Crawling Chaos

Occupy Boulder Flood Relief gets rolling as oil oozes around Colorado; Japanese typhoon could create complex Fukushima super-meltdown; Sunday LinkDump

boulder-climate.jpg

The good news is that people are organizing for flood relief in Colorado along the proven lines of previous efforts at Occupy Sandy. URLZ: #boulderflood relief :: Boulder Flood Relief - Get help & get involved

First meeting 28 mins video: Boulder Flood Relief - Orientation Meeting - YouTube

Donations on wepay at $2k currently: Boulder Flood Relief:

Boulder Flood Relief provides immediate assistance to those affected by the Boulder flood of September 13, 2013. We are currently providing physical labor such as cleanup help for those affected by the flood. More volunteers are joining by the hour and we will be able to fill more needs as new skill sets present themselves. If you have any need please link, call, or email here:

boulderfloodrelief.org

720-943-4482

BoulderFloodRelief@gmail.com

100% of donations from this page support these relief efforts. They go toward cleanup equipment, administrative costs, and other immediate needs. Funds may also go toward providing material goods and food for affected Boulder county residents.

We work in relationship with Four Mile Fire Relief, which is a local, relief-oriented 501(c)(3) non-profit. They provide financial oversight and make your donation tax deductible.

If you can donate food or material goods please contact YMCA Boulder, as we are not accepting physical donations at this time.

YMCA Boulder 303-442-2778

2850 Mapleton Avenue, Boulder CO

If you are in need of assistance please go to boulderfloodrelief.org and fill out an assistance form. We will contact you asap. Thank you, from your friends and neighbors at Boulder Flood Relief.

/////

Another long and productive day with Boulder Flood Relief. In under 72 hours we've:

- Built a volunteer database of over 500 individuals.

- Started work sites with over 30 volunteers on the ground helping homeowners.

- Sent canvassers to affected neighborhoods to assess needs.

- Built information systems that will allow the organization to scale and be transparent to itself (using a combination of open source and cloud based software).

- Began building a peer to peer marketplace of goods and services so folks can self-organize to relieve and recover.

Not bad for three days. If you're in Boulder we invite you to get involved in whatever way you can. Go to our website (www.boulderfloodrelief.org) and register as a volunteer and/or share your needs.

There is much work to be done, and we are the ones to do it.

#boulderflood #boulderfloodrelief

Facebizzle: Occupy Boulder Flood Relief. Small tumblr: Occupy Boulder Flood Relief. Twitter: #BoulderFlood Relief (BoulderRelief) on Twitter

Some app for help: SparkRelief.org | Community Driven Disaster Relief

spark-relief.png

Reddit help info index: 9/13/2013 - Colorado Flooding Resources : Colorado

Large and detailed Google Docs info on Boulder CO support resources: A snippet:

Logistics

Headquarters/Hub/Incident Command Post:

[location to be announced tomorrow]

[9/13 location: 1:30 pm @ Innisfree Coffee, 1203 13th St., Boulder, 80302]


Remote Supplies Location:

[to be determined]

Vital Numbers:

Cel.ly Loop: text @floodrelief to 23559

The Internet

Common Hashtags:

#BoulderFlood, #COwx, #WaldoFlood, #COflood #LongmontFlood #LyonsFlood, #Ftcollinsflood, #CCCF, #JeffCoFlood, #ColoradoFlood, #larimerflood

Related Searches:

#Boulder, Boulder flash flooding,


Google Community:

https://plus.google.com/communities/110401760903189735343 for sharing information documents inter-organizationaly


Twitter Accounts:

@ArvadaPolice

@BoulderCounty [Boulder Local Government]

@BoulderOEM [Boulder Office of Emergency Management]

@COEmergency

@femaregion8

@jeffcosheriffco [Emergency info for Jefferson County]

@LarimerSheriff

@NWSBoulder [National Weather Service, Boulder]

@OccupyRelief [part of @OccupySandy]

@Occuweather

@RedCrossDenver

@bowandarchery

Alerts and Closures

For Road Closures: @ColoradoDOT, BoulderOEM Road Closure Update

For Current Emergency Information/Emergency Status: http://boulderoem.org/emergency-status

For National Weather Service Alerts: http://www.crh.noaa.gov/bou/

For CU University Campus Alerts: http://alerts.colorado.edu/

For Greeley city updates: http://greeleygov.com/PIO/Lists/News%20Releases/DispForm.aspx?ID=1802&Source=http%3A%2F%2Fgreeleygov.com%2FPIO%2FMedia.aspx

General Links

National Weather Service Hydrograph:

http://water.weather.gov/ahps2/hydrograph.php?wfo=bou&gage=bocc2

http://streamstatsags.cr.usgs.gov/ThreatenedGages/ThreatenedGages_seq.html

Colorado Division of Water Resources -- Boulder Creek Gage Height West of Broadway:

http://www.dwr.state.co.us/SurfaceWater/data/detail_graph.aspx?ID=BOCOBOCO&MTYPE=GAGE_HT

Google Boulder News Aggregator

http://goo.gl/news/58WN

Cleanup Guide:

http://www.floodsafety.com/media/pdfs/cleanup/Cleanup_after_flood.pdf

Maps

Boulder Flood Hazard Mapping

http://gisweb.ci.boulder.co.us/agswebsites/pds/floodmap/

For Google Maps (shelters, animal shelters, road closures, evac zones): https://m

apsengine.google.com/map/viewer?mid=zYYdhADI7PvQ.kzJSidMtEIqY

Xcel Power Outage Map: http://www.xcelenergy.com/portal/site/xe-en/menuitem.471846b0c2475abf262a71986b108a0c/?vgnextoid=02b6719a0b3cd210VgnVCM100000b40b98aaRCRD&vgnextchannel=e97c6113f220f210VgnVCM100000b40b98aaRCRD&appInstanceName=xe


Community Map with Instagram photo layers:

https://boulderflood2013.communityos.org/cms/node/1

Current EvacuationsFor Evacuation Center Info:, http://boulderoem.org/emergency-status

//////

From the Occupy Sandy days, relief network theory info: Home - FLO Solutions for Disaster Relief

//////

The OOZE: It's almost like drilling and fracking willy-nilly could set the stage for complex or compound environmental disasters. Colorado Floods Causing Fracking Spills?: Natural and Human-made Disasters Portend Future of Toxic Catastrophe | Earth First! Newswire

Is there a media blackout on the fracking flood disaster in Colorado? From an email:

I see you’ve noticed the underwater wells in Weld County, Colorado. Amazing; we’ve emailed the Denver TV stations, other media, and state and local politicians. We’ve sent pictures that our members have taken. It’s like the media and politicians have been TOLD not to say anything about it. There has been no mention of the gas wells on the Denver newscasts either last night or this evening although all stations have had extensive and extended flood coverage. You can see underwater wells in the background of some of the newscast videos, and yet the reporters say absolutely nothing.

Here’s a picture one of our members took yesterday in Weld County, Colorado. We’ve got tons more on our website. Check it out. The tanks are tipping and, in some cases, have fallen over. They have to be leaking toxins into the flood waters. There have to be hundreds if not thousands of underwater well pads in Weld County as a result of the flooding.

Please publicize this in Texas since our media people and politicians have gone silent!

https://www.facebook.com/EastBoulderCountyUnited

East Boulder County United

Lafayette, Colorado

WeldCountyFloatingTank-e1379213713195.jpg

Colorado Floods Causing Fracking Spills?: Natural and Human-made Disasters Portend Future of Toxic Catastrophe | Earth First! Newswire

National Geographic, Sept 14 2013: Amid Drought, Explaining Colorado’s Extreme Floods as the drought weakens absorption capacity of the land.

Navajo flooding in AZ: Dine' Resources and Information Center » Navajo Nation Operation Storm Surge – Volunteers Needed

▶ Raw video: Extreme flooding in Weld County - YouTube

//////

Impending Japanese DoomSphere: With the release of a new Ghost in the Shell series, ARISE [ see http://www.ghostintheshellarise.com/anime/ghost-in-the-shell-arise/borde... ] it is time once again to ponder how the land of the Rising Sun will get into a post-apocalyptic state required of the finest anime.

Fukushima could get flooded once again by Typhoon Man-yi, but perhaps they will have a lucky break. Typhoon hits Japan - fears for Fukushima plant - World - NZ Herald News. Tracking map URL next 12 hours are the Big Deal: http://www.wunderground.com/hurricane/western-pacific/2013/Tropical-Stor...

Commentary from Michael C Ruppert:

If you are psychologically and emotionally able...

First watch the aerial footage of the flooding around Boulder and Lyons, Colorado (below). Watch all of it, no matter how difficult that might be.

Then read this quote from this posting about Man-yi:

"Man-yi might also inundate Fukushima, where utility crews are struggling to contain highly radioactive water leaking from and flowing under the crippled Fukushima No. 1 nuclear plant and into the Pacific Ocean at an estimated rate of 300 tons a day".

Now understand that the earth at Fukshima has already been horribly compromised by flooding -- for two and a half years straight. The reactor buildings are unstable and ready to fall. The unwelded storage tanks are already failing, and the spent fuel pools are teetering above ground with their ever-present threat of an open-air, uncontrolled fission reaction.

Now add rainfall like what has just hit Boulder... Instead of many huge sections of roadway, bridges and buildings falling away into the torrent, picture the reactor buildings, the fuel pools and all the stored super-radioactive water being washed away, either into the sea, or being scattered and dispersed for hundreds, maybe thousands of miles by 50-60-70 mph winds.

And the hardest thing of all to imagine is the fuel pools collapsing in the middle of a tropical storm or typhoon, triggering an open-air reaction in the middle of all that wind.

Forget all of these other times the cliche "The Perfect Storm" has been used before. […..] When highly complex civilizations fail, they fail spectacularly. The cascade of problems becomes its own Fukushima tsunami. […..]

[CO Flood Post] Words are absolutely inadequate to describe this footage. I could not help continually viewing this as a metaphor, a symbolic viewing, of how difficult it will be to address the life-threatening crises that are bearing down so hard with so much infrastructure gone in so many places.

No matter where we are, this is showing us what our world is going to be resembling in the near future, whether as a result of floods, quakes, radiation, lack of maintenance, lack of resources and ultimately lack of will.

As local, immediate survival becomes a priority almost everywhere, our ability to address the larger issues causing these events collapses, evaporates and is gone with the wind.

Let your heart watch this right beside your mind. One way or another, this is the future for all of us, unless we can all unite on the same page, and at the same levels of consciousness.

AFP-JIJI: Typhoon Man-yi heads for Chubu | The Japan Times: "Man-yi might also inundate Fukushima, where utility crews are struggling to contain highly radioactive water leaking from and flowing under the crippled Fukushima No. 1 nuclear plant and into the Pacific Ocean at an estimated rate of 300 tons a day."

Petition w 1.5K signers right now: STOP FUKUSHIMA RADIATION- UN ACTION NEEDED

Terrible nuclear Olympics of 2020 scheduled: Endless Fukushima catastrophe: 2020 Olympics under contamination threat — RT Op-Edge

ENEnews tracking this like ballers: Fukushima reactor cores may have had “Melt Through to China Syndrome” and went into the earth itself — Includes over 1,500 pounds of plutonium

Tritium levels of groundwater in Fukushima now at their highest - The Japan Daily Press

Sept 13th: Interview: Fukushima melted fuel “could have burned through floor and now in earth underneath reactors”

///////

Jet Stream climate change: It's not just the CO2 coefficient, it's shifting wind patterns. For animated archives: Animation of Archived Jet Stream Analyses for North America

///////

Nazis of popular culture: Mr Brand razzed Hugo Boss, the stylists of the Third Reich, prompting a nasty microcosm of larger 'soft fascism' to iterate anew. Well trolled good sir: Russell Brand and the GQ awards: 'It's amazing how absurd it seems' | Culture | The Guardian

///////

Now for the Misc Linkdump… First: Great Game Roundup: For Sun Sept 15th: Sibel Edmonds' Boiling Frogs Post. Lawrence Wilkerson speculates on Israeli false flag CW operation in Syria: Ex-Bush II Administration Official: Israel could have used Chemical Weapons in Syria | Global Research. Conspiracy lulz: Activist Post: Syria's "Rebels" Threaten UN - Will Use US Weapons.

Five Ways a Wider Syrian War Could Go Nuclear | Common Dreams

SWIFT NSA infiltrations: NSA Successfully Figured Out How to Tap Into VISA’s ‘Complex Transaction Network’ | The Dissenter // Internet snooping: Backdoor dealings | The Economist

Petraeus protests going viral: Protests of David Petraeus's lectures to continue, say CUNY students | World news | theguardian.com

Tech punditry and the attention economy: pretty clutch stuff here, the art of self interested trolling and TED talks. Tech Cyber-Critics

Neat poem:

Shine, Republic by Robinson Jeffers

The quality of these trees, green height; of the sky, shining, of

water, a clear flow; of the rock, hardness

And reticence: each is noble in its quality. The love of freedom

has been the quality of Western man.

There is a stubborn torch that flames from Marathon to Concord,

its dangerous beauty binding three ages

Into one time; the waves of barbarism and civilization have

eclipsed but have never quenched it.

For the Greeks the love of beauty, for Rome of ruling; for the

present age the passionate love of discovery;

But in one noble passion we are one; and Washington, Luther,

Tacitus, Aeschylus, one kind of man.

And you, America, that passion made you. You were not born

to prosperity, you were born to love freedom.

You did not say 'en masse,' you said 'independence.' But we

cannot have all the luxuries and freedom also.

Freedom is poor and laborious; that torch is not safe but hungry,

and often requires blood for its fuel.

You will tame it against it burn too clearly, you will hood it

like a kept hawk, you will perch it on the wrist of Caesar.

But keep the tradition, conserve the forms, the observances, keep

the spot sore. Be great, carve deep your heel-marks.

The states of the next age will no doubt remember you, and edge

their love of freedom with contempt of luxury.

Robinson Jeffers

//////

Classwar lulz: Watch Barney Frank Leave Wall Street Defenders Speechless

Spacelulz: Searching for the ruins of alien civilisations – Paul Gilster – Aeon

///////

Lol the Waste Confidence Directorate:

This is email sent Friday Sept 13, 2013 by the NRC Nuclear Regulatory Commission

Hello,

Three important Federal Register notices were published today.

· The NRC’s proposed Waste Confidence rule for public comment: https://federalregister.gov/a/2013-21708

· The NRC’s Notice of Availability for the Waste Confidence draft generic environmental impact statement (DGEIS): https://federalregister.gov/a/2013-21715

· The Environmental Protection Agency’s Notice of Availability of the Waste Confidence DGEIS: https://federalregister.gov/a/2013-22363

The publication of these notices starts the 75-day public comment period on the Waste DGEIS (http://pbadupws.nrc.gov/docs/ML1322/ML13224A106.pdf) and proposed rule. The public comment period ends on Wednesday, November 27, 2013. Comments received after November 27, 2013, will be considered as practicable. However, the NRC can only guarantee consideration of comments received on or before November 27, 2013.

In addition to presenting oral comments at any of our twelve public meetings, there are many ways to submit written comments on the DGEIS and proposed rule. The NRC gives all comments equal weight, no matter who submits them or how they are submitted. You can submit written comments through any of the methods below.

E-mail comments to Rulemaking.Comments@nrc.gov, citing Docket ID No. NRC–2012–0246

Submit comments online at www.regulations.gov using Docket ID No. NRC–2012–0246

(Direct link to comment submission: http://www.regulations.gov/#!submitComment;D=NRC-2012-0246-0361)

Mail comments to Secretary

U.S. Nuclear Regulatory Commission

Washington, DC 20555-0001

ATTN: Rulemakings and Adjudications Staff

Fax comments to Secretary

U.S. Nuclear Regulatory Commission

301-415-1101, citing Docket ID No. NRC–2012–0246

Hand-deliver comments to 11555 Rockville Pike, Rockville, Maryland 20852, between 7:30 a.m. and 4:15 p.m. (Eastern Time) on Federal workdays; telephone 301-415-1677.

If you have any questions about the information in this e-mail please contact Sarah Lopas at (301) 287-0675 or Sarah.Lopas@nrc.gov. For additional details on our 12 public meetings and how to register to attend these meetings, please go to our Waste Confidence Public Involvement webpage: http://www.nrc.gov/waste/spent-fuel-storage/wcd/pub-involve.html.

Thank you,

Staff of the Nuclear Regulatory Commission

Waste Confidence Directorate

////////

Financial collapse still impending: With Currency Wars guy Jim Rickards: [KR497] Keiser Report: Deja Fraud | Max Keiser // Portuguese Return to Farming to Counter Unemployment, Austerity - Bloomberg

Neil Young at Tar Sands: 'Fort McMurray is a wasteland': Neil Young slams oil patch, Keystone plans - The Globe and Mail. Alberta politicians as the new Southern Man!

Sad reefs and CO2 bubbles make carbonic acid: Pacific Ocean takes perilous turn | Sea Change: Ocean acidification | The Seattle Times // International Scientists Warn Climate Deniers Are Enabling Earth's Suicide // Image of the Day: Satellite view of record heat wave in China, 5-12 August 2013 // Shitloads of Methane as reptilian alien "They Live" conspiracy bears fruit: Arctic News: Methane reaches 2571 ppb

Some theory: The Absurdity of Authenticity – Nature Bats Last

Fed Chair Baseball: Summers over | Felix Salmon

Cool and clever energy tech may help make new storage systems using basically air and water: Technology - LightSail Energy

Coconut Revolution: ▶ Coconut Revolution - "The world's first successful eco-revolution." - HQ - Full - YouTube

Why not? “Chemtrails Are Happening All Over The World” According to Former British Columbia Premier | Collective-Evolution

Leaving it there for now...

Question Time: Jimmy Savile pedophile network story encompasses BBC, royal family, Parliament, Jersey, Netherlands -- crickets from US media

"What you have to understand, John, is that sometimes there are forces and events too big, too powerful, with so much at stake for other people or institutions, that you cannot do anything about them, no matter how evil or wrong they are and no matter how dedicated or sincere you are or how much evidence you have. This is simply one of the hard facts of life you have to face."
- Former CIA director and Cercle member William Colby giving advice to his friend senator John DeCamp, urging to quit his investigations into the Franklin child abuse affair and to write a book about his experiences (The Franklin Coverup, 2nd edition, foreword). via archived Institute for the Study of Globalization and Covert politics project - https://wikispooks.com/ISGP/

[TRIGGER WARNING - Your world is controlled by many abusive psychopaths - details/links below. Aside from blockquoting Icke, Madsen & other stories, this post does not reach into many details of the abuse. Some of these links & the 1993 video "Conspiracy of Silence" contain very disturbing material including direct documentation of abuse]

A creepy theme, usually derided by debunker types as 'conspiracy theory' material, has been the frequent overlap between child abuse networks and vertically hierarchical, often sexually-codified, social structures & institutions, particularly those with some degree of control over vulnerable people. However these patterns are typically 'latent' & suppressed in media awareness until the dam bursts. Whether or not this horror encompasses interdimensional entities, blackmailed Nazi operatives or other exotically creepy ideas, the sheer evil of it all can send one's imagination hunting for weird connections. After all, one principal reason this never surfaced until now is because of the cognitive dissonance that tends to deflect our attention from such unthinkable cruelty.

Whether it's the revelation of vast abuse in the United Kingdom, Catholic hierarchies or Penn State, perpetrators & handlers of human trafficking & abuse are often well-protected & truth rarely spills out.

VIDEO: Member of Parliament Tom Watson asks Prime Minister Cameron about protected pedophile activity within the highest ranks of British government at House of Commons Question Time. (source)

savile_newsletterpromo.jpeg

Across the United Kingdom, hundreds of new leads & investigations have opened up with broadening awareness that a major BBC pop music presenter and producer, Jimmy Savile, helped mastermind a vast network of child abuse across much of the United Kingdom for decades, implicating major figures in the British Broadcasting Corporation, Parliament, the Prime Ministerial and Royal Family levels of UK society in undeniable horrors.

For decades, Savile [with a creepy resemblance to the Chitty Chitty Bang Bang childcatcher character] got what amounted to a green light from the major figures in British society, the BBC and the Royal Family, to do as he pleased, with full access including keys to numerous institutions hosting vulnerable children and teens.

For years the BBC's hierarchy looked the other way as Savile used his venues to not just abuse children [including it's widely said now, even dead children] directly, but also arrange for their trafficking on behalf of many other powerful figures.

A former BBC director, Mark Thompson, is now 'incoming president and chief executive' of the New York Times, forcing NYT Publisher Arthur Sulzburger Jr to back up their man, since he is obviously under the shadow of the BBC pedo coverup situation.

See: Amid BBC Scandal, Incoming Times Chief Receives Support - NYTimes.com // BBC Scandal Threatens to Become a Political Crisis - NYTimes // BBC News - Newspaper review: Savile scandal still leads papers // Jimmy Savile child abuse probe: TV stars set to be arrested 'within days' as probe widens - Mirror // Jimmy Savile scandal: Tom Watson MP claims powerful child sex ring was linked to Downing Street - Mirror Online // Jimmy Savile: Sex fiend was a 'necrophiliac', claims former colleague Paul Gambaccini - Mirror Online // Jimmy Savile abuse scandal: Doctors claimed to have attacked patients at hospitals where Savile allegedly struck - Mirror Online // BBC News - Giving Jimmy Savile victims their voice // BBC News - Jimmy Savile scandal: Alleged victims' stories

#OTB: The quirky alternative site OccupyTheBanks.com has been covering dimensions of this: see #BELGIUM DUTROUX CHILD RAPE & SNUFF #DEMMINK #DUTCH #Savile #BBC #Hague && THE top legal officers in HOLLAND (see last post) can be a NAMED PEDOPHILE, and CHILD RAPIST // #MASSARRESTS UK POLICE 50 POLICE PEDO ARRESTS // #NETHERLANDS TOP GOVT LAW OFFICER #PEDOPHILE #Demmink #Dutch #JUSTICE // **BREAKING** NO 10 PEDO RING NAMED UK PARLIAMENT // [UPDATED 7th OCT]] SATANIC RITUAL CHILD SEXUAL ABUSE #VATICAN #NWO #ILLUMINATI etc etc. Follow @censoredNewsNow for more items - a chatty account to be sure!

It's no surprise Savile was able to gather many honorifics thanks to the Royal Family and even made a member of the Knights of Malta (Sovereign Military Order of Malta - a major sketchy European aristocratic network). (additionally, with recent work from people identifying with Anonymous in exposing child porn networks, d0xing abusers, as well as criticism of the sexist, misogynist & creepy issues plaguing such groups as Reddit & "jailbait" subreddits, the 'skeptic humanist' community etc, it seems like these broader topics are finally getting the attention & reactions they need.)

It's important to realize that pedophiles and particularly creepy 'fixers', such as for example, that John Mark Kerr creeper, who bizarrely claimed to have killed Jon Benet Ramsey several years ago, are just outer tentacles, who clearly are 'charmed' with protection from law enforcement entanglements. [In Minneapolis, the longtime Park Police chief was yet another pedo in a key power position]

Icke was right?! Of all people, noted "interdimensional reptilian conspiracy" exponent David Icke gains a certain validation for having documented both Savile's depredations and others, prevailing in exposing ugly truths despite the famously libel-locked down British publishing world. His 5500 word exegesis on this subject is posted below.

I think this statement is well-substantiated - many examples are out there: Icke: "Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control."

At this time in the UK press, former Tory Prime Minister Edward Heath & minister Sir Peter Morrison, a confidante of Heath's successor, Margaret Thatcher, are openly talked about. Former Minister says Thatcher aide was paedophile who preyed on boys' home - and Hague should have known | Mail Online

A former Tory Minister last night made incendiary claims that one of Margaret Thatcher’s closest aides was implicated in one of the most harrowing child abuse scandals of recent times.

Rod Richards, a former Conservative MP and ex-leader of the Welsh Tories, made the shocking allegation that he had seen evidence linking Sir Peter Morrison to the North Wales children’s homes case, in which up to 650 children in 40 homes were sexually, physically and emotionally abused over 20 years.

Mr Richards also linked a second leading Tory grandee – now dead – to the scandals at homes including Bryn Estyn and Bryn Alyn Hall, both near Wrexham.

He said official documents had identified the pair as frequent, unexplained visitors to the care homes.

Mr Richards – who helped establish the inquiry that unearthed the scale of the abuse – said bluntly: ‘What I do know is that Morrison was a paedophile. And the reason I know that is because of the North Wales child abuse scandal.’

He added that William Hague, who was Welsh Secretary at the time of the inquiry, ‘should have seen the evidence about Morrison’.

Morrison was Lady Thatcher’s parliamentary private secretary and deputy chairman of the Conservative Party.

Back in the 1990s -- the website ISGP.eu - [now archived via Wikispooks.com] covered a Belgian-centered dimension of the protected European elite child abuse network. This material gets very deeply disturbing & is not to be taken lightly [TRIGGER WARNING x infinity] ISGP - Beyond the Dutroux Affair // ISGP - Dutroux case and X-Dossier victim-witnesses // ISGP - Dutroux, Nihoul and X-Dossier investigators // ISGP - Belgian X-Dossiers - the accused // ISGP - Alleged assassinations in Belgium

"From East Belfast's Kincora Boys' Home, via Leicestershire, Staffordshire and London, to the children's homes of Clwyd, we have witnessed 25 years of cover-up. Cover-up, not to protect the innocent but to protect the regularly named elements of the British establishment who surface whenever widespread evidence of child abuse is exposed. From the public schools right through to the Catholic and Anglican churches, child abuse has been allowed a special place of sanctuary... Social workers, police, security services, local and national political figures remain the common factors in the fall-out from the [child abuse] inquiries... In case after case the cycle is described - a child is 'taken into care', then abused in a home, handed on to an outside pedophile ring and out on to the rent-boy/prostitution circuit beyond, if they live that long... Journalists find themselves battling first with authority, then with the libel laws, to publish the truth about a vast web of abuse."
- June 6, 1996, The Guardian, 'True scandal of the child abusers'. These lines were written by the author of the article and are not quotes.

....and so here we are in 2012, 18 years after that Guardian story was posted, previous layers breaking through to the surface anew. The 1990s saw parts of this general elite network [or layer] surface and recede again into obscurity. John DeCamp, a former CIA employee and Nebraska state representative, helped expose a major node of protected child abuse and trafficking in the American heartland.

This could almost be seen as an intra-CIA war or conflict as The Minders was a CIA-linked group that participated in child trafficking as well. Here is the long-suppressed 1993 documentary Conspiracy of Silence. The central figure in Nebraska, the late GOP rising star, Lawrence "Larry" King, bears some resemblance to Jimmy Sevile as another 'doorman to the cesspit' of protected elite child abuse.


savile_princecharles.jpegArguably, much of this ugliness, from Jim Jones to the recently deceased Rev. Sun Myung Moon to the CIA-influenced "evangelical" movement (Campus Crusade for Christ was set up as a counterpart to Mario Savio's Free Speech Movement by the CIA) all tie together ritualized group mind control and the inte-generational abuse of minors.

It could roughly add up to the distillation of MK-ULTRA & Nazi-derived research into a mind control template which could be applied across many religious & cultural gradients in Western societies. In the Scandinavian side, the Girl with the Dragon Tattoo series illustrated via fiction Nordic fascist intergenerational abuse families.

Whether or not you find plausible the notion of "entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general", the rest of the piece is an ugly read on a lot of very solid foundations.

So let's get to the Icke piece - via here Jimmy Savile ... Doorman To The Cesspit - David Icke Website && ELITE CHILD ABUSE: ‘JIMMY SAVILE… DOORMAN TO THE CESSPIT’ « 21st Century Wire::

By David Icke

Something of massive significance has happened in Britain in the last two weeks which might have been lost on most of the rest of the world. It concerns the revelations about serial child abuse over decades by a man considered by many to be a British ‘icon’ and ‘national treasure’.

Savile’s connections to the political and royal elite are undeniable.

His name is Jimmy Savile and the reason the significance of what is happening may have passed most people by outside the UK is that Savile was a major figure in these islands, but little known beyond them. What, and who, he was involved with, however, is global in nature and has the potential to expose both the staggering scale of child sexual abuse and many of the mega-famous names for whom it is a way of life.

Savile was one of the first in the entertainment field known as ‘disc jockeys’ who emerged with the 1960s music and cultural explosion known as the ‘Swinging Sixties’. I remember him well as a kid appearing on television shows, still in black and white then, and in fact you could hardly miss him. Once seen, never forgotten. He would always appear with dyed hair, mostly blond, and highly colourful and eccentric clothing accompanied by multiple rings and other jewellery. Savile was what they called a ‘one-off’, a ‘character’ and people either loved him or deeply loathed him and thought he was seriously weird. There was little of the half-way about Jimmy Savile.

He began as a disc jockey in dance halls and later managed several of them before he launched a career in the media via the legendary Radio Luxemburg in 1958 and eventually moved to the BBC which was to be his prime public platform for decades. He was a first and last presenter of the ground-breaking music chart show Top of the Pops, which ran from 1964 to 2006, but his biggest claim to fame was the BBC show Jim’ll Fix It which he presented from 1975 to 1994.

This is particularly relevant to current events because it was a programme in which children wrote in to describe what they would most like to do or who they would most like to meet. The programme then ‘fixed it’ for the children chosen to take part. The ‘fix’ could be anything from going up in a hot air balloon to meeting their favourite pop star.

Savile was also famous for his charity work, which included running many marathons. He was also a volunteer porter at the Leeds General Infirmary; a volunteer and fundraiser at Stoke Mandeville Hospital with its world-famous spinal injuries unit; and he was involved with the Broadmoor high-security psychiatric hospital where many famous killers have spent their days. Savile is reported to have had his own room at both Stoke Mandeville and Broadmoor and, it was revealed this week, he was given his own set of keys that allowed him access to many areas within Broadmoor.

His public face was of a jolly and eccentric character who was famous for his trademark expensive cigar and constantly repeated catch phrases such as ‘how’s about that, then?’, ‘now then, now then, now then’, ‘goodness gracious’, ‘as it ‘appens’ and ‘guys and gals’. But away from the screen Savile lived a very different life and operated in very different circles to the ‘man of the people’ image that he so cultivated and it is now clear that much of his charity work was designed to give him access to children and below-age teenagers.
Savile was given a hero’s funeral when he died in 2011 at the age of 84, but a recent television documentary – not by the BBC – has revealed his decades of sexual abuse of underage girls with more revelations coming out by the day. Iceberg and tip come to mind.

Saville was a regular visitor to the royal households, and was close to Prince Philip and Prince Charles.

I was first told about the real Jimmy Savile in the late 1990s in conversations with people who had serious insider knowledge about the British royal family and they said that Savile had been a close friend of Prince Philip until they had fallen out after a ‘big row’.

When I questioned why someone like Savile would be so close to the royal family I was told about his paedophilia and necrophilia (sex with dead bodies) and, of course, his famous voluntary work at hospitals would have given him potential access to the mortuaries.

Savile himself would boast about his connections to the royals and it was publicly acknowledged that he was a regular visitor to Buckingham Palace, Kensington Palace (where Princess Diana lived after her marriage ended with Prince Charles), and Highgrove (the country estate of Prince Charles).

Savile told Esquire: ‘The thing about me is I get things done and I work deep cover. I’ve known the Royal Family for a million years.’

According to the UK Daily Mail at the time of Savile’s death in 2011, he ‘was used as an intermediary in an attempt to resolve the differences between the Prince and Princess of Wales shortly before their split’. Savile said that he was invited to regular meetings with the royal family because ‘I have a natural good fun way of going on and we have a laugh.’

Would one of the world’s most powerful families invite an aging disc jockey into their inner sanctum so often just because he gave them ‘a good laugh’? Or is there likely to be a far more plausible reason for their strange closeness?

I have been writing since the 1990s and a book called The Biggest Secret about the royal family’s connection to Satanism and paedophilia and about paedophile Satanists like British Prime Minister Edward Heath and President ‘Father’ George Bush – just as I have told those who would listen about Jimmy Savile. But all I have had for my trouble from mainstream society is ridicule and dismissal.

Their minds are too closed and too programmed to make the leap into the world as it really is.

Now, in the wake of the public confirmation about Savile, it is time that they did. How many more children need to suffer before humanity grows up and faces the reality and sheer undiluted evil of the force that controls them?

Jimmy Savile and the royal family shared a love of Scotland and the sporting events known as the Highland Games. Savile was the Honorary Chieftain of the Lochaber Highland Games which he attended for 30 years. He had a secluded cottage at nearby Glencoe where Prince Charles was a visitor. Savile said after a visit by Charles in 1999: ‘I’ve had a few nosh-ups with the royals and I thought it was time I returned the hospitality.’

Charles sent a Christmas card to Savile in which he wrote: ‘Jimmy, with affectionate greetings from Charles. Give my love to your ladies in Scotland.’ The reference to the ‘ladies’ was meant for the women that Savile had arranged to serve the Prince during a visit to the Glencoe cottage.

Savile said that he had first been introduced to the royal family in 1966 by (known paedophile) Lord Louis Mountbatten, the uncle and mentor of Prince Charles. Mountbatten was Commandant General of the Royal Marines and arranged for the disc jockey to become the first civilian to be awarded the Marines’ Green Beret. It was one of a many ‘honourees’ that Savile would be awarded in the years that followed. Savile said:

Coming from Lord Louis, who was the favourite uncle of Prince Philip, that was quite something. So obviously I hooked up with the Prince – what was good enough for Lord Louis was good enough for him.

But what was ‘what’? Mountbatten was killed when a bomb exploded on his boat in Ireland in 1979 – a murder officially blamed on the Provisional IRA. New Zealand writer and researcher Greg Hallett writes in his book, Hitler was a British Agent:

Lord Louis Mountbatten was a pedophile, adulterer and homosexual incestuous lover for 10 years … the former King Edward VIII … was truly troubled by the revelations he too had betrayed the Canadians to the German Army, resulting in the open slaughter of those 4,000 men …

… the British monarchy arranged for MI-5 to blow up his boat (1979), happily covering their trail; by fitting up four IRA men … the tactic of blowing up one of your own leaders to cover up any incriminating evidence … was a face saving device to distract from even more damaging intelligence about the British monarchy working for the Germans, against peace, and for a prolonged war.

This is a young Prince Charles with his ‘mentor’ Lord Mountbatten, and father Prince Philip. Greg Hallett names both Mountbatten and Philip as paedophiles. Of course, you don’t just take one person’s word for that, but my own sources which have proved to be so accurate about Savile and others told me the same nearly 15 years ago with the addition that they were both Satanists. This is no surprise given that the British royal family, like all the royal bloodlines of Europe and further afield, are founded on Satanism and the manipulation of occult knowledge for deeply malevolent ends in league with the ‘dark suit’ expressions of the bloodlines in politics, banking, corporations and media.

But Jimmy Savile’s connections were certainly not confined to the royal family. They fanned out into the realms of politics and the rich and famous across the spectrum of human society. In short, he was not only a paedophile himself, but a supplier of children for some of the most famous paedophiles and Satanists on the planet.

The victims of his abuse that are now speaking out in the wake of the television documentary exposing his secret life are only part of a gigantic cesspit of paedophilia, Satanism, drug-running and murder in which he was involved.

I describe him as a ‘doorway to the cesspit’ because if you get past him and his fake persona you enter the sick and depraved world of the global bloodline elite. Savile was a ‘fixer’ – he described himself as such, though not in terms of what he was really fixing. As he told Esquire: ‘The thing about me is I get things done and I work deep cover.’ His most famous TV programme, Jim’ll Fix It, could not have been more appropriately named.

British police have said they are currently following 320 lines of inquiry into Savile’s abuse over decades all over the country, but if they are genuine and tenacious in their investigations and really want to know the truth they can multiply that by a very large number and still not be close to the totality.

If they do really want to uncover the truth they will have to be knocking on the door of Buckingham Palace eventually. If they don’t, it’s a cover up given the Windsors’ close relationship with Savile.

The current public revelations about Savile are being confined largely to the abuse of underage girls, but the truth about the way he supplied girls and boys for people like Prime Minister Edward Heath and so many others must also come out because the barricade is being held at the moment with only his own paedophilia and a few sleazy showbiz people. This is only one aspect of the scandal and his work as a supplier of children for the ‘elite’ is still being hidden in the mainstream media to protect the biggest names. This firewall has to be breached.

Guy Marsden today.

One of Savile’s nephews, Guy Marsden, now 59, has said publicly this week that he and his friends were taken to parties by his uncle in the late 1960s to ‘act as intermediaries for adults and younger children’. He said that the parties were attended by ‘household names’ in showbusiness, but only men – never women.

Marsden, then 13, and some friends from Leeds in the north of England, ran away to London for ‘an adventure’, he said. They were approached by men at Euston railway station and invited to a grubby flat. Then about four days later Savile turned up at the flat by coincidence because Marsden soon learned that his famous uncle mixed with ‘fellow child molesters’. He said he thought he would be in trouble for running away and not telling his parents where he was, but instead his uncle Jimmy just took him and his friends to a ‘much better place’ – the house of a ‘famous pop impresario’ which had a big indoor swimming pool and was one venue for Savile’s ‘paedophile parties’.

Marsden said that little boys and girls would disappear into bedrooms with the famous attendees and it was ‘perfectly obvious’ what was happening. ‘You heard sounds and moans and groans coming from the bedroom and knew what was going on.’ Marsden added:

At night you would get about 15 or 20 people turning up. There would be music and tables full of food, we couldn’t believe it. There was everything we needed and we just hung around.

At first we automatically assumed the children lived there, but we soon realised they didn’t. They would be brought there, sometimes by Uncle Jimmy, and would stay for six or seven hours until 3 or 4am. They were just little kids, boys and girls.

Interestingly, Marsden said that Savile sometimes arrived with a man dressed as a priest and he believed that children being abused may have come from an orphanage or children’s home. They almost certainly did – it fits the modus operandi of the paedophile rings to the letter. What better way to supply your children than have control of children’s homes?

Several of Savile’s victims who have come forward in recent times say they were abused by him at the Duncroft boarding school for ‘intelligent, emotionally disturbed girls’ in Surrey and wherever children and young people are gathered together in a boarding situation needs to be watched like a hawk. These establishments are the predators’ hunting grounds with often their own people appointed to the staff.

Savile at the infamous Haut de la Garenne children’s home in Jersey, Channel Islands.

This is Savile with the children at the infamous Haut de la Garenne children’s home on the island of Jersey in the Channel Islands. Jersey is the fiefdom of mega-rich and mega-crooked networks that combine criminal business, banking and drug operations with paedophilia and Satanism. The island of Jersey, off the French coast,, is only nine miles by five with a population of 90,000 and yet has 55 banks, more than 33,000 registered companies and hundreds of billions of dollars on deposit. It is a money laundering operation of global proportions and attracts the super wealthy with low tax rates.

Haut de la Garenne, or ‘Forest Heights’, was a ‘children’s home’ (detention centre) from 1867 to 1986 and it is clear that it played the role of providing children for sexual and violent abuse by the Jersey Mafia in all its forms – as well as the rich and famous of mainland Britain, including members of the Royal Family.

Jersey has an almost self-contained government of its own, but the Queen remains at the top of its power structure and wherever the ‘Crown’ holds sway, so does Satanism and child abuse.

The infamous Satanist, Edward Paisnel, who was dubbed ‘The Beast of Jersey’ after being jailed for 30 years for the rape of boys and girls, used to play Father Christmas at Haut de la Garenne during the 1960s. You get the picture.

A high-profile police investigation began in 2008 into historic long-term abuse at the home and, unfortunately for those involved, a decent, honest copper was in control of the investigation. This was Lenny Harper, a States of Jersey police detective who led a three-year child abuse inquiry that genuinely tried to expose what happened.

Genuine police officers and detectives who sought the truth in the Marc Dutroux child abuse and murder scandal in Belgium in the 1990s found that refusing to cover up the facts is not a good career move for law enforcement personnel if the truth is leading to rich, famous and powerful people and their networks. So it proved again with the Jersey investigation.

Both sets of genuine investigators were removed from these cases and any credible ‘investigation’ went with them. Lenny Harper, like his counterpart in the Belgian inquiry, was accused of ‘misconduct’ as a blatant excuse to get rid of him – the allegations were later proved false. Harper’s boss, Jersey police chief Graham Power, was also outrageously suspended and neutralised as part of this.
More than a hundred people came forward claiming to have been sexually and violently abused at the Jersey home and Lenny Harper has confirmed that Jimmy Savile’s name came up early in his investigation but with not enough evidence to charge him at the time. Savile denied any knowledge of ever being at the home, but a picture emerged of him at the home to show that he was lying.

Highly significantly, the name of Edward Heath, the British Prime Minister between 1970 and 1974, has also emerged in relation to abuse at Haut de la Garenne and to Jimmy Savile. I named Heath as a serial child abuser and killer and practicing Satanist in The Biggest Secret seven years before he died in 2005.

A local newspaper reporter, or an excuse for one, contacted Heath when the book was published in 1998 and read him the passage. He replied with the usual ‘Icke is crazy’ response and did nothing else. The reporter, a Charlotte Hofton, condemned me for attacking a ‘nice old man’.

I had spoken to many people who said they had been abused by Heath and witnessed his sexual abuses and satanic child murders, while I was told about Savile by those who knew from having access to the ‘inside’. I was therefore confident enough, with direct contract with the abused themselves, to name Heath in the book and defend any libel action. But that never came because what I said was true.

Those who survived Heath’s abuse were the minority. He loved to torture children and then kill them, often by cutting their throats. This was the man who ran Britain for his masters for four years as prime minister and signed us into the fascism that is the European Union.

Heath was famous as an ocean-going sailor in his yacht Morning Cloud which he used to sail to Jersey and visit the children’s home, Haut La Garenne. According to some sources it was Jimmy Savile who supplied children for Heath that would be abused at sea and probably never return.

Savile had many close and intimate contacts in British politics and he boasted that he spent Christmas with Prime Minister Margaret Thatcher and her husband Dennis every year for a decade. Thatcher replaced Heath as leader of the Conservative Party and many of her government ministers were paedophiles.

Edward Heath and Lord Mountbatten, who first introduced Savile to the royal family, have also been connected by some researchers to the Kincora Boys Home in Belfast, Northern Ireland, the centre of another paedophile ring scandal that broke in 1980. It was clear that the authorities knew what was going on for years before that, but did nothing.

Kincora was a home for working class boys, the very type of kids which Mountbatten was said to be most keen to abuse. Kincora children would also be taken to castles and other homes of the rich and aristocratic families, some of whom were connected to the Irish branch of the Hellfire Club. This is the Satanic network established in the 18th century by British politician and Chancellor of the Exchequer, Francis Dashwood, 15th Baron le Despencer, and his close friend, American hero, Benjamin Franklin.

Three members of staff at Kincora were jailed, including William McGrath, a friend and associate of Northern Ireland’s most famous politician, Ian Paisley, but none of the elite clientele were ever investigated, let alone named and charged. The official inquiry (anything but) decided there was no wider ring operating from the home when that was clearly absurd.

The same happened when a paedophile ring was exposed at children’s homes in North Wales in the 1990s, including the Bryn Alyn home in Wrexham. Policemen, social workers and prominent public figures were named during public sessions of the North Wales Child Abuse Tribunal by those abused, but its chairman, Sir Ronald Waterhouse QC, threatened the media with High Court proceedings if the names were published.

First Waterhouse said that this ban applied only to people who were alive and who did not have previous convictions for child abuse. Then he banned the naming of a man who had died 16 years before and another with two convictions of abusing children in North Wales homes. All together now…

Lord McAlpine – denies involvement.

The UK Guardian went so far as describing one of those named as ‘A man who bears the same surname as a prominent Conservative supporter’. The report added that two witnesses had told the tribunal of a rich and powerful man who belonged to the alleged ring.
The now defunct Scallywag magazine named Lord McAlpine, a treasurer of the Conservative Party, and also Derek Laud, a leading ‘mover and shaker’ in Conservative administrations. Both were close friends of long-time Conservative Prime Minister Margaret Thatcher, a close friend of Jimmy Savile. McAlpine and Laud denied the allegations. I am not saying that Margaret Thatcher knew about Savile’s background, only that his friendship with her reveals his connections into the Conservative Party at the highest levels.

Scallywag also alleged that MI5 took foreign diplomats to the North Wales homes and secretly filmed them abusing and torturing boys to use the tapes for blackmail. This is a classic Intelligence modus operandi with regard to child abuse by the famous and influential – especially politicians that they want to control..

Paedophiles and Satanists pervade the world of politics, royalty, banking, corporations and media and it is just as rife in the UK Labour and Liberal Democrat parties as it is in the Conservatives – and among the Democrat and Republican elite in the United States.

-
War criminal and long-time Prime Minister Tony Blair represented the paedophile-infested Labour Party (see website link after this article) and at his private school, Fettes in Edinburgh, Scotland, he was a close friend of its chaplain, the Very Reverend Dr Ronald Selby Wright, who was known as a persistent paedophile. Edinburgh is a major centre for elite paedophilia and secret societies. Wright was a Church of Scotland Moderator and Chaplain to the Queen and the Fettes historian Robert Philip once said that the young Blair looked up to Dr Wright as a `spiritual mentor’. Philip said: `When Mr Blair was having trouble with the establishment, he confided in Ronald. I think a lot of seeds for his religious faith were sown there.’

And what else?

Tony Blair is reported to have blocked the exposure of famous names during Operation Ore – Operation Avalanche.

Tony Blair is reported to have blocked the exposure of famous names in law, business and politics, including some in his own cabinet, during the police investigation into paedophile Internet activity known as Operation Ore, which came out of the FBI investigation in the United States called Operation Avalanche. Neither convicted any of the big fish – as usual.

The figures in Operation Ore were enormous: 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned; 140 children removed from suspected dangerous situations. But still no major names in the paedophile-infested elite levels of society. Operation Avalanche in the US produced 35,000 Internet records, but only 100 charges.

Blair was leader of the Labour Party at the time of the mass killing of children by known paedophile Thomas Hamilton who walked into Dunblane Primary School in Scotland in 1996 and shot dead 16 children and a teacher before killing himself. Hamilton, like Savile, was a procurer of children for ‘pillars’ of the Establishment.

Scottish judge Lord Cullen was appointed to head the official inquiry into Dunblane and he ordered that significant documents relating to the case should be locked away from public view for a hundred years. He said that this was to protect the victims and families when anyone with a brain could see that it was to protect the Establishment.

Cullen also led the five-judge tribunal which heard the appeal against conviction of the (innocent) Lockerbie bomber Abdelbaset Ali al-Megrahi and decided that he was guilty. It was revealed that Lord Cullen is a member of an elite Freemasonic group based at Edinburgh University known as The Speculative Society.

Lord Burton, a former Grand Master of Scottish Freemasonry, told a British Sunday newspaper that Cullen’s ‘inquiry’ was a cover up that suppressed crucial information and he linked Cullen to what he called the ‘Super Mason’ Speculative Society. He said that he had been bullied and threatened by other members of the House of Lords when he tried to raise his concerns about a Dunblane cover-up. ‘There’s no escaping the fact that there’s something sinister about the whole affair’, he said.

Thomas Hamilton wandered around Queen Victoria School, Dunblane’s only private boarding school – just like Savile did in girls’ homes and hospitals – and these people are given so much protection and free rein because they are the sources of children for the paedophiles that run government and law enforcement.

Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control.

Jimmy Savile’s involvement with politicians goes back to the 1960s and he has been a ‘friend’ of so many who have dictated the direction of national and even world affairs, including the long-time Labour Prime Minister, Harold Wilson, who I have exposed in my books as a Rothschild front man and manipulator fully aware of the Orwellian world that he was helping to create. Savile was also associated with paedophile Liberal Party leader Jeremy Thorpe and the London gangland villains, the Kray twins, who are also reported to have provided children for the famous.

The network is just so vast – and global.

Jimmy Savile was also closely associated with convicted pop music paedophiles, Jonathan King and Gary Glitter (who he publicly defended after Glitter’s conviction) and he was into far more than child molestation. Satanists get their biggest ‘high’ from having sex with dead bodies and some paedophiles get their ‘high’ from sex with mentally and physically disabled children. Savile’s charity work gave him access to both.

He was a volunteer porter at Leeds General Infirmary and had his own room at Stoke Mandeville Hospital, with its world-renowned spinal injuries unit, and the Broadmoor psychiatric hospital. Allegations of abuse have come from all three and it is said to have happened with the knowledge of staff. Some children were told by staff to act as if they were asleep when Savile came round to avoid his sexual abuse. Hospitals have mortuaries and Savile’s fellow BBC radio presenter Paul Burnett said without knowing the significance: ‘He did a lot of work as a porter in the [Leeds] hospital that he collected money for. He would go there at night and work as a porter.’ Yes, and what else?

None of this wider background is appearing in the mainstream media. The story is being sold as a famous paedophile being exposed, but of most importance to the big picture here is that Savile was a procurer of children for those in positions of national and international power.

Savile died extremely rich and no one seems to be asking where all that came from. Okay, he would have earned well enough in his prime with television, advertising and personal appearances, but he has done none of that with any serious earning capacity for a long time.

Yet he still owned a £160,000 Rolls Royce and had five other cars including a Bentley Turbo and Mercedes 500 SL. He also reported to have owned at least eight homes and left millions in his will on top of that. Where did all the money come from into old age to keep that scale of lifestyle going?

The answer is that child procurement for elite paedophiles is a very lucrative business and also ensures you protection from the law so long as you keep the secrets because if you go down so do your clients. This is why Savile could boast that he was untouchable. He told television presenter Louis Theroux: ‘I can get anything. There’s nothing I can’t get, and there’s nothing I can’t do.’

Those who stay quiet are protected. Those who threaten to speak out are soon dead. The latter was not going to happen to Savile who knew how the game worked and played it for his personal benefit.

Savile was so good at what he did – ‘working deep cover’ – that he was made a member of the Knights of Malta, an elite secret society that I have long exposed in my books, and awarded a papal knighthood by Pope John Paul II in a show of thanks and admiration from the biggest paedophile racket on Earth, the Roman Catholic Church. He was also awarded a knighthood by his friend the Queen and the Establishment in general.

Paedophile and Satanic rings are just that – rings, networks. They include people in all walks of life from politics, law enforcement, judiciary, banking, corporations and media, and they watch each other’s’ backs because their own backs depend upon it.

This happens the world over and most certainly in the United States, as I have widely exposed, and involves a mass of prominent people including US presidents like Father George Bush and major manipulators like Henry Kissinger.

Children’s homes and government mind control programmes are the major source of children for the American ‘elite’. High on the list is Boys Town, Nebraska, which is also known as ‘Father Flanagan’s Boys’ Home’ after its founder, Roman Catholic priest Father Edward J. Flanagan. He established Boys Town in 1921 for the ‘care, treatment, and education of at-risk children’.

If you read the book, The Franklin Cover Up, by former Nebraska state senator, John W DeCamp, you might wonder when the children are most ‘at risk’ – before they go to Boys Town or after. The story almost got out at one point during the Reagan and Bush administrations, but was quickly covered up after this was published in 1989.

So the question is why? Why is paedophilia so all-pervading in these elite levels of human society? The answer is that entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general, but the energy they want more than anything is that of children before puberty.

The hormonal changes that happen at puberty are only holographic expressions of deeper energetic changes and the entities want that energy before those change takes place. When the paedophile is having sex with the child the possessing entities are using the paedophile as a conduit to draw off the child’s life-force.

The bloodline-possessed are genetically and energetically stimulated to desire sex with children and when they get what they want the entities get what they want – the child’s energy. This requires an endless supply of children to constantly repeat this process and this is where the Jimmy Saviles and Thomas Hamiltons come in.

I see that I have written 5,500 words in this article and yet I could have written 30,000 and still not told the whole story of how Satanism and paedophilia are the foundation and connecting tissue of the global network of human suppression.

People find it so hard to go there, or to accept what appears to be so fantastic, but if the Savile story continues to be pursued tenaciously, and with an open mind, it can open a doorway to expose the darkest of dark.

Source: DavidIcke.com

RELATED STORY: BEN FELLOWS FULL INTERVIEW ON LIVE – EXPOSING BBC CHILD ABUSE /// RELATED STORY: 'I RAN THE GAUNTLET OF PEDOPHILES IN THE ENTERTAINMENT INDUSTRY' /// RELATED INTERVIEW: Blowing the Lid on Child Abuse in Entertainment – The Ben Fellows Radio Show

Labour25 – paedophiles in the UK Labour Party - http://labour25.com/

David Icke – Knock Knock … Who’s There? Your Apathy! (Viewer Discretion Advised) Click here to watch …

/// BELOW THE FOLD: More from Wayne Madsen & Christopher Story on disturbing pedophile networks, perhaps even the Illuminati / German authoritarian connection to PM Heath, & more ////

Bernie Sanders causes exposure of $16,000,000,000,000 in unauthorized global criminal banker syndicate Federal Reserve operations

The criminal banker syndicate which has captured much of our federal government has finally had some of its inner mechanics exposed thanks to Bernie Sanders, one of a handful of legit people in Congress today.... The Full Bernie post is well earned:

The Fed Audit - Newsroom: U.S. Senator Bernie Sanders (Vermont)

The first top-to-bottom audit of the Federal Reserve uncovered eye-popping new details about how the U.S. provided a whopping $16 trillion in secret loans to bail out American and foreign banks and businesses during the worst economic crisis since the Great Depression. An amendment by Sen. Bernie Sanders to the Wall Street reform law passed one year ago this week directed the Government Accountability Office to conduct the study. "As a result of this audit, we now know that the Federal Reserve provided more than $16 trillion in total financial assistance to some of the largest financial institutions and corporations in the United States and throughout the world," said Sanders. "This is a clear case of socialism for the rich and rugged, you're-on-your-own individualism for everyone else."

Among the investigation's key findings is that the Fed unilaterally provided trillions of dollars in financial assistance to foreign banks and corporations from South Korea to Scotland, according to the GAO report. "No agency of the United States government should be allowed to bailout a foreign bank or corporation without the direct approval of Congress and the president," Sanders said.

The non-partisan, investigative arm of Congress also determined that the Fed lacks a comprehensive system to deal with conflicts of interest, despite the serious potential for abuse. In fact, according to the report, the Fed provided conflict of interest waivers to employees and private contractors so they could keep investments in the same financial institutions and corporations that were given emergency loans.

For example, the CEO of JP Morgan Chase served on the New York Fed's board of directors at the same time that his bank received more than $390 billion in financial assistance from the Fed. Moreover, JP Morgan Chase served as one of the clearing banks for the Fed's emergency lending programs.

In another disturbing finding, the GAO said that on Sept. 19, 2008, William Dudley, who is now the New York Fed president, was granted a waiver to let him keep investments in AIG and General Electric at the same time AIG and GE were given bailout funds. One reason the Fed did not make Dudley sell his holdings, according to the audit, was that it might have created the appearance of a conflict of interest.

To Sanders, the conclusion is simple. "No one who works for a firm receiving direct financial assistance from the Fed should be allowed to sit on the Fed's board of directors or be employed by the Fed," he said.

The investigation also revealed that the Fed outsourced most of its emergency lending programs to private contractors, many of which also were recipients of extremely low-interest and then-secret loans.

The Fed outsourced virtually all of the operations of their emergency lending programs to private contractors like JP Morgan Chase, Morgan Stanley, and Wells Fargo. The same firms also received trillions of dollars in Fed loans at near-zero interest rates. Altogether some two-thirds of the contracts that the Fed awarded to manage its emergency lending programs were no-bid contracts. Morgan Stanley was given the largest no-bid contract worth $108.4 million to help manage the Fed bailout of AIG.

A more detailed GAO investigation into potential conflicts of interest at the Fed is due on Oct. 18, but Sanders said one thing already is abundantly clear. "The Federal Reserve must be reformed to serve the needs of working families, not just CEOs on Wall Street."

To read the GAO report, click here.

Alchemy and Debt Demons - FAIL DOT GOV sHuTdOwN2011 - The All-True Esoteric story behind the 2011 Government Shutdown

FEDERAL SHUTDOWN 2011: The Untold Story -
long story short, our narrative ends with The Jesus giving everyone SHROOMS. Alchemy and accountants, the Shutdown revealed mysterious & esoteric truths underlying our post-masonic Nation.

[ I had a couple folders sitting around with new, weird & funny images. Dropped these pics in and wrote a weird story, kind of Conspiracy JPEG Mad Libs :-]

Illuminaticardgame-PlagueofDemons.jpg

It Began with a Plague of Debt Demons



Cruikshank_-_The_Radical's_Arms.png

Tea Party Jacobins at it again (classic political cartoon from the French Revolution)


1101740930_400.jpg

They switched to Aviators in the next decade or so.

Below the fold: more of the Mysteries!

Currency turbulence and FEMA cyberwarfare excitement, Awlaki to Pentagon in terrorfail, expect savage austerity

The old days... "The BCCI scandal gave citizens of the world a rare glimpse into the inner workings of the covert global banking intelligence power structure, revealing power politics in its purest form. ".... -link

Now that's what I call a currency war! DXZ Flash Crash Detonates Entire Currency Complex | zero hedgeDXZ 10.22.jpg

Wowz! .... let's hit some random links. 70% Of All Stock Market Trades Are Held for An Average of 11 SECONDS → Washington's Blog and earlier "It's Not A Market, It's An HFT 'Crop Circle' Crime Scene" - Further Evidence Of Quote Stuffing Manipulation By HFT | zero hedge. QE2 lookin to be bad news. Weird reference to federal reserve & civil war in TIME blog. Expect Savage Austerity. Lawrence Kotlikoff - The Fed And Treasury's Actions Are Equivalent To Child Abuse: "If things continue as we adults have planned, our nation’s debt, measured as a share of gross domestic product, will reach Greek levels just when the grandkids start heading to work. At that point, simply stabilizing the debt-to-GDP ratio will require raising taxes by 50 percent, thereby lowering the grandkids’ living standard from 74 to 61."

Bloomberg - election financed by Shadow Parties. Half of US teens meet criteria for mental disorder. Bankruptcy judge bombshell - never approved sale of Lehman bros.

There was a fine tradition of immigrant voting in MN back in the day - Voting instructions to recent immigrants | Museum Collections Up Close : MNHS.ORG

We've had a tough series of events in MN this week -- the IWW's first round of voting at Jimmy Johns fell about 20 votes short of conquering the Minneapolis part of the franchise, forcing the management to go with illegal tactics all around.

Anwar Al-Awlaki, radical Islamic cleric wanted by the CIA, ate lunch at Pentagon after 9/11: reportDOJ AIPAC File press clippings investigation

Jimmy John’s Employees in Minneapolis Reject Bid to Join Union - BusinessWeek - [owner] told workers the I.W.W. is a “socialist-anarchist” group, and that the union likely won’t improve their working conditions.

“They’re trying to take down the quick-service industry,” said Mulligan, who became a franchisee after he retired from Supervalu as a way of going into business with his son. “Our employees don’t deserve these people, and these people don’t deserve our employees.”

lulz - they had to cheat to win IWW release sez.

Tough times for NPR: Some guy writing about 'ruppert murdock' has the funny stuff on a George Soros NPR venture called "Impact of Government". Crossposted into the breitbart world and spellchecked. What can I say? I basically like public radio, but they are in quite a fix. Juan Williams is colossally annoying, and now he's wrecked pledge week for them. NPR needs to get hardcore, more angry. Less of this cool attitude. That would garner respect. More: The real danger from NPR's firing of Juan Williams - Glenn Greenwald

Raw Milk Revolution, police state for calories & moar: FDA's war on food contracts

Raw Milk Revolution also explores the debate between the germ theory of illness, to which Western (allopathic) medicine subscribes, and the holistic theory (homeopathic), which the probiotics community hails. One seeks to wipe out all microbes (via drugs, vaccines and pasteurization) to make food sterile. The other recognizes that microbes act in accord with the biological terrain in which they live, and so promotes consuming live foods that boost “friendly” bacteria. (Thischart, which also appears in the book, nicely lays out the differences. For a more detailed explanation, see Biological Terrain vs Germ Theory.)

Gumpert quotes the probiotic argument: “People certainly can and do get sick from pathogens, but they do so because of failures in their own immune systems, rather than because the germs are so strong.” He then refers to “an entire body of research [that] has emerged on the benefits of probiotics in preventing illness.”

Recognizing this ideological difference, Salatin asks, “Is not freedom to choose our food at least as fundamental a right as the freedom to worship?”

Fun with Scribd: I've been having fun posting documents on Scribd. check em: old tract about the jesuit conspiracy: A Glimpse of the Great Secret Society, and a true nifty classic, Manly P Hall - The Secret Teachings of All Ages, the spy situation for Homeland Security and social media, DHS SNMC Inauguration Monitoring, the Minneapolis Police RNC After Action Report, the Wells Fargo Tsunami Repurchase Process Overview October 2010, DOJ AIPAC File press clippings investigation, etc.

Not a bad discussion with Alan Watt - even including TV frequencies for alpha wave entrainment as government mind control - YouTube - Alan Watt: The Neo-Eugenics War On Humanity 3/4 - a whole series there.

Awlaki PSYOPS LOLfail - it appears yet again that Anwar Awlaki is a fake CIA type intel puppet figure, a kind of attractor figure to the would-be western jihadis (You gotta wonder, with these high profile cats like him, Julian Assange, etc.). Reminds one of Emmanuel Goldstein, or the Zarqawi propaganda campaign. EXCLUSIVE: Al Qaeda Leader Dined at the Pentagon Just Months After 9/11 - FoxNews.com - Anwar Al-Awlaki, radical Islamic cleric wanted by the CIA, ate lunch at Pentagon after 9/11: report - part of the earlier pattern claimed by the AlexJones/Webster Tarpley type guys Al-Qaeda Mastermind Invited To Pentagon After 9/11 - Al-Qaeda Is A Front Group For The US Military-Industrial Complex etcetecetc.. i.e Major Hasan Of Fort Hood: A Patsy In A Drill Gone Live?

Cyberwar what? This sounds not good U.S. Says Military Can Respond to Domestic Cyberthreats - NYTimes.com- commentary - Obama Tells Pentagon to Attack “Cyberthreats” On American Soil -

NYT! The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.

Under the new rules, the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.

Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should the military take over such domestic operations.

The rules were deemed essential because most of the government’s computer-network capabilities reside within the Pentagon — while most of the important targets are on domestic soil, whether within the government or in critical private operations like financial networks or a regional power grid.

The new approach will begin with a Department of Homeland Security team deploying to Fort Meade, Md., home to both the National Security Agency, which specializes in electronic espionage, and the military’s new Cyber Command. In exchange, a team of military networking experts would be assigned to the operations center at the Homeland Security Department.

The rules were detailed in a memorandum of agreement signed in late September by Janet Napolitano, the secretary of homeland security, and Defense Secretary Robert M. Gates, but they were not released until last week.

Oh man.... NSA to Assist DHS with Domestic Cyberwarfare Operations | Public Intelligence

Telepathic Critterdrug -- talking like Conway's Game of Life with telepathy and neural nets and drugs - mutation and artwork!!! A strange piece of software forked from critterding. Slashdot Technology Story | Electronic Life Makes Evolving Art. telepathic-critterdrug - YouTube - critterdrug fire mode. in a way related: about | electric sheep

New Asterisk! Asterisk- The Open Source Telephony Projects | Asterisk - Asterisk 1.8 Released with Support for Google Voice, Calendaring, and More

Denninger calls out corporatist Tea Party Takeover - Denninger, early inventor of the Tea Party motif, announces it's all been taken over by the right wing vanguard - turning scrutiny away from the vast federal economic disaster, business & etc. http://www.rawstory.com/rs/2010/10/tea-party-founder-slams-tea-party/ - on the video cenk gets lol for noting brilliant cooption:

"Yeah, that's a joke," he writes. "But so are you. All of you. Especially Sarah Palin, Newt Gingrich, Bob Barr, and douchebag groups such as the 'Tea Party Patriots.'"

Denninger writes: "Tea Party my ass. This was nothing other than the Republican Party stealing the anger of a population that was fed up with the Republican Party's own theft of their tax money at gunpoint to bail out the robbers of Wall Street and fraudulently redirecting it back toward electing the very people who stole all the ****ing money!"

Denninger runs Market Ticker, a financially-focused blog that has been strongly opposed to bank bailouts and has railed against excessive government spending. He founded the group FedUpUSA in early 2008, shortly after the collapse of investment bank Bear Stearns........

"The Tea Party was initiated as a political protest against the unlawful and in fact unconstitutional usurpation of power from the Congress and The People in the form of extortion-led bailouts of enterprises that had engaged in acts that I, and many others, believe were at least civilly actionable and in many cases crossed the line into criminal activity.

"This indictment is not limited to the nation's large banks, although it certainly starts there. The corruption of our economic and monetary systems runs the gamut from Fannie and Freddie through their ties to Congress (including literal sexual encounters in some cases), banking interests selling trash securities to everyone from pension funds on down, judges who don't judge but rather protect monied interests on Wall Street, The Federal Reserve intentionally debasing our currency and monetizing government debt, government spending that is running 40% above revenues and much more.

"In short, The Tea Party was and is about the the corruption of American Politics and the blatant and outrageous theft from all Americans that has resulted. It is about personal responsibility and enforcement of the law against those who have robbed, financially ****d and pillaged the nation.

Yet today we hear literally nothing about these issues among the so-called "Tea Party" candidates and their backers. Sarah Palin has not said one word about locking up the banksters that brought up on the housing bubble and economic collapse. Not one word about Bernanke's out-of-control Fed and the arguably unlawful monetization of Fannie and Freddie paper, not to mention the monetization of the Federal Debt.

Inside the Global Banking Intelligence Complex! What a fun essay going on here: David DeGraw :

To get a more complete understanding of our current crisis, we need to look at the history of events that led up to it. We need to peer deeply into the inner workings of the Global Banking Intelligence Complex. Without acknowledging and exposing the covert forces that are aligned against us, we will not be able to effectively overcome them.

In the past I have shied away from going too deeply into the details of the intelligence world out of fear of being written off and dismissed as a conspiracy theorist. If I hadn’t spent the majority of the past 20 years investigating global financial intelligence operations, I certainly wouldn’t believe half of this myself. Given the severity of our current crisis and the imminent devastating implications, I now realize that I must go deeper into covert activities than I publicly ever have. The information I am about to report is very well-sourced and documented, and needs to be covered before we can proceed to exposing present operations.

I: All Roads Go Through BCCI

Here is a partial list of the economic and political scandals that I investigated throughout the 1980s and early ’90s:

  • The Savings & Loan scandal;
  • Stock market manipulation and money laundering;
  • Iran-Contra Affair;
  • The October Surprise and Iran hostage crisis;
  • Iraqgate-BNL and the rise and funding of Saddam Hussein;
  • Pakistan’s nuclear program and the selling of bomb-making technology to Libya, Iran and North Korea;
  • The rise and funding of the Afghan Mujahideen (founding and funding of the Taliban and Osama bin Laden’s Al Qaeda network);
  • Illegal weapon sales to Iran and Saudi Arabia;
  • The proliferation of Middle Eastern terrorism;
  • The international drug trade run by people like Manuel Noriega and Pablo Escobar.

All of these scandals had one vital thing in common, the Bank of Credit and Commerce International (BCCI).

In December 1992, the US Senate Foreign Relations Committee on Terrorism, Narcotics and International Operations delivered a report on their investigation into the bank, entitled “The BCCI Affair.” The report would disclose the largest political corruption case in the history of the global economy. As the Senate Committee summed it up:

“BCCI’s criminality included fraud by BCCI and BCCI customers involving billions of dollars; money laundering in Europe, Africa, Asia, and the Americas; BCCI’s bribery of officials in most of those locations; support of terrorism, arms trafficking, and the sale of nuclear technologies; management of prostitution; the commission and facilitation of income tax evasion, smuggling, and illegal immigration; illicit purchases of banks and real estate; and a panoply of financial crimes limited only by the imagination of its officers and customers.

Among BCCI’s principal mechanisms for committing crimes were its use of shell corporations and bank confidentiality and secrecy havens; layering of its corporate structure; its use of front-men and nominees, guarantees and buy-back arrangements; back-to-back financial documentation among BCCI controlled entities, kick-backs and bribes, the intimidation of witnesses, and the retention of well-placed insiders to discourage governmental action.

The BCCI scandal gave citizens of the world a rare glimpse into the inner workings of the covert global banking intelligence power structure, revealing power politics in its purest form. BCCI was modeled after the world’s most powerful intelligence agencies and multinational corporations. It represented the evolution of organized crime into the new world of the global economy, rendering nation-states obsolete. BCCI transcended religions and nationalities; it cut across the entire political spectrum, uniting countries and groups that, on the surface, were considered rivals, yet were unified in their pursuit of power.

BCCI consisted of a complex alliance of intelligence agencies, multinational corporations, weapons dealers, drug traffickers, terrorists, global bankers and high-ranking government officials. It involved leaders from 73 countries and formed what was described as “an elaborate corporate spider web.”

As former US Senate investigator Jack Blum described it:

“The problem that we are all having in dealing with this bank is that… it had 3,000 criminal customers and every one of those 3,000 criminal customers is a page one story. So if you pick up on one of [BCCI's] accounts you could find financing from nuclear weapons, gun running, narcotics dealing, and you will find all manner and means of crime around the world in the records of this bank.”

Elsewhere - people resist foreclosure schemes. Weaponization of space.

Freaky dude says "this is a drill and these are blanks" when blasting away....

PublicIntelligence - Everyday coverup on Credit Reporting system - Confidential Trans Union Automated Inquiry Credit Report User Guide | Public Intelligence, TransUnion Corporation Sale of Consumer Credit Information Privacy Litigation Decision 2002 | Public Intelligence, TransUnion Illegal Sale of Personal Credit Information 2000 FTC Documentation | Public Intelligence, and finally! TransUnion Threatens Public Intelligence Over Credit Reporting Guides | Public Intelligence. See also wikileaks ain't the only one getting sigacts entries these days - (U//FOUO) ISAF Regional Command SIGACTs Maps October 4-10, 2010 | Public Intelligence - proof sigacts

Domestic intel centers lack privacy plans. Little brother cybershark feeding frenzy. Weird Exterminator truck.

William Black on the great American Bank Robbery.

Gotta dig BareBones Productions — Outdoor Puppetry and Performance Art Spectacles via Ray Bradbury Something Wicked this Way Comes -- the carnival....

Yuk - Northwest Training Range Complex EIS/OEIS - even more so - WELCOME TO THE AEROSOL SOCIETY'S WEB PAGES | The Aerosol Society - & spooky EAC 2011 : Sunday 4th - Friday 9th September 2011 | EAC Conference. Waiting around on a new chemtrailz movie -- Chemtrails 911 - Supporting Evidence

Signed up for this, why not - RTR.org - The Social Network of the Revolution (Beta) - Home Page. runs partially on MooTools - a compact javascript framework

Failed pipeline negotiations with Taliban FOIA proof!

Big ups to this dude for linking to my story -- and talkin up the big NSA Neural Spying conspiracy. Learned about Akwei vs NSA, mysterious!

These guys must have bank accounts somewhere. shush. US-trained cartel terrorises Mexico - Features - Al Jazeera English

Dice is rigged in G20 cases in Pittsburgh. Fixed Fight - News - News - Pittsburgh City Paper

Nanopollution Morgellons!! NanoTransformation, GMO Diseases Morgellons and Beyond - More: YouTube - Morgellons and Agrobacterium: The Geneticist who Warned the World Part 1- Creepy - Morgellons Exposed - Jan Smith Home Page

A little fun w tech: Inside Pivotal Labs, the Agile Force Behind Twitter and Groupon: Tech News « and OpenFile Wants to Re-Invent Local Journalism: Tech News «

Makers n takers: ReMade: The Rebirth of the Maker Movement by Electromagnate — Kickstarter - related: 5 Reasons The Future Will Be Ruled By B.S. | Cracked.com - fantastic article.

Must see looks like: YouTube - Inside Job Trailer 2010 HD

WTF - McDonalds tracks burglars by spraying them with 'artificial DNA' as they make getaway | Mail Online

New project in town: MinnPost - Introducing the MinnPost Intelligencer

Lulz - Bill Clinton ‘Lost’ Nuke Launch Codes for Months -- News from Antiwar.com

DARPA Selects Four To Develop Super Computer....

Ahh leave it there for now. Have fun and stay sharp everyone!

Sunset of Chicago's Handgun Ban: Shots on Lawrence Avenue, then SCOTUS nixes Chicago ban, plus a Detroit Chicago drive-by analysis

Back now from the US Social Forum in Detroit; stayed at friends' in Chicago and my sister's in Madison.

On the way out of Detroit Saturday, I took Michigan Avenue west into Dearborn before cutting down to I-94. On the way out of Chicago Sunday, I took Lawrence Avenue out to I-90. Michigan and Lawrence were loosely comparable, I suppose, similar medium-level urban development in a long stretch, major urban arteries but not central ones.

Michigan Ave. is partly dormant and depopulated, but as you approach Dearborn it is less vacant, with lots of fried food spots and liquor stores. And yes, some kind of stripclub unbelievably called Starvin' Marvin's. Both Lawrence and Michigan Aves. have more Arabic-marked stores as you move west, actually. But Chicago is packed with people, while Detroit is dark, sparse and quiet.

You could see a giant place like Chicago becoming Detroit, at least, easier to visualize if you've been there.

Another commonality: the gunshots. Not too many, but a few. As luck would have it, I cruised Lawrence on the last night of Chicago's handgun ban. There they were, the echoes of gunshots from handguns, their presence no more prevented in the literal sunset of the handgun ban than by a wizard's spell. Chicago had handguns to spare that night, bullets popping. Detroit had a few, but not like Chicago.

Evidently the right to have a handgun is "fundamental" according to the Supreme Court -- it fundamentally couldn't be changed despite 30 years of trying in the Windy City. Violence between armed actors in the city never really got curtailed, and the innocent bystanders never got saved.

Meanwhile the suddenly tyrannical Canadian government attacked peaceful demonstrators at the Toronto G20, one wave after another. And Canada has even more guns per capita than the United States -- this weekend, a suddenly higher degree of government tyranny than usual, yet far lower levels of gun violence overall.

It was a moment for Libertarians to be sure: the fail of the law, that last Chicago night only the outlaws had handguns. The biggest Leviathan and even the Daley Machine couldn't get a win on this one, but they got to play off the tensions it created. How many deals and schemes got made in the shadows, under the flag of the handgun ban? How many dollars changed hands? And to whom?

Why does everyone want so many guns in the first place?! Fear the neighbor, fear the government, count on a phallic totem to save you. Or else get yrself some fresh venison. Demilitarize America -- Milk not Guns!

******

Details: McDonald v. City of Chicago - ScotusWiki

Analysis by Lyle Denniston: SCOTUSblog » Analysis: Gun rights go national

Five members of the Supreme Court on Monday assured state, county and city officials not to worry: the new decision protecting a “right to keep and bear arms” against government action at any level — local, state or national — “does not imperil every law regulating firearms.” But the Court majority did not have any assurances for judges at every level, that they will be spared the duty of ruling on many forms of gun regulation that a legislature, county board, or city council has chosen to enact. And the Court gave those judges very little guidance, in its ruling in McDonald, et al., v. Chicago, on how they are to analyze those laws.

The Court did not even rule on the constitutionality of the one law that was at issue — a handgun ban in Chicago — nor did it tell the Seventh Circuit Court what constitutional standard to apply in judging that law when the case returns there. That particular law’s fate, like that of so many others around the nation, now must await a new round in court.

What the Court’s assurance aimed to do was to forecast that opponents of gun control will not win every time. But it had no authority to prevent many such battles from arising in the lower courts. It is fair to speculate that, after decades of frustration that the Second Amendment had not limited state and local power to pass gun laws, there is a pent-up demand to use it now that it is newly available as a high-powered legal weapon against such legislation. Judges, in short, are about to learn what legislators have long known: given the passionate support that exists for gun rights, virtually any attempt to curb them produces a pitched battle. The dueling of lobbyists will now be replicated by dueling attorneys.

Justice Samuel A. Alito, Jr., in the Court’s main opinion, did make one thing unmistakably clear to lower court judges: the right to have a gun for self-defense in the home is a “fundamental” constitutional right.   That one-word label carries enormous import. Ordinarily, if a right is deemed to be fundamental, any law that seeks to limit it will be judged by the stiffest constitutional test there is: it must satisfy “strict scrutiny,” meaning that it will be struck down if the government’s need for it is not “compelling” and if the approach it takes is not the narrowest possible way to get at the problem. Some laws can survive “strict scrutiny,” but not a great many do.

2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles

Jesse Trentadue: …who’s testifying about Howe had reported that the plan to bomb the Murrah building four months in advance, had gone with Strassmeir and others to scout the target – the first thing the U.S. Attorney does when Graham stops testifying is ask the judge to seal the transcript, and the judge says why, and he says, "We don’t want it getting out and mucking up the McVeigh trial: the fact that here an ATF agent, an informant, had gone to Oklahoma City to scout the Murrah building to be bombed with people other than McVeigh four months in advance." And the judge granted the order, and he ordered the transcript sealed.

*******

Jesse Trentadue is an attorney whose brother got killed in prison, probably because the FBI thought he was the Oklahoma City Bombing's enigmatic John Doe #2. Trentadue has been seeking justice for years and has finally hit an unexpected CIA FOIA lawsuit wall in the cases.

The line is still more-or-less that McVeigh was in with a bunch of FBI / ATF informants -- making the whole thing a preventable false flag attack. Also discussed here is the role of the Southern Poverty Law Center, which may have done cutout informant operations for the FBI because they couldn't get into Elohim City as a specifically "religious" compound.

Also a white supremacist style Midwestern bank robbery ring that McVeigh apparently ran with had some undercover operatives. Roger Moore, a gun dealer and wealthy veteran of the aviation world, was "held up" by Terry Nichols apparently to provide the Kinestiks needed for the Murrah bombing.

Nichols claims McVeigh spilled the beans that one top FBI agent named Potts was controlling or handling McVeigh. The a Nichols deposition about the subject is in the file directory listed below.

Additionally the FBI has obviously tampered with the videocamera evidence and in fact the video expert from the OJ Simpson trial died of a "heart attack" after telling them the tapes were obviously erased! Between that, Trentadue's unlucky brother, and one of the bank robbers, the full spectrum of international and domestic espionage operations setting up Oklahoma City emerge.

Nichols claimed McVeigh knew Elohim City was "ATF City", i.e. obviously loaded with informants, but he wanted to go there and do it anyway with the various other agencies, almost as a kind of audience or support grid for a false flag attack in Oklahoma City -- perhaps McVeigh wanted to play it out and see if they would let him pull this off?

The new CIA angle is probably related to information about Andreas Strassmeir, the German national who was involved as an informant for possibly the German BND service as well as the FBI or ATF.

Additionally there is a good discussion of how the oh-so-wonderful Southern Poverty Law Center was running informant activities, probably operating as an FBI cutout, at Elohim City. Another element is how current US Attorney General Eric Holder was the direct lead DOJ goon for covering up Trentadue's murder.

Previously in 2007: New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? | HongPong.com.

First a couple other things from Antiwar.com. Kudos to them for following this. The wall of secrecy goes right to the usual suspects.

Populism, Left and Right by Justin Raimondo -- Antiwar.com

At Least 50 Killed in Pakistan’s Weekend of Bombings -- News from Antiwar.com

Defense Spending Is Much Greater than You Think | The Beacon

*********

Key interview lays it out: They Are Lying to You About the Oklahoma City Bombing by Scott Horton -- Antiwar.com

Scott Horton interviews Jesse Trentadue, April 19, 2010

Interview conducted March 30, 2010. Listen to the interview. Scott’s collection of OKC audio clips here. Scott’s collection of Jesse Trentadue’s court files here.

For Antiwar.com and KAOS radio 95.9 in Austin, Texas, I’m Scott Horton. This is Antiwar Radio. And our first guest on the show today is Jesse Trentadue. He’s an attorney from Salt Lake City, Utah. Welcome to the show, Jesse, how’re you doing?

Jesse Trentadue: Thank you very much.

Scott Horton: I really appreciate you joining us here. All right, so, I guess I’ll give a short introduction to the story here, just to catch everybody up, and I’ll try to make the long story short if I can: Jesse’s brother, Kenneth Michael Trentadue, was tortured to death in federal custody in the summer of 1995. And it turns out the reason, the probable reason anyway that he was tortured to death in federal custody, was because it was a case of mistaken identity. They were trying to get him to admit that he was a guy named Richard Lee Guthrie, who was one of the John Does suspected in the Oklahoma City bombing. And Kenneth Trentadue, unfortunately, was just at the wrong place at the wrong time with the wrong color hair, the wrong truck, the wrong dragon tattoo on his arm, and they were just convinced that he was Richard Guthrie, and he paid for it with his life. And a massive cover-up commenced, but they didn’t realize that they were messing with Jesse Trentadue, who happens to be a lawyer in Utah and knows how to work the system to, well, approach a remedy and justice. And so this is how Jesse’s story has become one with the story, the true story, of what happened behind the Oklahoma City bombing. And just in the last week Jesse has gotten refused by the court on some motions, some Freedom of Information Act suits that he had filed against the Central Intelligence Agency for any files that they had about the Oklahoma City bombing, and even though the files that he was suing for were denied, the judge’s decision on why he was denied was full of all kinds of extra interesting things itself. So, do I have that basically right, Jesse? Please correct me if I went off the story anywhere there, and then maybe please let’s get into what the judge’s decision actually said here.

Trentadue: Nope, I think you’re absolutely right. And one of the things your listeners should know is, I didn’t start out to solve the Oklahoma City bombing. I started out to find out who killed my brother, and as it happened, every lead I came across took me back to the bombing in Oklahoma City in April of 1995, including a message I received from Tim McVeigh shortly before he was executed. I mean they sent me a message that when he saw my brother’s picture and heard what happened to him, he said that I want you to know that essentially the FBI probably killed him because they thought he was John Doe 2, who was Richard Lee Guthrie.

[......]Horton: All right, well, so, what do we find out this week? What’s in these new documents? This judge told you, no, basically, your latest suit from Freedom of Information Act against the CIA has failed, correct?

Trentadue: It has, but, as you pointed out, [the judge] did a lot for me and he did a lot for the American people. He told us things that otherwise we would never have known. What happened is, I, in order to document the link between my brother’s murder and the bombing, and the connection to Guthrie, I filed a number of Freedom of Information Act suits. I sued the FBI. This time I sued the CIA. And it was sort of on a hunch, I said to the CIA I want all documents showing your involvement in the Oklahoma City bombing or prior knowledge of that attack. And they came back and gave me 37 blank pages, 12 documents all together, 37 blank pages, and they were stamped Secret, National Security. And they said, "Oh by the way, we have all these other documents that are so super secret we can’t even give you blank pages." So…

Trentadue: Well, I sued them and said I want those documents, and the judge, of course, they came in, and it’s the very first time anyone in my Freedom of Information suits has ever asserted national security and the exemption of producing. And that’s like, it’s a rock that you can’t get around, once the government throws up national security. And they did more than that. They said to release these documents would pose a grave threat to the security of the United States of America. And the judge’s hands are tied at that point. It’s like a shield that he can’t go beyond, behind. But what he did, and I think he did this intentionally, is he wrote his opinion to let me know and the public know that there was a foreign connection to the Oklahoma City bombing. And he goes through it and he discusses the CIA’s assistance in helping prosecute Tim McVeigh and Terry Nichols. And he talks about the contacts with foreign informants, foreign witnesses. He paints a very clear picture that there was foreign involvement, and of course there has to be because the CIA is a foreign intelligence agency. By law it cannot operate within the borders of the United States unless, unless there is a foreign element here.

......Horton: Well, now, do you have any real indication as to what he’s talking about, if this is perhaps, you know, has to do with Andreas Strassmeir or whether this is, you know, along the lines of Jayna Davis and the American Enterprise Institute and trying to pin it on Middle Easterners?

Trentadue: I think it, I think it was Strassmeir, a German national and a former Army officer and counterterrorist person from the Republic of Germany. That’s my opinion. Of course he doesn’t say who, but it’s my feeling that’s the person.

.......Trentadue: No, but I think it’s significant, what he’s done. I mean, in one of the documents is talking about trying to extradite an organized crime figure from another country, that’s part of the bombing prosecution. And these things are, this is happening after, after the FBI says "We’ve caught Tim McVeigh and Terry Nichols, they’re the ones who did it, end of story." So, long after they’re telling the American public that, the CIA is running down witnesses and suspects in foreign countries for the FBI and the Department of Justice. But, I think this was important for a number of reasons. It’s the first time it’s ever been documented, no one even suspected, that the CIA was involved in the Oklahoma City bombing. And, more than that, one of the things that came out is they actually had the Geospatial Intelligence Agency involved. Now I imagine very few if any of your listeners know what that is, and I certainly didn’t until the name came up in these CIA documents. And that’s the spy satellite program the CIA operates. So you have not only the CIA involved, you have the spy satellite folks involved.

Horton: Well, you know, I wonder, after all these releases, have you figured out who was running Strassmeir exactly? I mean, it seems like it would be kind of strange if the CIA was running him the whole time and then they go doing a big investigation about him after the fact, you know?

Trentadue: I think it was a joint operation between the FBI and the German government. You remember the people they targeted were the emerging neo-Nazi movement. It came to life in the United States. It was being exported back to Europe. The German government was petrified that this would take root there. And so I think it was a joint effort by the German government and the United States through the FBI to do this, infiltrate these groups. And I’ve come across a name that makes me believe that is so, because they refer to this operation as PatCon, the FBI did, P-A-T-C-O-N, which was an acronym for Patriot Conspiracy. And I think the objective was to infiltrate the militia movement, and they targeted this group, a potentially dangerous group in eastern Oklahoma who lived in a compound called Elohim City. Strassmeir worked his way into that compound as the explosives and weapons inspector, and I think he was an agent provocateur. I think he ginned those folks up to bomb the Murrah building.

Horton: Yeah, it does seem to be a question of – well and I don’t to get too far into speculation here because honestly after all these years, you know, my memory fails, and also I’m not so sure anymore about some of the things I used to think I was more sure about, but it certainly seems as though, you know, Strassmeir was not the only FBI agent or informant in on this and that there’s enough hard evidence to show, well for example, the last time we spoke we talked about how the ATF informant, Carol Howe, was reporting back on this group of, you know, terrorist plotters and even as admitted by her ATF handler under oath, she even went with them to case the building, and then the next day drove her ATF handler on the same route and said "That’s the building we cased," before the bombing ever even happened. And, so it sure is, it sure seems pretty clear to me that, you know, there was some kind of infiltration, as you said, going on there, but then I guess the question comes down to, doesn’t it, whether it was a sting that got out of control or whether this guy Strassmeir’s mission actually was to get a bombing done. I mean, after all, there was a bombing, killed 168 people. Somebody built that bomb.

Trentadue: Carol Howe reported that four months before the bomb went off. In one of the documents reported this to the ATF, she went with Strassmeir and others to scout the target. One of the documents that came out as a result of my suing the FBI was a teletype from FBI headquarters, then Director Louis Freeh, to his field office in Oklahoma City saying that two days before the bombing McVeigh had called Elohim City to speak with Strassmeir asking for more help to carry out the attack. I mean, they clearly knew, clearly knew in advance it was going to happen. Now this is something you struggle with and I struggle with, did it go south on them, was the plan to catch the people in the act, or did they really want it to happen. I – God I had to think it – as much as I hate the FBI, I hate to think it’s the latter. You have to look at what they get when there’s a terrorist attack. They get all new funding, they get the Patriot Act, they get all these other laws that take away our rights.

.......Horton: All right, now, for anybody who remembers back then who paid attention and tried to have an unbiased eye to what was going on, I think it was pretty apparent that the trials of McVeigh and Nichols both in Denver were ridiculous sham fake trials, the kind that you would expect to see in some Third World dictatorship or something. They did nothing but bring witness after witness to talk about how sad they were and then they did nothing but exclude anybody who could shed light on what actually happened there. And in fact, I have the clip here, I guess I won’t play it now, I might try to stick it on the end of the interview here, but there’s a clip from "60 Minutes" where one of McVeigh’s jurors says, "Well, you know, if he didn’t do it, I would expect for someone to come in and testify that, you know, he was with me that day or something, and since that didn’t happen, I had to go ahead and convict." In other words, the state did not prove their case at all, the national government, the U.S. Attorney’s office, did not prove their case beyond saying we’re really, really sure it was McVeigh. Now, I don’t doubt that it was McVeigh, or not very much, I guess I got a 1% doubt, but – maybe less than 1% – but certainly there is no doubt whatsoever that they refused to put on a real trial because if they put on a real trial all this stuff about the prior knowledge and Andreas Strassmeir and Carol Howe and all the rest of it would have come out. In fact, you know, if I’m going to go as far as compare it to a Third World dictatorship, let me go ahead and add the detail, they indicted Carol Howe for having a pipe in her garage and white supremacist literature consistent with her costume as undercover informant and charged her with conspiracy to bomb people so that she would be under indictment at the time of the McVeigh trial and unable to testify. And then as soon as the trial was over they dropped the charges against her, they didn’t even try to prosecute her. It was just a scheme to keep her off the stand, even though Stephen Jones, the lawyer, tried to subpoena her over and over again, obviously.

Trentadue: …who’s testifying about Howe had reported that the plan to bomb the Murrah building four months in advance, had gone with Strassmeir and others to scout the target – the first thing the U.S. Attorney does when Graham stops testifying is ask the judge to seal the transcript, and the judge says why, and he says, "We don’t want it getting out and mucking up the McVeigh trial: the fact that here an ATF agent, an informant, had gone to Oklahoma City to scout the Murrah building to be bombed with people other than McVeigh four months in advance." And the judge granted the order, and he ordered the transcript sealed.

.......Trentadue: And it gets more incredible, I mean, one of the things I have is I have affidavits from the people who knew how the surveillance system worked in the Murrah building including one from an Oklahoma City police officer who was on the scene immediately after the blast trying to find survivors and rescue them and they’re ordered out of the building and the FBI takes the cameras down. I mean…

Horton: Mmhmm. Well, and you know there were three different bomb scares after the bombing where they said "We found an undetonated bomb, everybody run." And I guess I used to just be convinced that that meant that they found an undetonated bomb, but maybe there was something else going on there. I guess JD Cash thought that there were not internal explosives but that the ATF, for example, had a tow missile up in their offices that they had to get rid of and maybe some other things. And I guess you’re saying it sounds like one of these bomb scares was about getting rid of the security cameras.

Trentadue: It was. They went in immediately and took the cameras down off the building. And why, within minutes of the blast, when people are searching frantically due to rubble trying to rescue the people and save lives, would the FBI order the rescuers out and then remove the cameras?

........Horton: All right, now, what do you have, and you know, I just, I shouldn’t make this personal, but I guess I kind of am making it personal. Every day I turn on TV and somebody from the Southern Poverty Law Center is saying that anyone who does not approve of whatever the administration is doing at any given time is basically a neo-Nazi, basically responsible for the Oklahoma City bombing. If you’re a member of the Tea Party movement, which I am certainly not and have not much in common with, but according to them, if you’re a member of the Tea Party movement, then, well, you’re basically John Doe No. 2. And, you know, it’s extra frustrating to me since John Doe 2 apparently was an undercover FBI informant and they get to go ahead and continue to, you know, beat any dissent against a Democratic [Party] controlled government over the head with this bombing. Um, but it’s always somebody from the Southern Poverty Law Center who is the guest, the expert guest, who gets to tell us how many hate groups there are in America at any given time and conflate basically anybody to the right of Rachel Maddow together with Timothy McVeigh. And so I’m kinda curious to know what evidence you have, Jesse, that the Southern Poverty Law Center was in any way involved with the neo-Nazi/cops who did the Oklahoma bombing.

Trentadue: Well it appears, and first of all, I agree with you, it’s a sad state in our country’s history where to voice an opinion means you’re attacked from one side or the other. It means you no longer discuss things as a nation or a people. That we’ve become so divided now that you’re either one side or the other or forced into one side or the other. But for the Southern Poverty Law Center, they had, and they’ve had – they had apparently informants, another level of informant, at Elohim City at the same time that Strassmeir and Carol Howe and the other government informants were there. These documents that I’ve had them produce, and not widely reported on, refer to the Southern Poverty Law Center reporting to the FBI the information it was receiving from its informants at Elohim City about the bombing.

Horton: Now do you know who those informants were?

Trentadue: I do not.

Horton: Are there any indications whether…

Trentadue: The names are blacked out. The FBI pleaded with the judge not to turn over any of the documents because they said they had guaranteed five or six people anonymity and confidentiality and it would expose them to risk of their life if their names were disclosed, and the judge said "Well, black out the names but turn the documents over." So I have documents talking about the informants, but the informants’ names are redacted or blacked out. By their own admission they’ve had five or six there that they had promised protection.

Horton: Hmm. But I guess, are there any other… because, you know, I remember JD Cash talking about this back in the day and I forget whether he said there was any other indication as to the identities of the informants that were working with Morris Dees.

Trentadue: I suspect that Strassmeir was reporting to the Southern Poverty Law Center too.

Horton: See that was something about this, right? – was Janet Reno’s order restricting, I think this is what JD Cash told me, that there was a guideline from the Justice Department that went down that said or that in some way restricted the authority of the FBI to infiltrate groups.

Trentadue: A religious compound. I talked to JD about that and he’s absolutely right. He believed that it was a cutout operation that the FBI was, that the Southern Poverty Law Center was a straw man being run by the FBI in this operation because the FBI could not, because it was a governmental entity, invade this religious compound. And Elohim City claimed to be a right-wing Christian fundamentalist compound.

Horton: Well but there’s all kinds of other evidence that any number of these guys were actually working for the FBI as either cops or like perhaps Strassmeir paid informants, people who’ve been, you know, threatened with prosecution and then turned state’s witness and, you know, should we go down the list here? I mean there’s quite a bit of FBI work going on at Elohim City. Was it all being outsourced through the SPLC?

Trentadue: I don’t know, but I think a large part may have been, at least from the documents that I’ve been given, I mean, or that the judge has ordered released. They were very active there. But I don’t think it was all run through them. The ATF for example had Carol Howe and probably others.

War on WikiLeaks? Nasty intelligence plan to destroy "center of gravity" Wikileaks as threat to INFOSEC & Cyber CounterIntelligence: Military principle of total war against the media??


Well this is grim! The ACIC or Army Counterintelligence Center published in March 2008 a National Security Information Special Report, under the auspices of the Department of Defense Intelligence Analysis Program (DIAP). Michael D Horvath of the Cyver Counterintelligence Assessments Branch does not really believe or understand the First Amendment, apparently, and his mind must be a spooky place. It was a HQ Department of Army Production Requirement C764-97-0005 and ACIC Product ID Number is RB08-0617.

This document indicates that the Pentagon is pretty dangerous. But what else is new?

Source: U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008

U.S. Intelligence planned to destroy WikiLeaks

WikiLeaks release: March 15, 2010

keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SECRET,

NOFORN

restraint: Classified SECRET/NOFORN (US)

title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups?

date: March 18, 2008

group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; Department

of Defence Intelligence Analysis Program

author: Michael D. Horvath

link: http://wikileaks.org/file/us-intel-wikileaks.pdf

pages: 32

Description

By Julian Assange (julian@wikileaks.org)

This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks.

“The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing

sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize

the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the

insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment,

criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage

or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”.

[As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan

was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China,

Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.

The report provides further justification by enumerating embarrassing stories broken by WikiLeaks—U.S. equipment

expenditure in Iraq, probable U.S. violations of the Cemical Warfare Convention Treaty in Iraq, the battle over the

Iraqi town of Fallujah and human rights violations at Guantanmo Bay. Note that the report contains a number of

inaccurances, for instance, the claim that WikiLeaks has no editorial control. The report concludes with 13 items of

intelligence to be answered about WikiLeaks.


(U) Wikileaks.org—An Online Reference to Foreign

Intelligence Services, Insurgents, or Terrorist Groups?

NGIC-2381-0617-08

Information Cutoff Date: 28 February 2008

Publication Date: 18 March 2008

National Security Information

Unauthorized Disclosure Subject to Criminal Sanctions

Derived from: Multiple sources

Declassify on: Source documents marked 25X1

Date of source: 20060725

This Counterintelligence Analysis Report is published under the auspices of the Department of

Defense Intelligence Analysis Program (DIAP).

Prepared by:

Michael D. Horvath

Cyber Counterintelligence Assessments Branch

Army Counterintelligence Center

External Coordination: National Ground Intelligence Center[1]

This product responds to HQ, Department of Army, production requirement C764-97-0005.

ACIC Product Identification Number is RB08-0617.

(U) Purpose

(U) This special report assesses the counterintelligence threat posed to the US Army by the

Wikileaks.org Web site.

 

SECRET//NOFORN

SECRET//NOFORN

Page 2 of 32

(U) Executive Summary

(S//NF) Wikileaks.org, a publicly accessible Internet Web site, represents a potential force

protection, counterintelligence, operational security (OPSEC), and information security

(INFOSEC) threat to the US Army. The intentional or unintentional leaking and posting of US

Army sensitive or classified information to Wikileaks.org could result in increased threats to

DoD personnel, equipment, facilities, or installations. The leakage of sensitive and classified

DoD information also calls attention to the insider threat, when a person or persons motivated by

a particular cause or issue wittingly provides information to domestic or foreign personnel or

organizations to be published by the news media or on the Internet. Such information could be of

value to foreign intelligence and security services (FISS), foreign military forces, foreign

insurgents, and foreign terrorist groups for collecting information or for planning attacks against

US force, both within the United States and abroad.

(S//NF) The possibility that a current employee or mole within DoD or elsewhere in the US

government is providing sensitive information or classified information to Wikileaks.org cannot

be ruled out. Wikileaks.org claims that the ―leakers‖ or ―whistleblowers‖ of sensitive or

classified DoD documents are former US government employees. These claims are highly

suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or

whistleblowers is one of its primary goals. Referencing of leakers using codenames and

providing incorrect employment information, employment status, and other contradictory

information by Wikileaks.org are most likely rudimentary OPSEC measures designed to protect

the identity of the current or former insiders who leaked the information. On the other hand, one

cannot rule out the possibility that some of the contradictions in describing leakers could be

inadvertent OPSEC errors by the authors, contributors, or Wikileaks.org staff personnel with

limited experience in protecting the identity of their sources.

(U) The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal

behavior, and wrongdoing within corrupt corporations and oppressive regimes in Asia, the

former Soviet bloc, Sub-Saharan Africa, and the Middle East. To do so, the developers of the

Wikileaks.org Web site want to provide a secure forum to where leakers, contributors, or

whistleblowers from any country can anonymously post or send documentation and other

information that exposes corruption or wrongdoing by governments or corporations. The

developers believe that the disclosure of sensitive or classified information involving a foreign

government or corporation will eventually result in the increased accountability of a democratic,

oppressive, or corrupt the government to its citizens.[2]

(S//NF) Anyone can post information to the Wikileaks.org Web site, and there is no editorial

review or oversight to verify the accuracy of any information posted to the Web site. Persons

accessing the Web site can form their own opinions regarding the accuracy of the information

posted, and they are allowed to post comments. This raises the possibility that the Wikileaks.org

Web site could be used to post fabricated information; to post misinformation, disinformation,

and propaganda; or to conduct perception management and influence operations designed to

convey a negative message to those who view or retrieve information from the Web site.[3]

 

 

(U) Diverse views exist among private persons, legal experts, advocates for open government

and accountability, law enforcement, and government officials in the United States and other

countries on the stated goals of Wikileaks.org. Some contend that the leaking and posting of

information on Wikileaks.org is constitutionally protected free speech, supports open society and

open government initiatives, and serves the greater public good in such a manner that outweighs

any illegal acts that arise from the posting of sensitive or classified government or business

information. Others believe that the Web site or persons associated with Wikileaks.org will face

legal challenges in some countries over privacy issues, revealing sensitive or classified

government information, or civil lawsuits for posting information that is wrong, false,

slanderous, libelous, or malicious in nature. For example, the Wikileaks.org Web site in the

United States was shutdown on 14 February 2008 for 2 weeks by court order over the publishing

of sensitive documents in a case involving charges of money laundering, grand larceny, and tax

evasion by the Julius Bare Bank in the Cayman Islands and Switzerland. The court case against

Wikileaks.org was dropped by Julius Bare Bank, the US court order was lifted and the Web site

was restored in the United States. Efforts by some domestic and foreign personnel and

organizations to discredit the Wikileaks.org Web site include allegations that it wittingly allows

the posting of uncorroborated information, serves as an instrument of propaganda, and is a front

organization of the US Central Intelligence Agency (CIA).[4]

(S//NF) The governments of China, Israel, North Korea, Russia, Thailand, Zimbabwe, and

several other countries have blocked access to Wikileaks.org-type Web sites, claimed they have

the right to investigate and prosecute Wikileaks.org and associated whistleblowers, or insisted

they remove false, sensitive, or classified government information, propaganda, or malicious

content from the Internet. The governments of China, Israel, and Russia claim the right to

remove objectionable content from, block access to, and investigate crimes related to the posting

of documents or comments to Web sites such as Wikileaks.org. The governments of these

countries most likely have the technical skills to take such action should they choose to do so.[5]

(S//NF) Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and

whistleblowers who pass information to Wikileaks.org personnel or who post information to the

Web site that they will remain anonymous. The identification, exposure, or termination of

employment of or legal actions against current or former insiders, leakers, or whistleblowers

could damage or destroy this center of gravity and deter others from using Wikileaks.org to make

such information public.

 

 

(U) Key Judgments

(S//NF) Wikileaks.org represents a potential force protection, counterintelligence,

OPSEC, and INFOSEC threat to the US Army.

(S//NF) Recent unauthorized release of DoD sensitive and classified documents provide

FISS, foreign terrorist groups, insurgents, and other foreign adversaries with potentially

actionable information for targeting US forces.

(S//NF) The possibility that current employees or moles within DoD or elsewhere in the

US government are providing sensitive or classified information to Wikileaks.org cannot

 

be ruled out. The claim made by Wikileaks.org that former US government employees

leaked sensitive and classified information is highly suspect, however, since

Wikileaks.org states that the anonymity of the whistleblowers or leakers is one of its

primary goals.

(U//FOUO) The Wikileaks.org Web site could be used to post fabricated information,

misinformation, disinformation, or propaganda and could be used in perception

management and influence operations to convey a positive or negative message to

specific target audiences that view or retrieve information from the Web site.

(U//FOUO) Several countries have blocked access to the Wikileaks.org Web site and

claim the right to investigate and prosecute Wikileaks.org members and whistleblowers

or to block access to or remove false, sensitive, or classified government information,

propaganda, or other malicious content from the Internet.

(U//FOUO) Wikileaks.org most likely has other DoD sensitive and classified information

in its possession and will continue to post the information to the Wikileaks.org Web site.

(U//FOUO) Web sites such as Wikileaks.org use trust as a center of gravity by protecting

the anonymity and identity of the insiders, leakers, or whistleblowers. The identification,

exposure, termination of employment, criminal prosecution, legal action against current

or former insiders, leakers, or whistleblowers could potentially damage or destroy this

center of gravity and deter others considering similar actions from using the

Wikileaks.org Web site.

(U) Table of Contents

(U) Purpose

(U) Executive Summary

(U) Key Judgments

(U) Background

(U) Discussion

(U) Intelligence Gaps

(U) Conclusions

(U) Point of Contact

(U) References

(U) Appendix A: Glossary

(U) Appendix B: Methodology Used by Authors for Analysis of Leaked Tables of

Equipment for US Forces in Iraq and Afghanistan

(U) Tables

(U) Table 1. Abbreviated Listing of the Iraq Transition Team (UIC - M94216) Table of

Equipment (TOE)

(U) Table 2. Descriptive Entry of the File and How it is Catalogued by Wikileaks.org for

the NGIC Report Entitled ―(U) Complex Environments: Battle of Fallujah I, April 2004‖

[NGIC-1127-7138-06] posted on its Web site

 

(U) Figures

(U) Figure 1. M33A1 Bulk CS Chemical Dispenser

(S//NF) Figure 2. Map from Page 4 of NGIC Report Entitled ―(U) Complex

Environments: Battle of Fallujah I, April 2004‖ As Published in a Wikileaks.org Article.

 

 

(U) Background

(U//FOUO) Wikileaks.org was founded by Chinese dissidents, journalists, mathematicians, and

technologists from the United States, China, Taiwan, Europe, Australia, and South Africa. Its

Web site became operational in early 2007. The advisory board for Wikileaks.org includes

journalists, cryptographers, a ―former US intelligence analyst,‖ and expatriates from Chinese,

Russian, and Tibetan refugee communities. The ACIC does not have any information to

associate or link the ―former US intelligence analyst‖ on the Wikileaks.org advisory board with

the leakage of sensitive or classified DoD documents posted to the Web site.[6]

(U) Wikileaks.org claims to have developed an uncensorable version of the publicly available

Wikipedia interface that is intended for mass leakage of sensitive documents that expose

wrongdoing and for allowing users to comment on the documents posted to the Web site.

Through its Web site, Wikileaks.org encourages large-scale anonymous leaking and posting of

sensitive and confidential government and business documents on the Internet. Wikileaks.org

claims to have received more than 1.2 million documents from dissident communities and

anonymous sources throughout the world. If true, additional articles involving sensitive or

classified DoD will most likely be posted to the Wikileaks.org Web site in the future.[7]

(S//NF) Wikileaks.org uses its own coded software combined with Wiki, MediaWiki, OpenSSL,

FreeNet, TOR, and PGP to make it difficult for foreign governments, FISS, law enforcement

agencies, and foreign businesses to determine where a leaked document originated from and who

was responsible for leaking the document. The goal of Wikileaks.org is to ensure that leaked

information is distributed across many jurisdictions, organizations, and individual users because

once a leaked document is placed on the Internet it is extremely difficult to remove the document

entirely.[8]

(S//NF) The obscurification technology[9] used by Wikileaks.org has exploitable vulnerabilities.

Organizations with properly trained cyber technicians, the proper equipment, and the proper

technical software could most likely conduct computer network exploitation (CNE) operations or

use cyber tradecraft to obtain access to Wikileaks.org‘s Web site, information systems, or

networks that may assist in identifying those persons supplying the data and the means by which

they transmitted the data to Wikileaks.org. Forensic analysis of DoD unclassified and classified

networks may reveal the location of the information systems used to download the leaked

documents. The metadata, MD5 hash marks, and other unique identifying information within

digital documents may assist in identifying the parties responsible for leaking the information. In


 

addition, patterns involving the types of leaked information, classification levels of the leaked

information, development of psychological profiles, and inadvertent attribution of an insider

through poor OPSEC could also assist in the identification of insiders.

(U) Wikileaks.org supports the US Supreme Court ruling regarding the unauthorized release of

the Pentagon Papers by Daniel Ellsberg, which stated that ―only a free and unrestrained press can

effectively expose deception in government.‖ The Wikileaks.org Web site further states the

following:

―We aim for maximum political impact. We believe that transparency in

government activities leads to reduced corruption, better government, and

stronger democracies. All governments can benefit from increased scrutiny by the

world community, as well as their own people. We believe this scrutiny requires

information. Historically that information has been costlyin terms of human life

and human rights. But with technological advancesthe Internet, and

cryptographythe risks of conveying important information can be lowered.‖[10]

(U) The OPSEC measures used in the submission of leaked information to Wikileaks using the

Internet are designed to protect the identity and personal security of the persons or entities

sending or posting information to the Web site. Wikileaks.org claims that any attempt at trace

routing of IP addresses, MAC addresses, and other identifying information of a home computer

submissions (as opposed to cyber café submissions) through Wikileaks.org‘s Internet submission

system would require a knowledge of information available only to Wikileaks.org programmers

and to a rights organization serving the electronic community, or would require specialized

ubiquitous traffic analysis of Internet messages and routing systems. Nevertheless, it remains

technically feasible for FISS, law enforcement organizations, and foreign businesses that have

the motivation, intentions, capability, and opportunity to gain online access or physical access to

Wikileaks.org information systems to identify and trace whistleblowers through cyber

investigations, advanced cyber tools, and forensics.[11]

(U) Another method of posting leaked information to the Web site anonymously is for leakers to

use postal mail to send the information to volunteers in various countries who have agreed to

receive encrypted CDs and DVDs from leakers. These volunteers then forward the information

to designated personnel, who then upload the data on the CDs and DVDs to the Wikileaks.org

Web servers. To protect or mask the sender, leakers can take OPSEC measures such as using

Wikileaks.org encryption protocols when writing CDs and DVDs; using gloves while wrapping,

taping, handling, and mailing packages; and not including a return address or including a fake

return address on packages containing leaked information. Such measures are designed to protect

the identity of the leakers and prevent FISS, law enforcement, and postal inspectors from

intercepting the mail and decoding the information on the data storage devices in transit.

Wikileaks.org also claims that it is developing easy-to-use software to encrypt the CDs and

DVDs. Use of such methods also protects facilitators or intermediaries from harm because they

would not know the content of the encrypted submissions.[12]

(U) A Wikileaks.org spokesperson stated in early January 2007 that about 22 persons are

involved in the Open Society Initiative to make governments and corporations more accountable

 

to the citizens of the world. Wikileaks intends to seek funding from individual persons and

groups such as humanitarian organizations that fund sociopolitical activity intended to promote

democracy and human rights around the world through open access to government and business

information.[13]

(S//NF) Several foreign countries including China, Israel, North Korea, Russia, Vietnam, and

Zimbabwe have denounced or blocked access to the Wikileaks.org Web site to prevent citizens

or adversaries from accessing sensitive information, embarrassing information, or alleged

propaganda. The governments of China, Israel, and Russia have asserted that they have a right to

remove from the Internet protected government information, disinformation, and propaganda that

is intended to embarrass or make false allegations against their governments. China, Israel, North

Korea, and Russia are assessed to have state-sponsored CNE, computer network attack (CNA),

and cyber forensics capabilities that would most likely allow penetration or disrupt viewing of

the Wikileaks.org Web site. China, Israel, and Russia have used or are suspected of having used

CNA to target terrorist or dissident Web sites that have posted objectionable material intended to

embarrass, harm, or encourage terrorism or opposition to the government.[14]

 

(U) Discussion

(U//FOUO) An insider could present a potential force protection, counterintelligence, OPSEC, or

INFOSEC threat to the US Army through deliberate unauthorized release of official DoD

documents and posting of sensitive or classified information to the Internet. Several recent

postings to the Wikileaks.org Web site in November 2007 of sensitive US Army information

marked UNCLASSIFIED//FOR OFFICIAL USE ONLY and in December 2007 of US Army

information classified SECRET//NOFORN highlight the insider threat to DoD. The actual

perpetrators responsible for the unauthorized released of such documents could be subject to

administrative action, nonjudicial punishment, or criminal charges and prosecution if they are

identified.

Young: "The Internet is a giant spying machine right now": Windows 7 Law Enforcement Sensitive Guide & more Lawful Interception compliance manuals: Welcome to the Machine!

Got BitLocker? Feel a bit r00ted???

201002282254.jpg

[It was later posted that this full Windows 7 law enforcement pack was actually originally posted on the very cool newer site PublicIntelligence.net: Microsoft Windows 7/Vista Advanced Forensics Guides for Law Enforcement | Public Intelligence ]

In a continuation of the excitement around Microsoft's confidential Law Enforcement guide hitting Cryptome.org, now several more Law Enforcement Sensitive PDFs about Windows 7 have been posted, including a lot of detailed information about examining BitLocker drive encryption and potentially cracking it: "We can also see the Recovery Key ID number" and a series of hex addresses, it says (win7-bit-spy.pdf p 67).

With all the guides Cryptome has posted for PayPal, MySpace, AOL, SKype, Yahoo! & others, one can certainly get a clearer picture of implementations of government demands, but also these training manuals created by the companies clearly illuminate their own intent. Also, who else has had this information? Isn't it deceptive marketing to peddle products with such backdoors or intended weaknesses?

[ I tried sending this into Slashdot ]

For now teh file is @ http://cryptome.org/isp-spy/win7-spy.zip

also: Microsoft Watch - Microsoft 'Spy Guide' Is Worth a Read

More Lawful Interception & Spying Guides: This should be more than enough for anyone! Thank you, Cryptome :)

facebook-spy.pdf Facebook Lawful Spying Guide February 20, 2010
aol-spy.pdf AOL Lawful Spying Guide February 20, 2010
skype-spy.pdf Skype Lawful Spying Guide February 20, 2010
cox-spy.pdf Cox Communications Lawful Spying Guide February 20, 2010
ning-spy.pdf Ning Lawful Spying Guide February 20, 2010
myyearbook-spy.pdf myYearbook Lawful Spying Guide February 20, 2010
stickam-spy.pdf Stickam Lawful Spying Guide February 20, 2010
usps-spy.pdf US Postal Service Mail Spy Request 1 February 20, 2010
usps-spy2.pdf (ok) US Postal Service Mail Spy Request 2 February 20, 2010
yahoo-preserve.pdf Lawful Yahoo Records Preservation Letter February 20, 2010

microsoft-spy.zip(ok) Microsoft Global Criminal Spy Guide February 20, 2010 (1.6MB)

cisco-spy.pdf Cisco Lawful Spying February 12, 2010
3gpp-spy.htm 3GPP Lawful Spying and Security February 11, 2010
ntia021110.htm Federal Radio Frequency Management Manual February 11, 2010
fincen021010.htm Expansion of Financial Spying February 10, 2010

fema021010.htm National Disaster Recovery Framework February 10, 2010

paypal-spy.zip PayPal Spying Guide February 25, 2010 (932KB)

myspace-spy.pdf MySpace Spying Guide February 25, 2010

dhs012110.pdf DHS Haiti Social Media Disaster Watch February 16, 2010

ms-decafme.htm Decafme Gets Microsoft COFEE Takedown Notice January 21, 2010

doj-isp-spy.pdf DoJ Reports Patriot Act ISP Spying Disclosures January 19, 2010

intercept-study.htm Vulnerability of Communications to Interception January 16, 2010
dodd-3020-40.pdf DoD Responsibilities for Critical Infrastructure January 16, 2010

att-spy-doc-01.pdf ATT Lawful Spying Document 1 December 6, 2009

att-spy-doc-02.zip ATT Lawful Spying Document 2 December 6, 2009 (2.9MB)
verizon-spy.pdf Verizon Lawful Spying Guide December 6, 2009
sprint-spy2.pdf Sprint CALEA Spying Delivery System December 6, 2009
sprint-spy.zip Sprint Lawful Spying Guide December 5, 2009 (600KB)
voicestream-spy.zip Voicestream Lawful Spying Guide December 5, 2009 (626KB)

yahoo-cryptome.htm Yahoo Cryptome Messages December 5, 2009

yahoo-demand.pdf Yahoo Demands Takedown of Yahoo Spying Guide December 2, 2009
spook-wishlist.htm The Modern Spook's Data Retention Wish List December 2, 2009

yahoo-spy.pdf Yahoo Lawful Spying Guide December 2, 2009
cox-spy.pdf Cox Lawful Spying Guide December 2, 2009
sbc-ameritech-spy.pdf SBC-Ameritech Lawful Spying Guide December 2, 2009
sbc-lea-spy.pdf SBC Lawful Spying Guide December 2, 2009
ameritech-spy.pdf Ameritech Lawful Spying Guide December 2, 2009
cingular-spy.pdf Cingular Lawful Spying Guide December 2, 2009
cricket-spy.pdf Cricket Lawful Spying Guide December 2, 2009
nextel-spy.pdf Nextel Lawful Spying Guide December 2, 2009
pactel-spy.pdf Pacific Telesis Lawful Spying Guide December 2, 2009
gte-spy.pdf GTE Lawful Spying Guide December 2, 2009
nsa061606.htm NSA Ion Trap on a Semiconductor Chip December 1, 2009

Moar Awesome Stuff:

fouo-docs.htm Cryptome For Official Use Only Docs Archive October 11, 2009
ak-hss-2009.pdf Alaska 2009 Homeland Security Strategy FOUO October 11, 2009
ar-hs-train.zip Arkansas Homeland Security Training FOUO October 11, 2009 (1.1MB)
mt-hs-train.zip Montana Homeland Security Training FOUO October 11, 2009 (387KB)
oh-fly-oplan.pdf Ohio Wing Flight Operations Plan FOUO October 11, 2009
cttso-brief.zip Combatting Terrorism Physical Security FOUO October 11, 2009 (378KB)
mcc-perform.pdf Millennium Challenge Bribery Performance FOUO October 11, 2009
mcc-fraud.pdf Millennium Challenge Bribery Fraud FOUO October 11, 2009
uscg-artic-rds.zip Coast Guard Operation Arctic Crossroads FOUO October 11, 2009 (402KB)
blm-fatality.zip BLM Freeman Reservoir Fatality Report FOUO October 11, 2009 (3.8MB)

sc-robbers.pdf South Carolina Retaurant Robberies FOUO October 11, 2009
vet-rural-health.pdf Veterans Rural Health Advisory Committee FOUO October 11, 2009
army-water.zip Army Portable Water Treatment Units FOUO October 11, 2009 (1.5MB)
h1n1-vacstrat.zip US 2009 H1N1 Vaccine Strategy October 11, 2009 (540KB)
consuls-files.zip The Consuls' Files (Zipped) October 9, 2009

dodi-5240-22.pdf Counterintelligence Support to Force Protection September 26, 2009

And don't miss DHS | Council Members, Critical Infrastructure Partnership Advisory Council

Celebrity Cybermilitantism Superficiality

Dear Ms. Camilien,

Suggested readings prior to taking on the far too glib topicality of Cryptome, Wikileaks and cybermilitantism:

National Security Archive: http://www.gwu.edu/~nsarchiv/

Electronic Freedom Foundation: http://www.eff.org

Federation of American Scientists and Secrecy News: http://www.fas.org

http://www.fas.org/blog/secrecy/

The Memory Hole: http://www.thememoryhole.org/

And many similar initiatives in other countries.

Then, properly armored against misbehavior, ponder risk:

Tim May's "Cyphernomicon:" http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html

Jim Bell's "Assassination Politics:" http://cryptome.org/jya/ap.htm

Jim Bell's Trial and Conviction Files: http://cryptome.org/jya/jdbfiles.htm

And many of the other hundreds of challenging and highly informative web sites. Be cautious about those cited in the news too readily for they are rightly suspected of overmuch self-promotion -- pity those condemned to fund-raising treadmills.

Regards,

John Young

Moar from John Young on the ol Alex Jones show:

...Meanwhile the Shadow Government by They Might Be Giants: Where's the Shadow Government When You Need It?

Unmarked helicopters, hovering....

'Civil support' apparatus appears, Oh noes: Obama creates executive council of governors (to control post-apocalyptic FEMA martial law government I suppose)

Article I Section 10 Clause 3....

No State shall, without the Consent of Congress, lay any Duty of Tonnage, keep Troops, or Ships of War in time of Peace, enter into any Agreement or Compact with another State, or with a foreign Power, or engage in War, unless actually invaded, or in such imminent Danger as will not admit of delay.

LOL ""The Governors' Council now has direct control. Fear will keep the people in line. The last remnants of the Republic have been swept away."

Peter_cushing_in_star_wars.jpg

via freeper montag813

This is definitely not good news.

“The formation of the Council of Governors was required by the Fiscal Year 2008 National Defense Authorization Act which stated, “The President shall establish a bipartisan Council of Governors to advise the Secretary of Defense, the Secretary of Homeland Security, and the White House Homeland Security Council on matters related to the National Guard and civil support missions.” (NDAA FY2008, Sec 1822)”

I heard about this sneeky Governors' Council prospect a while ago, and now it is here!! Have no doubt that it's the front -- indeed, a primary front -- for advancing NORTHCOM's agenda to militarize the 'battlespace' of the United States itself.

Recently a state government official told me in hushed tones about how the benign euphemism 'civil support' actually means essentially the backdoor to Posse Comitatus restrictions on domestic military activity. Search for 'civil support teams' and you'll get the idea.

Notice how this whole thing reeks of NORTHCOM and the Pentagon. Shades of Oliver North and Rex84 to be sure.

Via Cryptogon.com the observation that the 10 governors matches the 10 FEMA regions of Doom!: Obama Establishes Council of Governors Via Executive Order: “Synchronization and Integration of State and Federal Military Activities in the United States”. Plenty more on Cryptogon, don't miss it.

Moar commentariat: LiveLeak.com - Obama Decrees: a Federal Council of Governors, American Republic replaced by “Council of Governors”?, LA TIMES: Whereas said Barack Obama orders up a new Council of Governors to talk security stuff, and the Freeper thread on it. Some Freepers of course argue that this is an unconstitutional blurring of the state and federal levels. As one asks: "Because this sounds like the Feds trying to cloak their intended attempt to federalize the state militias and National Guards with the consensus of only 10 selected Governors?" Yah.

Also well noted by paulycy: "At the same time if they are creating parallel structures of command and control to the ones that already exist then at some point the feds can shut down the existing govt entities and put its own fully-controlled and extra-constitutional infrastructure in to full power...... We need to learn more about this and any other action to set up parallel control structures and state-nullifying measures."

Wicked fantasies like this one are rolling around. The RAND Corporation proposes a US militarized police force, why not?! More spooky stuff from a decade ago.

Very soon I will try to get the story out about what their plan is for Minnesota, that's a whole ball of wax itself. Can you say National Guard drug intelligence operatives in local police forces, running I2 identity intelligence softwares?

**********

THE WHITE HOUSE Office of the Press Secretary

For Immediate Release January 11, 2010

EXECUTIVE ORDER

ESTABLISHMENT OF THE COUNCIL OF GOVERNORS

By the authority vested in me as President by the Constitution and the laws of the United States of America,including section 1822 of the National Defense Authorization Act of 2008 (Public Law 110-181), and in order to strengthen further the partnership between the Federal Government and State governments to protect our Nation and its people and property, it is hereby ordered as follows:

Section 1. Council of Governors.

(a) There is established a Council of Governors (Council).The Council shall consist of 10 State Governors appointed bythe President (Members), of whom no more than five shall be of the same political party. The term of service for each Member appointed to serve on the Council shall be 2 years, but a Member may be reappointed for additional terms.

(b) The President shall designate two Members, who shall not be members of the same political party, to serve asCo-Chairs of the Council.

Sec. 2. Functions. The Council shall meet at the call of the Secretary of Defense or the Co-Chairs of the Council to exchange views, information, or advice with the Secretary of Defense; the Secretary of Homeland Security; the Assistant to the President for Homeland Security and Counterterrorism; the Assistant to the President for Intergovernmental Affairs and Public Engagement; the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs; the Commander, United States Northern Command; the Chief, National Guard Bureau; the Commandant of the Coast Guard; and other appropriate officials of the Department of Homeland Security and the Department of Defense, and appropriate officials of other executive departments or agencies as may be designated by the Secretary of Defense or the Secretary of Homeland Security. Such views, information, or advice shall concern:

(a) matters involving the National Guard of the variousStates;

(b) homeland defense;

(c) civil support;

(d) synchronization and integration of State and Federal military activities in the United States; and

(e) other matters of mutual interest pertaining to National Guard, homeland defense, and civil support activities.

Sec. 3. Administration.

(a) The Secretary of Defense shall designate an Executive Director to coordinate the work of the Council.

(b) Members shall serve without compensation for their work on the Council. However, Members shall be allowed travel expenses, including per diem in lieu of subsistence, as authorized by law.

(c) Upon the joint request of the Co-Chairs of the Council, the Secretary of Defense shall, to theextent permitted by law and subject to the availability of appropriations, provide the Council with administrative support,assignment or detail of personnel, and information as may benecessary for the performance of the Council's functions.

(d) The Council may establish subcommittees of the Council. These subcommittees shall consist exclusively of Members of the Council and any designated employees of a Memberwith authority to act on the Member's behalf, as appropriate toaid the Council in carrying out its functions under this order.

(e) The Council may establish a charter that is consistentwith the terms of this order to refine further its purpose, scope, and objectives and to allocate duties, as appropriate,among members.

Sec. 4. Definitions. As used in this order:

(a) the term "State" has the meaning provided inparagraph (15) of section 2 of the Homeland Security Act of 2002(6 U.S.C. 101(15)); and

(b) the term "Governor" has the meaning provided inparagraph (5) of section 102 of the Robert T. Stafford DisasterRelief and Emergency Assistance Act (42 U.S.C. 5122(5)).

(a) Nothing in this order shall be construed to impair orotherwise affect:

(1) the authority granted by law to adepartment, agency, or the head thereof; or

(2) functions of the Director of the Office of Management and Budget relating to budgetary,administrative, or legislative proposals.

(b) This order shall be implemented consistentwith applicable law and subject to the availability ofappropriations.

Sec. 5. General Provisions. more

(c) This order is not intended to, and does not, createany right or benefit, substantive or procedural, enforceable atlaw or in equity by any party against the United States, itsdepartments, agencies, or entities, its officers, employees, oragents, or any other person.

BARACK OBAMA

THE WHITE HOUSE,January 11, 2010. ###

Syndicate content