BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

The disgusting world of nuclear power: Pandora's Promise

There is some movie called Pandora's Promise which is more-or-less nuclear industry cheerleading in town with a full blown event going on. People will be nibbling on delicious cesium tainted tea leaves straight from Fukushima Prefecture I would assume. [ https://twitter.com/PandorasPromise ]

Someone posted, Come to the Republic in Calhoun Square to meet, eat, and discuss the film after the 4:50pm showing on Fathers' Day, June 16. http://www.republicmn.com/ And some UN panel said that everything is fine, the accident is over, no real risk of disease or doom from this thing. etc. See: http://www.unis.unvienna.org/unis/en/pressrels/2013/unisinf475.html

Okay let's check out whats the latest in the happy world of Nuclear News. This whole UN report is based on a false premise: Unlike Chernobyl which popped, burned and was contained relatively quickly, Fukushima is not even done leaking yet, and radiation has turned up in fish, fallout across Pacific Northwest. etc.

See ENEnews.com for US, world & Japanese energy & contamination news: http://enenews.com/

http://enenews.com/japanese-diplomat-we-are-facing-global-catastrophe-ov...

Akio Matsumura, Diplomat: "Let me clarify. We are facing global disaster — catastrophe — occurring. From that perspective, over 40 years, 50 years, or maybe 100 years. We cannot escape from this fact. …. This radioactive material, or contaminated water, any cases, reach out to your west coast as well. If you are counting on Japan, I can assure you now they do not take serious action."

"Pandora's Promise: "actually an infomercial… the film is dishonest to its core" http://enenews.com/cnns-nuclear-propaganda-film-is-dishonest-to-its-core...

See Fukushima Diary for tons of high frequency detailed, sourced local info: http://fukushima-diary.com/

Let's see how their nationwide nightmare goes in last few DAYS:

Most recently http://fukushima-diary.com/2013/06/260-bqm3-of-sr-90-measured-in-30m-nor... 260 Bq/m3 of Sr-90 measured in 30m north of reactor5, 6 discharge channel and the UN panel fails to mention Strontium at all.

http://fukushima-diary.com/2013/06/average-tumor-size-of-fukushima-child...

12 Fukushima children diagnosed to have thyroid cancer, 15 more suspected to have cancer, “300% up since February” [URL]

According to Fukushima prefectural government, the average tumor size was bigger by 28% in 2012 than 2011.

In 2011, 12 malignant or possibly malignant cases were found (One of them turned out to be benign nodule from surgery.). The average diameter of the tumor was approximately 14.1 mm.

In 2012, 16 malignant or possibly malignant cases were found. The average diameter of the tumor was approximately 18.1 mm, which is bigger than 2011 by 28%.

27,000 Bq/Kg from the soil in front of the swings for children of Fukushima city. Atmospheric dose : 1.17 μSv/h (1m above the ground), 2.35 μSv/h (on the ground) http://fukushima-diary.com/2013/06/27000-bqkg-from-the-soil-in-front-of-...

PLUTONIUM one of the world's most carcinogenic substances : 0.0084 Bq/m3 of Pu-239/240 measured from 15km offshore Fukushima plant,

http://fukushima-diary.com/2013/06/0-0084-bqm3-of-pu-239240-measured-fro...

54 Bq/Kg of Cs-134/137 measured from Shiitake mushroom in Osaka http://fukushima-diary.com/2013/06/54-bqkg-of-cs-134137-measured-from-sh...

Radiation level spiked from 57.1 μSv/h to 90 μSv/h within 3 months in an elementary school of Fukushima city

http://fukushima-diary.com/2013/06/radiation-level-spiked-from-57-1-%CE%...

222,495 Bq/Kg from street gutter mud of public hall in Fukushima city, 66km from Fukushima nuclear plant http://fukushima-diary.com/2013/06/222495-bqkg-from-street-gutter-mud-of...

40,000 Bq/Kg from farm soil in Fukushima city http://fukushima-diary.com/2013/06/40000-bqkg-from-farm-soil-in-fukushim...

Radiation level increasing in leakage detector hole of “nearly empty” reservoir No.1

http://fukushima-diary.com/2013/06/radiation-level-increasing-in-leakage...

Xe-133/135 detected from gas sample of reactor1,2,3, amount not announced, Tepco “Spontaneous fission” Xenon another element leaking actively NOW http://fukushima-diary.com/2013/06/xe-133135-detected-from-gas-sample-of...

Medical expert, “Thyroid cancer rate in Fukushima is obviously too high, related to the distance from the plant”

http://fukushima-diary.com/2013/06/medical-expert-thyroid-cancer-rate-in...

http://fukushima-diary.com/2013/06/radioactive-density-in-seawater-spike...

Radioactive density in seawater spiked 20 times much after opening the silt fence for only 40 mins

Cs-137 jumped up to be 42,000 Bq/m3 and Cs-134 spiked up to be 20,000 Bq/m3.

Radioactive Silver! Ag-110m detected from gas sample of reactor1 and 3,

http://fukushima-diary.com/2013/06/ag-110m-detected-from-gas-sample-of-r...

Flowchart showing all these various radioactive water pools spilling all over the place: Tepco still transferring contaminated water to the spare tank even after the leakage of 6/5/2013 http://fukushima-diary.com/2013/06/tepco-still-transferring-contaminated...

102.5 Bq/Kg of Cs-134/137 from Sayama green tea leaves for sale http://fukushima-diary.com/2013/06/102-5-bqkg-of-cs-134137-from-sayama-g...

shadiness: English version of Fukushima plant survey map shows atmospheric dose lower than Japanese version by 90% http://fukushima-diary.com/2013/06/english-version-of-fukushima-plant-su...

18,756 Bq/kg of Cs-134/137 measured from the mud in street gutter in Setagaya Tokyo http://fukushima-diary.com/2013/06/18756-bqkg-of-cs-134137-measured-from...

[Survey] 20% of over 18y.o in Fukushima feel unhealthy or very unhealthy in 2012 http://fukushima-diary.com/2013/06/survey-20-of-over-18y-o-in-fukushima-...

Spare tank for leaking reservoirs started leaking too, Tepco didn’t weld it http://fukushima-diary.com/2013/06/spare-tank-for-leaking-reservoirs-sta... 400 tones of ground water flow into the plant on the daily basis. In order to manage the shortage of contaminated water storage, they built 7 reservoirs. However, 3 of them leaked highly contaminated water.

These are merely some headlines going back to June 5th. This monster is still oozing all over the place and contaminating tons of food and water.

////

Overall we need to quit building fission related technology, it is a mess on many levels, particularly if any of them are hit by disasters like tsunamis, earthquakes, tornadoes, hurricanes etc.

Probably a release of energy technology from the military industrial complex, along with winding down energy consumption as much as possible, [aka downshifting civilization before it implodes] would be a good place to start looking at this.

Careers at Booz Allen Hamilton: Honolulu Junior Systems Administrator

There appears to be a vacancy at Booz Allen Hamilton's work site in Hawaii (the NSA.gov site also has lots of jerbs at Honolulu).

Glenn Greenwald Destroys MSNBC's Attempted Propaganda - YouTube

So the word on the street is that this job has root logins to both the email server AND the web server. Apache Hadoop is a party to all this mess somehow.

Honolulu Systems Administrator, Junior Job - HI, 96801

http://careers.boozallen.com/job/Honolulu-Systems-Administrator%2C-Junior-Job-HI-96801/2653617/

Systems Administrator, Junior Job

Apply now »

Date: Jun 10, 2013

Location: Honolulu, HI, US

Systems Administrator, Junior-01134820

Description

Key Role:

Support current information security technology disciplines and practices to ensure the confidentiality, integrity, and availability of corporate information assets in accordance with established standards and procedures. Conduct daily operations of Windows based environment on unclassified systems and document configuration changes to systems and networks. Execute system administration and desktop support projects, including desktop troubleshooting, network switchport troubleshooting, and peripheral support. Analyze, interpret, and recommend solutions for system shortfalls, discrepancies, or improvements in technologies and access requirements and work closely with team members concerning changes to network security measures and protocols. Install PC hardware and software for end-users, work with end-users to develop an understanding of the needs and uses of their PC's, including hardware, software, and printers, and analyze and diagnose problems reported by end-users. Track and update all problem calls through corporate tracking systems and assist in the evaluation of new computer hardware and software. Update workstations with latest software and patches, design engineering solutions to meet client needs, troubleshoot performance problems, maintain baseline images for desktops, and perform system backup and recovery measures. This position is located in Honolulu, HI.

Qualifications

Basic Qualifications:

-3+ years of experience with system administration

-Experience in a Windows 2008 R2 or Windows 7 environment

-Experience with Windows Deployment Services or other relevant imaging technology

-Experience with DNS administration and troubleshooting

-Experience with vSphere virtual environment, including virtual servers, virtual switching, and management

-Knowledge of AD and GPO’s at an advanced proficiency level

-Secret clearance required

Additional Qualifications:

-Knowledge of DoD Secure System Configuration tools and methods, including STIG’s, VMS, and Gold Disk to scan and remediate systems to maintain compliancy

-AA or AS degree in CS preferred

-DoD 8570.2 IAT Level 2 or 3 Certification preferred

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required.

Integrating the full range of consulting capabilities, Booz Allen is the one firm that helps clients solve their toughest problems, working by their side to help them achieve their missions. Booz Allen is committed to delivering results that endure.

We are proud of our diverse environment, EOE, M/F/D/V.

Job: Information Technology

Primary Location: United States-Hawaii-Honolulu

Travel: Yes, 50 % of the Time

Nearest Major Market: Honolulu

Nearest Secondary Market: Hawaii

Job Segments: System Administrator, Consulting, Engineer, Secret Clearance, Security Clearance, Technology, Engineering, Government

Adrian Lamo testimony at Bradley Manning trial

This is worth posting as it is a pivotal section of the case. I can appreciate that Lamo candidly points out Manning did *not* want to funnel this information to foreign powers, which is important to the case. Ugh snitches… Lamo is @6 on Twitter.

Locally there is a rally downtown on Thursday June 6th. Check it out!

UPDATE: Moar Transcripts: https://pressfreedomfoundation.org/bradley-manning-transcripts

MOAR: Bradley Manning Support Network. Follow . Latest today from the Truck: "The CFAA charges are being disproven rapidly."

Art here from Clark :

BL7WoYMCYAEseGE.jpeg

via Jenna:

DAVID COOMBS: He told you he was an intelligence analyst?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said to you, he thought he would reach out to somebody like you who would possibly understand?

ADRIAN LAMO: Yes.

DAVID COOMBS: During this initial chat conversation he told

you about his life and his upbringing?

ADRIAN LAMO: In some amount of detail, yes.

DAVID COOMBS: He told you that he was being challenged due to a gender identity issue?

ADRIAN LAMO: Yes.

DAVID COOMBS: He also told you that he had been questioning his gender for years, but started to come to terms with that with his gender during the deployment?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you he believed he had made a huge mess?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: And he confessed that he was emotionally fractured?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said he was talking to you as somebody that needed moral and emotional support?

ADRIAN LAMO: Yes.

DAVID COOMBS: At this point he said he was trying not to end up killing himself?

ADRIAN LAMO: That is also correct.

DAVID COOMBS: He told you that he was feeling desperate and

isolated?

ADRIAN LAMO: Yes.

DAVID COOMBS: He described himself as a broken sole?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He said his life was falling apart and he didn't have anyone to talk to?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: And he said he was honestly scared?

ADRIAN LAMO: He also said that.

DAVID COOMBS: He told you that he had no one he could trust?

ADRIAN LAMO: Correct.

DAVID COOMBS: And he told you he needed a lot of help?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He ended up apologizing to you on several occasions for pouring out his heart to you since you were total strangers?

ADRIAN LAMO: Correct.

DAVID COOMBS: Now at one point he asked you if you had access to classified networks and so on, incredible things, awful things, things that belonged to the public domain, not on some servers dark room in Washington, D.C. What would you do? Do you recall him asking you that question?

ADRIAN LAMO: Yes, I did.

DAVID COOMBS: He told you he thought that the information that he had would have impact on entire world?

ADRIAN LAMO: That is also correct.

DAVID COOMBS: He said the information would disclose casualty figures in Iraq?

ADRIAN LAMO: Yes.

DAVID COOMBS: He believed the State Department, First World Countries exploited the Third World Countries?

ADRIAN LAMO: He made that representation, yes.

DAVID COOMBS: And he told you that the cables detailed what was criminal political fact dealings?

ADRIAN LAMO: Yes.

DAVID COOMBS: He believed that everywhere there was a U.S. post there was a diplomatic scandal?

ADRIAN LAMO: That he did.

DAVID COOMBS: He told you that he believed it was important that the information got out?

ADRIAN LAMO: Correct.

DAVID COOMBS: He thought that if the information got out, it might actually change something?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you he did not believe in good guys versus bad guys anymore?

ADRIAN LAMO: Yes.

DAVID COOMBS: He only believed in a plethora of states acting in self-interest?

ADRIAN LAMO: Correct.

DAVID COOMBS: He told you he thought he was maybe too idealistic?

ADRIAN LAMO: Correct.

DAVID COOMBS: He told you that he was always a type of person that tried to investigate to find out the truth?

ADRIAN LAMO: Something I could appreciate, yes.

DAVID COOMBS: And based upon what he saw, he told you he could not let information just stay inside?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said he could not separate himself from others?

ADRIAN LAMO: Correct.

DAVID COOMBS: He felt connected to everybody?

ADRIAN LAMO: Yes.

DAVID COOMBS: Even told you it felt like we were all distant family?

ADRIAN LAMO: Engagement.

DAVID COOMBS: And he said he cared?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he thought he would keep track -- keep track of people that his job impacted?

ADRIAN LAMO: Correct.

DAVID COOMBS: And he wanted to make sure that everybody was okay?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that the way he separated himself from other analysts was, he cared about people?

ADRIAN LAMO: He said that, yes.

DAVID COOMBS: PFC Manning told you he followed humanist values?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He said he had dogs tags saying "humanist" on it?

ADRIAN LAMO: Yes.

DAVID COOMBS: Do you know what it means to be a humanist?

ADRIAN LAMO: From my understanding the importance of human life and human beings and has a structure of morality.

DAVID COOMBS: PFC Manning told you that at the time he was feeling (inaudible) and no one seemed to see that or care?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he was bothered that nobody seemed to care?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He said he thought apathy was far worse than active participation?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he preferred the truth (Inaudible)?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He also told you that he was maybe too traumatized to really care about the consequences to him?

ADRIAN LAMO: Yes.

DAVID COOMBS: He told you that he wasn't brave. He was weak?

ADRIAN LAMO: Yes.

DAVID COOMBS: He said he was not so much scared of getting caught and facing consequences as he was of being misunderstood?

ADRIAN LAMO: Yes.

DAVID COOMBS: At one point you asked him what his end game was, correct?

ADRIAN LAMO: Yes, I did.

DAVID COOMBS: And he told you, hopefully worldwide discussions, debates and reforms?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He told you that the reaction to the (Inaudible)?

ADRIAN LAMO: Yes.

DAVID COOMBS: And he said he wanted people to see the truth?

ADRIAN LAMO: Correct.

DAVID COOMBS: He said without information you can't make informed decision as a whole?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: And he told you to, he was hoping that people would actually change if they saw the information?

ADRIAN LAMO: Correct.

DAVID COOMBS: He also told you that he recognized that he may be just young, naive and stupid?

ADRIAN LAMO: Yes.

DAVID COOMBS: And at one point you asked him why he didn't just sell the information to Russia or China?

ADRIAN LAMO: Correct.

DAVID COOMBS: And he told you that the information belonged in the public domain?

ADRIAN LAMO: Yes, he did.

DAVID COOMBS: He believed that information was in the public domain and should be for the public good?

ADRIAN LAMO: Yes.

DAVID COOMBS: You asked him how long he had been helping out WikiLeaks at one point?

ADRIAN LAMO: Yes, I did.

DAVID COOMBS: He told you that he essentially had been --

THE COURT: Sustained. Hearsay.

MR. COOMBS: Very well, Your Honor.

BY MR. COOMBS:

DAVID COOMBS: At one point he told you that his belief or his feelings were that he wanted to eventually go into politics?

ADRIAN LAMO: Yes.

DAVID COOMBS: And at the time he was thinking that humanity could accomplish a lot, if smart people with ideas cooperated with each other?

ADRIAN LAMO: Correct.

DAVID COOMBS: At anytime did he say he had no loyalty to America?

ADRIAN LAMO: Not in those words, no.

DAVID COOMBS: At anytime did he say the American flag didn't mean anything to him?

ADRIAN LAMO: No.

DAVID COOMBS: At anytime did he say he wanted to help the enemy?

ADRIAN LAMO: Not in those words, no.

Drupal 8 & Drupalcon 2013, Open Source content management grabs brass ring; Weather.com, e-commerce linkdump & much moar

drupalcon_pdx_icon_2.png

So North America's Drupalcon 2013 is happening in Portland this week - a lot of people are bringing the A-Game. I got out to the 2011 & 2012 Drupalcons in Chicago & Denver, but can't this year.

Regardless here are a bunch of links I quickly slammed together about what's cropping up in the Drupal world nowadays. Roughly formatted for my own note-keeping, this may make very little sense to non-techies.

WTF IS Drupal? [drupal.org] It's an open source [Linux style GPL license] Content Management System (CMS) & framework, which can be used to build many different types of websites, including e-commerce & social networks. See INTRO to: Introduction to drupal slideshow, excellent.

I've mostly been working as a Drupal developer or done jobs involving Drupal site building work since 2007. Contact me hongpong AT hongpong.com re Drupal stuff if interested.

Drupal 8 is being developed in the community with a number of different major initiatives - as critical bugs get closed out and various ambitious plans, APIs etc shakes out. It will take a while to get sorted out, but brings really major, and indeed overdue, end user and site building enhancements, along with major simplification of the often crufty code inside Drupal's core module set.

Probably a great headliner, Weather.com has committed bigtime, making this the highest-traffic Drupal site to date.Weather.com Moving to Drupal | Acquia. Well done people - 100,000,000 unique visitors/month is the win! Also: Twitter Blog Running on Drupal not WordPress | LevelTen. And the Louvre!

Drupal community: Many of the following links are from the main commercial sites of major Drupal consultancies like Acquia. In some ways the Drupal community consists of consultancies, academics as well as people not engaged with Drupal commercially.

Overall the major organizing principle involves mutually providing very sophisticated free software to build up a large digital commons - while running businesses around designing, maintaining & developing that software. Some issues like "module X is pushed by consultant Y, module Z by group A," can bubble up, but this interesting balance of cooperation and competition results in plenty of free code for any takers, as well as increasingly spiffy SaaS (software as a service) vendors.

Evolution of Drupal governance: See Creating a structure for Drupal governance and Community Working Group.

The raising of skrillos for core: Funding Drupal Core Development | Lullabot

///////

In the Web Scene: There are many competitors & rivals in the CMS world and beyond. Drupal is Among the Big Boys in Open Source Communities | Forum One. And the general market: The 2013 Future of Open Source Survey Results. Reg reqd: Is It Time To Consider Open Source WCM For Digital Experience? | Acquia.

Here Google Trends shows Wordpress buzzing bigtime, and the decline of Joomla. Google Trends - Web Search Interest: drupal, wordpress, joomla - Worldwide, 2004 - present. Also the world map of interest in Drupal shows a pretty slid geography, with India, Africa, South America etc interested. See localize.drupal.org for crowd sourced translation services. See also Propeople | Spreading the magic of Drupal in Latin America. well attended!

Wordpress is complementary to Drupal in a lot of ways - used for blogging, open source and PHP based, with a really impressive market share and reach. Lol this and followed by The epic failure of "The RedHut of Drupal" :) and april foolz.

Publishing on interwebs: getting pretty good these days. webinar viewable w free login: Drupal for Publishers: How to Build a Better Newsroom CMS [May 14, 2013] | Acquia.

///////

All over the Government: Drupal is now a major accepted website development option for both the US federal & assorted international, regional, local governments. Drupal Gov Days 2013 | drupal4gov August 14-15 8:30am-5pm at NIH Campus, Natcher Auditorium.

Drupal for the European Commission: BoFSession at DrupalCon Portland 2013 | Pronovix interesting stuff.

Digital Agenda for Europe - European Commission powered by Drupal. Lol how can this be copyrighted [see footer]? Ohh EU :/

Georgia Peaches: Georgia.gov | drupal.org developed by Phase2, Mediacurrent, Acquia, and the OpenPublic Drupal distribution. Very detailed infos including the use of the Features module across many state government agencies! Good list of modules here. Georgia Technology Authority: Leading the way for Drupal in State Government | Phase2. 52 agencies? Damn skippy!

////////

D8 Core projects: See this all here.Drupal 8 Updates and How to Help | drupal.org. Also: Reducing risk in the Drupal 8 release schedule | Dries and Want more features in Drupal 8? Help fix bugs! | Dries. On May 16, "Currently, we have 27 critical bugs, 41 critical tasks, 155 major bugs, and 149 major tasks. ". Usually at Drupalcon a lot of major design issues get hashed out. There are also sprints ie: Participate in a Global Drupal Sprint this weekend. Dated but relevant: Updated Drupal 8 release schedule | Dries

Entity API & now Entity Reference in D8 core: a big deal for Drupal Commerce as well, with Entity Reference now in Drupal 8 core. It's a toolkit using pointers between nodes and entities - like "X is a member of Y" relationships.

Also you can use Entity API & Entity Reference to build fancy data dashboards. This is super cool: Using Drupal 7 Entity Reference to help Create User Dashboards | LevelTen | Dallas, TX. and How to Create Single-Page Apps With Drupal | Acquia. and If you aren't using Entity API to create nodes, you are doing it wrong | LevelTen // Working with Entities in Drupal 7 Series

E-Commerce: A Lot needs to be said. This is indeed probably going to turn into New Hotness with major market demand as people dump crumby old shopping carts and un-integrated forum software, Drupal offers a far better all around suite without licensing fees. See Sponsored blog post: Where should Drupal professionals focus for the next phase of growth? | Drupal Association

Part of the theory is here: Customer Experience: Where Content, Commerce & Community Collide

Drupal Commerce 2.x Roadmap Posted | Drupal Commerce - very successful and going to become more so. Drupal Commerce uses the Rules module for business logic - meaning you don't need to be a coder to make different commercial processes or functions happen. Drupal Commerce 2.x Roadmap | Drupal Commerce

Social Media stuff: Because a lot of modules bring third party services to bear, social media Drupal integration is a well coded & supported area. Socialize your Drupal site in 5 Easy Steps | LevelTen.

One popular module: Social media | drupal.org and Widgets | drupal.org

Social media presence On The Web | drupal.org

Distributions: Much like with Linux you can get different Drupal distributions for different purposes - auto-configured upon installation with different themes, workflows, etc than generic Drupal. Open Enterprise | drupal.org uses a new Apps style approach for various website features.

/////////

MISCELLANEOUS: Sandbox projects are not officially approved by the Drupal community in any sense, though you can obtain them via drupal.org. There are some very cool ideas lurking in sandboxes.

jcarballo's sandbox: Diffbot | drupal.org. Scan the news. 3rd party integration

Drupal 8, aural interfaces and groundbreaking accessibility at Drupalcon Portland | Rootwork | Nonprofit Technology. Excellent news here.

Twig - a kind of dynamic theme markup technique - may not make it into D8 - I'm unclear about the topic. But anyway follow up here: pixelmord's sandbox: Drupal 8 Twig Sandbox | drupal.org. Improving all HTML markup, also re TWIG: [meta] Creating Dream Markup [#1980004] | Drupal

General performance testing: Round 5 results - TechEmpower Framework Benchmarks. Symfony2 not so hot. hmmm

D8 Translation big now. A bug thread involving Russian for example - getting more non-English into core: Use new Transliteration functionality in core for machine names [#1842718] | Drupal. Also RTL fixed for one theme! another bit.

Meet the Larks at DrupalCon Portland | Exaltation of Larks

Tumblr, hell we can make our own microblogz dangit. One BILLION Dollaz phaw...Hell No, Tumblr Users Won’t Go To Yahoo! | TechCrunch

Breaking up the Monolithic Drupal Site with a Subdomain Multisite | LevelTen | Dallas, TX - very interesting, we will see what they do about single sign on. Perhaps LDAP? Lightweight Directory Access Protocol (LDAP) | drupal.org

internal to community is the bug threads. let's polish: Drupal.org D7 - improving issue pages | Drupal Association

Looks fantastic for subscription based anything: Easily integrate subscription billing on your Drupal site with Recurly

Perfect infographic does show why Pantheon is attractive - far fewer hosting and Linux tuning hassles which indeed often divert focus: Pantheon-Drupal-Developers-Road-to-Server-Hell-Infographic.jpg (1000×3946)

WSCCI is one of the D8 core initiatives. [META] WSCCI Home Stretch [#1983534] | Drupal. The new config system and javascript ie. JavaScript settings moved from Drupal.settings to global drupalSettings variable | drupal.org. . Integrate config schema with locale, so shipped configuration is translated [#1905152] | Drupal

Coherency in UI evolution: [meta] New visual style for Seven [#1986434] | Drupal and Proposal: A Style Guide for Seven | Drupal Groups

For developers: drupal_array_merge_deep | Drupal every day recursive merge. good site too. HOOKS people: How to invoke a new hook in a Drupal module | BeFused. Project mgmt: Planning Your Drupal Site | Mediacurrent Blog Post

SPARK for UI: Spark | drupal.org This has helped field test new D8 UI fixes and polishes. Webinar Wrap Up: Drupal 8 and Spark Simplify Responsive Design | Drupal Association. Drupal Association Webinar: Drupal 8 and Spark Simplify Responsive Design, Mobile | Acquia

MAPS. ARCgis for MapFreaks: energee's sandbox: ArcGIS | drupal.org. there is tons of other map stuff including OpenLayers and Mapbox.com as well worth looking at.

Creating Passionate Users: Attenuation and the suck threshold - saying that Pantheon helps: Drupalista Kelly Bell Shares the New Way of Developing on Drupal | Pantheon

it takes a half dozen people or moar to cover webchick's workload for maternity leave! Heads up: Maternity leave starting next week | webchick.net. Learn MOAR: "My job is to make Drupal awesome": meet Angie Byron - part 1 | Acquia. Very informative.

Looking for a Few New Site Builders | Drupal Association

Helper | drupal.org handy utilities from Dave Reid including a mail logger!

Menu Link Bundles. Confusing? Perhaps but gabor has a chart: Introduce menu link bundles per menus [#1966298] | Drupal

Typical local sprint: Village of Oak Park DUG Community Cultivation Grant report for the DA | Drupal Association

What is up with Fields: New Field Bases and Instances in Features | Phase2. This appears to be a big deal for Features building hmmm..

GIT. Learn your git. this is key. A recipe for a sane git process in Drupal's patch based workflow | PreviousNext. One branch per issue champs!

My Review of Frontend United 2013 | Darren Mothersele - brit conference.

Online event registration setup: Event Registration Site with Panopoly, Drupal Commerce Registration and Stripe: A Drupal, Awesome-sause Mashup. Spinoff. http://myeventsite.co/

////////

REST and Data plumbing; To Guzzle data: now in D8 core: Propeople | Introduction to Service Guzzle module. They're trying to integrate much more than just serving up webpages in the conventional sense. So how do you run iPhone, Android apps etc?

REST and other technologies break down yr internets data into smaller, more dynamic chunks than basically the old "load an HTML page" experience. Ensuring a certain basic level of REST design is a major part of D8. Guzzle is in D8. This is an outgrowth of the powerful Services module - for example see Propeople on Services.

Also LOL WebVisions 2013: Putting the Web in constant motion - WOOSHY STUFF!

////////

Theming: Looks nice. Aurora | drupal.org anyone tried it? Aurora 3.0 - Magic Birds and Boars | Snug.ug

And Best Drupal 7 Responsive Themes and 10 Free Drupal Themes for 7.x

7 modules to help with your Drupal responsive design | Web Omelette. Includes IOS Retina stuff.

More acquia snippets: The Three C’s of Modern Web Site Management | Acquia & Best Practice Checklist for Building a Drupal Website | Acquia // White paper: Resource Guide: Developing for Mobile on Drupal | Acquia. Controlling Your Site Layout Using The Mobile-First Omega Theme | Acquia

Clutch for forms with AJAX: unwieldy Drupal forms are an issue. could be win here? Yet another method to simplify making multipage/multistep Drupal forms | Sina Salek Official Site and Field Group Ajaxified Multipage | drupal.org

LOL unrelated: "I Contribute to the Windows Kernel. We Are Slower Than Other Operating Systems. Here Is Why." - Zorinaq

Anyway I will leave this linkdump there for now - hopefully this points to a few helpful areas.

Make Great Hack Cartel: CyberWar Afloat!! DIB to 2511 Wiretap All Da Networks! SAIC signs deal with Homeland Security, to get Feds' classified hoarded zero-day exploits

"10 providers serve 80 percent of the market. We have classified relationships with a good number of them." -- US Rep Mike Rogers, reminding us how the government creates cartel structures [source Reuters]

One of the more interesting news elements concerns how the federal goverment is going to hand out teh very tastiest candy to contractors - specifically SAIC it now appears - in the form of classified undisclosed hacker attack goodies.

Interestingly AT&T would get get very very important info about vulnerabilities on Apple and other major corporate rivals, providing them with a colossal competitive edge in the so-called "marketplace".

Basically you have the introduction of a cartel system for hacking, reminiscent perhaps of the cartel system for distributing drugs so profitably for the powers-that-be. And of course Homeland Security in the middle, the keystone.

The government/contractor class is entering a more demented, less sound phase of the information age by hoarding important software bugs instead of getting them fixed.

Foreign spooks will surely get their hands on tons of hacks and way more systems will end up getting seriously assaulted. Putting up large cash bounties for responsible disclosure (i.e. telling people who can issue security patches to the public, then telling the public) is almost certainly a better way to approach the problem.

This current policy direction will probably cause far more havoc on the Internet than it will prevent, shocking an outcome as that may be.

Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

[...] Sec. 2. Critical Infrastructure. As used in this order, the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.[......]

Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the "Secretary"), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.

(b) The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates the reports produced pursuant to section 4(a) of this order to the targeted entity. Such process shall also, consistent with the need to protect national security information, include the dissemination of classified reports to critical infrastructure entities authorized to receive them. The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a system for tracking the production, dissemination, and disposition of these reports.

(c) To assist the owners and operators of critical infrastructure in protecting their systems from unauthorized access, exploitation, or harm, the Secretary, consistent with 6 U.S.C. 143 and in collaboration with the Secretary of Defense, shall, within 120 days of the date of this order, establish procedures to expand the Enhanced Cybersecurity Services program to all critical infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and technical information from the Government to eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.

(d) The Secretary, as the Executive Agent for the Classified National Security Information Program created under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities), shall expedite the processing of security clearances to appropriate personnel employed by critical infrastructure owners and operators, prioritizing the critical infrastructure identified in section 9 of this order.

/////

So "critical infrastructure" includes plenty of big corporate interests and anything that would affect their economic well-being is a threat. As always, regulations which make institutions more permanent, as opposition to the "critical" elements of society becomes blended with "terrorism".

U.S. gives big, secret push to Internet surveillance | Politics and Law - CNET News - April 24, Declan McCullaugh (who probably doesn't talk to sources on the f&!!ing telephone that much these days)

Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws.

The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12.

Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.

The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books.

The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department.

In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.

//////

So you have a pilot program that covered the "Defense Industrial Base" or DIB. The security measures used to keep tabs on contractor computers are now rolled out across the interwebs. More on DIB below.

But military-style wiretapping America with fancy 2511 loopholes isn't enough! Let's hand out hacks too! Not surprisingly the NSA's main digital plumbing people, specifically SAIC, are jumping aboard the classified Goodie Gravy train.

//////

SAIC, Inc. : SAIC Signs Agreement With Department of Homeland Security To Be A Commercial Service Provider

05/15/2013| 04:10pm US/Eastern

MCLEAN, Va., May 15, 2013 /PRNewswire/ -- Science Applications International Corporation (SAIC) (NYSE: SAI) signed a Memorandum of Agreement (MOA) with the Department of Homeland Security (DHS) Enhanced Cybersecurity Services (ECS) program to become a Commercial Service Provider (CSP) of approved ECS services that will strengthen protection of U.S. critical infrastructure against imminent cyber attacks. In accordance with the MOA, SAIC is developing the capability and security certifications to utilize threat indicators for securing critical infrastructure customers against cyber threats.

Securing the Future is a guiding mission for SAIC. For decades, SAIC professionals have served the U.S. government and corporate America with expertise and technology to better protect our citizens, our military and our networks. SAIC is currently collaborating with community leaders and building key technologies and architectures that enable trusted sharing of threat information in real-time to protect against both the known and unknown threat landscape.

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS develops indicators based on this information and shares them with qualified CSPs, thus enabling them to better protect their customers who are critical infrastructure entities.

Key Quotes:

John Thomas, National Security Sector Acting President
"We must work together to protect our infrastructure, our economy, and our security from cyber attacks. If we don't work together, we won't succeed. This is why SAIC is proud to be a part of this endeavor to share valuable threat information between government and critical infrastructure providers."

Julie Taylor, Cybersecurity Operation Manager for National Security Services
"This collaboration between SAIC and DHS puts in place a new approach to threat sharing across public and private sectors that offers a positive shift in the threat landscape. Each step we take to cultivate our cyber ecosystem with trusted information sharing relationships will have a direct return on stabilizing our national security and our economy. Now that the doors of communication are open, we can further the cyber mission with valuable action as a team. "

David Lacquement, Cybersecurity Program Director
"As a former government executive in cyber threat management, I have seen firsthand the immense value that threat information sharing at network speed can offer to sustaining trusted channels for online transactions and communications. This public-private collaboration is strategically vital to significantly raising the level of cyber awareness, vigilance, and protection across our nation's critical infrastructure."

About SAIC
SAIC is a FORTUNE 500(®) scientific, engineering, and technology applications company that uses its deep domain knowledge to solve problems of vital importance to the nation and the world, in national security, energy and the environment, critical infrastructure, and health. The Company's approximately 40,000 employees serve customers in the U.S. Department of Defense, the intelligence community, the U.S. Department of Homeland Security, other U.S. Government civil agencies and selected commercial markets. Headquartered in McLean, Va., SAIC had annual revenues of approximately $11.2 billion for its fiscal year ended January 31, 2013. For more information, visit www.SAIC.com. SAIC: From Science to Solutions®

Statements in this announcement, other than historical data and information, constitute forward-looking statements that involve risks and uncertainties. A number of factors could cause our actual results, performance, achievements, or industry results to be very different from the results, performance, or achievements expressed or implied by such forward-looking statements. Some of these factors include, but are not limited to, the risk factors set forth in SAIC's Annual Report on Form 10-K for the period ended January 31, 2013, and other such filings that SAIC makes with the SEC from time to time. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements, which speak only as of the date hereof.

Contact: Melissa Koskovich Jennifer Gephart

(703) 676-6762 (703) 676-6389

Melissa.l.koskovich@saic.com Jennifer.a.gephart@saic.com

SOURCE SAIC

/////

Here is the Department of Homeland Security page on it: Enhanced Cybersecurity Services | Homeland Security. See also Office of Cybersecurity and Communications and Stakeholder Engagement and Cyber Infrastructure Resilience. I wonder if someone gets applause for these titles, whew...

Enhanced Cybersecurity Services

Protecting critical infrastructure against growing and evolving cyber threats requires a layered approach. The Department of Homeland Security (DHS) actively collaborates with public and private sector partners every day to respond to and coordinate mitigation efforts against attempted disruptions and adverse impacts to the nation’s critical cyber and communications networks and infrastructure.

As the federal government’s lead agency for coordinating the protection, prevention, mitigation, and recovery from cyber incidents, DHS works regularly with business owners and operators to strengthen their facilities and communities. To accomplish this, the DHS Enhanced Cybersecurity Services (ECS) program was expanded in February 2013 by Executive Order - Improving Critical Infrastructure Cybersecurity.

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the federal government to gain access to a broad range of sensitive and classified cyber threat information. DHS develops indicators based on this information and shares them with qualified Commercial Service Providers (CSPs), thus enabling them to better protect their customers who are critical infrastructure entities. ECS augments, but does not replace, an entities’ existing cybersecurity capabilities.

The ECS program does not involve government monitoring of private networks or communications. Under the ECS program, information relating to threats and malware activities detected by the CSPs is not directly shared between the critical infrastructure CSP customers and the government. However, when a CSP customer voluntarily agrees, the CSP may share limited and anonymized information with ECS. See the Privacy Impact Assessment below for more details.

Critical Infrastructure Entities

Most critical infrastructure entities already utilize cybersecurity providers to protect their networks. The ECS program offers an enhanced approach to protecting these entities by supplementing existing services and commercial capabilities with U.S. Government cyber threat information. This approach supports the delivery of enhanced capabilities to eligible participants from all sectors.

Participation in the program is voluntary and is designed to protect government intelligence, corporate information security, and the privacy of participants, while enhancing the security of critical infrastructure. Validated entities from all critical infrastructure sectors are eligible to participate in the ECS program and receive ECS services from qualified CSPs.

To learn more about becoming a validated critical infrastructure entity, please contact the ECS Program Management Office at ECS_Program@HQ.DHS.gov.

Commercial Service Providers

CSPs receive threat information from DHS and use it to offer specified services to their critical infrastructure customers in a secure environment in order to ensure the security of government furnished information.

CSPs deliver services to eligible customers through commercial relationships. The ECS program is not involved in establishing the commercial relationships between CSPs and validated critical infrastructure entities. As of February 2013, the following CSPs are approved to provide ECS services to critical infrastructure entities:

DHS is working with several additional providers who seek to offer enhanced cybersecurity services to entities. To learn about becoming a CSP, please contactECS_Program@HQ.DHS.gov.

Sector Specific Agencies

Sector Specific Agencies (SSAs) and DHS form a critical partnership within the ECS program. The role of the SSA is to leverage existing relationships with critical infrastructure entities to expand and improve ECS. The SSA is also responsible for helping to characterize risks and threats unique to critical infrastructure entities in their respective sectors. This characterization will enable the federal government to deliver the most effective indicators relevant to ECS protected entities based upon the unique threat environment of their sector. SSAs also serve as a vital conduit to DHS for data leading to requirements that will drive the development of ECS program capabilities.

Privacy and Civil Liberties

DHS embeds and enforces privacy protections and transparency in all its activities and uses the Fair Information Practice Principles (FIPPs) to assess and mitigate any impact on an individual’s privacy.   DHS has conducted and published a Privacy Impact Assessment for the ECS program. DHS also ensures that ECS and all of its cybersecurity activities are structured in a way that ensures individual rights are protected.

Contact Information

For more information, contact ECS_Program@HQ.DHS.gov.

//////

Once you poke around on FedBizOpps.gov a little bit it's easier to see how they blow so much money in DC.

Fun FEMA Pork tangent: Here are some FEMA satellite phone sole source contract. On the one hand, it's good someone has a satellite phone in emergencies, but someone is profiting off this sale...

https://www.fbo.gov/index?s=opportunity&mode=form&id=4a1af0e4e2942226816...

FEMA seeks to acquire on an other than full and open competition basis MSAT satellite terminals. These terminals are primarily utilized in Disaster Operations for mission critical communications within FEMA, as well as for communicating with strategic partners to support disasters. There is currently only one commercial satellite operator in North America offering two-way radio, push-to-talk (PTT) capability integrated with telephone. This feature makes it possible to communicate with another terminal in a specific talk group anywhere in CONUS. Authority is FAR 6.302-1 The anticipated period of performance is for one year. THIS NOTICE OF INTENT IS NOT A REQUEST FOR COMPETITIVE QUOTES. NO TELEPHONE INQUIRIES WILL BE ACCEPTED. A determination by the Government not to compete this acquisition based upon responses to this notice is solely within the discretion of the Government.

Contracting Office Address:

500 C Street SW

Patriots Plaza -- 5th Floor

Washington, District of Columbia 20472

United States

Primary Point of Contact.:

Christine Thomas

christine.thomas@associates.fema.dhs.gov

/////

Anyway here is the Reuters story central to this whole turn of narrative, a new system "Outside of the Military Industrial Complex" indeed.

REUTERS: Government to Share Cyber Security Information with Private Sector - By Joseph Menn | May 15, 2013

SOURCE http://www.insurancejournal.com/news/national/2013/05/15/292065.htm

The U.S. government will use classified information about software vulnerabilities for the first time to protect companies outside of the military industrial complex, top officials told Reuters this week.

Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs that the general population does not realize are possible.

“It is a way to share information about known vulnerabilities that may not be commonly available,” Napolitano said at the Reuters Cybersecurity Summit in Washington, D.C.

The information would come from “a variety of sources” including intelligence agencies, she said on Tuesday.

The National Security Agency and other intelligence agencies develop and acquire knowledge about software flaws in order to penetrate overseas networks. Until now, there has been no straightforward way for these agencies to share that classified data with U.S. companies outside the defense sector, even though those companies could become victims of cyber attacks.

The plan is to discreetly share the data through what the government calls Enhanced Cybersecurity Services. Under a February presidential order, those services will be offered by telecommunications and defense companies to utilities, banks and other critical infrastructure companies that choose to pay for them.

Napolitano’s Department of Homeland Security will take the information from the NSA and other sources, and relay it to service providers with security clearances. The service providers would then use these “attack signatures” – such as Internet routing data and content associated with known adversary groups – to screen out malicious traffic.

Napolitano’s comments were the first disclosure that the screening would also cover attacks on software using methods known to the government that have not been disclosed to the software manufacturers or buyers.

While U.S. intelligence agencies have at times warned software manufacturers, such as Microsoft Corp. and Google Inc., or Homeland Security officials of specific, declassified problems, the new system will be machine-to-machine and far more rapid.

It reflects the realization that many espionage attacks from overseas are aimed at the private sector and that future destructive attacks may arrive the same way. (Classified attack signatures have been used to protect defense manufacturers under a Pentagon program.)

House of Representatives Intelligence Committee Chairman Mike Rogers said he was glad about the plan to share more broadly information about vulnerabilities, while maintaining control of the process to avoid tipping off rival countries or criminals.

“This can’t happen if you post it on a website,” Rogers, a Republican and lead author of a cybersecurity information-sharing bill that has passed the House, told the Summit. “We have to find a forum in which we can share it, and 10 providers serve 80 percent of the market. We have classified relationships with a good number of them.”

Among those that have agreed to provide the classified security services are AT&T Inc. and Raytheon Co. Northrop Grumman Corp. said this week it had also joined the program.

The secret but widespread U.S. practice of buying up tools leveraging unknown or “zero-day” software flaws for spying or attacks was the subject of a Reuters Special Report last week, in which former White House cybersecurity advisors said more flaws should be disclosed for defensive reasons.

Michael Daniel, the White House cybersecurity policy coordinator, told the Summit the Enhanced Cybersecurity Services program was still evolving and the type of information shared would change as threats do.

“We want to use the full capabilities that we have to protect as much of the critical infrastructure as we can with that program,” he said.

(Reporting by Joseph Menn; Editing by Tiffany Wu and Leslie Gevirtz)

/////////

Here is the earlier Zero Day story: Booming 'zero-day' trade has Washington cyber experts worried | Reuters

(Reuters) - The proliferation of hacking tools known as zero-day exploits is raising concerns at the highest levels in Washington, even as U.S. agencies and defense contractors have become the biggest buyers of such products.

White House cybersecurity policy coordinator Michael Daniel said the trend was "very worrisome to us."

Asked if U.S. government buying in the offensive market was adding to the problem, Daniel said more study was needed. "There is a lot more work to be done in that space to look at the economic questions...so we can do a better job on the cost-benefit analysis," he said.

Some security experts say the government's purchasing power could help instead of hurt. They argue the U.S. government should bring the market into the open by announcing it will pay top dollar for zero-days and then disclosing all vulnerabilities to the companies concerned and their customers.

"Given that people are now buying vulnerabilities, the U.S. should simply announce that it is cornering the market, that they will pay 10 times anyone else," said Dan Geer, chief information security officer at In-Q-Tel, the U.S. intelligence community's venture capital firm. He said he was speaking outside of his official capacity.

IN-Q-TEL TROLLING. FACK... This story is going all over the place. In-Q-Tel is the CIA's venture capital wing, worth noting for those unfamiliar. They use government money to make private venture capitalists tons of profits - for example building up Keyhole into Google Earth, which, when installed on your computer phones home constantly.

See: https://www.cia.gov/library/publications/additional-publications/in-q-tel/

In-Q-Tel - Wikipedia. Among other things: "In-Q-Tel sold 5,636 shares of Google, worth over $2.2 million, on Nov 15, 2005.[6] The stocks were a result of Google’s acquisition of Keyhole, the CIA funded satellite mapping software now known asGoogle Earth."

Exclusive: Google, CIA Invest in 'Future' of Web Monitoring | Danger Room | Wired.com: "The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future."

In-Q-Tel: The CIA's Tax-Funded Player In Silicon Valley : All Tech Considered : NPR && 25 Cutting Edge Companies Funded By The Central Intelligence Agency - Business Insider

/////

Batchez of linx follow when diving into this newest gravy train. Here is a plain setup showing a bunch of classified stuff about to go out the door to shady contractors, I'm sure none of them sketchballs with foreign intelligence angles who will sell out and use the good stuff to attack for massive profit.

DIBS ON YOUR INTERNETS: This is probably the original DIB thing now foisted on America at large, or closer to it:

www.dc3.mil/dcise/DIB Enhanced Cybersecurity Services Procedures.pdf
DIB Enhanced Cybersecurity Services (DECS)

The Department of Defense (DoD) in coordination with the Department of Homeland Security (DHS) is actively engaged in multiple efforts to foster mutually beneficial partnerships with the Defense Industrial Base (DIB) to protect DoD information residing on or passing though DIB company systems. One such effort is the DIB Cyber Security/Information Assurance (CS/IA) Program, including its optional DIB Enhanced Cybersecurity Services (DECS) component.

Under the optional DECS component of the DIB CS/IA Program, the Government will furnish classified cyber threat and technical information either to a DIB company or to the DIB company’s Commercial Service Provider (CSP). This sensitive, Government-furnished information enables these DIB companies, or the CSPs on behalf of their DIB customers, to counter additional types of known malicious cyber activity, to further protect DoD program information.

///////

This is also nuts: www.uscg.mil/hq/cg5/cg544/docs/ECS_Fact_Sheet.pdf

And: Raytheon, Lockheed Get U.S. Secrets as Cybersecurity Go-Betweens

Cyber Security, Critical Infrastructure, and Obama’s Executive Order - Deloitte CIO - WSJ

Northrop, US DHS team up to support enhanced cybersecurity services :: Strategic Defence Intelligence

U.S. gives big, secret push to Internet surveillance | Politics and Law - CNET News

///////

Other Major Moves of Note right now: Of course the Bitcoin ecosystem got a major swipe at it from Department of Homeland Security's new uber-agency, Homeland Security Investigations. Warrant Reveals Homeland Security Seized Mt. Gox’s Dwolla Account for ‘Unlicensed Money Transmitting’ | Betabeat. I covered some key notes on the ever-spreading DHS-HSI organization in April 2012.

Associated Press situation is a big deal too. via @johnknefel: What's at Stake When the Department of Justice Seizes AP Phone Records | Politics News | Rolling Stone

Anyway I will leave it there for now. The Hack Cartel rides high today, but as with all these corrupt authoritarian bubbles they tumble sooner or later.

The Cyberwar fleet of fools will sink of its own accord, but how many innocent fishing boats will get capsized in the wake of their fooling about?

Cubic NUWAIX: Spoiler Alert! Uncompetitive Bidding for Cubic Apocalyptic Scenarios: NUWAIX 2013 Minot nuclear exercise & dramatic theft of explosives in Montana

HOW TO CUBIC YR APOCALYPTIC SKRILLO FLOW? uncompetitive bidding :)

dtra-contract.png

source- CBRNE Exercise / CMAP Support Services - Federal Business Opportunities: Opportunities J&A6.302-1_-_J3PBCS5990.pdf - Dec 7 2012

Quick post about how much money you can make simulating the apocalypse for the new Homeland Security & domestic military ops structure. Cubic NUWAIX - you has it! Spoiler Alert for Exercise Scenario: Open Ended Profits!

How to sign off on something sketchy - even the attorney is laying low:


dtra-sekrit.png

A somewhat interesting event is happening in a few sites around the midwest - ARDENT SENTRY 2013 is a major annual domestic military exercise - with a whole series of simulated events run in different places. Interestingly NUWAIX 2013 involves a simulated nuclear incident in Minot North Dakota, a place known for both nuclear technology and odd incidents.

Additionally there was a major theft of explosives round about those parts recently as well, no doubt by SAIC minions. cryptogon.com » Montana: 559 Pounds of High Explosives Stolen from U.S. Forrest Service Bunker - source KPAX:

The federal Bureau of Alcohol, Tobacco, Firearms and Explosives, the U.S. Forest Service, and the Carbon County Sheriff’s Office are asking for help from the public in gathering information about the theft of approximately 559 pounds of high explosives from a USFS explosives bunker located near Red Lodge.

A press release from the ATF says that in April 2013, someone used forced entry to get into an explosives storage facility owned and operated by the U. S. Forest Service, which is located about two miles south of Red Lodge.

Officials say that various emulsion-type explosives, explosive cast boosters and detonating cord were taken from the facility.

Hence one could speculate an event involving nukes, dynamite, ideally, cigar twirling ubervillains with headquarters on trains.

More interestingly - or concretely anyway - we find that the mysterious Cubic Corporation has an apparently open-ended contract doing these nuclear exercises & such. "Indefinite Delivery Indefinite Quantity" IDIQ contract with Cubic Defense Applications Inc (CAI) "without using full and open competition".

Military & domestic exercises have a certain level of interest from alternative researchers and people that annoy Obama on the Internet because they have been known to relate to 'real world events' in different ways - like for example, if you have an exercise it's a good day to launch wars because the planes are already flying around etc. Recently this happened with a European bombing campaign of Libya actually - "Southern Mistral" was the exercise.

This is about DSCA - Defense Support of Civil Authorities! As discussed earlier at the NORTHCOM level this is CONPLAN 3501. dsca.army.mil: DSCA Training

dsca.png

Also: Defense Support of Civil authorities - Wikipedia, the free encyclopedia

NORAD and USNORTHCOM Conduct ARDENT SENTRY 2012 - http://www.northcom.mil/News/2012/042412.html

April 24, 2012

PETERSON AIR FORCE BASE, Colo. - The North American Aerospace Defense Command and U.S. Northern Command will conduct a major exercise, ARDENT SENTRY 2012, focused on Defense Support of Civil Authorities, May 2 – 9, 2012.

The exercise will be primarily a Command Post Exercise, but there will be field training events within the exercise. Those events will take place in North Dakota, Oregon, Texas, Alaska, Connecticut and Nova Scotia and involve United States and Canadian military units.

- North Dakota, the Air Force Global Strike Command will respond to a simulated Nuclear Weapons Incident (NUWAIX) on Minot Air Force Base.

- Oregon, the Oregon National Guard will work with state and local officials to respond to numerous weather-related and security events.

- Texas, US Army North will deploy a task force to work through the process of leading a military response to a major hurricane.

- Alaska, Joint Task Force-Alaska will conduct a coordinated response to a major aircraft crash in a remote area.

- Nova Scotia, Canadian and US Naval forces will work together to handle a security related event.

ARDENT SENTRY 12 will validate existing plans, policies, and procedures, including the Federal Inter-agency Response Plan, as well as state and regional plans.

For more information, contact USNORTHCOM Public Affairs at 719-554-6889 or 719-304-6097.

/////

We have to keep a special eye on Minot because of the mysterious 2007 Minot Nuclear Incident. Google that term - wiki here. People died, it was very strange. The wiki version is buttoned down pretty tightly - 2007 United States Air Force nuclear weapons incident - Wikipedia as a lot of odd things happened including possibly a fragmentary attempt to escalate the nuclear posture outside the authentic US chain of command (aka Cheney faction starts playing around).

Hence when there is another NORTHCOM exercise at Minot for NUWAIX, Minot's weird recent history is certainly related - "Don't forget where these things are, right you guyz?"

minot-nuclear-incident.png

/////

Related Linx - NUWAIX ALERTZ & so forth: Nevada internal planning for these exercises & moar. http://www.nv.doe.gov/nationalsecurity/homelandsecurity/frmac/pdfs/Events_Calendar.pdf

The President may be trolling GrumpyCats on the interwebs nowadays. Yet a few radars always go up over nuclear exercises.

Nuclear incident drills to start Monday across Montana | WHAT REALLY HAPPENED

ALERT... Hundreds of Pounds of Explosives 'Stolen' From Montana Bunker!... NUCLEAR Drill in Montana on May 6th! | KnowTheLies.com - The Truth is Hidden in Plain View...

ALERT!... NUWAIX 2013... NUCLEAR Drill in Montana on May 6th! | KnowTheLies.com - The Truth is Hidden in Plain View...

Nuclear incident drills to start Monday across Montana | Great Falls Tribune | greatfallstribune.com - PAYWALLD

Great name for a site eh?? NESARA- REPUBLIC RESTORED - Galactic News: Nuclear Incident drills in Montana starting Monday

More seriously though, This whole thing sounded nicely insane. DTRA Increases Cubic CBRNE Support Contract | Global Biodefense

DTRA Increases Cubic CBRNE Support Contract

Posted on November 28, 2012

The Defense Threat Reduction Agency (DTRA) has announced intentions to increase the funding ceiling on an existing Chemical, Biological, Radiological, Nuclear, High-Yield Explosives (CBRNE) Exercise Support Services contract with Cubic Applications, Inc. (CAI).

As a result of unanticipated increases in the quantity of Foreign Consequence Management (FCM), Nuclear Weapons Accident / Incident Exercise (NUWAIX) and Consequence Management Assistance Program (CMAP) events in FY13-14, the government requires an increase in the ceiling of the contract to ensure immediate and continued support of current and scheduled efforts in Fiscal Year 2013-14. The increase results in no change to the ordering period of the contract which continues through July of 2014.

“As CAI has over eight years’ experience in the planning, development, and execution of FCM/NUWAIX and CMAP efforts, only CAI possesses the in-depth knowledge and expertise required to plan, develop, and execute the current and scheduled FCM/NUWAIX and CMAP requirements,” states the DTRA announcement. “Further, as the current performer and executor of these highly specialized/niche counter CBRNE Exercise Support services, CAI is the only source capable of fulfilling the Government’s requirements.”

The current effort with CAI is managed under HDTRA1-04-D-0020. Due to current and anticipated growth in these areas, the agency expressed intentions to re-compete the program contract prior to expiration in January 2014.

CAI and parent company Cubic Corporation of San Diego, CA are engaged in the design, development, manufacture, integration, and sustainment of high technology systems, products, and services for government and commercial customers. Cubic employs nearly 7,800 people worldwide.

//////

Contract to spec: Google term HDTRA1-04-D-0020 gives more on the exercise contract. CUBIC snags $3.7 million here DTRA.mil 2010-07 BC Contract Awards Over 100K.xls

JustificationsApprovals - DTRA other loopholes / adjustments filed for contracts, listed here.

CBRNE Exercise / CMAP Support Services - Federal Business Opportunities: Opportunities

CBRNE Exercise / CMAP Support Services

Solicitation Number: J3PBCS5990

Agency: Other Defense Agencies
Office: Defense Threat Reduction Agency
Location: Defense Threat Reduction Agency (Headquarters)

/////

Ah yes Cubic Corporation was rumored to be associated with the Trapwire global surveillance grip project. They denied it. It's sort of indirect, but it's funny that Cubic has its fingers in deez pies and near other interesting pies as well.

VioletBlue Examining the ties between TrapWire, Abraxas and Anonymizer | ZDNet

Technically, Cubic has nothing to do with Abraxas Applications, which is behind TrapWire. But there are some historical vestiges as well as current shareholder arrangements that make the connections between Cubic, Abraxas Applications and Abraxas Corp. far more muddled than initially portrayed.

People are saying that TrapWire is linked to Anonymizer -- popular among activists and at-risk populations -- because Abraxas Corporation acquired Anonymizer in 2008.

Abraxas Corporation's parent company Cubic Corporation issued a statement saying that Cubic -- and its Abraxas Corporation -- have no affiliation with TrapWire, which they say is the product of a separate company, Abraxas Applications.

Cubic Corporation acquired Abraxas Corporation in November 2010 for $124 million. Cubic has three units focused on defense systems, mission services and transportation for military operations. Trapwire's software is designed to thwart terrorist threats and criminal attacks. In other words, Cubic and the two Abraxas companies live in opposite ends of the same neighborhood.

It's also true that Abraxas Applications was spun off -- out of Abraxas Corporation -- into its own software business in 2007, before the Anonymizer acquisition.

Abraxas Corporation developed TrapWire beginning in 2004 (PDF link to report of work shared between Abraxas Corporation and Abraxas Applications).

When TrapWire became ready to sell as a commercial product, Abraxas Applications was launched to do so in 2007.

The intent for Abraxas Applications at the outset was to have both Abraxas projects play together under the direction of both companies' former CEO, Hollis Helm, former chief of the CIA's National Resources Division.

The Barrett Brown research project is currently still hosting a pile of info on Cubic:Cubic Corporation - Project PM. Good point "Free Barrett Brown | Support the defense of Barrett Brown: imprisoned American journalist and activist, founder of Project PM. Since he was in fact supporting a research project calling attention to Cubic.

Cubic Corporation Has No Affiliation with Trapwire, Inc. > Cubic Corporation

This is worth documenting. It takes a special bureaucracy to really shape such technical realities, bringing them forth into our world. Cubic Corporation: more evidence of TrapWire link; their darker side exposed | Darker Net

1. Recently DARPA (part of the Pentagon) awarded Cubic Corporation $6 million to develop a “laser-emitting targeting computer” for American military snipers. It’s called ‘One Shot XG’ (see photo above) “that will allow the sniper to make kill shots “under crosswind conditions, at the maximum effective range of current and future weapons.”
2. In 2004, Cubic Corporation were granted a $6.5 million subcontract from General Dynamics Amphibious Systems to develop and produce a Driver Simulator and a Turret Simulator for the Marine Corps new Expeditionary Fighting Vehicle (EFV).
3. Cubic Corporation were also awarded another $6 million contract from Raytheon/Lockheed Martin Javelin Joint Venture to produce tactical trainers for RLM’s shoulder launched, “fire-and-forget” anti-tank missile.
4. Cubic are also building the Surveillance Target Attack Radar System (STARS), an air/ground data link system for the US military.
5. Two days ago Cubic Corporation put out a press release denying any link with TrapWire, which we now know is questionable (if we go by their directors listings). Well here’s another Cubic Corp press release (from May 2010):

ORLANDO, Florida – May 17, 2010 – Cubic’s Simulation Systems Division, a defense systems unit of Cubic Corporation (NYSE: CUB), has been awarded a contract valued at approximately $4.8 million to supply 27 of its COMBATREDI systems to the Florida Army National Guard, along with four 180-degree Warrior Skills Trainers (WST), a vehicle trainer that works with COMBATREDI. The award represents Cubic’s first sale of the new COMBATREDI system, which immerses users in a highly realistic 360-degree “virtual reality” environment. COMBATREDI is a new approach for Cubic, its first completely tetherless, user-worn virtual training system. It features a high-definition helmet-mounted OLED video display that delivers game-quality graphics with a 60-by-45-degree field of view, and an integrated 3D stereo headset for sound effects. Trainees are able to move through a 360-degree virtual environment, including entering buildings, as if it were real. The user carries a realistic wireless “surrogate” rifle that performs like a real one, requiring things like magazine changes and selecting the correct firing mode to operate correctly. Cubic introduced the new system to potential military users late last year. “Cubic is pleased that it hasn’t taken long for the groundbreaking characteristics of COMBATREDI to be recognized by the user community,” said Tony Padgett, Immersive Product Line Manager for Cubic Simulation Systems in Orlando. “COMBATREDI fully immerses trainees into the virtual environment. This is a whole new way to train the dismounted soldier.” Padgett said COMBATREDI allows individual soldiers to be trained almost anywhere, incorporating virtually limitless scenarios without the need for dedicated facilities. The WST system also being delivered to the Florida Army National Guard projects realistic high-fidelity scenes on large screens using the Virtual Battle Space 2 (VBS2) engine. This system is in use in multiple U.S. Army locations.

////////

Anyway also here is an EPA exercise schedule & workshop list: Planning and Exercise Schedule | Region 8 | US EPA

epa-exercise-workshop.png

Mainly I would say that training exercises should be kept to the absolute minimum necessary, and indeed they should not be an opportunity for shadowy corporations like Cubic to profit from open-ended contracts.

Pentagon domestic operations switches from "pull" to "push" on 24-48hr timelines: "Defense Support of Civil Authorites" expands

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

There is also a video here: http://www.pentagonchannel.mil/Video.aspx?videoid=285596

Mirrored: Domestic Pentagon ops expands Defense Support of Civil Authorities vs domestic extremists - YouTube

//// UPDATE 4.22.13: I forgot! Here is one version of USNORTHCOM CONPLAN 3501. Thanx to YAN, reddit, & Cryptogon for taking note of this post! This video from the Boston metro area shows what domestic militarization of police is all about:

Also please follow PublicIntelligence.net and Cryptome.org for more handy docs. PI in particular has been pretty well on top of this.////

Mission drift into the US continues as the Pentagon contemplates dealing with "domestic extremists" under the rubric of Defense Support of Civil Authorities (DSCA) - one aspect of which is the US Northern Command's "USNORTHCOM CONPLAN 3501".

CONPLAN 3501, This generic emergency plan is relatively easy to obtain (most of the text), but it is the "friendly" hand of the DOD compared to the more mysterious and riot-control-oriented "USNORTHCOM CONPLAN 3502" entitled "Civil Disturbance Operations" (CDO). This surfaced in researching the role of Northcom at the 2008 Republican National Convention, which was a very 3502 CDO style operation with National Guard controlling space on Kellogg Blvd. CONPLAN 3502 is the post-2002 version of GARDEN PLOT, the 1960s-1990s template plan for domestic military deployments, like for example in the LA Riots.

This extends the story from late 2010: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com and reconfirms various aspects.

/////////////

Here is the new front-piece document. Also bonus weird stuff about the ever popular integration of North America.

An interesting Snippet:

Loosely-networked or individually motivated violent extremists will continue to exhort followers and encourage violent extremism in the homeland.

o HVEs will operate alone or organize in small groups and will be largely autonomous in their operations; they will have access to web-based resources to assist them in their operational planning.

o Military members and facilities will remain prominent targets of terrorists, and particularly by HVEs.

ł DoD will be called upon to provide significant resources and capabilities during a catastrophic event in the homeland.

o The National Response Framework will remain the primary instrument for applying Federal capabilities during disaster response.

And

Rapid and actionable intelligence on terrorist threats

DoD will maintain and enhance the Joint Intelligence Task Force for Combating Terrorism (JITF-CT) as its key node for sharing intelligence with interagency partners on terrorist threats. DoD will improve and refine intelligence and information-sharing relationships that have developed since 9/11 and as a result of the Fort Hood shootings.

DoD maintains a robust array of foreign intelligence capabilities, and sharing relevant counterterrorism-related information with the Federal Bureau of Investigations (FBI) and other key parties is vital to the prevention of potential terrorist threats to the homeland. JITF-CT will remain the focal point for DoD’s outreach and sharing of intelligence and information with the FBI, the Office of the Director of National Intelligence (ODNI), and the National Counterterrorism Center (NCTC). Additionally, DoD will expand its participation within the various FBI Joint Terrorism Task Forces (JTTFs),9 as well as other similar entities to maximize “top-down” and “bottom-up” sharing of key pieces of intelligence and information, consistent with applicable law and policy.

And of course, Unity of Effort and the ever popular Council of Governors:

Promote Federal-State Unity of Effort

Unity of effort between the Federal Government and States must be one of DoD’s guiding principles in the homeland, since unifying DoD’s efforts with those of its external partners improves collaboration and shortens response times for meeting life-saving needs during emergencies. Unity of effort also means greater national preparedness at less overall cost, while preserving both Federal and State constitutional requirements and responsibilities. DoD and its Federal partners must continue to strengthen unity of effort with States to define common goals regarding capabilities, structures, and processes for responses to disaster and emergencies in the homeland. The Council of Governors – established by Executive Order in 2010 – will be an essential forum for enhanced, senior-level dialogue among Federal and State civilian and military officials for this purpose.

[.....] DoD will regard dual-status commanders as the usual and customary command and control arrangement in cases where Federal military and State National Guard forces are employed simultaneously in support of civil authorities within the United States.

DoD will continue to refine processes for dual-status commanders and their associated command structures. By leveraging the use of such commanders, DoD will improve Federal-State communication, economy of force, and force employment for planned events and no-notice or imminent incidents. Historic examples of the employment of dual status commanders include national special security events such as the Democratic and Republican national conventions and responses to disasters like Hurricane Sandy and wildfires in the western United States...

Vague talk of militarized domestic databases always good:

Since Federal and State military components have varying requirements for relevant information and level of detail, development of a COP solution need not specify systems, hardware, or software. Instead, it must be based on common data from authoritative military or civilian databases that flow to various systems in a common format.....

The DCE/DCO structure is reconfirmed to be key to domestic military operations:

DoD will use the planning capacity of Defense Coordinating Elements (DCEs) to expand planning cooperation at the regional level so that Departmental capabilities are considered in FEMA-led regional planning efforts. DoD will also build an integrated organizational architecture for its liaison and coordinating officers at various headquarters.

The ten FEMA regional offices are key nodes for integrating Federal plans with State and local plans, and DCEs within these regional offices are essential for operational and tactical unity of effort in an adaptive environment. This regional planning relationship bridges the gap between State-level planning conducted at a National Guard’s Joint Force Headquarters (JFHQ)-State and DoD and DHS national-level planning. The JFHQs in each of the 54 States and Territoriesprovide vital ties to State emergency officials and the National Guard Bureau. This enduring synergy positions the JFHQ as the key State-level organization for integrating the emergency plans of local DoD installations with State plans and FEMA regional plans.

DoD will deepen and facilitate rigorous Federal, regional, and State-level planning, training, and exercises through coordination and liaison arrangements that support civil authorities at all levels. These arrangements include DoD liaison officers at DHS and FEMA, Defense Coordinating Officers (DCOs), and Emergency Preparedness Liaison Officers from each Service.....

FULL DOCUMENT: Pentagon domestic ops Homeland Defense Strategy 2.2013

/////////////

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

By Jim Garamone - American Forces Press Service

WASHINGTON, April 1, 2013 – The Defense Department incorporated hard lessons learned when it codified its new homeland defense and civil support strategy, said Todd M. Rosenblum, DOD’s top homeland defense official.

In an interview with American Forces Press Service and the Pentagon Channel, Rosenblum, the acting assistant secretary of defense for homeland defense and Americas’ security affairs, said the new strategy is a recognition that the operating environment has changed.

“We face new threats, we have new vulnerabilities, we have new dependencies, most importantly we have a new way to do business,” Rosenblum said during a Pentagon interview. “We have to capture that and make sure the department is prepared and directed toward being more effective and efficient as we can be.”

The Defense Department is charged with defending the homeland from attack. U.S. Northern Command is further charged with working with state and local entities and other federal agencies to provide support in times of natural or man-made disasters. In the first instance, DOD has the lead. In the second, another federal agency -- such as the Federal Emergency Management Agency -- has the lead.

The strategy, released in February, looks at the lessons learned from past experiences -- from Hurricane Katrina through Hurricane Sandy.

They also looked at changes including the growth of communications networks, dependence on private-sector capabilities and “the rising expectations from the president and from the secretary, and certainly from the American people, that we will be prepared to provide support to civil authorities within a 24- to 48-hour window,” Rosenblum said.

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

“So we are postured to provide assistance as fast and rapidly as possible,” Rosenblum said.

The vast difference between the response to Katrina in 2005 and to Sandy in 2012 shows the effectiveness of the new strategy, he said.

“We were more efficient, timely and effective in our support to Hurricane Sandy,” Rosenblum said. “This is because we did integrated planning within DOD, with our federal partners, and with our state partners. We recognized the need to not wait to be called upon, but to pre-position our support capabilities knowing there’s going to be audibles and ad hoc requests.”

Planning is at the heart of the strategy, he said. Integrated planning -- with state and local officials, with other federal agencies and with non-governmental entities -- has increased visibility and prominence. The National Guard -- an organization that bridges state and federal efforts -- continues to play a crucial role. But, Rosenblum noted, the strategy recognizes that response to disasters requires an all-of-government approach.

Cyberattacks, he said, also could produce the type of man-made disaster that would require DOD assistance. The homeland defense mission codifies requirements to provide cyberdefense, he added.

“The threats to networks and critical infrastructure increase when we are engaged in operations overseas,” he said. “The physical effects of cyberattacks can impact our military operation capabilities and response capabilities.”

The fiscal environment impacts this -- and all other -- strategies.

“The sequester is real and effecting DOD through readiness, training,” Rosenblum said. “It is difficult for the department to plan and budget intelligently, when we don’t have budget certainty.”

Officials devised the strategy when the department had already committed to $487 billion in reductions over 10 years.

“Sequester has changed the calculus tremendously,” Rosenblum said. “But this strategy is not about buying new capabilities: It’s about our planning, our processes and our integration.”

////////////

Defense.gov News Release: DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

U.S. Department of Defense

Office of the Assistant Secretary of Defense (Public Affairs)

News Release

On the Web:

http://www.defense.gov/Releases/Release.aspx?ReleaseID=15878

Media contact: +1 (703) 697-5131/697-5132 Public contact:

http://www.defense.gov/landing/comment.aspx

or +1 (703) 571-3343

IMMEDIATE RELEASE No. 172-13

March 22, 2013

DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

The Department of Defense announced today the release of the Strategy for Homeland Defense and Defense Support of Civil Authorities. This policyestablishes DoD’s priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president’s National Security Strategy and the 2012 Defense Strategic Guidance. It links with other DoD and national strategic documents related to missile defense, space, cyberspace, counterterrorism, and the Western Hemisphere. The strategy identifies two priority missions for the department in the homeland: defend U.S. territory from direct attack by state and non-state actors; and provide assistance to domestic civil authorities in the event of natural or manmade disasters, potentially in response to a very significant or catastrophic event.

The strategy emphasizes cost-effective policy mechanisms and innovative approaches to defend the homeland against direct attacks and to provide timely responses to routine and catastrophic events on U.S. territory. It stresses the continuation of DoD capabilities to defend against conventional and emerging threats in the air and maritime domains, while expanding cooperation with federal, state, and local partners to defeat asymmetric threats – including, for example, homegrown violent extremists who may seek to use improvised explosive devices. Additionally, it addresses DoD preparations for responding to man-made and natural disasters.

“The Department of Defense’s contributions to the defense of our nation have evolved over the past decade and account for new threats and challenges. Lessons learned from events like Hurricanes Katrina and Sandy and collaboration with our interagency partners and State Governors have framed our current approach to DoD civil support activities,” said Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Todd Rosenblum. “This strategy emphasizes strengthening our partnerships with federal agencies like the Departments of Homeland Security and Justice, with state and local governments, with the private sector, and with our Canadian and Mexican neighbors – not only for more comprehensive approaches to complex security challenges in the homeland, but also to create efficiencies through collaboration and joint action,”

For further information about this strategy, please access http://www.defense.gov/news/Homelanddefensestrategy.pdf

//////////

Never heard of this guy, he is the one doing the news release above. Career includes being Evan Bayh's national security staff & CIA Near East 1988-1993hires_061611094311_Rosenblum_Todd.JPG

Defense.gov Biography: Todd M. Rosenblum

Acting Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs [Acting?]

Todd M. Rosenblum is the Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs. In this position, he advises the Under Secretary of Defense for Policy on the homeland defense activities of the Department and regional security matters for the countries of the Western Hemisphere. He is also responsible for advising the Secretary of Defense on all matters pertaining to defense support to civil and law enforcement authorities in the homeland. Mr. Rosenblum has nearly 25 years of political, policy, and legislative experience in national security affairs.

Prior to his appointment at the Department of Defense in May 2011, Mr. Rosenblum was the Deputy Under Secretary of Intelligence for Plans, Policy, and Performance Management, Department of Homeland Security, from February 2009 to May 2011. He directed strategic and policy planning for the Department’s intelligence program, oversaw budget development and resource allocation priorities for the synchronization of intelligence programs and priorities, provided stewardship and direction for the Information Sharing Enterprise, and ensured that the intelligence program was aligned with national, departmental, and intelligence strategy and requirements.

Mr. Rosenblum was a Professional Staff Member on the Senate Intelligence Committee from March 2005 to November 2008, leading Committee oversight of Department of Defense human intelligence collection programs and Intelligence Community-wide intelligence collection programs and operations in the Middle East. Concurrently and prior to joining the Committee, he served as the Military Legislative Assistant and National Security Advisor to Senator Evan Bayh from January 2001 to November 2008, where he acted as senior counsel and represented the Senator on defense issues and foreign policy, national security legislative actions, and public affairs. He was a member of the Senior Personnel Staff, National Security Cluster, on the Obama Presidential Transition Team from November 2008 to February 2009.   

Mr. Rosenblum held several management and advisory positions at the Department of State and the U.S. Arms Control and Disarmament Agency from August 1994 to January 2001. From April 1999 to January 2001, he was the Executive Assistant/Chief of Staff to the Assistant Secretary of State for Nonproliferation where he provided executive management and policy liaison on the full range of nonproliferation issues. He was the Senior Foreign Affairs Advisor for Northeast Asia at the U.S. Arms Control and Disarmament Agency from August 1994 to April 1999, where he represented the Agency in numerous nonproliferation negotiations and regional security dialogues.

From January 1993 to August 1994, he was the Deputy Political-Military Advisor for the Bureau of Near Eastern Affairs, U.S. Department of State. Mr. Rosenblum chaired an interagency export control working group, providing departmental recommendations on proposed arms sales to the region, and was responsible for ensuring consistency between national policy and regional security assistance activities. He was an Intelligence Officer in the Central Intelligence Agency’s Office of Near Eastern Affairs, Directorate of Intelligence, from September 1988 to January 1993.

Mr. Rosenblum has received numerous individual and group awards from the Department of State, the U.S. Arms Control and Disarmament Agency, and the Central Intelligence Agency. He received his Masters in International Affairs in 1988 from the School of International and Public Affairs, Columbia University, and his Bachelor of Arts in 1986 from Columbian College, The George Washington University.

//////////////

Anyway that should give everyone a little more to work with, given the heightened domestic military operations surrounding the Boston aftermath, it is important to get a sense of where the Pentagon sees itself going in these reactions and ongoing operations -- what happens next is another question.

A great move would be publishing the entire text of USNORTHCOM CONPLAN 3502 Civil Disturbance Operations on the Internets immediately!

2013: Boston, paper gold, Obama signs Stock Act reversal, Homeland Security and food stamps

UPDATE 4.19.2013: MOAR about domestic military operations policy shifts w doc & video: http://www.hongpong.com/archives/2013/04/19/pentagon-domestic-operations-switches-pull-push-24-48hr-timelines-defense-suppor

20130415_whosbuying.jpg

Hang tight folks, it looks like we are on the cusp of another 'burst of change' on a few fronts. You should probably double the watts going to your news radar for at least 10-14 days, if you possibly can. And all those cheesy "financial systems" are getting Extra Discontinuous as they usually do when Collapse starts happening in various segments. I decided to cork out a very rough post on these topics, Your Mileage May Vary thx::

While the Boston situation loaded with symbolism like international flags & the JFK library fire attracts most attention, the reality is that bombings at events are pretty rare and unlikely to happen; once it does the media loops the same traumatizing video clips for web hits. The editorial style: giving viewers agog consciousness that spells ratings. I saw Good Morning America a few mornings ago, it was a massive blitz of domestic violence and a patina of Victoria's Secret models.

With that spectacle set aside for a moment, other trends hitting key points this week include a shady new Stock Act law being signed by Obama and dramatic corrections in several markets including particularly gold. Gotta give some space to the Hill, this is ridiculous:

President Obama quietly signed legislation Monday that rolled back a provision of the STOCK Act that required high-ranking federal employees to disclose their financial information online.

The White House announced Monday that the president had signed S. 716, which repealed a requirement of the Stop Trading on Congressional Knowledge (STOCK) Act requiring the disclosure, which had previously been delayed several times by Congress.

That provision, added to the bipartisan bill aimed at halting insider trading by members of Congress, would have required roughly 28,000 senior government officials to post their financial information online, and had come under harsh criticism from federal government employee unions.
Both chambers of Congress quickly — and near silently — approved the repeal legislation at the end of last week by unanimous consent, just before heading home to their districts.

The STOCK Act was signed by the president a little over one year ago in a highly visible signing ceremony, where he said the legislation would tackle the "deficit of trust" that exists between Washington and the rest of the nation.

The new law scraps a provision that had been hotly contested by federal employees, as well as found to be problematic and even dangerous for high-ranking government workers. Congress twice had passed legislation to delay its implementation. Under that provision, high-ranking government workers would have been required to post their financial information on a publicly available online database.

//////

PAPER GOLD BIG MOVES: The gold market is a peculiar misunderstood beast - it's like a bunch of stuff in vaults with IOU's attached to numbered bars. The IOUs underwrite the financial products like Exchange Traded Fund GLD "gold" - it is operated in reference to the underlying gold's supposed value, but it's not actually a contract providing recourse to the gold.

I flagged for some people a few days ago that the COMEX or commodities exchange gold market, as well as JP Morgan, has had large declines in physical gold reserves in the warehouses recently.

See just recently: 30% of CNT Silver Inventories Withdrawn from COMEX Vaults in 2 Days! | SilverDoctors.com // Why Is JPMorgan's Gold Vault, The Largest In The World, Located Next To The New York Fed's? | Zero Hedge // Especially: Comex Gold Inventories Collapse By Largest Amount Ever On Record

Now today a whopping 122 tons of 'paper gold' got flipped around & tons of margin hikes are getting called on gold traders in different markets around the world, forcing people to keep dumping gold in bursts.

Gold Crush Started With 400 Ton Friday Forced Sale On COMEX | Zero Hedge - tactical deals of the Mega short sale to break through the 'important' price of $1540. Aha... Via Ross Norman of Sharps Pixley,

"Futures trading is performed on a margined basis.. One fund in particular, based in Stamford Connecticut, was identified as the previous shorter of gold and has a history of being caught on the wrong side of the law on a few occasions. As baddies go - they fit the bill nicely.

......The value of the 400 tonnes of gold sold is approximately $20 billion but because it is margined, this short bet would require them to stump up just $1b. The modest short selling in Jan 2013 had prompted little response from the longs - raising questions about their real commitment. By forcing the market lower the Fund sought to prompt a cascade or avalanche of additional selling, proving the lie ; predictably some newswires were premature in announcing the death of the gold bull run doing, in effect, the dirty work of the shorters in driving the market lower still."

These charts are nuts. In recent years, gold drops coincided with bubbles in the S&P type prices, that then crashed. What Happened The Last Time We Saw Gold Drop Like This? | Zero Hedge see 2008 and 2011. Gold Drops Most In 30 Years | Zero Hedge

In recent weeks due to Japan's new hyper-loose monetary policy, crazy things have been happening around the Yen's value. (Australia is spiking moar than anything else it seems) Europe also has a new wave of trust destabilizing the banking system with various deals being attempted in Cyprus & Greece.

(see Which Country's Gold Will Be Sold Next? | Zero Hedge). Also the creditor fascist complex has angled to get at the Greek government's remaining stash of gold so that they can be sacrificed on the altar of the billionaires once and for all.

See also, All Eyes On The Gold Rout, Most Oversold In 14 Years | Zero Hedge . Gold Plummets By Most In 30 Years, Stocks Have Biggest Drop Of 2013 | Zero Hedge - this cuts across a lot of sectors. The CFTC needs to be looked at as well, as some of this material indicates.

The DJIA has been flying high above all of this, though even the corporate news points out that this whole phase of asset value inflation is at least partially due to the Fed's loose monetary policy. Housing prices are "up" they say, what could possibly go wrong?

//////

It's pretty sick meanwhile that an incredibly high level of food stamps are the formal basis for America's food security, at around 23,000,000 households and rising. When Obama entered office this was less than 15,000,000 households -- and the benefits per household are slowly being cut along with much of the social safety net programs both in Minnesota and nationwide. US Households On Foodstamps Hit Record High | Zero Hedge. USDA data.

FoodstampHousholds.jpg

This is a consequence of bailing out banks with trillions of dollars, collateralizing the American people and introducing tons of sovereign credit risk into the US Dollar, the Euro & beyond. It has altered the "biopolitics" of the US to the point that this many people cannot handle generating economic activity in this system to keep themselves alive - and clearly the amount parceled out is declining fast.

//////

CSA's [relatively cheap & nutritious food share subscriptions] and local barter-based currencies are among the more resilient network ideas that ought to get looked at right now. I think there is a pretty severe risk to the stability of the whole country (let alone world) when food stamp debit card systems keep that many millions of families from starving. If nothing else there needs to be fallback systems from the US Dollar & conventional banking system may abruptly halt or radically shift in value or stability. This is something people need to start getting their heads around - so that if the debit cards stop working, different ones operating on some other basis (ie local currencies) can be handed out & millions aren't put in such imminent danger. (see DepressionScrip.com for 1930s substitute local credit instruments - key!)

The food stamp debit cards are usually administered by big banks - giving them yet another lever of functions to 'terrorize' elected officials and bureaucrats into further handing over all the nation's "commons" through fraud & socially constructed economic schemes. The banks have probably the biggest, quickest "kill switch" on social stability. A trivial switch for them to hit compared to most!!

//////

Bitcoin had a big run-up for several days and now has retreated somewhere into the $50-100 range - for a good time keep an eye on Bitcoin Charts. Still, it seems like there's more than enough demand to keep it above $40. However the Bitcoin economy suffers from overly concentrated exchanges.

The biggest exchange, MtGox, has such a large market share - and can't keep up once really huge, shady order floods come in, that the whole Bitcoin economy tends to get "goxxed" and bog down, panic selling and various cats stepping in to buy all the way down.

I am doing a lot of research on Bitcoin right now including the various exchanges (LIST) - in the long run, Bitcoin and other alternative cryptocurrencies share certain features like peer-to-peer encryption/hashing based universal linear transaction registers called "blockchains", and ways of verifying those blockchains with CPU or GPU intensive cryptographic calculations to award more 'coins' and slowly expand the money supply while shoring up trust in the global account ledger.

A new website as well as local Facebook & Twitter accts are getting rolling :) Brand new: follow http://twitter.com/bitcoinmn and http://facebook.com/bitcoinmn for Minnesota Bitcoin goodies!

Bitcoin OTC order book is a chat network approach to decentralized exchange design with trust ranking (like eBay rankings in a way).

Good news for people interesting in making exchanges or intercambios in the form of Ripple, in the early stages an open source project with VC backing to build multi-currency exchanges and trust networks among peers. (chart) Some open source software is available on GitHub for Ripple and its "XRP" intermediary currency, which could then be a proxy to regular fiats or Bitcoin etc.

See also: wow Six reasons why Chinese people will drive the next bull market in bitcoin – Quartz

Mining Bitcoins takes power, but is it an “environmental disaster?” | Ars Technica - wattage will improve - and compared to the phenomenal amount of energy blown on fractional reserve banking derived parasitic functions, Bitcoin is nothing! Also: “Taming the bubble”: investors bet on Bitcoin via derivatives markets | Ars Technica

Paul Krugman Goes on the Attack: Calls Bitcoin “Antisocial” // The Antisocial Network of Bitcoins - NYTimes.com by Krugman! "We have huge economic problems, but green pieces of paper are doing fine — and we should let them alone." LOL that food stamp chart is definitely not keeping the great Keynesian up at night.

/////

A moment for weird Boston links: What did Peter Griffin know about Boston and when did he know it? Watch! Family Guy boston bombing - YouTube Yeah this petition is picking up steam - Petition | Demand that Seth MacFarlane make a public accounting for his foreknowledge of the Boston Bombing | Change.org

This is a popular item now: Boston to Deploy Mass-Casualty Tablet Device During Marathon

Excellent videography: Boston.com viral video page - Boston.com. Also: Israel honors war dead with somber Memorial Day - News - Boston.com

Oh also in that viral video above you can see the military incongruously popping up within about 1 minute 44 secs in Boston as Cryptogon and other news have noted. You'll want to check out TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com about USNORTHCOM CONPLAN 3502 if you haven't already.

/////

SEE previously Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

Homeland Security's New $3.9 Billion Headquarters - Businessweek. Money quote:

In February, one of the DHS’s more persistent naysayers, U.S. Representative John Mica, a Florida Republican, boasted about how he and his fellow party members had curtailed the project. He said he would also like to dismantle much of the DHS.

He’d better act swiftly. If the White House ever gets all the DHS’s divisions on one campus, nobody will want to move them again.

Homeland Security bloat and the great Unemployed: Word went around that ICE was serving a federal warrant pertaining to Boston. ICE is a unit of Department Homeland Security which spawned the little known HSI, or Homeland Security Investigations, division, a new kind of (literal) black helicopter FBI-style agency

The dip in metals and the odd security situation brought Cryptogon.com to recall a post from late 2012 from HomelandSecurityUs.com, the Northeast Intelligence Network site edited by Doug Hagmann & his son. They are pretty conservative and have a fair bit of alarming material about Homeland Security. See Flashback: Warning: "Watch The Metals, When They Dip. It Will Be A Good Indication That Things Are About To Happen."

I'm not even going to get into the stuff coming up about the bomb sniffing dogs and weird "training exercise" angles right now because this other stuff seems more pertinent right now. People that have been at this a long time frequently bump into "exercises" that happen to overlap with 'live events', the argument being many times that exercises created the opportunity for staged events at many previous key points -- though of course governments do run a *lot* of exercises with all their security bloatware anyway.

This is the late 2012 Hagmann interview with a purported Homeland Security "insider" which stated that a dip in precious metals, after the fiscal cliff sets the stage, would presage further economic chaos and an escalation of repression against the American people, along with a major collapse in standard of living. DHS Insider Report: Coming This Spring: "Life for the Average American is Going to Change Significantly". It is kind of "classic stuff" for those of us that keep an eye on these things. The earlier predictions of source "Rosebud" didn't really pan out much in 2012, as these things often don't. But timelines are hard to nail down even for "deep weird" sources with good faith. Take a little while to glance over this, even if it's not your usual fare.

"Rosebud": Stop thinking about a normal situation. The country is divided, which is exactly where Obama wants us to be. We are as ideologically divided as we were during the Civil War and that rift is growing every day. Add in a crisis – and economic crisis – where ATM and EBT cards will stop working. Where bank accounts will contain nothing but air. They are anticipating a revolution and a civil war rolled into one (emphasis added by this author).

We all saw what happened with the Feds & Occupy camps. The American Occupy-style organizing eased off as the US economy was in a kind of stasis during 2012, but if things tense up in 2013 we are looking at a different political situation. In Europe things have been moving at a much different tempo, along with a great deal of confusion, snaky liberal operations, and a rising neofascist & quasi-fascist network is taking root in many nations.

See also The Terrifying Reality of Long-Term Unemployment - Matthew O'Brien - The Atlantic

On a decidedly anti-alarmist tack, Bruce Schneier: The Boston Marathon Bombing: Keep Calm and Carry On - Bruce Schneier - The Atlantic

See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com

///////

MOAR LINX: A bunch of stuff sitting around you may find interesting.

Just weird - part of a scifi based GE marketing campaign: 'The Matrix' is back (in your hospital) | Technically Incorrect - CNET News

Is Facebook's Secretbook Secure? CRYPTOME Colin Powell & Malcolm McDowell at Bohemian Grove 2013-0347.pdf // Hacktivists as Gadflies - Socrates to Jeremy Hammond // DoD Communications Systems Breach in 9/11 Trials

A little grumpycat may be worth reading - Guest Post: Are Individuals The Property Of The Collective? | Zero Hedge amirite Minneapolis?!

In Control at Layer 2: a Tectonic Shift in Network Security| Whitepapers | TechRepublic - hacking optic networks.

Wells Fargo 401(k) Loans Jump 28% as Older Workers Borrow - Bloomberg

CNBC! USD/Bitcoin - MTGOXUSD - Stock Quotes

The Real Story Behind Facebook Moderation and Your Petty Reports | The Internet Offends Me

DARKWEBSEARCH: Shodan: The scariest search engine on the Internet - Apr. 8, 2013

Australian FiberFail with a last mile of copper, you idiots: FTTN a huge “mistake”, says ex-BT CTO | Delimiter

Peak Recovery? | Zero Hedge

11 Economic Crashes That Are Happening RIGHT NOW

Wordpress Mess going on: This plugin should help: WordPress › Limit Login Attempts « WordPress Plugins

////

Anyway this is just a few trends happening now... I feel like the overall tone of this post is pretty conservative, as a lot of the research is coming out of places with that editorial slant. Nonetheless these are sources of information and lines of analysis that anyone is welcome to look at and come to their own conclusions.

I think that we urgently need to get real and start considering lots of alternate solutions, hopefully to avoid more authoritarian and crisis driven, panicky policies, like those fostered in the climate of the Fear of Terrorism which they are going to tediously lay on with a trowel for weeks, alongside major economic instability.

Batten All the Hatches.

Infiltrating Hollywood: The Rise and Fall of The Spook Who Sat By the Door

I remember seeing Spook years ago on a rough videotape with horrible audio at the Soap Factory - shortly thereafter it was possible to obtain the DVD, based on a negative long-hidden in some film vault under a false name.

spook1.png

Spook is one of those incredible movies - a 1973 narrative of a black CIA agent turned domestic revolutionary. The FBI bullied United Artists into dropping the film -- based on an earlier book by Greenlee, which covers the global guerrilla strategies more deeply -- and the actors got blacklisted. Why would the FBI have a problem with a film where black gangs organize to demand autonomy, attack the police & seize military hardware?

Another key element, well done for such a low budget guerrilla project: the portrayal of the US military as a domestic civil repression force -- at least roughly similar to GARDEN PLOT National Guard style deployments seen more frequently back in those days. (GARDEN PLOT has been replaced with USNORTHCOM CONPLAN 3502 "Civil Disturbance Operations" as research here has documented)

spook3.png

There are plenty of funny moments in this film as well - the sense of humor strikes like a Cobra.

spook2.png

TRAILER:

FULL MOVIE! YAY - The Spook Who Sat by the Door by Director & producer Ivan Dixon, written & produced by Sam Greenlee, 102 mins.

I found this followup documentary via the film Hidden Colors' FB. Need to see this!! Infiltrating Hollywood: The Rise and Fall of the Spook Who Sat by the Door | Award Winning, Independent Documentary

Ostrow-Inside-Poster.png

Infiltrating Hollywood: The Rise and Fall of the Spook Who Sat by the Door is an award winning independent documentary on the controversial and FBI repressed 1973 black film The Spook Who Sat By the Door. The Spook Who Sat by The Door is widely hailed as a cult classic and one of the most important underground black productions of the era. The film was selected for preservation by the National Film Registry in 2012.

Through interviews, with author Sam Greenlee, Berlie Dixon, widow of director Ivan Dixon, Academy Award winning editor Michael Kahn, Melvin Van Peebles several actors from the film, investors, academics, Todd Boyd, Ed Guerrero, and Eric Pierson; archival footage and production documents, Infiltrating Hollywood tells the story of The Spook Who Sat by the Door from its inception as a novel to its release and repression.

San Diego Black Film Festival: Best Film, Sacramento International Film Festival: Best Film, Cine-Soul, Athens International Film Festival: Honorable Mention, Martha’s Vineyard African American Film Festival: Finalist HBO Documentary Competition, Saatchi and Saatchi Producer’s Award, International Black Film Festival of Nashville: Best Documentary, Hollywood Black Film Festival: Honorable Mention.

The Rise and Fall of The Spook Who Sat By The Door :Infiltrating Hollywood -Trailer for Infiltrating Hollywood: The Rise and Fall of the Spook Who Sat by the Door, a documentary on the making of the cult film classic. A Film by Christine Acham and Clifford Ward.

// Pt 1 interview //

"The Spook Who Sat By the Door" filmmaker, writer and community activist SAM GREENLEE Answer questions from callers and talks about his LEGENDARY MOVIE. He speaks on the struggle and obstacles when trying to releasing the controversial movie, why they were banned from shooting in Chicago, the reason he and Jesse Jackson dislike each other and more!!!!

// pt 1 of 4 "Project Brotherhood Power Hour" Shot by Lyle Muse

// Pt 2 Spook interview/

///

Sam Greenlee on black filmmaking today (posted in 2008):

///

Anyway these items are just excellent. Thanks Mr Greenlee & the actors who got blacklisted as punishment, good careers crushed including lead Lawrence Cook or "Dan Freeman". And screw Hollywood for papering over how they let the government suppress a film without any accountability.

Syndicate content