democracy

Pirate Party Australia sets sail - with transparent principles & runoff preferences

The Pirate Party in Minnesota is starting to cruise along with several candidates for Minneapolis mayor, city council and Board of Estimate & Taxation -- a part of a larger network which includes three national parliament seats in Iceland and one in the EU parliament from Sweden.

Here are some infos from the Pirate Party of Australia including I thought an interesting set of deals with other Australian political party and friendly member support for the new Wikileaks Party as well.

Australian politics is strange, and controlled partially by outside powers such as the US/British coup-de-etat in 1975 over resistance from a labor prime minister's opposition or at least some kind of scrutiny to the NSA SIGINT bases. The classic CIA Nugan Hand bank was involved and the mini-series Counter-Intelligence by Metanoia Films - metanoia-films.org does a fantastic job exposing this underappreciated intervention against a major English-speaking ally.

In this context perhaps the Pirate Party and Wikileaks Party movements might get a good response from the electorate - improved also by general paralysis and failsauce among more recent prime ministers.

Follow: https://twitter.com/piratepartyau. also check out asher_wolf on twitter who has been posting tons of stuff lately.

/////

Great article:: Pirate Party: Pirates in the modern age | Independent Australia by Mark Gibbons - Sept 4 2013:

.....The self-styled “anti-piracy” movement invariably seeks to impose cultural and informational hierarchies and undermine civil liberties and technology. Pirates, in the political sense, seek to take the exact opposite stance.

Pirates oppose abusive hierarchies in every form. They stand with ‒ and surpass ‒ narrower groups, which oppose only government or corporate over-reach (copyright law being the fusion of both). The Internet ‒ liberator of potential and destroyer of scarcity that it is ‒ needs strong defense against control, censorship, and monitoring.

Pirates are advocating patent laws that safeguard inventions under development rather than strangling them and entrenching market domination for large players. The time has surely come to stop recognising patents on human genes. Support for science and technology puts pirates in a strong position to advocate meaningful action against climate change and many of the other scientific challenges of our age.

Abusive hierarchies melt in the face of scrutiny, openness and accountability, and whistle-blowers should always find help and support among political pirates. Free speech and privacy always need defense against perpetual undermining conducted in the guise of “striking a balance”. Pirates often advocate the withdrawal of heavy-handed state interventions in marriage rights, euthanasia and the war on drugs.

The values of pirates apply across many different areas of law and policy, but copyright law needs particular scrutiny. Copyright needs reform to protect “fair use”, and the right of artists to re-use and sample earlier works. The moral rights of creators to be identified with their work should never change. Crown copyright should be abolished to ensure the public has access to the work it has paid for. Copyright duration should be reduced to a level more consistent with supporting creative output. Non-commercial use of copyrighted material cannot be stopped, and the futile campaign of abuse against the general public should end. And the state should shift to a supportive stance with regard to live venues and facilities that provide a path for emerging artists.

Ultimately, political pirates believe that business models which must violate civil liberties in order to make money should not exist. Criminalising normal behavior in the name of anti-piracy is self-defeating: it simply makes pirates of everyone.

/////

Preferencing Statement in open process provides pretty solid basis for forming alliances with other groups in a transparent fashion.

Example pirate party greens / WA deal poster: http://imgur.com/Nn1FJ2R

YOU ARE THE METADATA campaign poster: https://twitter.com/piratepartyau/status/366140384436449280/photo/1

Detailed evidence based policies - transparently & democratically: https://twitter.com/piratepartyau/status/366516627673587712/photo/1

http://pirateparty.org.au/2013/08/18/preferencing-statement-for-federal-election-2013/

Preferencing Statement for Federal Election 2013

Preferencing Process

Pirate Party Australia has completed its preferencing for its first federal election. All group voting tickets (GVT) have been published on the Australian Electoral Commission’s website.

In keeping with the Pirate Party’s commitment to transparency and participatory democracy, this election the Party pioneered a form of preferencing unprecedented in Australian politics.

All parties were invited to provide members of Pirate Party Australia with a statement explaining why they deserve preferences.These statements can be found on the wiki.

After publishing the statements publicly, the members of Pirate Party Australia ranked all 53 registered parties according to how they should be preferenced.

A rundown of the process is as follows:

  • Party members were given a ballot listing the parties to be preferenced in an order predetermined by the Party’s Election Committee to be a good general order of preferences based on the Committee’s research. They were given three days to respond to the ballot.
  • The Committee used the preferencing order prior to the closing of the ballot in order to determine how to best go about negotiating preferences with other parties in order to get them to reciprocate the preference order determined by our members.
  • As soon as the GVT ballot closed, the deals ballot was put to our members.
  • 24 hours later, the deal results were determined and the other parties were informed.
  • The Election Committee met as soon as possible after receiving the Group Voting Tickets for each state and democratically determined any changes necessary to the GVT that were not possible to determine in advance.
    • The minutes of that meeting can be found here.
  • These results are now being published in this statement.

An example of the digital ballot that the members of the Party used to determine their preference order can be found here!

Member-determined Preference Order

The member determined preference order can be found below:

(1) Pirate Party Australia
(2) Australian Greens
(3) The Wikileaks Party
(4) Australian Democrats
(5) Secular Party of Australia
(6) Senator Online (Internet Voting Bills/Issues)
(7) Australian Sex Party
(8) Future Party
(9) Australian Independents
(10) Drug Law Reform Party
(11) Help End Marijuana Prohibition (HEMP) Party
(12) Voluntary Euthanasia Party
(13) Stop CSG Party
(14) Liberal Democratic Party
(15) Animal Justice Party
(16) Nick Xenophon Group
(17) Australian First Nations Political Party
(18) Australian Stable Population Party
(19) Carers Alliance
(20) Bullet Train For Australia
(21) Coke in the Bubblers Party
(22) Republican Party of Australia
(23) Bank Reform Party
(24) Building Australia Party
(25) Australian Sports Party
(26) Socialist Alliance
(27) Australian Voice Party
(28) Socialist Equality Party
(29) Australian Motoring Enthusiast Party
(30) The 23 Million
(31) Democratic Labour Party (DLP)
(32) Non-Custodial Parents Party (Equal Parenting)
(33) Australian Fishing and Lifestyle Party
(34) Australian Labor Party (ALP)
(35) Uniting Australia Party
(36) Country Alliance
(37) National Party of Australia
(38) Shooters and Fishers Party
(39) Liberal Party of Australia
(40) Katter's Australian Party
(41) Australian Sovereignty Party
(42) Smokers Rights Party
(43) Palmer United Party
(44) Outdoor Recreation Party (Stop The Greens)
(45) Australian Protectionist Party
(46) No Carbon Tax Climate Sceptics
(47) Australian Christians
(48) Christian Democratic Party (Fred Nile Group)
(49) Family First Party
(50) Citizens Electoral Council of Australia
(51) Rise Up Australia Party
(52) One Nation
(53) Australia First Party (NSW) Incorporated

The raw ballot data and pair-wise comparison tables can be found here.

Member-determined Preference Deals

In line with the preference order determined by the membership, the Election Committee attempted to forge deals with other parties that would result in the reciprocation of preferences as closely as possible to the decision made by the members. These deals were then put to a majority vote of the membership before they would be put in place.

The deals as put to the members that were agreed to are as follows:

Greens

The Greens offer:

  • 3rd preference in Queensland
  • 2nd preference in NSW
  • 4th preference in Victoria
  • 2nd preference in Tasmania

We offer in exchange:

  • 3rd preference in Queensland
  • 2nd preference in NSW
  • 4th preference in Victoria
  • 2nd preference in Tasmania

Wikileaks Party

The Wikileaks Party offer:

  • 3rd preference in NSW
  • 3rd preference in Victoria

We offer in exchange:

  • 3rd preference in NSW
  • 3rd preference in Victoria

Australian Democrats

The Australian Democrats offer:

  • 2nd preference in Queensland
  • 4th preference in NSW
  • 2nd preference in Victoria
  • 4th preference in Tasmania

We offer in exchange:

  • 2nd preference in Queensland
  • 4th preference in NSW
  • 2nd preference in Victoria
  • 4th preference in Tasmania

Sex Party

The Sex Party offer:

  • 8th preference in Queensland
  • 7th preference in NSW
  • 8th preference in Victoria
  • 3rd preference in Tasmania

We offer in exchange:

  • 8th preference in Queensland
  • 7th preference in NSW
  • 8th preference in Victoria
  • 3rd preference in Tasmania

Australian Democrats deal considered null and void

Due to an apparent misrepresentation by a group claiming to be representatives of the Australian Democrats as registered with the Australian Electoral Commission, the reciprocation deal between the Pirate Party and the Australian Democrats is considered null and void.

We had sent an email to info@australiandemocrats.org.au requesting someone to speak to regarding preferencing. The respondent, Stuart Horrex, claiming to be the National Secretary of the Australian Democrats, put us in contact with their alleged National Campaign Director, Dan McMillan.

We received a phone call from Mr McMillan at 7:39pm on August 12 to discuss a reciprocation deal based on the preference decisions made by our members. The phone call lasted approximately 10 minutes. We roughly agreed to some terms and continued our discussions with other groups.

On August 13 at 7:03pm, we called Mr McMillan back to confirm the terms of the arrangement to be put to our members by majority vote. These terms were sent by email to Mr McMillan with a suggestion of a slightly better deal. He responded saying they could not make a better deal, and the deal was put to members as worded, and the deal was carried by our members.

Unfortunately, the preferencing deal was not held up by the Australian Democrats, as can be seen by the group voting tickets for each state. It has become apparent that Mr McMillan and Mr Horrex do not represent the registered political party Australian Democrats, and as such, this deal is considered null and void. They seem to have falsely claimed that they represented the Australian Democrats from day one, including having a strong Twitter presence and having the first result in Google for Australian Democrats. Nothing in our communications led us to believe that these individuals were acting fraudulently, as they even provided a response to our initial email asking for information on why our members should preference them in the upcoming elections. Not only did these individuals apparently misrepresent themselves to the Election Committee, they have misrepresented themselves to over 700 members of the Pirate Party.

It has come to our attention however that the AEC has dealt with these individuals before, apparently attempting to take over the Australian Democrats by submitting documentation unsupported by the current executive. We will be reporting this matter to the AEC as we believe these actions may have contravened certain provisions of the Electoral Act and we will keep you up-to-date on the results.

The real Australian Democrats can be found at http://australian-democrats.org.au. We took part in these negotiations in good faith and we were misled. The Election Committee apologises to the members of the Pirate Party for this entire situation.

At least one thing has been proven in this preferencing debacle: the Pirate Party can be trusted to follow through with the deals democratically and transparently determined by our members.

Update (22 Aug 2013): the original group we discussed preferences with has sent us an email. We are publishing it and our response to it here.

Update (22 Aug 2013): a follow up email has been received, confirming that the period of time we negotiated was between the time they knew the AEC had denied their request and before they had filed their new appeal.

How other parties have ordered their preferences

All parties have submitted their preferencing order to the Australian Electoral Commission and can be viewed here.

Voting below the line

The Pirate Party wholeheartedly recommends that if you wish to vote below the line in this election, to assist you in limiting your chance of accidentally voting informally:

  • Place a 1 above the line for the Pirate Party. In the case where your below the line is considered informal, the above the line will take precedence and your vote will still be counted.
  • Use a service such as belowtheline.org.au or senate.io to prepare your below the line ballot in advance. (These websites are not endorsed by the Party and you should consider your privacy before entering any information into these websites)

Raw Results and Datasets

The raw results and datasets can be found here.

//////////

More Pirate Party Australia stuff including their full principles below...

MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley

Dateline: Pseudo-Secret Minneapolis (aka Fridley): What WCCO called the "secret" "City of Eyes" Strategic Information Center has been located on the Google! Your Federal Stimulus Money & FY2010 Homeland Security Appropriations At Work - A Facility for Spying on Facebook Occupy Barbecues

strategic-center-mpls.png

It's nice when data releases tie together a larger system, and we've sure got that here. It's not really "secret" but it's quite shiny & new, not well-known at all, and it is certainly has been used as a site for spying on Occupy activists without criminal predicates by the Minneapolis Police Department. [emails a bit farther down]

///// UPDATE Jan 10 2013: See How to check cops checking your driver's license, Rassmusson lawsuit settlement docs /////

The Minneapolis Police Department files about Occupy Minnesota released by a data request on Monday afternoon are turning up interesting wastes of taxpayer money -- and even the so-called "secret" Strategic Information Center & Emergency Operations and Training Facility at 25 37th Ave Northeast in Fridley, north of the city line by the river & railroad tracks.

Also known as the EOTF/SIC, let's wrangle up everything we can find. Start with architects, via Wold Architects/Engineers: City of Minneapolis EOTF | Wold Architects and Engineers

Wold Architects and Engineers designed a site and facility for the City of Minneapolis Fire Department Training Campus to include a Fire Department’s Training Division; training classrooms multi-used as an Emergency Operations Center for the City’s Emergency Preparedness; a Strategic Information Sensor Monitoring Center for the Minneapolis Police Department; and vehicle storage garages for the Fire Department’s regional asset equipment.

The design exceeds the City of Minneapolis requirement for design to meet LEED Silver.

strategic-4.png

strategic-5.pngThis state-of-the-art federally funded facility allows police to determine... the location of barbecues on Facebook, including even the number of "YES" and "MAYBE" invitees.

This facility also encompasses "Shotspotter" directional microphones all over the city - I wonder if those are ever activated besides the gunshot decibel threshold "trigger" - they are in fact pretty high-fidelity microphones, it has been disclosed (May 28 2012 NYT article) but the manufacturer denies the mics are triggered by conversations.

I for one, am glad that we spent both municipal and borrowed federal tax dollars on training the Minneapolis police to believe a Facebook "YES" invite is real. The simulacrum of today's clicks has become the strategic information of tomorrow!

The old EOC center, used in the 2007 35W bridge collapse, can be seen here via MPR and clearly lacks expensive-enough videoconferencing gear.

Here is the press release from Nov 4 2010: Minneapolis opens Emergency Operations Training Facility - City of Minneapolis

Minneapolis opens Emergency Operations Training Facility

The City of Minneapolis has opened its new Emergency Operations Training Facility, which will help emergency responders and other City staff better prepare for and respond to emergencies. The multi-purpose building helps meet the training and response needs of the Minneapolis Fire Department, the Minneapolis Police Department, and the City's Emergency Management Division, along with other regional partners.

The Emergency Operations Training Facility is a multi-purpose building that includes training classrooms for Minneapolis firefighters and metro emergency managers, a strategic information center for the Minneapolis police, the main training site for the State of Minnesota Structural Collapse Team, and an emergency operations center that will be used during significant emergencies or disasters.

The new facility is built on a 12-acre site in Fridley that the City purchased in 1990, and since that time, the site has been built out as a training facility for Minneapolis Firefighters. Over the years, a fire training tower and propane burn building have been constructed, and special equipment has been purchased to help train emergency responders for incidents involving hazardous materials and collapsed structures. The construction of the new Emergency Operations Training Facility on the site is a major step toward completing this training and response site.

The Emergency Operations Training Facility is built to a LEED Silver Quality Standard for sustainability, and it includes facilities for a wide range of emergency responders from Minneapolis and the region:

Emergency Operations Center

One of the lessons learned from the City's response to the Interstate 35W Bridge collapse in 2007 was that the City's Emergency Operations Center, located in the basement of City Hall, was too small to serve as a center for large-scale emergencies. The new facility fixes that, with 2,800 more square feet of floor space. It will also be used as a back-up Emergency Operations Center for the State, Hennepin County and the City of St. Paul.

Strategic Information Center

The Strategic Information Center is a new space where the Minneapolis Police Department will analyze data to determine long-range trends that pose potential risks to the city. It can provide emergency managers with important information during a major event, incident or disaster.

State of Minnesota Structural Collapse Team

This team serves the entire state with specialized equipment and trained personnel for urban search and rescue and structural collapse incidents. This facility will include apparatus bays for storage of emergency response vehicles and specialty equipment for the Coast Guard, State, City and Metro West region of Homeland Security. In addition, this facility will house training and classroom space, staff offices, support spaces and common spaces.

Coast Guard monitoring.

The U.S. Coast Guard will also use the facility as a monitoring location for cameras placed along the Mississippi River from St. Louis to the metro area.

Published Nov. 4, 2010

Moar casual Google Mapping:

google-streetview-mpls.png

Apparently they dropped a cool $50K on the fence in early 2012. here is the bid page "To furnish all labor, materials, equipment and incidentals necessary to accomplish the complete construction of Emergency Operations Training Facility Perimeter Fence Project, located at 25 37th Ave NE, Fridley, MN." SRC: Minneapolis, City of - Projects. [A little more on the fence industrial complex below]

google-streetview-mpls2.png

Of course, once Erin Brockovich samples those weird adjacent holding pond things, I'm sure the infamous Fridley Cancer Cluster case will be solved. Perhaps Sgt. Garcia can go out and take some samples!

google-map-mpls1.png google-map-mpls2.png

I believe at least two of structures are firefighter training buildings - later pics below seem to bear this out.

eoc-marketing-swag1.pngHere is some marketing swag about the video conferencing gear. AVI-SPL Integrates Government Emergency Operation Centers. See the PDF and video too.

eoc-marketing-swag2.pngLet's check out the $330,704 in electronically-created yet borrowed-at-interest-from-private-Fed-cartel recently invested in this barbecue monitoring center. Official less-than-informative stimulus info page: Minneapolis Recovery - City of Minneapolis Minneapolis Police Strategic Information Center.

[Naturally it is funded by the electronically created debt-digits from the Department of Justice Bureau of Justice Assistance (BJA), the same endless police pork hub that brought us all those "you might be a terrorist if you pay in cash" type intel flyers for everything from hotels to hobby stores - many of those flyers were financed by Grant Number 2007-MU-BX-K002, which I included ironically on my own site's banner art. Google it for lulz!] Here's that official page:

The City of Minneapolis is not a primary recipient on this project. No Federal Report XML is submitted for this project.

Dollars Awarded

$330,704

Project Status

Fully completed

Project Description

To establish integrated crime analysis in cooperation with the St. Paul Police Department. Staff will be located in a joint Strategic Information Center (SIC).

Funding Program

MN Department of Public Safety: Byrne Justice Assistance Grant

Responsibility for Implementation

Police Department

Funding Agency

US Department of Justice [BJA/Recovery Act]

Dollars Leveraged

Data not yet available.

Dollars Leveraged Description

Data not yet available.

Dollars Requested

$330,704

Projected Jobs Created

2

Award Type

Grant

Sub-recipient Names

Minneapolis, City of

Vendor Names

No vendors have been contracted to date.

Recovery Funds Spent to Date

$330,704

Perhaps this is even the 'secret' location Tippy spycams are constructed: a while ago prankster MPD Spokester & PIO Jesse Garcia shared pics of a camera construction room & with all the other video rigs this seems a likely spot.

Anyway finally here is the email chain which prompted this line of research. There are surely other gems, we are just barely getting started. Circa page 109 of Part 1:

strategic-center-targets-barbecue.png

The public servant on some of these emails is one Minneapolis Police Department officer Steven Otteson, who has a decidedly low Internet profile.

Poking for traces of intrepid Strategic Facebooker Otteson turns up very little - even though the email is dated June 2012, he has no listed salary on this MPD salary list: My Docstoc. Crossposted the index here: 2011 Minneapolis Police Dept Gross Salary index for Web.

A news story indicated the supervisor of the Strategic Information Center is MPD Lt. Jeff Rugel at 612-673-3428. Page 112:

rugel-bbq.png

"Why are we not getting this stuff from the SIC?" Here is stuff about why they should not have to "spend time looking it up" and it should be run through the SIC... This could kind of be the crux of the whole issue here on Page 114:

sic-track-occupy

Alright, that covers some of the new data on this SIC thing vis-a-vis obsessing on Occupy events, so let's turn to the news coverage of this facility.

Carefully shaped news coverage: Mid-2012 saw a series of mainstream media items intended to shape public perceptions this center is designed to neutralize the threats from the surveilled populace. WCCO went so far as to call it a "secret location". That is some quality Fourth Estate right there.

Coverage for this "City of Eyes" facility on WCCO March 19 2012 (video) City Of Eyes: Your Camera May Help Mpls Police Fight Crime « CBS:

MINNEAPOLIS (WCCO) – Minneapolis police are the first in the country to merge two technologies to help officers fight crime.

The Minneapolis Police Department has combined shot spotter technology and a system of cameras to help catch criminals in the act.

Authorities allowed WCCO-TV’s Reg Chapman into a secret location in Minneapolis, where a strategic information center is housed.

Minneapolis Police Deputy Chief Rob Allen said the room is where police gather intelligence.

“This is the room where we try and fuse the technology we have to monitor video cameras, to monitor the sounds of possible gunshots, and it’s where we have our officers who are trained in intelligence gathering,” he said.

The system in the room is like CBS’ Thursday night show “Person of Interest,” in which cameras are used to help save people from becoming victims of crime.

“If you can anticipate where crimes might happen, you got a far better chance of preventing them from occurring,” Allen said.

According to Allen, when a gunshot goes off, a camera turns toward the source of the sound. Strategic Information Center Commander Lt. Jeff Rugel said the technology helped solve a case where a man was shot, killed and pushed out of a moving car. The sound of the gunfire activated the cameras, which gave police their first clue.

[......]City Of Eyes

The number of cameras connected to the intelligence system is growing and helping police catch more criminals. But not all the cameras are owed by the city.

“The city owns roughly 250 cameras,” Allen said. “We can access right now … an infinite number of cameras.”

According to Allen, any camera that has an IP address, is connected to the Internet, and that police have permission to use can give information to authorities.

So whenever you are in a public space, know that you’re likely on camera. Police are using portable cameras more now than ever. They can put them where they are needed and have one up and running within an hour of the order.

Invasion Of Privacy?

But what about your right to privacy? Police say they are careful not to infringe on anyone’s rights.

“Every time we installed a camera system, we went to the neighborhood and said, ‘You know, this is what we’ve thought about doing? Do you want it or not,’” Allen said.

He says police can’t look into a place where someone has the expectation of privacy. [magic filters eh?] But police still have a wide reach, which gives criminals a greater chance of getting caught on camera.

Crime patterns are currently moving and Minneapolis police hope to add more portable cameras. Police believe if criminals know they are being watched they are more likely not to commit crimes.

Star Tribune writes about this center using Facebook to watch what the state defines as "gang members" (mysteriously, shady rich Caucasian financial operatives never seem to meet this race/age/wealth-biased deviance category schema).

Of course, this week's data release shows this has bloated out to canvassing political movements without even the semblance of illegal activity... there is no "barbecue predicate" but there are of course hourly wages to be paid by Minneapolis taxpayers for monitoring the barbecue Facebook Event. Perhaps even overtime!

Gangs sometimes fire first shots online | StarTribune by Matt McKinney July 14 2012:

Facebook has become a virtual street corner where members trade threats, mourn the dead.

"It's probably no different than any other kids, right?" said Minneapolis police Lt. Jeff Rugel. "They're sharing stuff that they used to do face-to-face or over the phone. But there's criminal stuff." [.....]

Rugel runs the police department's Strategic Information Center, where officers use technology to track crime. One of the jobs in his office amounts to monitoring Facebook full-time. They understand the teen slang and filter through thousands of innocuous and inane comments to look for the few that could solve a crime or stop one before it happens. They try to draw connections out of the Facebook networks to help document the shifting alliances on the street.

Police were aware of Facebook threats between rival gangs weeks before the shooting that killed Nizzel, but the threats weren't specific. When Rugel and his staff sees something that looks like trouble -- a known gang member says he's going to hurt someone -- they pass the information along to officers on the street.

It's a poorly kept secret that the police watch Facebook, said Rugel.

"You see comments every once in a while. 'Don't put that on Facebook. You know who's looking at it,' " he said.

Despite some users' occasional concern, many of the Facebook users monitored by police flaunt their illegal behavior online, showing themselves smoking marijuana, posing with stolen merchandise, the security tags still attached, and making gang signs. [.....]

There was also some bidding information online about the estimated $50,000 fence around the facility. Emergency Operations Training Facility Perimeter Fence Project (eBidDoc #1810882) contact: David Schlueter phone: 612-673-2834 e-mail: david.schlueter@ci.minneapolis.mn.us bid date: 01/25/2012 10:00:00 AM

Try http://io.questcdn.com/questio/projects/planholder/planholder_list.html?jobPK=1810882&userPK=&modifiable=FALSE&isQCPI=TRUE

strategic-center-fence-bidding.png

//////

garcia-yatedo.pngSome other stuff: for what it's worth, this lists PIO Jesse Garcia as being based at the Strategic Information Center.Minneapolis Police Department Employees - Professional Experience,Email,Phone numbers..Everything!: Digging deeper to: Jesse Garcia III - Strategic Information Center, Minneapolis Police Department:

It was scraped off his LinkedIn - no surprise there. But no one put it together... Jesse Garcia III | LinkedIn. I think it would be great if state law were changed so that Garcia could be cross-examined by taxpayers about the flow of drug money through the Federal Reserve Bank of Minneapolis and its member banks, let's say once a month on live community access TV. Looks like he ought to be tapped into that gigaflow of data on bankster crime intel!

Strategic Information Center

Minneapolis Police Department

September 2010 – Present (2 years 5 months)

I am a supervisor in our new intel center that focuses on:

-gang intel

-crime intel

-real time officer assist

-safety camera analysis

-Emergency Operations Center readiness

jesse.garcia@ci.minneapolis.mn.us

Public Information Officer / Media Relations

Minneapolis Police Department

October 2007 – September 2010 (3 years)

More media: Vehicle data, email access among Minneapolis legislative issues | MinnPost - Karen Boros, Nov 2, 2012. Automated License Plate Reader (ALPR) including of course the "secret" camera on nearby Plymouth Ave. N. bridge is controlled from this "Strategic Information unit" according to the article - I would assume this is the same spot it's based, unless it is somehow split:

Currently, the Minneapolis Police Department uses cameras to record the license plates, time and location of vehicles. That data is now public information that can be obtained by anyone requesting the information.

“Our concern is that if it stays public data that people can use it for inappropriate purposes,” said Deputy Chief Robert Allen. The system now doesn’t allow police to inquire how it might be used. “We’re not allowed to make a judgment,” he said.

Access to the data is controlled by about a dozen people working in the department’s Strategic Information unit.

Alright this is taking more than long enough. This thing says it is 22,178 sq ft and it is on parcel 34-30-24-43-0009.

Minneapolis, City of - Projects: An estimated $1.5 million were bid on this beast for just a small chunk of the building, closed Feb 2012.

directions to site: 25 37th Ave NE Fridley, MN 55421

bids close: 02/23/2012, 10:00:00 AM

bids received by: City of Minneapolis Purchasing Department CONSTRUCTION OF THE EOTF APPARAUS BAY ADDITION 330 Second Avenue South Suite 552 Minneapolis, MN 55401

estimated value: $1,500,000.00

project completion date: 08/15/2011

pre-bid meeting information: A Pre-Bid Meeting and site tour will be held on February 15th, at 11:00 AM, Local Time in Room 128 at the Emergency Operations Training Facility located at 25 37th Ave NE, Fridley MN. All interested bidders should attend this meeting.

addenda: 1

project description: Scope of Work Includes: Complete construction of the Apparatus Bay Addition at the City of Minneapolis Emergency Operations Training Facility. This work shall include all labor, equipment, materials, installation, handling, delivery at site, necessary insurance and permits, erection and other required items for general, civil, landscaping, demolition, structural, architectural, mechanical and electrical construction and stability as shown on the plans and specifications.

additional description: This Contract contemplates the complete construction of the Emergency Operations Training Facility Apparatus Bay Addition for the Minneapolis Fire Department located at 25 37th Avenue NE., in Fridley, all in accordance with the Contract Documents. This Project has been designed to comply with the requirements of the State of Minnesota Sustainability Building Guidelines B3 (MSBG B3) Version 2.1 and also the U.S. Green Building Council’s Leadership in Energy and Design ( USGBC LEED®) Rating System. It is the intent of this Contract that the Project shall become MSBG B3 Version 2.1 Certified and LEED® SILVER level of quality building under the LEED®-NC Rating System. Work to be performed consists of the furnishing of all materials, machinery, equipment, labor, supplies, tools, transportation, and other incidentals necessary or convenient to complete the work as shown in the Contract Documents on file in the Minneapolis Finance Department, Property Services Division and with the Purchasing Agent of the City of Minneapolis.

owner: City of Minneapolis

350 South 5th Street, Room 223

Minneapolis , MN 55415

ph: 612-673-3774

contact: Chris Backes e-mail: chris.backes@ci.minneapolis.mn.us

Soliciting Agent: Soliciting agent

Minneapolis, City of

330 2nd Ave. S. Suite 552

Minneapolis, MN 55415

ph: 612-673-2834

fax: 612-673-3565

contact: David Schlueter e-mail: david.schlueter@ci.minneapolis.mn.us

It was used to host a session of the 10,000 Lakes Chapter of the International Code Council. [pdf]

The site's address is place on things like preparedness for your pet: Emergency Preparedness - City of Minneapolis && stuff about exercises (again on the sidebar) City Preparation - City of Minneapolis - the 'meh' front page: Emergency Preparedness - City of Minneapolis. Really need to improve page titles at the city. Perhaps after the election?

Awards - City of Minneapolis:

Minneapolis wins its second Tekne Award

Minneapolis Emergency Operations Training Facility

November 2011: The Minnesota High Tech Association recognized the City of Minneapolis and its Emergency Operations Training Facility with an award at the 2011 Tekne Awards, held Nov. 3 at the Minneapolis Convention Center. The Tekne Awards recognize Minnesota companies and individuals who have shown superior technology innovation and leadership.

The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.

The Minneapolis Fire Department, Police Department, and Emergency Management division opened the EOTF/SIC in August 2010 as a place where they and other emergency responders could coordinate more closely than had ever been possible before. The facility recently demonstrated its effectiveness during the response to the May 22 tornado that struck north Minneapolis.The multi-purpose building also provides training space for emergency responders.

Here it was, the first one: Minneapolis Emergency Operations Training Facility wins Tekne award - City of Minneapolis: The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.... and earlier: Oct 18, 2011: Minneapolis Emergency Operations Training Facility a finalist for Tekne award - City of Minneapolis

Mpls. Unveils New Emergency Operations Center | Crime | Downtown News - Nov 4 2010, KSTP Gail Brown: Congressman Keith Ellison secured $750,000 for the project in a 2010 appropriations bill, and he will be attending a ribbon cutting ceremony at 2:30 p.m. along with Minneapolis Mayor R.T. Rybak, City Council President Barb Johnson and other city leaders.

Ellison Secures $750,000 for Minneapolis Emergency Operations Center - Ellison.House.gov Oct 15 2009:

Washington, D.C. – Congressman Keith Ellison (D-Minneapolis) secured a $750,000 appropriation for the City of Minneapolis to build a new Emergency Operations Center in a bill approved by the House today. The funds were included in H.R. 2892, the Homeland Security Appropriations Bill for FY 2010.

Roughly the same stuff in this Council Prez Barb Johnson doc.

It's on Pinterest - see Government & Military for tons of funny stuff including everything from the avispl swag people above. And also: AV Products We Love / Minneapolis Emergency Operations Training Facility

There is a blog post about training there on the Mpls Dept of Civil Rights by Anthony Johnson - Civil Rights Urban Scholars with a helpful slideshow. Tony’s Voice: Our Day As Fire Fighters! | Minneapolis Department of Civil Rights.

strategic-center-3.png strategic-center-2.png strategic-center-1.png

I think you can see this fire training structure (or maybe a similar one) on Google Maps though I have not swung by to check out the Facility myself. Another one:

Minneapolis Emergency Services Employ projectiondesign - AVNetwork.com (undated? A couple pix included)

Fredrikstad, Norway--The City of Minneapolis has deployed 12 projectiondesign F32 DLP projectors as the main display source in the Analyst Room and F22 series projectors in the Incident Command Room of its Emergency Operations Training Facility (EOTF).

Located just outside Minneapolis, the EOTF boasts an extensive surveillance, audiovisual and network infrastructure specified and installed by systems integrator AVI-SPL.

“In a facility like this, even the slightest compromise in performance can result in tragic consequences,” said Fred Primoli, regional VP Sales for AVI-SPL. Primoli and his colleagues worked with the city for nearly two years on the concept, planning and final implementation of the EOTF, with the primary challenge being an interesting one: the creation of a state-of-the-art communications facility that may get activated no more than once in a decade.

“We needed systems that were capable of totally robust operation 24 hours per day, seven days per week – but which also were capable of performing at their best after extended periods of inactivity.

“From the outset we were delighted with the performance of the F32 projectors. The Analyst Room has three rear-projection screens, each measuring 160 inches wide by 120 inches tall, with four projectors driving each screen so that four separate windows can be shown on each one.

“The projectors have been superbly colour-matched to ensure consistency across each screen, while their excellent resolution, contrast and brightness mean they are equally at home showing video or data sources – which is important in an installation such as this where the staff need to a view a combination of both.”

Deputy Chief Robert Allen, a veteran of the Minneapolis Police Department, said: “The new display system allows us to look at a video feed and understand a situation almost instantly. Through video, we can get information to our officers much faster – especially when time is critical. We can zoom in with our cameras and really examine a situation and relay it back to our officers, allowing them to be prepared even before they get there. With this new technology, we can see something happen faster than a police offer 50 feet away.”

F22 series projectors from projectiondesign can also be found in the EOTF’s Incident Command Room that’s used for emergency training and an actual declared emergency.

“There is a large number of emergency monitoring projects in the U.S., and we are delighted that our technology has been used to display high-resolution security-camera images in so many of them," said Anders Løkke, marketing director, projectiondesign. "The Minneapolis EOTF already demonstrated its effectiveness during the tornado that swept through the area last May and, although we would prefer it if our systems never had to be used in similar situations again, the reality is that the city is better-protected now that its providers of emergency services have such easy, immediate and accurate access to security-camera imaging from so many locations.”

“The EOTF was conceived as a place where the various Departments responsible for emergency response and management in Minneapolis could co-ordinate their efforts more closely than had previous been possible,” said Primroli.

Same stuff as May 11, 2012: Minneapolis Emergency Services Goes with Projectiondesign - Fire Apparatus

On May 20 2011 CItyPages reported on Rocco Forte, former Minneapolis fire chief, departing, and Forte talked about being pleased to help finish the complex: "After the 35W bridge collapse, the Republican National Convention, and the tornado that went through South Minneapolis, it is clear that we have one of the finest emergency management teams in the country. It was also a long time goal of mine to complete the Emergency Operations Training Facility that includes an Emergency Operations Center, Strategic Information Center as well as a training facility which seats up to 250 people per day."

Reed Construction Data estimates its cost at $3,988,400 (a more accurate cost estimate is available from RSMeans Online), they say.

There are a couple autogenerated links at Facility Management Minneapolis Product From Industrial Manufacturers, Distributers, Suppliers And OEMs.

There is some PR speak about AVI-SPL getting an award. Press Release/ InfoComm, Sound & Video Contractor Honor AVI-SPL with Two PRO AV Spotlight Awards - Audio/Video Equip./Surveillance - AVI-SPL, Inc. | PRZOOM

On March 11, 2009, the overall cost of the project was pegged by House Research as $27,403,000. SRC: www.house.leg.state.mn.us/hrd/bs/86/hf0554.pdf

This bill would grant $8,000,000 in bond proceeds to the City of Minneapolis to design, construct, furnish, and equip an emergency operations center housed in the City’s current training center and to make other improvements to the training center.

According to the 2008 budget request, the overall cost of the project is $27,403,000 with the City and Hennepin County funding the non-state funded portions of the project. The Joint Emergency Operations Center (EOC) for Hennepin County and the City of Minneapolis will be located at the Minneapolis Fire Training Campus on city owned land. The City contends the current facility is inadequate and limits the effectiveness of the command structure. The City further contends that the Minneapolis Fire Training Campus is an ideal location for the EOC as it would provide a secure operations center with enough room to respond to a major incident affecting the county. Finally, the City believes this request would provide much needed training classrooms at the Minneapolis Training Facility which is the main site for training the State Structural Collapse Team.

HF 554 Status in the House for the 86th Legislature (2009 - 2010) - this is the bill number - I suspect it probably got rolled into the omnibus bill but I will leave that to a Deep Wonk to suss out. // H.F. No. 554, as introduced - 86th Legislative Session (2009-2010).

With a pretty severe shortage of funds for both state and municipal operations, is an open-ended SIC mandate to track protest activity on Facebook really the most prudent use of funds? And doesn't this operational configuration create a chilling effect on political expression in Minneapolis? The research continues....

Mordor Mayor Rybak makes moves to hide Minneapolis panopticon: Total Minneapolis Awareness Automatic License Plate Reader records form 'retroactive surveillance' empire

rybak-licenseplate-mordor-panopticon.jpg

"It is poor civic hygiene to install technologies that could someday facilitate a police state." ~ Cryptographer/security guy Bruce Schneier (src)

We all know the old motif - Feds staking out parking lots, reporting the license plates back to Hoover. Nowadays things are a little different - computers can trivially hoover up all the unique features like license plates and faces from video signals, 24/7. These are technical capabilities that Hitler and Stalin only dreamed of. The former National Security Agency employee William Binney described the system locking into place as a "turnkey totalitarian state" is arriving one system at a time. One of those turnkeys just turned up in Minneapolis.

The word is out now that more than 2 million license plate records have been obtained through a data request, since the surveillance material consists of mostly public record fields. Minneapolis developer Tony Webster (@webster) wrote up the info on what happened here - and quite correctly calls for the government to quit holding this kind of data for a number of serious reasons. See TonyWebster.com: Minneapolis Police release 2.1 million license plate records.

Rybak wants quick action on license plate data | StarTribune.com:

A day after the city released a database containing more than two million license plate scans, Mayor R.T. Rybak wants expedited state action to make the data non-public.

The Legislature is already expected to take action this session to reclassify license plate tracking data, which is derived from cameras mounted on local police squad cars across the state. But after complying with a request for Minneapolis' entire public database -- featuring dates, times and locations of all plates scanned in a 90 day period -- Rybak wants more immediate action.

He said the request was "already in the works" before Tuesday's data release, but "it does concern me." His request to temporarily reclassify the data would, if approved by the Commissioner of Administration, prevent the city from releasing the tracking data to members of the public.

See also latest on MPR: Lawmakers mull bill to regulate automatic license plate readers Minnesota Today. I think MPR is inaccurate as MPD said they'd shortened this to 90 days from the original year, as Strib indicated. (otherwise they would have violated MN Data Practices Act by failing to release earlier public records upon request)

Minneapolis' DFL Mayor RT Rybak (@mayorRTrybak) has sprung into action to demand the records generated by Minneapolis Police Department's Automated License Plate Reader (ALPR) system become classified as "private data", which means only the government, cops, various lawyers under different circumstances, etc, could trivially get ahold of incredibly detailed data & patterns about your vehicle's movements without a warrant.

Rybak's thoughtful plan is to make sure that no one else can get that data, only that bloated galaxy of whom John Young @ Cryptome.org calls the 'authoritatives' lording the new panopticon over us.

This is our window - our snapshot of the beta test - into the hellish future of total 'retroactive surveillance' awaiting us, when all our actions are constantly recorded to be 'played backwards' whenever some bureaucratic enforcer wants to increment his career through hassling us, demanding civil fines for infractions etc.

As recent posts on this site have documented, the Minnesota Department of Transportation (which just got a new chief) is spending state taxpayer money funnelled to military-industrial contractors in order to build a local version of a GPS tracking system called Intellidrive, which would transmit every damn move, including velocity, of every tagged car.

Additionally, exposure of abusive & immoral practices in the Drug Recognition Evaluator training program (& main BCA file) resulted not in a candid cleanup by law enforcement, but stonewalling. When individual law enforcement officers invariably abuse these massive data mining deployments, as some do, is there really adequate oversight let alone punishment for turning these 'necessary' technologies into avenues of abuse?

Plus of course, what are the implications of the chilling effects of these ALPR systems? What is the price paid by society when the chilling effect of avoiding ALPRs by staying put kicks in? How many people refuse to fly because of the intrusive & abusive security measures? And what happens when municipal cameras collect data even more granular and intrusive than the federal TSA?

For more on this stuff I recommend following @webster, and @RichNeumeister, a citizen activist on nearly all data & privacy matters at the Mn State Capitol. It seems like Webster triggered the Rybak blocking him on Twitter. Classy - especially since Webster posted in this recent context he's a lifelong DFL supporter.

To quote a bit from Rich Neumeister's blog which is VERY helpful for Minnesota issues: Two meetings: prescription records and license plate scans

Now to the Criminal Justice and Juvenile Information Policy Group meeting which was to make a decision about the collection and retention of millions of records of where you and I travel if we happen to be owners of cars collected secretly by the cops.

Per Eric Roper's Star Tribune Blog post  the Policy Group made up of Commissioners, judges, and others decided to make the license scan data private, but deleted the retention of 180 days for the data if there were no hits for law enforcement investigation.

Now I have to scratch my head on this one. By deleting the retention of 180 days, is the Policy Group saying with all intents and purposes, DO NOT KEEP OR COLLECT LICENSE SCANS ON INNOCENT AND LAW ABIDING PEOPLE, or are they saying the COPS CAN COLLECT ALL THE LICENSE SCAN DATA THEY WANT ON INNOCENT AND LAW ABIDING PEOPLE AND KEEP IT AS LONG AS THEY WANT.

I am perplexed.

& also earlier: Email to Minnesota Criminal Justice Policy Group on License Plate Cameras. For what it's worth Webster tweeted this afternoon (Tues Dec 13th) that the division of the state govt that implements/sets the rules, IPAD, has NOT yet received anything new from Minneapolis about ALPR data.

The reality is that politicians are not that responsible about these data issues. Instead you get ignored, blocked on Twitter etc. I am writing another post about yet another newly relevant old case - the Norm Coleman credit card database leak which I covered at Politics In Minnesota circa January 2009, eerily similar to the new charges against alternative journalist Barrett Brown. (Posting links to data like the Coleman leak is a form of journalism & research that feds are trying to redefine [unconstitutionally] as a felony! NOT GOOD). But that is definitely a whole 'nother story....

/////

MORE ON RETROACTIVE SURVEILLANCE LIKE MINNEAPOLIS POLICE DEPARTMENT ALPR SYSTEM: (not to be confused with the practice of retroactively legalizing the earlier illegal surveillance performed by telecoms during the Bush administration). 'Retroactive surveillance' is basically a timestamped panopticon.

Retroactive surveillance is a class of technology which can easily destroy certain dimensions of 'free will' and therefore should be considered extremely carefully as a keystone type of social control system. It's my personal opinion it will take at least a century for this type of tech to be possible to be used ethically (if ever), as the ethical structures do not currently exist – a major reason we are all descending into a kind of neo-feudal technocratic authoritarianism worldwide.

cryptogon.com » NYPD and Microsoft Team Up to Peddle Retroactive Surveillance System [WSJ] - same type of camera data inputs

NYPD, Microsoft Hope to Make a Mint off New Surveillance System - National - The Atlantic Wire

Coming soon: Ubiquitous surveillance from Big Brother's wayback machine (the archive.org wayback machine snapshots many websites over time, invaluable!)

NetworkWorld, 2011: Coming soon: Ubiquitous surveillance from Big Brother's wayback machine

cryptogon.com » New Video Surveillance System Tags, Tracks and Follows

a commenter puts it well at cryptogon.com » Coming Soon: Retroactive Surveillance on Anyone: "A present anxiety of future trouble from the unforgotten past; black to the future."

A change in tune: law enforcement now aggressively promoting retroactive surveillance capabilities of license plate readers | Privacy SOS

Is there any science (social science) of retroactive surveillance?

House Passes Surveillance Bill without Retroactive Immunity | TPMMuckraker

Drug war provides cover for retroactive surveillance without probable cause | Privacy SOS

.. That's all for now - this post is licensed Creative Commons remix/reuse with attribution to Dan Feidt/Hongpong.com non-commercially, including the "sheeple style" remix image I slapped together.

"Warning shot will not be fired" by MPs trained in Martial Law in America: Military Police training: heavily patrolled domestic detention facilities, dissident/sniper warrantless searches - CONPLAN 3502 Civil Disturbance Operations training @ Ft McClellan

b. Use of Deadly and Non-deadly Force (4) (b) Warning shot will not be fired.

or better yet:

(3) In an occupied building, when the dissident's/sniper's location is unknown, all suspected rooms must be searched. The action element should try to have occupants submit voluntarily to the search of their rooms. At the same time, occupants should be questioned in an attempt to pinpoint the sniper's location. If occupants will not submit voluntarily and there is probable cause to believe that the dissident/ sniper is located in the room, a complete physical search of the room or rooms should be conducted. Use of the patrol dog will help in conducting such searches.

Another planning layer for emergency domestic military operations has been published: The 2006 US Army Military Police training manual for Civil Disturbance Operations does not concern itself with warrants in the 'search' section, indicating a certain level of Constitutional disregard in the military's planning for emergencies in what the document calls CONUS, or Continental United States.

The excellent PublicIntelligence is where this just popped up (first I saw of it anyway): U.S. Army Military Police School Civil Disturbance Operations Course | Public Intelligence - Direct PDF link (115 pages).

martial-law-mp-training-front.png

///////UPDATE JULY 11: Just talked with Alex Jones for an hour on this stuff. Here's the crib notes & PDFs you'll want to see.
/////// UPDATE July 7 AM: My interview with Darren McBreen on Infowars Nightly News: http://www.youtube.com/watch?v=fNw_m7gfqXM // Prisonplanet stories by Kurt Nimmo and "Army Manual Outlines Plan To Kill Rioters, Demonstrators In America" by Paul Watson.. Also I put it on Reddit One & Two

///////

I've only had time to read a bit of it so far, but it ties in very closely with another level of this planning framework, USNORTHCOM (Northern Command) CONPLAN 3502 Civil Disturbance Operations, which is the 21st century replacement for GARDEN PLOT, the Pentagon's plan used between the 1960s and 2002 for domestic riot control & emergency operations in such settings as the LA Riots.

In 2010 I found presentation files on a US Army Corps of Engineer server - for full story please see TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed. Having seen first hand domestic military operations at the 2008 Republican National Convention & 2009 G20 Pittsburgh, the growth and use of domestic military capacity for crowd control is a more-than-hypothetical situation -- and the subsequent obfuscation of those operations by political officeholders and appointees is quite terrifying in its implications.

This Civil Disturbance Operations Subcourse training manual ties right into material cited in the CONPLAN and supporting documents, including many of the same riot control weapons. An earlier version of a very similar manual can be found via that link.

martial-law-crowd-army-weapons-mp.png

Plus this one has quizzes!!

Billeting - I swear I heard something about revolutionaries complaining about billeting earlier... Something everyone makes a big deal out of this time of year....

There is a lot of stuff about formations -

P 62: Handy tip that rioter-impressing safe-port position is a PSYOP and tiring!

(a) The safe-port position is extremely useful in making a show of force before rioters. The above mentioned carrying position is the primary method of carrying weapons in the control force formation. It allows the Soldier to control both ends of the weapon while moving in and out of the formation and advancing the crowd.

All the stuff about gathering intel against rioting/unlawful Americans is nice and creepy and they definitely aren't saying anything about the Defense Intelligence Agency or National Geospatial Intelligence Agency.

[.............]

b. Collection.

(1) Military information elements having counterintelligence resources will maintain the ability to collect civil disturbance threat data during the period in which there is a distinct threat of actual civil disorder requiring the use of federal military forces.

(2) On activation by the Department of the Army, military intelligence elements having counterintelligence capability will:

(a) Establish and maintain contact with suitable local, state, and federal authorities.

(b) Collect civil disturbance data concerning incidents, and estimate the capability of civil authorities to control the situation. This can be achieved through direct contact with civil authorities.

(c) Report collection results to the Department of the Army in accordance with current plans.

(d) Keep appropriate commanders informed. (e) Provide intelligence support to the Personal Liaison Officer Chief of Staff of the Army.

(f) Recommend methods of overt collection, other than liaison, if required, to the Department of the Army for approval.

(3) Military intelligence elements may employ methods of collection other than liaison only on order of the Department of the Army.

(4) Covert agent operations are not used to obtain civil disturbance data on persons or organizations without specific advance approval of each operation by the Under Secretary of the Army.

(5) Basically, the following vital elements of data will be required for sound planning and operations once approval has been received:

(a) Objectives of elements which are a distinct threat to cause or are causing civil disturbances.

(b) Times and locations of disturbances.

(c) Cause of disturbances.

(d) Existence of persons, groups, or organizations which have distinctively threatened or are creating disturbances.

(e) Estimated number of persons who will be or are involved in civil disturbances. (f) Assembly areas for crowds.

(g) Presence and location of known leaders and persons who are a distinct threat to cause civil disturbances.

(h) Organization and activities planned by the leaders who are a distinct threat to cause civil disturbance.

(i) Source, types and locations of arms, equipment, and supplies available to the leaders who are a distinct threat to cause civil disturbance.

(j) Use of sewers, storm drains, and other underground systems by the elements who are a distinct threat to cause or are causing civil disturbances.

(k) Identification of new techniques and equipment not previously used by elements that are a distinct threat to cause civil disturbances.

(l) Attitude of general masses towards: (a) Groups causing civil disturbances. (b) Civil law enforcement authorities. (c) Federal intervention to control the disturbance.

(m) Possible threat to public property including private utilities. (n) Communications and control methods employed by elements referred to in paragraph 1 above.

PART C - Request for Federal Support/Training 1. Request for Federal Support.

a. Providing military support to state and local governments to assist them in quelling a civil disturbance or riot requires close coordination through a host of state and federal agencies. It requires a though briefing of Soldiers at all levels on what they can and cannot do with respect to law enforcement. Civil authorities must be briefed on the restrictions placed on federal forces by the Constitution of the United States, federal statutes and laws.

b. Under the Constitution of the United States and United State Codes the President is empowered to direct federal intervention in civil disturbances to:

(1) Respond to state request for aid in restoring order (2) Enforce the laws of the United States. (3) Protect the civil rights of citizens (4) Protect federal property and functions.

c. The Secretary of Defense retains approval for federal support to civil authorities involving the use of DOD forces, personnel, and equipment. The Secretary of the Army is the Department of Defense executive agent is the approval authority for federal emergency support in response to natural or man-made disasters (except weapons of mass destruction [WMD]). The Directorate of Military Support (DOMS) plans and executes the DOD domestic support mission to civil authorities. The DOMS is the DOD primary contact for all federal departments and agencies during DOD involvement in most domestic support operations. DOMS is also the staff agency responsible to the Chief of Staff, Army and Secretary of the Army for recommending to them appropriate measures necessary to cope with civil disturbances and terrorism and to transmit the approved recommendations to Department of Defense agencies for execution and to supervise the execution. The missions and functions of DOMS are outlined in AR 500-50. Additional roles of responsibilities of various agencies can be found in FM 3-19.15

Prior to activating federal military forces there is a sequence of steps that must occur. When data begins to show that a disturbance may develop into a situation that will require the help of federal forces, several actions are introduced at the federal level while state and local law enforcement agencies attempt to contain the disorder. Such actions may include increasing the readiness posture of forces named to help the jurisdiction concerned.

d. As the situation worsens and the state employs its National Guard, the U.S. Attorney General would send his personal agent to the scene of the disorder. This agent is named as the Senior Civilian Representative of the Attorney General (SCRAG) and is the organizer of all federal activities in the area of the disorder, including contact with local civil authorities. At the same time, the Chief of Staff of the U.S. Army would send his personal liaison officer (PLOCSA) to the scene along with members of the Department of the Army Liaison Team (DALT) that serves as his planning staff.

[.........] CROWD CONTROL PAGE 35+

c. Techniques for Crowd Control. There are numerous techniques designed to provide the commander with flexibility of action in accomplishing crowd control. He must select a combination which will produce the desired results within the framework of the selected crowd control option. The most common techniques appropriate for military usage are discussed below.

(1) Observation. This consists of deployment of persons or teams to the periphery of a crowd for the purpose of monitoring its activity. It includes gathering data on crowd size, location, mood, and reporting on the developing situation. This technique includes posting persons on strategic rooftops and other high terrain overlooking the crowd. This latter measure provides additional security to control force personnel should they become committed to other crowd control operations. Such a team may be composed of an expert marksman, a radio operator, and an observer equipped with binoculars. Care must be taken to assure that committed control forces are aware of the locations of such teams to prevent their being mistaken for sniper elements.

(2) Communication of Interest and Intent. In certain situations, effective communication with crowd and mob leaders and participants may enable the commander to control the situation without resorting to more severe actions. When planned and organized demonstrations, marches, or rallies within the disturbed area are announced, the control force commander in coordination with local authorities should meet with organizers of the activity in order to communicate the interest of the control forces. The following matters, as appropriate, should be discussed.

(a) Parade or demonstration permits. (b) Location of demonstration and routes of march. (c) Time limits for the activity. (d) Provision of marshals by activity organizers. (e) Prevention of violence. (f) Safety of all concerned.

(3) The task force commander and local authorities should also communicate to the activity organizers

their intent to cope with violence, unlawful actions, and violations of restrictions imposed on the activity. It is intended that, by this communication between activity organizers and control force personnel, the demonstration, rally, or parade will occur without incident through the mutual cooperation of all concerned. The intentions of control forces will not be effective if delivered as an ultimatum. A limited, begrudging dialogue with activity organizers reduces the opportunity for authorities to learn the plans of the demonstrators. It must be remembered that if this communication is not effected, the activity organizers might well hold the demonstration in defiance of local authorities, thereby creating a potential for violence that might not have existed if this technique had been employed.

d. Channelization. Pressure can be brought to bear on the dissident leadership to channel the crowd into an area which will minimize the disruption when the following requirements are met:

(1) When communications have been established with the dissident leadership.

(2) When the intent and nature of the crowd activity is known.

e. Diversion. When communication exists with the dissident leadership, consideration may be given to efforts to divert the leadership of the crowd itself from its stated or obvious objective. The diversion should support the objectives of the control force either by reducing the strength of the crowd situation or motivating the crowd to seek an area more easily controlled by the control force.

f. Cooperation. Decreasing the potential disruption of the crowd activity may be accomplished by an active attempt on the part of the control force to obtain cooperation of the dissident leadership. Whenever there is an attempt by the crowd leadership to seek permission and cooperation of the local government, every effort should be made to maximize this cooperation by demonstrating an attitude of facilitation. This may be accomplished by helping the leadership to organize a peaceful demonstration while establishing guidelines which will minimize the impact of the demonstration on the community.

g. Selection of Force Options.

(1) The commitment of federal military forces must be viewed as a drastic last resort. Their role, therefore, should never be greater than is absolutely necessary under the particular circumstances which exist. This does not mean, however, that the number of Soldiers used should be minimized. The degree of force required to control a disorder is often inversely proportionate to the number of available personnel. Doubts concerning the number of Soldiers required should normally be resolved in favor of large numbers since the presence of such large numbers may prevent the development of situations in which the use of deadly force is necessary. A large reserve of Soldiers should be maintained during civil disturbance operations. The knowledge that a large reserve force is available builds morale among military and law enforcement personnel and helps to prevent overreaction to annoying acts by unruly persons.

(2) In selecting an operational approach to a civil disturbance situation, the commander and his staff must follow the "minimum necessary force" principle; for example, crowd control formations or crowd control agents should not be used if the area filled with manpower would be sufficient.

(3) Every effort should be made to avoid appearing as an alien invading force and to present the image of a restrained and well-disciplined force whose sole purpose is to help to restore law and order with a minimum loss of life and property and due respect for those citizens whose involvement may be purely accidental. Further, while crowd control personnel should be visible, tactical, or force concentrations which might tend to excite rather than to calm should be avoided where possible.

(4) The normal reflex action of the well-trained combat Soldier to sniper fire is to respond with all firepower available. In a civil disturbance, this tactic endangers innocent people more than snipers. The preferred tactic is to allow a special reaction team (SRT) who is trained for this type of mission, to enter the building from which sniper fire starts. Keeping with the controlling principle that the team must use only the minimum force necessary to fulfill the mission, the commander may select any one of the following options for arming his Soldiers:

(a) Riot Shield. In the hands of a well trained soldier, the riot shield can be utilized as both a defensive and offensive weapon when contact is made with an aggressive crowd. The primary use of the riot shield is for defense of the line. However, each riot shield holder must be proficient in its retention. The Soldier holding the shield must be trained to react when a demonstrator grabs the top of the shield by slapping with his strong hand and gives the following command" Get back", "Get away" "Stop". If a rioter grabs the bottom of the shield the Soldier should be trained in forcefully dropping to one knee and pinning the rioters' fingers to the ground.

(b) Baton. The baton is most effective in a crowd control operation and is considered the primary weapon for crowd control operations. The baton is considered to be an offensive weapon with reduced lethality and unlike the rifle, the loss of a baton to the crowd does not create a serious threat. Soldier must be trained with the riot baton to the point its various techniques are automatic to them. This training must also include the vulnerable points on the body so they can avoid areas that may cause permanent injury or death when struck.

Currently there are two types of riot batons, wooden and expandable. The most common one is the 36 inch hickory riot baton with thong. There is also the 24-inch to 36 inch expandable riot baton, which has been added to the nonlethal capabilities set. Each Solder within the control force need to be proficiently trained in all techniques for blocking and striking. Improper use of the riot baton by an untrained Soldier has the potential for creating a greater problem than what already exist.

(c) Shotgun. The 12 gage shotgun is a pump action shotgun currently in the nonlethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3- inch chamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to the standard military issues weapon.

(d) Rifle. The rifle, if capable of automatic fire, must be modified to prevent automatic operation. Keeping with the controlling principle of using only the minimum force necessary to fulfill the mission. If the Soldier are equipped with their long weapons and are in the front lines of the formation, the weapon should be carried across their back from left to right with the muzzle of the weapon pointed down and the butt of the weapon pointed up. The weapon should be cleared and the magazine in the proper ammunition pouch.

(e) Non lethal weapons and munitions. Nonlethal weapons and munitions are an additional asset afforded to the commander in civil disturbance and are preferred over lethal force. The showing of force with nonlethal weapons and munitions may assist in crowd dispersing, separate, or leave the area with minimal causalities. This nonlethal capability set (NLCS) is a well-rounded, versatile package of both equipment and munitions. NLCS are dived into four distinct categories: personnel protection, personnel effectors, mission enhancers and training devices

(f) While each of the above options represents an escalation in the level of force, they are not sequential in the sense that a commander must initially select the first option, or proceed from one to another in any particular order. So long as the option selected is appropriate, considering the

existing threat, the minimum necessary force principle is not violated.

1. The rifle and rifle with bayonet attached have extremely limited offensive use as both may constitute deadly force. The primary value of the rifle or the rifle with bayonet attached is the psychological impact on the crowd. While the use of fixed bayonets can add considerably to this effect, the danger of intentional or accidental injury to demonstrators or fellow control force personnel prevents such use except with extremely violent crowds.

2. Fire by selected marksmen. Fire by selected marksmen may be necessary under certain circumstances. Marksmen should be pre-selected, trained, and thoroughly instructed. They may be placed on vehicles, in buildings, or elsewhere as required.

3. Full firepower. The most severe measure of force that can be applied by Soldiers is that of available unit firepower with the intent of producing extensive casualties. This extreme measure would be used as a last resort only after all other measures have failed or obviously would be impractical, and the consequence of failure to completely subdue the crowd would be an imminent overthrow of the government, continued mass casualties, or similar grievous conditions.

4. Shotgun. The riot shotgun is an extremely versatile weapon; its appearance and capability also produce a strong psychological effect on rioters. It is particularly suited to certain applications in civil disturbance operations. When used with No. 00 buckshot ammunition, it is an excellent point target weapon extremely effective at limited range. By varying the nonlethal munitions' M1012 and M1013 the weapon can be employed with considerably less possibility of serious injury or death. This provides the commander with a desirable flexibility in selecting the ammunition most appropriate under the existing conditions

(g) The measures described in paragraphs 1 through 5 below, may be applied in any order as deemed suitable by the responsible commander as long as his application is consonant with prescribed confrontation management techniques outlined earlier.

(1) Proclamation. A public announcement is considered an excellent medium to make known to a crowd the intentions of the control force commander. In some cases, such an announcement makes further action unnecessary. An announcement puts the population on notice that the situation demands extraordinary military measures, prepares the people to accept military presence, tends to inspire respect from lawless elements and supports law-abiding elements, gives psychological aid to the military forces trying to restore order, and shows to all concerned the gravity with which the situation is viewed. In making a proclamation, a commander may consider imposing a time limit. However, the situation may change, and not imposing a time limit may leave the commander other options as he sees fit, as long as the proclamation is specific in its instruction.

(2) Show of Force. A show of force is effective in various situations in civil disorder control operations. A show of force may as simple as Soldier dismounting from buses or trucks in plan sight of the demonstrators, but must be far enough away to prevent a provoked attack of thrown objects. When a crowd has gathered in a large area, show of force can take the form of marching a well-equipped, highly disciplined control force into their midst. When persons are scattered throughout the disturbance area in small groups, a show of force may take the form of motor marches of Soldiers throughout the area, saturation patrolling, and the manning of static posts or similar measures.

(3) Employment of Crowd Control Formations. Crowd control formations are used to contain,

disperse, block or break up a non conforming crowd; these crowd control formations are more effective in urban areas than they are in open fields or parks. When this method is utilized in urban areas, it is easy to disperse or split the crowd into small groups, isolate instigators, or funnel a crowd into a desired area. The use of such formations is part of the show of force and has a strong psychological effect on any crowd.

(4) Employment of Water. Water from a high pressure hose may be effective in moving small groups on a narrow front such as a street or in defending a barricade or roadblock. Personnel applying water should be protected by riflemen and in some cases by shields. In the use of water, the factors discuss below should be considered.

(a) Water may be used as a flat trajectory weapon utilizing pressure, or as a high trajectory weapon using water as a rainfall. The latter is highly effective during cold weather.

(b) The use of a large water tank (750 to 1,000 gallons) and a power water pump mounted on a truck with a high pressure hose and nozzle capable of searching and traversing will enable Soldiers to use water as they advance. By having at least two such water trucks, one can be held in reserve for use when required.

(c) In using water, as with other measures of force, certain restraints must be applied. Using water on innocent bystanders, such as women and children, should be avoided; ways to escape must be provided; and the more severe use, flat trajectory application, should be used only when absolutely necessary.

(d) Fire departments are normally associated with lifesaving practices rather than maintenance of law and order. In order to maintain this image, fire department equipment will not be used for riot control and crowd dispersal.

(e) Use of Crowd Control Agents. Crowd control agents are extremely useful in civil disorder control operations because they offer a humane and effective method of reducing resistance and lessen requirements for the application of more severe measures of force. Task force commanders are authorized to delegate the authority to use crowd control agents and other forms of non lethal force at their discretion.

2. Establish Area Control.

a. General. Acts of violence, such as looting, arson, and vandalism, are greatly reduced when the physical and psychological influence of lawlessness is defeated. In establishing effective area control, commanders must recognize the problem of widespread looting and arson that has accompanied most large urban disorders. Performance of this task consists of reducing or eliminating those conditions which contribute to the outbreak or continuation of lawlessness in the disturbed area.

(1) Looting. When dealing with persons involved in looting, extreme care and adherence to the principle of minimum force must be observed. Looting may start at any time or place as an isolated incident and spread quickly throughout the affected areas. Looting is not limited to any particular sex or age group; it includes the very old, the very young, women, and children. For example, many children may be looting without any idea of how serious their actions are. In the control of looting, unit leaders must recognize that deadly force is not authorized.

(2) Anti-looting. Unit commanders must be familiar with anti-looting measures which can be taken by civil authorities, such as boarding up broken or unbroken windows, covering windows with photo-

luminescent particles, and by the prompt posting of looting penalty proclamations. Anti-looting actions that can be taken by military forces include the establishment of foot and motor patrols, the posting of fixed guard posts, and the lighting of likely areas for looting. Guards at fixed posts will be briefed not to leave their posts to pursue individual looters on foot, but to remain on post and prevent looters from approaching their areas of responsibility. All guards must be briefed that looters will not be fired upon nor will deadly force be used to catch looters.

(3) Protected or Sensitive Commercial Establishments. A main consideration in the conduct of civil disturbance operations is to prevent liquor, drugs, weapons, and ammunition from falling into the hands of rioters. Therefore, liquor stores, drug stores, sporting good shops, pawn shops, and hardware stores are main targets for looters and must be kept under close observation by means of foot and motorized patrols. Normally, businesses of this type must be identified in advance and included in emergency plans.

(4) Arson. Arson is generally defined as a crime of purposely setting fire to a building or property. Acts of setting fire to buildings, property, etc., often follow disturbances. Certain situations may arise in controlling arson where the use of deadly force is authorized and necessary.

[.........] PAGE 40

(2) Imposed Restrictions. Except in the unlikely event of martial law, federal military forces will not have the authority to impose restrictions such as a curfew on the civilian population. Certain restrictions, however, may be imposed by civilian authorities to help in the control of lawlessness. Military leaders should be prepared to recommend which restrictions are of substantial value in comparison with the burden of enforcement. The most commonly used restrictions include:

Curfew. The curfew is a control measure which has proved highly effective in many civil disturbances. Its purpose is to restrict the unauthorized movement of personnel on streets and public places during specified periods of time, especially during the hours of darkness. Joint planning with civil authorities regarding the imposition of a curfew should provide for:

(a) Coordination of the initiation, enforcement, and termination of a curfew.

(b) Public announcements of the beginning and ending of curfews. Civilian authorities make these announcements through local mass media, pamphlets, and public address systems to ensure maximum exposure.

(c) Curfew exemptions and guidance on who should receive them, including written authorization or passes.

(d) Provision for the apprehension and disposition of curfew violators.

(3) Sales Restrictions. Restrictions on the sale, transfer, and possession of sensitive material such as gasoline, firearms, ammunition, and explosives will help control forces in minimizing certain forms of violence. Limiting the availability of weapons to the potential sniper or terrorist may reduce the likelihood of such violence. The effective enforcement of these restrictions, however, requires extensive planning and the commitment of adequate manpower to this effort.

So much for the Second Amendment SUCKAZ....

[.........] PAGE 22+

f. Army Detention Facilities.

(1) The Army will not operate facilities for confinement, custody, or detention of civilian personnel apprehended for violation of local or state laws as long as civil confinement facilities, operated by the Department of Justice, state, or local agencies are sufficient to accommodate the number of persons apprehended.

(2) When it appears that available local facilities are insufficient, due to the large number of persons apprehended or detained, and this fact can be verified by the person or agency responsible for the facilities, temporary confinement/detention facilities may be operated with prior approval from DA, specifically, the Chief of Staff, U.S. Army. These facilities will be operated only until custody of the persons detained can be transferred to and assumed by civil authorities. They will not be used for the confinement of persons charged or convicted under civil jurisdiction.

(3) Temporary confinement/detention facilities can be developed from local federal facilities provided they are adaptable to the requirements of custody and control. Such facilities should be established, if possible, within the affected area; this will conserve time, transportation, and escort personnel.

However, if no suitable federal property is available within the affected area, they can be located elsewhere on any property under federal control as long as the persons to be detained are apprehended in the affected area. Whenever such temporary facilities are established during civil disturbance control operations, the Army is responsible for providing those personnel, facilities, and supplies necessary for the custody, control, health, comfort, and sustenance of persons detained.

(4) Officers and key NCOs specifically trained and experienced in confinement operations are required to operate such facilities. Guards and support function personnel operating under the direct control of such officers and NCOs need not be specifically trained or experienced in confinement operations as long as they are under close and continuing supervision of trained responsible personnel. Whenever females are detained, they must be held in physically separate detention facilities and under the control of selected female guards operating under the supervision of trained and experienced confinement personnel.

(5) Temporary detention facilities should be constructed and arranged to provide for adequate custody, control, and safety of detainees. It is advisable to use existing permanent-type buildings. Where sufficient permanent structures are not available, only that amount of new construction required for temporary custody, control, and administration of prisoners should be accomplished. Temporary field- type facilities provide compartments to assure effective control.

(6) The same operational procedures that apply to the operation of installation confinement facilities and treatment of detainees apply to these temporary facilities except that those policies and procedures establishing training, employment, mail and correspondence, and administrative discipline requirements will not apply. Detailed guidance in procedures for confinement of detainees is contained in EPW Operations, FM 3-19.40.

g. Special Equipment. Certain items of equipment available to military and civil police forces can do much to limit injuries to civilian and military personnel and destruction of property. These items increase the psychological effects of a show of force and offer additional protection and versatility to civil disturbance forces during the operations.

(1) The 12 gage shotgun is a pup action shotgun currently in the non lethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3-inchchamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to standard military weapons that may be desired based on mission considerations.

(2) The shotgun, as in the case of other firearms used in civil disturbance operations, is fired only on the orders of a qualified superior officer when lesser measures of force are not effective, or when the individual Soldier has no other means of protecting his life.

(3) The M7 is a 66-millimeter vehicle-mounted NL grenade-launching device that is mounted on a HMMWV. It is a indirect fire support system that can deliver the M99 blunt trauma grenade that creates a sting-ball effect. The M315 installation kit is used to install an M7 discharger on the turret ring of appropriate HMMWV variants. An adjustable bracket allows the launch angle to be depressed for engaging targets at ranges of 50, 75 and 100 meters. The system enforces standoff distances and deters potential threats.

(4) The M1012 is a single projectile round made of hard rubber that is shaped like a bomblet and designed to be fired at a single target. With the muzzle velocity of 500 feet per second, the M1012 as the effective range of no closer that 5 meters and no further that 30 meters. Engagement inside of 5 meters could result in serious bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective.

(5) The M1013 is a multiple projectile round with .23 caliber hard rubber pellets that is designed to be fired at and employed with the purpose of affecting multiple targets. With a muzzle velocity of 900 feet per second, the M1013 has an effective range of no closer than 5 meters and no further that 30 meters. Engagements of less than 5 meter can result in seriously bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective

(6) The midsize riot control disperser (M37) is the size of a standard fire extinguisher that uses compressed air to force the RCA out to a range of 30 feet. It has the capacity to employ 18 burst of RCA into a hostile crowd while maintaining excellent standoff capabilities. The M37 can be refilled and is rechargeable. It can be refilled with CR solution (liquid agent) or CS (dry agent). For the purport of training the M37 can be filled with water and CS can be substituted with talcum power.

(7) The Squad riot control agent disperser (M33A1) is designed to provide crowd control and protection at the squad level. It is capable of projecting a ballistic stream of RCA's beyond 25 feet in up to 25 half- seconds burst. It consists of a frame and harness assembly, compressed-gas cylinder (agent container assembly) air pressure assembly, gun and hose assembly, multi-jet spray unit, and check valve assembly. The M33A1 can be refilled and is rechargeable. For training purposes, CR can be substituted with water and CS and be substituted with talcum power.

(8) The above mention items are but just a few of the non lethal weapons and munitions available to the commander and unit to utilize during a response to the civil disturbance, and can be utilized to train and prepare Soldiers. Additional non lethal weapons and munitions as well as protective gear can be found in FM 3-19.15.

3. Vehicles. Armored vehicles and transport vehicles add to the readiness of the crowd control force. The use of these vehicles increases flexibility, reduces troop commitments, and provides protection for personnel. In considering the use of vehicles, however, it must be remembered that they should be secured by foot elements.

a. Armored Security Vehicles (ASV) can be used in several ways to keep the effects of civil disturbances at a minimum.

(1) Their use adds a considerable psychological effect to riot control formations while providing added protection for Soldiers. They provide a readily accessible barrier for Soldiers to crouch behind if necessary, and excellent protection for those inside.

(2) Their use as mobile command posts offers the added advantages of security, communication, and mobility.

(3) They are well adaptable to roadblock operations providing the advantages listed above, while at the same time providing an excellent barrier.

(4) Their use for patrolling an area of violence adds to the psychological effect, and allows Soldiers to maneuver in close to snipers in order to make an apprehension.

b. Standard military transport vehicles can be modified with sandbags, armor plating, wire screening, or similar materials to give some protection against sniper fire and thrown objects. They provide mobility and communication capability for area coverage. Soldiers should be deployed with ample vehicles to provide sufficient flexibility to handle all situations in an area of civil disturbance. TOE allowances should probably be increased for this purpose.

3. Other Equipment. In addition to the special equipment discussed above, certain other items should be available for use in operations within the disturbance area.

a. Armored vests and protective masks are required for anti-sniping operations and at other times when violence is expected. Flexibility is an important consideration. For example, the limitation on visibility must be considered when requiring the use of protective masks, and the limitation on mobility when wearing the armored vests.

b. Successful conduct of the overall operation may depend on other items. Auxiliary lighting should be available to include hand-portable lights, vehicular-mounted searchlights, spotlights, flood-lights, flashlights, flares (with caution toward fires), and vehicle headlights. Prefabricated wood or metal barriers, or suitable materials, such as wire or ropes, may be used to block off an area; signs should be provided to supplement these barriers. Evidence equipment, including movie and still cameras with telescopic lenses, and recording devices should be obtained and placed into position.

c. Other items of equipment should also be provided. Helicopters should be used for observation, communication relay, illumination, resupply, reserve displacement, and numerous other tasks. Adequate firefighting and fire protection equipment are vital in civil disturbance.

d. Provisions should be made for appropriate communications equipment for use at the scene and between the scene and the operations headquarters. Every available means of communications to include public address systems--both hand-portable and vehicle-mounted--should be used.

PART E - Operational Tasks

1. General. In any civil disturbance operation, certain tasks must be accomplished to reach the ultimate objective of restoring and maintaining law and order. To do this, action must be taken to gain control of the situation. Control forces must perform certain tasks that will develop a physical and psychological environment which will permit law enforcement personnel to enforce the law and maintain order. The importance of having a high degree of flexibility and selectively in the response cannot be overemphasized. It is just as important that the tasks selected be completed only after a careful evaluation of the situation. This evaluation must consider the particular uniqueness of the situation. In this respect, the commander selects those tasks that are most likely to reduce the intensity of the given situation. Therefore, not all tasks will apply in all situations, but control force commanders and unit leaders must identify those tasks which must be performed and then develop plans and procedures for their accomplishment. The operational and integrated tasks listed below are discussed in detail in the paragraphs and lessons to follow.

a. Operational Tasks. (1) Isolate the area. (2) Secure likely targets. (3) Control crowds or mobs. (4) Establish area control. (5) Neutralize special threats.

b. Integrated Tasks.

(1) Gather, record, and report information. (2) Apprehend violators. (3) Maintain communications. (4) Maintain mobile reserves.

(5) Inform the public. (6) Protect the fire service operations. (7) Process detained personnel.

2. Isolate the Area.

a. This task includes the restriction and sealing off of the disturbed area. The objectives of sealing off the disturbed area are to prevent the disorder from spreading to unaffected areas, to prevent escape of persons bent on expanding the disturbance, to speed up the exit of the uninvolved, and to exclude unauthorized personnel from entering the affected area. In order to prevent the disturbance from expanding in size and strength, it is critical to prevent the inflow of extra demonstrators or curious onlookers into the disturbed area.

b. When military forces are committed to helping the civil authorities in controlling civil disturbances, the situation will be beyond the capability of local law enforcement agencies and a scene of major disorder should be expected. This disorder may be characterized by small, dispersed groups which are looting, burning, and generally causing havoc in the area, or it may be characterized by large groups participating in varying degrees of illegal conduct. The initial action taken by military forces to control the disorder is critical and should include the immediate isolation of the disturbed area.

c. The initial commitment of control force personnel may be required to clear a building or an area in order to isolate the persons creating the disturbance from those not yet motivated or actively involved. The primary emphasis should be on identifying what area and who has to be isolated.

3. Isolated Techniques. There are several techniques to use when isolating a disturbed area.

a. Barricades and Roadblocks. Barricades and roadblocks are physical barriers which deny or limit entry into and exit from the disturbed area. They can be used to totally deny passage of people and vehicles or to permit certain designated categories of persons and vehicles to pass. They must be positioned so as to prevent their being bypassed, surrounded, or cut off from support. In many cases, it may be impractical to physically seal an area due to the physical and geographical considerations, such as in the case of a college campus or a suburban area.

b. Barricades Against Personnel. Civil disturbance operations contingency planning should provide for the availability of portable barricades which slow down the passage of personnel. Concertina wire is a suitable material for rapid construction and effectiveness, although wooden sawhorses, ropes, and other field expedient devices may suffice. Concertina wire should be used sparingly and only under serious circumstances as it is indicative of violent disorders.

c. Roadblocks Against Vehicles. The erection of effective roadblocks which cannot be easily breached by vehicles requires large, heavy construction materials. One item that can be stockpiled in advance is 55- gallon drums to be filled with water or earth on site. Other materials include sandbags, earthworks, trees, or heavy vehicles. Several roadblocks placed at intervals of 25 to 50 feet provide sufficient depth to prevent breaches by heavy or high-speed vehicles.

d. Construction Considerations. The construction of barricades and roadblocks should provide cover from small arms fire where this threat is likely. Provisions should be for night illumination of approaches to the position; however, care must be taken not to silhouette the personnel manning it. Construction materials which would chip or shatter upon impact by thrown objects should be covered with canvas or sandbags to prevent injuries from flying fragments. Warning signs should be placed in front of the position directing authorized personnel not to approach the position. One technique of providing a quickly erected barrier is the use of vehicles parked bumper to bumper; however, this procedure may subject the vehicles to damage by a hostile crowd. Another device which may be effectively used both as a barricade and a part of a formation is the use of a locally built frame of wood or metal with wire covering.

e. Perimeter Patrols. Perimeter patrols should be established to prevent entry or exit from the disturbed area, particularly by persons or groups trying to bypass barricades and roadblocks. These patrols operate along the outer operational boundary of the disturbed area. Perimeter patrols can be integrated with area patrol routes within the disturbed area.

f. Pass and Identification Systems. Unit, installation, or municipal contingency planning should include a pass and identification system providing for the entry and exit of authorized personnel to and from the isolated area. Procedures should be established for press personnel, emergency medical personnel, public utility work crews, and for any other personnel who have a legitimate purpose for entering and exiting the isolated area. Consideration must be given to those persons residing within the disturbed area who must travel to and from work. An effective pass and identification system requires careful and detailed planning as a contingency measure.

g. Public Utility Control. Ensure that civil authorities have established a means for controlling public utilities to include street lights, gas, electric, water, and telephone services so that they may be turned on or off to support the tactics employed by the control forces.

4. Secure Likely Targets.

a. General. Certain buildings, utilities, and services are critical to the economic and physical well-being of a community and require security to prevent disruption of essential functions. In addition, certain facilities and buildings have become symbolic targets to radical or extremist elements and should be identified and afforded protection with the priorities established. Among the likely targets to be attacked are control force command posts, billeting areas, and motor parks. Another potential problem in civil disturbance operations is the threat posed by dissident elements intent on doing bodily harm to control force personnel and civilian dignitaries in the disturbed area. When such threats exist, military personnel may have to be committed to security operations. In particular, security must be placed on armories, arsenals, hardware, and sporting good stores, pawnshops, and gunsmith establishments, or other places where weapons or ammunition are stored. To conserve manpower, consideration may be given to evacuating sensitive items, such as weapons from stores and storing them in a central facility. Priorities for physical security must be established to prevent waste of available forces on less important facilities or those which have their own physical security forces. The degree of security necessary to protect various buildings and utilities is determined by considering the following: [..............]

It goes on.... Again the page is here. I'll leave it here to get this posted now. Check it out and be sure to get a handle on CONPLAN 3502 and other aspects of domestic military operations planning frameworks -- when similar emergency/disaster scenarios happen (i.e. Katrina) you see military personnel acting like this...

REX-84 under Iran Contra was 'then', and 'now' a literal US Army war to save the criminal banks from angry mobs is basically what's planned. Under this plan a nation ripped off & crippled by LIBOR peta-scale financial scams leaves forces like the military on the hook for defending the organized ring of criminals operating banks, i.e. "services ... critical to the economic... well-being of a community". What is the Pentagon supposed to do about the fact that the critical infrastructure is often operated by the criminally insane -- the very people who have pushed the US most of the way to the point where terrifying emergency plans like those above spring to life? X-(

FBI investigated American Trucking Association link to 2002 Wellstone plane crash

Wellstone plane crash was super sketchy. There was no icy condition that it was spun as. Fortunately MPR got the Wellstone FBI files, a lot of redacted materials.

Screen shot 2010-10-27 at 7.13.04 PM.png

Screen shot 2010-10-27 at 7.14.11 PM.png

There is an interesting logical flow - including "justice center" ... Service Transportation Act - expose board members of ATA - DOT truck safety issues, tied to organized crime. ATA Board Members, "Yellow" and "Chief Admin Law Judge" are all flagged - "trucking industry pushing drivers beyond their limits / non enforcement of trucking laws."

Screen shot 2010-10-27 at 7.14.40 PM.png

This actually makes a fair bit of sense. In the sunset of his excellent career, Wellstone was starting to turn towards the war on drugs and Colombia, going so far as to get himself sprayed with fumigant back somewhere in the coca mountains. I have read some materials discussing how the ATA is a very conservative and connected trade association, with allegations of links between many kinds of shady operations and the neo-confederate / hardcore dixie authoritarian types. Naturally the trucking industry could easily connect a lot of pieces, and it wouldn't be a surprise for Wellstone to start circulating issues like these. The ATA-drug connection has to factor in somewhere, why not?

The solution --- are there scheduled hearings? No? Ok let's leave it there..... The ATA went on to have no real political problems besides their failed shady fusion center which got involved in the RNC. [noted EPIC Spotlight on Surveillance]

On the other hand, if no former Wellstone staffers have yet stepped forward with material like this -- what he would have come back to DC with in that unspeakably bleak & dismal 2002 political landscape... there is a clip from a drugwar documentary where he says essentially, no matter what you do about the war on drugs, someone's making money. He truly believed it, no doubt.

8 Years Later, NORTHCOM has one hell of an integrated warondrugs scheme getting its #fail on in Mexico: Narco News: The Military Command Behind Mexico's Violent Drug War... and what year did NORTHCOM start? 2002. Wellstone gone? 2002. Spooky...

NORTHCOM will bomb Mexico before they admit the role of the FedWire in the Drug$. One politician woulda called em on it - We miss ya Paul!

Thinking of Wellstone reminds me of the creepy crash of GOP uber-webmaster Mike Connell, but now I can't find the freaky 'jackal' memo anywhere :-( ... Earlier: Mike Connell's mysterious plane crash via 'jackals'? rel: The BRAD BLOG : Exclusive: Mike Connell's Family Copes With His Mysterious Death, Tipsters, Legal Options:

"I think Mike got caught up in some other people's lives and didn't know how to get out or was trying to get out. You know, I'm real cynical about whether justice will be done. A lot of the government officials probably have gotten away with a lot of things. My position now is what's going to make this different? What's different with my brother's death that's any different than Paul Wellstone's?"

NSA/FBI fun; Spook 411 prank: Cryptome lists all damn fake White House/CIA/NSA phone numbers; Obama/Hillary Denver fight fantasy

Three examples of American political culture in 2008.

First, the latest efforts of the NSA to read my email and discover its exciting secrets. (Hayden's Haystacks: Chilling Effects and Fluffy Data Goodness...)

**********

Well well, we got a couple funny things which are probably Too Hot To link to - or something. I don't get it...

************

This is pretty funny, but first I need to take note of their latest plans to spy on everybody... Wait... first, let's go back a couple years... These guys have such a great sense of humor.

I think this latest prank tops that Total Information Awareness logo in complete Maximum Conspiracy Irony. Back in the day...

2002: 'Mythical Evil Conspiracy Irony from the Establishment': We never thought anything would top the 'all seeing pyramid staring at Mideast.' But this is the Federal Government! They are Creative!

IAO-logo.png

Fortunately the big pyramid is still up-n-beamin' around with it's Data Mining Sunshine and, yes, they are chucking all your emails and credit card transactions into the big Vortex. What were you expecting, punk?

The Wall Street Journal puts on their tinfoil hat to give us some nice radio waves: Via Cryptogon: NSA’s Domestic Spying Grows As Agency Sweeps Up Data:

Wall Street Journal: NSA’s Domestic Spying Grows As Agency Sweeps Up Data; Terror Fight Blurs Line Over Domain;Tracking Email By SIOBHAN GORMAN; March 10, 2008; Page A1

WASHINGTON, D.C. — Five years ago, Congress killed an experimental Pentagon antiterrorism program meant to vacuum up electronic data about people in the U.S. to search for suspicious patterns. Opponents called it too broad an intrusion on Americans’ privacy, even after the Sept. 11 terrorist attacks.

But the data-sifting effort didn’t disappear. The National Security Agency, once confined to foreign surveillance, has been building essentially the same system. The central role the NSA has come to occupy in domestic intelligence gathering has never been publicly disclosed. But an inquiry reveals that its efforts have evolved to reach more broadly into data about people’s communications, travel and finances in the U.S. than the domestic surveillance programs brought to light since the 2001 terrorist attacks. Largely missing from the public discussion is the role of the highly secretive NSA in analyzing that data, collected through little-known arrangements that can blur the lines between domestic and foreign intelligence gathering. Supporters say the NSA is serving as a key bulwark against foreign terrorists and that it would be reckless to constrain the agency’s mission. The NSA says it is scrupulously following all applicable laws and that it keeps Congress fully informed of its activities.

According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called “transactional” data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA’s own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge’s approval when a link to al Qaeda is suspected.

The NSA’s enterprise involves a cluster of powerful intelligence-gathering programs, all of which sparked civil-liberties complaints when they came to light. They include a Federal Bureau of Investigation program to track telecommunications data once known as Carnivore, now called the Digital Collection System, and a U.S. arrangement with the world’s main international banking clearinghouse to track money movements.

The effort also ties into data from an ad-hoc collection of so-called “black programs” whose existence is undisclosed, the current and former officials say. Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach. Among them, current and former intelligence officials say, is a longstanding Treasury Department program to collect individual financial data including wire transfers and credit-card transactions.

It isn’t clear how many of the different kinds of data are combined and analyzed together in one database by the NSA. An intelligence official said the agency’s work links to about a dozen antiterror programs in all....

But wait! Folks, it gets better. All they gotta do is Wire in your phone number to all the others!

Social-Network Analysis

The NSA uses its own high-powered version of social-network analysis to search for possible new patterns and links to terrorism. The Pentagon’s experimental Total Information Awareness program, later renamed Terrorism Information Awareness, was an early research effort on the same concept, designed to bring together and analyze as much and as many varied kinds of data as possible. Congress eliminated funding for the program in 2003 before it began operating. But it permitted some of the research to continue and TIA technology to be used for foreign surveillance.

Some of it was shifted to the NSA — which also is funded by the Pentagon — and put in the so-called black budget, where it would receive less scrutiny and bolster other data-sifting efforts, current and former intelligence officials said. “When it got taken apart, it didn’t get thrown away,” says a former top government official familiar with the TIA program.

Two current officials also said the NSA’s current combination of programs now largely mirrors the former TIA project. But the NSA offers less privacy protection. TIA developers researched ways to limit the use of the system for broad searches of individuals’ data, such as requiring intelligence officers to get leads from other sources first. The NSA effort lacks those controls, as well as controls that it developed in the 1990s for an earlier data-sweeping attempt.

Sen. Ron Wyden, an Oregon Democrat and member of the Senate Intelligence Committee who led the charge to kill TIA, says “the administration is trying to bring as much of the philosophy of operation Total Information Awareness as it can into the programs they’re using today.” The issue has been overshadowed by the fight over telecoms’ immunity, he said. “There’s not been as much discussion in the Congress as there ought to be.”...

Oh yeh let's put in another tasty WSJ nibble about how the Posse Comitatus Act never covered how the Military would build the SuperOrwell HAL FBI Fishing Expedition Big Brother 2008 model...

FBI-NSA Projects

The NSA quietly redefined its role. Joint FBI-NSA projects “expanded exponentially,” said Jack Cloonan, a longtime FBI veteran who investigated al Qaeda. He pointed to national-security letter requests: They rose from 8,500 in 2000 to 47,000 in 2005, according to a Justice Department inspector general’s report last year. It also said the letters permitted the potentially illegal collection of thousands of records of people in the U.S. from 2003-05. Last Wednesday, FBI Director Robert Mueller said the bureau had found additional instances in 2006.....

Alright, so these guys are tracking all transactions, yet they can't find where the drug money goes. It just gets away every fucking time!

And just to drive the point home, the guys that specialized in the drug trafficking networks back in the 1980s get honored in a whole new way, somewhere deep in the Data System....

Now, for something completely different. But also not. Our second awesome story...

*********

According to the spy-exposure-weird-shit site Cryptome.org, a ton of 'telephone pseudonyms and true names' were listed at 411.com for a secret CIA phone number. That is, a ton of joke and real entries all assigned to (703) 482-1100, a CIA number in McLean Virginia.

Somehow 10,000+ records got assigned many-to-one to one phone number. Just for the CIA.

And better yet, a huge swath of the names are fucking pranks. Pranks about favorite names in the Conspiracy.

2008: 'Yes, the CIA put in all the best conspiracy names onto their own damn 411 reverse phone number lookup, just to piss me off!!!'
02001.jpg

THIS IS TOO MUCH!!! OMG!!!! There are another 9980 fake names drawn from the great fabric of American spy conspiracy lore. Barry Seal has his place (or several). As we posted 11 months ago:

200803110131.jpg

"William Buckley" has three listed CIA phone numbers @ (703) 482-1100. Don't these guys have something better to do? God damn, 'Ahmad Chelebi' is also listed @ (703) 482-1100. And 'Libby Plame.' and 'Laiffaire Plame'. And 'Judith Plame.' And Richard Secord. and Jose Rodriguez. And felix rodriguez. And Barry Seal. And Adler Seal. Covert Ops, the Skull & Bones days, all kinds of stuff. Maybe 'real names' of current people too? Put out onto the Web's 411 system? Really?

Cryptome

White House Telephone Nyms and Names

10,751 CIA Telephone Nyms and Names

4,151 NSA Telephone Nyms and Names. More aboot that last one: NSA Telephone Pseudonyms and Names: About 4,151 NSA telephone pseudonyms and true names are available via http://switchboard.intelius.com through a reverse telephone number look-up for (301) 688-0400. Some names are humorous ("Lawrence Waterhousespy," "Bin Laden") or ironic ("Hayden Lied," "Odom Warns"); others are spoofs: "Justin Rood" is the name of a national security journalist for CQ.com......

A2 provides a full index of the 10,751 CIA nyms and names, linked to Google Search for each name:

http://cryptome.org/cia-nyms-idx.htm

All right kids, now that we are really on a roll...

**********

Rumors of Denver Democratic National Convention deadlock to Hillary => Really pissed off Hordes vs. the Hacks? What would happen if the Hillary people went all the way to the convention and somehow ganked the nomination? Rick Perlstein passed along some emails from people comparing it to Chicago '68.

However, this kind of fucked up violent incident isn't going to happen at the Democratic National Convention, but its pretty likely to expect a lot more of Raving Loonies in Emails getting treated as proof that the end is near. Chaos looms etc. Doom memes are self reproducing!

I think it's a good example of... political science fiction, showing how people's fantasies play out in an imagined reality. Stuff like this generates an atmosphere of tension and can be used to basically troll. It's just like everything else on the Internet. combine Obama + Battle in Seattle fantasies... Huffington Post: Some Apocalyptic Observations on the Democratic Nomination Fight from Here on Out:

A young friend who lives in a small town in a rural state sent me the following observation today:

If the Clintons push for the win in Denver, they're going to split the goddamn party down the middle. I read your chapter on 1968 Chicago, obviously. I'm of the generation who supports Obama. I know what we're like. Shit, I know what I'm like.



Rick, if the Machine tries to give the Clintons the victory at the convention, I swear to God, Chicago's going to look like a Sadie Hawkins dance. People my age are going to be throwing stones. We all have transportation -- cell phones -- disposable income -- the Internet -- free time -- and Seattle as our example. Part of me is scared of a riot. Part of me isn't. The nomination belongs to Obama. Do you think we're going to let the Democratic Leadership Council take it? "God gave Noah the rainbow sign. No more water, fire next time."

and then the ominous Iraq vet reference... A different guy who works inside the Democratic Party somewhere told Rick Perlstein:

Not to mention that there's going to be a significant Iraq veteran contingent at the convention, ready to rock 'n' roll. We've already had planning meetings about it -- we're going about it the same way that we would plan any decent military operation.... I can't emphasize enough how potentially scary things could get -- we've got folks working on the inside of the convention, and it's all done on a cell basis, so that folks only know what they need to know.

I feel like you'd get too many hits from the Man over this kind of material. On a day like today, why not?********Well, I would say that these three elements - building the Big Brother Machine, the CIA's own prank phone index, and the fantasies of militant anti-Hillaryites, it reminds me of why American political culture has that certain outrageous, cowboy, bravado thing. Read all the emails! Why not?! Are ya... yellow?!
The British are way too half-assed to have a country where such utter bullshit holds forth. That's America!

THE WIRE ENDS THIS WEEK - WOE IS ME! Clay Davis: SHeeeeiiiitt!!

I will really miss The Wire. We are gonna watch the last episode the second it comes on OnDemand, whenever that is (not Sunday @ midnight this week, argh!!). Damn.

At the end of the second-to-last episode, Clay Davis tells Detective Freamon that Levy, the gangsters' lawyer has been buying secret documents from someone at the Courthouse. My guess is that the Judge was selling the documents -- that would bring the plot full circle, since the Judge and Detective McNulty set the whole plot in motion at the very beginning of the series' first episode. The Judge has been signing the wiretaps all along, hence The Wire merely working out to supply info to the highest bidder, would be a pretty good final joke.

Let's have one final moment with Clay Davis, the time he talks about not collecting money from some damn Korean Grocers....

And this one just got put up a couple days ago, it'll probably get pulled, but it's his fifth season panache at its best!

I will have to write something about the show later... but I have to put in my prediction now!

Mysteries of the great Swedish software pirates: Steal This Film; Second Skin documentary about Virtual Worlds etc.

See, you not only have to be a good coder to create a system like Linux, you have to be a sneaky bastard too.
--Linus Torvalds- via Detroit Wireless Project

Ok I just saw the first few minutes of this one, but clearly it looks pretty damn cool. Steal This Film: hosted on GoogleVideo:

Steal This Film - Part 1 and the official website: Steal This Film II.

The background seems to change upon reload, conveying "JAWS" and "The Godfather" ... intellectual properties - or disk images. downloadables: Steal This Film II available in many languages!

Documenting the steadfast movement against intellectual property, Part 1 of Steal This Film takes account of the prominent players in the Swedish piracy (copyright infringement) culture: The Pirate Bay, Piratbyrån (Piracy Bureau), and The Pirate Party. This includes a critical analysis of the regulatory capture asserted by Hollywood film industry to leverage economic sanctions by the United States government on Sweden through the WTO to pressure Swedish police into conducting an illegal search and seizure for the purpose of disrupting a competitive distribution channel: The Pirate Bay tracker for P2P Internet filesharing with the BitTorrent protocol.

Also i found this very interesting: a blog noted of Second Skin - Feature-length Documentary about Virtual Worlds. Here's the official site: Second Skin - a Pure West Documentary. [And accurately enough, my remark is in the context of someone else noticing it. That's really meta people. And thus, fundamentally boring. {way to go}]

Meanwhile in the Establishment: Google To Be Innovation Provider For GOP Convention. That's here, people.

Nerds will like this: CMS Report's Front Page News | CMS Report
I thought that Mashable.com was exceedingly interesting! Mashable! - The Social Networking Blog:BitTorrent Developers Pledge To Subvert Comcast Filters
Politics Online Conference 2008: Focus on Privacy
Social Networking: Risks vs. Rewards
and naturally this site is run by Drupal and will be on Drupal 6: Drupal Version Six Released
Which in turn led me to some new things: Searchles | Home - search plus circles. some kinds of social integration thingy.
Why teach journalism students Dreamweaver? | Martin Stabe I really recommend checking out how the interface of tools, internets and Journalism with a capital J fit together. It's a big deal.
Samsung's See'N'Search set-top TV / Internet box demo video - Engadget
Are Social Networks Responsible for Teen Suicides? | CenterNetworks
Is MySpace Good for Society? A Freakonomics Quorum - Freakonomics - Opinion - New York Times Blog

check out teh Wired Journalists NING social network thingy!! NING lets you make your own social network sites.
Looking for teh opensource? don't forget good ol freshmeat.net: Welcome to freshmeat.net. I remember checking freshmeat all the damn time in high school senior year. a good 8 years ago and the site still looks EXACTLY the same. That's quality.
Schools going to Linux save tons of money: Techlearning > > Linux Makes the Grade > November 2007. And I'm sure everyone is really sad to be missing the Vista Experience.
Meanwhile is the Associated Press doomed? Down On The Wire - Forbes.comI saw the good old macalester activist wiki is still being used: Main Page - MPKB
When you need a global wireless network syndicate of networks, you need global.freifunk.net | syndicating the free wireless communities and blogs of the world and where is the news of Minnesota, people? (drupal powered, as is their blog: Freifunkblog | Freie Netzwerke, freies WLAN und freie (Funk-)Netze im deutschsprachigen Raum) and here's another German/English site about techs/Drupal/etc: perspektive 89 | Internationale Perspektive aus Berlin
Local lunatic: Slanderous Kook: I'm a Slander Victim - February 14, 2008
....And that's all for this random yet interesting enough post......

Alex Jones Endgame: Blueprint for Global Enslavement: Actually, pretty good!

"Countless people will hate the New World Order and will die protesting against it."
--HG Wells - "The New World Order" (1939). This quote opens the flick.

The rich are going to kill everyone, then try to merge with technology and live forever!!!1!!! w0000

Get ready for the Internet Paranoia Movie of the Season, everyone! Texas loud guy Alex Jones has just released Endgame: Blueprint for Global Enslavement! And it's free to copy on the Internet: Get the Word out against the New World Order!! etc!!!

Basically, it goes through history, looking at various evil empires that dominated and killed the masses all along the way. Combine eugenics, false-flag terror, war financing, and the big NWO scheme, confronted by a loud Texas guy with a bullhorn. Result: Pretty good stuff!

There are some fun guerilla video adventures: Jones turns up at the mysterious Bilderberg Group meeting in Ottowa, wherein the Evil Schemers plot their stuff. Jim Tucker, crusading Bilderberg watcher in cowboy hat, knows the ways around their devious schemes. They catch numerous officials, including George Pataki (of the Patakilluminati) violating the Logan Act by meeting in secret with foreign politicians. (someday we gotta nail the neocons with Logan. More later on that).

A major element is how the Global New World Order Microsoft McDonalds Dictatorship will create regional super-governments. First the European Union. Makes the point that the African Union is really the gendarme force of the NWO in Africa. The Asian Union and North American Union are examined. Secret plans for the SPP - Security and Prosperity Partnership - are revealed for all. Secret summits plotting the merging of military and trade, so that more goods may flood into the USA via Mexico from Asia.

Crusty old Texans bitch about how they're going to kill the New World Order and its Trans Texas Corridor schemes first of all. RFID tags will be installed on your car to tax you for the global empire - just like the Romans!

Modern China is the test case for the New World Order, the laboratory if you will. Organ harvesting of prisoners and other total Capitalism police state elements are examined in jarring detail (as is David Rockefeller's enthusiasm for Mao).

Technological sophistication and the secret history of eugenics are examined with great care. An Aldous Huxley clip where he talks about how the "Brave New World" plan was basically real, combined with an ugly Texas bureaucrat explaining how the foster kids need to be pumped full of drugs because they come from a bad gene pool. Excellent work! Margaret Sanger's eugenics schemes financed by the Rockefellers - that's really the nut of it. Points out that the big environmental groups are purchasing all the land, perhaps intending to depopulate rural America, but don't give a damn about genetic engineering.

Lastly, probably my favorite element (besides the choice quotes from Kissinger et al about Total Depopulation of the Third World) was how trans-humanist New Age hippiedom with the synthetic cyborg stuff fits into the Big Plan. The rich are going to kill 80% of everyone, then try to merge with technology and live forever!

Carbon trading is just there to kill the middle class and finance the elite schemes. Police forces and the military are recruiting foreigners to repress the domestic population. Etc!

Well that's about it. I have to say, I was impressed. The visual trimmings are the most sophisticated Jones has released. He doesn't ever bother to even say that 9/11 was staged by the Secret Government, which of course has been his bread and butter for a while. Instead, Jones takes a step back, and his core point is that "Governments are more likely to kill people than anyone else. The elite always do this shit!" Fair enough, sir.

I have been worrying about Rationalized Annihilation for quite a while. Living in these times of war, extreme annihilationist ideologies are very chic. Look at TV for a bit, or listen to the corporate talk radio. People that make a lot of money are telling you to kill, and everyone else to kill.

Say what you will about Alex Jones: he is definitely against the perpetual war agenda, and it takes a guy like him to run around and yell at "those guys", the rich and shady cats that have been fucking everything up.

Better yet: It's free! Legally!

Take a look at your typical BitTorrent sites for downloadable/DVD burnable versions. Also posted on Google Video, but it's too chunky on parts with text. Here is the promo copy:

For the New World Order, a world government is just the beginning. Once in place they can engage their plan to exterminate 80% of the world's population, while enabling the "elites" to live forever with the aid of advanced technology. For the first time, crusading filmmaker ALEX JONES reveals their secret plan for humanity's extermination: Operation ENDGAME.

Jones chronicles the history of the global elite's bloody rise to power and reveals how they have funded dictators and financed the bloodiest wars—creating order out of chaos to pave the way for the first true world empire.

* Watch as Jones and his team track the elusive Bilderberg Group to Ottawa and Istanbul to document their secret summits, allowing you to witness global kingpins setting the world's agenda and instigating World War III.

* Learn about the formation of the North America transportation control grid, which will end U.S. sovereignty forever.

* Discover how the practitioners of the pseudo-science eugenics have taken control of governments worldwide as a means to carry out depopulation.

* View the progress of the coming collapse of the United States and the formation of the North American Union

Here it is on Google Video: it's two hours long though, I would make a new window and so forth, or find a sharper download somewhere:


All right Alex, way to fuck up the program. Go have a margarita or something, just relax a bit before you get an embolism, dude!

The bell tolls for Musharraf & Pakistan: Disintegration, Democracy or Doom?

Pakistan is pretty much screwed right now. There is an ongoing covert effort by the U.S. to stir up the Baluchis to attack Iran, the Taliban is operating firmly out of the Pakistani city of Quetta (once the British 'garrison town' at the fringe of Colonial India), and the major interest groups underpinning Musharraf's rule are basically running for the door.

The latest crisis was when Musharraf fired the chief justice of the Supreme Court for failing to extend and further rationalize his military dictatorship. This crisis appears to have alienated Islamic fundamentalists, intelligence service heavies, and other major parts of the political scene from Musharraf. Meanwhile, Waziristan tribal areas and the Pashtun sector beyond Quetta trend towards a basically Taliban-oriented autonomous structure.

If we want to get buzzwordy, could say that "fourth generation warfare entities like religious foundations and tribal segments are focusing primary loyalties to themselves and acting independently, moving away from the central government's military dictatorship, as the factionalized army and ISI act accordingly and autonomously." Or something like that.

(note: the Baluchis, like the Pashtuns and Afghanistan's other major ethnic groups, were placed across national frontiers by meddlesome Europeans in the 19th century. The Baluchis, a historically nomadic people, are trisected between Afghanistan, Pakistan and Iran. They have recently suffered repression from the Pak government)

So you'll want to read this analysis by Ahmed Rashid. No one really knows the cogs of Central Asia better than this journalist.

Musharraf at the Exit
By Ahmed Rashid
Thursday, March 22, 2007; Page A21

LAHORE, Pakistan -- In the rapidly unfolding crisis in Pakistan, no matter what happens to President Pervez Musharraf -- whether he survives politically or not -- he is a lame duck. He is unable to rein in Talibanization in Pakistan or guide the country toward a more democratic future.

Since March 9, when Musharraf suspended the chief justice of the Supreme Court, Iftikhar Mohammed Chaudhry, public protests have escalated every day -- as has a violent crackdown by the police and intelligence agencies on the media and the nation's legal fraternity.

The legal convolutions about Chaudhry's dismissal boil down to one simple fact: He was not considered sufficiently reliable to deliver pleasing legal judgments in a year when Musharraf is seeking to extend his presidency by five more years, remain as army chief and hold what would undoubtedly be rigged general elections.

Musharraf's desire to replace Chaudhry with a more pliable judge has badly backfired. After just 10 days of protests, lawyers around the country have made it clear to the senior judiciary that they will not tolerate further legal validations for continued military rule or tolerate Musharraf remaining as president. At least seven judges and a deputy attorney general have resigned in protest.

Across the country, in law offices, in the media, among the opposition parties and other organized sections of civil society, the feeling is growing that Musharraf will have to quit sooner rather than later. After eight years of military rule it appears people have had enough.

Syndicate content