CIA

EXCLUSIVE: Such Critical Infrastructures: FBI feeds Anonymous IRC channels to CIA, Pentagon intel, NSA, NORTHCOM in 2012 Intel memo

An FBI "IIR" intelligence report, dated April 12 2012 entitled "Identification of Internet Relay Chat (IRC) Channels Used by Anonymous Members, as of 12 April 2012" surfaces a dicey realm between US military & intelligence and electronic activists. The full report is at scribd.com/doc/246922867/FBI-FOIA-IRC-Chat-Channels-used-by-Anonymous // (Mobile) /// UPDATE: Upvote this post on Reddit & Thanks to YAN for amplifying!

FBI FOIA IRC Chat Channels used by Anonymous by Smiley Hill

A tiny peek into a huge deal: the potential fracas between assorted would-be American military cyberwar commandoes and international (and domestic!) computer activists. This lower-level report (Unclassified//For Official Use Only) (U//FOUO) perhaps is more interesting for its "metadata" rather than thoroughly censored content. Below I also included some other domestic military operations documents below to draw a wider context than just this "cyberwar" stuff, as Ferguson has prompted Gov. Nixon in Missouri to activate the state militia, it's good to read up on what federal legal doctrine for "civil disturbances" is.

fbi-iir1.png
fbi-iir2.png
fbi-iir3.png

Such recipients: In order, it says it is from "DIRECTOR FBI" to:

All FBI field offices

INFO AFOSI DET 331 Andrews AFB Maryland, Headquarters Air Force Office of Special Investigations (also cited in this case http://www.dod.mil/pubs/foi/homeland_defense/intelligence/EFF_vs_DOD_Bates_997_1096.pdf )

CDR USSTRATCOM Offutt AFB Nebraska, Strategic Command commander

CDR USTRANSCOM Scott AFB Illinois, United States Transportation Command commander

CDR1STIO Ft Belvoir Virginia, First Information Operations Command commander - https://www.1stiocmd.army.mil/ (wat? "CDR1STIO" pops in a bunch of other FOIA'd IIRs as well if you googlize it)

CIA WASHINGTON DC - always down for a good time

DEPT OF HOMELAND SECURITY WASHINGTON DC - yes, this hot info wasn't stovepiped away from rivals

DEPT OF JUSTICE WASHINGTON DC - fetching banhammer

DEPT OF STATE WASHINGTON DC

DIA WASHINGTON DC - Defense Intelligence Agency which is huge and low profile - http://www.dia.mil/

DIRNAVCRIMINVSERV - Probably HEADQUARTERS. NAVAL CRIMINAL INVESTIGATIVE SERVICE.

DNI WASHINGTON DC - Director of National Intelligence. (Clapper at the time)

HQ AFOSI Andrews AFB Maryland - Air Force Office of Special Investigations. Tip, if you have some message for them, use their unencrypted contact form to let them know about fraud or etc. What could possibly go wrong? > http://www.osi.af.mil/main/contactus.asp

HQ NORAD USNORTHCOM INTEL PETERSON AFB - US Northern Command located near Colorado Springs was created as Dept of Homeland Security's military counterpart for "Homeland Defense", an elastic concept extending Pentagon involvement with "critical infrastructure," namely the machinery of major corporations. They also revised "GARDEN PLOT" into CONPLAN 3502 Civil Disturbance Operations," relevant in a Ferguson type context under federal mobilization. (see 2010 story) They were also written into Superman's plot.

JOINT STAFF Washington DC - J2 - Director for Intelligence (J2) on the Joint Chiefs of Staff (now this guy)

JWAC DAHLGREN Virginia - Joint Warfare Analysis Center a "premier science and engineering institution" under Strategic Command (USSTRATCOM), which also hosts Cyber Command. see http://www.stratcom.mil/functional_components/

NGA HQ Bethesda Maryland. The National Geospatial Intelligence Agency, like DIA, is up to a lot of things off the radar. They have domestic satellite spying (GEO INT) responsibilities at National Special Security Events which require a special domestic military intel privacy waiver. http://www.stratcom.mil/functional_components/ . Big spenders.

NSA FT GEORGE G MEADE Maryland - National Security Agency at the oddly spelled out Ft Meade. I wonder how many land in this inbox - and how many times "George G" is stored in their databases.

US SECRET SERVICE WASHINGTON DC

USCYBERCOM FT GEORGE G MEADE Maryland - Cyber Command in ur router, sniffin ur packets

WHITE HOUSE SITUATION ROOM WASHINGTON DC.

BT . … I am fairly sure this is a closing list tag like </UL>

////

Serial IIR 4 213 4003 12, "WARNING (U): This is an information report, not finally evaluated intelligence. It is being shared for informational purposes but has not been fully evaluated, integrated with other information, interpreted or analyzed. Receiving agencies are requested not to take action based on this raw reporting without prior coordination with the FBI. Unless a conviction in a criminal proceeding occurs, a presumption of innocence exists for any person being reported on in this IIR." Declassification date appears 20370607, as this hot stuff needs to lay low for a couple more decades.

What is an IIR? It is pretty low level stuff for the FBI. For a bit of info see FBI Intelligence Information Report Handbook | Electronic Frontier Foundation. That document interestingly, at the very end includes a statutory info pipeline from Grand Jury operations to various feds. Patriot Act Section 203(a)(1)( C )(i)(V) certainly makes for an industrious star chamber circuit, but they don't want grand jury info going out in IIRs without asking the HQ attorney.

This document was obtained by Smiley Hill via FOIA. Please follow https://twitter.com/smilyus for more smileable FOIAs on a regular basis.

////

The use of the military - and these contractors in the game now - to police corporate systems labeled as Critical Infrastructure is significant. After all, Missouri Gov Nixon just activated the state militia because of Ferguson.

ferguson-crop2.png ferguson-crop1.png

In the recent FBI writeup freeking out about Ferguson protesters, I took the "critical infrastructure" references to allude to authorizing military activity around corporate electronic assets that might get poked at by angry activists.

“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”

fergusoncrop.png

////

Background on Executive Order 13636:

See NSA's cybersecurity program to protect critical infrastructure revealed - Military & Aerospace Electronics

Feb 2013: Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

CRS analysis on Executive Order: http://fas.org/sgp/crs/misc/R42984.pdf

Feb 2013: Pentagon will require security standards for critical infrastructure networks - Nextgov.com

This is actually a word? Cyberinfrastructure - Wikipedia, the free encyclopedia

Nov 2012: Cyber Order Puts DHS In Charge Of Oversight, Sets Deadlines « Breaking Defense - Defense industry news, analysis and commentary

USA TODAY: Feb 2013: Cybersecurity executive order fosters information sharing for greater good

As for the legal ramifications of domestic military operations and targeting electronic activists with tools like STRATCOM / CYBERCOM retain for battling Al Qaeda servers or whatever, most people say "But, Posse Comitatus!" In reality a vast area of domestic military operations has been expanded and operated by JAGs. See : www.loc.gov/rr/frd/Military_Law/pdf/operational-law-handbook_2012.pdf

This Domestic Operational Law Cyber Realm has a Handbook, People!

DomesticOperationalLaw2011.png

The domestic version of this JAG manual is extremely recommended reading for everyone. See Domestic Operational Law Handbook for Judge Advocates 2011 | Public Intelligence.

Also the newer 248 page Domestic Operational Law Handbook for Judge Advocates 2013 | Public Intelligence is available. You will definitely know moar about WTF is up with weird meshes of civilian/military authority in the US by skimming over this.

PI highlighted a bunch of good 2011 stuff, since we are talking Ferguson anyway, it's worth noting again:

G. The Department of Defense Civil Disturbance Plans

Formerly, DoD’s Civil Disturbance Operations (CDO) plan was known as “GARDEN PLOT.” Since the creation of the Department of Homeland Security and USNORTHCOM however, DoD has delegated to geographic combatant commanders responsibility for developing CDO Contingency Plans (CONPLANs). These geographic commanders’ CONPLANs provide guidance and direction for planning, coordinating, and executing military operations during domestic civil disturbances.

1. Civil Disturbance Operations Mission

Broadly stated, the CDO mission assists civil authorities in restoring law and order in the United States and its territories.58 This mission statement, while not duplicating the language in the Insurrection Act allowing for the use of federal forces to “suppress” insurrection, provides wide latitude to the President to use federal forces to assist civil law enforcement in “restoring” law and order.

The restoration of law and order must be distinguished from the preservation of law and order. CDO mission statements do not allow the joint civil disturbance task force commander to undertake preservation missions. It is generally agreed that missions to restore law and order include dispersing unauthorized assemblages, patrolling disturbed areas, maintaining essential transportation and communications systems, setting up roadblocks, and cordoning off areas. Care should be taken before a military commander accepts missions that are routine maintenance of civil order.

2. Combatant Commanders’ CONPLANs

The CONPLANs provide the basis for all preparation, deployment, employment, and redeployment of Department of Defense component forces, including National Guard forces called to active federal service, for use in domestic civil disturbance operations, in support of civil authorities as directed by the President. The concept of a civil disturbance operation is multi-phased: Phase 0, Shape; Phase I, Anticipate; Phase II, Respond (deployment can occur in either Phase I or Phase II); Phase III, Operate; Phase IV, Stabilize; and Phase V, Transition (redeployment). Prior to deployment, military forces maintain five preparedness postures, called Civil Disturbance Conditions (CIDCONS) in order to alert and react to potential civil disturbance operations. Changes in the CIDCON level are directed by the JDOMS.

3. The Standing Rules for the Use of Force for U.S. Forces

Civil disturbance operations are conducted in accordance with Appendix L of the Standing Rules of Engagement/Standing Rules for the Use of Force for U.S. Forces (SRUF). Guidance on how and when forces can use force in a CDO mission are detailed in that annex. Although the CJCSI is classified, Annex L is not and can be shared with our mission partners.

a. Custody and Detention

All apprehensions should be made by the civil police force unless they are not available or require assistance. Military forces have the authority to detain rioters, looters, or other civilians committing criminal offenses. Civilians taken into custody should be transferred to civilian law enforcement authorities as soon as possible.

All members of the force must remember that state and federal criminal law and procedure govern apprehension. Apprehension is justified only on the basis of probable cause to believe that an offense has been committed and that the person to be apprehended committed the offense. Soldiers should not question detainees beyond basic pedigree such as name and address. If formal questioning of an offender is necessary, civilian police should conduct the interview. If civilian police are not available, CID agents or military police may conduct interviews only if the interview is essential to the civil disturbance mission. Actions taken by Soldiers that do not conform to criminal law constitutional standards could jeopardize future prosecution and subject Soldiers and their Commanders to criminal and/or civil liability.

b. Search and Seizure

CDO CONPLANs anticipate that military forces will generally not be involved in searches unless there is “an immediate danger of violence, destruction of evidence, or escape of violent persons unless the search is conducted without delay.” In all other cases, local authorities should conduct searches. When required to perform searches, federal armed forces may conduct warrantless searches under the same constitutional parameters imposed upon law enforcement officials. Joint Civil Disturbance Task Force forces conducting a warrantless search will fully document the reasons for the search as soon as is reasonably convenient.69 Generally these searches are limited to the following incidents.

(1) Stop and Frisk

If there is a reasonable suspicion based upon articulable facts that a person has committed, is committing, or is about to commit a crime, that person may be temporarily stopped and questioned about his activities. The stop must be limited in duration to that which is reasonably necessary to investigate the suspicion. If there is a reasonable suspicion based on articulable facts that a person is armed or is carrying instruments of violence and that the individual presents an immediate risk of harm, members of the armed force may conduct a “frisk” (an external “patdown” of the clothing) for weapons. Any weapons found during a frisk may be removed from the individual and seized.

(2) Search Incident to Lawful Apprehension

A person lawfully detained may be searched for weapons or destructible evidence. A search for weapons or destructible evidence may also be conducted in the area where the detained person could reach with a sudden movement to obtain a weapon or destroy evidence.

(3) Exigent circumstances

Military forces assisting law enforcement may make a search without a warrant when they have reason to believe (probable cause) that weapons, objects related to criminal activity, or persons believed to have committed an offense, are in the place to be searched; and they have reason to believe that the delay necessary to obtain a search warrant would result in removal of the weapons or destruction of the objects related to criminal activity. For example, Joint Civil Disturbance Task Force forces may stop and search an automobile without a warrant when there is reason to believe that the automobile contains weapons or instruments of violence and/or contains an individual reasonably believed to have committed violence.

(4) Emergency

Military forces in a civil disturbance operation may make an immediate entry into a building when there is reason to believe that entry is necessary to prevent injury to persons, serious damage to property, loss of evidence, to protect public safety, or to render aid to someone who is in danger.

(5) Hot pursuit

Military forces pursuing a person who they have reason to believe has just committed a serious crime, may enter a vehicle or building believed to be entered by the suspect and search the building or vehicle for the person or any weapons that might be used to further his escape.

(6) Plain View

During the course of otherwise lawful activity, military forces may seize any unlawful weapons or objects related to criminal activity which they observe in plain view. When conducting warrantless searches that require a probable cause determination, military forces can obtain advice from a judge advocate; however, the probable cause determination must be made personally by the individual desiring to conduct the search.

If a search warrant is required, local civil authorities should obtain judicially issued search warrants. If local civilian authorities are not available, judge advocates need to be prepared to provide advice on probable cause to military authorities before they approach a local judge or magistrate for a search warrant.

When feasible, all searches conducted by military personnel will be conducted by two personnel with the actual search performed by someone of the same sex.76 A hand receipt or some similar document should be prepared when items of personal property are seized from an individual.

c. Confinement Facilities

The Joint Civil Disturbance Task Force should not operate a detention facility. Any person apprehended should be turned over to the police for detention. Military correctional facilities cannot be used to detain civilians. If available civilian detention facilities cannot accommodate the number of detained persons who are awaiting arraignment, the Joint Civil Disturbance Task Force commander must seek the approval of the SCRAG and Combatant Commander to set up a temporary detention facility.

Should the Task Force be required to operate a detention facility, the detention facility standards and operations should conform, to the maximum extent possible, to current DoD confinement facility operations and will be under the professional supervision and control of Military Police personnel. The establishment and operation of military detention facilities is a temporary expedient and is authorized only until such time as the custody of detained persons can be transferred to civil authorities.

d. Riot Control Agents

Normally, for CDO the deployment and use of riot control agents is allowed as a matter of U.S. policy. However, initial approval authority for its deployment and use may be retained at a level higher than the Joint Civil Disturbance Task Force Commander and may require a specific request.

This is not the same as a state-level activation, but it is the doctrine that is crafted at the federal level these days so I think it's pretty relevant to Ferguson.

timthumb.png

The federal government hasn't taken kindly to people that expose these types of relationships. Barrett Brown's sentencing just got delayed again - but at least the Barrett Brown Review of Arts and Letters and Jail is awesome. For more info FreeBarrettBrown.org.

Exclusive New Court Docs: Oklahoma City Truth is Back! Trentadue's court process unfolds in epic FOIA fight for missing Murrah & motel videotapes

Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]

jessetrentadue.jpg

Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.

Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.

The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.

Press coverage: Sept 9 2013: Judge orders trial in allegedly missing Oklahoma City bombing video case | Deseret News:

SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.

U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.

"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."

At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.

Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.

The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.

Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.

Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.

Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.

Previously on HongPong.com: Apr 19 2010: 2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles | HongPong.com // March 11 2007: New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? | HongPong.com. June 21 2011: Two murky major elements of covert American power: The US Treasury Exchange Stabilization Fund (ESF) & the FBI's little "S Drive" of deleted filez | HongPong.com . Briefly noted tangent at April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com. Item on Dec 28 2010: Russia & China not buying BIS Fractional Reserve Gold currency scheme pushed by the Ben Bernank; FBI ALF informant developing Firefox 4 security, reminds OpenBSD FBI Backdoor | HongPong.com

Moar Notes: For the thoughtful documentary released in 2012 by local activists: Oklahoma City Bombing | Murrah Federal Building 1995 | A Noble Lie. See also notes from Kaye: jesse trentadue | AxXiom for Liberty. Oct 2012: Jesse Trentadue exposes who the FBI uses for informants. A lot of this gets to the FBI's shady secret file pockets such as the mysterious "S Drive": S is for Secret: Jesse Trentadue Discovers the FBI’s S Drive (June 2011). 2009 from IntelWire.com: Trentadue CIA Vaughan Index Sept 2009.

A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.

The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.

While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]

//////

So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?

Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.

Anyway let's have ourselves some fresh court documents:

//////

Trentadue-court Order Grant Motion Strike Deny Motion Sj Ecf

//////

Trentadue-fifth Hardy Declaration Ecf

//////

Trentadue-plaintiff's Opposition Motion to Strike Ecf

//////

Trentadue-memo Motion to Strike Fifth Supplemental Declaration_ecf

OLDER DOCS for yr viewing pleasures:

FBI INFORMANT MANUAL - very important for beginning to discern how informants insert 'fake decision trees' into our reality:

FBI Informant Manual

//////

Intelwire writeup by JM Berger on the Roger Moore angle and such:

29355734 Trentadue CIA Vaughan Index Sept 2009

//////

Anyway I will leave it there for now, but it is great to see this slowly developing story jump forward for another round vs the national security coverup machine!

CIA Revolving Door Resistance: Petraeus called out at CUNY & touring at Duke; Day job operating for fossil fuel Wall Street heavies at KKR

One axiom of the Interwebs research world is that the CIA is Wall Street and Wall Street is the CIA. This reflects many key dynamics, a personal favorite example is laundering of drug money through Wall Street for the benefit of CIA proxies in the "war on drugs".

Anyway a big Wall Street leveraged buyout company, Kohlberg, Kravis, Roberts has obtained Petraeus' services and he is also inserting himself into New York academia on the side. Wall Street Journal: Petraeus Reboots With Private-Equity Giant KKR - WSJ.com. Bloomberg: KKR Hires Ex-CIA Chief Petraeus to Lead Firm’s New Unit - Bloomberg.

Press Release: KKR & Co. L.P. - KKR Appoints General David Petraeus Chairman of KKR Global Institute

NEW YORK--(BUSINESS WIRE)-- Kohlberg Kravis Roberts & Co. L.P. today announced the appointment of retired four-star General and former Director of the CIA David Petraeus as Chairman of the newly created KKR Global Institute.

Henry Kravis, Co-Founder and Co-CEO of KKR, stated: "I have long known and respected General Petraeus and, on behalf of everyone at KKR, I welcome him to the firm. As the world changes and we expand how and where we invest, we are always looking to sharpen the ‘KKR edge.' With the addition of General Petraeus, we are building on the work we have done to understand the investment implications of public policy, macro-economic, regulatory and technology trends globally. We are pleased to bring all of this expertise together under one umbrella, the KKR Global Institute, to deliver the best of KKR's insights for our investors."

Over the past several years, macro-economic and geopolitical considerations, including the heightened role of central banks following the financial crisis, new regulation and major changes in public policy, have led to KKR's increased engagement on these areas and on environmental, social and governance issues. At the same time, KKR is a global firm investing in new and emerging markets that have new risks and opportunities. The KKR Global Institute will be the nexus of KKR's focus on the investment implications of these issues. It will also further build on the firm's efforts to help KKR's portfolio companies expand globally, and it will periodically serve as an outlet for publishing the firm's thought leadership products, including views from portfolio managers and industry experts.

As Chairman of the KKR Global Institute, General Petraeus will work with a team at KKR and in tandem with Ken Mehlman, Global Head of Public Affairs, and Henry McVey, Global Head of Macro & Asset Allocation. In addition to his role as Chairman of the KKR Global Institute, General Petraeus will also support KKR's investment teams in the diligence process, especially when the Firm is considering investments in new geographies.

"KKR is one of the best investment firms in the world," General Petraeus observed. "I am very pleased to join such a great team. I have watched KKR evolve as it adapted to the post-financial crisis world and became a go-to partner for companies worldwide. I look forward to supporting the investment teams in their pursuit of the best opportunities for clients and also being a part of a new initiative to provide additional insights to KKR's clients and companies."

[Yes it is the former Republican Party Chairman Ken Mehlman, CFR member & notable component of log cabin style GOP.]

The opportunistic David Petraeus is attempting to burnish his credentials at CUNY in New York City and was met by student protesters - 90 sec video: CUNY Students Confront War Criminal David Petraeus - YouTube. April 23 NYT: David Petraeus to Join CUNY as Visiting Professor - NYTimes.com.

Also noted earlier on WMR: August 2-4, 2013 -- State Department "foreign affairs" - Wayne Madsen Report

However, political scandal month has just started. Another former high-ranking government official is already preparing his lesson plans for his college course at the City University of New York. Former CIA director David Petraeus, brought down by an affair with Army reserve officer Paula Broadwell, will be teaching courses that favor the building of the Keystone XL pipeline and the benefits of gas fracking and "clean coal."

Petraeus's Wall Street employer, Kohlberg, Kravis, Roberts (KKR) has significant financial stakes in all three energy projects. So, when Petraeus ignited a firestorm of protest at CUNY by accepting a $150,000 salary for teaching a single three-hour course a week, he changed his mind and said he would teach the course for a mere $1. Obviously, KKR's deep-pocketed pals at TransCanada are picking up the difference.

official site: KKR. Kohlberg Kravis Roberts - Wikipedia. Huffpo summarized press release in May: David Petraeus To Head Private Equity Firm KKR's New Global Institute. NYTIMES: K.K.R. Hires Petraeus to Lead Institute - NYTimes.com

POLITICO: Petraeus calls on Congress to back White House Sept 7 2013:

On Wednesday, Petraeus will give his first paid speech since resigning as CIA director in November. It’ll be at Duke University and is titled, “America and the World: A Conversation with Gen. David Petraeus.” Petraeus is working with six veterans’ support groups, and is chairman of the newly created KKR Global Institute for Kohlberg Kravis Roberts. He also is teaching this fall at the University of Southern Californiam, and beginning Monday at the City University of New York.

Ugh anyway that is a nibble on Petraeus for now.

New data mining revelations, DEA drawn in quickly; Privacy & Surveillance DICE, PROTON, CRISSCROSS & CLEARWATER partial master programs? Lexis-Nexis on private side

It's a pretty woolly political scene right now & wanted to slam up some docs leading different directions on this. At least the damn narrative is moving along.

More or less we're looking at the merging of criminal investigations with direct military signals intelligence (SIGINT) technology run by the same contractors that recently ran these technocratic social control 'kinetic' programs for the Pentagon in assorted occupied lands around the Middle East etc.

Naturally the war on drugs first brought this war home - special bonus points for the Viktor Bout angle of the DEA SOD/DICE projects story from Reuters earlier...

Latest: Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987. ......

Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

The program was started in 2007, according to the slides, and has been carried out in great secrecy.

“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

Oh the war on drugs, will your terrible travesties never end... Nice work exposing this program by all involved!! A spectacular catch for sure.

////

Meanwhile we also have yet to deal with the terrible secret Special Operations Division which as this slide makes clear, subverts the entire concept of criminal defense and discovery. Therefore probably all drug cases should be thrown out, eh?

SOD-DEA-coverup.jpeg

Rules of SOD Photo Source - REUTERS

Exclusive: U.S. directs agents to cover up program used to investigate Americans | Reuters via Cryptogon.com: U.S. COMMUNICATIONS INTELLIGENCE SECRETLY SHARED WITH LAW ENFORCEMENT FOR USE AGAINST AMERICANS IN CRIMINAL INVESTIGATIONS

By John Shiffman and Kristina Cooke

WASHINGTON | Mon Aug 5, 2013 3:25pm EDT

(Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.

"I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

"It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

THE SPECIAL OPERATIONS DIVISION

The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.

Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential.

"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."

.....SOD'S BIG SUCCESSES

The unit also played a major role in a 2008 DEA sting in Thailand against Russian arms dealer Viktor Bout; he was sentenced in 2011 to 25 years in prison on charges of conspiring to sell weapons to the Colombian rebel group FARC. The SOD also recently coordinated Project Synergy, a crackdown against manufacturers, wholesalers and retailers of synthetic designer drugs that spanned 35 states and resulted in 227 arrests.

Since its inception, the SOD's mandate has expanded to include narco-terrorism, organized crime and gangs. A DEA spokesman declined to comment on the unit's annual budget. A recent LinkedIn posting on the personal page of a senior SOD official estimated it to be $125 million.

Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE.

The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said.

About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.

"We use it to connect the dots," the official said. ...

//////

OK so let's get to PROTON, CRISSCROSS, CLEARWATER and Lexis-Nexis. I think this covers a lot of new ground. Hard to say if the DOJ side of the story ties in, but the Lexis-Nexis level is pretty clearly documented already but not well known outside of research circles. Also some of this gets to the SCS - Special Collection Service - which I think would have been part of Snowden's tour of duty in CIA.

SOURCE: http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

18 August 2013

PROTON, CLEARWATER and Lexis-Nexis

A Proton/Crisscross job ad below.


A sends:

PROTON, CLEARWATER and LEXIS-NEXIS

Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals.

I suggest American guerillas seek non-Internet modes of communication. If you think Rex Sherwood was pulled over for not using a turn signal, you are wrong.

I was "read on" the PROTON/CRISSCROSS program in late 2006 and was a frequent user of this system for over a year. As part of my duties, I employed PROTON/CRISSCROSS in HUMINT exploitation role. In the Intelligence Community, PROTON/CRISSCROSS is referred to as PROTON. Unless otherwise specified, the same is true in this report.

PROTON is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling. PROTON is the program name as well as the name of the technology. It has been described as "SAP-like", and I suspect that PROTON was once a DEA special program. PROTON is well known in HUMINT and DOJ clandestine law enforcement. It remains the primary, if not fundamental, tool of HUMINT and DOJ law enforcement operations, both of which have considerable overlap in phenomenology and methodology. PROTON carries the FISA caveat because Top Secret FISA collection is contained in PROTON's massive database.

Through my professional associations within the Intelligence Community, I became aware of a Department of Justice (DOJ) system called CLEARWATER. CLEARWATER is similar to PROTON but at the SECRET/NOFORN level of classification and exclusively a DOJ program, where PROTON is CIA, DOJ and DOD. Most DOJ Special Agents and analysts do not have Top Secret clearance. Every informant is run through CLEARWATER, every witness gets vetted through the system.

PROTON and CLEARWATER are not just analytic tools, they provide actionable intelligence and both programs are used everyday for target discovery and development. CLEARWATER practically leads FBI and DEA investigations. PROTON is used throughout HUMINT for asset validation, recruitment, background checks on sources, etc. The FBI and DEA as both law enforcement and intelligence community members have resources of both sides and domestic law enforcement by these agencies is more of a HUMINT operation of the type seen in Afghanistan. Find, Fix, Arrest. PROTON and CLEARWATER work so well that Special Agents and Case Officers can't wait to get data into the system and see how it networks together.

Top Secret and FISA mean NSA sensitive sources and foreign collection. NSA resources are unneeded in America---CALEA and the DOJ have that covered for you under Title III, the Patriot Act and opinion from the federal kangaroo judiciary.

FISA is not only used against terrorists and spies but also private and quasi-government organizations . The most impressive network I ever laid eyes upon was the PROTON derived communications network of the Netherlands and Swiss SWIFT. Allot of target discovery there. It's how you find a needle in a haystack. The U.S. hosts one of three SWIFT secure messaging centers. Well, the NSA and CIA have insured SWIFT is allot less secure. SWIFT is a major communications target and the NSA is deep in that This is a modern take on "follow the money." If Americans are wondering how the IRS found their secret bank accounts..well, here 'ya go.

When I read the description of Drug Enforcement Administrations (DEA) DEA Internet Connectivity Environment (DICE) system: the billions of records, partnership with CIA, NSA and DOD, the need to cover sources at the expense of a fair trail--- it struck me that what was described sounded more like PROTON and/or CLEARWATER.

As I read further, DICE was sounding more like a legitimate DEA program that was being used to provide cover for PROTON and/or CLEARWATER---either intentionally or sacrificially. The early descriptions of DICE present it as an information sharing and collaboration tool through the Internet. The recent public descriptions of DICE are awkward and contrived when compared to past information.

DICE is being used to cover PROTON and/or CLEARWATER.

Properly, CRISSCROSS is the database of telecommunications selectors. Selectors are, in NSA terms, that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI---really any telecommunications "number" or "address" a person would have as a means to contact another, are contained in CRISSCROSS.

PROTON is the operating software written in JAVA for cross-platform usability and runs on JWICS for connectivity to CRISSCROSS.

PROTON contains the tools for network analysis and would be familiar to anyone who has experience in undergraduate social network analysis, statistics and data visualization.

CRISSCROSS has an interesting and murky history. As it was explained to me by a PROTON Program Officer, CRISSCROSS was originally a very secret DEA program to provide a repository for DEA collected selectors. It was, by every account, an excellent resource. With the post-911 reorganization of the Intelligence Community, everyone was required to share their resources for the "War of Terror." CRISSCROSS was very successful and well-received and ultimately exceeded DEA capabilities to manage. The CIA took over as executive agent---but CRISSCROSS is shared by the DOD and DOJ in a co-ownership manner.

It's uncertain if PROTON received Special Collection Service (SCS) data when it was a solely DEA activity, but PROTON presently receives SCS collection amounting to about 1 one terabyte monthly, and that's just selectors, not content. PROTON also receives data from Computer Network Exploitation (CNE), by the now famous Tailored Access Office (TAO). Included as well is an enormous repository of Title III data from CALEA enabled domestic collection, FISA and an enormous amount of purchased data from various communications providers like Intellius.

PROTON does not contain content, only selectors for targeting. Consider that in the context of one (1) terabyte of just selectors per month (just from the SCS) for over 10 years. I have no idea how much the TAO provides, however the two biggest contributors to PROTON are the SCS and TAO.

An analyst or law enforcement officer can "run" a selector in PROTON and visualize the social network of correspondents associated with that selector in a visual format. The user can select and display most frequent numbers called or have called, duration of call, and other functions familiar to social network analysis. An analyst may choose to look at the network in terms of who called who: persons of importance typically have allot of people calling them so we can build a network based on that to determine centricity. We can build a network based on call duration, frequency, date---pick a variable. Sometimes it's useful to look at the outliers which may be hang-arounds to some drug trafficking organization. We can task NSA or DOJ for collection on these hang-arounds and begin network deconstruction from the ground up.

These calling networks include family, friends and other non-target persons. Non-target persons, like family members, are very useful in developing the target and as leverage. Non-target communications provide intelligence from things spoken between people in confidence who may not be aware of the targets activities or associations, like the location of a fugitive who has ceased using his known selectors, but communicates with his mother through her known selectors.

Another very useful feature is the Bankswitch function, which allows network discovery by the calling pattern, not necessarily by a selector. Often, groups of U.S. government interest will use a cellphone, then dispose of them , preventing further intelligence collection from that group of cellphones. Bankswitch allows the analyst to quickly rediscover the calling network that has switched phones. Humans typically have some constant behavior in who and how they make their calls and persons. Groups and enterprises not having supplicated to the U.S. government avarice will have a whole additional set of behaviors in who and how they call.

This is highly useful for calling networks that dispose and rotate telephones regularly. A fresh cellphone provides enough of a lead to discover the calling pattern of the whole network based on historical calling records. Both the DEA and FBI have found this useful in their activities in Columbia, Mexico and the United States.

I know for certain PROTON contains communications selectors on American Citizens (AMCITS) since I ran a query on a number using only a Maryland area code and a partial prefix. PROTON returned a huge list of "masked" domestic numbers. An NSA masked number is always domestic and reveals only the area code and prefix with the rest of the number obscured. A PROTON user can email the NSA with a request to unmask the number---it's in the database, but a user has to present some justification for a number to be unmasked. Voice cuts are available through a similar process.

PROTON is really well thought out. Not only does it provide a wealth of network investigative tools, it also allows for the easy introduction of data. Let's say you're a DEA Special Agent surveilling local boat captains as part of OPERATION PANAMA EXPRESS (PANEX) in Barranquilla Columbia---a major Port of Origin for drugs to the U.S. and someone gives you a business card. Just run the number and see if it hits. The Special Agent" can take that card and mail it to the PROTON Program Office (PPO). Scans, cell pictures of the information are also acceptable to ingest.

An FBI Case Officer attending a UAV conference in Las Vegas can take all the "grey literature" and hand that to the PROTON office as well. The numbers find their way into the database The PROTON office will also ingest entire phone books---still popular in some parts of Europe and Asia. They use a method similar to Google books to automatically turn pages and scan data from them.

Anything that contains a selector can go into PROTON. Part of the PROTON program is the resource that provides software engineering to order unordered data and otherwise make raw data ingestible. PROTON users can add and edit PROTON data as well. If a user discovers the identity of a previously unidentified selector, one can edit that record or leave notes for other users.

With PROTON, you can see who's talking to whom in a telecommunications relationship context. How you hit that network is up to you.

Network deconstruction techniques vary throughout the 'Community. Domestically, the DOJ prefers the highly publicized raid with the media providing the entertainment backdrop. The DEA prefers covertness. The DOD prefers a Predator strike. Yes, those drone attacks are network deconstruction techniques and target selection is often facilitated, if not provided, by PROTON.

As stated earlier, CLEARWATER is a SECRET/NOFORN version of PROTON. The DEA red herring called DICE reportedly contained NSA collection which rules-out CLEARWATER (a S//NF system) and highlights PROTON (a TS//SI system) as the source of DICE intelligence.

I'm providing information on both since the government is no longer under constitutional restraint and is illegitimate. Parallel Construction. You fuckers. A cornerstone of American law and western culture sacrificed for the security of the Elites.

With the CALEA requirements, TITLE III collection is very simple affair involving a court order and the Cisco routers which, through CALEA legislation, are engineered for surveillance. Cisco is a very enthusiastic partner to the Intelligence Community---one of those sensitive relationships managed through the NSA Special Source Operations office. The NSA finesses such relationships---with the DOJ, you get a thug in a nice suit and the quiet menace of federal law enforcement. If you think the DOJ is a law enforcement agency, you're stupid. Internal security is DOJ Job #1. As we have seen, the DOJ is maintaining internal security by both legal and extralegal means with the full support of the federal judiciary and the lukewarm animus of the U.S. Congress.

Federal judges and congress persons are largely immune to DOJ surveillance. You are not. The "new" counter-insurgency operations by the government concentrate on a Reasonable Suspicion by persons and groups---not on Probable Cause.

CLEARWATER contains selectors from any number of sources: TITLE III, purchased data from telecommunications data brokers, National Security Letters, subpoenas, technical operations by FBI TACOPS, search warrant, informant production, arrests, detentions. If the DOJ has searched you, arrested you or let you go, count on that data being in CLEARWATER. Did you give the Special Agent your telephone number?

Arresting someone to search them without needing consent or court order is not an unheard of means to get a Person of Interests selectors into CLEARWATER. Something laying openly on your desk? A cell-phone snap and email to the program office. How about those utility bills you throw away without shredding? If you're a Person of Interest, somebody is walking away with your trash.

There is a a real motivation by DOJ Special Agents to get telecommunications selectors into PROTON or CLEARWATER to build the networks for analysis and deconstruction.

CLEARWATER has all the features of PROTON and at least one other---mapping. An FBI Case Officer operating domestically can query say, Lahore Pakistan, and place on a map, those locations in the U.S. where those calls originated or terminate---a choropleth map with colored density clusters, all in a spatial context. With that, the DOJ knows where to focus it's domestic security efforts. A DEA Special Agent can run a selector seized in an amphetamine investigation and, within a few minutes, have the calling network and visualize the correspondents locations on a map. That's how DOJ led task forces show up in your neighborhood.

Watching a OWS protester enter a number into their cell phone is perfectly legal without consent or a warrant and once I get that number, we'll look at that calling network, find the node that is you, and walk that back to that moment we shared under the chestnut tree.

If you're visiting the USA from abroad, you may have your wallet and pocket litter photocopied at secondary screening. Then an email to the National Counterrorism Center (NCTC) Terrorist Identities Datamart Environment (TIDE) office, and from there, a Forward to the PROTON office.

PROTON, CLEARWATER and LEXIS-NEXIS all provide data export into Analyst Notebook file format (and PDF for ease of sharing).

All members of the Intelligence Community have access to LEXIS-NEXIS. LEXIS-NEXIS contains biographic information on most Americans having a driver or occupational license. Your state sells the contents of its drivers license database to companies like LEXIS-NEXIS for a profit. They can do this since that information is considered in the public domain---driving is a privilege and if you don't want to be in database then don't get a drivers license. LEXIS-NEXIS contains other highly personal and granular information depending on which state is providing information. Florida provides pretty much everything it can to LEXIS-NEXIS. Automobile information, luxury water craft, occupational licenses---if you submit information to a state agency, it can end up in LEXIS-NEXIS. All domestic law enforcement has access to LEXIS-NEXIS, its a fundamental investigative tool. IRS, DOJ, Treasury, Local PD, Sheriffs Office all have a LEXIS-NEXIS access or the means to pull data from them.

Law Enforcement Officers can have their data removed from LEXIS-NEXIS. An LAPD and NYPD "spokesperson" informed me that this is the case. Imagine your a citizen in New York and you get surveilled by one of the numerous surveillance technicians the NYPD has fielded since 9-11 , a quick look-up via mobile device or WiFi and they know who you are now.

So, a Special Agent or analyst simply runs the selectors in PROTON and CLEARWATER, then runs those names or other biographic/vital information again in LEXIS-NEXIS, all that data related to the TARGET is exported in Analyst Notebook format, those files are imported into the Analyst Notebook application and...viola!...a relatively complete social network and biographics of the TARGET. That could be you of course.

By Supreme Court decision and other judicial misadventures, LEXIS-NEXIS contains public information and you do not have an expectation of privacy. There is no need for Probable Cause or Reasonable Suspicion because this data is, by judicial opinion, public. Something to think about next time you're at the DMV. Citizens are queried regularly in LEXIS-NEXIS. CLEARWATER and PROTON provides network association and the selectors. A subpoena, NSL or search warrant to the telecommunications provider of that selector gives us names and locations. LEXIS-NEXIS provides Pattern of Life, geolocation and personalia. I was able to see my past three residential addresses, past telephone numbers and identifying information about my previous automobile. LEXIS-NEXIS is coupled to Automatic License Plate Recognition Systems (ALPRS) as well. Who you are, where you were and where you are.

The DOJ and Intelligence Community access LEXIS-NEXIS through a VPN and a proxy (government). A DOD proxy is registered to the Virginia Contracting Office, but it's a non-logging proxy so, good luck in your discovery. LEXIS-NEXIS has no idea of the individual accessing it's database and, according to the spokesperson, does not maintain logs of government clients. A subpoena cannot discover what is not there.

Around 2008, LEXIS-NEXIS purchased Choicepoint to start their new product line. I recall some representative, at a promotional meeting, extolling the virtues of Choicepoint---all the data in a easy to use format. A user of Choicepoint could run a query and not only get biographics and addresses but have that information located on a map or satellite image (by Pinpoint, Inc. or a Google map server). The Choicepoint representative giving the presentation said no Social Security Numbers or drivers license pictures would be included in the database in order to protect the rights of the citizen. Such conceits are good ethics in Washington, D.C.

That said, CLEARWATER and PROTON are not omnipotent. Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated. Of the many systems used by NSA and DOJ, CLEARWATER, PROTON and LEXIS-NEXIS are the most significant from a "boots on the ground" investigative prospective.

There is real concern that PROTON may be to widely known for such a program and efforts are being made to walk it back into a compartment.


A Proton/Crisscross job ad:
http://jobs.cgi.com/job/Hanover-SIGINT-Analyst-Job-MD-21075/1184801/

SIGINT Analyst Job

Date: Aug 14, 2013

Location: Hanover, MD, US
Job Order: J0311-0630 - Permanent Full Time
Title: SIGINT Analyst
Category: Consulting / Business / Functional
City: Hanover, Maryland, United States

Job Description: SIGINT Analyst

CGI Federal is seeking a SIGINT Analyst to work in our Hanover, MD office.

Specific Duties:

Applicants will work as a member of a government-contractor team whose primary focus will be providing support to deployed analysts and software developers.

In this capacity, uses an in-depth knowledge of general communications procedures, traffic analysis and reporting formats and vehicles to produce time-sensitive and event-oriented reports

Provide support to force protection, indications and warning and situational awareness; provides target continuity and mentorship to a junior and rotating workforce; conducts research to answer RFIs and produces working aids to support new tool development.

Must be willing to receive and conduct training on new systems, databases, processes and procedures.

Analyst will be supporting deployed US military troops and must understand the military decision making process and miliary doctrine.

Minimum of five (5) years experience with the military or government agency using the collection management cycle, intelligence cycle, targeting cycle, and the SIGINT intelligence fusion process from tactical to national level required.

Additional Requirements:

Experience with Falconview, Analyst Notebook, Arc View, Arc-GIS, Arc-Editor, AIM, Pathfinder, SEAS, STARLIGHT, GCCS and other current analyst tools.

Active TS/SCI security clearance w/ polygraph required.

Preferred:

Experience with NSANET, RTRG tool suite, Global Reach, Proton/Criss Cross, Broom Stick, CW II, Banyan. Geo Bootcamp and knowledge of ArcGIS a plus.

Preferred experience includes analysis in OIF/OEF, NSA, INSCOM, or ACE At CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 71,000 professionals located in more than 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com.

This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.

We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.

No unsolicited agency referrals please.

WE ARE AN EQUAL OPPORTUNITY EMPLOYER.

Skills

- Analytical Thinking
- Signal Intelligence (SIGINT)

Reference: 137685

//////

Check out the BOLO - be on the lookout - National Guard civil disturbance training program photos here:North Carolina National Guard Rapid Reaction Force Civil Unrest Training Photos | Public Intelligence. Obviously PROTON, DICE, CRISSCROSS, CLEARWATER style database technology would be useful in composing intelligence

Official description: CHARLOTTE, N.C. – Soldiers of the North Carolina National Guard train for Rapid Reaction Force duty at the Catawba River Pump Station here today. The training scenario tests the Soldiers ability to use nonlethal force to disperse a crowd of aggressors from a water plant. This training prepares the Soldiers to support state and local first responders and county emergency management agencies. The RRF is a quick reaction team that, on order, is deployable anywhere in North Carolina within 24 to 36 hours of a critical event. In times of crisis, the RRF may be ordered by the President of the United States or the Governor of North Carolina in order to augment Federal or State Authorities in response to actions such as a known terrorist attack, civil unrest or a natural and/or man-made disaster. (U.S. Army National Guard photo by Sgt. 1s Class Robert Jordan / released)

nc-rrf-3.jpg nc-rrf-9-1024x724.png nc-rrf-8-1024x708.png

/////

Other targetings: Russia Issues International Travel Advisory to Its Hackers | Threat Level | Wired.com

WaPo/Snowden: U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show - The Washington Post

Black Budget semi-surfaces: ‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post

Israel listed as major counterintelligence threat in Black Budget: Leaked documents reveal US sees Israel as a spying threat (Video) - The Hill's Global Affairs

WIRED on cryptology cracking in black budget: New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | Wired.com

Login Lulz for Snowden in Ars Technica Aug 29th: Sysadmin security fail: NSA finds Snowden hijacked officials’ logins | Ars Technica

.... Leaving it there for now...

More note on impending Syria Fail! Dempsey vs R2P interventionist hawks; Al-Nusra rebels caught with 2kg Sarin in May 2013, possible links to Libya Chemical Weapons stash, the Britam leaks & McCain Playing Portable Poker

Ugh, the Syria scenario is really dispiriting but I think much of the western political leadership may finally be backing down from another round of interventionism - let's hope! Here are a bunch of new notes - take em all with a grain of salt, and may they hopefully shed a bit of light on matters.

No matter how it turns out, it will be really hard to get the Middle East moving into a politically independent foundation, respectful of human rights and devoid of massacres and social 'sloshing' as mistrust escalates on all sides, with various specialists in destruction jumping in to make matters worse at every turn.

See also: Press Release mirrored here: Whistleblower ex-US Mil Intel agent Frank Ford flags VX WMD distribution in Iraq & Syria, smoking gun @ Carlyle Group chemical weapons network as new Obama target

//////

MCCAIN GAME: The terrible Sen John McCain should not even be quoted in papers let alone allowed in the government. Dan McCall at LibertyManiacs.com made this great McCain meme, along with many other fun political art pieces like NSA spoofs that - believe it or not - the NSA branding police have been trying to crush. Yes the NSA patrols against McCall's parodies as explained in interview on Corbett Report. (fb) See also Cryptome notes on this.

mccain-pokermeme.jpg

Satire: Raytheon: Delay on Syria Strike is a Threat to Freedom & Democracy Everywhere - Newslo

The Britam Defense Leak involving a Syria chemical weapons plan is denied, but perhaps one of those things like a Project Northwoods about the Syrian Chemical Weapons scenario: (Northwoods was an infamous JFK-era doc from the Joint Chiefs suggesting a fake attack involving Cubans and hijacked planes.)

Britam Defence, David Goulding and Philip Doughty | Mail Online - http://www.dailymail.co.uk/home/article-2311199/Britam-Defence-David-Goulding-Philip-Doughty.html PUBLISHED: 12:59 EST, 18 April 2013 | UPDATED: 12:59 EST, 18 April 2013

An article on 29 January reported allegations on the internet that the US Government had backed a plot to launch a chemicals weapons attack in Syria and blame it on the Assad regime.

The reports made reference to an email said to have been from David Goulding, the Business Development Director of Britam Defence, to company founder, Philip Doughty. The email had been published on the internet after Britam’s computer system was illegally hacked in Singapore. It referred to a proposal that Britam would deliver chemical weapons to Syria for enormous financial reward and suggested that the directors were willing to consider the illegal proposal.

We now accept that email was fabricated and acknowledge there is no truth in any suggestion that Britam or its directors were willing to consider taking part in such a plot, which may have led to an atrocity.

We apologise to each of them and have agreed to pay substantial damages.

A Look into the Britam Defence Data Leak Files && britam defence hacked, confidential documents leaked, site offline - cyberwarnews.info

A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline.

The attack is on britam defence (http://www.britamdefence.com/) and has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom).

The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.

Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.

A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Also on Britam: U.S. Was Offering `Enourmous` Sums of Money for Chemical Weapon Attack

More possible chemical weapons false flags from previous months: video "Chemical Weapons False Flag against Syria Update http://youtu.be/DbMdll58lis posted on August 3rd 2012.

Also worth noting this! Iraq uncovers al-Qaeda 'chemical weapons plot' BBC News June, 1 2013, and this RT report on the Turkish authorities discovery of Sarin in a Jabhat al Nusra safehouse http://youtu.be/vet0PV-XPlw in May 2013.

Reported by RT in May and firmly in the memory hole right now: 2 kilograms of sarin captured with rebels in Turkey?! WTF

Published on May 31, 2013 RussiaToday: Suspected Syrian militants have reportedly been detained in Turkey with a cylinder of highly poisonous sarin gas found in their possession. Those arrested are believed to be members of the Al-Qaeda linked Al-Nusra Front. Earlier this month, UN investigators voiced suspicion the nerve agent was being used by opposition fighters. RT's Middle East correspondent Paula Slier reports.

Obviously RT has a Russian perspective here but indeed as we will see this is not the only clue floating around about Al-Nusra & chemical weapons.

/////

Chomsky misquoted? LOCAL - Chomsky accuses Turkish daily of fabricating parts of interview

Not sure deal here - eh: High Probability Of A Major Attack On The Financial System | InvestmentWatch - anyone heard of x22report?

//////

DC alternative journalist Wayne Madsen is not always correct but this particular narrative just smells really damn likely right now. R2P is "responsibility to protect" interventionist faction of Beltway, the newest iteration of "cruise missile liberals" more-or-less. Go get em Wayne:

SOURCE: http://www.waynemadsenreport.com/articles/20130901

September 1-2, 2013 -- Special Weekend Report. Washington, DC (WMR) Obama caved under last-minute pressure from Dempsey

WMR's White House sources report that on the evening of Friday, August 29, President Obama was on track to launch a sustained 72-hour cruise missile and drone attack on pre-selected air defense and other strategic military targets in Syria.

Obama had been convinced by his national security adviser Susan Rice, UN ambassador Samantha Power, and deputy national security adviser Ben Rhodes, all "Responsibility to Protect" advocates, that he could trump congressional approval for his attack by claiming that humanitarian operations do not require approval under the War Powers Resolution or Article I, Section 8 of the U.S. Constitution.

Many of Washington's insiders went to bed Friday night firmly convinced that Obama would give the final order to attack Syria sometime during the early Saturday morning hours of August 30. However, the Chairman of the Joint Chiefs of Staff, General Martin Dempsey, made a hurried trip to the White House during the early morning hours of Saturday to make one last final plea to hold off on any attack.

WMR has learned from White House sources that Dempsey told Obama that the president's plan would not work. "If you do this, the plan will fail and you'll get in deeper. And without congressional approval, you'll be screwed," Dempsey told Obama.

Dempsey's warning about Congress had merit. Already, 210 House members signed a letter to Obama warning him not to attack Syria without congressional authorization. In addition, a head count showed that some Democrats would join Republicans in voting for impeachment if a bill were introduced.

Dempsey's argument prevailed and Obama decided to hold off on any attack until Congress reconvenes after Labor Day. Obama decided he would seek a congressional vote to authorize a military strike on Syria. However, in overriding Rice, Power, Rhodes, and Secretary of State John Kerry, who all favored a military strike, Dempsey incurred the wrath of the R2P faction that dominates the National Security Council. State Department sources began spreading the word that Obama would still attack Syria without congressional approval. The Pentagon, on the other hand, pointed out that none of the National Security Council "heavies," Rice, Power, or Rhodes had any military experience and that Kerry was channeling the wishes of his good friend Senator John McCain, who has consistently supported Al Qaeda-led rebels in Syria and Libya.

Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that "smoking gun" proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal "Iran-contra"-like scandal. The proof is said to be highly "impeachable."

The developing scandal involves Turkish, Qatari, Lebanese, and Croatian firms and front operations; Qatar Airways Cargo; ousted officials of the Mohamed Morsi government of Egypt; small Turkish and Jordanian air service companies contracted by the CIA; Saudi intelligence chief Prince Bandar bin Sultan Al Saud; the September 11, 2012 attack on the CIA annex in Benghazi; and "black" carve-out contracts with the U.S. Air Force.

[pic http://www.theage.com.au/ffximage/obama_narrowweb__300x512,4.jpg ] Barack Obama, right, dressed as a Somali Elder during his visit to Kenya, near the borders with Somalia and Ethiopia. Obama plays the role of Al Qaeda arms provider.

Obama's, Brennan's, and then-CIA director David Petraeus's knowledge of the operation was so intimate, Petraeus visited GOP presidential nominee Mitt Romney in October of last year to plead with him not to bring up the covert operation in the third presidential debate. Romney acceded to Petraeus's request.

/////

Fluoride for the Win: Frankly at this point in the demented charade, the possible Sodium Fluoride - aka fluoridated water precious bodily fluids casus belli - angle is now my favorite. Naturalnews is not always dead on either, but it's too damn appropriate I say.

See: NaturalNews: Bombshell: Syria's 'chemical weapons' turn out to be sodium fluoride used in the U.S. water supply and sold at Wal-Mart. Breaking in UK Independent: Revealed: UK Government let British company export nerve gas chemicals to Syria - UK Politics - UK - The Independent Sept 2 2013.

//////

Max Blumenthal has good points Sept 2 posted: OpEdNews - Article: Dubious Intelligence and Iran Blackmail: How Israel is driving the US to war in Syria

GlobalResearch: Dangerous Crossroads. A War on Syria, Prelude to a World War III Scenario? | Washington's Blog

//////

I am borrowing another excerpt from Madsen which includes a possible connection between major CIA pointman on the Caucasus and indeed Islamic fundamentalist network logistical support over the years (interesting in the pre-2001 interval eh) . Graham Fuller keeps popping up as a major figure in all of this, perhaps he will turn out to be something like the Oliver North of 9-11 itself - not to mention the sponsor of the Boston bombers' uncle Ruslan. Once the angles with Fuller surfaced, did anyone notice how fast mainstream press attention drained away from their backgrounds??!!!

SOURCE: http://waynemadsenreport.com/articles/20130830 - August 30-September 1, 2013 -- Partner of Boston bombers' "Uncle Ruslan" right hand man to 3 CIA directors

The murky world of the CIA's past and current support for radical Islamist groups on three continents has emerged in newly-released documents from the CIA that show that Graham Fuller, the agency's one-time top interlocutor with the Saudis, Afghan mujaheddin, and Muslim Brotherhood, was a right-hand man to three CIA directors.

Fuller, a business partner of Ruslan Tsarni (Tsarnaev), the uncle of the accused Boston Marathon bombers, served as a close adviser to CIA directors William Casey, William Webster, and Robert Gates, according to recently declassified internal CIA memoranda. Since retiring from the CIA, Fuller has been engaged in supporting the Chechen Islamist guerrilla groups fighting Russia as well as the Republic of Georgia, which has become a base for anti-Russian and anti-Syrian military activities, which includes, the transport of chemical weapons to Syrian rebels from the Pentagon-operated Richard G. Lugar Center for Public Health Research in Tbilisi, which, although a biological weapons research laboratory, also warehouses chemical agents, according to U.S. intelligence sources familiar with the facility. The Tbilisi facility was the major source of chemical agents used by Syrian rebels to attack civilians outside of Damascus in a "false flag" terrorist operation coordinated by the CIA and Mossad.

Throughout the 1980s, Fuller was front and center at many of the acts of violence in the Middle East and South Asia, from Lebanon and Syria to Iran, Iraq, Afghanistan, and South Yemen. One CIA memo describes how Fuller was also heavily involved in the early part of the CIA's stirring political activities in the Balkans during the collapse of Communism in eastern Europe. A May 22, 1985, memo from George Kolt, the CIA's National Intelligence Officer for Europe, invited Fuller to a June 11, 1985, dinner at CIA Headquarters at which the former U.S. ambassador to Bulgaria, Robert Barry, discussed at the Confidential level "The Strategic Importance of the Balkans for the United States." [......]

I'm leaving the rest of the story off for now out of respect for an indie journo making a run at this ... and moments after plugging this in, Wayne's site is having Varnish caching issues. It's all got to be cross checked - someone could be feeding him knowingly bad info for their own purposes certainly - I think we have a substantial amount of paydirt on our hands here.

Also Outrage is not a strategy: http://www.michaelyon-online.com/syria-outrage-is-not-a-strategy.htm

Anyway hope people can find this useful, or at least less useless than the mainstream spams...

Pentagon domestic operations switches from "pull" to "push" on 24-48hr timelines: "Defense Support of Civil Authorites" expands

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

There is also a video here: http://www.pentagonchannel.mil/Video.aspx?videoid=285596

Mirrored: Domestic Pentagon ops expands Defense Support of Civil Authorities vs domestic extremists - YouTube

//// UPDATE 4.22.13: I forgot! Here is one version of USNORTHCOM CONPLAN 3501. Thanx to YAN, reddit, & Cryptogon for taking note of this post! This video from the Boston metro area shows what domestic militarization of police is all about:

Also please follow PublicIntelligence.net and Cryptome.org for more handy docs. PI in particular has been pretty well on top of this.////

Mission drift into the US continues as the Pentagon contemplates dealing with "domestic extremists" under the rubric of Defense Support of Civil Authorities (DSCA) - one aspect of which is the US Northern Command's "USNORTHCOM CONPLAN 3501".

CONPLAN 3501, This generic emergency plan is relatively easy to obtain (most of the text), but it is the "friendly" hand of the DOD compared to the more mysterious and riot-control-oriented "USNORTHCOM CONPLAN 3502" entitled "Civil Disturbance Operations" (CDO). This surfaced in researching the role of Northcom at the 2008 Republican National Convention, which was a very 3502 CDO style operation with National Guard controlling space on Kellogg Blvd. CONPLAN 3502 is the post-2002 version of GARDEN PLOT, the 1960s-1990s template plan for domestic military deployments, like for example in the LA Riots.

This extends the story from late 2010: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com and reconfirms various aspects.

/////////////

Here is the new front-piece document. Also bonus weird stuff about the ever popular integration of North America.

An interesting Snippet:

Loosely-networked or individually motivated violent extremists will continue to exhort followers and encourage violent extremism in the homeland.

o HVEs will operate alone or organize in small groups and will be largely autonomous in their operations; they will have access to web-based resources to assist them in their operational planning.

o Military members and facilities will remain prominent targets of terrorists, and particularly by HVEs.

ł DoD will be called upon to provide significant resources and capabilities during a catastrophic event in the homeland.

o The National Response Framework will remain the primary instrument for applying Federal capabilities during disaster response.

And

Rapid and actionable intelligence on terrorist threats

DoD will maintain and enhance the Joint Intelligence Task Force for Combating Terrorism (JITF-CT) as its key node for sharing intelligence with interagency partners on terrorist threats. DoD will improve and refine intelligence and information-sharing relationships that have developed since 9/11 and as a result of the Fort Hood shootings.

DoD maintains a robust array of foreign intelligence capabilities, and sharing relevant counterterrorism-related information with the Federal Bureau of Investigations (FBI) and other key parties is vital to the prevention of potential terrorist threats to the homeland. JITF-CT will remain the focal point for DoD’s outreach and sharing of intelligence and information with the FBI, the Office of the Director of National Intelligence (ODNI), and the National Counterterrorism Center (NCTC). Additionally, DoD will expand its participation within the various FBI Joint Terrorism Task Forces (JTTFs),9 as well as other similar entities to maximize “top-down” and “bottom-up” sharing of key pieces of intelligence and information, consistent with applicable law and policy.

And of course, Unity of Effort and the ever popular Council of Governors:

Promote Federal-State Unity of Effort

Unity of effort between the Federal Government and States must be one of DoD’s guiding principles in the homeland, since unifying DoD’s efforts with those of its external partners improves collaboration and shortens response times for meeting life-saving needs during emergencies. Unity of effort also means greater national preparedness at less overall cost, while preserving both Federal and State constitutional requirements and responsibilities. DoD and its Federal partners must continue to strengthen unity of effort with States to define common goals regarding capabilities, structures, and processes for responses to disaster and emergencies in the homeland. The Council of Governors – established by Executive Order in 2010 – will be an essential forum for enhanced, senior-level dialogue among Federal and State civilian and military officials for this purpose.

[.....] DoD will regard dual-status commanders as the usual and customary command and control arrangement in cases where Federal military and State National Guard forces are employed simultaneously in support of civil authorities within the United States.

DoD will continue to refine processes for dual-status commanders and their associated command structures. By leveraging the use of such commanders, DoD will improve Federal-State communication, economy of force, and force employment for planned events and no-notice or imminent incidents. Historic examples of the employment of dual status commanders include national special security events such as the Democratic and Republican national conventions and responses to disasters like Hurricane Sandy and wildfires in the western United States...

Vague talk of militarized domestic databases always good:

Since Federal and State military components have varying requirements for relevant information and level of detail, development of a COP solution need not specify systems, hardware, or software. Instead, it must be based on common data from authoritative military or civilian databases that flow to various systems in a common format.....

The DCE/DCO structure is reconfirmed to be key to domestic military operations:

DoD will use the planning capacity of Defense Coordinating Elements (DCEs) to expand planning cooperation at the regional level so that Departmental capabilities are considered in FEMA-led regional planning efforts. DoD will also build an integrated organizational architecture for its liaison and coordinating officers at various headquarters.

The ten FEMA regional offices are key nodes for integrating Federal plans with State and local plans, and DCEs within these regional offices are essential for operational and tactical unity of effort in an adaptive environment. This regional planning relationship bridges the gap between State-level planning conducted at a National Guard’s Joint Force Headquarters (JFHQ)-State and DoD and DHS national-level planning. The JFHQs in each of the 54 States and Territoriesprovide vital ties to State emergency officials and the National Guard Bureau. This enduring synergy positions the JFHQ as the key State-level organization for integrating the emergency plans of local DoD installations with State plans and FEMA regional plans.

DoD will deepen and facilitate rigorous Federal, regional, and State-level planning, training, and exercises through coordination and liaison arrangements that support civil authorities at all levels. These arrangements include DoD liaison officers at DHS and FEMA, Defense Coordinating Officers (DCOs), and Emergency Preparedness Liaison Officers from each Service.....

FULL DOCUMENT: Pentagon domestic ops Homeland Defense Strategy 2.2013

/////////////

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

By Jim Garamone - American Forces Press Service

WASHINGTON, April 1, 2013 – The Defense Department incorporated hard lessons learned when it codified its new homeland defense and civil support strategy, said Todd M. Rosenblum, DOD’s top homeland defense official.

In an interview with American Forces Press Service and the Pentagon Channel, Rosenblum, the acting assistant secretary of defense for homeland defense and Americas’ security affairs, said the new strategy is a recognition that the operating environment has changed.

“We face new threats, we have new vulnerabilities, we have new dependencies, most importantly we have a new way to do business,” Rosenblum said during a Pentagon interview. “We have to capture that and make sure the department is prepared and directed toward being more effective and efficient as we can be.”

The Defense Department is charged with defending the homeland from attack. U.S. Northern Command is further charged with working with state and local entities and other federal agencies to provide support in times of natural or man-made disasters. In the first instance, DOD has the lead. In the second, another federal agency -- such as the Federal Emergency Management Agency -- has the lead.

The strategy, released in February, looks at the lessons learned from past experiences -- from Hurricane Katrina through Hurricane Sandy.

They also looked at changes including the growth of communications networks, dependence on private-sector capabilities and “the rising expectations from the president and from the secretary, and certainly from the American people, that we will be prepared to provide support to civil authorities within a 24- to 48-hour window,” Rosenblum said.

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

“So we are postured to provide assistance as fast and rapidly as possible,” Rosenblum said.

The vast difference between the response to Katrina in 2005 and to Sandy in 2012 shows the effectiveness of the new strategy, he said.

“We were more efficient, timely and effective in our support to Hurricane Sandy,” Rosenblum said. “This is because we did integrated planning within DOD, with our federal partners, and with our state partners. We recognized the need to not wait to be called upon, but to pre-position our support capabilities knowing there’s going to be audibles and ad hoc requests.”

Planning is at the heart of the strategy, he said. Integrated planning -- with state and local officials, with other federal agencies and with non-governmental entities -- has increased visibility and prominence. The National Guard -- an organization that bridges state and federal efforts -- continues to play a crucial role. But, Rosenblum noted, the strategy recognizes that response to disasters requires an all-of-government approach.

Cyberattacks, he said, also could produce the type of man-made disaster that would require DOD assistance. The homeland defense mission codifies requirements to provide cyberdefense, he added.

“The threats to networks and critical infrastructure increase when we are engaged in operations overseas,” he said. “The physical effects of cyberattacks can impact our military operation capabilities and response capabilities.”

The fiscal environment impacts this -- and all other -- strategies.

“The sequester is real and effecting DOD through readiness, training,” Rosenblum said. “It is difficult for the department to plan and budget intelligently, when we don’t have budget certainty.”

Officials devised the strategy when the department had already committed to $487 billion in reductions over 10 years.

“Sequester has changed the calculus tremendously,” Rosenblum said. “But this strategy is not about buying new capabilities: It’s about our planning, our processes and our integration.”

////////////

Defense.gov News Release: DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

U.S. Department of Defense

Office of the Assistant Secretary of Defense (Public Affairs)

News Release

On the Web:

http://www.defense.gov/Releases/Release.aspx?ReleaseID=15878

Media contact: +1 (703) 697-5131/697-5132 Public contact:

http://www.defense.gov/landing/comment.aspx

or +1 (703) 571-3343

IMMEDIATE RELEASE No. 172-13

March 22, 2013

DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

The Department of Defense announced today the release of the Strategy for Homeland Defense and Defense Support of Civil Authorities. This policyestablishes DoD’s priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president’s National Security Strategy and the 2012 Defense Strategic Guidance. It links with other DoD and national strategic documents related to missile defense, space, cyberspace, counterterrorism, and the Western Hemisphere. The strategy identifies two priority missions for the department in the homeland: defend U.S. territory from direct attack by state and non-state actors; and provide assistance to domestic civil authorities in the event of natural or manmade disasters, potentially in response to a very significant or catastrophic event.

The strategy emphasizes cost-effective policy mechanisms and innovative approaches to defend the homeland against direct attacks and to provide timely responses to routine and catastrophic events on U.S. territory. It stresses the continuation of DoD capabilities to defend against conventional and emerging threats in the air and maritime domains, while expanding cooperation with federal, state, and local partners to defeat asymmetric threats – including, for example, homegrown violent extremists who may seek to use improvised explosive devices. Additionally, it addresses DoD preparations for responding to man-made and natural disasters.

“The Department of Defense’s contributions to the defense of our nation have evolved over the past decade and account for new threats and challenges. Lessons learned from events like Hurricanes Katrina and Sandy and collaboration with our interagency partners and State Governors have framed our current approach to DoD civil support activities,” said Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Todd Rosenblum. “This strategy emphasizes strengthening our partnerships with federal agencies like the Departments of Homeland Security and Justice, with state and local governments, with the private sector, and with our Canadian and Mexican neighbors – not only for more comprehensive approaches to complex security challenges in the homeland, but also to create efficiencies through collaboration and joint action,”

For further information about this strategy, please access http://www.defense.gov/news/Homelanddefensestrategy.pdf

//////////

Never heard of this guy, he is the one doing the news release above. Career includes being Evan Bayh's national security staff & CIA Near East 1988-1993hires_061611094311_Rosenblum_Todd.JPG

Defense.gov Biography: Todd M. Rosenblum

Acting Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs [Acting?]

Todd M. Rosenblum is the Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs. In this position, he advises the Under Secretary of Defense for Policy on the homeland defense activities of the Department and regional security matters for the countries of the Western Hemisphere. He is also responsible for advising the Secretary of Defense on all matters pertaining to defense support to civil and law enforcement authorities in the homeland. Mr. Rosenblum has nearly 25 years of political, policy, and legislative experience in national security affairs.

Prior to his appointment at the Department of Defense in May 2011, Mr. Rosenblum was the Deputy Under Secretary of Intelligence for Plans, Policy, and Performance Management, Department of Homeland Security, from February 2009 to May 2011. He directed strategic and policy planning for the Department’s intelligence program, oversaw budget development and resource allocation priorities for the synchronization of intelligence programs and priorities, provided stewardship and direction for the Information Sharing Enterprise, and ensured that the intelligence program was aligned with national, departmental, and intelligence strategy and requirements.

Mr. Rosenblum was a Professional Staff Member on the Senate Intelligence Committee from March 2005 to November 2008, leading Committee oversight of Department of Defense human intelligence collection programs and Intelligence Community-wide intelligence collection programs and operations in the Middle East. Concurrently and prior to joining the Committee, he served as the Military Legislative Assistant and National Security Advisor to Senator Evan Bayh from January 2001 to November 2008, where he acted as senior counsel and represented the Senator on defense issues and foreign policy, national security legislative actions, and public affairs. He was a member of the Senior Personnel Staff, National Security Cluster, on the Obama Presidential Transition Team from November 2008 to February 2009.   

Mr. Rosenblum held several management and advisory positions at the Department of State and the U.S. Arms Control and Disarmament Agency from August 1994 to January 2001. From April 1999 to January 2001, he was the Executive Assistant/Chief of Staff to the Assistant Secretary of State for Nonproliferation where he provided executive management and policy liaison on the full range of nonproliferation issues. He was the Senior Foreign Affairs Advisor for Northeast Asia at the U.S. Arms Control and Disarmament Agency from August 1994 to April 1999, where he represented the Agency in numerous nonproliferation negotiations and regional security dialogues.

From January 1993 to August 1994, he was the Deputy Political-Military Advisor for the Bureau of Near Eastern Affairs, U.S. Department of State. Mr. Rosenblum chaired an interagency export control working group, providing departmental recommendations on proposed arms sales to the region, and was responsible for ensuring consistency between national policy and regional security assistance activities. He was an Intelligence Officer in the Central Intelligence Agency’s Office of Near Eastern Affairs, Directorate of Intelligence, from September 1988 to January 1993.

Mr. Rosenblum has received numerous individual and group awards from the Department of State, the U.S. Arms Control and Disarmament Agency, and the Central Intelligence Agency. He received his Masters in International Affairs in 1988 from the School of International and Public Affairs, Columbia University, and his Bachelor of Arts in 1986 from Columbian College, The George Washington University.

//////////////

Anyway that should give everyone a little more to work with, given the heightened domestic military operations surrounding the Boston aftermath, it is important to get a sense of where the Pentagon sees itself going in these reactions and ongoing operations -- what happens next is another question.

A great move would be publishing the entire text of USNORTHCOM CONPLAN 3502 Civil Disturbance Operations on the Internets immediately!

The Art of Failing Gracefully: DEA & DOJ need to cover up Sinaloa cartel informant Vicente Zambada, the quid-pro-quo system, "Fast & Furious" arms distribution for Great Justice!!!

Hundreds of billions of dollars, between cash flows and valuations, depend upon the ability of American law enforcement structures avidly maintaining their illusionary belief system about laundered drug money, informants, and banking systems. All of this is normal, they say, it's normal to throw the book at tons of little fish while mysteriously failing to find any really substantial laundered drug money or criminal prosecution for lawyers and bankers involved. The name of the game is to fail gracefully at detecting and punishing drug money in the banking system, to create a PSYOP of coherency on top of countless total ironies, structured protection & utter failures.

By the same token, the US government really always tends to nudge all markets into being dominated by a few big actors, whether "legal" or "gray" or "shadow" - be they milk producers or drug traffickers. They want to minimize the number of PayPals on the market, and the number of major drug players.

At some point it apparently came to pass that formal informant deals with favored cartels would also be inked -- the Sinaloa cartel even officially promoted as the proper dominator of certain "plazas" in public relations items. Because no one really cares about war on drugs policy -- it's not like this horrible policy affects the level of gun violence in North America -- nothing ever gets done about this at the federal level.

It's beginning to finally dawn on people that the secretive Federal Reserve System wire transfer networks - casually known as Fedline & Fedwire -- must somehow be involved [noted in Oct 2010], and I have never seen a single person even bother to claim to the contrary. The banking wire transfer systems are inextricably part of the "protected" drug money laundering system which is "protected" in the same formal way as at least some of these Sinaloa crucial informant thugs. Let's see if state police can pry into the Fed. LOL!!

So anyway, we have hard proof of it in court that Jesus Vicente Zambada-Niebla's attorney was in fact an informant operated expressly to pull intel from Sinaloa into the US government.

The questions: how much the "kingpin" deserves cover from that, especially since he was moving along Fast & Furious guns to waste other cartels & assorted innocent people? How many documents showing underlying protected illegal relationships will the judge force into the public record? How much 'controlled demolition' will the public tolerate in this relatively obscure case?

This gets a nice update from Abby Martin & Andrew Kennis: Next Big DEA Scandal | Interview with Andrew Kennis - YouTube

PREVIOUSLY (about halfway down many details): ECHELON GCSB military surveillance vs New Zealand & Kim Dotcom; IRC logs on Anonymous false flag attacks viewed anew; Barrett Brown setup via #OpCartel | HongPong.com [Oct 22 2012]

All of this insane crap is directly related to the formal FBI informant illegal operations system which gets exposed in tiny nibbles, for a little more documentation on illegal ops see recently The New 21st Century COINTELPRO Mobius Strip: Undisclosed Participation, "OTHERWISE ILLEGAL ACTIVITY," Federal & State Informants, drug ops auditing in MN [Jan 31 2012]. Unfortunately the DEA's habit of giving traffickers informant status means that more nasty drugs easily find their way into Minnesota from handled/protected figures in Chicago. Thanks so much, Federal Government!

LINX: Cartel Member Says Fast And Furious Aimed To Supply Guns To Sinaloa Cartel - Business Insider (Aug 10 2012)

Mexican Official Accuses CIA Of 'Managing' Not 'Fighting' The Drug Trade - Business Insider (July 24 2012)

One batch of Zambada Court files: http://narcosphere.narconews.com/userfiles/70/Pleadings.Sinaloa.Zambada.pdf

More recent Narcosphere items - not a bad place to start: Big Media Discovers US Special Ops are Targeting Mexican Crime Organizations | the narcosphere [January 21 2013]

Fast and Furious Blurs the Line Between Cops and Crooks | the narcosphere [Bill Conroy Jan 6 2013]

Banks Are "Where the Money Is" In The Drug War | the narcosphere [Bill Conroy Dec 1 2012]

Background from Narcosphere: US Government Informant Helped Sinaloa Narcos Stay Out of Jail | the narcosphere [Bill Conroy Aug 7 2011]

US Prosecutors Fear Jailbreak Plot by Sinaloa “Cartel” Leader Zambada Niebla | the narcosphere [Bill Conroy Sept 17 2011]

US Government Accused of Seeking to Conceal Deal Cut With Sinaloa “Cartel” | the narcosphere [Bill Conroy Oct 1 2011]

Zambada Niebla Case Exposes US Drug War Quid Pro Quo | the narcosphere [Bill Conroy Dec 10 2011]

/////////////

Further background: 'El Chapo' Guzmán, Mexico's Most Powerful Drug Lord - Newsweek and The Daily Beast

Lolzy fake letter of love: Mexican Drug Cartels Thank Obama for Gun Control Push - BlackListedNews.com

Why Americans Must End America’s Self-Generating Wars | Global Research [Peter Dale Scott - Aug 30 2012]

America’s Secret Deal with the Mexican Drug Cartels | Global Research [Tom Burghardt Sept 3 2012] - MORE: Antifascist Calling...

Top enforcement agencies don't track crimes by informants [USA TODAY Oct 7 2012]

Narco News: US, Mexican Officials Brokering Deals with Drug “Cartels,” WikiLeaks Documents Show

Narco News: Funcionarios mexicanos y de EEUU negocian con "cárteles" de droga, según documentos de WikiLeaks

Mexican Special Forces Employed as Death Squads in Drug War, Email Records Released by WikiLeaks Reveal | the narcosphere

SIGNALING SYSTEM USG <-> CARTELS: http://wikileaks.org/gifiles/docs/1747720_re-fwd-re-fw-from-mx1-2-.html - FAKEDRUGWARSIGINT is the lulziest form of SIGINT, who can deny??

The whole thing is such a spectacular sham it really calls into question whether federal prosecutors, informants, drug laws and the rest of the charade should even exist in the first place. It is truly a massive stage of fakeness, and frankly none of these people deserve to have any influence over the level of drugs available in society.

Not that drugs are harmless, clearly they all have some negative qualities, but clearly this entire schema is hosed well beyond the point of no return, and can only produce more violence and chemical dependency as it drags us all into hell. There are of course countless rabbit holes involving drug trafficking links with 'deep events' like the CIA, Iran-Contra, 9/11, the Taliban & al-Qaeda etc and I'm not going to get into that much here, though plenty of Iran-Contra related background fills the history of links above. Also as linked here what is the role of NORTHCOM anyway?

Question Time: Jimmy Savile pedophile network story encompasses BBC, royal family, Parliament, Jersey, Netherlands -- crickets from US media

"What you have to understand, John, is that sometimes there are forces and events too big, too powerful, with so much at stake for other people or institutions, that you cannot do anything about them, no matter how evil or wrong they are and no matter how dedicated or sincere you are or how much evidence you have. This is simply one of the hard facts of life you have to face."
- Former CIA director and Cercle member William Colby giving advice to his friend senator John DeCamp, urging to quit his investigations into the Franklin child abuse affair and to write a book about his experiences (The Franklin Coverup, 2nd edition, foreword). via archived Institute for the Study of Globalization and Covert politics project - https://wikispooks.com/ISGP/

[TRIGGER WARNING - Your world is controlled by many abusive psychopaths - details/links below. Aside from blockquoting Icke, Madsen & other stories, this post does not reach into many details of the abuse. Some of these links & the 1993 video "Conspiracy of Silence" contain very disturbing material including direct documentation of abuse]

A creepy theme, usually derided by debunker types as 'conspiracy theory' material, has been the frequent overlap between child abuse networks and vertically hierarchical, often sexually-codified, social structures & institutions, particularly those with some degree of control over vulnerable people. However these patterns are typically 'latent' & suppressed in media awareness until the dam bursts. Whether or not this horror encompasses interdimensional entities, blackmailed Nazi operatives or other exotically creepy ideas, the sheer evil of it all can send one's imagination hunting for weird connections. After all, one principal reason this never surfaced until now is because of the cognitive dissonance that tends to deflect our attention from such unthinkable cruelty.

Whether it's the revelation of vast abuse in the United Kingdom, Catholic hierarchies or Penn State, perpetrators & handlers of human trafficking & abuse are often well-protected & truth rarely spills out.

VIDEO: Member of Parliament Tom Watson asks Prime Minister Cameron about protected pedophile activity within the highest ranks of British government at House of Commons Question Time. (source)

savile_newsletterpromo.jpeg

Across the United Kingdom, hundreds of new leads & investigations have opened up with broadening awareness that a major BBC pop music presenter and producer, Jimmy Savile, helped mastermind a vast network of child abuse across much of the United Kingdom for decades, implicating major figures in the British Broadcasting Corporation, Parliament, the Prime Ministerial and Royal Family levels of UK society in undeniable horrors.

For decades, Savile [with a creepy resemblance to the Chitty Chitty Bang Bang childcatcher character] got what amounted to a green light from the major figures in British society, the BBC and the Royal Family, to do as he pleased, with full access including keys to numerous institutions hosting vulnerable children and teens.

For years the BBC's hierarchy looked the other way as Savile used his venues to not just abuse children [including it's widely said now, even dead children] directly, but also arrange for their trafficking on behalf of many other powerful figures.

A former BBC director, Mark Thompson, is now 'incoming president and chief executive' of the New York Times, forcing NYT Publisher Arthur Sulzburger Jr to back up their man, since he is obviously under the shadow of the BBC pedo coverup situation.

See: Amid BBC Scandal, Incoming Times Chief Receives Support - NYTimes.com // BBC Scandal Threatens to Become a Political Crisis - NYTimes // BBC News - Newspaper review: Savile scandal still leads papers // Jimmy Savile child abuse probe: TV stars set to be arrested 'within days' as probe widens - Mirror // Jimmy Savile scandal: Tom Watson MP claims powerful child sex ring was linked to Downing Street - Mirror Online // Jimmy Savile: Sex fiend was a 'necrophiliac', claims former colleague Paul Gambaccini - Mirror Online // Jimmy Savile abuse scandal: Doctors claimed to have attacked patients at hospitals where Savile allegedly struck - Mirror Online // BBC News - Giving Jimmy Savile victims their voice // BBC News - Jimmy Savile scandal: Alleged victims' stories

#OTB: The quirky alternative site OccupyTheBanks.com has been covering dimensions of this: see #BELGIUM DUTROUX CHILD RAPE & SNUFF #DEMMINK #DUTCH #Savile #BBC #Hague && THE top legal officers in HOLLAND (see last post) can be a NAMED PEDOPHILE, and CHILD RAPIST // #MASSARRESTS UK POLICE 50 POLICE PEDO ARRESTS // #NETHERLANDS TOP GOVT LAW OFFICER #PEDOPHILE #Demmink #Dutch #JUSTICE // **BREAKING** NO 10 PEDO RING NAMED UK PARLIAMENT // [UPDATED 7th OCT]] SATANIC RITUAL CHILD SEXUAL ABUSE #VATICAN #NWO #ILLUMINATI etc etc. Follow @censoredNewsNow for more items - a chatty account to be sure!

It's no surprise Savile was able to gather many honorifics thanks to the Royal Family and even made a member of the Knights of Malta (Sovereign Military Order of Malta - a major sketchy European aristocratic network). (additionally, with recent work from people identifying with Anonymous in exposing child porn networks, d0xing abusers, as well as criticism of the sexist, misogynist & creepy issues plaguing such groups as Reddit & "jailbait" subreddits, the 'skeptic humanist' community etc, it seems like these broader topics are finally getting the attention & reactions they need.)

It's important to realize that pedophiles and particularly creepy 'fixers', such as for example, that John Mark Kerr creeper, who bizarrely claimed to have killed Jon Benet Ramsey several years ago, are just outer tentacles, who clearly are 'charmed' with protection from law enforcement entanglements. [In Minneapolis, the longtime Park Police chief was yet another pedo in a key power position]

Icke was right?! Of all people, noted "interdimensional reptilian conspiracy" exponent David Icke gains a certain validation for having documented both Savile's depredations and others, prevailing in exposing ugly truths despite the famously libel-locked down British publishing world. His 5500 word exegesis on this subject is posted below.

I think this statement is well-substantiated - many examples are out there: Icke: "Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control."

At this time in the UK press, former Tory Prime Minister Edward Heath & minister Sir Peter Morrison, a confidante of Heath's successor, Margaret Thatcher, are openly talked about. Former Minister says Thatcher aide was paedophile who preyed on boys' home - and Hague should have known | Mail Online

A former Tory Minister last night made incendiary claims that one of Margaret Thatcher’s closest aides was implicated in one of the most harrowing child abuse scandals of recent times.

Rod Richards, a former Conservative MP and ex-leader of the Welsh Tories, made the shocking allegation that he had seen evidence linking Sir Peter Morrison to the North Wales children’s homes case, in which up to 650 children in 40 homes were sexually, physically and emotionally abused over 20 years.

Mr Richards also linked a second leading Tory grandee – now dead – to the scandals at homes including Bryn Estyn and Bryn Alyn Hall, both near Wrexham.

He said official documents had identified the pair as frequent, unexplained visitors to the care homes.

Mr Richards – who helped establish the inquiry that unearthed the scale of the abuse – said bluntly: ‘What I do know is that Morrison was a paedophile. And the reason I know that is because of the North Wales child abuse scandal.’

He added that William Hague, who was Welsh Secretary at the time of the inquiry, ‘should have seen the evidence about Morrison’.

Morrison was Lady Thatcher’s parliamentary private secretary and deputy chairman of the Conservative Party.

Back in the 1990s -- the website ISGP.eu - [now archived via Wikispooks.com] covered a Belgian-centered dimension of the protected European elite child abuse network. This material gets very deeply disturbing & is not to be taken lightly [TRIGGER WARNING x infinity] ISGP - Beyond the Dutroux Affair // ISGP - Dutroux case and X-Dossier victim-witnesses // ISGP - Dutroux, Nihoul and X-Dossier investigators // ISGP - Belgian X-Dossiers - the accused // ISGP - Alleged assassinations in Belgium

"From East Belfast's Kincora Boys' Home, via Leicestershire, Staffordshire and London, to the children's homes of Clwyd, we have witnessed 25 years of cover-up. Cover-up, not to protect the innocent but to protect the regularly named elements of the British establishment who surface whenever widespread evidence of child abuse is exposed. From the public schools right through to the Catholic and Anglican churches, child abuse has been allowed a special place of sanctuary... Social workers, police, security services, local and national political figures remain the common factors in the fall-out from the [child abuse] inquiries... In case after case the cycle is described - a child is 'taken into care', then abused in a home, handed on to an outside pedophile ring and out on to the rent-boy/prostitution circuit beyond, if they live that long... Journalists find themselves battling first with authority, then with the libel laws, to publish the truth about a vast web of abuse."
- June 6, 1996, The Guardian, 'True scandal of the child abusers'. These lines were written by the author of the article and are not quotes.

....and so here we are in 2012, 18 years after that Guardian story was posted, previous layers breaking through to the surface anew. The 1990s saw parts of this general elite network [or layer] surface and recede again into obscurity. John DeCamp, a former CIA employee and Nebraska state representative, helped expose a major node of protected child abuse and trafficking in the American heartland.

This could almost be seen as an intra-CIA war or conflict as The Minders was a CIA-linked group that participated in child trafficking as well. Here is the long-suppressed 1993 documentary Conspiracy of Silence. The central figure in Nebraska, the late GOP rising star, Lawrence "Larry" King, bears some resemblance to Jimmy Sevile as another 'doorman to the cesspit' of protected elite child abuse.


savile_princecharles.jpegArguably, much of this ugliness, from Jim Jones to the recently deceased Rev. Sun Myung Moon to the CIA-influenced "evangelical" movement (Campus Crusade for Christ was set up as a counterpart to Mario Savio's Free Speech Movement by the CIA) all tie together ritualized group mind control and the inte-generational abuse of minors.

It could roughly add up to the distillation of MK-ULTRA & Nazi-derived research into a mind control template which could be applied across many religious & cultural gradients in Western societies. In the Scandinavian side, the Girl with the Dragon Tattoo series illustrated via fiction Nordic fascist intergenerational abuse families.

Whether or not you find plausible the notion of "entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general", the rest of the piece is an ugly read on a lot of very solid foundations.

So let's get to the Icke piece - via here Jimmy Savile ... Doorman To The Cesspit - David Icke Website && ELITE CHILD ABUSE: ‘JIMMY SAVILE… DOORMAN TO THE CESSPIT’ « 21st Century Wire::

By David Icke

Something of massive significance has happened in Britain in the last two weeks which might have been lost on most of the rest of the world. It concerns the revelations about serial child abuse over decades by a man considered by many to be a British ‘icon’ and ‘national treasure’.

Savile’s connections to the political and royal elite are undeniable.

His name is Jimmy Savile and the reason the significance of what is happening may have passed most people by outside the UK is that Savile was a major figure in these islands, but little known beyond them. What, and who, he was involved with, however, is global in nature and has the potential to expose both the staggering scale of child sexual abuse and many of the mega-famous names for whom it is a way of life.

Savile was one of the first in the entertainment field known as ‘disc jockeys’ who emerged with the 1960s music and cultural explosion known as the ‘Swinging Sixties’. I remember him well as a kid appearing on television shows, still in black and white then, and in fact you could hardly miss him. Once seen, never forgotten. He would always appear with dyed hair, mostly blond, and highly colourful and eccentric clothing accompanied by multiple rings and other jewellery. Savile was what they called a ‘one-off’, a ‘character’ and people either loved him or deeply loathed him and thought he was seriously weird. There was little of the half-way about Jimmy Savile.

He began as a disc jockey in dance halls and later managed several of them before he launched a career in the media via the legendary Radio Luxemburg in 1958 and eventually moved to the BBC which was to be his prime public platform for decades. He was a first and last presenter of the ground-breaking music chart show Top of the Pops, which ran from 1964 to 2006, but his biggest claim to fame was the BBC show Jim’ll Fix It which he presented from 1975 to 1994.

This is particularly relevant to current events because it was a programme in which children wrote in to describe what they would most like to do or who they would most like to meet. The programme then ‘fixed it’ for the children chosen to take part. The ‘fix’ could be anything from going up in a hot air balloon to meeting their favourite pop star.

Savile was also famous for his charity work, which included running many marathons. He was also a volunteer porter at the Leeds General Infirmary; a volunteer and fundraiser at Stoke Mandeville Hospital with its world-famous spinal injuries unit; and he was involved with the Broadmoor high-security psychiatric hospital where many famous killers have spent their days. Savile is reported to have had his own room at both Stoke Mandeville and Broadmoor and, it was revealed this week, he was given his own set of keys that allowed him access to many areas within Broadmoor.

His public face was of a jolly and eccentric character who was famous for his trademark expensive cigar and constantly repeated catch phrases such as ‘how’s about that, then?’, ‘now then, now then, now then’, ‘goodness gracious’, ‘as it ‘appens’ and ‘guys and gals’. But away from the screen Savile lived a very different life and operated in very different circles to the ‘man of the people’ image that he so cultivated and it is now clear that much of his charity work was designed to give him access to children and below-age teenagers.
Savile was given a hero’s funeral when he died in 2011 at the age of 84, but a recent television documentary – not by the BBC – has revealed his decades of sexual abuse of underage girls with more revelations coming out by the day. Iceberg and tip come to mind.

Saville was a regular visitor to the royal households, and was close to Prince Philip and Prince Charles.

I was first told about the real Jimmy Savile in the late 1990s in conversations with people who had serious insider knowledge about the British royal family and they said that Savile had been a close friend of Prince Philip until they had fallen out after a ‘big row’.

When I questioned why someone like Savile would be so close to the royal family I was told about his paedophilia and necrophilia (sex with dead bodies) and, of course, his famous voluntary work at hospitals would have given him potential access to the mortuaries.

Savile himself would boast about his connections to the royals and it was publicly acknowledged that he was a regular visitor to Buckingham Palace, Kensington Palace (where Princess Diana lived after her marriage ended with Prince Charles), and Highgrove (the country estate of Prince Charles).

Savile told Esquire: ‘The thing about me is I get things done and I work deep cover. I’ve known the Royal Family for a million years.’

According to the UK Daily Mail at the time of Savile’s death in 2011, he ‘was used as an intermediary in an attempt to resolve the differences between the Prince and Princess of Wales shortly before their split’. Savile said that he was invited to regular meetings with the royal family because ‘I have a natural good fun way of going on and we have a laugh.’

Would one of the world’s most powerful families invite an aging disc jockey into their inner sanctum so often just because he gave them ‘a good laugh’? Or is there likely to be a far more plausible reason for their strange closeness?

I have been writing since the 1990s and a book called The Biggest Secret about the royal family’s connection to Satanism and paedophilia and about paedophile Satanists like British Prime Minister Edward Heath and President ‘Father’ George Bush – just as I have told those who would listen about Jimmy Savile. But all I have had for my trouble from mainstream society is ridicule and dismissal.

Their minds are too closed and too programmed to make the leap into the world as it really is.

Now, in the wake of the public confirmation about Savile, it is time that they did. How many more children need to suffer before humanity grows up and faces the reality and sheer undiluted evil of the force that controls them?

Jimmy Savile and the royal family shared a love of Scotland and the sporting events known as the Highland Games. Savile was the Honorary Chieftain of the Lochaber Highland Games which he attended for 30 years. He had a secluded cottage at nearby Glencoe where Prince Charles was a visitor. Savile said after a visit by Charles in 1999: ‘I’ve had a few nosh-ups with the royals and I thought it was time I returned the hospitality.’

Charles sent a Christmas card to Savile in which he wrote: ‘Jimmy, with affectionate greetings from Charles. Give my love to your ladies in Scotland.’ The reference to the ‘ladies’ was meant for the women that Savile had arranged to serve the Prince during a visit to the Glencoe cottage.

Savile said that he had first been introduced to the royal family in 1966 by (known paedophile) Lord Louis Mountbatten, the uncle and mentor of Prince Charles. Mountbatten was Commandant General of the Royal Marines and arranged for the disc jockey to become the first civilian to be awarded the Marines’ Green Beret. It was one of a many ‘honourees’ that Savile would be awarded in the years that followed. Savile said:

Coming from Lord Louis, who was the favourite uncle of Prince Philip, that was quite something. So obviously I hooked up with the Prince – what was good enough for Lord Louis was good enough for him.

But what was ‘what’? Mountbatten was killed when a bomb exploded on his boat in Ireland in 1979 – a murder officially blamed on the Provisional IRA. New Zealand writer and researcher Greg Hallett writes in his book, Hitler was a British Agent:

Lord Louis Mountbatten was a pedophile, adulterer and homosexual incestuous lover for 10 years … the former King Edward VIII … was truly troubled by the revelations he too had betrayed the Canadians to the German Army, resulting in the open slaughter of those 4,000 men …

… the British monarchy arranged for MI-5 to blow up his boat (1979), happily covering their trail; by fitting up four IRA men … the tactic of blowing up one of your own leaders to cover up any incriminating evidence … was a face saving device to distract from even more damaging intelligence about the British monarchy working for the Germans, against peace, and for a prolonged war.

This is a young Prince Charles with his ‘mentor’ Lord Mountbatten, and father Prince Philip. Greg Hallett names both Mountbatten and Philip as paedophiles. Of course, you don’t just take one person’s word for that, but my own sources which have proved to be so accurate about Savile and others told me the same nearly 15 years ago with the addition that they were both Satanists. This is no surprise given that the British royal family, like all the royal bloodlines of Europe and further afield, are founded on Satanism and the manipulation of occult knowledge for deeply malevolent ends in league with the ‘dark suit’ expressions of the bloodlines in politics, banking, corporations and media.

But Jimmy Savile’s connections were certainly not confined to the royal family. They fanned out into the realms of politics and the rich and famous across the spectrum of human society. In short, he was not only a paedophile himself, but a supplier of children for some of the most famous paedophiles and Satanists on the planet.

The victims of his abuse that are now speaking out in the wake of the television documentary exposing his secret life are only part of a gigantic cesspit of paedophilia, Satanism, drug-running and murder in which he was involved.

I describe him as a ‘doorway to the cesspit’ because if you get past him and his fake persona you enter the sick and depraved world of the global bloodline elite. Savile was a ‘fixer’ – he described himself as such, though not in terms of what he was really fixing. As he told Esquire: ‘The thing about me is I get things done and I work deep cover.’ His most famous TV programme, Jim’ll Fix It, could not have been more appropriately named.

British police have said they are currently following 320 lines of inquiry into Savile’s abuse over decades all over the country, but if they are genuine and tenacious in their investigations and really want to know the truth they can multiply that by a very large number and still not be close to the totality.

If they do really want to uncover the truth they will have to be knocking on the door of Buckingham Palace eventually. If they don’t, it’s a cover up given the Windsors’ close relationship with Savile.

The current public revelations about Savile are being confined largely to the abuse of underage girls, but the truth about the way he supplied girls and boys for people like Prime Minister Edward Heath and so many others must also come out because the barricade is being held at the moment with only his own paedophilia and a few sleazy showbiz people. This is only one aspect of the scandal and his work as a supplier of children for the ‘elite’ is still being hidden in the mainstream media to protect the biggest names. This firewall has to be breached.

Guy Marsden today.

One of Savile’s nephews, Guy Marsden, now 59, has said publicly this week that he and his friends were taken to parties by his uncle in the late 1960s to ‘act as intermediaries for adults and younger children’. He said that the parties were attended by ‘household names’ in showbusiness, but only men – never women.

Marsden, then 13, and some friends from Leeds in the north of England, ran away to London for ‘an adventure’, he said. They were approached by men at Euston railway station and invited to a grubby flat. Then about four days later Savile turned up at the flat by coincidence because Marsden soon learned that his famous uncle mixed with ‘fellow child molesters’. He said he thought he would be in trouble for running away and not telling his parents where he was, but instead his uncle Jimmy just took him and his friends to a ‘much better place’ – the house of a ‘famous pop impresario’ which had a big indoor swimming pool and was one venue for Savile’s ‘paedophile parties’.

Marsden said that little boys and girls would disappear into bedrooms with the famous attendees and it was ‘perfectly obvious’ what was happening. ‘You heard sounds and moans and groans coming from the bedroom and knew what was going on.’ Marsden added:

At night you would get about 15 or 20 people turning up. There would be music and tables full of food, we couldn’t believe it. There was everything we needed and we just hung around.

At first we automatically assumed the children lived there, but we soon realised they didn’t. They would be brought there, sometimes by Uncle Jimmy, and would stay for six or seven hours until 3 or 4am. They were just little kids, boys and girls.

Interestingly, Marsden said that Savile sometimes arrived with a man dressed as a priest and he believed that children being abused may have come from an orphanage or children’s home. They almost certainly did – it fits the modus operandi of the paedophile rings to the letter. What better way to supply your children than have control of children’s homes?

Several of Savile’s victims who have come forward in recent times say they were abused by him at the Duncroft boarding school for ‘intelligent, emotionally disturbed girls’ in Surrey and wherever children and young people are gathered together in a boarding situation needs to be watched like a hawk. These establishments are the predators’ hunting grounds with often their own people appointed to the staff.

Savile at the infamous Haut de la Garenne children’s home in Jersey, Channel Islands.

This is Savile with the children at the infamous Haut de la Garenne children’s home on the island of Jersey in the Channel Islands. Jersey is the fiefdom of mega-rich and mega-crooked networks that combine criminal business, banking and drug operations with paedophilia and Satanism. The island of Jersey, off the French coast,, is only nine miles by five with a population of 90,000 and yet has 55 banks, more than 33,000 registered companies and hundreds of billions of dollars on deposit. It is a money laundering operation of global proportions and attracts the super wealthy with low tax rates.

Haut de la Garenne, or ‘Forest Heights’, was a ‘children’s home’ (detention centre) from 1867 to 1986 and it is clear that it played the role of providing children for sexual and violent abuse by the Jersey Mafia in all its forms – as well as the rich and famous of mainland Britain, including members of the Royal Family.

Jersey has an almost self-contained government of its own, but the Queen remains at the top of its power structure and wherever the ‘Crown’ holds sway, so does Satanism and child abuse.

The infamous Satanist, Edward Paisnel, who was dubbed ‘The Beast of Jersey’ after being jailed for 30 years for the rape of boys and girls, used to play Father Christmas at Haut de la Garenne during the 1960s. You get the picture.

A high-profile police investigation began in 2008 into historic long-term abuse at the home and, unfortunately for those involved, a decent, honest copper was in control of the investigation. This was Lenny Harper, a States of Jersey police detective who led a three-year child abuse inquiry that genuinely tried to expose what happened.

Genuine police officers and detectives who sought the truth in the Marc Dutroux child abuse and murder scandal in Belgium in the 1990s found that refusing to cover up the facts is not a good career move for law enforcement personnel if the truth is leading to rich, famous and powerful people and their networks. So it proved again with the Jersey investigation.

Both sets of genuine investigators were removed from these cases and any credible ‘investigation’ went with them. Lenny Harper, like his counterpart in the Belgian inquiry, was accused of ‘misconduct’ as a blatant excuse to get rid of him – the allegations were later proved false. Harper’s boss, Jersey police chief Graham Power, was also outrageously suspended and neutralised as part of this.
More than a hundred people came forward claiming to have been sexually and violently abused at the Jersey home and Lenny Harper has confirmed that Jimmy Savile’s name came up early in his investigation but with not enough evidence to charge him at the time. Savile denied any knowledge of ever being at the home, but a picture emerged of him at the home to show that he was lying.

Highly significantly, the name of Edward Heath, the British Prime Minister between 1970 and 1974, has also emerged in relation to abuse at Haut de la Garenne and to Jimmy Savile. I named Heath as a serial child abuser and killer and practicing Satanist in The Biggest Secret seven years before he died in 2005.

A local newspaper reporter, or an excuse for one, contacted Heath when the book was published in 1998 and read him the passage. He replied with the usual ‘Icke is crazy’ response and did nothing else. The reporter, a Charlotte Hofton, condemned me for attacking a ‘nice old man’.

I had spoken to many people who said they had been abused by Heath and witnessed his sexual abuses and satanic child murders, while I was told about Savile by those who knew from having access to the ‘inside’. I was therefore confident enough, with direct contract with the abused themselves, to name Heath in the book and defend any libel action. But that never came because what I said was true.

Those who survived Heath’s abuse were the minority. He loved to torture children and then kill them, often by cutting their throats. This was the man who ran Britain for his masters for four years as prime minister and signed us into the fascism that is the European Union.

Heath was famous as an ocean-going sailor in his yacht Morning Cloud which he used to sail to Jersey and visit the children’s home, Haut La Garenne. According to some sources it was Jimmy Savile who supplied children for Heath that would be abused at sea and probably never return.

Savile had many close and intimate contacts in British politics and he boasted that he spent Christmas with Prime Minister Margaret Thatcher and her husband Dennis every year for a decade. Thatcher replaced Heath as leader of the Conservative Party and many of her government ministers were paedophiles.

Edward Heath and Lord Mountbatten, who first introduced Savile to the royal family, have also been connected by some researchers to the Kincora Boys Home in Belfast, Northern Ireland, the centre of another paedophile ring scandal that broke in 1980. It was clear that the authorities knew what was going on for years before that, but did nothing.

Kincora was a home for working class boys, the very type of kids which Mountbatten was said to be most keen to abuse. Kincora children would also be taken to castles and other homes of the rich and aristocratic families, some of whom were connected to the Irish branch of the Hellfire Club. This is the Satanic network established in the 18th century by British politician and Chancellor of the Exchequer, Francis Dashwood, 15th Baron le Despencer, and his close friend, American hero, Benjamin Franklin.

Three members of staff at Kincora were jailed, including William McGrath, a friend and associate of Northern Ireland’s most famous politician, Ian Paisley, but none of the elite clientele were ever investigated, let alone named and charged. The official inquiry (anything but) decided there was no wider ring operating from the home when that was clearly absurd.

The same happened when a paedophile ring was exposed at children’s homes in North Wales in the 1990s, including the Bryn Alyn home in Wrexham. Policemen, social workers and prominent public figures were named during public sessions of the North Wales Child Abuse Tribunal by those abused, but its chairman, Sir Ronald Waterhouse QC, threatened the media with High Court proceedings if the names were published.

First Waterhouse said that this ban applied only to people who were alive and who did not have previous convictions for child abuse. Then he banned the naming of a man who had died 16 years before and another with two convictions of abusing children in North Wales homes. All together now…

Lord McAlpine – denies involvement.

The UK Guardian went so far as describing one of those named as ‘A man who bears the same surname as a prominent Conservative supporter’. The report added that two witnesses had told the tribunal of a rich and powerful man who belonged to the alleged ring.
The now defunct Scallywag magazine named Lord McAlpine, a treasurer of the Conservative Party, and also Derek Laud, a leading ‘mover and shaker’ in Conservative administrations. Both were close friends of long-time Conservative Prime Minister Margaret Thatcher, a close friend of Jimmy Savile. McAlpine and Laud denied the allegations. I am not saying that Margaret Thatcher knew about Savile’s background, only that his friendship with her reveals his connections into the Conservative Party at the highest levels.

Scallywag also alleged that MI5 took foreign diplomats to the North Wales homes and secretly filmed them abusing and torturing boys to use the tapes for blackmail. This is a classic Intelligence modus operandi with regard to child abuse by the famous and influential – especially politicians that they want to control..

Paedophiles and Satanists pervade the world of politics, royalty, banking, corporations and media and it is just as rife in the UK Labour and Liberal Democrat parties as it is in the Conservatives – and among the Democrat and Republican elite in the United States.

-
War criminal and long-time Prime Minister Tony Blair represented the paedophile-infested Labour Party (see website link after this article) and at his private school, Fettes in Edinburgh, Scotland, he was a close friend of its chaplain, the Very Reverend Dr Ronald Selby Wright, who was known as a persistent paedophile. Edinburgh is a major centre for elite paedophilia and secret societies. Wright was a Church of Scotland Moderator and Chaplain to the Queen and the Fettes historian Robert Philip once said that the young Blair looked up to Dr Wright as a `spiritual mentor’. Philip said: `When Mr Blair was having trouble with the establishment, he confided in Ronald. I think a lot of seeds for his religious faith were sown there.’

And what else?

Tony Blair is reported to have blocked the exposure of famous names during Operation Ore – Operation Avalanche.

Tony Blair is reported to have blocked the exposure of famous names in law, business and politics, including some in his own cabinet, during the police investigation into paedophile Internet activity known as Operation Ore, which came out of the FBI investigation in the United States called Operation Avalanche. Neither convicted any of the big fish – as usual.

The figures in Operation Ore were enormous: 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned; 140 children removed from suspected dangerous situations. But still no major names in the paedophile-infested elite levels of society. Operation Avalanche in the US produced 35,000 Internet records, but only 100 charges.

Blair was leader of the Labour Party at the time of the mass killing of children by known paedophile Thomas Hamilton who walked into Dunblane Primary School in Scotland in 1996 and shot dead 16 children and a teacher before killing himself. Hamilton, like Savile, was a procurer of children for ‘pillars’ of the Establishment.

Scottish judge Lord Cullen was appointed to head the official inquiry into Dunblane and he ordered that significant documents relating to the case should be locked away from public view for a hundred years. He said that this was to protect the victims and families when anyone with a brain could see that it was to protect the Establishment.

Cullen also led the five-judge tribunal which heard the appeal against conviction of the (innocent) Lockerbie bomber Abdelbaset Ali al-Megrahi and decided that he was guilty. It was revealed that Lord Cullen is a member of an elite Freemasonic group based at Edinburgh University known as The Speculative Society.

Lord Burton, a former Grand Master of Scottish Freemasonry, told a British Sunday newspaper that Cullen’s ‘inquiry’ was a cover up that suppressed crucial information and he linked Cullen to what he called the ‘Super Mason’ Speculative Society. He said that he had been bullied and threatened by other members of the House of Lords when he tried to raise his concerns about a Dunblane cover-up. ‘There’s no escaping the fact that there’s something sinister about the whole affair’, he said.

Thomas Hamilton wandered around Queen Victoria School, Dunblane’s only private boarding school – just like Savile did in girls’ homes and hospitals – and these people are given so much protection and free rein because they are the sources of children for the paedophiles that run government and law enforcement.

Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control.

Jimmy Savile’s involvement with politicians goes back to the 1960s and he has been a ‘friend’ of so many who have dictated the direction of national and even world affairs, including the long-time Labour Prime Minister, Harold Wilson, who I have exposed in my books as a Rothschild front man and manipulator fully aware of the Orwellian world that he was helping to create. Savile was also associated with paedophile Liberal Party leader Jeremy Thorpe and the London gangland villains, the Kray twins, who are also reported to have provided children for the famous.

The network is just so vast – and global.

Jimmy Savile was also closely associated with convicted pop music paedophiles, Jonathan King and Gary Glitter (who he publicly defended after Glitter’s conviction) and he was into far more than child molestation. Satanists get their biggest ‘high’ from having sex with dead bodies and some paedophiles get their ‘high’ from sex with mentally and physically disabled children. Savile’s charity work gave him access to both.

He was a volunteer porter at Leeds General Infirmary and had his own room at Stoke Mandeville Hospital, with its world-renowned spinal injuries unit, and the Broadmoor psychiatric hospital. Allegations of abuse have come from all three and it is said to have happened with the knowledge of staff. Some children were told by staff to act as if they were asleep when Savile came round to avoid his sexual abuse. Hospitals have mortuaries and Savile’s fellow BBC radio presenter Paul Burnett said without knowing the significance: ‘He did a lot of work as a porter in the [Leeds] hospital that he collected money for. He would go there at night and work as a porter.’ Yes, and what else?

None of this wider background is appearing in the mainstream media. The story is being sold as a famous paedophile being exposed, but of most importance to the big picture here is that Savile was a procurer of children for those in positions of national and international power.

Savile died extremely rich and no one seems to be asking where all that came from. Okay, he would have earned well enough in his prime with television, advertising and personal appearances, but he has done none of that with any serious earning capacity for a long time.

Yet he still owned a £160,000 Rolls Royce and had five other cars including a Bentley Turbo and Mercedes 500 SL. He also reported to have owned at least eight homes and left millions in his will on top of that. Where did all the money come from into old age to keep that scale of lifestyle going?

The answer is that child procurement for elite paedophiles is a very lucrative business and also ensures you protection from the law so long as you keep the secrets because if you go down so do your clients. This is why Savile could boast that he was untouchable. He told television presenter Louis Theroux: ‘I can get anything. There’s nothing I can’t get, and there’s nothing I can’t do.’

Those who stay quiet are protected. Those who threaten to speak out are soon dead. The latter was not going to happen to Savile who knew how the game worked and played it for his personal benefit.

Savile was so good at what he did – ‘working deep cover’ – that he was made a member of the Knights of Malta, an elite secret society that I have long exposed in my books, and awarded a papal knighthood by Pope John Paul II in a show of thanks and admiration from the biggest paedophile racket on Earth, the Roman Catholic Church. He was also awarded a knighthood by his friend the Queen and the Establishment in general.

Paedophile and Satanic rings are just that – rings, networks. They include people in all walks of life from politics, law enforcement, judiciary, banking, corporations and media, and they watch each other’s’ backs because their own backs depend upon it.

This happens the world over and most certainly in the United States, as I have widely exposed, and involves a mass of prominent people including US presidents like Father George Bush and major manipulators like Henry Kissinger.

Children’s homes and government mind control programmes are the major source of children for the American ‘elite’. High on the list is Boys Town, Nebraska, which is also known as ‘Father Flanagan’s Boys’ Home’ after its founder, Roman Catholic priest Father Edward J. Flanagan. He established Boys Town in 1921 for the ‘care, treatment, and education of at-risk children’.

If you read the book, The Franklin Cover Up, by former Nebraska state senator, John W DeCamp, you might wonder when the children are most ‘at risk’ – before they go to Boys Town or after. The story almost got out at one point during the Reagan and Bush administrations, but was quickly covered up after this was published in 1989.

So the question is why? Why is paedophilia so all-pervading in these elite levels of human society? The answer is that entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general, but the energy they want more than anything is that of children before puberty.

The hormonal changes that happen at puberty are only holographic expressions of deeper energetic changes and the entities want that energy before those change takes place. When the paedophile is having sex with the child the possessing entities are using the paedophile as a conduit to draw off the child’s life-force.

The bloodline-possessed are genetically and energetically stimulated to desire sex with children and when they get what they want the entities get what they want – the child’s energy. This requires an endless supply of children to constantly repeat this process and this is where the Jimmy Saviles and Thomas Hamiltons come in.

I see that I have written 5,500 words in this article and yet I could have written 30,000 and still not told the whole story of how Satanism and paedophilia are the foundation and connecting tissue of the global network of human suppression.

People find it so hard to go there, or to accept what appears to be so fantastic, but if the Savile story continues to be pursued tenaciously, and with an open mind, it can open a doorway to expose the darkest of dark.

Source: DavidIcke.com

RELATED STORY: BEN FELLOWS FULL INTERVIEW ON LIVE – EXPOSING BBC CHILD ABUSE /// RELATED STORY: 'I RAN THE GAUNTLET OF PEDOPHILES IN THE ENTERTAINMENT INDUSTRY' /// RELATED INTERVIEW: Blowing the Lid on Child Abuse in Entertainment – The Ben Fellows Radio Show

Labour25 – paedophiles in the UK Labour Party - http://labour25.com/

David Icke – Knock Knock … Who’s There? Your Apathy! (Viewer Discretion Advised) Click here to watch …

/// BELOW THE FOLD: More from Wayne Madsen & Christopher Story on disturbing pedophile networks, perhaps even the Illuminati / German authoritarian connection to PM Heath, & more ////

UPDATE: Govt Sites appear OK right now // Earlier Feds / IIR.com apparently scrubbing Trapwire related websites: down from DNS but not offline

///// UPDATE: August 14th 7PM: Apparently more takedowns of media pieces are occurring. Here is a pastebin from Barrett Brown (@barrettbrownlol), and also please listen to a nice interview with Barrett on RadioDispatch, my friends' Molly & John Knefel's radio show. SOURCE: http://pastebin.com/gsR8HEwN

As of 6:40 CST here in U.S., these are the Australian articles on Trapwire that have been simply removed by their respective outlets with no explanation. Note that there are rumors to the effect that they are down to inaccurately stating that Cubic Corporation owns Abraxas Apps - rumors that are false, as show here (http://privatepaste.com/6810d9914a) and as could have been verified for nearly a year on Project PM's Echelon2.org wiki entry for Cubic Corporation (http://wiki.echelon2.org/wiki/Cubic_Corporation) which itself links to the pertinent tax documents. Incidentally, Cubic and Abraxas have long been our focus due to their known involvement in persona management software as provided to CENTCOM by the wholly owned subsidiary Ntrepid. Here, the, are the articles that are down - not corrected, but entirely removed:

http://m.smh.com.au/technology/technology-news/revealed-trapwire-spy-cam... stralia-20120813-2448z.html
http://www.canberratimes.com.au/technology/technology-news/revealed-trap...
http://www.smh.com.au/nsw/surveillance-system-linked-to-transport-defenc...
http://m.watoday.com.au/technology/technology-news/revealed-trapwire-spy...
http://m.theage.com.au/technology/technology-news/revealed-trapwire-spy-...
http://www.katherinetimes.com.au/news/national/national/general/revealed...
http://www.brisbanetimes.com.au/nsw/surveillance-system-linked-to-transp...
http://m.canberratimes.com.au/nsw/surveillance-system-linked-to-transpor...

God forbid that this unprecedented incident receive at least a cursory examination from those journalists who are paid to do what many of us in the activist community have long done for free.

As to the potential reason for such articles going down in Australia, and not elsewhere, this non-scrubbed article may hold a clue:

http://www.heraldsun.com.au/news/victoria/cubic-transportation-systems-o...

As may this:

http://www.optuszoo.com.au/news/breaking/brisbane-times/surveillance-sys...

This, too, is quite understandably down:

http://www.smh.com.au/nsw/surveillance-system-linked-to-transport-defenc...

And to those who are claiming that Trapwire does not actually entail anything like facial recognition, please take a few minutes to read what ex-CIA agent and Abraxas head Richard Helms said about the intent of the software seven years ago: that it would “collect information about people and vehicles that is more accurate than facial recognition," among other things. This was noted at http://publicintelligence.net/unravelling-trapwire/ where anyone could read it, not just those of us who bothered to do so.

In conclusion, fuck the media, and fuck the dozens of state-linked firms that the media hasn't bothered to do a single fucking bit of research on despite this problem having quite demonstrably gotten out of hand years ago.

Barrett Brown
Project PM
barriticus@gmail.com

END UPDATE /////

///// UPDATE: August 12 7AM: via two different DNS services it looks like the sites are looking up correctly now. My net connection's pretty dodgy at the moment but I think they are loading correctly now. It could have been a temporary glitch - strange since other lookups were working correctly on a that stable connection all day, while both ncirc and nsi.ncirc failed in lookups and had been working correctly on that DNS only hours earlier. Oh, domain name system, why must you be so quirky? [Needed: a good way to check quite a few open DNS servers at once for a query like this - I don't have a good method obviously]

On the upside, even if this was a transient thing and not a nefarious takedown, a few things can be learned. It's good to take a careful look at Suspicious Activity Reporting, which is the underlying basis of this sketchy Trapwire system. It's also good to know about the technique that I used to get around the faulty lookups and talk to the Apache servers (manually setting /etc/hosts allows you to send the correct headers to load a site, even when DNS is not pointing correctly at the server).

I'll add that I have seen this happen before, where a Suspicious Activity Report related government site went weirdly offline and I had to go back into the google cache to retrieve the missing site data. Thus, may have fallen a bit to confirmation bias.

Unfortunately in this case I was under a major time constraint - battery was about to run out & had to kick out a notice about this possibly going down before I lost power & internet availability. It's difficult to determine DNS changes on the fly - especially as power starts to drop out :[

Additionally http://twitter.com/unoccupyABQ retrieved more files using Google Cache (not wget) and those should be added to a new file archive later today after I get some rest.

I'm certainly sorry for prematurely drawing limited interest to this odd circumstance -- however, when we posted tweets asking if other people could see the server, a couple responses indicated it was still working, but there wasn't much feedback to confirm or deny the state of these DNS lookups. [& indeed it's possible they changed files, but I lack the ability to check right now - running wget again may be able to confirm such changes]

Also in the process I learned that IIR.com, a weird quasi-governmental organization, is controlling both ncirc.gov and nsi.ncirc.gov domain name registrations, which is an interesting inflow of authority from the quasi-gov sector into the .gov realm, and further linkages between IIR.com, Trapwire, and SARs will probably turn up, I'd suspect. Again sorry for the DNS drama but at least the effort brings other useful info.

$ dig ncirc.gov

; DiG 9.6-ESV-R4-P3 ncirc.gov
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 5598
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 3, ADDITIONAL: 0

;; QUESTION SECTION:
;ncirc.gov. IN A

;; ANSWER SECTION:
ncirc.gov. 30 IN A 199.44.41.59

;; AUTHORITY SECTION:
ncirc.gov. 30 IN NS talgtm.iir.com.
ncirc.gov. 30 IN NS ns3.iir.com.
ncirc.gov. 30 IN NS MURFGTM.iir.com.

;; Query time: 362 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Sun Aug 12 06:50:19 2012
;; MSG SIZE rcvd: 111

and nsi,ncirc.gov:

$ dig nsi.ncirc.gov

; DiG 9.6-ESV-R4-P3 nsi.ncirc.gov
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 49668
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 3, ADDITIONAL: 0

;; QUESTION SECTION:
;nsi.ncirc.gov. IN A

;; ANSWER SECTION:
nsi.ncirc.gov. 30 IN A 199.44.41.191

;; AUTHORITY SECTION:
ncirc.gov. 30 IN NS talgtm.iir.com.
ncirc.gov. 30 IN NS ns3.iir.com.
ncirc.gov. 30 IN NS MURFGTM.iir.com.

;; Query time: 403 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Sun Aug 12 06:52:11 2012
;; MSG SIZE rcvd: 115

END UPDATE ///////

Apparent #trapwire gov coverup in realtime!! it looks like the government is scrubbing Suspicious Activity Report related .gov sites and dumping their DNS entries. However the boxes are still online, if you use /etc/hosts on osx/unix you can still get in and mirror the files. i got 40MB+ off one site and 100+MB off the other.

IIR.com is a very sketchy org, one of these quasi governmental orgs that sets up tracking systems in the US, and advocates policies for them.

you can still get it with adding /etc/hosts entries:

199.44.41.191 nsi.ncirc.gov

199.44.41.59 ncirc.gov

on UNIX

wget -m --tries=5 "http://ncirc.gov"

and

wget -m --tries=5 "http://nsi.ncirc.gov"

*****

LETS HAS THE ARCHIVES I GOT with WGET. these are not necessarily the full files on these webservers but they are everything which the WGET mirroring spider could grab.

MD5 (ncirc.gov.zip) = d94b716f9b62c9bf5c65ca92bb566e86

FILE http://hongpong.com/files/ncirc/ncirc.gov.zip 85.7MB

MD5 (nsi.ncirc.gov.zip) = 0b23e1bb048cce2a499f5ec9476b30c5

FILE http://hongpong.com/files/ncirc/nsi.ncirc.gov.zip 34.3MB

DNS INFO SEE http://dnshistory.org/browsedomains/ncirc.gov.

DNS History - Domain Browser

Domain: ncirc.gov. (view subdomains / view in browser)
Added: 2009-12-29 Last Checked: 2010-10-16
PageRank: 6

What links here by: CNAME / NS / MX / PTR

View all domains starting with ncirc.*.

SOA - (history)

2010-10-16 -> 2010-10-16
MName: MRFGTM.iir.com
RName: hostmaster.iir.com
Serial: 18
Refresh: 10800
Retry: 3600
Expire: 604800
Minimum TTL: 60
NS - (history)

2010-05-16 -> 2010-10-16: talgtm.iir.com.
2010-05-16 -> 2010-10-16: mrfgtm.iir.com.
MX - (history)

2010-05-16 -> 2010-10-16: 10 -> janus.iir.com.

FOR more infos on the TRAPWIRE program situation - >>

Unravelling TrapWire: The CIA-Connected Global Suspicious Activity Surveillance System | Public Intelligence

Abraxas and Trapwire: the technology and personnel revealed « Darker Net

Political duality of the week: Electoral politics crushes anti-establishment networks of Ron Paul & Wisconsin uprising reframed as #WIrecall. What now, lolcats?

Government is the Entertainment Division of the military-industrial complex.
-- attributed to Frank Zappa

The ugly realities of modern electoral politics in America hit home this week with two body blows to self-styled anti-authoritarian political networks: The Ron Paul movement finally hit the brick wall as Rand Paul (R-KY Coal Mines) endorsed Mitt Romney (R-Rich Mormon Mafia) -- utterly shocking & depressing tons of semi-libertarian Republicans along with the entire conservative side of the "Truther" and/or "Liberty" movements.

Days earlier, the Wisconsin recall election against Gov. Scott Walker (R-Petulance) turned in uglier-than-expected numbers as likely thousands of Wisconsinites were stripped of their Constitutional right to vote through ridiculous new regulations -- and of course a bunch of shady electronic voting machines run from a company in a suburban St. Cloud strip mall. Fox News flacks and nasty Gloria Borger/Sarah Palin types cackled that the unruly, rebellious hordes had been licked for good. Now, the Paulistas and the rebellious Cheesehead hordes must ask: what's next?!

Perhaps these movements never had too much in common, though you could find some overlapping supporters. Probably the biggest difference is the Liberty types are pretty darn hostile to mainstream unions while the #OccupyCapitol (which the Dems transmuted into #WIrecall) clearly ended up with unions as its main hub. But they shared a hostility to the party hierarchies, business as usual, and to some extent the elite financial/War Machine domestic & international complexes, which has triggered the financial/austerity crisis by sucking out trillions of dollars.

The anarchist strain in Wisconsin, buttressed mainly by the IWW, complemented the non-interventionist libertarian one that's been rolling since about 2007 -- it showed that the new politics that people are actively hunting for is certainly not statist or socialist in the traditional sense.

UPDATE 5:30PM June 10: I got a response of sorts to the piece sent over twitter by @superbranch which is helpful for illustrating a number of details especially Democratic Party machinations: http://pastebin.com/vKh3tfh6 - Thanks!! I only had a view from a distance for most of this affair, so it's good stuff.

UPDATE 6:10PM June 10: Someone suggested that all anarchists are by definition socialists, though I think of socialism as a statist set of philosophies. In older times some labeled this "state socialism" vs. "libertarian socialism." See an Anarchist FAQ, example Kropotkin: "[s]o long as Socialism was understood in its wide, generic, and true sense -- as an effort to abolish the exploitation of Labour by Capital -- the Anarchists were marching hand-in-hands with the Socialists of that time", etc. & also see Black Flame blog. Also Article IV of the General Bylaws of the IWW Constitution specifically forbids "Political Alliances." "To the end of promoting industrial unity and of securing necessary discipline within the organisation, the IWW refuses all alliances, direct or indirect, with any political parties or anti-political sects, and disclaims responsibility for any individual opinion or act which may be at variance with the purposes herein expressed." Thus while I would say they are still anarcho-syndicalist, they are not formally set up as 'anarchist' per se. I feel I over-generalized in how I characterized the IWW, so sorry about that! (see also The League of Peace and Freedom for an org from that era)

UPDATE June 11: I mentioned prominent libertarian Lew Rockwell & forgot about his purported role in that whole Ron Paul "racist newsletter" narrative -- Rockwell is seen by many as the main ghostwriter in the 1980s newsletters. That stuff was creepy. More info here, here, here, here, here, etc. His newsletter compadre Murray Rothbard wrote "Egalitarianism as a Revolt Against Nature" in 1973 which I think illustrates the not-cool-at-all aspect of these guys that led to the ugly views in those newsletters.

******

On the Wisconsin Side: Turning A Broad Popular Uprising Into An AFSCME Bargaining Rights Boxing Match

I've never seen such a staggering level of oppositional political energy squandered in this country like I did at the Capitol rally one clear day last spring. That night, as laborites fumed at the Labor Temple meeting hosted by the IWW and drifted downstairs to commence drinking, I collected Wobbly swag and later driving around Madison speculated with friends what could happen if people occupied dozens of sites like they had the Capitol. Or maybe an image of the future arrived early in my mind. Either way, real-world radicalism receded yet again once more into dull, conventional latency. [cartoon by Toles]

toles-wisconsin-recall.jpeg

Perhaps the greatest achievement of the Republicans (which the Dems of course walked right into) was to narrow down and reframe the scope of the opposition from broad, radical revulsion at burning down virtually all aspects of governance in Wisconsin to a small, deeply mainstream, sore-loser election shitfit over government union bargaining rights.

As a party, the Dems just didn't want -- and probably couldn't understand -- an independent network pushing back, outside their control, a decentralized resistance to the Shock Doctrine. There was a real broad and sturdy community commencing in opposition, and the Dems demanded ideological buy-in, then splintered it into a thousand pieces and cast it to the wind. They couldn't recognize the dignity of people that didn't like either party -- people for whom a Recall and Milwaukee's Mayor Barrett didn't answer their questions.

The Democrats & the motivated Wisconsinites couldn't solve the problem of the pointless election industry. in order to fix anything at all, electoral politics needs to be a consequence of organizing for a better society, not the ultimate goal of organizing in perpetual 2-year cycles. In today's system, we have all our available cash thrown at short-lived election industry organizations that produce almost nothing of lasting value -- but they do make broadcasters richer.

How much more vast and worthy a fight it seemed last year. I was there on "Go Home Day," the day the state Democrats basically told everyone to go home and organize to recall the governor. While successful recalls of some GOP state senators did save the north country from a really bad mining project that would have destroyed an Indian tribe and much else besides, (the deciding GOP senator flipped) - and apparently the Wisconsin Senate did flip to Dem control in another recall around Racine as well, the national media, and the Star Tribune, are quite happy to buy the simple GOP narrative.

While Walker's goose still looked pretty well-and-cooked by early 2012, the Democratic Party of course knew how to biff an opportunity better than anyone. At the infamous Go Home Day, those rally-goers would have done damn near anything. If the senators had called for them to do cool actions around the state every two weeks - not just rallies but actual badass shit - everyone would have gone for it. Instead, the solution was conventional election industry operations and endless, destructive primaries.

It's fitting at least the Senate flipped after all the efforts, since the shockingly illegal abuses of power really came through that body, including violating the state's open meeting law to rail through their union-busting bill. It was classic political overreach that came with Shock Doctrine, slashing corporate taxes, trying to privatize the entire U of Wi system into the "Badger Partnership," (since of course it's one of the few old Germanic-style institutions not entirely oriented to corporatism today), Voter ID to block students and minorities from voting, etc. These sudden, broader conflicts added up to an incredibly attractive, unprecedentedly broad & open class war-type super-conflict across the state, which managed to radicalize thousands of heretofore-discreet firefighters and even police officers to protest in the streets & sleep in the Capitol!

The Democratic Party masters in Washington DC must have been appalled by this uprising. It conflicted horribly with their usual approach of throwing a couple bones to organized labor while screwing over them, the students and rank-and-file Dem activist types as much as possible, as they have year after year, to the benefit of the national security and financial industries.

tumblr_lhwry1Jbe51qduy0jo1_r1_1280.png

Chris Cillizza put it in the Fix, probably with great accuracy, that the national Dems did not want to see a recall election: "There was considerable internal discussion and disagreement between Washington and Wisconsin Democrats (and organized labor) about whether to push for a recall election this summer or wait until 2014 for a chance to unseat Walker. (Washington Democrats broadly favored the latter option, Wisconsin Democrats and labor the former)."

More to the point they did not want to see an independent populism rising in this country without Dem political hacks steering it away from their big contributors, such as the Wall Street criminals that have been fleecing the rest of the party base for years. This same dynamic played out again when the federal government through Homeland Security and the FBI, and Democratic mayors coordinated to dismantle the Occupy encampments in late 2011, then the Feds turned to setting up informant based-stings into 2012 in order to psyop the media away from the message that our institutions and politicians have grossly failed us. These stings were synthesized for Mayday and the Chicago NATO Summit, it was no accident.

Now, at least, the problem of post-Citizens United elections financed mainly by the likes of the Koch brothers, casino magnate Sheldon Adelson, and corporate treasuries have been laid bare. At the bottom of the tens of millions of dollars pumped into the state by many anonymous entities, Wisconsinites were paid $50 a pop to post yard signs, $20 to attend events, etc., and now at least the people know this is the core truth of modern electoral politics. According to one person I talked to, even Walker campaign workers were depressed by the massive constant cash flow. They knew it was an arrival at a new low. He who has the gold, rules. But who will carry the truth out of cheese country?

And as always, national and local media walk away from shady election practices -- irregularities are nothing but sour grapes and jags in the already agreed-upon narrative everyone's sticking with, kid. Only weirdos like BradBlog care about the hundreds of complaints -- of citizens being stripped of the one available gesture which underpins the entire legitimacy of the system. Maybe those people, lacking a voice in their own governance, will take things to a more direct level. At this point, why shouldn't they rebel against the apparatus? Freedom's just another word for no votes left to lose....

The Dems have a decent shot at keeping the state politically divided, even with the GOP's advantageous redistricting, which for example will add conservative exurban Chicagoans to the Racine district that flipped D last week. The national GOP and the state press probably won't admit it, but the enthusiasm for scorched-earth politics has long worn off and glorious gridlock will return.

I saw on Twitter speculation about a General Strike for Milwaukee -- and a lot of activists apparently haven't enjoyed their tenure working in electoral politics with the Democrats. We could see more direct action - and with a relatively militant street protest in Milwaukee along with an Quebec sympathy march by Occupy Chicago getting beaten down by CPD last week, more radical politics along Lake Michigan is probably in the cards. People signed those recalls for a reason and they're going to want to do something different, to keep organizing against the tidal force of big money.

******

Et Tu, Rand Paul! Truthers & Liberty Movements lose their vanguard & screech to a halt?

A decidedly different arc of the spectrum finally got the letdown they've been staving off for months this week, and now they too need to put their pieces back together and move along. Antiwar.com's Justin Raimondo had Rand pegged way back in September 2010: he was playing footsie with the neocons but the Paul network people didn't want to believe it. (and mapped the wind-down in February) Today they're reeling -- it seals what they've avoided facing for a couple months, that the GOP nomination is finally out of reach. Here's the man enthusiastically endorsing Mittens:

Seriously, he looks more depressed than anyone I've ever seen touting Republicans on Fox News. But I think the back conversation is also illustrative: Rand Paul has always been clear that Kentucky coal mines are awesome and SOPA was evil & worth opposing. This is the awesome package you get with the Liberty movement.

Via Mike Adams: Linguistic analysis of Rand Paul's endorsement of Romney contradicts his words: Rand Paul is disgusted with him! I kind of had to sigh at this whole piece, which is too bad because usually Adams is peppy and kind of fun in how he sticks it to the FDA deathfood industrial complex:

It is the system itself that is broken, corrupt and defunct. This is the very point of Lew Rockwell, who explained in a recent interview with RT that the government itself is always the problem, and that no government can rescue the People from the problems of government: http://www.prisonplanet.com/lew-rockwell-ron-paul-and-rand-paul-are-d...
[.....]
Personally, I completely agree with Alex in saying there is no compromise allowed. No doing deals with the devil. If we support liberty, we must deny our support for those who oppose it. We must never allow ourselves to become part of the very system that is destroying our economy, our liberties and our future. It is widely acknowledged now -- even on the political left -- that Obama is a traitor to America, but there is no indication that Romney wouldn't be even worse. He's practically a white version of Obama, with much the same platform: Government-run socialized medicine, high taxes, War on Drugs, secret military prisons, banker bailouts, gun confiscation and so on. Having Romney runs things in Washington will produce no better results than we've already seen over the last four years. It may even be worse, if you can imagine that.

[.....] I am not yet denouncing Sen. Rand Paul, as I still hope there is a double agent aspect to his actions and that somehow he will emerge as a defender of liberty. In my view, his track record has at least earned our patience in observing this situation a little longer. However, if Rand Paul continues down this path without explanation, it is all but clear he will destroy his political career and lose virtually his entire support base -- the very people who put him in the U.S. Senate in the first place.



As with all lovers of liberty, my patience is running out, and I'm beginning to think Lew Rockwell was right all along:All government is inherently evil and destructive, and that we are all foolish to think government can ever be changed through elections.

[bold emphasis his] I'm not exactly an enthusiastic statist, but this isn't really the nation's most productive perspective. Lew Rockwell is probably best described as a hard-core Libertarian, maybe even a Voluntaryist and/or "Market Anarchist" (see the Center for a Stateless Society) which is a set of views most Anarchists vehemently disagree with. Capitalism without the collection of memes and buildings we call a government would really suck even more than it does now. If we can envision a way to somehow finally move out of capitalism and leave capitalism's main organizer, the government, behind with it, that would be a little more balanced.

But this perspective isn't coming out of left field altogether - there's in a reason that Voluntaryist type thinking is more attractive than ever on the American Right and capital-A Anarchism is way more popular than a year ago, mostly thanks to the Occupy Wall Street project that blew up way beyond anyone's expectations.

While there's an escapist quality to libertarianism and anarchism, everyone wants to escape for a reason. There's a tangible sense - backed up with countless examples - that these structures held over us through violence, coercion and endless ranks of nasty little helpers - are utterly indifferent if not outright hostile to our chances of survival, let alone defending our dwindling freedoms. Shocked anyone would feel that way? Without much effort, we can feel a prison state closing in around us, seemingly poisoning everything from our pores to our skies to our souls.

Embitterment with the corporatist two-party system and its agenda of perpetual resource wars under loathsome, almost occult, entities like the IMF and NATO, along with a collapse in the standard of living for tens if not hundreds of millions of Americans, has brought plenty of anger towards government institutions that seem to exist solely to protect corrupt corporate cartels at the expense of smaller players (see the Gibson guitar drama, or FDA's love affair with big pharma), along with running protection for a rapacious and insane financial industry which has defrauded the American people of countless trillions of dollars in assets & hard-won dollars.

But the people feeling most burned this week outside of Wisconsin might be the Truthers who believed in Ron Paul. No one's done more to tie the people who refused to buy the government narrative on the Sept 11 2011 terrorist attacks to the Ron Paul network than Texas radio host Alex Jones.

While I certainly don't agree with plenty of Jones' views -- and I told him a month ago when I had the chance that it was important for all of us to avoid being conveyor belts for fear -- many people who criticize him are partly doing so simply because the national scene of Terror Narrative skeptics aka "Truthers" is so weak and divided that he's by default That Main Guy, so it must be his fault the available views are so politically narrow & funneled into a certain electoral machine that has now failed to Deliver the Goods.

It's not Ron Paul's fault or Alex Jones' fault that the rest of DC is basically composed of feckless war chickenhawks who are totally hostile to resisting false flags, the war on drugs and other scams of the military-industrial-intelligence-congressional complex. We all know modern COINTELPRO keeps the political discussion locked in a certain box. But was Alex Jones "duped" by Ron Paul? Check this out...

Here's just a classic recent moment worth watching between Jones and the closest thing he has to a mainstream left counterpart, the bookish conspiracy wonk Webster Tarpley. In this video, Alex Jones' years-long campaign to advocate Ron Paul's election shop finally comes to a sputtering end as Tarpley points out a lot of deliciously salient yet in retrospect quite obvious political points from the campaign. For great lulz he says Paul & Romney represent the amiable merger of southern Scottish Rite Freemasonry (a la Secret Sun) and the crypto-Freemasonic beliefs of Mormonism.

Tarpley, who has a quasi-FDR style political outlook has done a lot of nice pieces and books [Synthetic Terror PDF] over the years, and as a former associate of Lyndon LaRouche (also FDR-like in a weird way) he never saw a Anglo-Dutch conspiracy he didn't like to flush out.

Tarpley points out that Ron Paul declined to really attack Romney at all in the GOP debates, generally firing on Romney's leading opponents and also deflecting their anger. With Romney's cousin Huntsman as the opposite left/centrist flank, the good doctor was able to absorb basically all the anti-establishment votes against Romney. When Jones is holding the mic, you can just hear Tarpley saying that Paul ran interference for Romney and Jones ran interference for Paul. OUCH.

Obviously I felt it was beneficial to the country to have Paul challenging the warmongers and exposing their bloodthirsty insanity, the disturbingly unvarnished Id in some of those crowds, and it would have been better to have a Paul vs Obama campaign to force the war & big brother state issues to the fore. But this was never really in the cards, even if Paul would have been a better general election candidate for the GOP than Romney (which he probably would have been).

This, after all, is American electoral politics. Frank Zappa characterized it as the entertainment wing of the military-industrial complex and of course he was right. The intelligence structures are never going to let anyone advance into office who would undo the National Security Act of 1947 and the cultish secret state it initiated to be undone.

They are perfectly happy to keep everything managed under two-party dialectics with tons of corporate money swaying all the big issues. Since we don't have a parliamentary system anywhere in this country, with party lists that would permit minority viewpoints a legislative voice, every interesting electoral project, from Howard Dean or Ralph Nader to Ron Paul and Dennis Kucinich, become exercises in futility, white knights to rally the less-brainwashed masses & follow off to electoral oblivion with great fanfare. And if things get too close, a few Nixonian dirty tricks and buffer overflows in the voting machines can clean it up in no time.

Hell, if Lyndon Johnson wouldn't even expose Richard Nixon's treasonous blocking of the Paris peace conference on Vietnam, what chance does this more lame and greasy generation of politicians have?

In the GOP process this year, the anti-Paul people made sure to lock out & dirty-trick as many Paulistas as they could, leading to memorably weird chaos at normally-staid GOP conventions across America. The Romney 'network' is about an inch deep (apart from Bain operatives making trouble China & stuff), while seemingly endless weird networks of lolcats affiliated with the Ron Paul campaign.

In the 2008 cycle, it was insightfully put that the Paul campaign was very deliberately a narrative void or a cipher, so that the Truther groups could happily write themselves into the narrative and identify with it, along with IT nerds, the post-Perot types, and at the darker end, much more creepy prejudiced nativist types & etc. (and this varied heavily state-to-state, with Michigan less creepy than Arizona, etc.).

Unfortunately, because the Truther movement just didn't have a good broad nature in the political spectrum (well it does, but it doesn't operate that way), working with the anti-militarist Paul campaign to recruit and hang onto all those rebelliously-minded people effectively diverted them from possibly amplifying other efforts. He'd talk about false flags and ideals of liberty, but did Paul ever make it clear people needed to get out of their political comfort zone to take on adversaries we all share?

The ideological buy-in needed to become a true believer in electoral politics made rivals of people that could have and should have been allies -- in their own best interests. For example, it drove a wedge between Ron Paul fans who became Rand Paul fans, who liked his deregulatory push on coal mines, against the mountaintop removal activists. That wedge is perhaps the tragedy -- could it be undone?

What if everyone had instead agitated -- in a non-partisan style -- at their state legislatures against the corrupt operations of the federal government, the false flags, the constant stings and setups targeting both left and right, not to mention Muslims? What if they'd done direct actions together in the field against minions of the police state? There was a real biffed opportunity to build a good, multi-level resistance network outside of the traps and pitfalls of electoral politics.

Hopefully the remainders of the 2012 Paul network can pick themselves up and pivot more to more broad social issues, as well as the Big Brother system which is rapidly expanding -- if they can get a handle on how the Federal Reserve, while a keystone, is in many ways just the trade association or front-plate for the politically engaged big banks (with an infinite money printer).

The Big Brother system isn't exclusively government-based either, despite what Lew Rockwell and Mike Adams believe. It's really getting implemented by less than 25 military-industrial contractors with about 300 below that, and another several hundred below them. I can only expect these people to redouble their scrutiny and fierce public resistance, sending many would-be technocratic control freaks running for cover. The gains they made in the formal GOP system will add more wrinkles to what looked like an easy rollout for the prison state.

The Big Brother complex is capitalist, not in the sense of a 'free market' but in the sense it's commidifying everything about human freedom. It arrives through statism, but with dollar signs. It's the tender mercies of the GEO Group letting 'juvies' get sexually assaulted in hellish Mississippi private prisons. It's having foot locators on everyone. Ex by Matt Stoller: Profit-Driven Surveillance and the Spectrum of Freedom: “We will offer electronic monitoring services in every state.”

******

So now, between Wisconsin and the Truthers and the Ron Paul cats, here we sit, at the long dark teatime of the soul, as Douglas Adams put it. All our shared problems mount and continue to deteriorate -- the usual foibles of humanity, greed, idolatry, the search for white knights to preserve that which never existed in the first place, the hunt for strange new threats from within and without -- all of these are still with us. Ancient Greek historians would chuckle that twenty-some centuries later, we fall for the same damn tricks every time.

Perhaps as they say there is nothing new in the universe, but I've seen a lot of synchronicity. I've seen a lot more pieces fall into place and weirdly line up than I think my traditional atheist mundane-universe perspective could explain. After all, today's militant Dawkins type atheists can't explain too well why evil -- and its handmaiden, war -- impose such a powerful force of their own. Nor can they explain what summons people to such resistance, or on occasion such luck and grace.

Even when dealt those staggering blows -- even when your political projects seemingly turn to dust overnight yet again -- besides the fond memories of fighting the good fight with your comrades, you made new friends, you built new skills, you showed the novices a thing or two. You didn't live on your knees, you threatened the despicable & illegitimate flows of authority. From time to time, you really wigged them out. And yes, you won a victory, two, or three, and inspired a few more.

The challenge, of course, is for all these people to reach outside their comfort zone, to abandon the elections-first perspective and turn to the more difficult project of politics in real time, not the deferred imaginary future image produced by the operatives of election industry, the illusionary catharsis they pitch as tomorrow's ballot box.

Syndicate content