Disclaimer: This site is *not* affiliated with AIPAC, Ahmed Chalabi, K Street, ClearChannel, or Urban Moving Systems of Weehawken, NJ. In case you were curious. Full disclosure: I have a "long Apple position" and therefore I have an Apple bias.
If secret federal aviation is the Big Lebowski, Bristow is the rug that really ties the room together.
It's been thrilling to watch one of my favorite topics, aviation in covert operations, hit the bigtime over the last few news cycles.A few tweets about suspicious plane hovering over Baltimore 'disturbances' registered to a ghostly "NG Research" at a Bristow, Virginia PO Box cued the story. The FBI conceding to Washington Post that it was their flight set the stage for this. These stories have quietly been leaching out for years. As far back as 2003 (or 2006 in WIRED) references to small aircraft doing domestic surveillance have been popping up. After the Boston Marathon bombing, a small aircraft was traced to the same Bristow VA cluster. Today the story hit turbo with a big AP story, FBI behind mysterious surveillance aircraft over US cities, but there are lots more to find because the AP didn't really go outside of Bristow. You'll find plenty of N Numbers to snoop on below - and cool new tracking techniques too!! Quote of the year?
The FBI asked the AP not to disclose the names of the fake companies it uncovered, saying that would saddle taxpayers with the expense of creating new cover companies to shield the government's involvement, and could endanger the planes and integrity of the surveillance missions. The AP declined the FBI's request because the companies' names — as well as common addresses linked to the Justice Department — are listed on public documents and in government databases.
In my own scoping in the last week or so it appears that these shell company registration were mostly set up around 2010 or 2011, making this an Obama operation through and through. I apologize for not tipping yall more quickly to this impending development but I have been too busy!
This story shows that secret airlines are becoming an obsolete method for the [deep] state, because with the Internet and planespotters it becomes possible to observe and end-run around the secrecy of the networks, as the last big wave of awareness around secret detainee flights in the Bush years really revealed (though mostly in Eurasia, not North America). (2007 Cryptome Story and Category:Alleged CIA pilots - SourceWatch)
.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.
Years ago I asked a staff research person at the Minnesota Department of Transportation if there was something weird about how FAA registration works, if it is designed to hide ownership, and he assured me it had been that way since the FAA had been set up - and went on to tell me that when he was much younger, in the late 1980s he had traced a disappeared pilot to Texas, then found that someone had pulled the flight plans from the FAA file. This shadowy story was literally the first thing I heard from a government employee when I went asking, confirming my long-running theory that everyone has some kind of story that touches on the corrupt secret government or deep state.
Naturally the FBI/DOJ also has its own similar shells. Due to incredible laziness the feds registered tons of them with the same name pattern at the same locale in Bristow VA. Here, have some original art I made on May 25, well before the Star Tribune and Associated Press picked up this story!
Several independent parties put these pieces together and triggered the massive news snowball today. Probably the first to catch a large section of it was john wiseman (@lemonodor), who figured out good methods for tracing the transmitters and radio traffic. My friend Sam Richards (@MinneapoliSam) was the first as far as I know to put together the larger data set about the Bristow VA node, after getting a tip about a sketchy spy flight over Minneapolis, although Wiseman verifiably came up with a whole bunch of the shells in early May. Wiseman explains his narrative in new post: Tracking FBI aerial surveillance (with images, tweets) · jjwiseman · Storify
Below is a listing of 100 aircraft registered to shell companies that do not exist. The US Department of Justice can claim plausible deniability for owning and operating these aircraft however that is a flimsy defense. At the time of posting, a number of these aircraft may be airborne over American cities, equipped with surveillance, stingray, or other hardware. FOIAs are being drafted and will be submitted so it is only a matter of time before a brighter light is shined upon these secretive operations.
For examples of the flight patterns conducted by many of these aircraft within the last few days, check:
Here's an article by the ACLU highlighting why these operations are of concern https://www.aclu.org/blog/ohio-aerial-surveillance-system-moving-forward... "ARGUS, the high-flying drone technology capable of capturing super-high-definition video of a 15-square mile area and automatically tracking all moving vehicles and people within that area. I pointed out that this makes possible our nightmare scenario for drones: wide-area mass surveillance and location tracking of entire cities and towns."
Now the FBI is an onerous position where they have to turn over, de-register or re-register all of these planes, somehow reconciling rebuilding the secrecy of the fleet exposed above with the FAA's registration system, and the hordes of planespotters out there now reinforced by tons of interested activists cued into the national scope of this operation. Good luck Feds!
SOURCE: View image: image5. This plane has been flagged as using the JENA code which seems to be the usual code until probably around now. Images scaled down, resize to see more. N959JT is of course registered in Bristow VA. Bonus points awarded for pink toenails in spotting this secret aircraft machinery which seems to resemble the gear spotted on the recent Minneapolis plane.
I live in Phoenix and my coworker was telling me she's been noticing this plane circling around their neighborhood the past 12 days. They started tracking the planes on Flightradar24 and she sent me these screenshots of some of their flight paths: http://postimg.org/image/tpdhpd789/http://postimg.org/image/o2h4rw4pl/http://postimg.org/image/uuc58hj2x/ She even had a pilot friend go down to the airport that they've been flying out of and do some snooping. He found took this photo of the camera equipment mounted to the bottom of the plane: http://postimg.org/image/hm861sw61/ She said that it's always the same 3 tail fin numbers which take turns doing the same flight path. They start at daybreak and only stop late in the night.
Update: Here's another pic my coworker got of one of the planes parked at the Deer Valley Airport in Phoenix. You can see the camera equipment on the side: http://postimg.org/image/oj5bwlcjn/
She also said over the past couple days all the tail fin numbers changed on Flightradar24 and they are now all showing up as some variation of "JENA". Screenshot: http://postimg.org/image/n3ahqjgql/
Finally it is worth noting it has been difficult but not impossible to get credit to independent journalists for blowing up this story. I appreciate Bob Collins at Minnesota Public Radio's Newscut for engaging on Twitter when we pressed him on the issue of crediting the story, and including references to Sam's original medium.com story, while the Star Tribune and AP did not credit Sam at all. (Although the Strib has been communicative recently and I have some hope they will circle back within a few days).
Additionally I suspect "CHAPPARRAL AIR GROUP" may be another front, they got a craft from the DEA: N540DB. seeHelicopter Flying Above Claycord on Thursday Afternoon —claycord CLAYCORD.com: "A google search of the tail ID can help you confirm this also, where you will find no shortage of photographs of this specific aircraft operating out of Concord and San Jose. Note that the federal government recently (2011) transferred registration of 15 Federal law enforcement helicopters out of the names of the Department of Justice, DEA, to an entity in Texas called the Chaparral Air Group."
Before the story broke we had a bunch of diggings, now it's time to share! MORE RELATED RAW DATA:
NOTE there are some false positives and general "NOISE" in here, please proceed with discernment!!!
In broader context, the Obama administration has continuted to expand the use of intelligence tracking, including fusion centers and electronic intelligence, to keep rebellious groups under control, as addressed here
On April 29, a Cessna 206H registered to National Aircraft Leasing Corporation circled overhead for hours at about 3,500 feet, flying repetitively over western Baltimore. On the nights of April 30, May 1 and May 2, another aircraft, a Cessna Model 182T registered to a company named NG Research in Bristow, Virginia, flew over the same areas at a similar low altitude.
Also on May 1 and May 2, an unidentified Cessna Citation V jet made similar nighttime flights, orbiting Baltimore at the relatively low altitudes (for a jet aircraft) of 6,400 and 9,400 feet, based on records from Flightradar24.
Kind of vague hit comes up for the google search on National Aircraft Leasing Corporation
Edit 3: After looking through the list of aircraft registered in Bristow, VA for a town of 15,000 there are 64 aircraft registered including one owned by the Department of Justice. All within the past decade most within the past 3 years. Most of them are owned by companies with 3 letters then what they do RKT Productions, PSL Surveying, KQM Aviation, LCB Leasing, NBY productions etc. They also all are operation 182t Cessna’s. All of the companies only have a PO Box in Bristow. Looks like an FBI airport.
The one tail number that the initial Washington Post article linked to is N39MY, which is a Cessna 182T registered to NG Research, PO Box 722 in Bristow, VA. That company's web presence is close to zero, basically below the noise floor.
If you google [po box bristow va] you find FAA records for a bunch of other oddly named companies that all have similarly close-to-zero web presence and addresses that are PO Boxes in Bristow: FVX Research, NBR Aviation, NBY Productions, OBR Leasing, OTV Leasing, PSL Surveys, PXW Services. They all seem to like Cessna 182Ts.
If you Google the tail numbers of aircraft registered to those companies, you start to find forum and mailing list posts (often at sites that tilt toward paranoid/conspiracy/right wing, but not always) with people discussing these specific tail numbers and linking them to the FBI. Some of the supposed evidence includes details of radio communications that people have heard, e.g. talking about "being on station" or using callsigns that start with JENNA, JENA or ROSS, which are supposedly used by the FBI. Other posts claim that DOJ/FBI surveillance aircraft often squawk 4414 or 4415 on their transponders.
I monitor aircraft in Los Angeles using an RTL-SDR dongle. I keep a database of almost every transponder ping I receive. You can see some more info, analysis and examples of stuff I've seen (U-2, AF1, AF2, EXEC-1F, E-6 "Doomsday" planes) at
I decided to check my database for planes that have squawked 4414/4415 or used one of the suspicious callsigns: I found 8 aircraft in the past 2 months, several of which exhibit suspicious behavior: Flying for hours at a time without going anywhere in particular (I don't have position information for them, but I know they're in the air and not leaving the LA area), flying almost every day for months at a time, squawking 4414 or 4415, and one that used a JENNA callsign. 2 of them are registered to companies with PO Boxes in Bristow, VA. Another is registered to AEROGRAPHICS INC. 10678 AVIATION LN, MANASSAS VIRGINIA, which googling shows has also been linked to the FBI/DOJ. Several others are registered to WORLDWIDE AIRCRAFT LEASING CORP and NATIONAL AIRCRAFT LEASING CORP in Delaware, similar to other suspected FBI front companies (e.g. Northwest Aircraft Leasing Corp. in Newark, Delaware).
(I call what I'm doing "persistent sousveillance": using historical sensor data to retroactively identify and track new subjects, it's just that my subjects are the government. One of the surprising things I've found is that all you need to do is look: the weird stuff jumps out right away, e.g. Cessnas registered to fake-sounding companies that loiter overhead for hours every day.)
It's a lot of circumstantial evidence, but at this point it doesn't seem far-fetched that I'm monitoring aircraft involved in persistent FBI aerial surveillance.
Edit: One other thing worth mentioning is that I was surprised at how many local news stories I turned up while googling these planes & companies that fit the template of "Citizens complain about mystery Cessna flying low, circling over their neighborhood".)
The FAA manages this program and NBAA no longer has any policy or administrative control over the FAA ASDI Block program. However, if you have general questions or concerns about the FAA process, contact NBAA's Operations Service Group email@example.com (202) 783-9250.
The FAA’s primary electronic mailbox for all aircraft blocking and unblocking requests and for related inquiries directed to the ASDI blocking program isASDIBlock@faa.gov.
102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JUNCTION, VA 24529-3110461AJ 18282225 RKT PR
ODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA 20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS PO BOX 502BRISTOW,VA 20136-0502912EX 18282231
OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632
N-Number Serial Number Name Address102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JU
NCTION, VA 24529-3110461AJ 18282225 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS
similarly there are some hits here. for entire listing in LOUDOUN county
PO BOX 502BRISTOW, VA 20136-0502912EX 18282231 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-063
Possible tech or similar
PERSISTENT REAL-TIME INTELLIGENCE OVER A WIDE AREA -- DAY & NIGHT
Most people have no idea that the National Security Agency gets involved in big events like national political conventions and the Olympics: National Special Security Events (NSSEs) with security led by the Secret Service, which is now a part of the Department of Homeland Security.
Many ideas taken for granted - including the separation of military and civilian life within the US - evaporate in NSSEs. Many, many federal agencies send little teams, including advanced military intelligence.
This is apparently the first time that it has been really noted the NSA's director in 2007 officially stated that NSSE's are strategic missions. This in turn means that the NSA must have had *some* role at the 2008 Republican National Convention in Minneapolis. (see our RNC documentary Terrorizing Dissent here & RNC08Report for docs) More background below the doc fulltext.
It's hard to overstate the nasty, elitist, disruptive effects of the Olympics. As a new resident of Boston, the unfortunate news that the 2024 Olympics now has this city in its crosshairs is disappointing & fear inducing. After all I ran into (at least) four FBI informants because of the 2008 RNC, gassed & shot at by the authorities.
United States SIGINT System January 2007 Strategic Mission List
Introduction - Director’s Intent
(S//SI) The SIGINT Strategic Mission List represents the intent of the Director, National Security Agency in regard to mission priorities and risks for the United States S1G1NT System (USSS) over the next 12-18 months The list is derived from review of the Intelligence Community National Intelligence Priorities Framework, DC1/DNI Guidance, the Strategic Warning List, National SIGINT Requirements Process (NSRP) and other strategic planning documents The missions included on the list are in relative priority order and represent the most urgent tasks for the USSS The list is not intended to be all encompassing, but is intended to set forth guidance on the highest priorities.
Topical Missions and Enduring Targets
(S//S1) The SIGINT Strategic Mission List is divided into two parts. It includes 16 critical topical missions in Part I of the list, which represent missions discerned to be areas of highest priority for the USSS, where SIGINT can make key contributions. In addition to the 16 critical topical missions, Part U of the SIGINT Strategic Mission List includes 6 enduring targets that are included due to the need to work these targets holistically because o f their strategic importance. In addition to their long-term strategic importance, the enduring targets can potentially "trump" the highest priority topical missions on the list at any time, based upon evolving world events. Elements o f these targets are also represented throughout the topical target sets. For each of the 16 topical missions and each of the 6 enduring targets the Strategic Mission List includes:
1) Focus Areas- critically important targets against which the SIGINT enterprise is placing emphasis. DIRNSA designation of a target as a focus area constitutes his guidance to the SIGINT System that it is a "must do” target for that mission 2) Accepted Risksstrategically significant targets against which the USSS is not placing emphasis and for which SIGINT should not be relied upon as a primary source. DIRNSA's reasons for accepting these risks include high difficulty and lack of resources or as an “Economy of Force Measure,” in order to achieve focus on the most critical targets
A Strategic Investment Tool for SIGINT Resources
(S//S1) Given a finite level of resources available in all mission areas, the Strategic Mission List provides high-level strategic direction to the global SIGINT system to focus resources on the most important/highest priority areas. “Risks” identify targets that cannot be resourced to the level of a Focus Area, thereby acknowledging that shortfalls will exist. As world circumstances change, these or other targets can be added to the list as needed, targets no longer of critical importance can also be removed from the Focus Area category. In addition, other targets, not listed as focus or risk areas, can also be wrorked by the USSS to a lesser degree to meet other customer requirements. The Strategic Mission List will be reviewedbi- annuallyby the USSS Signals Intelligence leadership Team Missions. Focus areas, and Accepted Risks will be adjusted as a means of providing high-level steerage to the Nation’s agile SIGINT System.
United States SIGINT System Strategic Mission L ist- January 2007
(U) I. Strategic Mission List - Topical Missions
(S//S1)A. MISSION: Terrorism: Winning the Global War on Terrorism. Focus Areas:
a.All Interagency Intelligence Committee on Terrorism (I1CT) Tier 0 and 1 terrorist groups with capabilities and intentions to attack the US, its interests or allies, or groups actively planning or carrying out a terrorist attack against U.S. persons, facilities, or interests
b. Key individuals and Terrorist Support Entities (TSE) involved in the facilitation, financing, and recruitmentorradicalizationofallIICT Tier0and 1terroristgroupnetworksglobally.
Accepted Risks:All IICT Tier 2,3, and 4 terrorist groups, and TSEs.
(S//S1) B. MISSION: Homeland Security: Protecting the U.S. Homeland from terrorist attack and other transnational threats to safeguard U.S. persons, freedoms, critical information, infrastructure, property and economy.
a Border Security (land, air, sea).
b. Direct defense against terrorist attack.
c. Diseases, epidemics, and pandemics.
d. Executive Protection/U.S.-Based NSSEs e.Illicit Facilitation as it relates to special interest aliens and CBRN materials and technology
a Accepted risks as stated in the “Terrorism” mission.
b. Global coverage o f all illicit activities of potential concern to the Homeland.
(S//SI//REL USA, AUS, CAN, GBR) C. MISSION: W M P and CBRN Programs and Proliferation: Combating the Threat of Development and Proliferation of Weapons of Mass Destruction, CBRN, and Delivery Methods (particularly ballistic and nuclear-capable cruise missiles).
a. Development, Acquisition, or Use of CBRN.
b.State W'MD and ballistic and cruise missile programs of:
China (biological, chemical, nuclear, ballistic and cruise missiles) India (nuclear, ballistic missiles)
Iran (biological, chemical, nuclear, and ballistic missiles)
North Korea (biological, chemical, nuclear, ballistic missiles) Pakistan (nuclear, ballistic missiles)
Russia (biological, chemical, nuclear, ballistic and cruise missiles)
Syria (chemical, nuclear, ballistic missiles).
c.W MD and missile proliferation activities by states:
China (nuclear, ballistic missiles), Israel (cruise missiles) North Korea (nuclear, ballistic missiles)
Pakistan (nuclear, ballistic missiles)
Russia (ballistic missile).
d.W.MD and missile acquisition activities by states:
China (cruise missiles)
India (cruise missiles)
Iran (nuclear, ballistic missiles)
Pakistan (cruise missiles)
Saudi Arabia (nuclear, ballistic missiles).
e.Safety and Security ofWMD: Pakistan (nuclear)
State WMD and ballistic and cruise missile programs of: Egypt (ballistic missiles)
Libya (ballistic missiles)
Taiwan (ballistic missiles).
(S//S1)D. MISSION: U.S. Forces at Risk (Military Support): Protecting U.S. Military Forces Deployed Overseas and Enabling their Operations.
a. U.S. forces deployed in: Iraq. Afghanistan. Mideast Region. Korea, and Philippines.
b. Support to military planning and operations: Support to OPLAN 5027 (Korea).
c. Intentions of foreign and indigenous anti-coalition forces, command and control. OOB, and
operational support in Iraq and Afghanistan. d.Support to U.S. forces in identification of HVTs in Afghanistan/ Pakistan and Iraq
a Protection of U S forces deployed in: Balkans (Kosovo),
b South Korea leadership intentions in OPLAN 5027.
c Routine military support to U.S. forces deployed in non-combat situations.
(S//S1)E. MISSION: State/Political Stability: Providing Warning of Impending State Instability. Focus Areas:
a. Internal political activities that could threaten the survivability of leadership in countries where US has interest in regime continuity Iraq, Afghanistan, Pakistan, and Saudi Arabia.
b.Internal political activities that could result in crisis in. North Korea, Sudan/Dafur humanitarian crisis. Cuba, Kosovo, Turkey, Nigeria, Lebanon, Venezuela, Syria, Bolivia, Latin American Bolivarian Developments, and Palestinian Authority.
Accepted Risks:Internal political stability of: Egypt, Zimbabwe, Cote d'Ivoire, Liberia, DROC, Bangladesh, Georgia, Jordan, and Haiti.
(S//SI)F. MISSION: Warning of Strategic Nuclear Missile Threats: Providing Warning of a Strategic Nuclear Missile Attack on the territory of the 50 United States.
Focus Areas: Areas covered under a peacetime SIGINT strategy maintaining full capabilities with reasonably sufficient coverage for the provision of warning include: Russia's Nuclear C3, Mobile
ICBMs, strategic navy missiles, and Bombers; China's Nuclear C3, Mobile ICBMs, and SSBNs; and North Korea's Nuclear C3 and potential ICBM (TD-2) Threat.
Accepted Risks: Strategic Targets where SIGINT is not a primary intelligence source in providing warning: Russia's Silo-based ICBMs; China's Silo-based ICBMs.
(S//SI) G. MISSION: Regional Conflict and Crisis/Flashpoints to War: Monitoring Regional Tensions that Could Escalate to Conflict/Crisis.
Focus Areas:Regional flashpoints that could pose a significant threat to U.S. strategic interests: Arab,Iran-Israel conflict, Korean Peninsula, China-Taiwan, India-Pakistan, Venezuela (impact on surrounding region), and Russia/Georgia.
Accepted Risks:Regional flashpoints in: Ethiopia-Eritrea andAfricaGreat Lakes Region
(S//REL USA. AUS. CAN, GBR. NZL)H. MISSION: Information Operations: Mastering Cyberspace and Preventing an Attack on U.S. Critical Information Systems.
a (S//SI) Enabling Computer Network Defense (CND): Provide cyber threat warning, detection, characterization, and mitigation services for U.S. and allied computer network operators: Named Intrusion Sets (Including, but not limited to Gadget Hiss. Seed Sphere/Byzantine Trace. Makers Mark. Byzantine Candor), New intrusions.
b. (S//REL USA, AUS, CAN. GBR, NZL) Enabling Computer Network Attack (CNA): Deliver intelligence, access, and dual-use capabilities in support of U.S. computer network attack objectives. c. (S//SI) Foreign Intelligence Serv ices' Cyber Threat Activities: Deliver intelligence on the capabilities.
vulnerabilities, plans and intentions o f foreign actors to conduct CNO against USG networks and those of interest to the USG. Identify what Foreign Intel Services know about USG capabilities, vulnerabilities, plans and intentions to conduct CNO: China, Russia, Iran, and al-Qa'ida
d (S//SI) Enabling Electronic Warfare (EW): Provide cognizance ofthe EM environment, signal detection/geolocation, and characterization through intelligence (ELINT. COMINT, Tech SIGINT) and other technical means to U.S. EW planners and operators: China. Russia, Iran, Iraq/Afghanistan (IED's) and North Korea.
e. (S//SI) Enabling Influence Operations: Support U.S. military deception (MILDEC) and psychological operations (PSYOP), and inter-agency Strategic Communication objectives to influence target behavior and activities: Terrorist groups. China. North Korea. Iran, and Venezuela.
a. Enabling CND: Isolated malicious activity that could pose a serious threat.
b. Enabling CNA.
c. FIS Cyber Threat: France, Israel, Cuba, India, and North Korea.
d. Enabling EW: (producers.'’prolifcrators): Sweden, Japan. Germany, Israel, and France, e Enabling Influence Operations: Pakistan and Russia.
(S//SI)I. MISSION: Military Modernization: Providing Early Detection ofCritical Developments in Foreign Military Programs.
b. Activities of state and non-state actors (gray arms dealers) in supplying advanced conventional weapons.
c.Threats posed by foreign space and counter-space systems: China and RussiaAccepted Risks:
a Weapons and force developments in: Saudi Arabia, and India
b Threats posed by foreign space and counter-space systems India and France
(S//SI)J. MISSION: Emerging Strategic Technologies: Preventing Technological Surprise.
Focus Areas:Critical technologies that could provide a strategic military, economic,or politicaladvantage: high energy lasers, low energy lasers, advances in computing and information technology, directed energy weapons,stealth and counter-stealth,electronic warfare technologies, space and remote sensing, electro-optics, nanotechnologies, energetic materials The emerging strategic technology threat is expected to come mainly from Russia. China. India, Japan. Germany, France. Korea. Israel, Singapore, and Sweden.
Accepted Risks:Technological advances and/or basic S&T development on a global basis elsewhere.
(S//S1)K. MISSION: Foreign Policy ((includes Intention of Nations and Multinational Orgs)): Ensuring Diplomatic Advantage for the US.
Focus Areas:Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could significantly impact U.S. national security interests: China, Russia, France, Germany, Japan. Iran. Israel. Saudi Arabia, North Korea, Afghanistan. Iraq. UN, Venezuela, Syria. Turkey, Mexico, South Korea, India and Pakistan.
Accepted Risks:Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could impact U.S. foreign policy or security interests: Taiwran.
(S//SI)l~MISSION: Energy Security: Ensuring a Steady and Reliable Energy Supply for the US. Focus Areas:Threats to the production and global distribution/transportation of energy supplies of: Iraq, Saudi Arabia, V enezuela, Iran, Russia and Nigeria.Accepted Risks:Global impact o f the state o f energy industries in: Mexico and China.
(S//SI)M. MISSION: Foreign Intelligence, Counterintelligence; Denial&Deception Activities: Countering Foreign Intelligence Threats.
Focus Areas:Espionage/intelligence collection operations and manipulation/influence operations conducted by foreign intelligence services directed against U.S. government, military', science & technology and Intelligence Community from: China, Russia, Cuba, Israel, Iran, Pakistan, North Korea. France. Venezuela, and South Korea
Accepted Risks:Espionage'intelligence collection operations against U.S. government, military, science & technology and Intelligence Community from: Taiwan and Saudi Arabia
(S//S1)N. MISSION: Narcotics and Transnational Criminal Syndicates and Networks: Mitigating the impact on U.S. national interests from drug trafficking organizations (DTOs) and transnational criminal syndicates and networks (TCSNs).
a. DTOs and associated enabling activities in Afghanistan, Mexico and Colombia that threaten U.S.interests.
b.TCSNs based in (or originating in) Russia that threaten U.S. or allied interests.
c. Money laundering that benefits TCSNs within, into, and out of Colombia and Mexico.
d. Criminal facilitators acting as a nexus between crime/narcotics and terrorism.
e. State-sponsored money laundering by Iran and North Korea. Accepted Risks:
a Drug production/trafficking within the Golden Triangle, China, and North Korea b. TCSNs operating in Central Asia, former Eastern Europe, and Asia,
c Criminal associated money laundering in Afghanistan, and Iraq.
State-sponsored money laundering by Syria.
(S//S1)O. MISSION: Economic Stability/Influence: Ensuring U.S. Economic Advantage and Policy Strategies.
Focus Areas:Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: China, Japan, Iraq, and Brazil.
Accepted Risks:Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: Turkey and India.
(S//S1)P. Mission: Global Signals Cognizance: The core communications infrastructure and global network information needed to achieve and maintain baseline knowledge.Capture knowledge of location, characterization, use, and status of military and civil communications infrastructure, including command, control, communications and computer networks: intelligence, surveillance, reconnaissance and targeting systems; and associated structures incidental to pursuing Strategic Mission List priorities. Focus of mission is creating knowledge databases that enable SIGINT efforts against future unanticipated threats and allow continuity on economy of force targets not currently included on the Strategic Mission List.Focus Areas:
Global Environment knowledge Signals knowledge.
Target knowledge. Accepted Risks:Degree of maturity may greatly vary by target
(U) II. Strategic Mission List - Enduring Targets
(S//S1)A. MISSION: China: Enabling U.S. policy and avoiding strategic surprise. Focus Areas:Provide U.S. decision makers with a holistic SIGINT perspective oftrends and developments in China, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U.S. interests. Such analysis must consider China’s strategic foreign and economic policy trends that impact U S. interests or degrade U.S. influence, the pace, scope, doctrine, and economic sustainability of China’s military modernization, the proliferation of PRC weapons and technology; the prospects for regional conflict or strategic nuclear attack; domestic economic transformation and its consequences for economic, political, and social stability'; subversive threats to U.S. institutions through hostile intelligence and information operations, and the interdependencies among these developmentsAccepted Risks:Certain domestic problem sets, such as demographic issues; lower-level political institutional growth; civil society' issues such as crime and human rights; environmental problems and planning; and agricultural production and food security'. Also, issues that transcend national boundaries, such as Chinese involvement in international organized crime; energy demand, production, and acquisition; and infectious disease and health.
(S//S1)B. MISSION: North Korea: Enabling the US to counteract North Korea’s development/use/proliferation of WMD, deter its aggression, and shape its behavior while maintaining U.S. readiness for collapse/war. Focus Areas:Provide U.S. decision-makers with a holistic SIGINT perspective of trends and developments in North Korea, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S interests and provide warning o f strategic threat. Such analysis must consider the stability of the North Korean regime and how it employs domestic and foreign policies to maintain its grip on power; the relationship between regime stability/behavior and its access to income from illicit activities and weapons proliferation; how Chinese and South Korean “carrots and sticks” enable or constrain North Korean behavior; the impact of the decaying North Korean economy on military' readiness; and how the interplay between U S policy initiatives toward North Korea and all of the above elements affect North Korea’s strategic calculus, the material disposition of its nuclear weapons, and the status of its militaryAccepted Risks:For domestic issues, risks include non-defense oriented industrial production, demographic issues, and environmental problems. Regarding issues that transcend borders, risks include non-counterintelligence associated ties between North Korean state- sponsored illicit activities and international organized crime institutions and individuals; North Korean agent activity in South Korea and Japan; non-state sponsored corruption and illicit behavior; and North Korean economic refugee flows into China
(S//S1) C.MISSION: Iraq: Enabling Coalition efforts to assist Iraq in establishing a secure, unified, democratic, and sovereign state. Focus Areas:Provide U S decision makers with a holistic SIGINT perspective of trends and developments, assessing Iraq’s progress toward establishing a viable, stable government; securing public order, suppressing insurgent opposition, ensuring reliable access to basic services and commodities; safeguarding strategic resources; and restoring a more sound economic footing. Provide intelligence on relevant factors, forces, leaders, and regional actors to facilitate U.S. Governmentpolicy or actions in support of the Iraqi process and to seize the strategic communications initiative.
(S//S1)D. MISSION: Iran: Enabling policymakers in preventing Iran from achieving its regional dominance objectives and pursuing policies that impact U.S. global interests. Focus Areas:Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U.S. interests. Assess Iran's foreign policy trends and leadership intentions that impact U.S. interests or degrade U.S. influence. Provide warning of Iran's capability to produce a nuclear weapon or its plans to use terrorist surrogates to attack Israel or U.S. forces and interests Assess the regime's progress in initiatives that enhance its pursuit of regional power objectives in the political, economic, energy, and religious or ideological arenas
Provide indicators of regime stability and/or susceptibility to democratic reform initiativesAccepted Risks:Efforts to ascertain the scope of Iran's narcotics'organized crime elements and economic stability/influence.
(S//S1)E. MISSION: Russia: Assuring diplomatic and strategic advantage and avoiding critical surprise. Focus Areas:Provide U.S. policy and decision makers with a holistic SIGINT perspective of developments and trends in Russia, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S. interests Such analysis must consider Russia's strategic foreign policy and economic intentions and actions as they pertain to U S interests and influence in the region and globally; the strength of Russia's economy and its impact on Russian power projection capability and strategic positioning; Russia's efforts to regain military strength and stimulate economic growth through the development and sale ofadvanced technology and weaponry', and the role ofWMD, organized crime and counterintelligence in enabling Russian strategic initiatives.Accepted Risks:Certain domestic issues such as demographics, regional politics, development of civil society in the country, and monitoring of low-level military' training activities. Also, issues that transcend national boundaries such as Russia’s plans, intentions and capabilities regarding influence on the former Soviet space
(S//S1)F. MISSION: Venezuela: Enabling policymakers in preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests. Focus Areas:Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U S interests Assess Venezuela's foreign policy trends and leadership intentions that impact U S
interests or degrade U S. influence Assess Chavez’ progress in his initiatives to pursue regional power objectives in the political, economic, energy, and ideological arenas. Provide indicators of regime stability, particularly in the energy sector. Assess the depth and breadth of Venezuela's relations with countries of strategic concern to the United States, particularly Iran, Cuba, China, and Russia.Accepted R i s k s :E f f o r t s t o a s c e r t a i n t h e s c o p e o f V e n e z u e l a ’s n a r c o t i c s / o r g a n i z e d c r i m e e l e m e n t s a n d e c o n o m i c stability/influence.
Nice to have a record of all this so it's easier to find later. I might write some more stories about lesser known NSSE features that apply to this impending nightmare if I can find the time. For now...
Quick notes: Lesser-known agencies such as the National Geospatial Intelligence Agency and US Northern Command also get very busy in the domestic battlespace indeed. NSSEs are part of their annual activity cycle of exercises and practice operations.
Having declared the RNC a National Security Special Event (NSSE), one that derived its “authorization” to target activists and journalists from the top secret 2006 National Security Presidential Directive-46/Homeland Security Presidential Directive-15 (NSPD-46/HSPD-15), local, state and federal law enforcement entities, the U.S. military, intelligence agencies such as the National Geospatial-Intelligence Agency (NGA) and corporate partners in the telecommunications industry and elsewhere, preemptively disrupted legal political dissent by a score of protest groups.
An interesting call for comments here if anyone wants to pipe up about counterintelligence activities including whatever weird stuff targets Americans. Via Cryptome.org: PCLOB RFC on Spy Activities Under EO 12333
[Federal Register Volume 80, Number 55 (Monday, March 23, 2015)]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2015-06537]
SUMMARY: As announced at the Privacy and Civil Liberties Oversight
Board's (PCLOB) public meeting on July 23, 2014, the PCLOB is examining
counterterrorism activities conducted under the Executive Order
pertaining to the United States Intelligence Activities and their
implications for privacy and civil liberties. As such, the PCLOB seeks
public input to inform the Board's examination of activities conducted
under the Executive Order.
DATES: Written comments may be submitted at any time prior to the
closing of the comment period at 11:59 p.m. Eastern Standard Time (EST)
on June 16, 2015.
ADDRESSES: You may submit comments with the notice number PCLOB-2015-01
by the following methods:
Regulations.gov: http://www.regulations.gov. Submit
comments via the Federal eRulemaking portal by searching for ``Notice
PCLOB-2015-01''. Select the link ``Comment Now'' that corresponds with
``Notice PCLOB-2015-01''. Follow the instructions provided at the
``Comment Now'' screen. Please include your name, company name (if
any), and ``Notice PCLOB-2015-01'' on your attached document.
Mail: General Services Administration, Regulatory
Secretariat Division (MVCB), ATTN: Ms. Hada Flowers, 1800 F Street
N.W., 2nd floor, Washington, DC 20405.
Instructions: Please submit comments only and cite
``Notice PCLOB-2015-01'' in all correspondence related to this case.
All comments received will be posted without change to http://www.regulations.gov, including any personal and/or business
confidential information provided.
FOR FURTHER INFORMATION CONTACT: Sharon Bradford Franklin, Executive
SUPPLEMENTARY INFORMATION: The PCLOB seeks public input to inform the
Board's examination of activities conducted under Executive Order
(E.O.) 12333--United States Intelligence Activities. Although the Board
recognizes that much information about activities under E.O. 12333 is
classified and/or not publicly available, the Board seeks comments
regarding any concerns about counterterrorism activities conducted
under E.O. 12333 based on the information that is currently
unclassified and publicly available, as well as suggestions for
questions the PCLOB should ask as part of its inquiry.
Dated: March 16, 2015.
Lynn Parker Dupree,
Acting General Counsel, Privacy and Civil Liberties Oversight Board.
[FR Doc. 2015-06537 Filed 3-20-15; 8:45 am]
BILLING CODE 6820-B3-P
Here's another new piece of hard evidence showing how billionaire sex abusers get their own special treatment in America. One of the most dire problems facing the United States is the double-standard justice system.
If you're a greasy billionaire like Jeffrey Epstein, federal prosecutors (who ultimately report to your chums) will eventually bend over backwards to let you get away with running an international sex abuse ring, and even protect your co-conspirators from prosecution.
Epstein pled guilty to limited charges and was forced to spend at least a few hours a day in a Florida jail for several months (he could wander during the day), and then on "house arrest" to cruise around to his various international pads. The deal specifically protects his unnamed co-conspirators from prosecution.
For apparently the first time on the open interwebs, here is the full text of Epstein's non-prosecution agreement, republished on HongPong.com with permission of alt journalist Wayne Madsen at WayneMadsenReport.com:
An additional issue that Wayne cites in his paywalled article is that the timeline here casts shadows on both the Clinton and the Bush families, since both noxious dynasties had roles overseeing the federal prosecutors and accepting this chummy deal published above at different points in the timeline.
Freaky financier Jeffrey Epstein wants to keep negotiations for his shady nonprosecution deal with the feds under wraps.
In papers filed in Florida federal court, Epstein, 61, has asked for a protective order keeping all correspondence about his controversial deal with the feds under seal.
The feds agreed not to pursue charges against Epstein and four alleged co-conspirators in dozens of cases involving under-aged girls if he pleaded guilty to a single state felony case back in 2007 — but the deal was kept hidden from the victims at Epstein’s request, court papers say.
The billionaire perv pal of Prince Andrew pleaded guilty to soliciting sex from a minor in mid-2008. Four of Epstein’s alleged victims are challenging the nonprosecution agreement in court.
In a ruling Thursday, Judge Kenneth Marra said, “Public policy favors judicial records being open to the public,” and that Epstein has to submit additional filings “setting forth the extraordinary circumstances or particularized needs necessitating a seal in this case.” Dareh Gregorian
#OpDeathEaters & a history of political blackmail: I would like to call attention to the project spearheaded by Anonymous type cats called #OpDeathEaters (a reference to Voldemort's buddies in Harry Potter), which is a pretty quick-moving research project to expose multiple levels and nodes of what they describe as the global paedosadist network.
They are trying to get away from the term 'pedophile' which is actually preferred by child sex abusers because 'phile' means love, when in fact it's really child abuse. It started around November 2014.
An important dimension stressed by some of the articles below is that the power and depth of the pedosadist and child abuse networks has grown so deep that it has overrun the ability of honest elements of law enforcement to deal with, so to some extent Internet activists are trying to expose the networks and render difficult investigations into open-and-shut cases if possible, with the hopes of obtaining justice for victims and their families as well as preventing future abuse.
Intelligence Rabbit Hole Begins: Additionally Epstein's close confidante for many years, Ghislaine Maxwell (L), has also been tagged as a major player in the abuse ring. Adding an intelligence twist to the matter, Ghislaine's late father Robert Maxwell ( R ) is pretty widely known to have supported the Israeli Mossad secret intelligence service. With Epstein's island home apparently stuffed with hidden cameras, this suggests he was generating sexual blackmail material which could certainly prove handy to manipulate political figures.
This leads to a bunch of speculation such as JEFFREY EPSTEIN, MOSSAD AND 9 11 etc etc, with Florida airfields that were used by Mohammed Atta perhaps intersecting with this sordid tale prior to 2001. [I am not claiming that I support such a line of inquiry as the evidence isn't really there yet, but there are some overlapping data points]
That particular rabbit hole would take a long time to sort out, but shady rich people, aviation and weird covert ops certainly are a Florida tradition. The only thing missing is yet another Gulfstream owned by CIA shell company packed with cocaine or heroin.
In principle, American Internet Journalism just died horribly.
Fuck it dude, let's go bowling (and keep posting without prior restraint till they drag us all away).
Unfortunately, a confused federal judge in Texas decided to disregard the Supreme Court's round rejection of prior restraint and enhanced Barrett Brown's sentence because copying and pasting a link to a zip file — a file whose contents he only had a loose notion of at the time, and was posted in the context of corporate research — is now apparently a forbidden form of speech.
We are all targets now. If we are to take the DOJ at their word, internet journalism has more or less been made impossible. Responsibility got shifted from publishers (or 'leakers') to observers, researchers and aggregators. Will corporate weasel lawyers forbid high level journalists from linking to things? The chilling effects are open-ended and basically endless, as well as impossible to ascertain without skimming the HTML source code of every page you link to and every autoloading script attached therein.
Even after reviewing the HTML, it will still become more chilling if the proposed White House CFAA revision goes in because of some weird notion about trafficking that they were able to get to stick at Barrett's sentencing.
So this speech would effectively be nuked, for example:
...could make either retweeting or clicking on the above (fictional) link illegal. The new laws make it a felony to intentionally access unauthorized information even if it's been posted to a public website. The new laws make it a felony to traffic in information like passwords, where "trafficking" includes posting a link.
Via the link above ErrataRob Graham explains that security research will be rendered impossible, thereby making it a felony to correctly develop software with any defense:
Obama proposes upgrading hacking to a “racketeering” offense, means you can be guilty of being a hacker by simply acting like a hacker (without otherwise committing a specific crime). Hanging out in an IRC chat room giving advice to people now makes you a member of a “criminal enterprise,” allowing the FBI to sweep in and confiscate all your assets without charging you with a crime.
On the upside, after the child porn argument fell apart, the government had to claim that information is the same kind of thing as drugs in order to cram the situation into a statutory conspiracy. So well done there, Barrett, you forced them to make speech into drugs. Drugs = Speech. The Supreme Court previously said that Speech = Money, so therefore Drugs = Money. Party on, robed ones.
The ruling, in Texas, brings to a close an unusual saga that had the feds initially charging Brown with 12 counts of aggravated identity theft and trafficking in stolen data for simply posting a link in a chat room. That link pointed to a file containing data stolen by members of the hacktivist group Anonymous from the intelligence firm Stratfor, or Strategic Forecasting. The data included company emails as well as credit card numbers belonging to subscribers of Stratfor’s service. The charges against Brown caused a stir when they were first revealed, because Brown hadn’t stolen the data himself, but had simply copied the hyperlink from one public chatroom and posted it to another.
I kept thinking of Snowden journalists and WikiLeaks today. The USG is coming for you next.#barrettbrown
Oh well: Living in America will literally drive you insane. Indeed it is hard to attempt to contort one's mind to whatever the government's reasoning is in Barrett's case. We live under a ruthless system with little regard for logic and nothing but fear and loathing for hyperlinks. Federal prosecutors can blatantly lie in court and face no punishment - indeed they earn merit instead.
Blah. Keep plugging on lolcats. As the radicals know it's a good idea to live as if you are already free; the "prefigurative" application of traditional (and previously protected) legal principles of speech might eventually be respected in America again, but only if masses of writers don't flee from these terrible people after losing this ugly battle on terrible grounds.
There is plenty more that could be said but I will crosspost Barrett's daring allocution statement. I would bet it got him a couple more months from that judge but at least it's honest, and certainly the appropriate spot to bring up prosecutorial misconduct.
Good afternoon, Your Honor.
The allocution I give today is going to be a bit different from the sort that usually concludes a sentencing hearing, because this is an unusual case touching upon unusual issues. It is also a very public case, not only in the sense that it has been followed closely by the public, but also in the sense that it has implications for the public, and even in the sense that the public has played a major role, because, of course, the great majority of the funds for my legal defense was donated by the public. And so now I have three duties that I must carry out. I must express my regret, but I must also express my gratitude. And I also have to take this opportunity to ensure that the public understands what has been at stake in this case, and why it has proceeded in the way that it has. Because, of course, the public didn’t simply pay for my defense through its donations, they also paid for my prosecution through its tax dollars. And the public has a right to know what it is paying for. And Your Honor has a need to know what he is ruling on.
First I will speak of regret. Like nearly all federal defendants, I hope to convince Your Honor that I sincerely regret some of the things that I have done. I don’t think anyone doubts that I regret quite a bit about my life including some of the things that brought me here today. Your Honor has the Acceptance of Responsibility document that my counsel submitted to you. Every word of it was sincere. The videos were idiotic, and although I made them in a manic state brought on by sudden withdrawal from Paxil and Suboxone, and while distraught over the threats to prosecute my mother, that’s still me in those YouTube clips talking nonsense about how the FBI would never take me alive. Likewise, I didn’t have the right to hide my files from the FBI during a lawful investigation, and I would’ve had a better chance of protecting my contacts in foreign countries if I had pursued the matter in the courts after the raid, rather than stupidly trying to hide those laptops in the kitchen cabinet as my mother and I did that morning. And with regard to the accessory after the fact charge relating to my efforts to redact sensitive emails after the Stratfor hack, I’ve explained to Your Honor that I do not want to be a hypocrite. If I criticize the government for breaking the law but then break the law myself in an effort to reveal their wrongdoing, I should expect to be punished just as I’ve called for the criminals at government-linked firms, like HBGary and Palantir, to be punished. When we start fighting crime by any means necessary, we become guilty of the same hypocrisy as law enforcement agencies throughout history that break the rules to get the villains, and so become villains themselves.
I’m going to say a few more words about my regrets in a moment, but now I’m going to get to the unusual part of the allocution. I’m going to make some criticisms of the manner in which the government has pursued this case. Normally this sort of thing is left to one’s lawyers rather than the defendant, because to do otherwise runs the risk of making the defendant seem combative rather than contrite. But I think Your Honor can walk and chew bubble gum at the same time. I think Your Honor understands that one can regret the unjust things one has done, while also being concerned about the unjust things that have been done to him. And based on certain statements that Your Honor has made, as well as one particular ruling, I have cause to believe that Your Honor will understand and perhaps even sympathize with the unusual responsibility I have which makes it necessary that I point out some things very briefly.
I do so with respect to Your Honor. I also do it for selfish reasons, because I want to make absolutely certain that Your Honor is made aware that the picture the government has presented to you is a false one. But it is also my duty to make this clear as this case does not just affect me. Even aside from the several First Amendment issues that have already been widely discussed as a result of this case, there is also the matter of the dozens of people around the world who have contributed to my distributed think tank, Project PM, by writing for our public website, echelon2.org. Incredibly, the government has declared these contributors—some of them journalists—to be criminals and participants in a criminal conspiracy. As such, the government sought from this court a subpoena by which to obtain the identities of all of our contributors. Your Honor denied that motion and I am very grateful to Your Honor for having done so. Unfortunately the government thereafter went around Your Honor and sought to obtain these records by other means. So now the dozens of people who have given their time and expertise to what has been hailed by journalists and advocacy groups as a crucial journalistic enterprise are now at risk of being indicted under the same sort of spurious charges that I was facing not long ago, when the government exposed me to decades of prison time for copying and pasting a link to a publicly available file that other journalists were also linking to without being prosecuted. The fact that the government has still asked you to punish me for that link is proof, if any more were needed, that those of us who advocate against secrecy are to be pursued without regard for the rule of law, or even common decency.
Your Honor, I understand that this is my sentencing hearing and not an inquiry into the government’s conduct. This is not the place to go into the dozens of demonstrable errors and contradictions to be found in the government’s documentation and the testimony by the government. But it would be hypocritical of me to protest the government’s conduct and not provide Your Honor with an example. I will do so very briefly. At the September 13th bond hearing, held in Judge Stickney’s court the day after my arrest, Special Agent Allen Lynn took the stand and claimed under oath that in reviewing my laptops he had found discussions in which I admit having engaged in, quote, “SWATting”, unquote, which he referred to as, quote, “violent activity”, unquote. Your Honor may not be familiar with the term SWATting; as Mr. Lynn described it at the hearing it is, quote, “where they try to place a false 911 call to the residence of an individual in order to endanger that individual.” He went on at elaborate length about this, presenting it as a key reason why I should not receive bond. Your Honor will have noted that this has never come up again. This is because Mr. Lynn’s claims were entirely untrue. But that did not stop him from making that claim, any more than it stopped him from claiming that I have lived in the Middle East, a region I have never actually had the pleasure of visiting.
Your Honor, this is just one example from a single hearing. But if Your Honor can extrapolate from that, Your Honor can probably get a sense of how much value can be placed on the rest of the government’s testimony in this case. Likewise, Your Honor can probably understand the concerns I have about what my contributors might be subjected to by the government if this sort of behavior proves effective today. Naturally I hope Your Honor will keep this in mind, and I hope that other judges in this district will as well, because, again, there remains great concern that my associates will be the next to be indicted.
I’ve tried to protect my contributors, Your Honor, and I’ve also tried to protect the public’s right to link to source materials without being subject to misuse of the statutes. Last year, when the government offered me a plea bargain whereby I would plead to just one of the eleven fraud charges related to the linking, and told me it was final, I turned it down. To have accepted that plea, with a two-year sentence, would have been convenient—Your Honor will note that I actually did eventually plead to an accessory charge carrying potentially more prison time—but it would have been wrong. Even aside from the obvious fact that I did not commit fraud, and thus couldn’t sign to any such thing, to do so would have also constituted a dangerous precedent, and it would have endangered my colleagues, each of whom could now have been depicted as a former associate of a convicted fraudster. And it would have given the government, and particularly the FBI, one more tool by which to persecute journalists and activists whose views they find to be dangerous or undesirable.
Journalists are especially vulnerable right now, Your Honor, and they become more so when the FBI feels comfortable making false claims about me. And in response to our motion to dismiss the charges of obstruction of justice based on the hiding of my laptops, the government claimed that those laptops contained evidence of a plot I orchestrated to attack the Kingdom of Bahrain on the orders of Amber Lyon. Your Honor, Amber Lyon is a journalist and former CNN reporter, who I do know and respect, but I can assure Your Honor that I am not in the habit of attacking Gulf state monarchies on her behalf. But I think it’s unjust of them to use this court to throw out that sort of claim about Miss Lyon in a public filing as they did if they’re not prepared to back it up. And they’re not prepared to back it up. But that won’t stop the Kingdom of Bahrain from repeating this groundless assertion and perhaps even using it to keep Miss Lyon out of the country. Because she has indeed reported on the Bahraini monarchy’s violent crackdowns on pro-democracy protests in that country, and she has done so from that country. And if she ever returns to that country to continue that important work, she’ll now be subject to arrest on the grounds that the United States Department of Justice itself has explicitly accused her of orchestrating an attack on that country’s government.
Your Honor, this is extraordinary. Miss Lyon isn’t the only journalist that’s been made legally less secure by this prosecution. Every journalist in the United States is put at risk by the novel, and sometimes even radical, claims that the government has introduced in the course of the sentencing process. The government asserts that I am not a journalist and thus unable to claim the First Amendment protections guaranteed to those engaged in information-gathering activities. Your Honor, I’ve been employed as a journalist for much of my adult life, I’ve written for dozens of magazines and newspapers, and I’m the author of two published and critically-acclaimed books of expository non-fiction. Your Honor has received letters from editors who have published my journalistic work, as well as from award-winning journalists such as Glenn Greenwald, who note that they have used that work in their own articles. If I am not a journalist, then there are many, many people out there who are also not journalists, without being aware of it, and who are thus as much at risk as I am.
Your Honor, it would be one thing if the government were putting forth some sort of standard by which journalists could be defined. They have not put forth such a standard. Their assertion rests on the fact that despite having referred to myself as a journalist hundreds of times, I at one point rejected that term, much in the same way that someone running for office might reject the term “politician.” Now, if the government is introducing a new standard whereby anyone who once denies being a particular thing is no longer that thing in any legal sense, that would be at least a firm and knowable criteria. But that’s not what the government is doing in this case. Consider, for instance, that I have denied being a spokesperson for Anonymous hundreds of times, both in public and private, ever since the press began calling me that in the beginning of 2011. So on a couple of occasions when I contacted executives of contracting firms like Booz Allen Hamilton in the wake of revelations that they’d been spying on my associates and I, for reasons that we were naturally rather anxious to determine, I did indeed pretend to be such an actual official spokesman for Anonymous, because I wanted to encourage these people to talk to me. Which they did.
Of course, I have explained this many, many times, and the government itself knows this, even if they’ve since claimed otherwise. In the September 13th criminal complaint filed against me, the FBI itself acknowledges that I do not claim any official role within Anonymous. Likewise, in last month's hearing, the prosecutor accidentally slipped and referred to me as a journalist, even after having previously found it necessary to deny me that title. But, there you have it. Deny being a spokesperson for Anonymous hundreds of times, and you’re still a spokesperson for Anonymous. Deny being a journalist once or twice, and you’re not a journalist. What conclusion can one draw from this sort of reasoning other than that you are whatever the FBI finds it convenient for you to be at any given moment. This is not the rule of law, Your Honor, it is the rule of Law Enforcement, and it is very dangerous.
Your Honor, I am asking you to give me a time-served sentence of thirty months today because to do otherwise will have the effect of rewarding this sort of reckless conduct on the part of the government. I am also asking for that particular sentence because, as my lawyer Marlo Cadeddu, an acknowledged expert on the guidelines, has pointed out, that’s what the actual facts of the case would seem to warrant. And the public, to the extent that it has made its voice heard through letters and donations and even op-eds, also believes that the circumstances of this case warrant that I be released today. I would even argue that the government itself believes that the facts warrant my release today, because look at all the lies they decided they would have to tell to keep me in prison.
I thank you for your indulgence, Your Honor, and I want to conclude by thanking everyone who supported me over the last few years. I need to single out one person in particular, Kevin Gallagher, who contributed to my Project PM group, who stepped up immediately after my arrest to build up a citizens' initiative by which to raise money for my defense, and to spread the word about what was at stake in this case. For the two and a half years of my incarceration, Kevin has literally spent the bulk of his free time in working to give me my life back. He is one of the extraordinary people who have given of themselves to make possible this great and beautiful movement of ours. A movement to protect activists and journalists from secretive and extra-legal retaliation by powerful corporate actors with ties to the state. Your Honor, Kevin Gallagher is not a relative of mine, or a childhood friend. This is only the third time I’ve been in the same room with him. Nonetheless, he has dedicated two years of his life to ensure that I had the best possible lawyers on this case, and to ensure that the press understood what was at stake here. Your Honor, he set up something on Amazon.com whereby I could ask for books on a particular subject and supporters could buy them and have them sent to me. And he spoke to my mother several times a week. During that early period when I was facing over a hundred years worth of charges, and it wasn’t clear whether or not I would be coming home, he would reassure her.
A few weeks ago, he got a job at Freedom of The Press Foundation, one of the world’s most justifiably respected advocacy organizations. And, according to the government, he is also a member of a criminal organization, because, like dozens of journalists and activists across the world, he has been a contributor to Project PM, and the government has declared Project PM to be a criminal enterprise. I think that the government is wrong about Kevin, Your Honor, but that is not why I’ve brought him up. And although I am very glad for the opportunity to express my gratitude to him in a public setting, there are some gifts for which conventional gratitude is an insufficient payment. One can only respond to such gifts by working to become the sort of person that actually deserves to receive them. A thank you will not suffice, and so I am not bringing him up here merely to thank him. Instead, I am using him in my defense. Your Honor, this very noble person, this truly exemplary citizen of the republic who takes his citizenship seriously rather than taking it for granted, knows pretty much everything there is to know about me—my life, my past, my work, the things I’ve done and the things I’ve left undone, to the things I should not have done to begin with—and he has given himself over to the cause of freeing me today. He is the exact sort of person I tried to recruit for the crucial work we do at Project PM. I am so proud to have someone like him doing so much for me.
Your Honor, the last thing I will say in my own defense is that so many people like Kevin Gallagher have worked so hard on my behalf. And having now said all those things that I felt the need to say, I happily accept Your Honor’s decision.
A little over 51 years ago Albert Thomas, chair of congressional subcommittee for defense appropriations, winked at Lyndon Baines Johnson aboard Air Force One immediately after Pres. Kennedy was murdered in Dallas. [Thomas' underling Jack Valenti went on to run MPAA for many years.] Thomas went on to hand out billions for the Vietnam War.
51 years later the American public is still as infantilized by the national security state as ever. Tons of documents around the assassination are still classified for decades, setting the pattern for managing perceptions of 'deep state events' clearly intersecting with intelligence players like Iran-Contra & 9/11.
The surest sign that Watergate majordomo Howard Hunt's deathbed confession recording is accurate is how thoroughly mainstream media ignored it, while instead promoting discredited plagiarist shills like Gerald Posner. Hunt said that LBJ was at the "head of a long line of people waiting for some change in the executive branch" and had "an almost maniacal urge to become president," with Rolling Stone, Coast to Coast and the alt media among the very few to take this seriously.
Hunt said CIA's Cord Meyer led the task for LBJ, embittered because Cord's wife had been one of JFK's mistresses. He also ID'd David Atlee Phillips, "in Miami and elsewhere" referencing JM/WAVE CIA station, Watergate alumnus Frank Sturgis, "Operation 40" mercenary David Morales, all players within the nucleus related of intelligence operations diligently identified by researchers since 1963. "In short it was a very mobile experience" said the Watergate chieftain, "I was a benchwarmer on it."
Kennedy was no saint, but Dallas was a display intended to traumatize the American public into accepting that a brutal machine behind the scenes would now more openly, literally, call the shots, and as our country continues to spin along an ugly trajectory, achieving some kind of tangible political freedom from these forces of intelligence intrigue and social control has never been more necessary.
Nothing is ever really acknowledged in America until it gets the Hollywood treatment, wrapped by a screenplay and soundtrack into that big image-stream narrative America tells itself as it reproduces its existence every day. The difficult map of intelligence agencies and the war on drugs has mostly been skirted by Hollywood, but in an overdue turn of good fortune Gary Webb’s story finally gets pinned to the Big Board pretty well.
Journalist Gary Webb used the Internet to nearly bring the war on drugs to the brink of collapse by exposing intelligence connections to leading cocaine flows in the US during Iran-Contra. In the 1990s major media forces were faced with critical new voices undermining the credibility of America's post-EO12333 drug war system. Like many before and since, Webb got the corporate media banhammer, portrayed here in incisive and indicting detail (looking at you, Walter Pincus).
"For the better part of a decade, a San Francisco Bay Area drug ring sold tons of cocaine to the Crips and Bloods street gangs of Los Angeles and funneled millions in drug profits to an arm of the contra guerrillas of Nicaragua run by the Central Intelligence Agency, the San Jose Mercury News has found." Gary Webb circa 1996.
Leading the way with a star-studded cast in Focus Features’ Kill the Messenger, a decent set of films taking on Iran-Contra-related intelligence intrigue and the war on drugs is hitting the US this month, and a veritable wave of news stories exploring these old narratives are popping up nationwide!
I was very lucky to get into an advance screening & now trying to provide here more links for those both new and old to this sick twisted tale at the heart of the American Dream. Iran-Contra really fascinated me in 2007 & I got books, started putting videos together until l’Affair d’2008RNC pulled me away into more local concerns. "Iran-Contra Goggles” remain useful to decode the same basic corrupt systems we have today.
Kill the Messenger covers Webb’s tragic story, as he exposes the roles of CIA assets moving literally tons of cocaine into the US to create a covert money source for the Contras in Nicaragua. Freeway Ricky Ross, the key recipient of the cocaine, has a film coming out Oct 17th, “Freeway: Crack in the System” and Shadows of Liberty also features a Gary Webb-oriented segment, “Killing the Messenger".
Kill the Messenger encompasses Gary’s story, Dark Alliance, the first groundbreaking news story to really go viral over the Internet, providing readers around the world with primary source documents and more to explore. Animated gifs - a new technology at the time - showed cocaine pathways flowing into the US.
Iran-Contra aficionados and Gary’s family, who supported the film’s production, will feel a strong sense of vindication, although the latter third of the story quits expanding our view of this high-level drug underworld as the bottom of Gary’s life gradually falls out.
We get a sound foundation under the story, it seems they didn’t cut any especially bad corners that would undermine this critical shot at contextualizing Webb in American journalism.
This film doesn’t explain Southern Air Transport or Barry Seal, later extensions of similar work, or the similar sad fates of Danny Casolaro, Michael Ruppert and others.
The CIA leisure suits, aviator sunglasses and careful color palettes harken to these carefully styled 1970s paranoia thrillers, both directed by Alan J Pakula in the “Paranoia Trilogy”.
Andy Garcia as Norwin Meneses and Michael Kenneth Williams as Freeway Ricky Ross are excellent, while Oliver Platt as the rumpled, dubious editor, Michael Sheen as the bureaucrat, all of these are well-crafted roles if brief. West Wing's Richard Schiff as the Washington Post's coverup editor ringleader was just right.
Ray Liotta’s surprise covert ops "nighttime of the soul” scene is also pretty damn good.
This nice media wave is a good chance for everyone to learn more, and hear from the old journalists who also got the banhammer for daring to push the truth out there. Robert Parry has a new piece: The CIA/MSM Contra-Cocaine Cover-Up (Oct 3 2014).
“It’s like we say “Iran-Contra”. "Iran-Contra" activity continues to go on today. In some cases, it’s the very same names and faces. In other cases, it’s a newer, younger generation of names and faces. But the narcotics, weapons and fraud aspects still continue to this day.” - Al Martin p330
Freeway Ricky Ross is making his move in all this, somehow having survived everything so far. Last summer: Freeway Rick Is Dreaming - Los Angeles Magazine (May 2013) An odd story by Jesse Katz who had a unique long term relationship with him as a journalist.
Another film, Shadows of Liberty, (FB) released in 2012 & playing Midwest theaters lately, includes everything from a “Killing the Messenger” segment on Webb & Dark Alliance to a Iraq marketing section covering Iraq Intel war spoofing, Iraqi National Congress, Rendon Group psyops discussed by James Bamford. Both hit the New York Times pretty hard, as well they should, in propagandizing for Iraq & attacking Webb.
In a latter section Sibel Edmonds and Phil Giraldi look at covert agents among US nuclear secrets & Marc Grossman at the State Dept. Really a nicely rounded collection, even if I’m not a big fan of some of the film participants. Detailed notes here. New Zealand review here.
Supporting material: Panthers, Crips & Bloods:Bastards of the Party - Top Documentary Films (2005) a must see for the development of Los Angeles gang structure in the context of massive importation of drugs & sophisticated police & federal operations since the days of the Black Panthers.
Pissed off CIA honcho Duane Clarridge - “there’s never been a conspiracy in this country!” (great clip in two of these films)
EO12333: The Private Contractor angle: roughly speaking, once this executive order was created, devious operations could be wrapped in corporate fronts like “Southern Air Transport”, “Vortex”, “Evergreen International” and others even lesser known.
2.7 Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.
They also point to a gap in the public reaction to Ed Snowden’s revelations about those programs. Despite that fact that most of the NSA’s spying relies on Reagan’s directive, Executive Order 12333, the vast majority of reform efforts have concentrated on the Foreign Intelligence Surveillance Act (FISA) and other legislative fixes. “Congress’s reform efforts have not addressed the executive order,” notes Alex Abdo of the ACLU, ”and the bulk of the government’s disclosures in response to the Snowden revelations have conspicuously ignored the NSA’s extensive mandate under EO 12333.”
The documents assert that mandate baldly. A legal factsheet from the NSA, dated June 2013, states that the FISA, which requires judicial oversight over spying on Americans, “only regulates a subset of the NSA’s signals intelligence activities. NSA conducts the majority of its SIGINT activities solely pursuant to the authority provided by Executive Order 12333.”
Often referred to as “twelve triple three” or EO 12333, the executive order came into being in 1981 under Reagan. Much of the post-Snowden debate, particularly with respect to the bulk collection of Americans’ phone records, has focused on the interlocking legal authorities of Section 215 of the Patriot Act and the 2008 FISA Amendments Act. But, the ACLU notes, “because the executive branch issued and now implements the executive order all on its own, the programs operating under the order are subject to essentially no oversight from Congress or the courts.” The documents describe procedures for safeguarding the rights of Americans whose information might be “incidentally” collected under 12333, but those procedures are overseen by the director of national intelligence or the attorney general.
Who? Oliver Hardy? Andy Garcia’s great line in Kill the Messenger about how it was Ollie’s idea to run drugs & guns around is a nod to Oliver North’s wonderful note: The “Honduran DC-6 which is being used for runs out of New Orleans is probably being used for drug runs into U.S."
A personal favorite :]
The 1996 Los Angeles CIA Town Hall meeting on drug trafficking was a critical moment. I would identify this meeting as the closest point to total collapse of the war on drugs edifice since Nixon, and it’s worth noting Deutch resigned shortly thereafter. This meeting cost the director of the CIA his job - and two years later they had to concede so much of Gary’s work was 100% accurate.
Another regular day - Day 28 of Iran Contra hearings Part 1, July 14 1987: They get into the weird Continuity of Government stuff in the 3rd hour.
Semi-related: alt journalist Wayne Madsen on Franklin sex trafficking scandal which had Iran-contra financing connections. The “Conspiracy of Silence” is related but goes way, way beyond all this. Wayne also suspects a similar Iran-Contra-like complex role related to 9-11 and the Pinal Air Park intel aviation field in Arizona, I wouldn’t be surprised if that’s how it turns out. (The late author Philip Marshall seemed to be on this tack as well before his weird death in early 2013.)
MOAR BIBLIOGRAPHY: Dark Alliance is now available in paperback and you should buy it at your local bookseller.
The Politics of Heroin in Southeast Asia (1972) by Alfred McCoy is *critical* because it’s probably the first academic book that shows how heroin is used geopolitically by US covert forces to finance their allies through the power of chemical dependency combined with covert logistics and the monopoly granted by the force of the state. Everything subsequent follows this pattern. [PDF 1] [PDF 2]
A final note: Michael Kenneth Williams, who notably played gangsta-assassin Omar on the Wire, does a great job as Ricky Ross. He also plays an oddly related role in 2014’s “The Purge: Anarchy”, a pulpy dystopian fantasy about the government granting everyone the “right” to kill each other 12 hours a year. Williams’ character is the revolutionary who recognizes & resists how the elite surveil them and clink champagne glasses, as the lower classes kill each other mercilessly to maintain social stratification. I couldn’t think of a better parallel to the modern American war on drugs.
Keep riding with those Aviators, Gary.
RIP Truth Tellers.
Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]
Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.
Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.
The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.
SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.
U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.
"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."
At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.
Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.
The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.
Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.
Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.
Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.
A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.
The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.
While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]
So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?
Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.
Anyway let's have ourselves some fresh court documents:
VIA http://www.waynemadsenreport.com/articles/20130830_3? "Evidence of American War Crimes Likely Target in Syria".Somewhat speculative but a pretty likely scenario. I've been wondering when the Iraqi era chemical weapons angle will pop up. This whole damn thing is such a bad trip and I think most of America pretty much realizes that. See the other category tags on this post archives circa 2002-2010 eh? .... firing off quick posts here on the big impending quagmire.
YELLOWCAKE WAS A RED HERRING. The real deal was the Carlyle type US-made stuff distributed by American companies - and some stocks that were almost certainly transferred to Syria. Speculating but: Any airstrike on the caches would of course pollute the area and also obliterate the chain of custody evidence that indeed this was yet another Bush-originated obscenity...
FOR IMMEDIATE RELEASE
August 8, 2013
Frank Gregory Ford
Evidence of American War Crimes Likely Target in Syria
By Frank Gregory Ford, former U.S. Military Intelligence Agent
While Obama's Department of Justice seeks to shield the Bush Administration by declaring their war crimes “business as usual,” his Department of Defense prepares to eliminate hard evidence of those crimes by destroying Syria's stockpile of weapons of mass destruction. Those WMDs came from us.
I saw canisters, “bombs,” of VX/GF in storage in Iraq. They were tagged showing they were shipped there from Ft. Rucker, Alabama by the Carlyle Group, the giant blue-ribbon finance-and-weapons conglomerate, home to former-President George H.W. Bush and other prominent war profiteers.
The nerve agent VX is the deadliest chemical weapon ever made. It is useful only for the indiscriminate destruction of human and animal life. It has been outlawed internationally, most recently by the Chemical Weapons Convention of 1993, by the Biological and Toxic Weapons Convention of 1972 and the Geneva Protocol of 1925.
We supplied VX to Iraq's leader, Saddam Hussein, before we named him an enemy. He used it in his war against Iran and against civilian Iraqi Kurds. I learned from an Iraqi official that just before our 2003 invasion Saddam shipped great quantities of gold and nerve gas to Syria. I reported this “actionable intelligence” to my superiors, but no action followed.
The stockpile I saw was never shipped out of Iraq. It was hidden from weapons inspectors until I and others saw it in 2003, just days after we invaded. It was soon removed from its concealment by British specialists and destroyed.
It is virtually certain that this weapons cache is targeted in our run-up to an attack on Syria—as before, with Iraq—for using U.S.-made weapons. The attack is also virtually certain to eliminate evidence of complicity by the Bush presidents, father and son, who, through their positions as American presidents and as associates of the Carlyle Group and myriad other military contractors, provided them to the warring nations of the Middle East.
As with Iraq, Afghanistan and so many of America's recent military engagements, this looming rebuke to Bashar al-Assad for allegedly using internationally outlawed American-made weapons, will fall on a vastly smaller opponent. Syria has a population of fewer than 23 million highly vulnerable men, women and children in a country that would fit in Texas almost four times. The capital, Damascus, the home of the government and location of the WMD stockpile, is the oldest continuously occupied city in the world.
Date: Tue, 02 Jul 2013 12:20:37 +0100
From: Dan Meredith <meredithd[at]rfa.org>
Organization: Open Technology Fund
Subject: [cryptography] Open Solicitation for Concept Notes: Open Technology
We are excited to share that the Open Technology Fund (OTF) at Radio Free Asia's (RFA) ongoing solicitation of concept notes is open and receiving proposals. We seek to fund disruptive technology projects that advance global Internet freedom and human rights online. If you are interested in submitting a concept note for our consideration, the process begins by completing our short online form:
OTF utilizes public funds to support Internet freedom projects. We support projects that develop open and accessible technologies promoting human rights and open societies. We strive to advance inclusive and safe access to global communication networks.
Created in 2012, OTF is an RFA program supported by funds from the Broadcasting Board of Governors (BBG). The BBG’s mission is to inform, engage, and connect people around the world in support of freedom and democracy. RFA’s mission is to provide accurate and timely information to the people of Asia who lack adequate protections for freedom of expression, free speech, and a free press.
In a globally interconnected society, creating and protecting freedom of expression, free speech, and a free press requires cross-border technology tools that enable the exercise of human rights within repressive societies for the global population. OTF strives to incubate and support projects creating these tools around the world. More information on our program can be found at
Here is some more material on the Radio Free Asia / Broadcasting Board of Governors apparatus via alternative journalist Wayne Madsen, who himself is under a bit of pressure from nasty bloggers for reporting on EU NSA surveillance and other unorthodox stories….
An examination of the current 2013 budget for the U.S. government’s Broadcasting Board of Governors (BBG) that oversees the International Broadcasting Board (IBB) and which determines the slant taken by the U.S. government’s propaganda efforts on radio, television, and, increasingly on the Internet, illustrates the head-lock that George Soros and neo-conservative “soft power projection” interests have on the official state-sponsored information disseminated by the U.S. government to a global audience.
The new propaganda bias of such IBB-controlled outlets such as the Voice of America, Radio Free Asia, and Radio Free Europe should comes as no surprise, considering that former CNN chairman and chief executive officer Walter Isaacson laid down the gauntlet after he assumed the chairmanship of the Broadcasting Board of Governors in 2009 by calling for the United States to aggressively challenge what he termed anti-American “propaganda” emanating from such international broadcasters as RT (the former Russia Today), Iran’s Press TV, and China’s CCTV. Isaacson walks in lock-step with the goals of Soros and the Council on Foreign Relations as the head of the politically-connected Aspen Institute. Isaacson stepped down from his broadcasting chairmanship position in January 2012.
The priorities for U.S. propaganda include stepping up efforts to effect political change in what are termed the five remaining “Communist” countries in the world through Cold War-era dissemination of “news” and other content via the Voice of America (VOA), the Office of Cuba Broadcasting (OCB) , and “grantee” organizations RFE/RL (Radio Free Europe/Radio Liberty), Inc., and Radio Free Asia (RFA). Soros’s Open Society Institute holds a predominant role in the administration of the “grantee” broadcast arms, which were originally operated by the Central Intelligence Agency (CIA) before de facto control was passed to Soros after the collapse of communism in Europe. The targeted five remaining communist nations are China, Cuba, North Korea, Laos, and Vietnam.
The BBG claims that America’s propaganda efforts reach a global audience of 187 million people and that the 59 language broadcasts to over 100 nations costs less than a mere $5 million per year. The BBG budget request contains all the Soros code phrases in describing America’s “highest standards of journalistic independence, ethics, and objectivity” and support of “democracy, civil society, and transparent institutions around the world.”
Check in there for more infos. It's a nasty Soros pass thru fo sho! … Also check out LittleSis.org for more crowdsourced, cited info on these kinds of orgs and players..