friendly energy consumption, solar energy is becoming increasingly common in the United States,  and in Canada you can even find alternative eco-friendly energy plans through various informational websites that can let consumers bypass the main fossil-fuel based providers altogether.

What’s especially chilling about these stories, though, is that they do offer interesting comments about the current crises surrounding agribusiness – particularly with all of the stories in recent years about the Monsanto corporation’s destructive tendencies. While there’s no disputing the fact that government farm subsidies and agriculture becoming subservient to major fast food corporations has created a lot of problems, some degree of responsibility falls on consumers. It is critical, now more than ever, that we consume conscientiously…lest we desire a future society wherein people subsist exclusively on human flesh.

Anonymous Blows MH370 Mystery Wide Open!

Anonymous Blows MH370 Mystery Wide Open!

Anonymous has released the bombshell new video report below on Illuminati billionaire Jacob Rothschild’s connection to the missing Malaysia Air 370 flight that has been missing for nearly a month now. Sharing information totally classified by the mainstream media, Anonymous busts the MH370 mystery wide open.

https://www.youtube.com/watch?v=DKwXDL7loLc

Who are the Mercenaries in Eastern Ukraine?

Who are the Mercenaries in Eastern Ukraine?

Mercs-Ukraine

Videos have sprung on YouTube alleging that the US private security service formerly known as Blackwater is operating in the eastern Ukrainian city of Donetsk. Western press is hitting back, accusing Russia of fabricating reports to justify “aggression.”

https://www.youtube.com/watch?feature=player_embedded&v=s2uVyaKTQoU

The authenticity of videos allegedly made in downtown Donetsk on March 5 is hard to verify. In the footage, unidentified armed men in military outfits equipped with Russian AK assault rifles and American М4А1 carbines are securing the protection of some pro-Kiev activists amidst anti-government popular protests.

The regional administration building in Donetsk has changed hands many times, with either pro-Russian protesters or pro-Kiev forces declaring capture of the authority headquarters. In the logic of the tape, at some point the new officials appointed by revolutionary Kiev managed to occupy the administration, but then – as the building was surrounded by angry protesters – demanded to secure a safe evacuation.

This is where the armed professionals come in. The protesters, after several moments of shock, start shouting, “Blackwater!,” and “Mercenaries!,” as well as “Faggots!,” and “Who are you going to shoot at?!” But the armed men drive off in the blink of an eye without saying a word.

https://www.youtube.com/watch?feature=player_embedded&v=1S7pfp82TFA

Surely these men were not Blackwater – simply because such a company does not exist anymore. It has changed its name twice in recent years and is now called Academi.

The latest article on the case, published by the Daily Mail, claims that though these people did look like professional mercenaries, they conducted the operation too openly.

On the face of it, the uniforms of the people in the videos are consistent with US mercs – they don’t look like Russian soldiers mercs. On the other hand, why run around in public making a show of it?” said DM Dr Nafeez Ahmed, a security expert with the Institute for Policy Research & Development.

I think the question is whether the evidence available warrants at least reasonable speculation.”

Ahmed also added that “Of course the other possibility is it’s all Russian propaganda.”

Why would Russia need to make such provocation? The Daily Mail explained that “any suggestion that a US mercenary outfit like Blackwater, known now as Academi, had begun operating in east Ukraine could give Russian President Vladimir Putin the pretext for a military invasion.

Other western media outlets are maintaining that a “Russian invasion” has already began, because the heavily armed military personnel now controlling all major infrastructure in Crimea are “obviously” Russians.

 

Armed men march outside an Ukrainian military base in the village of Perevalnoye near the Crimean city of Simferopol March 9, 2014.(Reuters / Thomas Peter )

The Daily Beast media outlet went even further. On the last day of February, it published an article alleging that “polite Russians” in Crimea are actually…employees of Russian security service providers.

While there are indeed several military-oriented security service providers in Russia, it however appears highly unlikely that all of them combined could provide personnel for such a wide-scale operation.

At the beginning of the week, Russian state TV reported that several hundred armed men with military-looking bags arrived to the international airport of Kiev.

It was reported that the tough guys are employees of Greystone Limited, a subsidiary of Vehicle Services Company LLC belonging to Blackwater/XE/Academi.

Greystone Limited mercenaries are part of what is called ‘America’s Secret Army,’ providing non-state military support not constrained by any interstate agreements, The Voice of Russia reported.

But they are not the only ones. A Russian national that took part in clashes in Kiev was arrested in Russia’s Bryansk region this week. He made a statement on record that he met a large number of foreigners taking active part in the fighting with police.

He claimed he saw dozens of military-clad people from Germany, Poland, and Turkey, as well as English speakers who were possibly from the US, Russkaya Gazeta reported earlier this week.

Ivan Fursov, RT

via GlobalResearch.ca

Peaches Geldof Murdered By Illuminati & Knights Of Malta For Exposing Illuminati Pedophilia?

Peaches Geldof Murdered By Illuminati & Knights Of Malta For Exposing Illuminati Pedophilia?

Elle Style Awards - Inside ArrivalsWas Peaches Geldof murdered by the illuminati and the Knights of Malta for exposing pedophiles just months ago? Peaches, daughter of legendary rocker Bob Geldof, had recently tweeted the names of two mothers who had offered their babies to be raped by an alleged illuminati member who later admitted to the crimes after being outed by Geldof. For those who don’t know Geldof, she was considered the ‘Paris Hilton’ of the UK, and she was highly involved in exposing pedophilia in the illuminati realm. She also faced charges for exposing a prominent UK pedophile on Twitter as shared in the videos as screenshots below. BeforeItsNews videographer pressResetEarth clearly proves in the first video below that Peaches untimely death has all the tell tale signs of being an ‘illuminati hit’.      
ian-watkins-pedophile

Ian Watkins, UK Rockstar

  https://youtu.be/dHzBM1foA9E

peaches-antipedo-tweet

New flight 370 details: All signs point to backdoor westwardly landing approach onto secret island base

New flight 370 details: All signs point to backdoor westwardly landing approach onto secret island base

All evidence shows that a massive cover-up surrounding flight 370 has taken place, likely implementing U.S. military factions

secret-us-military-base-diego-garcia-flight-370-hijacked-malaysia

INDIAN OCEAN (INTELLIHUB) — It’s now been 30-days since Malaysian Airlines flight 370 went missing after departing from the Kuala Lumpur International Airport (KLIA) on route to China and search and rescue teams have still found no trace of the Boeing 777 aircraft or any of its 239 passengers, after being fed botched search area data by Malaysian officials.

In fact, it has been reported that family members of the missing believe that the Malaysian government is involved in a massive cover-up of what really took place on Mar. 8, after the aircraft’s transponder was manually overridden via human intervention. Moreover, Malaysian authorities have suspiciously failed to release the plane’s cargo hold manifest and actual cockpit voice recordings which have been repeatedly requested by various family members, investigators and search and rescue teams to aid in the search for the missing plane.

Now according to Sara Bajc the girlfriend of Phillip Wood, a missing passenger aboard flight 370, there is a general consensus amongst flight 370′s family members, based in Malaysia, that possibly a U.S. militarized faction may have intercepted and commandeered the airliner. In fact, Bajc even stated that there is some witness to two fighter jets accompanying MH370 after the flight went dark, evading radar.

“I am sure that the military in Malaysia knew that plane was there and has tracked that plane in some way. Now whether they were in control of it or not we don’t know. Many people are saying that the United States is involved […] but the general thinking across the families here and even non-families […] believe this was a military operation of some sort.”, said Bajc, demonstrating her true inner feelings.

So what do we know?

Based on radar data supplied from several other countries and early on reports, we know that MH370, under intelligent human control, turned-back to the west at about 1:21am on the morning of Mar 8., just after the planes transponder was shut off. It was then reported by Intellihub News that the plane then took a zig-zag course heading Northwest toward the Straights of Malacca and the Andaman Islands where it was later intercepted on radar by a Malaysian and military installation. However, the Malaysian military, press and government quickly covered up the leaked report. Then 10-days later officials in Thailand released their radar data willingly, which matched the leaked original leaked Malaysian military radar blips putting MH370 just North of Malaysia before turning to the South. Interestingly, Thai officials claim that no one ever asked for their radar data, that’s why they willingly submitted it 10-days after MH370 went missing.

New information obtained by CNN Sunday, tells us that “flight 370 may have been flown on purpose along a route designed to avoid radar detection”, signifying a highly contrived and likely militarized plan to commandeer the aircraft, its cargo, and 239 passengers. Shockingly this information dovetails with a report by Shepard Ambellas titled YouTube investigator: ‘Flight 370 landed at Diego Garcia military base, plane and passengers then put in a Faraday style hangar’ which was released on Mar. 24, detailing how flight 370 was spotted by locals flying low over the Maldives Islands between 6:15am and 6:40am on the morning of Mar. 8, the day flight 370 went missing. This sighting was also independently confirmed by American investigator John Halloway, after interviewing an eyewitness living on the island of Kudahuvadhoo, via telephone, who saw the massive white jumbo-jet bearing a red and blue stripe down its side. The eyewitness testimony also revealed that the plane was flying “Northwest to Southeast”, which would have set the plane up for a backdoor westwardly approach to U.S. military base Diego Garcia avoiding all sightings from any straggler base personnel on the remote island in the Indian Ocean.

Moreover, investigators also determined that out of 5 simulations that were loaded into the captain’s home flight simulator, one was of Diego Garcia. The police confiscated the flight simulator from the pilot’s house in Shah Alam and reassembled it at the police headquarters where experts are currently conducting checks.

“The simulation programmes are based on runways at the Male International Airport in Maldives, an airport owned by the United States (Diego Garcia), and three other runways in India and Sri Lanka, all have runway lengths of 1,000 metres. We are not discounting the possibility that the plane landed on a runway that might not be heavily monitored, in addition to the theories that the plane landed on sea, in the hills, or in an open space,” an unnamed source told Berita Harian.

https://www.youtube.com/watch?v=yKM7q56OQSw

Intentional diversions and distractions

Since the disappearance of flight MH370, loved ones of missing passengers have been on an emotional roller coaster ride as the mainstream media and the governments involved with the search continue to create diversions and spread false information.  Two weeks ago, the Malaysian government claimed to have found wreckage of the missing aircraft.  Their information came from a satellite search crew, but was not verified.  Based on this flimsy evidence, the Malaysian government was quick to announce that the wreckage had been found and that everyone on board the plane had been killed.  This information was callously passed on to the loved ones of missing passengers through a standard text message from the government.

Malaysian officials claimed that the mystery had been solved and seemed to be celebrating the terrible news that the plane was found in pieces.  However, the announcement of the crash was made prematurely and soon after it was discovered that the large masses detected in the ocean were just large swaths containing junk and trash, but no airplane.

After weeks of false alarms and wild goose chases the Malaysian government said that the plane may never be found, but the vast majority of the passengers family members refuse to believe the official story.

As of now, 30-days into it, the current goose chase is locating the black box “ping” that has allegedly being detected somewhere in the Indian Ocean.

The head of the multinational search for the missing flight recently told CBS News that two electronic pulses were picked up by a Chinese ship, which could be the missing planes black box. However, it was later admitted that the reports in question were published before they were verified, expanding the endless rabbit hole of propaganda for onlookers to get lost in.  While reports of the black box pings have yet to be verified, they continue to get constant mainstream media coverage.

The contents of flight 370

As of now the motive for such an elaborate crime is not yet fully known.

What we do know is that 20 employees from the multi-billion dollar Austin Texas-based tech firm Freescale Semiconductor along with one IBM executive were aboard the flight.

Adding to the mystery, the Lord Jacob Rothschild (Blackstone Group) controlled Freescale Semiconductor Ltd. has kept the flow of any information regarding their employees at a minimum.

The Voice of Russia reported on Mar. 31 in an article titled MH370 kept hidden at top-secret US military base – media reports:

Interestingly, that leading innovative company [Freescale Semiconductor Ltd.] has been oddly unwilling to provide information on the missing people. Only the nationalities of the employees were made public: 12 of them were from Malaysia and eight from China. However, Freescale has persistently declined to release their identities. “Out of respect for the families’ privacy during this difficult time, we will not be releasing the names of the employees who were on board the flight at this time,” Freescale spokeswoman Jacey Zuniga said.

Nevertheless, Mitch Haws, Freescale’s vice president, described them as “people with a lot of experience and technical background,” adding that “they were very important.” According to Reuters, the vanished employees were engineers or specialists involved in projects to streamline and cut costs at key manufacturing facilities in China and Malaysia.

While it had been reported previously that 4 of the Freescale Semiconductor employees aboard flight 370 were patent holders, their names did not appear on the official flight manifest released by the Malaysian government, adding even a deeper element for independent investigators.

(Photo: Wikimedia Commons)

via IntelliHub