document

Exclusive: National Security Agency to spy on Boston for 2024 Olympics in National Special Security Event SIGINT Spectacular, Snowden leak shows

nsa-olympics-spying.jpg

Most people have no idea that the National Security Agency gets involved in big events like national political conventions and the Olympics: National Special Security Events (NSSEs) with security led by the Secret Service, which is now a part of the Department of Homeland Security.

This was apparently overlooked until now: the National Security Agency lists one of its top level "strategic missions" as getting involved with NSSEs such as the Olympics, according to a file published by the NY Times in Nov 2013 and attributed to Edward Snowden. See also: Olympics in Boston would require an unprecedented security effort - Boston Globe (Jan 15)

Many ideas taken for granted - including the separation of military and civilian life within the US - evaporate in NSSEs. Many, many federal agencies send little teams, including advanced military intelligence.

Header_Logo.pngI had only recently rejoiced that the 2016 Democratic National Convention wouldn't land in Minneapolis. The new crowd running Minneapolis actually saw the light there. These giant spectacles are a huge diversion of focus, don't help cities achieve their goals, at a vastly inflated expense, while compromising the rights of city residents. Many opponents are acting including No Boston Olympics and NoBoston2024 | Independent voices of Boston area residents opposed to the Boston 2024 Olympic bid.

This is apparently the first time that it has been really noted the NSA's director in 2007 officially stated that NSSE's are strategic missions. This in turn means that the NSA must have had *some* role at the 2008 Republican National Convention in Minneapolis. (see our RNC documentary Terrorizing Dissent here & RNC08Report for docs) More background below the doc fulltext.

It's hard to overstate the nasty, elitist, disruptive effects of the Olympics. As a new resident of Boston, the unfortunate news that the 2024 Olympics now has this city in its crosshairs is disappointing & fear inducing. After all I ran into (at least) four FBI informants because of the 2008 RNC, gassed & shot at by the authorities.

2829703418_1958b3785c_b.jpg

2008 RNC memories - Photo Creative commons by Nigel Parry @flyingmonkeyair - src

I am publishing almost the whole document here except for the short page 2, as it is annoyingly difficult to locate online anyway. There are a lot of typos in the Optical Character Recognition, oh well.. See a little earlier coverage: Top Level Telecommunications: NSA's Strategic Mission List and Report: S. Korea key intelligence target for US eavesdropping - Zoom in Korea | Zoom in Korea (Nov 2013).

SOURCE: https://www.eff.org/files/2013/11/15/20131104-nyt-sigint_goals.pdf

/////

United States SIGINT System January 2007 Strategic Mission List

Introduction - Director’s Intent

(S//SI) The SIGINT Strategic Mission List represents the intent of the Director, National Security Agency in regard to mission priorities and risks for the United States S1G1NT System (USSS) over the next 12-18 months The list is derived from review of the Intelligence Community National Intelligence Priorities Framework, DC1/DNI Guidance, the Strategic Warning List, National SIGINT Requirements Process (NSRP) and other strategic planning documents The missions included on the list are in relative priority order and represent the most urgent tasks for the USSS The list is not intended to be all encompassing, but is intended to set forth guidance on the highest priorities.

Topical Missions and Enduring Targets

(S//S1) The SIGINT Strategic Mission List is divided into two parts. It includes 16 critical topical missions in Part I of the list, which represent missions discerned to be areas of highest priority for the USSS, where SIGINT can make key contributions. In addition to the 16 critical topical missions, Part U of the SIGINT Strategic Mission List includes 6 enduring targets that are included due to the need to work these targets holistically because o f their strategic importance. In addition to their long-term strategic importance, the enduring targets can potentially "trump" the highest priority topical missions on the list at any time, based upon evolving world events. Elements o f these targets are also represented throughout the topical target sets. For each of the 16 topical missions and each of the 6 enduring targets the Strategic Mission List includes:

1) Focus Areas - critically important targets against which the SIGINT enterprise is placing emphasis. DIRNSA designation of a target as a focus area constitutes his guidance to the SIGINT System that it is a "must do” target for that mission
2) Accepted Risks strategically significant targets against which the USSS is not placing emphasis and for which SIGINT should not be relied upon as a primary source. DIRNSA's reasons for accepting these risks include high difficulty and lack of resources or as an “Economy of Force Measure,” in order to achieve focus on the most critical targets

A Strategic Investment Tool for SIGINT Resources

(S//S1) Given a finite level of resources available in all mission areas, the Strategic Mission List provides high-level strategic direction to the global SIGINT system to focus resources on the most important/highest priority areas. “Risks” identify targets that cannot be resourced to the level of a Focus Area, thereby acknowledging that shortfalls will exist. As world circumstances change, these or other targets can be added to the list as needed, targets no longer of critical importance can also be removed from the Focus Area category. In addition, other targets, not listed as focus or risk areas, can also be wrorked by the USSS to a lesser degree to meet other customer requirements. The Strategic Mission List will be reviewed bi- annually by the USSS Signals Intelligence leadership Team Missions. Focus areas, and Accepted Risks will be adjusted as a means of providing high-level steerage to the Nation’s agile SIGINT System.

[….]

United States SIGINT System Strategic Mission L ist- January 2007

(U) I. Strategic Mission List - Topical Missions

(S//S1) A. MISSION: Terrorism: Winning the Global War on Terrorism. Focus Areas:

a. All Interagency Intelligence Committee on Terrorism (I1CT) Tier 0 and 1 terrorist groups with capabilities and intentions to attack the US, its interests or allies, or groups actively planning or carrying out a terrorist attack against U.S. persons, facilities, or interests

b. Key individuals and Terrorist Support Entities (TSE) involved in the facilitation, financing, and recruitmentorradicalizationofallIICT Tier0and 1terroristgroupnetworksglobally.

Accepted Risks: All IICT Tier 2,3, and 4 terrorist groups, and TSEs.

(S//S1) B. MISSION: Homeland Security: Protecting the U.S. Homeland from terrorist attack and other transnational threats to safeguard U.S. persons, freedoms, critical information, infrastructure, property and economy.
Focus Areas:

a Border Security (land, air, sea).
b. Direct defense against terrorist attack.
c. Diseases, epidemics, and pandemics.
d. Executive Protection/U.S.-Based NSSEs
e. Illicit Facilitation as it relates to special interest aliens and CBRN materials and technology

Accepted Risks:

a Accepted risks as stated in the “Terrorism” mission.
b. Global coverage o f all illicit activities of potential concern to the Homeland.

(S//SI//REL USA, AUS, CAN, GBR) C. MISSION: W M P and CBRN Programs and Proliferation: Combating the Threat of Development and Proliferation of Weapons of Mass Destruction, CBRN, and Delivery Methods (particularly ballistic and nuclear-capable cruise missiles).
Focus Areas:

a. Development, Acquisition, or Use of CBRN.
b.State W'MD and ballistic and cruise missile programs of:

China (biological, chemical, nuclear, ballistic and cruise missiles) India (nuclear, ballistic missiles)
Iran (biological, chemical, nuclear, and ballistic missiles)
North Korea (biological, chemical, nuclear, ballistic missiles) Pakistan (nuclear, ballistic missiles)

Russia (biological, chemical, nuclear, ballistic and cruise missiles)

Syria (chemical, nuclear, ballistic missiles).
c.W MD and missile proliferation activities by states:

China (nuclear, ballistic missiles), Israel (cruise missiles) North Korea (nuclear, ballistic missiles)

Pakistan (nuclear, ballistic missiles)

Russia (ballistic missile).
d.W.MD and missile acquisition activities by states:

China (cruise missiles)
India (cruise missiles)
Iran (nuclear, ballistic missiles)
Pakistan (cruise missiles)
Saudi Arabia (nuclear, ballistic missiles).

e.Safety and Security ofWMD: Pakistan (nuclear)
Russia (nuclear).

Accepted Risks:
State WMD and ballistic and cruise missile programs of: Egypt (ballistic missiles)
Libya (ballistic missiles)
Taiwan (ballistic missiles).

(S//S1) D. MISSION: U.S. Forces at Risk (Military Support): Protecting U.S. Military Forces Deployed Overseas and Enabling their Operations.
Focus Areas:

a. U.S. forces deployed in: Iraq. Afghanistan. Mideast Region. Korea, and Philippines.
b. Support to military planning and operations: Support to OPLAN 5027 (Korea).
c. Intentions of foreign and indigenous anti-coalition forces, command and control. OOB, and

operational support in Iraq and Afghanistan.
d. Support to U.S. forces in identification of HVTs in Afghanistan/ Pakistan and Iraq

Accepted Risks:

a Protection of U S forces deployed in: Balkans (Kosovo),
b South Korea leadership intentions in OPLAN 5027.
c Routine military support to U.S. forces deployed in non-combat situations.

(S//S1) E. MISSION: State/Political Stability: Providing Warning of Impending State Instability. Focus Areas:

a. Internal political activities that could threaten the survivability of leadership in countries where US has interest in regime continuity Iraq, Afghanistan, Pakistan, and Saudi Arabia.

b. Internal political activities that could result in crisis in. North Korea, Sudan/Dafur humanitarian crisis. Cuba, Kosovo, Turkey, Nigeria, Lebanon, Venezuela, Syria, Bolivia, Latin American Bolivarian Developments, and Palestinian Authority.

Accepted Risks: Internal political stability of: Egypt, Zimbabwe, Cote d'Ivoire, Liberia, DROC, Bangladesh, Georgia, Jordan, and Haiti.

(S//SI) F. MISSION: Warning of Strategic Nuclear Missile Threats: Providing Warning of a Strategic Nuclear Missile Attack on the territory of the 50 United States.
Focus Areas: Areas covered under a peacetime SIGINT strategy maintaining full capabilities with reasonably sufficient coverage for the provision of warning include: Russia's Nuclear C3, Mobile

ICBMs, strategic navy missiles, and Bombers; China's Nuclear C3, Mobile ICBMs, and SSBNs; and North Korea's Nuclear C3 and potential ICBM (TD-2) Threat.
Accepted Risks: Strategic Targets where SIGINT is not a primary intelligence source in providing warning: Russia's Silo-based ICBMs; China's Silo-based ICBMs.

(S//SI) G. MISSION: Regional Conflict and Crisis/Flashpoints to War: Monitoring Regional Tensions that Could Escalate to Conflict/Crisis.
Focus Areas:
Regional flashpoints that could pose a significant threat to U.S. strategic interests: Arab,Iran-Israel conflict, Korean Peninsula, China-Taiwan, India-Pakistan, Venezuela (impact on surrounding region), and Russia/Georgia.

Accepted Risks: Regional flashpoints in: Ethiopia-Eritrea and Africa Great Lakes Region

(S//REL USA. AUS. CAN, GBR. NZL) H. MISSION: Information Operations: Mastering Cyberspace and Preventing an Attack on U.S. Critical Information Systems.
Focus Areas:

a (S//SI) Enabling Computer Network Defense (CND): Provide cyber threat warning, detection, characterization, and mitigation services for U.S. and allied computer network operators: Named Intrusion Sets (Including, but not limited to Gadget Hiss. Seed Sphere/Byzantine Trace. Makers Mark. Byzantine Candor), New intrusions.

b. (S//REL USA, AUS, CAN. GBR, NZL) Enabling Computer Network Attack (CNA): Deliver intelligence, access, and dual-use capabilities in support of U.S. computer network attack objectives. c. (S//SI) Foreign Intelligence Serv ices' Cyber Threat Activities: Deliver intelligence on the capabilities.

vulnerabilities, plans and intentions o f foreign actors to conduct CNO against USG networks and those of interest to the USG. Identify what Foreign Intel Services know about USG capabilities, vulnerabilities, plans and intentions to conduct CNO: China, Russia, Iran, and al-Qa'ida

d (S//SI) Enabling Electronic Warfare (EW): Provide cognizance ofthe EM environment, signal detection/geolocation, and characterization through intelligence (ELINT. COMINT, Tech SIGINT) and other technical means to U.S. EW planners and operators: China. Russia, Iran, Iraq/Afghanistan (IED's) and North Korea.

e. (S//SI) Enabling Influence Operations: Support U.S. military deception (MILDEC) and psychological operations (PSYOP), and inter-agency Strategic Communication objectives to influence target behavior and activities: Terrorist groups. China. North Korea. Iran, and Venezuela.

Accepted Risks:

a. Enabling CND: Isolated malicious activity that could pose a serious threat.
b. Enabling CNA.
c. FIS Cyber Threat: France, Israel, Cuba, India, and North Korea.
d. Enabling EW: (producers.'’prolifcrators): Sweden, Japan. Germany, Israel, and France, e Enabling Influence Operations: Pakistan and Russia.

(S//SI) I. MISSION: Military Modernization: Providing Early Detection ofCritical Developments in Foreign Military Programs.
Focus Areas:

b. Activities of state and non-state actors (gray arms dealers) in supplying advanced conventional weapons.

c. Threats posed by foreign space and counter-space systems: China and Russia Accepted Risks:

a Weapons and force developments in: Saudi Arabia, and India
b Threats posed by foreign space and counter-space systems India and France

(S//SI) J. MISSION: Emerging Strategic Technologies: Preventing Technological Surprise.
Focus Areas:
Critical technologies that could provide a strategic military, economic, or political advantage: high energy lasers, low energy lasers, advances in computing and information technology, directed energy weapons, stealth and counter-stealth, electronic warfare technologies, space and remote sensing, electro-optics, nanotechnologies, energetic materials The emerging strategic technology threat is expected to come mainly from Russia. China. India, Japan. Germany, France. Korea. Israel, Singapore, and Sweden.

Accepted Risks: Technological advances and/or basic S&T development on a global basis elsewhere.

(S//S1) K. MISSION: Foreign Policy ((includes Intention of Nations and Multinational Orgs)): Ensuring Diplomatic Advantage for the US.
Focus Areas:
Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could significantly impact U.S. national security interests: China, Russia, France, Germany, Japan. Iran. Israel. Saudi Arabia, North Korea, Afghanistan. Iraq. UN, Venezuela, Syria. Turkey, Mexico, South Korea, India and Pakistan.

Accepted Risks: Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could impact U.S. foreign policy or security interests: Taiwran.

(S//SI) l~ MISSION: Energy Security: Ensuring a Steady and Reliable Energy Supply for the US. Focus Areas: Threats to the production and global distribution/transportation of energy supplies of: Iraq, Saudi Arabia, V enezuela, Iran, Russia and Nigeria. Accepted Risks: Global impact o f the state o f energy industries in: Mexico and China.

(S//SI) M. MISSION: Foreign Intelligence, Counterintelligence; Denial & Deception Activities: Countering Foreign Intelligence Threats.
Focus Areas:
Espionage/intelligence collection operations and manipulation/influence operations conducted by foreign intelligence services directed against U.S. government, military', science & technology and Intelligence Community from: China, Russia, Cuba, Israel, Iran, Pakistan, North Korea. France. Venezuela, and South Korea

Accepted Risks: Espionage'intelligence collection operations against U.S. government, military, science & technology and Intelligence Community from: Taiwan and Saudi Arabia

(S//S1) N. MISSION: Narcotics and Transnational Criminal Syndicates and Networks: Mitigating the impact on U.S. national interests from drug trafficking organizations (DTOs) and transnational criminal syndicates and networks (TCSNs).
Focus Areas:

a. DTOs and associated enabling activities in Afghanistan, Mexico and Colombia that threaten U.S.interests.

b.TCSNs based in (or originating in) Russia that threaten U.S. or allied interests.

c. Money laundering that benefits TCSNs within, into, and out of Colombia and Mexico.

d. Criminal facilitators acting as a nexus between crime/narcotics and terrorism.

e. State-sponsored money laundering by Iran and North Korea. Accepted Risks:

a Drug production/trafficking within the Golden Triangle, China, and North Korea b. TCSNs operating in Central Asia, former Eastern Europe, and Asia,
c Criminal associated money laundering in Afghanistan, and Iraq.

State-sponsored money laundering by Syria.

(S//S1) O. MISSION: Economic Stability/Influence: Ensuring U.S. Economic Advantage and Policy Strategies.
Focus Areas:
Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: China, Japan, Iraq, and Brazil.

Accepted Risks: Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: Turkey and India.

(S//S1) P. Mission: Global Signals Cognizance: The core communications infrastructure and global network information needed to achieve and maintain baseline knowledge. Capture knowledge of location, characterization, use, and status of military and civil communications infrastructure, including command, control, communications and computer networks: intelligence, surveillance, reconnaissance and targeting systems; and associated structures incidental to pursuing Strategic Mission List priorities. Focus of mission is creating knowledge databases that enable SIGINT efforts against future unanticipated threats and allow continuity on economy of force targets not currently included on the Strategic Mission List. Focus Areas:

Global Environment knowledge Signals knowledge.

Network knowledge.

Target knowledge.
Accepted Risks: Degree of maturity may greatly vary by target

(U) II. Strategic Mission List - Enduring Targets

(S//S1) A. MISSION: China: Enabling U.S. policy and avoiding strategic surprise. Focus Areas: Provide U.S. decision makers with a holistic SIGINT perspective oftrends and developments in China, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U.S. interests. Such analysis must consider China’s strategic foreign and economic policy trends that impact U S. interests or degrade U.S. influence, the pace, scope, doctrine, and economic sustainability of China’s military modernization, the proliferation of PRC weapons and technology; the prospects for regional conflict or strategic nuclear attack; domestic economic transformation and its consequences for economic, political, and social stability'; subversive threats to U.S. institutions through hostile intelligence and information operations, and the interdependencies among these developments Accepted Risks: Certain domestic problem sets, such as demographic issues; lower-level political institutional growth; civil society' issues such as crime and human rights; environmental problems and planning; and agricultural production and food security'. Also, issues that transcend national boundaries, such as Chinese involvement in international organized crime; energy demand, production, and acquisition; and infectious disease and health.

(S//S1) B. MISSION: North Korea: Enabling the US to counteract North Korea’s development/use/proliferation of WMD, deter its aggression, and shape its behavior while maintaining U.S. readiness for collapse/war. Focus Areas: Provide U.S. decision-makers with a holistic SIGINT perspective of trends and developments in North Korea, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S interests and provide warning o f strategic threat. Such analysis must consider the stability of the North Korean regime and how it employs domestic and foreign policies to maintain its grip on power; the relationship between regime stability/behavior and its access to income from illicit activities and weapons proliferation; how Chinese and South Korean “carrots and sticks” enable or constrain North Korean behavior; the impact of the decaying North Korean economy on military' readiness; and how the interplay between U S policy initiatives toward North Korea and all of the above elements affect North Korea’s strategic calculus, the material disposition of its nuclear weapons, and the status of its military Accepted Risks: For domestic issues, risks include non-defense oriented industrial production, demographic issues, and environmental problems. Regarding issues that transcend borders, risks include non-counterintelligence associated ties between North Korean state- sponsored illicit activities and international organized crime institutions and individuals; North Korean agent activity in South Korea and Japan; non-state sponsored corruption and illicit behavior; and North Korean economic refugee flows into China

(S//S1) C. MISSION: Iraq: Enabling Coalition efforts to assist Iraq in establishing a secure, unified, democratic, and sovereign state. Focus Areas: Provide U S decision makers with a holistic SIGINT perspective of trends and developments, assessing Iraq’s progress toward establishing a viable, stable government; securing public order, suppressing insurgent opposition, ensuring reliable access to basic services and commodities; safeguarding strategic resources; and restoring a more sound economic footing. Provide intelligence on relevant factors, forces, leaders, and regional actors to facilitate U.S. Governmentpolicy or actions in support of the Iraqi process and to seize the strategic communications initiative.

Accepted Risks: none

(S//S1) D. MISSION: Iran: Enabling policymakers in preventing Iran from achieving its regional dominance objectives and pursuing policies that impact U.S. global interests. Focus Areas: Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U.S. interests. Assess Iran's foreign policy trends and leadership intentions that impact U.S. interests or degrade U.S. influence. Provide warning of Iran's capability to produce a nuclear weapon or its plans to use terrorist surrogates to attack Israel or U.S. forces and interests Assess the regime's progress in initiatives that enhance its pursuit of regional power objectives in the political, economic, energy, and religious or ideological arenas

Provide indicators of regime stability and/or susceptibility to democratic reform initiatives Accepted Risks: Efforts to ascertain the scope of Iran's narcotics'organized crime elements and economic stability/influence.

(S//S1) E. MISSION: Russia: Assuring diplomatic and strategic advantage and avoiding critical surprise. Focus Areas: Provide U.S. policy and decision makers with a holistic SIGINT perspective of developments and trends in Russia, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S. interests Such analysis must consider Russia's strategic foreign policy and economic intentions and actions as they pertain to U S interests and influence in the region and globally; the strength of Russia's economy and its impact on Russian power projection capability and strategic positioning; Russia's efforts to regain military strength and stimulate economic growth through the development and sale ofadvanced technology and weaponry', and the role ofWMD, organized crime and counterintelligence in enabling Russian strategic initiatives. Accepted Risks: Certain domestic issues such as demographics, regional politics, development of civil society in the country, and monitoring of low-level military' training activities. Also, issues that transcend national boundaries such as Russia’s plans, intentions and capabilities regarding influence on the former Soviet space

(S//S1) F. MISSION: Venezuela: Enabling policymakers in preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests. Focus Areas: Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U S interests Assess Venezuela's foreign policy trends and leadership intentions that impact U S

interests or degrade U S. influence Assess Chavez’ progress in his initiatives to pursue regional power objectives in the political, economic, energy, and ideological arenas. Provide indicators of regime stability, particularly in the energy sector. Assess the depth and breadth of Venezuela's relations with countries of strategic concern to the United States, particularly Iran, Cuba, China, and Russia. Accepted R i s k s : E f f o r t s t o a s c e r t a i n t h e s c o p e o f V e n e z u e l a ’s n a r c o t i c s / o r g a n i z e d c r i m e e l e m e n t s a n d e c o n o m i c stability/influence.

Nice to have a record of all this so it's easier to find later. I might write some more stories about lesser known NSSE features that apply to this impending nightmare if I can find the time. For now...

/////

Quick notes: Lesser-known agencies such as the National Geospatial Intelligence Agency and US Northern Command also get very busy in the domestic battlespace indeed. NSSEs are part of their annual activity cycle of exercises and practice operations.

See previously: Nov 2010: USNORTHCOM: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com - CONPLAN3502 is another story altogether - but it makes you wonder what the NSA connection to NORTHCOM's 'civil disturbance operations' would be.

Feb 2009: Targeting the RNC Welcoming Committee: A Case Study in Political Paranoia | Dissident Voice

Having declared the RNC a National Security Special Event (NSSE), one that derived its “authorization” to target activists and journalists from the top secret 2006 National Security Presidential Directive-46/Homeland Security Presidential Directive-15 (NSPD-46/HSPD-15), local, state and federal law enforcement entities, the U.S. military, intelligence agencies such as the National Geospatial-Intelligence Agency (NGA) and corporate partners in the telecommunications industry and elsewhere, preemptively disrupted legal political dissent by a score of protest groups.

Revealing RNC document leaked: RNC '08 Report: Text: Revealing RNC document leaked (ACLU Nov 21 2008)

RNC '08 Report: Police & Security Documents: Powerpoint presentation: National Special Security Events (NSSE) - background involving March 2008.

Digging around - the NGA pulled its old Pathfinder issues. You'll have to look in Archive.org - January/February Pathfinder 2009

Boston skyline source Creative Commons: http://upload.wikimedia.org/wikipedia/commons/3/3c/Boston_Skyline_Panorama_Dusk_Edit_1.jpg

Upper right logo by Dan McCall - libertyManiacs.com - http://cdn0.dailydot.com/uploaded/images/original/2013/8/27/NSA-Listens-Shirtmock.jpg

Cyberpunk art: http://boingboing.net/2015/05/08/your-cyberpunk-games-are-dange.html

LICENSE: CREATIVE COMMONS WITH ATTRIBUTION TO HONGPONG.COM. PLEASE SHARE!

Local cell phone spying KingFish stonewall: Minnesota law enforcement at BCA & Hennepin County refuse to disclose SIGINT cell phone snooping capabilities from NSA contractor Harris

kingfish.jpg

It's been dawning on Americans this year that their everyday electronic devices are used by law enforcement for investigations. However the lawmen and the county attorneys are withholding the policy information about the Harris Corporation Kingfish system which is a device that can alter the electronic behavior in a cell phone, also known as a CDMA Interrogator or cell phone interceptor.

The MN Bureau of Criminal Apprehension (BCA) has declined to share any policy information about Kingfish. I have also heard that Hennepin County Sheriffs Office and their legal counsel are putting up rather high barriers to disclosing anything at all about Kingfish. The whole case is weirdly parallel to the 1978 Rockford Files episode House on Willis Avenue, which ended with this unprecedented title card:

rockford-files-willis-ave.pngWe still have "no legal right" to know about who in Minnesota is building dossiers and how. The main question: what is Hennepin County and the BCA hiding in their versions of the House on Willis Avenue?

At the Hennepin County level in the 2010 they earlier promised to come up with sensible and clear policies about if and when law enforcement uses these devices to interfere with cell phones. Now they are claiming that stuff is non-public data - which of course precludes informed public debate at the Legislature in 2014 about electronic law enforcement interference in technical devices.

Several people including Rich Neumeister are looking into this nasty Signals Intelligence (SIGINT) mess. Follow @RichNeumeister - he is helpful answering about the details on this via Twitter.

In a shocking surprise Harris Corporation is a major contractor with the National Security Agency and KingFish is part of the domestic-grade apparatus for local but still unchecked NSA-style electronic snooping. The NSA didn't seem like a big deal when KingFish was approved, but now everyone has finally started noticing the tremendous power of unchecked electronic data collection. It's a much Hotter Potato than in 2012!

See: Sept 2009: Harris Corporation and National Security Agency Announce Certification of First Tactical Radio with Type-1 Suite B Information Security

July 2012: Harris Corporation Receives National Security Agency Certification for Soldier Radio Waveform in Falcon III AN/PRC-117G Multiband Manpack Radio

April 2007: National Security Agency Certifies Harris Corporation's SecNet 54 Top-Secret Capable Secure Wireless LAN Product

September 2004: Harris Corporation Receives NSA Certification for Programmable Cryptographic Module

Wikispaces notes: PIRT - Harris Corporation etc. More Harris links at end.

rockford3.pngAnother angle here: Hundreds of thousands of dollars have gone into KingFish in Minnesota and they are not willing to share the expense information. Ars Technica reports the boxes cost $25K so where the hell is the rest of the money? Meet the machines that steal your phone’s data | Ars Technica:

The Kingfish is a surveillance transceiver that allows authorities to track and mine information from mobile phones over a targeted area. The device does not appear to enable interception of communications; instead, it can covertly gather unique identity codes and show connections between phones and numbers being dialed. It is smaller than the Stingray, black and gray in color, and can be controlled wirelessly by a conventional notebook PC using Bluetooth. You can even conceal it in a discreet-looking briefcase, according to marketing brochures.

First used: Trademark records show that a registration for the Kingfish was filed in August 2001. Its “first use anywhere” is listed in records as December 2003.

Cost: $25,349.

Agencies: Government agencies have spent about $13 million on Kingfish technology since 2006, sometimes as part of what is described in procurement documents as a “vehicular package” deal that includes a Stingray. The US Marshals Service; Secret Service; Bureau of Alcohol, Tobacco, Firearms, and Explosives; Army; Air Force; state cops in Florida; county cops in Maricopa, Arizona; and Special Operations Command have all purchased a Kingfish in recent years.

[…]The code of silence shrouding the above tools, however, is highly contentious. Their use by law enforcement agencies is in a legal gray zone, particularly because interference with communications signals is supposed to be prohibited under the federal Communications Act. In May, an Arizona court ruled that the FBI's use of a Stingray was lawful in a case involving conspiracy, wire fraud, and identity theft. But according to the American Civil Liberties Union (ACLU), when seeking authorization for the use of the Stingray tool, the feds have sometimes unlawfully withheld information from judges about the full scope of its capabilities. This means that judges across the country are potentially authorizing the use of the technology without even knowing what it actually does. [But in MN who needs judges?? LOL]

That's not all. There is another significant issue raised by the Harris spy devices: security. According to Christopher Soghoian, chief technologist at the ACLU, similar covert surveillance technology is being manufactured by a host of companies in other countries like China and Russia. He believes the US government’s “state secrecy” on the subject is putting Americans at risk.

"Our government is sitting on a security flaw that impacts every phone in the country," Soghoian says. "If we don't talk about Stingray-style tools and the flaws that they exploit, we can't defend ourselves against foreign governments and criminals using this equipment, too."

rockford-files.png

Soghoian makes an excellent point - the vulnerabilities exploited by KingFish are in some ways a major public safety threat, and the security establishment is accruing power by hiding the flaws as usual instead of forcing society to deal with the overall crappiness of today's telecom technology.

"Security by obscurity" is the dominant principle of political accountability here, and of course it is doomed to fail. Responsible disclosure of the flaws exploited by KingFish and their granular legal circumstances are what we need, not moar domestic SIGINT fog and mystification.

All of these cell phone attack avenues should be known because similar tech to KingFish would be more widely available soon. The disruption under the federal Communications Act is also relevant.

Some time back I pointed out the problems with MN statutes about these kind of cell interceptor technology at a Senate committee and former Sen. Mee Moua suggested that if I wanted to go fishing for KingFish I might need to find some alternate way. At least these days more people care about this stuff!! [It should be recalled Moua - a Hmong war refugee - was hounded by law enforcement at the tail end of her service. See MPR clip below]

/////

Earlier: March 3 2010: Sheriff Stanek landing Fed cash for KingFish military cellphone tracker in Hennepin County; National Guard intelligence analysts fuse to metro police departments; Lobby for warrantless wiretaps in St. Paul | Twin Cities Indymedia -- March 15 2010: Surprise bill for interstate fusion center data sharing pops up Tuesday; Specs found for Harris StingRay & KingFish cellphone tracking devices | Twin Cities Indymedia

via Rich Neumeister: Open Secrets: An indefensible and odious practice with (Foia-Data Practice) data requests (Oct 15th)

////

Office of the Commissioner

445 Minnesota Street - Suite 1000 - Saint Paul, Minnesota 55101

Phone: 651.201.7160 - Fax: 651.297.5728 - TTY: 651.282.6555

Website: dps.mn.gov

October 3, 2013

Rich Neumeister VIA Electronic Mail

Re: Cell Phone Tracking Data Request

Dear Mr. Neumeister:

Thank you for your data request. You ask "to inspect and review all government data about the cell phone location tool known as the (Kingfish) including, but not limited to, such items as protocols, procedures, legal thresholds, Attorney opinions, evaluations, correspondence, and results of use."

The BCA does possess cellular exploitation equipment; however, we cannot provide details about the equipment because it would compromise ongoing and future criminal investigations including AMBER Alerts, kidnapping cases, fugitive searches and homicides.

In addition, any disclosure regarding the manufacturer, model, capabilities, functionality or other specifics about the equipment could be used by criminals and fugitives to defeat the technology and render the system useless.

As a result, any data regarding this equipment is confidential or protected non-public under Statutes 13.82 Subd. 25 and 13.37 Subd. l (a).

Portions of the data are also trade secret data not subject to dissemination. The contracting company has taken efforts to protect the data from disclosure. As you are aware, a corporation supplying trade secret data to a government entity may claim portions are trade secret. The contractor in this case has appropriately made such a claim as it relates to portions of the data, pursuant to Minn. Statute 13.37 Subd. 1(b).

Again, thank you for your data request. Should you care to discuss it further please contact me.

Sincerely,

E. Joseph Newton

General Counsel

/////

Lol "any disclosure regarding the manufacturer, model, capabilities, functionality or other specifics about the equipment could be used by criminals and fugitives to defeat the technology" - so they are counting on ignorance to succeed in controlling society. A perfectly sound way to invest public Debt-Dollars, counting on perpetual confusion over some metal box's legal & technical specifications. Perhaps this kind of clever spending theory contributed to the federal government shut down - it's not like millions haven't vanished on deficient & wasteful Homeland Security gear :-/

Well then let us take a look at MN Statutes 13.82 Subdivision 25. 13.82, 2013 Minnesota Statutes

"Subd. 25.Deliberative processes. Data that reflect deliberative processes or investigative techniques of law enforcement agencies are confidential data on individuals or protected nonpublic data; provided that information, reports, or memoranda that have been adopted as the final opinion or justification for a decision of a law enforcement agency are public data."

Justification for a decision of a law enforcement agency are public data and that would really seem to include the legal memos about the process for when to fire up Kingfish to poke at cell phones.

here is the 13.37 Subdivision 1 a: 13.37, 2013 Minnesota Statutes

Subdivision 1.Definitions. As used in this section, the following terms have the meanings given them.

(a) "Security information" means government data the disclosure of which the responsible authority determines would be likely to substantially jeopardize the security of information, possessions, individuals or property against theft, tampering, improper use, attempted escape, illegal disclosure, trespass, or physical injury. "Security information" includes crime prevention block maps and lists of volunteers who participate in community crime prevention programs and their home and mailing addresses, telephone numbers, e-mail or other digital addresses, Internet communication services accounts information or similar accounts information, and global positioning system locations.

/////

It seems like this is worded to mean that the "information" would be subjected to "theft, tampering, improper use, attempted escape, illegal disclosure, trespass, or physical injury". "Defeat the technology" is not on that list, and indeed the question of who the technology has been used on remains decidedly open.

Here is Rich's list of questions which is a good starting point: What's behind the secrecy wall of Hennepin Co Sheriff and BCA?

Some of the few questions I am trying to get answered are as follows: In what situations are the cellular exploitation devices used?

Are the BCA/Hennepin Co Sheriff invading people's privacy and liberty at a low legal threshold or no threshold rather than get a search warrant?

Who oversees and approves the use of the equipment? Where is the accountability?

How many innocent people have been within sights of the Kingfish or similar device, the data collected and those subjects of the surveillance who may not even know about it,? How many arrests have happened with the use of this device?

Kip Carver, an official in the Hennepin County Sheriff's office stated to the county's commissioners three years ago that the cellular exploitation device may be used hundreds of times a year.

How frequently are the cellular exploitation devices used and the number of subjects?

Depending if the cops are using a low threshold or none at all in using this device are they doing so to avoid an appearance before a judge where a search warrant (top standard to protect our privacy & liberty) needs to be issued and where questions can be asked?

What is the role of the prosecutors in situations when this equipment is used?

In my data request I asked for the legal thresholds that the agencies must go by in order to use the Kingfish? What is so secret about that?

At this time, the attitude that both agencies have taken with my data requests give the Minnesota Legislature and most important the public no idea how this tool has been used, is being used, how an individual or individuals get chosen to be pursued, and who is accountable.

As some people may currently know I have been working to possibly update our state laws so that the rule of law applies to whats happening now in 2013 not in 1988-1989 when 626A had its last major update.

Even though the Department of Public Safety and the Hennepin County Sheriff do not want to tell me or the public their protocols, policies, procedures of accountability, legal thresholds, and other appropriate public data I will still push on and I hope others will. I am not interested to live in a state where law enforcement rules and not the people.

/////

Story from Feb 9 2010 Star Tribune. You Can LOL about how Kip Carver claims that the device would only track cell phone numbers obtained through a search warrant: via Sheriff Stanek landing Fed cash for KingFish military cellphone tracker in Hennepin County; National Guard intelligence analysts fuse to metro police departments; Lobby for warrantless wiretaps in St. Paul | Twin Cities Indymedia | Movement Media for Minneapolis-St. Paul

The Minnesota Bureau of Criminal Apprehension in St. Paul has a KingFish device and makes it available to local agencies, said Jill Oliveira, a BCA spokeswoman. Only a few people know how to use it because the training is expensive, she said.

Stanek couldn't be reached for comment Tuesday. Kip Carver, a Sheriff's Office inspector who heads the investigations bureau, told commissioners that the device would track only cell phone numbers obtained through a search warrant, and couldn't be used without a court order.

The KingFish can't eavesdrop on phone conversations, Carver said. Instead, it locates cell phones that might be in the possession of an abduction victim, he said, or a robber making a getaway.

"I truly believe [we] would be very busy using that," Carver said. Asked how many times a year the device might be used, he said it could be in the hundreds.

Commissioner Jan Callison agreed to table the request to get more information, but added she was not as troubled by the device as some of her colleagues. "It seems to me that there are certainly ways to make sure this technology is deployed legally. ... It's really the sort of law enforcement that we want," she said.

/////

rockford-files2.pngHere is something handy, a contract surely similar to the ones being currently hoarded by BCA and Hennepin County Sheriffs Office, a 2012 Harris Government Communications Systems Division June 25 2012 from the city of Tempe Arizona: Harris Corporation Wireless Surveillance Products Standard Terms and Conditions of Sale | Public Intelligence - 11 pages.

Harris Corporation’s “StingRay” Used by FBI for Warrantless Mobile Phone Tracking

Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products Price List. Thanks to PublicIntelligence.net as always for stacking the key infos nicely!

/////

December 2008: Harris Corporation Receives National Security Agency Certification for Type 1 Ethernet Module for SecNet 54

June 2013: Harris Corporation Receives NSA Type 1 Certification for Cryptographic Component of Anti-Scintillation/Anti-Jam Modem

July 2011: Harris Corporation's Small Secure Data Link Receives National Security Agency Certification - aka drone radios

January 2008: Harris Corporation Receives National Security Agency Certification for Falcon III Multiband Manpack Radio

Photo source: Ars Technica: Meet the machines that steal your phone’s data | Ars Technica

/////

Sen Mee Moua hounded by law enforcement: Mee Moua leaves state Senate, legacy | Minnesota Public Radio News - Laura Yuen June 29 2010

Yet Moua made waves with some law-enforcement officials this year when she proposed legislation that would ban police departments from sharing secret files on gang members and activities. Moua said she had concerns about racial profiling, especially of young African-Americans who she says could be entered into the database simply for being photographed with a known gang member. The proposal came after a series of scandals involving the now-defunct Metro Gang Strike Force.

"So she saw abuse in law enforcement, and I think that's why she wrote the bills she did," Limmer said. "Was it an overreach? Hmm. Some people might say so, but you could understand where she was coming from."

Some law-enforcement officials, though, painted Moua as a gang sympathizer. And Ramsey County Sheriff Bob Fletcher said at the time that Moua was overreacting to isolated problems with the strike force.

"I think that overreaction has caused her to introduce reckless legislation that will jeopardize the safety of citizens, officers and case prosecutions," Fletcher said.

Moua said she was taken aback by the reaction from law enforcement.

"They wanted to make this about cops vs. dangerous criminals," she said. "But the actuality is it's about cops vs. people in the community who haven't done anything [wrong] and who were being profiled in these databases."

Chaska Police Chief Scott Knight said Moua has been known to question police practices -- which may have irked some law enforcement officials.

"While sometimes some of my peers had some frustrations, I thought she was very healthy for the global approach to law enforcement, and the balance with community and citizens' rights and fairness," Knight said.

/////

To paraphrase Rockford Files Jim says: "You can stomp someone into the ground using computer technology as a club"… Evil CEO guy: "To my knowledge none of this is illegal." Jim: "It should be!" The House on Willis Avenue is easily the most applicable episode to this scenario, with its combination of unregulated electronic spying and shady local government operations:

See also: Rockford files data surveillance didactic ending — Critical Commons

/////

Finally I would add there are several candidates for Pirate Party in Minneapolis in November - if you want to send the signal that these issues matter, consider voting for them. The two parties are almost certainly not going to help you and the other minor parties are all over the map.

Exclusive New Court Docs: Oklahoma City Truth is Back! Trentadue's court process unfolds in epic FOIA fight for missing Murrah & motel videotapes

Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]

jessetrentadue.jpg

Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.

Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.

The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.

Press coverage: Sept 9 2013: Judge orders trial in allegedly missing Oklahoma City bombing video case | Deseret News:

SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.

U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.

"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."

At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.

Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.

The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.

Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.

Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.

Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.

Previously on HongPong.com: Apr 19 2010: 2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles | HongPong.com // March 11 2007: New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? | HongPong.com. June 21 2011: Two murky major elements of covert American power: The US Treasury Exchange Stabilization Fund (ESF) & the FBI's little "S Drive" of deleted filez | HongPong.com . Briefly noted tangent at April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com. Item on Dec 28 2010: Russia & China not buying BIS Fractional Reserve Gold currency scheme pushed by the Ben Bernank; FBI ALF informant developing Firefox 4 security, reminds OpenBSD FBI Backdoor | HongPong.com

Moar Notes: For the thoughtful documentary released in 2012 by local activists: Oklahoma City Bombing | Murrah Federal Building 1995 | A Noble Lie. See also notes from Kaye: jesse trentadue | AxXiom for Liberty. Oct 2012: Jesse Trentadue exposes who the FBI uses for informants. A lot of this gets to the FBI's shady secret file pockets such as the mysterious "S Drive": S is for Secret: Jesse Trentadue Discovers the FBI’s S Drive (June 2011). 2009 from IntelWire.com: Trentadue CIA Vaughan Index Sept 2009.

A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.

The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.

While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]

//////

So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?

Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.

Anyway let's have ourselves some fresh court documents:

//////

Trentadue-court Order Grant Motion Strike Deny Motion Sj Ecf

//////

Trentadue-fifth Hardy Declaration Ecf

//////

Trentadue-plaintiff's Opposition Motion to Strike Ecf

//////

Trentadue-memo Motion to Strike Fifth Supplemental Declaration_ecf

OLDER DOCS for yr viewing pleasures:

FBI INFORMANT MANUAL - very important for beginning to discern how informants insert 'fake decision trees' into our reality:

FBI Informant Manual

//////

Intelwire writeup by JM Berger on the Roger Moore angle and such:

29355734 Trentadue CIA Vaughan Index Sept 2009

//////

Anyway I will leave it there for now, but it is great to see this slowly developing story jump forward for another round vs the national security coverup machine!

Pentagon domestic operations switches from "pull" to "push" on 24-48hr timelines: "Defense Support of Civil Authorites" expands

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

There is also a video here: http://www.pentagonchannel.mil/Video.aspx?videoid=285596

Mirrored: Domestic Pentagon ops expands Defense Support of Civil Authorities vs domestic extremists - YouTube

//// UPDATE 4.22.13: I forgot! Here is one version of USNORTHCOM CONPLAN 3501. Thanx to YAN, reddit, & Cryptogon for taking note of this post! This video from the Boston metro area shows what domestic militarization of police is all about:

Also please follow PublicIntelligence.net and Cryptome.org for more handy docs. PI in particular has been pretty well on top of this.////

Mission drift into the US continues as the Pentagon contemplates dealing with "domestic extremists" under the rubric of Defense Support of Civil Authorities (DSCA) - one aspect of which is the US Northern Command's "USNORTHCOM CONPLAN 3501".

CONPLAN 3501, This generic emergency plan is relatively easy to obtain (most of the text), but it is the "friendly" hand of the DOD compared to the more mysterious and riot-control-oriented "USNORTHCOM CONPLAN 3502" entitled "Civil Disturbance Operations" (CDO). This surfaced in researching the role of Northcom at the 2008 Republican National Convention, which was a very 3502 CDO style operation with National Guard controlling space on Kellogg Blvd. CONPLAN 3502 is the post-2002 version of GARDEN PLOT, the 1960s-1990s template plan for domestic military deployments, like for example in the LA Riots.

This extends the story from late 2010: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com and reconfirms various aspects.

/////////////

Here is the new front-piece document. Also bonus weird stuff about the ever popular integration of North America.

An interesting Snippet:

Loosely-networked or individually motivated violent extremists will continue to exhort followers and encourage violent extremism in the homeland.

o HVEs will operate alone or organize in small groups and will be largely autonomous in their operations; they will have access to web-based resources to assist them in their operational planning.

o Military members and facilities will remain prominent targets of terrorists, and particularly by HVEs.

ł DoD will be called upon to provide significant resources and capabilities during a catastrophic event in the homeland.

o The National Response Framework will remain the primary instrument for applying Federal capabilities during disaster response.

And

Rapid and actionable intelligence on terrorist threats

DoD will maintain and enhance the Joint Intelligence Task Force for Combating Terrorism (JITF-CT) as its key node for sharing intelligence with interagency partners on terrorist threats. DoD will improve and refine intelligence and information-sharing relationships that have developed since 9/11 and as a result of the Fort Hood shootings.

DoD maintains a robust array of foreign intelligence capabilities, and sharing relevant counterterrorism-related information with the Federal Bureau of Investigations (FBI) and other key parties is vital to the prevention of potential terrorist threats to the homeland. JITF-CT will remain the focal point for DoD’s outreach and sharing of intelligence and information with the FBI, the Office of the Director of National Intelligence (ODNI), and the National Counterterrorism Center (NCTC). Additionally, DoD will expand its participation within the various FBI Joint Terrorism Task Forces (JTTFs),9 as well as other similar entities to maximize “top-down” and “bottom-up” sharing of key pieces of intelligence and information, consistent with applicable law and policy.

And of course, Unity of Effort and the ever popular Council of Governors:

Promote Federal-State Unity of Effort

Unity of effort between the Federal Government and States must be one of DoD’s guiding principles in the homeland, since unifying DoD’s efforts with those of its external partners improves collaboration and shortens response times for meeting life-saving needs during emergencies. Unity of effort also means greater national preparedness at less overall cost, while preserving both Federal and State constitutional requirements and responsibilities. DoD and its Federal partners must continue to strengthen unity of effort with States to define common goals regarding capabilities, structures, and processes for responses to disaster and emergencies in the homeland. The Council of Governors – established by Executive Order in 2010 – will be an essential forum for enhanced, senior-level dialogue among Federal and State civilian and military officials for this purpose.

[.....] DoD will regard dual-status commanders as the usual and customary command and control arrangement in cases where Federal military and State National Guard forces are employed simultaneously in support of civil authorities within the United States.

DoD will continue to refine processes for dual-status commanders and their associated command structures. By leveraging the use of such commanders, DoD will improve Federal-State communication, economy of force, and force employment for planned events and no-notice or imminent incidents. Historic examples of the employment of dual status commanders include national special security events such as the Democratic and Republican national conventions and responses to disasters like Hurricane Sandy and wildfires in the western United States...

Vague talk of militarized domestic databases always good:

Since Federal and State military components have varying requirements for relevant information and level of detail, development of a COP solution need not specify systems, hardware, or software. Instead, it must be based on common data from authoritative military or civilian databases that flow to various systems in a common format.....

The DCE/DCO structure is reconfirmed to be key to domestic military operations:

DoD will use the planning capacity of Defense Coordinating Elements (DCEs) to expand planning cooperation at the regional level so that Departmental capabilities are considered in FEMA-led regional planning efforts. DoD will also build an integrated organizational architecture for its liaison and coordinating officers at various headquarters.

The ten FEMA regional offices are key nodes for integrating Federal plans with State and local plans, and DCEs within these regional offices are essential for operational and tactical unity of effort in an adaptive environment. This regional planning relationship bridges the gap between State-level planning conducted at a National Guard’s Joint Force Headquarters (JFHQ)-State and DoD and DHS national-level planning. The JFHQs in each of the 54 States and Territoriesprovide vital ties to State emergency officials and the National Guard Bureau. This enduring synergy positions the JFHQ as the key State-level organization for integrating the emergency plans of local DoD installations with State plans and FEMA regional plans.

DoD will deepen and facilitate rigorous Federal, regional, and State-level planning, training, and exercises through coordination and liaison arrangements that support civil authorities at all levels. These arrangements include DoD liaison officers at DHS and FEMA, Defense Coordinating Officers (DCOs), and Emergency Preparedness Liaison Officers from each Service.....

FULL DOCUMENT: Pentagon domestic ops Homeland Defense Strategy 2.2013

/////////////

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

By Jim Garamone - American Forces Press Service

WASHINGTON, April 1, 2013 – The Defense Department incorporated hard lessons learned when it codified its new homeland defense and civil support strategy, said Todd M. Rosenblum, DOD’s top homeland defense official.

In an interview with American Forces Press Service and the Pentagon Channel, Rosenblum, the acting assistant secretary of defense for homeland defense and Americas’ security affairs, said the new strategy is a recognition that the operating environment has changed.

“We face new threats, we have new vulnerabilities, we have new dependencies, most importantly we have a new way to do business,” Rosenblum said during a Pentagon interview. “We have to capture that and make sure the department is prepared and directed toward being more effective and efficient as we can be.”

The Defense Department is charged with defending the homeland from attack. U.S. Northern Command is further charged with working with state and local entities and other federal agencies to provide support in times of natural or man-made disasters. In the first instance, DOD has the lead. In the second, another federal agency -- such as the Federal Emergency Management Agency -- has the lead.

The strategy, released in February, looks at the lessons learned from past experiences -- from Hurricane Katrina through Hurricane Sandy.

They also looked at changes including the growth of communications networks, dependence on private-sector capabilities and “the rising expectations from the president and from the secretary, and certainly from the American people, that we will be prepared to provide support to civil authorities within a 24- to 48-hour window,” Rosenblum said.

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

“So we are postured to provide assistance as fast and rapidly as possible,” Rosenblum said.

The vast difference between the response to Katrina in 2005 and to Sandy in 2012 shows the effectiveness of the new strategy, he said.

“We were more efficient, timely and effective in our support to Hurricane Sandy,” Rosenblum said. “This is because we did integrated planning within DOD, with our federal partners, and with our state partners. We recognized the need to not wait to be called upon, but to pre-position our support capabilities knowing there’s going to be audibles and ad hoc requests.”

Planning is at the heart of the strategy, he said. Integrated planning -- with state and local officials, with other federal agencies and with non-governmental entities -- has increased visibility and prominence. The National Guard -- an organization that bridges state and federal efforts -- continues to play a crucial role. But, Rosenblum noted, the strategy recognizes that response to disasters requires an all-of-government approach.

Cyberattacks, he said, also could produce the type of man-made disaster that would require DOD assistance. The homeland defense mission codifies requirements to provide cyberdefense, he added.

“The threats to networks and critical infrastructure increase when we are engaged in operations overseas,” he said. “The physical effects of cyberattacks can impact our military operation capabilities and response capabilities.”

The fiscal environment impacts this -- and all other -- strategies.

“The sequester is real and effecting DOD through readiness, training,” Rosenblum said. “It is difficult for the department to plan and budget intelligently, when we don’t have budget certainty.”

Officials devised the strategy when the department had already committed to $487 billion in reductions over 10 years.

“Sequester has changed the calculus tremendously,” Rosenblum said. “But this strategy is not about buying new capabilities: It’s about our planning, our processes and our integration.”

////////////

Defense.gov News Release: DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

U.S. Department of Defense

Office of the Assistant Secretary of Defense (Public Affairs)

News Release

On the Web:

http://www.defense.gov/Releases/Release.aspx?ReleaseID=15878

Media contact: +1 (703) 697-5131/697-5132 Public contact:

http://www.defense.gov/landing/comment.aspx

or +1 (703) 571-3343

IMMEDIATE RELEASE No. 172-13

March 22, 2013

DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

The Department of Defense announced today the release of the Strategy for Homeland Defense and Defense Support of Civil Authorities. This policyestablishes DoD’s priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president’s National Security Strategy and the 2012 Defense Strategic Guidance. It links with other DoD and national strategic documents related to missile defense, space, cyberspace, counterterrorism, and the Western Hemisphere. The strategy identifies two priority missions for the department in the homeland: defend U.S. territory from direct attack by state and non-state actors; and provide assistance to domestic civil authorities in the event of natural or manmade disasters, potentially in response to a very significant or catastrophic event.

The strategy emphasizes cost-effective policy mechanisms and innovative approaches to defend the homeland against direct attacks and to provide timely responses to routine and catastrophic events on U.S. territory. It stresses the continuation of DoD capabilities to defend against conventional and emerging threats in the air and maritime domains, while expanding cooperation with federal, state, and local partners to defeat asymmetric threats – including, for example, homegrown violent extremists who may seek to use improvised explosive devices. Additionally, it addresses DoD preparations for responding to man-made and natural disasters.

“The Department of Defense’s contributions to the defense of our nation have evolved over the past decade and account for new threats and challenges. Lessons learned from events like Hurricanes Katrina and Sandy and collaboration with our interagency partners and State Governors have framed our current approach to DoD civil support activities,” said Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Todd Rosenblum. “This strategy emphasizes strengthening our partnerships with federal agencies like the Departments of Homeland Security and Justice, with state and local governments, with the private sector, and with our Canadian and Mexican neighbors – not only for more comprehensive approaches to complex security challenges in the homeland, but also to create efficiencies through collaboration and joint action,”

For further information about this strategy, please access http://www.defense.gov/news/Homelanddefensestrategy.pdf

//////////

Never heard of this guy, he is the one doing the news release above. Career includes being Evan Bayh's national security staff & CIA Near East 1988-1993hires_061611094311_Rosenblum_Todd.JPG

Defense.gov Biography: Todd M. Rosenblum

Acting Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs [Acting?]

Todd M. Rosenblum is the Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs. In this position, he advises the Under Secretary of Defense for Policy on the homeland defense activities of the Department and regional security matters for the countries of the Western Hemisphere. He is also responsible for advising the Secretary of Defense on all matters pertaining to defense support to civil and law enforcement authorities in the homeland. Mr. Rosenblum has nearly 25 years of political, policy, and legislative experience in national security affairs.

Prior to his appointment at the Department of Defense in May 2011, Mr. Rosenblum was the Deputy Under Secretary of Intelligence for Plans, Policy, and Performance Management, Department of Homeland Security, from February 2009 to May 2011. He directed strategic and policy planning for the Department’s intelligence program, oversaw budget development and resource allocation priorities for the synchronization of intelligence programs and priorities, provided stewardship and direction for the Information Sharing Enterprise, and ensured that the intelligence program was aligned with national, departmental, and intelligence strategy and requirements.

Mr. Rosenblum was a Professional Staff Member on the Senate Intelligence Committee from March 2005 to November 2008, leading Committee oversight of Department of Defense human intelligence collection programs and Intelligence Community-wide intelligence collection programs and operations in the Middle East. Concurrently and prior to joining the Committee, he served as the Military Legislative Assistant and National Security Advisor to Senator Evan Bayh from January 2001 to November 2008, where he acted as senior counsel and represented the Senator on defense issues and foreign policy, national security legislative actions, and public affairs. He was a member of the Senior Personnel Staff, National Security Cluster, on the Obama Presidential Transition Team from November 2008 to February 2009.   

Mr. Rosenblum held several management and advisory positions at the Department of State and the U.S. Arms Control and Disarmament Agency from August 1994 to January 2001. From April 1999 to January 2001, he was the Executive Assistant/Chief of Staff to the Assistant Secretary of State for Nonproliferation where he provided executive management and policy liaison on the full range of nonproliferation issues. He was the Senior Foreign Affairs Advisor for Northeast Asia at the U.S. Arms Control and Disarmament Agency from August 1994 to April 1999, where he represented the Agency in numerous nonproliferation negotiations and regional security dialogues.

From January 1993 to August 1994, he was the Deputy Political-Military Advisor for the Bureau of Near Eastern Affairs, U.S. Department of State. Mr. Rosenblum chaired an interagency export control working group, providing departmental recommendations on proposed arms sales to the region, and was responsible for ensuring consistency between national policy and regional security assistance activities. He was an Intelligence Officer in the Central Intelligence Agency’s Office of Near Eastern Affairs, Directorate of Intelligence, from September 1988 to January 1993.

Mr. Rosenblum has received numerous individual and group awards from the Department of State, the U.S. Arms Control and Disarmament Agency, and the Central Intelligence Agency. He received his Masters in International Affairs in 1988 from the School of International and Public Affairs, Columbia University, and his Bachelor of Arts in 1986 from Columbian College, The George Washington University.

//////////////

Anyway that should give everyone a little more to work with, given the heightened domestic military operations surrounding the Boston aftermath, it is important to get a sense of where the Pentagon sees itself going in these reactions and ongoing operations -- what happens next is another question.

A great move would be publishing the entire text of USNORTHCOM CONPLAN 3502 Civil Disturbance Operations on the Internets immediately!

Purported Christopher Dorner police & SWAT comms radio transcript compilation indicates "burners" & "burn it down", the "short manifesto"

I would be interested to hear the audio from this, going to cross post it for reference in case anything happens to the pastebin. A lot of weird stuff in this case, I'm not going to make assumptions but I think this may be relevant. Also good work on the following recording with lots of "burn it down" type quotes. SOURCE: http://www.youtube.com/watch?v=cNk-bV40XMc

SOURCE: Dorner - Transcribed Police Comms - Pastebin.com - http://pastebin.com/1PJx99nf

Transcribed police comms - Dorner / BigBear **** All credit to Flytylady ****

@ http://forums.rimoftheworld.net/showthread.php?12312-Car-Jacking-Big-Bear

----------

Dispatch to Air 83: Do we still have the suspect pinned down? I did not have a visual, but the best I can tell is they have him pinned down near the shooting scene and they are working.

Pinned down on highway 38; send all units to highway 38.

--------

Cover the dirt road that comes out by the Oaks restaurant.

------------

Unit with wounded officers on board - go back to pavement, go back to pavement. That's where the med unit is going to land.

------------

The cabin with the smoke is the target cabin. (Ground Unit talking to 40K)

-----------

Shooter's on the west side of the house (40K to ground units)

--------

"I grew up in that house, there is a basement in that house. At the rear, totally cemented in"

Copy

------

IC, Bear Cat, where do you need us

Bear Cat, come on down 7 Oaks until you see all the cars. I'm gonna need your ammo cans (rest was broken)

------

We can not put boots on the ground on that side, no boots on the ground, it's too dangerous!

-----

Per Terri Kasinga CalTrans - all roads are closed in the mtn communuties and probably will be for several hours

------

Let me know when you have an eye on that north side and are able to cover it effectively.

------

Can you get that news copter out of the area? They're broadcasting our swat positions, they need to go!

Would be my pleasure.

------

Sheriff McMahon has asked that your helicopters pull back or leave the area of the barricaded suspect. Gunfire is being exchanged between law enforcement and the suspect; your personnel are in danger and could contribute to officer safety on the ground.

Thank you for your cooperation.

------

Can you plan some routes to Loma Linda and some other trauma centers?

Copy.

------

Suspect may be out of the cabin. All units use caution.

-----

Per Caltrans District 8

SR138 at Pilot Rock is being opened to upbound traffic.

------

Clear the Air! The only ones that should be talking are the ones that have visual on the suspect on 8Mtn1. All other to 8Tac2.

------

40K to Control - Info only - a bunch of LA deputies just showed up and inserted on that (plateau?) about 1/4 mile(I think) from the scene; not sure if they were invited.

LA Fire Ship info? Copy; per 61C get all other aircraft out of the area, he'd appreciate it.

LA Fire Ships inserted up the ridge about 1/2 mile from the location - multiple SWAT members. Probably headed for the ridge about 1/2 mile from the incident location.

------

Team of 6 guys on the #4 side with 2 snipers.

------

LA County flew 3 or 4 helicopters up here. They inserted into a field 1/2 mile north of the location; dropped off 15 SWAT guys all dressed in black. Not sure if they were invited or if there is any coordination with those guys. We need to pass that on to the powers that be.

-------

We still have 330 closed, but 18, towards Crestline should be open, let's keep it like that.

Copy.

------

330 is still shut down; per Chief (Cuzimano?) that should be opened.

Advise the units that 330 is to be opened.

-------

http://bearvalleyusd.org/ As of 2:10 pm today, February 12, 2013, the lockdown at BBHS, BLES and CTHS has been lifted. Buses will be running and parents can pick up their students. FVES remains on lockdown.

Fallsvale Elementary School

40600 Valley of the Falls Dr. Forest Falls

-------

61C 61L: Back the Bear down and then deploy the burner through the turret.

He's not shooting back; he may be down.

Confirm you know there is a basement in that residence.

Affirmed.

-------

Transcribers Synopsis: Units on scene have been working to tear the house apart on the sides of the house that they have been able to secure. There is now talk of taking down the kitchen wall and it has been noted by the ground units that a blood splatter has been observed on one of the interior walls.

-------

Green smoke inside the house.

Not SBD smoke. Diversion.

Can you go to the back?

He's in the 1-4 corner of the house.

Push him back towards the 1-2 if you can.

He deployed another smoke.

-------

We're going to be deploying a gas burner to the #1 side from the Bear.

--------

7 burners have deployed and we have a fire.

-------

Fire in the front, he might come out the back

------

#1 side fully engulfed; fire on the floor.

-----

Sound like one shot fired from inside the residence.

All primary units stand by; maintain your discipline.

The 1-2 corner fully engulfed.

---------

Status check? Code 4, on the #4 side. Do we have fire back there yet? That's affirm. That's affirm. The #2 and 4 side are fully involved. Only have #3 side left.

Any propane cylinders back there that we need to be aware of?

No, not that I can see from my position.

---------

Do you want have fire start putting water on it once the roof starts to collapse?

Affirm; but we're not quite there yet. The #2-3 is still vulnerable.

We'll move Fire 200 yards out.

There is still alot of room on the 3-4 corner that hasn't engulfed yet.

-------

We still have ammo going off in the fire.

---------

Battalion 131 we're still not ready for you. We still have live ammo going off.

Bat131 we have a firefighter that was raised in that building and he is familiar with it. The basement is 12x15.

--------

Fire is doing quite well. The 2-3 or the 3-4 is where that basement is located.

Standing by for your call for Fire - whenever you're ready.

----

Allowing residents of Mountain Home Village, Angelus Oaks and Forest Falls up the 38 at Bryant. All others are being turned around.

------

You guys are my eyes back there. If you see anything catching fire that shouldn't, let me know. Otherwise let it go.

Getting information that there is a propane tank at the rear of the residence near a garage. Be aware, if it goes it will be about a 50 yard debris field.

Copy.

--------

Fire Dept has been allowed in to the scene; no word yet on whether anyone was found...

We need a lighting unit out here.

-------

Media is being held (at Angelus Oaks) until confirmation.

-------

Media is to stay at Bryant and the 38. They are not to come up to Angelus Oaks.

Per SBSO, do not let any more media upbound, keep them at 38 and Bryant.

-------

The camps in the area are calling to confirm they are to stay on lock down.

They can release the lock down.

--------

We're receiving information from Riverside PD that there were escape routes from the basement in the cabins there.

{reply} We have a previous resident that lived there...

---------

Per Caltrans District 8

SR38 is open (ID required) to residents of Valley of the Falls, Mountain Home Village, and Angelus Oaks. SR38 is still closed from that point up to Lake Williams.

--------

Media is now allowed up to Angelus Oaks Market. Per SBSO.

-------

61L to Control: I'll be changing locations to headquarters. 61C is still on scene.

---------

Advise units at 38 and Bryant we can no longer accept any more media up here. We have enough media up here already. There isn't any more room.

--------

From the PIO for SBSO Cindy Bachman: we haven't been into the cabin yet; will not confirm rumors a body was removed.

The cabin is still burning and too hot to enter safely.

---------------

LAPD: "That cabin is too hot for anyone to make entry. No body has been found in that cabin. Reports of body found are not true."

-------

There are a lot of other stories out there that need attention but anyway doesn't mess matters to have this reference. One of the suspiciously confusing things are the differently-scaled manifestos. Possibly from diff facebook & media-delivered items.

Different manifesto versions:

see http://www.reddit.com/r/conspiracy/comments/18599p/scanned_original_dorn...

http://www.scribd.com/doc/124551564/Original-Manifesto (the short one)

http://s3.documentcloud.org/documents/599208/christopher-dorner-manifest...

http://content.clearchannel.com/cc-common/mlib/616/02/616_1360213161.pdf

The New 21st Century COINTELPRO Mobius Strip: Undisclosed Participation, "OTHERWISE ILLEGAL ACTIVITY," Federal & State Informants, drug ops auditing in MN

fbi-mobiusstrip.jpg

A quick update on a number of different fronts developing around 21st century Cointelpro operations. This material includes the important bureaucratic fault line of authorizing "otherwise" illegal government operations, an important topic of research... Granted, Season 3 of the X-Files is playing over my shoulder, a product of a more skeptical decade. Yeah, the truth is out there - and at least here we get tiny, but real, slivers of crucial folds in the origami.

The FBI file and the Minnesota State Auditor files aren't really smoking guns, but they clearly show us interesting & almost totally unknown new levels of the modern 21st century COINTELPRO system. Four apparently new documents about the obscure and rather deliberately shadowy world around the insertion of informants into political organizations, information with implications for any political movement that might get "spammed" by fake realities generated by people working as informant handlers, or also in the state level documents, outstate drug buys, interesting examples of cash, firearms and drugs floating around. The "upper" FBI reality described here certainly has implications for the "lower" state-level drug operations, paid informant & prosecution world - thus they make an interesting contrast for one post!

From two different sources, parts of the FBI's Unclassified / For Official Use Only (FOUO) Domestic Investigations and Operations Guide [DIOG] apparently revised September 5 2007, and from the other set of requests, Minnesota State Auditor Rebecca Otto's office checks in on the processes of outstate drug task forces engaged in asset forfeiture, drug buys, firearms stuff. When various audited processes turn out to be fails, some corrective actions are recommended. I'm also throwing in a motion for discovery on certain types of informants that could be promising - the next step down this line.

This is a continuation of: 2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles | HongPong.com. See also our friends who made A Noble Lie: Oklahoma City 1995 - writeup.

The topic of the FBI file is certain to make almost any careerist in the world of "that Law thing" squirm because it is a form of documentation showing the entire edifice is one MC Escher-style mobius strip of fake morality, crimes truly authorized on paper -- heavily censored paper, but this is indeed clearly one such paper without any doubt.

Other parts of a similar DIOG file, with the same front page, was published by the ACLU in 2011(included below), but I think we got some new pages here. It's usually hard to find the precise chunks or "twists of the mobius strip of officially sanctioned crime" but fortunately I think we all got at least a few entirely fresh pages via a lucky FOIA. (I'm not totally certain the FBI drop is truly partly-new, but I haven't found key matching pages elsewhere. Plz let me know if you do!)

Group readings of this file [with a toast for every LOL] should be a mandatory drinking game / CLE for every single bar association and law review, because they show that the entire conceit is one big clusterfail, and I would dare any lawyer to make a coherent argument to the contrary.

This new relatively short FBI FOIA, I'm suspecting right now, hit some new paydirt because there are certain subtypes of FBI informants that are described with certain keywords, which could include people violating confidences, including within the media, clergy, doctors, lawyers etc. It opens up a line of inquiry that one Utah attorney Jesse Trentadue, has apparently stumbled into in his long-rolling FOIA lawsuit spurred by the suspicious murder of his brother in a federal prison (see KennethTrentadue.com for more).

At least we get some look at the terrain of specially labeled, high level FBI informants, the Gerald Fords of the world if you will [aka the Warren Commission snitch]. I can't think of another source that quite nails the different categories of FBI informants like the motion posted below, filed in the lawsuit which already has produced this (not to mention hard proof the CIA have at least some formal records of something related to the Oklahoma City Bombing still censored from our reach).

Mother Jones covered his case including the CIA angle in 7/2011: Did the FBI Bury Oklahoma City Bombing Evidence? | Mother Jones. Also: Trentadue OKC Lawsuits Expand To CIA, Add Demand For Videos via @intelwire. This new document also references the decidedly low-profile realm of private companies operated as FBI fronts. Not too bad!

On the Minnesota side, these drug task force audits are in fact publicly requestable records but not released on the interweb by default (part of the reason that very very few people are aware of the state auditor Otto's overall respectable role in the scheme of things).

Let's dive in - look for your favorite weird angle including FBI-controlled front businesses, "otherwise" illegal acts, and creating synthetic detours in authentic First Amendment Expression! Show to your favorite law-and-order acquaintances for some high-quality cognitive dissonance! :-D

[Partially] NEW FBI FILE:

FBI Illegal Informant Procedures - Confidential Human Source Policy Manual by

RELEVANT (but not particularly new) DOJ files:

Here is the ACLU 2011 file - I really think we got something similar but different:

FBI Confidential Human Source Policy Manual by

Cited as relevant see page 17 as marked, 23 as paginated PDF - AG Use of FBI confidential human sources authorization - includes Media Snitches (violating media confidentiality). The new Trentadue motion demands quantities, not names!

DOJ AG Use of FBI confidential human sources by

MINNESOTA FILES:

West Central Drug Task Force Audit

West Central Drug Task Force Audit by

Paul Bunyan Gang & Drug Task Force Audit

Paul Bunyan Gang & Drug Task Force Audit by

Lakes Area Drug Investigation Team Audit

Lakes Area Drug Investigation Team Audit by

OTHER NOTES:

Among the other small angles to consider here, the role of Executive Order 12333 from Ronald Reagan indeed turns out to be crucial in understanding the formal institutionalization of the FBI as a bureaucracy which can operate illegally, in the realm of intelligence. It was pointed out in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider that EO12333 was an important greenlight of sorts, as it led the way for "legalizing the illegal systems" of the "Iran-Contra" world particularly those involving drug and weapons trafficking through private shell companies (and EO12333 does talk a lot about front companies operated for intel functions).

Also I am adding part of a post from Bob McCarty about this case and this particular request, which shows a pretty good avenue into further inquiry. We could expect at least a few more interesting crumbs out of this line of research - certainly, stuff worth looking at. [A whole series of McCarty posts on Oklahoma City and the Trentadue inquiry I haven't even looked at!]

SOURCE: Brother of Murder Victim Seeks Details of FBI's 'Sensitive Informant Program' | BobMcCarty.com

Salt Lake City attorney Jesse Trentadue filed a motion Monday asking a federal judge to determine whether he is entitled to limited discovery into the FBI’s “Sensitive Informant Program.”

In his motion, Trentadue described the program as one used by the bureau “to recruit and/or place informants on the staffs of members of the United States Congress and perhaps even federal judges, in the national media, within other federal agencies as well as the White House, on defense teams in high-profile federal and/or state criminal prosecutions, inside state and local law enforcement agencies, and even among the clergy of organized religions.”

Trentadue’s interest in the program stems from questions that have surfaced during his ongoing investigation into the death of Kenneth Trentadue, his brother who died in 1995 under suspicious circumstances while in custody at the U.S. Bureau of Prisons Federal Transfer Center in Oklahoma City, months after theOklahoma City Bombing.

Kenneth-Trentadue_Pic

Click to learn more at http://KennethTrentadue.com.

With his latest legal maneuver, Trentadue hopes to convince Judge Clark Waddoups to compel the FBI to provide all documentation outlining what he describes in the motion as an“unlawful and unconstitutional domestic spying program.”

The maneuver comes almost four weeks after the FBI answered a federal court complaint Trentadue filed under the Freedom of Information Act to obtain copies of the manual the FBI uses to recruit and place“sensitive informants.” Citing national security concerns as the basis for their response, FBI officials answered that complaint by saying they “can neither confirm nor deny the allegations [of the Complaint] regarding its confidential informant program.”

Shown below, Trentadue’s definition of a “sensitive informant” is, perhaps, the most interesting aspect of his motion:

“…the term ‘Sensitive Informant’ is defined as anyone acting, directly or indirectly and with or without any compensation, on behalf of the FBI as a member of, person associated with or otherwise a participant in or observer of the activity or activities of an entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization AND who does not disclose or reveal to such entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization his or her FBI affiliation.

“A Sensitive Informant is, in other words, some one who is acting, directly or indirectly, on behalf of the FBI as an undisclosed participant in or observer of the activity or activities of an entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization.

“The term ‘Sensitive Informant’ likewise includes what the FBI’s current terminology refers to as a ‘Confidential Human Source’ including any and all sub-categories of Confidential Human Sources such as, but not limited to, what the FBI refers to as a ‘Privileged Confidential Human Source,’ who is someone reporting confidential information to the FBI in violation of a privilege such as an attorney reporting his client’s confidential communications, a physician reporting upon his patient’s medical or mental condition, a cleric informing on a member of his or her church or other religious organization, etc.

In his motion, Trentadue requested the judge order FBI officials to answer 11 critical questions about the scope of their “Sensitive Informant Program” prior to a yet-to-be-scheduled hearing during which, according to Trentadue, FBI officials have said they will file a motion for summary judgment to prevent him access to the information he seeks.

Looking only for numbers of Sensitive Informants and not for specific names from the FBI, Trentadue’s questions target the time frame, “since January 1, 1995.” In short, he wants to know whether or not the agency has had Sensitive Informants inside a variety of government and non-governmental organizations.

Among the government organizations mentioned in his queries were the state and federal court systems, the U.S. House of Representatives and U.S. Senate, federal agencies other than the FBI, federal prosecutors’ offices, and law enforcement agencies at the municipal, county and state levels.

Among non-governmental agencies, he listed management positions inside news organizations, including but not limited to, the following:  Associated Press, ABC,CBS, CNN, FOX, MSNBC, NBC, NPR, PBS, Reuters or Scripps-Howard;Boston Globe, Chicago Tribune, Los Angeles Times, Miami Herald, The New York Times, The Wall Street Journal and/or Washington Post; The Daily Beast, Mother Jones, The New American, Newsweek, TIME and/orU.S. News & World Report.

Curiously, he also asked whether the FBI has had a Sensitive Informant(s) who was a cleric or member of the clergy in any religious organization.

Though I doubt the FBI will answer Trentadue’s questions, I’m convinced the attorney will continue fighting until he learns the whole truth about his brother’s death and, perhaps, about the Oklahoma City Bombing, too.

To appreciate the full scope and breadth of Trentadue’s latest effort, I suggest you read the motion. It’s one of more than two-dozen posts I’ve published in my series, Untold Stories of the Oklahoma City Bombing. Included in the series are more than a dozen posts aboutTrentadue’s pursuit of the truth.

Hopefully not a problem to copy the post as this is a relatively important issue. Anyway I will leave it there for the moment as the hour is late. Informants and protected illegal operations -- truly the can of worms is enormous. The FBI's informant systems across many elite sectors remains to be sniffed out further - and the curious goings-on of obscure rural Minnesota drug task forces also suggests more research is needed.

The other problems with informants, the political spam and the psychological wreckage they leave in their wake -- along with indeed the damage to their own psyches -- will hopefully get further attention, as we have a few other key facts bubbling up. Good luck to everyone on finding more info - regardless of political orientation it's really important to nail down as much of this stuff as possible, before you get spammed by yet another informant!!

End of the Tar Sands? Under media near-blackout, new Indigenous "mutual defense" Treaty signals formalized opposition to Tar Sands projects & pipelines

554441_205286902942362_962540691_n.jpg

VIA: Protect the Sacred  Timeline Photos: Here is a picture of Faith Spotted Eagle signing the International Treaty to Protect the Sacred. This is the first time a woman has signed such a treaty and she did so on behalf of the Brave Heart Society. Let the healing continue in the name of unprecedented unified action! — at Yankton Sioux: Lake Andes, South Dakota.

A strongly worded Treaty has been signed by representatives of some North American tribal nations and has now been taken far and wide to many reservations & villages across the continent. Some of our independent media colleagues were on hand and videos are expected soon. Here is a link to the raw live video from OccupyMusician: http://bit.ly/VeFvNo .

Anyway the text below of the includes formal opposition to projects in Minnesota. Another important development seems to be the circumvention of the proxy/quisling/Vichy/whatever-you-want-to-call-it tribal council structures - instead "treaty councils", a kind of alternate avenue more consonant with direct democracy, appears to be emerging as a tactic for formally dealing with/turning back internal corruption & hierarchy.

Additionally it now public that the Red Lake Ojibwe are asserting their rights against a pipeline in northern Minnesota. For related info see the Indigenous Environmental Network.

This is a major subject which has been almost totally blacked out in the media. There may be avenues of redress at the UN as this is an international-system-level statement.

My understanding, though I was not there, that there were very non-native few people on hand at the remote conference site in South Dakota which produced this document, although there were a few Earth First! and Tar Sands Blockade people as well as our media colleagues.

There is an #IdleNoMore march tomorrow, January 28th starting at Gold Medal Park which is related and also later a gathering in the Twin Cities for Indians in Minnesota to look at this treaty and consider joining.

Also unfortunately there was some kind of "fold" which occurred in Texas re the Tar Sands Blockade and Rising Tide: Deal in Texas court could end pipeline protests - Brownsville Herald (TX). // Deal may end area oil pipeline protests - Longview News-Journal. The backstory here is unclear but it highlights the perils of NGO-involved projects & the importance of anonymity once the specialized corporate field goons start operating in full force, like they were in Texas. (I heard that the only NGO person at this Treaty conference was allegedly with World Wildlife Fund - though this person probably didn't have nefarious intentions, it's definitely worth checking out the WWF 1001 Club for a true Rabbit Hole of schemes: 1001 Club - Institute for the Study of Globalization and Covert Politics // ISGP - 2010 confidential list of the WWF's 1001 Club including geopolitik hardballers Robert Vesco, Agha Abedi, Salem Bin Laden, Mortimer Bloomfield, Mobutu Sese Seko, and above it all the Bilderberg/Knights of Malta Prince Bernhard.)

While the NGO people have perhaps folded up and gone away (though it's hardly clear right now), the natives don't really have anywhere else to go, and have a different kind of sovereignty yet to be fully asserted in a manner more like what this new treaty expresses.

///////

SOURCE International Treaty to Protect the Sacred from Tar Sands Projects - Protect the Sacred

Signed on January 25th 2013

International Treaty to Protect the Sacred from Tar Sands Projects

The representatives from sovereign Indigenous Nations, tribes, and governments, participating in the Gathering to Protect the Sacred on January 23 – 25, 2013, on the 150 year anniversary of the Treaty Between the Pawnee and Yankton Sioux, have gathered on the Ihanktonwan homelands, and have resolved by our free, prior, and informed consent to enter into a treaty to be forever respected and protected. We agreed upon the following articles:

Article I

The undersigned Indigenous Peoples have inhabited and governed our respective territories according to our laws and traditions since time immemorial.

Article II

As sovereign nations, we have entered into bi-lateral and multi-lateral agreements with other nations including the Treaty Between the Pawnee and Yankton Sioux, Mother Earth Accord, the Spiritual Leaders Declaration, the Agreement to Unite to use 16 Guiding Principles, and the Black Hills Sioux Nation Treaty Council Declaration, and all the inter-tribal treaties in the Western hemisphere, among others, which promise peace, friendship, and mutual opposition to tar sands projects and energy development that threaten the lands, the waters, the air, our sacred sites, and our ways of life, and acknowledge other Indigenous Peoples such as the Yinka Dene, the People of the Earth’ who have exercised their lawful authority to ban tar sands projects from their territories through Indigenous legal instruments such as the Save the Fraser Declaration and the Coastal First Nations Declaration.

Article III

We act with inherent, lawful, and sovereign authority over our lands, waters, and air, as recognized by Article 32 of the United Nations Declaration on the Rights of Indigenous Peoples which provides:

States shall consult and cooperate in good faith with the indigenous peoples concerned through their own representative institutions in order to obtain their free and informed consent prior to the approval of any project affecting their lands or territories and other resources, particularly in connection with the development, utilization or exploitation of mineral, water or other resources.

Article IV

We mutually agree that tar sands projects present unacceptable risks to the soil, the waters, the air, sacred sites, and our ways of life including:

- The destruction of rivers, lakes, boreal forests, homelands and health of the Cree, Dene, and Métis peoples in the Northern Alberta tar sands region and downstream Dene communities of Northwest Territories

- The threat of pipeline and tanker oil spills into major river systems, aquifers and water bodies such as the Salish Sea, the North Pacific coast, and the Ogallala Aquifer.

- The negative cumulative health and ecological impacts of tar sands projects on Indigenous Communities.

- The irreparable harm to irreplaceable cultural resources, burial grounds, sacred and historic places, natural resources, and environmental resources of the central plains region which is the aboriginal homelands of many Indigenous Nations.

- Greenhouse gas pollution that could lock the planet onto a path of catastrophic climate change.

Article V

We affirm that our laws define our solemn duty and responsibility to our ancestors, to ourselves, and to future generations, to protect the lands and waters of our homelands and we agree to mutually and collectively oppose tar sands projects which would impact our territories, including but not limited to the TransCanada Keystone XL pipeline, the Enbridge Northern Gateway, Enbridge lines nine (9) and sixty-seven (67), or the Kinder Morgan Trans Mountain pipeline and tanker projects.

Article VI

We agree to mutually and collectively, as sovereign nations, call upon the Canadian and United States governments to respect our decision to reject tar sands projects that impact our sacred sites and homelands; to call upon the Canadian and United States governments to immediately halt and deny approval for pending tar sands projects because they threaten the soil, water, air, sacred sites, and our ways of life; and, confirm that any such approval would violate our ancestral laws, rights and responsibilities.

Article VII

We agree to the mutual, collective, and lawful enforcement of our responsibilities to protect our lands, waters, and air by all means necessary, and if called on to do so, we will exercise our peace and friendship by lawfully defending one another’s lands, waters, air, and sacred sites from the threat of tar sands projects, provided that each signatory Indigenous Nation reserves and does not cede their rights to act independently as the tribal governments see fit to protect their respective tribal interests, further provided that each signatory Indigenous Nation reserves its inherent sovereign right to take whatever governmental action and strategy that its governing body sees fit to best protect and advance tribal interests affected by the pipeline project consistent with the agreements made herein and subject to the laws and available resources of each respective nation.

This Treaty of mutual defense and support is made on the occasion of the 150 year anniversary of the Treaty Between the Pawnee and Yankton Sioux concluded between the Pawnee Nation and the Ihanktonwan Oyate/Yankton Sioux Tribe on January 23rd, 1863, and the parties thereto hereby commemorate the signing of that historic treaty that has endured without violation for 150 years.

This Treaty goes into effect once ratified by the governing bodies of the signatory nations.

IN WITNESS WHEREOF, the undersigned dually authorized representatives, after having deposited their full powers found to be in due and proper form, sign this treaty on behalf of their respective governments, on the date appearing opposite their signatures.

PLEDGE OF SUPPORT to the
INTERNATIONAL TREATY TO PROTECT THE SACRED
FROM TAR SANDS PROJECTS

January 2013

We the undersigned citizens, levels of government, businesses, unions and non-governmental organizations hereby recognize and commit ourselves to upholding the January 2013 International Treaty to Protect the Sacred from Tar Sands Projects:

How to check cops checking your driver's license! Plus full texts of Anne Marie Rasmusson lawsuit settlements for cop ID checks

Yet another nasty branch on the poisonous tree of data abuse in Minnesota is bearing its digital fruit. Anne Marie Rasmusson, a former law enforcement officer, got 'checked out' by an absurdly sprawling array of Minnesota law enforcement officers illegally abusing their driver's license lookup systems. Three major legal documents from the settlements are included below, I believe for the first time on the web (I might be wrong but didn't spot anything on Google).

For the backstory of the weird law enforcement gangstalking of Rassmusson & subsequent litigation, see Nov 2 2012: Anne Marie Rasmusson's settlement haul now over $1 million - Aaron Rupar / CityPages.

From a clever data-fishing colleague, here is one proven method for promptly obtaining your own DVS data:

E-mail kim.jacobson@state.mn.us with "Hi Kim! This is a request to inspect public data under the Minnesota Government Data Practices Act using my own equipment, in electronic form. I would like to inspect all records and logs of when my driver's license and motor vehicle information on file with DVS was accessed, along with date, time, request detail and requesting agency. My driver's license number and license plates are: X. Thanks!"

100% Lulz virtually guaranteed. Not a horrible time lag either, from what I am hearing from people.

Better Know An Acronym: Mpls PD's ALPR & MnDOT's MBUF, the Parallel DataSchemes: Better get yr DVS records while they're hot: the government has a habit of clamping down on these kinds of data flows, legislative authorization be damned!

On another critical but separate mass surveillance & data control issue, IPAD | Information Policy Analysis Division, Minnesota Department of Administration is taking public comment until January 30, 2013 on the issue of the automated license plate reader system which Minneapolis has semi-extralegally shifted from public to non-public data classification. The PDF is here: www.ipad.state.mn.us/docs/mplsappalpr.pdf. One idea: let IPAD know that this tech is dangerous for data regardless of who is supposed to have access. As the burgeoning DVS omnishambles indicates, 'sensitive' data should be minimized in government, and even 'authorized' personnel actually shouldn't be trusted to operate these systems without granular and public systems of accountability.

Again it is worth pointing out that the City of Minneapolis itself argued in the PDF above that the data generated by the Minneapolis Police Department's Automated License Plate Reader (ALPR) system is dangerous and must be made non-public for the same reasons that MnDOT's Mileage Based User Fee (MBUF, aka Intellidrive) data is dangerous.

MBUF is a story I have been following for several years - it would send extremely frequent location/direction/velocity info to the government & its military-industrial contractor, Battelle, for every user in order to generate a dollar figure for taxing the vehicle - only nuking all your remaining privacy in the process. After many months, much MnDOT MBUF data was released via a Mn Data Practices Act Request, though it is difficult to work with. See Nov 30 2012: EXCLUSIVE MnDOT info cake: 2.97gb emails/docs on the Mileage Based User Fee (MBUF)- Minnesota's GPS vehicle taxing regime in the works

Previously: Jan 9 2013: MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley // MPD Homeland Security Unit at Cruz House: Minneapolis Police Department data request on Occupy Minnesota finally released; sketchy anti-Occupy fusion-style police material from Nevada // Dec 14 2012: Mordor Mayor Rybak makes moves to hide Minneapolis panopticon: Total Minneapolis Awareness Automatic License Plate Reader records form 'retroactive surveillance' empire. Ye Gods we keep catching substantial fish!

The issue of abusive operations in the MN Department of Public Safety-controlled DVS database is becoming a major issue recently, with the decidedly unlikely duo of Republican-aligned Hennepin County Sheriff Rich Stanek and indefatigable Star Tribune reporter Randy Furst both finding highly indefensible query activity on their records. Minn. driver’s license data snoopers are difficult to track | StarTribune.com:

Despite widespread misuse of driver's license records in Minnesota, determining just who is peeking into your files can prove nearly impossible.

The Minnesota Department of Public Safety, which oversees the driver's license database, refuses to tell people the names of users -- generally public employees -- who have looked up their information. Perhaps the most high-profile citizen getting stonewalled by the state is Hennepin County Sheriff Rich Stanek, who is sparring with the department over what he believes were inappropriate queries into his driver's license records.

The Driver and Vehicle Services (DVS) database, which contains addresses, photographs and driving records on nearly every Minnesotan, is protected under state and federal law. State records show that public employees frequently have misused the database by running people's names without a business purpose. That is the subject of a major lawsuit that recently ensnared police officers across Minnesota, as well as a criminal case pending against two Minneapolis employees.

Stanek learned in June that employees at 21 agencies, including his own office, had accessed his records over several years. Some of the queries came from as far away as Wells, Minn., a small town 117 miles south of Minneapolis that he has never visited. The Department of Public Safety would not provide him with the names of the users.

"I believe that some or all of these requests may have been without a legitimate government purpose," Stanek wrote in a December letter to the Department of Administration, asking for an advisory opinion on the matter. The Department of Public Safety "and DVS appear to have purposely created obstacles to deny me an opportunity to track illegitimate access."

Stanek had made two previous requests for his lookups out of curiosity, and was surprised by how many agencies had queried his name.

This time, he says, a security concern prompted his request for the lookups.

He believes the state has an obligation to show that the lookups had a legitimate purpose, even if they do not hand over the names.

Anyhow, a source provided a great deal of the Rasmusson legal paperwork obtained via the Minnesota Data Practices Act. I don't think it's around elsewhere on the Internet, so here it is. I haven't looked over too many settlements myself, so this is overall just funny stuff about a serious topic -- nothing like a government formally conceding abuse and paying out hard-collected taxpayer cash to cover for some ridiculous abuse of officially "necessary" authority.

I wonder what kind of world we'd live in if our government units were actually run by people who never screw up like this, wasting all these resources and being generally abusive. There will surely be more inquiries along these lines...

Three parts:

Rassmusson Lawsuit 1 1110 001 (44pgs) - direct download 1.8MB: rassmusson_lawsuit-1-1110_001.pdf

Rassmusson Lawsuit 1 1110 001 by Dan Feidt

Rassmusson Lawsuit 2 1109 001 (5 pgs) - direct download 205KB: rassmusson_lawsuit-2-1109_001.pdf

Rassmusson Lawsuit 2 1109 001 by Dan Feidt

Rassmusson Lawsuit 3 1102 001 (39 pgs) - Direct download 1.9MB: rassmusson_lawsuit-3-1102_001.pdf

Rassmusson Lawsuit 3 1102 001 by Dan Feidt

Leaving it there for now, but hell, something will probably turn up yet again before I even have time to deal with it!!

MPD Homeland Security Unit at Cruz House: Minneapolis Police Department data request on Occupy Minnesota finally released; sketchy anti-Occupy fusion-style police material from Nevada

///// UPDATE 2:30AM Jan 9: Diggings lead to a truly under-appreciated and basically new police strategic intelligence outfit in Fridley complete with documentation about why they ought to be tracing protesters on state-of-the-art gear - WCCO stated this place is "secret"! LOTS MOAR: MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley /////

After some months, the Minneapolis Police Department released dozens of pages about Occupy Minnesota / Occupy Minneapolis and several high-profile operations, particularly the eviction of protesters from 4044 Cedar Ave. This data was released from the Department late yesterday afternoon.

Interestingly the suppression of the civil disobedience at 4044 Cedar fell under the rubric of the MPD Special Operations Division / Homeland Security Unit. Further data requests to this unit could be interesting, including federal grants applied for similar suppression activities in the name of "Homeland Security."

occupy-mpls-mpd-net7.png occupy-mpls-mpd-net6.png

This email related to the "Emerging Issues" PDF from Nevada below (see the attachments field).

occupy-mpls-mpd-net1.png

One interesting feature: the coordination between the MPD and the Downtown Improvement District (DiD) which is aligned & serves the purposes of the downtown property owners (as opposed to homeless, indigent people downtown etc). DiD, while seen as a semi-public entity, is privately directed and is not an openly participatory structure. DiD has a central office that coordinates over a digital radio system with the downtown First Precinct and corporate building security officers including during protests.

The other major item of wider interest is a sketchy Nevada operation partially merged with the Los Vegas Police Department. It was use as "a lot going on" from Darrel Stephens@carolina.rr.com whoever that is...

"Emerging Issues in the Occupy Movement" from the Major Cities Intelligence Commanders Group (MCC ICG Sub-Committee)and the Southern Nevada Counterterrorism Center (SNCTC) is really a classic chestnut. The email addresses to LVMPD.com seem to be an official domain of Las Vegas law enforcement, not a private organization. I don't recall seeing this Occupy-related writing from this organization circulate elsewhere. If so, we have a new taxpayer-supported 'node' generating more hype in the "counterterror" national political activist monitoring network.

occupy-mpls-mpd-net2.png occupy-mpls-mpd-net3.png occupy-mpls-mpd-net4.png occupy-mpls-mpd-net5.png

Fortunately the "LAW ENFORCEMENT ONLY - DO NOT DISSEMINATE" pseudo-classification does not really have much if any actionable meaning under the Minnesota Data Practices Act, though we can surely expect proposals to create tons of secret data piles under loosey-goosey unnecessary pseudo-secrecy at the Minnesota Legislature this session. Follow @richneumeister for sharp updates on that whole front for sure!

I want to also point out a couple other good recent releases posted on Scribd about Minneapolis. The ALPR reader system ongoing story - see Dec 2012: Mordor Mayor Rybak makes moves to hide Minneapolis panopticon: Total Minneapolis Awareness Automatic License Plate Reader records form 'retroactive surveillance' empire | HongPong.com && also Nov 30 2012: EXCLUSIVE MnDOT info cake: 2.97gb emails/docs on the Mileage Based User Fee (MBUF)- Minnesota's GPS vehicle taxing regime in the works. The City of Minneapolis itself neatly ties both these stories together in the next link by arguing that these surveillance data programs are both dangerous! Thanks!

City of Minneapolis Application to IPAD requesting classification of all ALPR data as not public. It's worth an entirely separate post, but basically here the City of Mpls argues that the ALPR license plate reader should be classified by the State of Minnesota Dept of Administration's "IPAD" division as confidential, because IPAD classified data from an entirely different tracking project, the MnDOT IntelliDrive / Mileage Based User Fee (MBUF) system, is also dangerously specific data which easily indicates when homes are vacant due to daily traffic patterns, etc. So the argument from the city is that the data is dangerous: ALPR is dangerous, MBUF is dangerous, therefore should be classified -- but still collected of course!

Page 7 of this one: http://www.scribd.com/doc/117555926/Metro-Transit-Police-Report-on-Chalk-and-Silly-String talks about using Trespass notices specifically because of OccupyMN. For more docs like these see SmileyRevolt & twitter.com/smilyus.

There does not seem to be very much other personal data of regular people, besides one page of mugshots of arrestees with their birthdays. However I do not have the time to parse more carefully & if this acts as an intrusion to anyone in the public I apologize in advance. IN theory, what the state defines as private personal data should not be released on this kind of material. Lacking a handy secure redaction tool for PDFs, I deleted page 99 from part 1 in this release..

Here is the Data Practices Act official response email which accompanied this. If the requestor wishes to have their name added back onto this I will do that, just took it off by default.

----- Forwarded Message -----

From: "Meyers, Linda" <Linda.Meyers@minneapolismn.gov>

To: [....]

Date: Mon, 7 Jan 2013 19:43:48

Subject: DP 1229 - Occupy MN data

Mr. [....],

We received your check today and I’ve attached the data you requested regarding Occupy MN. There are 259 pages. Again, we apologize for the delay in getting this to you.

Linda Meyers

Police Support Technician I

MPD Records Information Unit

350 S. 5th St.

Minneapolis, MN 55415

612-673-2961

linda.meyers@minneapolismn.gov

Non-public and/or Privileged and/or Confidential and/or Private Information:

This electronic message may contain investigative data which is non-public pursuant to Minnesota Statutes section 13.82 subdivision 7, or personnel data which is non-public pursuant to Minnesota Statutes section 13.43 subdivision 4. If you are not the intended recipient of this e-mail: (1) do not read the content of the message; (2) immediately notify the sender that you incorrectly received the message; and (3) do not disseminate, distribute, or copy this e-mail.

//////////

134 pages (135 before the removed page) - Part1 originally 4242Kb. With the edit, the md5 sum is aef289624969402680255a15dea1aec3 MPD_OccupyMN_Data_part1b.pdf - Posted also at http://www.scribd.com/doc/119531853/MPD-OccupyMN-Data-Part1b

Direct download: MPD_OccupyMN_Data_part1b.pdf 6.7MB

MPD OccupyMN Data Part1b


Part2 3183Kb.

1d58ba5700273ede7b3dd5ad0595fa5c MPD_OccupyMN_Data_part2.pdf - Posted also at

http://www.scribd.com/doc/119527079

Direct download 3.3MB MPD_OccupyMN_Data_part2.pdf

MPD OccupyMN Data Part2

#FreeHammond - 23 July 2012 statement from accused Chicago hacker Jeremy Hammond

Worth throwing up there as an example of how to keep perspective when they try to throw the book at you. Things like this crystallize the hypocrisy of conspiracy charges, cyber-fear-blather, terrorism and of course the laundering of drug money through the banking system. Till the walls tumble, Jeremy...

SOURCE: http://youranonnews.tumblr.com/post/27859335364/23-july-2012-statement-f...

23 July 2012 - Statement from Jeremy Hammond, alleged Anonymous hacker -

Thanks for everybody coming out in support! It is so good to know folks on the street got my back. Special thanks to those who have been sending books and letters, and to my amazing lawyers.

I remember maybe a few months before I was locked up I went to a few noise demonstrations a the federal jail MCC Chicago in support of all those locked up there. Prisoners moved in front of the windows, turned the lights on and off, and dropped playing cards through the cracks in the windows. I had no idea I would soon be in that same jail facing multiple trumped up computer hacking “conspiracies.”

Now at New York MCC, the other day I was playing chess when another prisoner excitedly cam e up as was like, “Yo, there are like 50 people outside the window and they are carrying banners with your name!” Sure enough, there you all were with lights, banners, and bucket drums just below our 11th floor window. Though you may not have been able to here us or see us, over one hundred of us in this unit saw you all and wanted to know who those people were, what they were about, rejuvenated knowing people on the outside got there back.

As prisoners in this police state – over 2.5 million of us – we are silenced, marginalized, exploited, forgotten, and dehumanized. First we are judged and sentenced by the “justice” system, then treated as second class citizens by mainstream society. But even the warden of MCC New York has in surprising honesty admitted that “the only difference between us officers here and you prisoners is we just haven’t been caught.”

The call us robbers and fraudsters when the big banks get billion dollar bailouts and kick us out of our homes.

They call us gun runners and drug dealers when pharmaceutical corporations and defense contractors profit from trafficking armaments and drugs on a far greater scale.

They call us “terrorists” when NATO and the US military murder millions of innocents around the world and employ drones and torture tactics.

And they call us cyber criminals when they themselves develop viruses to spy on and wage war against infrastructure and populations in other countries.

Yes, I am one of several dozen around the world accused of Anonymous-affiliated computer hacking charges.

One of many here at MCCC New York facing trumped up “conspiracy” charges based on the cooperation of government informants who will say anything and sell out anyone to save themselves.

And this jail is one of several thousand other jails, prisons, and immigrant detention centers – lockups which one day will be reduced to rubble and grass will grow between the cracks of the concrete.

So don’t let fear of imprisonment deter you from speaking up and fighting back. Silencing our movement is exactly what they hope to accomplish with these targeted, politically motivated prosecutions. They can try to stop a few of us but they can never stop us all.

Thanks again for coming out.

Keep bringing the ruckus!

——-

You can donate to Jeremy’s legal fund here - https://www.wepay.com/donations/125509 - and learn more about him here - http://freehammond.com/

You can write to Jeremy in prison here:

Jeremy Hammond 18729-424
Metropolitan Correctional Center
150 Park Row
New York, New York, 10007

Syndicate content