Disclaimer: This site is *not* affiliated with AIPAC, Ahmed Chalabi, K Street, ClearChannel, or Urban Moving Systems of Weehawken, NJ. In case you were curious. Full disclosure: I have a "long Apple position" and therefore I have an Apple bias.
If secret federal aviation is the Big Lebowski, Bristow is the rug that really ties the room together.
It's been thrilling to watch one of my favorite topics, aviation in covert operations, hit the bigtime over the last few news cycles.A few tweets about suspicious plane hovering over Baltimore 'disturbances' registered to a ghostly "NG Research" at a Bristow, Virginia PO Box cued the story. The FBI conceding to Washington Post that it was their flight set the stage for this. These stories have quietly been leaching out for years. As far back as 2003 (or 2006 in WIRED) references to small aircraft doing domestic surveillance have been popping up. After the Boston Marathon bombing, a small aircraft was traced to the same Bristow VA cluster. Today the story hit turbo with a big AP story, FBI behind mysterious surveillance aircraft over US cities, but there are lots more to find because the AP didn't really go outside of Bristow. You'll find plenty of N Numbers to snoop on below - and cool new tracking techniques too!! Quote of the year?
The FBI asked the AP not to disclose the names of the fake companies it uncovered, saying that would saddle taxpayers with the expense of creating new cover companies to shield the government's involvement, and could endanger the planes and integrity of the surveillance missions. The AP declined the FBI's request because the companies' names — as well as common addresses linked to the Justice Department — are listed on public documents and in government databases.
In my own scoping in the last week or so it appears that these shell company registration were mostly set up around 2010 or 2011, making this an Obama operation through and through. I apologize for not tipping yall more quickly to this impending development but I have been too busy!
This story shows that secret airlines are becoming an obsolete method for the [deep] state, because with the Internet and planespotters it becomes possible to observe and end-run around the secrecy of the networks, as the last big wave of awareness around secret detainee flights in the Bush years really revealed (though mostly in Eurasia, not North America). (2007 Cryptome Story and Category:Alleged CIA pilots - SourceWatch)
.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.
Years ago I asked a staff research person at the Minnesota Department of Transportation if there was something weird about how FAA registration works, if it is designed to hide ownership, and he assured me it had been that way since the FAA had been set up - and went on to tell me that when he was much younger, in the late 1980s he had traced a disappeared pilot to Texas, then found that someone had pulled the flight plans from the FAA file. This shadowy story was literally the first thing I heard from a government employee when I went asking, confirming my long-running theory that everyone has some kind of story that touches on the corrupt secret government or deep state.
Naturally the FBI/DOJ also has its own similar shells. Due to incredible laziness the feds registered tons of them with the same name pattern at the same locale in Bristow VA. Here, have some original art I made on May 25, well before the Star Tribune and Associated Press picked up this story!
Several independent parties put these pieces together and triggered the massive news snowball today. Probably the first to catch a large section of it was john wiseman (@lemonodor), who figured out good methods for tracing the transmitters and radio traffic. My friend Sam Richards (@MinneapoliSam) was the first as far as I know to put together the larger data set about the Bristow VA node, after getting a tip about a sketchy spy flight over Minneapolis, although Wiseman verifiably came up with a whole bunch of the shells in early May. Wiseman explains his narrative in new post: Tracking FBI aerial surveillance (with images, tweets) · jjwiseman · Storify
Below is a listing of 100 aircraft registered to shell companies that do not exist. The US Department of Justice can claim plausible deniability for owning and operating these aircraft however that is a flimsy defense. At the time of posting, a number of these aircraft may be airborne over American cities, equipped with surveillance, stingray, or other hardware. FOIAs are being drafted and will be submitted so it is only a matter of time before a brighter light is shined upon these secretive operations.
For examples of the flight patterns conducted by many of these aircraft within the last few days, check:
Here's an article by the ACLU highlighting why these operations are of concern https://www.aclu.org/blog/ohio-aerial-surveillance-system-moving-forward... "ARGUS, the high-flying drone technology capable of capturing super-high-definition video of a 15-square mile area and automatically tracking all moving vehicles and people within that area. I pointed out that this makes possible our nightmare scenario for drones: wide-area mass surveillance and location tracking of entire cities and towns."
Now the FBI is an onerous position where they have to turn over, de-register or re-register all of these planes, somehow reconciling rebuilding the secrecy of the fleet exposed above with the FAA's registration system, and the hordes of planespotters out there now reinforced by tons of interested activists cued into the national scope of this operation. Good luck Feds!
SOURCE: View image: image5. This plane has been flagged as using the JENA code which seems to be the usual code until probably around now. Images scaled down, resize to see more. N959JT is of course registered in Bristow VA. Bonus points awarded for pink toenails in spotting this secret aircraft machinery which seems to resemble the gear spotted on the recent Minneapolis plane.
I live in Phoenix and my coworker was telling me she's been noticing this plane circling around their neighborhood the past 12 days. They started tracking the planes on Flightradar24 and she sent me these screenshots of some of their flight paths: http://postimg.org/image/tpdhpd789/http://postimg.org/image/o2h4rw4pl/http://postimg.org/image/uuc58hj2x/ She even had a pilot friend go down to the airport that they've been flying out of and do some snooping. He found took this photo of the camera equipment mounted to the bottom of the plane: http://postimg.org/image/hm861sw61/ She said that it's always the same 3 tail fin numbers which take turns doing the same flight path. They start at daybreak and only stop late in the night.
Update: Here's another pic my coworker got of one of the planes parked at the Deer Valley Airport in Phoenix. You can see the camera equipment on the side: http://postimg.org/image/oj5bwlcjn/
She also said over the past couple days all the tail fin numbers changed on Flightradar24 and they are now all showing up as some variation of "JENA". Screenshot: http://postimg.org/image/n3ahqjgql/
Finally it is worth noting it has been difficult but not impossible to get credit to independent journalists for blowing up this story. I appreciate Bob Collins at Minnesota Public Radio's Newscut for engaging on Twitter when we pressed him on the issue of crediting the story, and including references to Sam's original medium.com story, while the Star Tribune and AP did not credit Sam at all. (Although the Strib has been communicative recently and I have some hope they will circle back within a few days).
Additionally I suspect "CHAPPARRAL AIR GROUP" may be another front, they got a craft from the DEA: N540DB. seeHelicopter Flying Above Claycord on Thursday Afternoon —claycord CLAYCORD.com: "A google search of the tail ID can help you confirm this also, where you will find no shortage of photographs of this specific aircraft operating out of Concord and San Jose. Note that the federal government recently (2011) transferred registration of 15 Federal law enforcement helicopters out of the names of the Department of Justice, DEA, to an entity in Texas called the Chaparral Air Group."
Before the story broke we had a bunch of diggings, now it's time to share! MORE RELATED RAW DATA:
NOTE there are some false positives and general "NOISE" in here, please proceed with discernment!!!
In broader context, the Obama administration has continuted to expand the use of intelligence tracking, including fusion centers and electronic intelligence, to keep rebellious groups under control, as addressed here
On April 29, a Cessna 206H registered to National Aircraft Leasing Corporation circled overhead for hours at about 3,500 feet, flying repetitively over western Baltimore. On the nights of April 30, May 1 and May 2, another aircraft, a Cessna Model 182T registered to a company named NG Research in Bristow, Virginia, flew over the same areas at a similar low altitude.
Also on May 1 and May 2, an unidentified Cessna Citation V jet made similar nighttime flights, orbiting Baltimore at the relatively low altitudes (for a jet aircraft) of 6,400 and 9,400 feet, based on records from Flightradar24.
Kind of vague hit comes up for the google search on National Aircraft Leasing Corporation
Edit 3: After looking through the list of aircraft registered in Bristow, VA for a town of 15,000 there are 64 aircraft registered including one owned by the Department of Justice. All within the past decade most within the past 3 years. Most of them are owned by companies with 3 letters then what they do RKT Productions, PSL Surveying, KQM Aviation, LCB Leasing, NBY productions etc. They also all are operation 182t Cessna’s. All of the companies only have a PO Box in Bristow. Looks like an FBI airport.
The one tail number that the initial Washington Post article linked to is N39MY, which is a Cessna 182T registered to NG Research, PO Box 722 in Bristow, VA. That company's web presence is close to zero, basically below the noise floor.
If you google [po box bristow va] you find FAA records for a bunch of other oddly named companies that all have similarly close-to-zero web presence and addresses that are PO Boxes in Bristow: FVX Research, NBR Aviation, NBY Productions, OBR Leasing, OTV Leasing, PSL Surveys, PXW Services. They all seem to like Cessna 182Ts.
If you Google the tail numbers of aircraft registered to those companies, you start to find forum and mailing list posts (often at sites that tilt toward paranoid/conspiracy/right wing, but not always) with people discussing these specific tail numbers and linking them to the FBI. Some of the supposed evidence includes details of radio communications that people have heard, e.g. talking about "being on station" or using callsigns that start with JENNA, JENA or ROSS, which are supposedly used by the FBI. Other posts claim that DOJ/FBI surveillance aircraft often squawk 4414 or 4415 on their transponders.
I monitor aircraft in Los Angeles using an RTL-SDR dongle. I keep a database of almost every transponder ping I receive. You can see some more info, analysis and examples of stuff I've seen (U-2, AF1, AF2, EXEC-1F, E-6 "Doomsday" planes) at
I decided to check my database for planes that have squawked 4414/4415 or used one of the suspicious callsigns: I found 8 aircraft in the past 2 months, several of which exhibit suspicious behavior: Flying for hours at a time without going anywhere in particular (I don't have position information for them, but I know they're in the air and not leaving the LA area), flying almost every day for months at a time, squawking 4414 or 4415, and one that used a JENNA callsign. 2 of them are registered to companies with PO Boxes in Bristow, VA. Another is registered to AEROGRAPHICS INC. 10678 AVIATION LN, MANASSAS VIRGINIA, which googling shows has also been linked to the FBI/DOJ. Several others are registered to WORLDWIDE AIRCRAFT LEASING CORP and NATIONAL AIRCRAFT LEASING CORP in Delaware, similar to other suspected FBI front companies (e.g. Northwest Aircraft Leasing Corp. in Newark, Delaware).
(I call what I'm doing "persistent sousveillance": using historical sensor data to retroactively identify and track new subjects, it's just that my subjects are the government. One of the surprising things I've found is that all you need to do is look: the weird stuff jumps out right away, e.g. Cessnas registered to fake-sounding companies that loiter overhead for hours every day.)
It's a lot of circumstantial evidence, but at this point it doesn't seem far-fetched that I'm monitoring aircraft involved in persistent FBI aerial surveillance.
Edit: One other thing worth mentioning is that I was surprised at how many local news stories I turned up while googling these planes & companies that fit the template of "Citizens complain about mystery Cessna flying low, circling over their neighborhood".)
The FAA manages this program and NBAA no longer has any policy or administrative control over the FAA ASDI Block program. However, if you have general questions or concerns about the FAA process, contact NBAA's Operations Service Group email@example.com (202) 783-9250.
The FAA’s primary electronic mailbox for all aircraft blocking and unblocking requests and for related inquiries directed to the ASDI blocking program isASDIBlock@faa.gov.
102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JUNCTION, VA 24529-3110461AJ 18282225 RKT PR
ODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA 20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS PO BOX 502BRISTOW,VA 20136-0502912EX 18282231
OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632
N-Number Serial Number Name Address102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JU
NCTION, VA 24529-3110461AJ 18282225 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS
similarly there are some hits here. for entire listing in LOUDOUN county
PO BOX 502BRISTOW, VA 20136-0502912EX 18282231 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-063
Possible tech or similar
PERSISTENT REAL-TIME INTELLIGENCE OVER A WIDE AREA -- DAY & NIGHT
Most people have no idea that the National Security Agency gets involved in big events like national political conventions and the Olympics: National Special Security Events (NSSEs) with security led by the Secret Service, which is now a part of the Department of Homeland Security.
Many ideas taken for granted - including the separation of military and civilian life within the US - evaporate in NSSEs. Many, many federal agencies send little teams, including advanced military intelligence.
This is apparently the first time that it has been really noted the NSA's director in 2007 officially stated that NSSE's are strategic missions. This in turn means that the NSA must have had *some* role at the 2008 Republican National Convention in Minneapolis. (see our RNC documentary Terrorizing Dissent here & RNC08Report for docs) More background below the doc fulltext.
It's hard to overstate the nasty, elitist, disruptive effects of the Olympics. As a new resident of Boston, the unfortunate news that the 2024 Olympics now has this city in its crosshairs is disappointing & fear inducing. After all I ran into (at least) four FBI informants because of the 2008 RNC, gassed & shot at by the authorities.
United States SIGINT System January 2007 Strategic Mission List
Introduction - Director’s Intent
(S//SI) The SIGINT Strategic Mission List represents the intent of the Director, National Security Agency in regard to mission priorities and risks for the United States S1G1NT System (USSS) over the next 12-18 months The list is derived from review of the Intelligence Community National Intelligence Priorities Framework, DC1/DNI Guidance, the Strategic Warning List, National SIGINT Requirements Process (NSRP) and other strategic planning documents The missions included on the list are in relative priority order and represent the most urgent tasks for the USSS The list is not intended to be all encompassing, but is intended to set forth guidance on the highest priorities.
Topical Missions and Enduring Targets
(S//S1) The SIGINT Strategic Mission List is divided into two parts. It includes 16 critical topical missions in Part I of the list, which represent missions discerned to be areas of highest priority for the USSS, where SIGINT can make key contributions. In addition to the 16 critical topical missions, Part U of the SIGINT Strategic Mission List includes 6 enduring targets that are included due to the need to work these targets holistically because o f their strategic importance. In addition to their long-term strategic importance, the enduring targets can potentially "trump" the highest priority topical missions on the list at any time, based upon evolving world events. Elements o f these targets are also represented throughout the topical target sets. For each of the 16 topical missions and each of the 6 enduring targets the Strategic Mission List includes:
1) Focus Areas- critically important targets against which the SIGINT enterprise is placing emphasis. DIRNSA designation of a target as a focus area constitutes his guidance to the SIGINT System that it is a "must do” target for that mission 2) Accepted Risksstrategically significant targets against which the USSS is not placing emphasis and for which SIGINT should not be relied upon as a primary source. DIRNSA's reasons for accepting these risks include high difficulty and lack of resources or as an “Economy of Force Measure,” in order to achieve focus on the most critical targets
A Strategic Investment Tool for SIGINT Resources
(S//S1) Given a finite level of resources available in all mission areas, the Strategic Mission List provides high-level strategic direction to the global SIGINT system to focus resources on the most important/highest priority areas. “Risks” identify targets that cannot be resourced to the level of a Focus Area, thereby acknowledging that shortfalls will exist. As world circumstances change, these or other targets can be added to the list as needed, targets no longer of critical importance can also be removed from the Focus Area category. In addition, other targets, not listed as focus or risk areas, can also be wrorked by the USSS to a lesser degree to meet other customer requirements. The Strategic Mission List will be reviewedbi- annuallyby the USSS Signals Intelligence leadership Team Missions. Focus areas, and Accepted Risks will be adjusted as a means of providing high-level steerage to the Nation’s agile SIGINT System.
United States SIGINT System Strategic Mission L ist- January 2007
(U) I. Strategic Mission List - Topical Missions
(S//S1)A. MISSION: Terrorism: Winning the Global War on Terrorism. Focus Areas:
a.All Interagency Intelligence Committee on Terrorism (I1CT) Tier 0 and 1 terrorist groups with capabilities and intentions to attack the US, its interests or allies, or groups actively planning or carrying out a terrorist attack against U.S. persons, facilities, or interests
b. Key individuals and Terrorist Support Entities (TSE) involved in the facilitation, financing, and recruitmentorradicalizationofallIICT Tier0and 1terroristgroupnetworksglobally.
Accepted Risks:All IICT Tier 2,3, and 4 terrorist groups, and TSEs.
(S//S1) B. MISSION: Homeland Security: Protecting the U.S. Homeland from terrorist attack and other transnational threats to safeguard U.S. persons, freedoms, critical information, infrastructure, property and economy.
a Border Security (land, air, sea).
b. Direct defense against terrorist attack.
c. Diseases, epidemics, and pandemics.
d. Executive Protection/U.S.-Based NSSEs e.Illicit Facilitation as it relates to special interest aliens and CBRN materials and technology
a Accepted risks as stated in the “Terrorism” mission.
b. Global coverage o f all illicit activities of potential concern to the Homeland.
(S//SI//REL USA, AUS, CAN, GBR) C. MISSION: W M P and CBRN Programs and Proliferation: Combating the Threat of Development and Proliferation of Weapons of Mass Destruction, CBRN, and Delivery Methods (particularly ballistic and nuclear-capable cruise missiles).
a. Development, Acquisition, or Use of CBRN.
b.State W'MD and ballistic and cruise missile programs of:
China (biological, chemical, nuclear, ballistic and cruise missiles) India (nuclear, ballistic missiles)
Iran (biological, chemical, nuclear, and ballistic missiles)
North Korea (biological, chemical, nuclear, ballistic missiles) Pakistan (nuclear, ballistic missiles)
Russia (biological, chemical, nuclear, ballistic and cruise missiles)
Syria (chemical, nuclear, ballistic missiles).
c.W MD and missile proliferation activities by states:
China (nuclear, ballistic missiles), Israel (cruise missiles) North Korea (nuclear, ballistic missiles)
Pakistan (nuclear, ballistic missiles)
Russia (ballistic missile).
d.W.MD and missile acquisition activities by states:
China (cruise missiles)
India (cruise missiles)
Iran (nuclear, ballistic missiles)
Pakistan (cruise missiles)
Saudi Arabia (nuclear, ballistic missiles).
e.Safety and Security ofWMD: Pakistan (nuclear)
State WMD and ballistic and cruise missile programs of: Egypt (ballistic missiles)
Libya (ballistic missiles)
Taiwan (ballistic missiles).
(S//S1)D. MISSION: U.S. Forces at Risk (Military Support): Protecting U.S. Military Forces Deployed Overseas and Enabling their Operations.
a. U.S. forces deployed in: Iraq. Afghanistan. Mideast Region. Korea, and Philippines.
b. Support to military planning and operations: Support to OPLAN 5027 (Korea).
c. Intentions of foreign and indigenous anti-coalition forces, command and control. OOB, and
operational support in Iraq and Afghanistan. d.Support to U.S. forces in identification of HVTs in Afghanistan/ Pakistan and Iraq
a Protection of U S forces deployed in: Balkans (Kosovo),
b South Korea leadership intentions in OPLAN 5027.
c Routine military support to U.S. forces deployed in non-combat situations.
(S//S1)E. MISSION: State/Political Stability: Providing Warning of Impending State Instability. Focus Areas:
a. Internal political activities that could threaten the survivability of leadership in countries where US has interest in regime continuity Iraq, Afghanistan, Pakistan, and Saudi Arabia.
b.Internal political activities that could result in crisis in. North Korea, Sudan/Dafur humanitarian crisis. Cuba, Kosovo, Turkey, Nigeria, Lebanon, Venezuela, Syria, Bolivia, Latin American Bolivarian Developments, and Palestinian Authority.
Accepted Risks:Internal political stability of: Egypt, Zimbabwe, Cote d'Ivoire, Liberia, DROC, Bangladesh, Georgia, Jordan, and Haiti.
(S//SI)F. MISSION: Warning of Strategic Nuclear Missile Threats: Providing Warning of a Strategic Nuclear Missile Attack on the territory of the 50 United States.
Focus Areas: Areas covered under a peacetime SIGINT strategy maintaining full capabilities with reasonably sufficient coverage for the provision of warning include: Russia's Nuclear C3, Mobile
ICBMs, strategic navy missiles, and Bombers; China's Nuclear C3, Mobile ICBMs, and SSBNs; and North Korea's Nuclear C3 and potential ICBM (TD-2) Threat.
Accepted Risks: Strategic Targets where SIGINT is not a primary intelligence source in providing warning: Russia's Silo-based ICBMs; China's Silo-based ICBMs.
(S//SI) G. MISSION: Regional Conflict and Crisis/Flashpoints to War: Monitoring Regional Tensions that Could Escalate to Conflict/Crisis.
Focus Areas:Regional flashpoints that could pose a significant threat to U.S. strategic interests: Arab,Iran-Israel conflict, Korean Peninsula, China-Taiwan, India-Pakistan, Venezuela (impact on surrounding region), and Russia/Georgia.
Accepted Risks:Regional flashpoints in: Ethiopia-Eritrea andAfricaGreat Lakes Region
(S//REL USA. AUS. CAN, GBR. NZL)H. MISSION: Information Operations: Mastering Cyberspace and Preventing an Attack on U.S. Critical Information Systems.
a (S//SI) Enabling Computer Network Defense (CND): Provide cyber threat warning, detection, characterization, and mitigation services for U.S. and allied computer network operators: Named Intrusion Sets (Including, but not limited to Gadget Hiss. Seed Sphere/Byzantine Trace. Makers Mark. Byzantine Candor), New intrusions.
b. (S//REL USA, AUS, CAN. GBR, NZL) Enabling Computer Network Attack (CNA): Deliver intelligence, access, and dual-use capabilities in support of U.S. computer network attack objectives. c. (S//SI) Foreign Intelligence Serv ices' Cyber Threat Activities: Deliver intelligence on the capabilities.
vulnerabilities, plans and intentions o f foreign actors to conduct CNO against USG networks and those of interest to the USG. Identify what Foreign Intel Services know about USG capabilities, vulnerabilities, plans and intentions to conduct CNO: China, Russia, Iran, and al-Qa'ida
d (S//SI) Enabling Electronic Warfare (EW): Provide cognizance ofthe EM environment, signal detection/geolocation, and characterization through intelligence (ELINT. COMINT, Tech SIGINT) and other technical means to U.S. EW planners and operators: China. Russia, Iran, Iraq/Afghanistan (IED's) and North Korea.
e. (S//SI) Enabling Influence Operations: Support U.S. military deception (MILDEC) and psychological operations (PSYOP), and inter-agency Strategic Communication objectives to influence target behavior and activities: Terrorist groups. China. North Korea. Iran, and Venezuela.
a. Enabling CND: Isolated malicious activity that could pose a serious threat.
b. Enabling CNA.
c. FIS Cyber Threat: France, Israel, Cuba, India, and North Korea.
d. Enabling EW: (producers.'’prolifcrators): Sweden, Japan. Germany, Israel, and France, e Enabling Influence Operations: Pakistan and Russia.
(S//SI)I. MISSION: Military Modernization: Providing Early Detection ofCritical Developments in Foreign Military Programs.
b. Activities of state and non-state actors (gray arms dealers) in supplying advanced conventional weapons.
c.Threats posed by foreign space and counter-space systems: China and RussiaAccepted Risks:
a Weapons and force developments in: Saudi Arabia, and India
b Threats posed by foreign space and counter-space systems India and France
(S//SI)J. MISSION: Emerging Strategic Technologies: Preventing Technological Surprise.
Focus Areas:Critical technologies that could provide a strategic military, economic,or politicaladvantage: high energy lasers, low energy lasers, advances in computing and information technology, directed energy weapons,stealth and counter-stealth,electronic warfare technologies, space and remote sensing, electro-optics, nanotechnologies, energetic materials The emerging strategic technology threat is expected to come mainly from Russia. China. India, Japan. Germany, France. Korea. Israel, Singapore, and Sweden.
Accepted Risks:Technological advances and/or basic S&T development on a global basis elsewhere.
(S//S1)K. MISSION: Foreign Policy ((includes Intention of Nations and Multinational Orgs)): Ensuring Diplomatic Advantage for the US.
Focus Areas:Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could significantly impact U.S. national security interests: China, Russia, France, Germany, Japan. Iran. Israel. Saudi Arabia, North Korea, Afghanistan. Iraq. UN, Venezuela, Syria. Turkey, Mexico, South Korea, India and Pakistan.
Accepted Risks:Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could impact U.S. foreign policy or security interests: Taiwran.
(S//SI)l~MISSION: Energy Security: Ensuring a Steady and Reliable Energy Supply for the US. Focus Areas:Threats to the production and global distribution/transportation of energy supplies of: Iraq, Saudi Arabia, V enezuela, Iran, Russia and Nigeria.Accepted Risks:Global impact o f the state o f energy industries in: Mexico and China.
(S//SI)M. MISSION: Foreign Intelligence, Counterintelligence; Denial&Deception Activities: Countering Foreign Intelligence Threats.
Focus Areas:Espionage/intelligence collection operations and manipulation/influence operations conducted by foreign intelligence services directed against U.S. government, military', science & technology and Intelligence Community from: China, Russia, Cuba, Israel, Iran, Pakistan, North Korea. France. Venezuela, and South Korea
Accepted Risks:Espionage'intelligence collection operations against U.S. government, military, science & technology and Intelligence Community from: Taiwan and Saudi Arabia
(S//S1)N. MISSION: Narcotics and Transnational Criminal Syndicates and Networks: Mitigating the impact on U.S. national interests from drug trafficking organizations (DTOs) and transnational criminal syndicates and networks (TCSNs).
a. DTOs and associated enabling activities in Afghanistan, Mexico and Colombia that threaten U.S.interests.
b.TCSNs based in (or originating in) Russia that threaten U.S. or allied interests.
c. Money laundering that benefits TCSNs within, into, and out of Colombia and Mexico.
d. Criminal facilitators acting as a nexus between crime/narcotics and terrorism.
e. State-sponsored money laundering by Iran and North Korea. Accepted Risks:
a Drug production/trafficking within the Golden Triangle, China, and North Korea b. TCSNs operating in Central Asia, former Eastern Europe, and Asia,
c Criminal associated money laundering in Afghanistan, and Iraq.
State-sponsored money laundering by Syria.
(S//S1)O. MISSION: Economic Stability/Influence: Ensuring U.S. Economic Advantage and Policy Strategies.
Focus Areas:Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: China, Japan, Iraq, and Brazil.
Accepted Risks:Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: Turkey and India.
(S//S1)P. Mission: Global Signals Cognizance: The core communications infrastructure and global network information needed to achieve and maintain baseline knowledge.Capture knowledge of location, characterization, use, and status of military and civil communications infrastructure, including command, control, communications and computer networks: intelligence, surveillance, reconnaissance and targeting systems; and associated structures incidental to pursuing Strategic Mission List priorities. Focus of mission is creating knowledge databases that enable SIGINT efforts against future unanticipated threats and allow continuity on economy of force targets not currently included on the Strategic Mission List.Focus Areas:
Global Environment knowledge Signals knowledge.
Target knowledge. Accepted Risks:Degree of maturity may greatly vary by target
(U) II. Strategic Mission List - Enduring Targets
(S//S1)A. MISSION: China: Enabling U.S. policy and avoiding strategic surprise. Focus Areas:Provide U.S. decision makers with a holistic SIGINT perspective oftrends and developments in China, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U.S. interests. Such analysis must consider China’s strategic foreign and economic policy trends that impact U S. interests or degrade U.S. influence, the pace, scope, doctrine, and economic sustainability of China’s military modernization, the proliferation of PRC weapons and technology; the prospects for regional conflict or strategic nuclear attack; domestic economic transformation and its consequences for economic, political, and social stability'; subversive threats to U.S. institutions through hostile intelligence and information operations, and the interdependencies among these developmentsAccepted Risks:Certain domestic problem sets, such as demographic issues; lower-level political institutional growth; civil society' issues such as crime and human rights; environmental problems and planning; and agricultural production and food security'. Also, issues that transcend national boundaries, such as Chinese involvement in international organized crime; energy demand, production, and acquisition; and infectious disease and health.
(S//S1)B. MISSION: North Korea: Enabling the US to counteract North Korea’s development/use/proliferation of WMD, deter its aggression, and shape its behavior while maintaining U.S. readiness for collapse/war. Focus Areas:Provide U.S. decision-makers with a holistic SIGINT perspective of trends and developments in North Korea, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S interests and provide warning o f strategic threat. Such analysis must consider the stability of the North Korean regime and how it employs domestic and foreign policies to maintain its grip on power; the relationship between regime stability/behavior and its access to income from illicit activities and weapons proliferation; how Chinese and South Korean “carrots and sticks” enable or constrain North Korean behavior; the impact of the decaying North Korean economy on military' readiness; and how the interplay between U S policy initiatives toward North Korea and all of the above elements affect North Korea’s strategic calculus, the material disposition of its nuclear weapons, and the status of its militaryAccepted Risks:For domestic issues, risks include non-defense oriented industrial production, demographic issues, and environmental problems. Regarding issues that transcend borders, risks include non-counterintelligence associated ties between North Korean state- sponsored illicit activities and international organized crime institutions and individuals; North Korean agent activity in South Korea and Japan; non-state sponsored corruption and illicit behavior; and North Korean economic refugee flows into China
(S//S1) C.MISSION: Iraq: Enabling Coalition efforts to assist Iraq in establishing a secure, unified, democratic, and sovereign state. Focus Areas:Provide U S decision makers with a holistic SIGINT perspective of trends and developments, assessing Iraq’s progress toward establishing a viable, stable government; securing public order, suppressing insurgent opposition, ensuring reliable access to basic services and commodities; safeguarding strategic resources; and restoring a more sound economic footing. Provide intelligence on relevant factors, forces, leaders, and regional actors to facilitate U.S. Governmentpolicy or actions in support of the Iraqi process and to seize the strategic communications initiative.
(S//S1)D. MISSION: Iran: Enabling policymakers in preventing Iran from achieving its regional dominance objectives and pursuing policies that impact U.S. global interests. Focus Areas:Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U.S. interests. Assess Iran's foreign policy trends and leadership intentions that impact U.S. interests or degrade U.S. influence. Provide warning of Iran's capability to produce a nuclear weapon or its plans to use terrorist surrogates to attack Israel or U.S. forces and interests Assess the regime's progress in initiatives that enhance its pursuit of regional power objectives in the political, economic, energy, and religious or ideological arenas
Provide indicators of regime stability and/or susceptibility to democratic reform initiativesAccepted Risks:Efforts to ascertain the scope of Iran's narcotics'organized crime elements and economic stability/influence.
(S//S1)E. MISSION: Russia: Assuring diplomatic and strategic advantage and avoiding critical surprise. Focus Areas:Provide U.S. policy and decision makers with a holistic SIGINT perspective of developments and trends in Russia, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S. interests Such analysis must consider Russia's strategic foreign policy and economic intentions and actions as they pertain to U S interests and influence in the region and globally; the strength of Russia's economy and its impact on Russian power projection capability and strategic positioning; Russia's efforts to regain military strength and stimulate economic growth through the development and sale ofadvanced technology and weaponry', and the role ofWMD, organized crime and counterintelligence in enabling Russian strategic initiatives.Accepted Risks:Certain domestic issues such as demographics, regional politics, development of civil society in the country, and monitoring of low-level military' training activities. Also, issues that transcend national boundaries such as Russia’s plans, intentions and capabilities regarding influence on the former Soviet space
(S//S1)F. MISSION: Venezuela: Enabling policymakers in preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests. Focus Areas:Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U S interests Assess Venezuela's foreign policy trends and leadership intentions that impact U S
interests or degrade U S. influence Assess Chavez’ progress in his initiatives to pursue regional power objectives in the political, economic, energy, and ideological arenas. Provide indicators of regime stability, particularly in the energy sector. Assess the depth and breadth of Venezuela's relations with countries of strategic concern to the United States, particularly Iran, Cuba, China, and Russia.Accepted R i s k s :E f f o r t s t o a s c e r t a i n t h e s c o p e o f V e n e z u e l a ’s n a r c o t i c s / o r g a n i z e d c r i m e e l e m e n t s a n d e c o n o m i c stability/influence.
Nice to have a record of all this so it's easier to find later. I might write some more stories about lesser known NSSE features that apply to this impending nightmare if I can find the time. For now...
Quick notes: Lesser-known agencies such as the National Geospatial Intelligence Agency and US Northern Command also get very busy in the domestic battlespace indeed. NSSEs are part of their annual activity cycle of exercises and practice operations.
Having declared the RNC a National Security Special Event (NSSE), one that derived its “authorization” to target activists and journalists from the top secret 2006 National Security Presidential Directive-46/Homeland Security Presidential Directive-15 (NSPD-46/HSPD-15), local, state and federal law enforcement entities, the U.S. military, intelligence agencies such as the National Geospatial-Intelligence Agency (NGA) and corporate partners in the telecommunications industry and elsewhere, preemptively disrupted legal political dissent by a score of protest groups.
After many months under the radar a lot of lawsuit testimony from police has been published in Minnesota's surprising DRE police training abuse scandal.
The relevant Drug Recognition Evaluator police officers got grilled under cross examination and said all kinds of things which undermine the basic scientific integrity which everyone assumes is behind programs like this. I am hoping this spurs more media attention. I haven't had much time to review these but I think they will reward your attention with any number of insane facts.
Occupy Minnesota participant Michael Bounds describes the experience late on the original video:
I have posted before on the blog about the civil lawsuit in which I represent Plaintiffs who were picked up by Minnesota law enforcement, driven near the airport, and given street drugs and told to use them. Subsequently, various clinical tests were run on these Plaintiffs by law enforcement to provide training so these officers could become "Drug Recognition Evaluators." Each officer needed to have 15 test subjects, and credit could be given for being a recorder for another officer doing the tests. Myself and co-counsel Alan Milstein took the depositions of several of these defendants wherein they testified under oath. I have now posted these depositions on my file server for anyone to review, in the public interest.
As an attorney who has done a lot of criminal defense work, in addition to bankruptcy and civil litigation, I have long maintained that the DRE program is nothing but preposterous unscientific charlatanism. Please understand the opinion of one of these officers can get you arrested and jailed sight on scene. However, do not take my word for it, here is testimony from one of the Drug Recognition Evaluators wandering the streets and arresting people presently, Deputy Bryce Schuenke, formerly of the Dakota County Sheriff's Office and now with the Prior Lake Police Department, who holds a "Master of Science in Public Safety" from St.Cloud State University, from page 17 of his deposition:
Q (by me): "Did you rely on, like, any learned treatises or scientific textbooks during the classroom portion of your training?"
A (Schuenke): "I didn't use scientific textbooks, no."
Q (by me): "There's no scientific textbooks used in the DRE training?"
A (Schuenke): "We had manuals, but I don't know if they came from a scientific source or not."
Q (by me): "What is an Institutional Review Board?"
A (Schuenke): "I don't---I don't know."
Q (by me): "What is a controlled experiment?"
A (Schuenke): "I am familiar with the term, but wouldn't be able to explain it."
Q (by me): "What is the scientific method?"
A (Schuenke): "Again, same"
Q (by me): "You don't know?"
A (Schuenke): "I don't know."
I reiterate that this is a person who Minnesota Courts qualify to testify in Court about whether or not someone is under the influence of drugs. His clinical opinion can land someone in jail very quickly and his testimony used to prove someone's intoxication.
These depositions are filled with wonderful information about the Minnesota Drug Recognition Evaluator Program. There are many stories in these depositions that are very newsworthy. One of the overarching themes of this program is that test subjects were given fake names, presumably to make sure their actual participation in this program could be concealed at a later date. Official DRE logs are replete with fake names and falsified police reports (fascinating how Hennepin County Attorney Mike Freeman forgot about Minnesota Statute 609.505, falsely reporting crime, in his charging decision relating to the DRE program). Officers testified under oath at these depositions that they put false names and false events in their official reports.
Another issue that the Plaintiffs were wondering about was the source of the drugs administered to the Plaintiff test subjects for these police experiments. For such a scientific program that trains officers to put people in jail by waving their hands around and looking at them, one would think there would be very careful controls and dosages for the drugs (I am setting aside for the moment that it is a farce to administer drugs to people and then test to conclude that they are under the influence of drugs). However, consistent with the entire Minnesota Drug Recognition Evaluator Program, the method the drugs were obtained is entirely unscientific, and there is no knowledge about what the drugs administered actually contain. In his deposition testimony, while questioned by my co-counsel, Alan Milstein, Hutchinson Officer explained how the drugs administered to the Plaintiff test subjects were obtained:
From page 15 of deposition of Karl Willers:
Q (by Milstein): "And there was at least one instance where you gave one of the people you evaluated Marijuana, correct"
A (Karl Willers): "Yes"
Q (by Milstein): "Was it only one instance?"
A (Karl Willers): "No."
Q (by Milstein): "How many instances were there?"
A (Karl Willers): "Four or five."
Q (by Milstein): "And where did you get Marijuana?"
There is a set of questioning from Karl Willers' deposition on pages 16 to 19 that his classmates, Mark Hanneman and Peter Zajac, had obtained the marijuana by taking it from teenagers who were smoking it in a park around Farmington. Herein lies more of the rigorous science and testing behind the Minnesota Drug Recognition Evaluator program.
These depositions and their contents speak for themselves. A reading of all of them together leads any reasonable mind to the conclusion that the DRE program is unscientific hocus pocus and its training methods constitute violations of civil rights. Further, the intentional targeting of Occupy Minnesota, the homeless, and other vulnerable populations is made clear in the testimony in these depositions.
Unfortunately the program shifted to California where "transients" get coerced and abused some more, as recently reported: March 22 2015: CHP rounds up transients for police drug training | UTSanDiego.com: "They typically aren’t motorists – but people who are walking or sometimes riding bicycles who are arrested on suspicion of using illegal drugs, a misdemeanor. They are then brought to meet with trainees at certification sites, where interviews can last an hour or longer."
This disgusting story is another example of why it is essential to shut down this abusive war on drugs, wherein clearly young law enforcement officers are trained to fabricate information in reports -- which is unlawful, County Attorney Freeman -- and manipulate rather than aid the vulnerable with empathy. I hope that other activist orgs can see the light on this matter and work on this important goal in all haste, across the spectrum.
Disclosure: I worked professionally w Nathan on some web and design material previously. In the DRE matter I have not been compensated by him or any other media outlet, except by the shared gratification of defeating another abusive political program in my home state.
Doing my best "WTF" Palpatine style in drizzle..
Also thanks to https://twitter.com/c1tyofFl1nt for noting there is even a trade association, http://datia.org , the Drug and Alcohol Testing Industry Association. Let the measurements begin, one can only imagine the breathalyzers they break out at those conferences.
Will Vermin and Jimmy attempt to ontologically defeat the corrupt and bloated US political sphere again? High rent and oral hygiene will be back on the agenda in 2016, they hint in a QA.
Vermin Supreme and Jimmy McMillan answer questions after a free screening of "Who is Vermin Supreme? An Outsider Odyssey" at the Paramount in downtown Boston. Director Steve Onderick answers questions, followed by Vermin and Jimmy over skype.
A tough fight is brewing at both the state and federal level over the direction of environmental policies. In Minnesota, Republicans are totally committed to expanding fracked gas, shale oil from Bakken, and genocidal tar sands bitumen pipelines from Canada.
Pipelines in the MN political economy: To capture the House in 2014, Minnesota Republicans leaned heavily on independent expenditures from the Minnesota Jobs Coalition, which in turn leaned heavily on Northern Oil & Gas Co., a shale oil finance shop in run by a colorful family in suburban Wayzata, to pay for it all.
The joke's on Northern (NOG): as the international oil price war has taken hold their stock plummeted, but if they're going to salvage any of this they need new pipelines more than ever.
The MN House GOP isn't wasting any time fighting for their backers' needs. One of the first House bills posted in St Paul this year, HF21 would slash pipeline review to 150 days up or down - just enough time to get ahead of ticked off locals before they know what's going on.
Democrats are split over the pro-pipeline agenda in Minnesota, and the pro-industry crowd has a plan this year. The Iron Rangers are trying to wheel out "streamlining" mining regulations, willing to work with ALEC-friendly GOP. Key players here include DFL Sen. Tom Bakk, GOP Rep. Rod Hamilton for Big Ag (especially hog corporations) & the affable GOP Rep. Paul Garofalo for twitter-friendly ALEC corporate agendas.
For the top circles of people pushing this agenda, ideally environmental concerns will get flipped around — usually pollution affects poor people & people of color (POC) communities the worst — to make it appear a hobby of oblivious, elite metro consultant people. They are interested in reframing environmental justice as an elitist hobby, all the better to roll queasy and/or suburban Democrats.
They've also tried running meetings without public notice (see Rural Task Force and AURI in Sept 2014 via Bluestem Prairie) in order to reconfigure obscure government organizations to their agenda.
In this context we have to wonder what you're supposed to do when your member in Congress peddles blatantly deceptive spin (Nolan represents an area where a lot of my family is from). I will highlight some major chestnuts in bold. Source from a friend on FB:
Thank you for contacting me regarding your views on the Keystone Pipeline project.
The simple truth we must deal with is that the Alberta tar sands are already being developed and producing roughly two million barrels of oil per day which are then shipped by truck and rail. Additionally, the U.S. State Department and the government of Canada have confirmed these tar sands will continue to be developed regardless of this project's approval. Therefore, those of us who care about saving the environment must ensure that the heavy crudes are transported in the safest and most environmentally sensitive way possible. Pipelines – while not immune from accidents – have been shown to be a safer energy transportation method than truck and rail, producing a lower carbon footprint and preventing further rail and highway congestion. The fact is, the State Department concluded alternative rail transportation options to move the heavy crude from the tar sands would result in the release of 28-42% more carbon emissions than through the pipeline.
Moreover, the Keystone project will provide access to additional oil reserves not subject to the ongoing turmoil in the Middle East, while supporting more than 42,000 good-paying jobs across our nation, translating to $2 billion in earnings for workers, substantial local and state tax revenue, and an additional $3.4 billion to our gross domestic product.
The Keystone XL Pipeline has been rigorously studied and will generate urgently needed jobs and economic development across our nation. To that end, I recently joined the majority of the House in voting to pass legislation (H.R.3) to move forward with the Keystone XL pipeline project. Unlike previous Keystone legislation I opposed in the past, this legislation requires that Keystone be compliant with all other existing EPA and other US federal agency requirements that would need to be met by a domestic pipeline application.
I am disappointed we were not permitted to amend the bill to require use of 100 percent American steel in construction because it is proven to be better and less accident prone. Nonetheless, this legislation puts an end to almost seven years of gridlock, requires the pipeline operators to comply with tough U.S. environmental protections, and allows for a route change in Nebraska that will avoid the environmentally sensitive Sandhills region.
Please know I have long been a strong supporter of the Environmental Protection Agency and the Clean Water Act, as well as other laws and regulations to protect our precious environment. To that end, during the 113th Congress I proudly cosponsored H.R.3674, the End Polluter Welfare Act of 2013 which would eliminate tax loopholes and subsidies that support the oil, gas and coal industries. Additionally, H.R.3674 would end taxpayer-funded fossil fuel research and prevent companies from escaping liability for spills or deducting cleanup costs. At a time when energy companies are making record profits, we should not be providing them with generous subsidies.
Rest assured I will keep your concerns in mind as I continue to look for ways to protect our precious environment here in the Congress.
Thank you again for sharing your views with me. I truly appreciate your advice and counsel and hope that you will contact me in the future whenever I can be of assistance.
I encourage you to follow me on Facebook and Twitter and visit my website at nolan.house.gov to receive daily updates.
Richard M. Nolan
Member of Congress
"Heavy Crude": Nolan distributes disinformation here. The product thrown down these pipelines is superheated tar sands diluted bitumen ('dilbit' - wiki). It is a trade-secret laden petrochemical mixture which makes the bitumen (essentially raw asphalt - wiki) just slick enough to move along. In order to smooth the political process, diluted bitumen is reframed as "heavy crude oil (wiki)" and occludes the presence of environmentally dangerous secret diluent ingredients.
The bitumen also contains tiny quartz (sand) particles which steadily etch the pipeline interiors, as NRDC/Sierra Club mention (PDF). Whenever this mixture leaks, the bitumen sinks in water while much of the more volatile diluents tend to float - making cleanups a far messier affair than with conventional or "light crude", which does actually float and is pretty familiar in Hazmat training world. See: The Dangers of Diluted Bitumen Oil - NYTimes.com (OpEd Aug 2012) re Kalamazoo River in Michigan:
After the dilbit gushed into the river, it began separating into its constituent parts. The heavy bitumen sank to the river bottom, leaving a mess that is still being cleaned up. Meanwhile, the chemical additives evaporated, creating a foul smell that lingered for days. People reported headaches, dizziness and nausea. No one could say with certainty what they should do. Federal officials at the scene didn’t know until weeks later that the pipeline was carrying dilbit, because federal law doesn’t require pipeline operators to reveal that information.
Transcanada has its view on dilbit: "Is it really crude oil? Yes." but… "Dilbit and synbit approximate the characteristics of typical conventional heavy crude oil." Seems like they're having it both ways. And they're blatantly lying here: "Does it float or sink if it spills in water? Oil sands-derived crudes behave the same way as conventional crude oil, which floats in still or slow-moving water."
Here is the actual Keystone XL State Dept thing on Dilbit:
Dilbit is bitumen mixed with a diluent so it can be transported by pipeline. The composition of the dilbit is only provided here generically because the particular type of bitumen and diluents blend produced is variable and is typically a trade secret. A common condensate stream (liquids derived from natural gas) is currently the primary type of diluent used for Canadian heavy crude. Diluent consists of condensates, ultra-light sweet crudes, and refinery and upgrader naphtha streams from several supply sources. Typically, dilbit uses approximately 25 percent of condensate, where companies use either their own supply sources of light hydrocarbons or purchase the above condensate stream. According to the Saskatchewan Condensate Monthly Report dated September 1, 2012 (Crudemonitor 2012b), the composition of gas condensate is mainly light hydrocarbons such as iso-butene, n-butane, iso-pentane, n-pentane, and hexanes. Material Safety Data Sheets (MSDSs) (for informational/planning purposes only) for two types of diluents, naphtha and natural gas condensate, assuming a maximum diluent mix, are provided in Appendix Q. It is important to note that the chemical make-up of the diluents can vary greatly from source to source. The bitumen-diluent mixture with bitumen from the oil sands is generally similar to heavy sour crude, which is discussed in more detail. SCO may also be used as a diluent for bitumen, in which case the commodity is known as synbit (bitumen diluted with SCO). Properties of generic dilbit are shown in Table 3.13-1.
Huh Toxicity is Class D Division 2 Subdivision A: Very Toxic Material. Interesting, didn't see that on Transcanada's page. Also "BTEX = benzene, toluene, ethylbenzene, and xylenes". Benzene is definitely carcinogenic.
"supporting more than 42,000 good-paying jobs": This is another block of disinformation and reaches into the more dishonest level by adding "good-paying". This has been heavily debated since it counts temporary and partial work, and general economic ripples, as partial equivalents to a full job.
This figure comes from the State Department study which, for example, claims that 300+ entertainment jobs indirectly get supported by pipeline construction, and assumes that the actual construction jobs last 19.5 weeks. These are batched together to count as one full "job", and the totals for the physical pipes that have already been completed are also included in this figure.
"these tar sands will continue to be developed regardless of this project's approval": That is not necessarily true - on two levels. The projects have been hitting the skids and losing investors, and funding is getting pulled as rapidly as they can from early-stage projects. Saying they "will continue to be developed" when they're losing investors is inaccurate. And of course, the projects only move if they are financially feasible. If they get priced out from transportation due to lack of capacity, then the overall statement is also false.
There is not some magic way to make these projects profitable without export capacity - and even with more export capacity the whole thing is going over the cliff anyway. See:
Tar sands industry faces 'existential' $246 billion loss - The Ecologist- Nov 27 2014: "The report suggests that that investors are being misled about the economic viability of oil sands production… CTI calculate that 92% of future oil sands production will only viable if oil prices are $95 per barrel. However, prices stand at only $85, so producers are losing money for every barrel of oil they sell - unless they are cushioned by existing higher-priced contracts, which will sooner or later expire."
It is also worth noting that the anti-pipeline candidate, Green Party American Indian elder Skip Sandman got 4.3% or 11,450 votes. The diligent efforts of many at least forced Nolan to cover his flank with some better votes — frustrating but hardly wasted. Nolan received 48.5%, narrowly edging Stewart Mills at 47.1%. (Side note: the cheesy DCCC messaging to pigeonhole Mills as a rich guy seems to have backfired, this district shouldn't be that close really.)
Photo Source (Reuters/Baz Ratner) - Palestinian officials condemn Israel settlement plans | Maan News Agency Nov 6 2012: "The Israel Land Administration on Monday published notices inviting bids from contractors to build on plots in Ramot and Pisgat Zeev, urban settlements that Israel has declared part of Jerusalem. The plans call for the building of 607 new homes in Pisgat Zeev and 606 in Ramot. Tens of thousands of Israelis already live in the two areas."
A light rail built recently in metropolitan Jerusalem has been damaged at several points in intense protests sweeping much of the West Bank and Arab-Israeli cities like Nazareth. Apparent reprisal killings, attacks & marches against Palestinians after three Jewish settler teenagers were killed in the West Bank has left the region in upheaval. With renewed instability across much of "Al-Sham", an area comprising Israel, Palestine, Syria, Lebanon, Iraq, Jordan, this season there's renewed focus on individual communities & networks battling each other. [Photo source at right Israel Police / Jpost: Palestinian unrest spreads to Israeli-Arab towns in fresh riots | JPost | Israel News July 5 2:42PM update]
In the complex topologies of Middle Eastern conflict railroads are an interesting one as depicted in Lawrence of Arabia. British and Ottoman railroad power provided leverage in previous eras. Kemal Mustafa Ataturk got a large rail network rolling in Turkey, then it suffered from neglect for decades due to US imposing pro-auto industry policies on the Turkish government.
The metropolitan Jerusalem government built a light rail system through Shufat [wiki], a north Jerusalem Arab neighborhood which is within the area Israel captured in 1967 and annexed, offering its residents Israeli citizenship. Most decline IL citizenship and have Israeli residency cards, including those in the Shufat refugee camp which has families from nearby areas that landed there in the Nakba / Israel's founding.
More recently Shufat has been shoved into a lonely status as an Israeli-annexed city but partially outside the Separation Wall around much of Jerusalem, making it harder for Shufat residents to work in neighboring recently built Jewish settlements inside the area now demarcated as metropolitan Jerusalem. Even though they are within Israel as Israel defines it, & not like West Bank towns, they are still totally screwed by most of the same problems facing nearby Palestinian West Bank towns.
Those who see the light rail system as part of the occupation settler apparatus supported disabling it. Pisgat Zeev, built in 1985, is served on the line. For many years the neoliberal settler goal was to develop commuter suburbs in the occupied West Bank laced with settler-only road systems, setting up Jewish suburbs among old Arab towns where, unfortunately no area resident was part of the same national government. [Sometimes it happens one apartment at a time].
Hamas called Thursday upon all Palestinians to engage in “the revolution of Shufat” with every possible tool in their power to aid the resistance.
Hamas said in a statement that “our people in occupied Jerusalem started a huge revolution against the Israeli occupation and settlers.”
Fawzi Barhoum said that “the revolution of Shufat” and its intifada show that all the violations, suppression and intimidation “cannot keep the Palestinians down” but only makes them hold onto their rights and resist.
(Reuters) - Israel's Jerusalem municipality approved building plans on Wednesday for 184 new homes in two Jewish settlements in the occupied West Bank, drawing anger from Palestinians engaged in faltering statehood talks. A municipality spokeswoman said the local planning committee had approved requests by private contractors who purchased the land years ago for the construction of 144 homes in Har Homa and 40 dwellings in Pisgat Zeev.
OpenStreetMap | Relation: שועפת / شعفاط /Shoufat (2746781) - Open Street Map entry for Shoufat light rail station. Things start to make more sense when juxtaposed with latest additions to Pisgat Zeev & notice how Shuafat refugee camp is actually cut off from rest of Shuafat by the Separation Barrier: Right click to view this full-res map separately via PeaceNow.org.il.
Municipal officials slammed the company that won the Jerusalem light rail tender for publishing a survey asking city residents whether it would bother them if Palestinians were to use the system under various conditions.
Officials from the municipality and the Transportation Ministry called the questions "racist," and said they should not have been asked, especially not by a private company.
Last week, Haaretz reported that the CityPass consortium had asked Jerusalem residents, "There are three stops in Shuafat; does this bother you?" and "All passengers, Jews and Arabs, can enter the train freely, without undergoing a security check. Does this bother you?"
Municipal director general Yair Maayan sent a strongly worded letter to Avraham Shohat, CityPass' chairman, on Friday. The letter was titled, "Request for an examination and for drawing conclusions."
"We were flabbergasted to see how a private commercial consortium dared to address these subjects, which are none of its business whatsoever; to ask such racist questions and to arouse strife and contention in the city," said the letter, citing the Haaretz article.
"It is a shame that the municipal director general attributed totally unfounded significance to the survey, whose only aim was to improve the service to all the residents," said the spokesman. "This merelyadds unnecessary fuel to the fireand certainly does not serve the interests of the city's residents. The survey was not meant to offend any residents, and we shall change it accordingly."
The escalation of violence in the territories, Jerusalem and the triangle (of Arab towns in central Israel) are the direct result of the policies of the government of Prime Minister Benjamin Netanyahu, former Shin Bet chief Yuval Diskin wrote late Friday in a harshly critical Facebook post.
In his lengthy comment, Diskin wrote that the rapid deterioration in the security situation has shattered the Israeli leadership's "illusion that Israel's frustrated Arab citizens will not at the end of the day take to the streets over the lack of response to their problems and the containment of the Palestinians in the West Bank, and will not react despite their frustration and the worsening economic situation."
This illusion, Diskin said, "worked perfectly for as long as the defense establishment succeeded in providing impressive calm in the defense arena. The rapid deterioration in the security situation was not only down to the brutal murders of Naftali, Eyal and Gil-Ad, but first and foremost it is the result of the illusion that the government's stagnation in every area was really keeping the situation in deep freeze."
Diskin, who headed the Shin Bet for six years, went on to define the various "illusions" that he says the government is propagating.
"The illusion that 'price tag' attacks are just a few slogans on the walls and not really racism; the illusion that everything can be solved with a little more force; the illusion that the Palestinians will just accept all that we are doing in the West Bank and not respond, despite their rage, frustration and worsening economic situation; the illusion that the international community will not impose sanctions on us; that Israel's frustrated Arab citizens will not ultimately take to the streets over the lack of treatment of their problems; and the Israeli public will keep submissively accepting the government's incompetent response to the social gaps that its policies have only worsened, when corruption continues to eat away at all that is good, and so on and so on."
Diskin concluded with a grave warning that there could still be worse to come.
"Anyone who thinks that this can be sustained is making a huge mistake. What has been happening in recent days could be much worse - even if the situation temporarily calms down. Do not be fooled for one moment, because the massive internal pressure will still be there, the combustible fumes in the air will not dissipate, and if we do not dispel them, there will be an even more serious situation."
The tragedy of the innocent boys murdered by terrorists will haunt us for a long time, but it will not destroy us. Jewish revenge killings will.
By Rabbi Daniel Landes | 12:35 04.07.14 |
There is only one sane and truly halakhic way to tackle our current situation: Take the well-known members of the Orthodox Price Tag gang and lock ‘em up, for a long time and in an inaccessible prison. Don’t let them go home for chagim and deny them visitors. Do the best to break and separate them. Freeze monies that go to their families. And when and if we have proven guilty perpetrators, bulldoze their…
Transportation can be a powerful force for colonialism -- it's not hard to see why it's a matter of profound importance for Palestinians to try to express some influence on the weird, militarized Jerusalem development environment by cutting off a mass transit system designed to serve ongoing 'frontier' settlements isolating them from the West Bank. The topology of the conflict continues….
Quick post about how much money you can make simulating the apocalypse for the new Homeland Security & domestic military ops structure. Cubic NUWAIX - you has it! Spoiler Alert for Exercise Scenario: Open Ended Profits!
How to sign off on something sketchy - even the attorney is laying low:
A somewhat interesting event is happening in a few sites around the midwest - ARDENT SENTRY 2013 is a major annual domestic military exercise - with a whole series of simulated events run in different places. Interestingly NUWAIX 2013 involves a simulated nuclear incident in Minot North Dakota, a place known for both nuclear technology and odd incidents.
The federal Bureau of Alcohol, Tobacco, Firearms and Explosives, the U.S. Forest Service, and the Carbon County Sheriff’s Office are asking for help from the public in gathering information about the theft of approximately 559 pounds of high explosives from a USFS explosives bunker located near Red Lodge.
A press release from the ATF says that in April 2013, someone used forced entry to get into an explosives storage facility owned and operated by the U. S. Forest Service, which is located about two miles south of Red Lodge.
Officials say that various emulsion-type explosives, explosive cast boosters and detonating cord were taken from the facility.
Hence one could speculate an event involving nukes, dynamite, ideally, cigar twirling ubervillains with headquarters on trains.
More interestingly - or concretely anyway - we find that the mysterious Cubic Corporation has an apparently open-ended contract doing these nuclear exercises & such. "Indefinite Delivery Indefinite Quantity" IDIQ contract with Cubic Defense Applications Inc (CAI) "without using full and open competition".
PETERSON AIR FORCE BASE, Colo. - The North American Aerospace Defense Command and U.S. Northern Command will conduct a major exercise, ARDENT SENTRY 2012, focused on Defense Support of Civil Authorities, May 2 – 9, 2012.
The exercise will be primarily a Command Post Exercise, but there will be field training events within the exercise. Those events will take place in North Dakota, Oregon, Texas, Alaska, Connecticut and Nova Scotia and involve United States and Canadian military units.
- North Dakota, the Air Force Global Strike Command will respond to a simulated Nuclear Weapons Incident (NUWAIX) on Minot Air Force Base.
- Oregon, the Oregon National Guard will work with state and local officials to respond to numerous weather-related and security events.
- Texas, US Army North will deploy a task force to work through the process of leading a military response to a major hurricane.
- Alaska, Joint Task Force-Alaska will conduct a coordinated response to a major aircraft crash in a remote area.
- Nova Scotia, Canadian and US Naval forces will work together to handle a security related event.
ARDENT SENTRY 12 will validate existing plans, policies, and procedures, including the Federal Inter-agency Response Plan, as well as state and regional plans.
For more information, contact USNORTHCOM Public Affairs at 719-554-6889 or 719-304-6097.
We have to keep a special eye on Minot because of the mysterious 2007 Minot Nuclear Incident. Google that term - wiki here. People died, it was very strange. The wiki version is buttoned down pretty tightly - 2007 United States Air Force nuclear weapons incident - Wikipedia as a lot of odd things happened including possibly a fragmentary attempt to escalate the nuclear posture outside the authentic US chain of command (aka Cheney faction starts playing around).
Hence when there is another NORTHCOM exercise at Minot for NUWAIX, Minot's weird recent history is certainly related - "Don't forget where these things are, right you guyz?"
The Defense Threat Reduction Agency (DTRA) has announced intentions to increase the funding ceiling on an existing Chemical, Biological, Radiological, Nuclear, High-Yield Explosives (CBRNE) Exercise Support Services contract with Cubic Applications, Inc. (CAI).
As a result of unanticipated increases in the quantity of Foreign Consequence Management (FCM), Nuclear Weapons Accident / Incident Exercise (NUWAIX) and Consequence Management Assistance Program (CMAP) events in FY13-14, the government requires an increase in the ceiling of the contract to ensure immediate and continued support of current and scheduled efforts in Fiscal Year 2013-14. The increase results in no change to the ordering period of the contract which continues through July of 2014.
“As CAI has over eight years’ experience in the planning, development, and execution of FCM/NUWAIX and CMAP efforts, only CAI possesses the in-depth knowledge and expertise required to plan, develop, and execute the current and scheduled FCM/NUWAIX and CMAP requirements,” states the DTRA announcement. “Further, as the current performer and executor of these highly specialized/niche counter CBRNE Exercise Support services, CAI is the only source capable of fulfilling the Government’s requirements.”
The current effort with CAI is managed under HDTRA1-04-D-0020. Due to current and anticipated growth in these areas, the agency expressed intentions to re-compete the program contract prior to expiration in January 2014.
CAI and parent company Cubic Corporation of San Diego, CA are engaged in the design, development, manufacture, integration, and sustainment of high technology systems, products, and services for government and commercial customers. Cubic employs nearly 7,800 people worldwide.
Ah yes Cubic Corporation was rumored to be associated with the Trapwire global surveillance grip project. They denied it. It's sort of indirect, but it's funny that Cubic has its fingers in deez pies and near other interesting pies as well.
Technically, Cubic has nothing to do with Abraxas Applications, which is behind TrapWire. But there are some historical vestiges as well as current shareholder arrangements that make the connections between Cubic, Abraxas Applications and Abraxas Corp. far more muddled than initially portrayed.
Abraxas Corporation's parent company Cubic Corporation issued a statement saying that Cubic -- and its Abraxas Corporation -- have no affiliation with TrapWire, which they say is the product of a separate company, Abraxas Applications.
Cubic Corporation acquired Abraxas Corporation in November 2010 for $124 million. Cubic has three units focused on defense systems, mission services and transportation for military operations. Trapwire's software is designed to thwart terrorist threats and criminal attacks. In other words, Cubic and the two Abraxas companies live in opposite ends of the same neighborhood.
When TrapWire became ready to sell as a commercial product, Abraxas Applications was launched to do so in 2007.
The intent for Abraxas Applications at the outset was to have both Abraxas projects play together under the direction of both companies' former CEO, Hollis Helm, former chief of the CIA's National Resources Division.
1. Recently DARPA (part of the Pentagon) awarded Cubic Corporation $6 million to develop a “laser-emitting targeting computer” for American military snipers. It’s called ‘One Shot XG’ (see photo above) “that will allow the sniper to make kill shots “under crosswind conditions, at the maximum effective range of current and future weapons.”
2. In 2004, Cubic Corporation were granted a $6.5 million subcontract from General Dynamics Amphibious Systems to develop and produce a Driver Simulator and a Turret Simulator for the Marine Corps new Expeditionary Fighting Vehicle (EFV).
3. Cubic Corporation were also awarded another $6 million contract from Raytheon/Lockheed Martin Javelin Joint Venture to produce tactical trainers for RLM’s shoulder launched, “fire-and-forget” anti-tank missile.
4. Cubic are also building the Surveillance Target Attack Radar System (STARS), an air/ground data link system for the US military.
5. Two days ago Cubic Corporation put out a press release denying any link with TrapWire, which we now know is questionable (if we go by their directors listings). Well here’s another Cubic Corp press release (from May 2010):
ORLANDO, Florida – May 17, 2010 – Cubic’s Simulation Systems Division, a defense systems unit of Cubic Corporation (NYSE: CUB), has been awarded a contract valued at approximately $4.8 million to supply 27 of its COMBATREDI systems to the Florida Army National Guard, along with four 180-degree Warrior Skills Trainers (WST), a vehicle trainer that works with COMBATREDI. The award represents Cubic’s first sale of the new COMBATREDI system, which immerses users in a highly realistic 360-degree “virtual reality” environment. COMBATREDI is a new approach for Cubic, its first completely tetherless, user-worn virtual training system. It features a high-definition helmet-mounted OLED video display that delivers game-quality graphics with a 60-by-45-degree field of view, and an integrated 3D stereo headset for sound effects. Trainees are able to move through a 360-degree virtual environment, including entering buildings, as if it were real. The user carries a realistic wireless “surrogate” rifle that performs like a real one, requiring things like magazine changes and selecting the correct firing mode to operate correctly. Cubic introduced the new system to potential military users late last year. “Cubic is pleased that it hasn’t taken long for the groundbreaking characteristics of COMBATREDI to be recognized by the user community,” said Tony Padgett, Immersive Product Line Manager for Cubic Simulation Systems in Orlando. “COMBATREDI fully immerses trainees into the virtual environment. This is a whole new way to train the dismounted soldier.” Padgett said COMBATREDI allows individual soldiers to be trained almost anywhere, incorporating virtually limitless scenarios without the need for dedicated facilities. The WST system also being delivered to the Florida Army National Guard projects realistic high-fidelity scenes on large screens using the Virtual Battle Space 2 (VBS2) engine. This system is in use in multiple U.S. Army locations.
Mainly I would say that training exercises should be kept to the absolute minimum necessary, and indeed they should not be an opportunity for shadowy corporations like Cubic to profit from open-ended contracts.
This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.
Mission drift into the US continues as the Pentagon contemplates dealing with "domestic extremists" under the rubric of Defense Support of Civil Authorities (DSCA) - one aspect of which is the US Northern Command's "USNORTHCOM CONPLAN 3501".
CONPLAN 3501, This generic emergency plan is relatively easy to obtain (most of the text), but it is the "friendly" hand of the DOD compared to the more mysterious and riot-control-oriented "USNORTHCOM CONPLAN 3502" entitled "Civil Disturbance Operations" (CDO). This surfaced in researching the role of Northcom at the 2008 Republican National Convention, which was a very 3502 CDO style operation with National Guard controlling space on Kellogg Blvd. CONPLAN 3502 is the post-2002 version of GARDEN PLOT, the 1960s-1990s template plan for domestic military deployments, like for example in the LA Riots.
Here is the new front-piece document. Also bonus weird stuff about the ever popular integration of North America.
An interesting Snippet:
Loosely-networked or individually motivated violent extremists will continue to exhort followers and encourage violent extremism in the homeland.
o HVEs will operate alone or organize in small groups and will be largely autonomous in their operations; they will have access to web-based resources to assist them in their operational planning.
o Military members and facilities will remain prominent targets of terrorists, and particularly by HVEs.
ł DoD will be called upon to provide significant resources and capabilities during a catastrophic event in the homeland.
o The National Response Framework will remain the primary instrument for applying Federal capabilities during disaster response.
Rapid and actionable intelligence on terrorist threats
DoD will maintain and enhance the Joint Intelligence Task Force for Combating Terrorism (JITF-CT) as its key node for sharing intelligence with interagency partners on terroristthreats. DoD will improve and refine intelligence and information-sharing relationships thathave developed since 9/11 and as a result of the Fort Hood shootings.
DoD maintains a robust array of foreign intelligence capabilities, and sharing relevant counterterrorism-related information with the Federal Bureau of Investigations (FBI) and otherkey parties is vital to the prevention of potential terrorist threats to the homeland. JITF-CT willremain the focal point for DoD’s outreach and sharing of intelligence and information with theFBI, the Office of the Director of National Intelligence (ODNI), and the NationalCounterterrorism Center (NCTC). Additionally, DoD will expand its participation within thevarious FBI Joint Terrorism Task Forces (JTTFs),9as well as other similar entities to maximize“top-down” and “bottom-up” sharing of key pieces of intelligence and information, consistentwith applicable law and policy.
And of course, Unity of Effort and the ever popular Council of Governors:
Promote Federal-State Unity of Effort
Unity of effort between the Federal Government and States must be one of DoD’s guiding principles in the homeland, since unifying DoD’s efforts with those of its external partners improves collaboration and shortens response times for meeting life-saving needs during emergencies. Unity of effort also means greater national preparedness at less overall cost, while preserving both Federal and State constitutional requirements and responsibilities. DoD and its Federal partners must continue to strengthen unity of effort with States to define common goals regarding capabilities, structures, and processes for responses to disaster and emergencies in the homeland.The Council of Governors – established by Executive Order in 2010 – will be an essential forum for enhanced, senior-level dialogue among Federal and State civilian and military officials for this purpose.
[.....] DoD will regard dual-status commanders as the usual and customary command and control arrangement in cases where Federal military and State National Guard forces are employed simultaneously in support of civil authorities within the United States.
DoD will continue to refine processes for dual-status commanders and their associated command structures. By leveraging the use of such commanders, DoD will improve Federal-State communication, economy of force, and force employment for planned events and no-notice or imminent incidents.Historic examples of the employment of dual status commanders includenational special security events such as the Democratic and Republican national conventions andresponses to disasters like Hurricane Sandy and wildfires in the western United States...
Vague talk of militarized domestic databases always good:
Since Federal and State military components have varying requirements for relevant information and level of detail, development of a COP solution need not specify systems, hardware, or software. Instead, it must be based on common data from authoritative military or civilian databases that flow to various systems in a common format.....
The DCE/DCO structure is reconfirmed to be key to domestic military operations:
DoD will use the planning capacity of Defense Coordinating Elements (DCEs)to expand planning cooperation at the regional level so that Departmental capabilities are considered in FEMA-led regional planning efforts. DoD will also build an integrated organizational architecture for its liaison and coordinating officers at various headquarters.
The ten FEMA regional offices are key nodes for integrating Federal planswith State and local plans, and DCEs within these regional offices are essential for operational and tactical unity of effort in an adaptive environment. This regional planning relationship bridges the gap between State-level planning conducted at a National Guard’s Joint Force Headquarters (JFHQ)-State and DoD and DHS national-level planning. The JFHQs in each of the 54 States and Territoriesprovide vital ties to State emergency officials and the National Guard Bureau. This enduring synergy positions the JFHQ as the key State-level organization for integrating the emergency plans of local DoD installations with State plans and FEMA regional plans.
DoD will deepen and facilitate rigorous Federal, regional, and State-level planning, training, and exercises through coordination and liaison arrangements that support civil authorities at all levels. These arrangements include DoD liaison officers at DHS and FEMA, Defense Coordinating Officers (DCOs), and Emergency Preparedness Liaison Officers from each Service.....
WASHINGTON, April 1, 2013 – The Defense Department incorporated hard lessons learned when it codified its new homeland defense and civil support strategy, said Todd M. Rosenblum, DOD’s top homeland defense official.
In an interview with American Forces Press Service and the Pentagon Channel, Rosenblum, the acting assistant secretary of defense for homeland defense and Americas’ security affairs, said the new strategy is a recognition that the operating environment has changed.
“We face new threats, we have new vulnerabilities, we have new dependencies, most importantly we have a new way to do business,” Rosenblum said during a Pentagon interview. “We have to capture that and make sure the department is prepared and directed toward being more effective and efficient as we can be.”
The Defense Department is charged with defending the homeland from attack. U.S. Northern Command is further charged with working with state and local entities and other federal agencies to provide support in times of natural or man-made disasters. In the first instance, DOD has the lead. In the second, another federal agency -- such as the Federal Emergency Management Agency -- has the lead.
The strategy, released in February, looks at the lessons learned from past experiences -- from Hurricane Katrina through Hurricane Sandy.
They also looked at changes including the growth of communications networks, dependence on private-sector capabilities and “the rising expectations from the president and from the secretary, and certainly from the American people, that we will be prepared to provide support to civil authorities within a 24- to 48-hour window,” Rosenblum said.
This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.
“So we are postured to provide assistance as fast and rapidly as possible,” Rosenblum said.
The vast difference between the response to Katrina in 2005 and to Sandy in 2012 shows the effectiveness of the new strategy, he said.
“We were more efficient, timely and effective in our support to Hurricane Sandy,” Rosenblum said. “This is because we did integrated planning within DOD, with our federal partners, and with our state partners. We recognized the need to not wait to be called upon, but to pre-position our support capabilities knowing there’s going to be audibles and ad hoc requests.”
Planning is at the heart of the strategy, he said. Integrated planning -- with state and local officials, with other federal agencies and with non-governmental entities -- has increased visibility and prominence. The National Guard -- an organization that bridges state and federal efforts -- continues to play a crucial role. But, Rosenblum noted, the strategy recognizes that response to disasters requires an all-of-government approach.
Cyberattacks, he said, also could produce the type of man-made disaster that would require DOD assistance. The homeland defense mission codifies requirements to provide cyberdefense, he added.
“The threats to networks and critical infrastructure increase when we are engaged in operations overseas,” he said. “The physical effects of cyberattacks can impact our military operation capabilities and response capabilities.”
The fiscal environment impacts this -- and all other -- strategies.
“The sequester is real and effecting DOD through readiness, training,” Rosenblum said. “It is difficult for the department to plan and budget intelligently, when we don’t have budget certainty.”
Officials devised the strategy when the department had already committed to $487 billion in reductions over 10 years.
“Sequester has changed the calculus tremendously,” Rosenblum said. “But this strategy is not about buying new capabilities: It’s about our planning, our processes and our integration.”
DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities
The Department of Defense announced today the release of the Strategy for Homeland Defense and Defense Support of Civil Authorities. This policyestablishes DoD’s priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president’s National Security Strategy and the 2012 Defense Strategic Guidance. It links with other DoD and national strategic documents related to missile defense, space, cyberspace, counterterrorism, and the Western Hemisphere. The strategy identifies two priority missions for the department in the homeland: defend U.S. territory from direct attack by state and non-state actors; and provide assistance to domestic civil authorities in the event of natural or manmade disasters, potentially in response to a very significant or catastrophic event.
The strategy emphasizes cost-effective policy mechanisms and innovative approaches to defend the homeland against direct attacks and to provide timely responses to routine and catastrophic events on U.S. territory. It stresses the continuation of DoD capabilities to defend against conventional and emerging threats in the air and maritime domains, while expanding cooperation with federal, state, and local partners to defeat asymmetric threats – including, for example, homegrown violent extremists who may seek to use improvised explosive devices. Additionally, it addresses DoD preparations for responding to man-made and natural disasters.
“The Department of Defense’s contributions to the defense of our nation have evolved over the past decade and account for new threats and challenges. Lessons learned from events like Hurricanes Katrina and Sandy and collaboration with our interagency partners and State Governors have framed our current approach to DoD civil support activities,” said Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Todd Rosenblum. “This strategy emphasizes strengthening our partnerships with federal agencies like the Departments of Homeland Security and Justice, with state and local governments, with the private sector, and with our Canadian and Mexican neighbors – not only for more comprehensive approaches to complex security challenges in the homeland, but also to create efficiencies through collaboration and joint action,”
Acting Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs [Acting?]
Todd M. Rosenblum is the Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs. In this position, he advises the Under Secretary of Defense for Policy on the homeland defense activities of the Department and regional security matters for the countries of the Western Hemisphere. He is also responsible for advising the Secretary of Defense on all matters pertaining to defense support to civil and law enforcement authorities in the homeland. Mr. Rosenblum has nearly 25 years of political, policy, and legislative experience in national security affairs.
Prior to his appointment at the Department of Defense in May 2011, Mr. Rosenblum was the Deputy Under Secretary of Intelligence for Plans, Policy, and Performance Management, Department of Homeland Security, from February 2009 to May 2011. He directed strategic and policy planning for the Department’s intelligence program, oversaw budget development and resource allocation priorities for the synchronization of intelligence programs and priorities, provided stewardship and direction for the Information Sharing Enterprise, and ensured that the intelligence program was aligned with national, departmental, and intelligence strategy and requirements.
Mr. Rosenblum was a Professional Staff Member on the Senate Intelligence Committee from March 2005 to November 2008, leading Committee oversight of Department of Defense human intelligence collection programs and Intelligence Community-wide intelligence collection programs and operations in the Middle East. Concurrently and prior to joining the Committee, he served as the Military Legislative Assistant and National Security Advisor to Senator Evan Bayh from January 2001 to November 2008, where he acted as senior counsel and represented the Senator on defense issues and foreign policy, national security legislative actions, and public affairs. He was a member of the Senior Personnel Staff, National Security Cluster, on the Obama Presidential Transition Team from November 2008 to February 2009.
Mr. Rosenblum held several management and advisory positions at the Department of State and the U.S. Arms Control and Disarmament Agency from August 1994 to January 2001. From April 1999 to January 2001, he was the Executive Assistant/Chief of Staff to the Assistant Secretary of State for Nonproliferation where he provided executive management and policy liaison on the full range of nonproliferation issues. He was the Senior Foreign Affairs Advisor for Northeast Asia at the U.S. Arms Control and Disarmament Agency from August 1994 to April 1999, where he represented the Agency in numerous nonproliferation negotiations and regional security dialogues.
From January 1993 to August 1994, he was the Deputy Political-Military Advisor for the Bureau of Near Eastern Affairs, U.S. Department of State. Mr. Rosenblum chaired an interagency export control working group, providing departmental recommendations on proposed arms sales to the region, and was responsible for ensuring consistency between national policy and regional security assistance activities. He was an Intelligence Officer in the Central Intelligence Agency’s Office of Near Eastern Affairs, Directorate of Intelligence, from September 1988 to January 1993.
Mr. Rosenblum has received numerous individual and group awards from the Department of State, the U.S. Arms Control and Disarmament Agency, and the Central Intelligence Agency. He received his Masters in International Affairs in 1988 from the School of International and Public Affairs, Columbia University, and his Bachelor of Arts in 1986 from Columbian College, The George Washington University.
Anyway that should give everyone a little more to work with, given the heightened domestic military operations surrounding the Boston aftermath, it is important to get a sense of where the Pentagon sees itself going in these reactions and ongoing operations -- what happens next is another question.
A great move would be publishing the entire text of USNORTHCOM CONPLAN 3502 Civil Disturbance Operations on the Internets immediately!
A quick update on a number of different fronts developing around 21st century Cointelpro operations. This material includes the important bureaucratic fault line of authorizing "otherwise" illegal government operations, an important topic of research... Granted, Season 3 of the X-Files is playing over my shoulder, a product of a more skeptical decade. Yeah, the truth is out there - and at least here we get tiny, but real, slivers of crucial folds in the origami.
The FBI file and the Minnesota State Auditor files aren't really smoking guns, but they clearly show us interesting & almost totally unknown new levels of the modern 21st century COINTELPRO system. Four apparently new documents about the obscure and rather deliberately shadowy world around the insertion of informants into political organizations, information with implications for any political movement that might get "spammed" by fake realities generated by people working as informant handlers, or also in the state level documents, outstate drug buys, interesting examples of cash, firearms and drugs floating around. The "upper" FBI reality described here certainly has implications for the "lower" state-level drug operations, paid informant & prosecution world - thus they make an interesting contrast for one post!
From two different sources, parts of the FBI's Unclassified / For Official Use Only (FOUO) Domestic Investigations and Operations Guide [DIOG] apparently revised September 5 2007, and from the other set of requests, Minnesota State Auditor Rebecca Otto's office checks in on the processes of outstate drug task forces engaged in asset forfeiture, drug buys, firearms stuff. When various audited processes turn out to be fails, some corrective actions are recommended. I'm also throwing in a motion for discovery on certain types of informants that could be promising - the next step down this line.
The topic of the FBI file is certain to make almost any careerist in the world of "that Law thing" squirm because it is a form of documentation showing the entire edifice is one MC Escher-style mobius strip of fake morality, crimes truly authorized on paper -- heavily censored paper, but this is indeed clearly one such paper without any doubt.
Other parts of a similar DIOG file, with the same front page, was published by the ACLU in 2011(included below), but I think we got some new pages here. It's usually hard to find the precise chunks or "twists of the mobius strip of officially sanctioned crime" but fortunately I think we all got at least a few entirely fresh pages via a lucky FOIA. (I'm not totally certain the FBI drop is truly partly-new, but I haven't found key matching pages elsewhere. Plz let me know if you do!)
Group readings of this file [with a toast for every LOL] should be a mandatory drinking game / CLE for every single bar association and law review, because they show that the entire conceit is one big clusterfail, and I would dare any lawyer to make a coherent argument to the contrary.
This new relatively short FBI FOIA, I'm suspecting right now, hit some new paydirt because there are certain subtypes of FBI informants that are described with certain keywords, which could include people violating confidences, including within the media, clergy, doctors, lawyers etc. It opens up a line of inquiry that one Utah attorney Jesse Trentadue, has apparently stumbled into in his long-rolling FOIA lawsuit spurred by the suspicious murder of his brother in a federal prison (see KennethTrentadue.com for more).
At least we get some look at the terrain of specially labeled, high level FBI informants, the Gerald Fords of the world if you will [aka the Warren Commission snitch]. I can't think of another source that quite nails the different categories of FBI informants like the motion posted below, filed in the lawsuit which already has produced this (not to mention hard proof the CIA have at least some formal records of something related to the Oklahoma City Bombing still censored from our reach).
On the Minnesota side, these drug task force audits are in fact publicly requestable records but not released on the interweb by default (part of the reason that very very few people are aware of the state auditor Otto's overall respectable role in the scheme of things).
Let's dive in - look for your favorite weird angle including FBI-controlled front businesses, "otherwise" illegal acts, and creating synthetic detours in authentic First Amendment Expression! Show to your favorite law-and-order acquaintances for some high-quality cognitive dissonance! :-D
Cited as relevant see page 17 as marked, 23 as paginated PDF - AG Use of FBI confidential human sources authorization - includes Media Snitches (violating media confidentiality). The new Trentadue motion demands quantities, not names!
Among the other small angles to consider here, the role of Executive Order 12333 from Ronald Reagan indeed turns out to be crucial in understanding the formal institutionalization of the FBI as a bureaucracy which can operate illegally, in the realm of intelligence. It was pointed out in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider that EO12333 was an important greenlight of sorts, as it led the way for "legalizing the illegal systems" of the "Iran-Contra" world particularly those involving drug and weapons trafficking through private shell companies (and EO12333 does talk a lot about front companies operated for intel functions).
Also I am adding part of a post from Bob McCarty about this case and this particular request, which shows a pretty good avenue into further inquiry. We could expect at least a few more interesting crumbs out of this line of research - certainly, stuff worth looking at. [A whole series of McCarty posts on Oklahoma City and the Trentadue inquiry I haven't even looked at!]
In his motion, Trentadue described the program as one used by the bureau “to recruit and/or place informants on the staffs of members of the United States Congress and perhaps even federal judges, in the national media, within other federal agencies as well as the White House, on defense teams in high-profile federal and/or state criminal prosecutions, inside state and local law enforcement agencies, and even among the clergy of organized religions.”
Trentadue’s interest in the program stems from questions that have surfaced during his ongoing investigation into the death of Kenneth Trentadue, his brother who died in 1995 under suspicious circumstances while in custody at the U.S. Bureau of Prisons Federal Transfer Center in Oklahoma City, months after theOklahoma City Bombing.
With his latest legal maneuver, Trentadue hopes to convince Judge Clark Waddoups to compel the FBI to provide all documentation outlining what he describes in the motion as an“unlawful and unconstitutional domestic spying program.”
The maneuver comes almost four weeks after the FBI answered a federal court complaint Trentadue filed under the Freedom of Information Act to obtain copies of the manual the FBI uses to recruit and place“sensitive informants.” Citing national security concerns as the basis for their response, FBI officials answered that complaint by saying they “can neither confirm nor deny the allegations [of the Complaint] regarding its confidential informant program.”
Shown below, Trentadue’s definition of a “sensitive informant” is, perhaps, the most interesting aspect of his motion:
“…the term ‘Sensitive Informant’ is defined as anyone acting, directly or indirectly and with or without any compensation, on behalf of the FBI as a member of, person associated with or otherwise a participant in or observer of the activity or activities of an entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization AND who does not disclose or reveal to such entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization his or her FBI affiliation.
“A Sensitive Informant is, in other words, some one who is acting, directly or indirectly, on behalf of the FBI as an undisclosed participant in or observer of the activity or activities of an entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization.
“The term ‘Sensitive Informant’ likewise includes what the FBI’s current terminology refers to as a ‘Confidential Human Source’ including any and all sub-categories of Confidential Human Sources such as, but not limited to, what the FBI refers to as a ‘Privileged Confidential Human Source,’ who is someone reporting confidential information to the FBI in violation of a privilege such as an attorney reporting his client’s confidential communications, a physician reporting upon his patient’s medical or mental condition, a cleric informing on a member of his or her church or other religious organization, etc.
In his motion, Trentadue requested the judge order FBI officials to answer 11 critical questions about the scope of their “Sensitive Informant Program” prior to a yet-to-be-scheduled hearing during which, according to Trentadue, FBI officials have said they will file a motion for summary judgment to prevent him access to the information he seeks.
Looking only for numbers of Sensitive Informants and not for specific names from the FBI, Trentadue’s questions target the time frame, “since January 1, 1995.” In short, he wants to know whether or not the agency has had Sensitive Informants inside a variety of government and non-governmental organizations.
Among the government organizations mentioned in his queries were the state and federal court systems, the U.S. House of Representatives and U.S. Senate, federal agencies other than the FBI, federal prosecutors’ offices, and law enforcement agencies at the municipal, county and state levels.
Curiously, he also asked whether the FBI has had a Sensitive Informant(s) who was a cleric or member of the clergy in any religious organization.
Though I doubt the FBI will answer Trentadue’s questions, I’m convinced the attorney will continue fighting until he learns the whole truth about his brother’s death and, perhaps, about the Oklahoma City Bombing, too.
Hopefully not a problem to copy the post as this is a relatively important issue. Anyway I will leave it there for the moment as the hour is late. Informants and protected illegal operations -- truly the can of worms is enormous. The FBI's informant systems across many elite sectors remains to be sniffed out further - and the curious goings-on of obscure rural Minnesota drug task forces also suggests more research is needed.
The other problems with informants, the political spam and the psychological wreckage they leave in their wake -- along with indeed the damage to their own psyches -- will hopefully get further attention, as we have a few other key facts bubbling up. Good luck to everyone on finding more info - regardless of political orientation it's really important to nail down as much of this stuff as possible, before you get spammed by yet another informant!!
VIA: Protect the SacredTimeline Photos: Here is a picture of Faith Spotted Eagle signing the International Treaty to Protect the Sacred. This is the first time a woman has signed such a treaty and she did so on behalf of the Brave Heart Society. Let the healing continue in the name of unprecedented unified action! — at Yankton Sioux: Lake Andes, South Dakota.
A strongly worded Treaty has been signed by representatives of some North American tribal nations and has now been taken far and wide to many reservations & villages across the continent. Some of our independent media colleagues were on hand and videos are expected soon. Here is a link to the raw live video from OccupyMusician: http://bit.ly/VeFvNo .
Anyway the text below of the includes formal opposition to projects in Minnesota. Another important development seems to be the circumvention of the proxy/quisling/Vichy/whatever-you-want-to-call-it tribal council structures - instead "treaty councils", a kind of alternate avenue more consonant with direct democracy, appears to be emerging as a tactic for formally dealing with/turning back internal corruption & hierarchy.
Additionally it now public that the Red Lake Ojibwe are asserting their rights against a pipeline in northern Minnesota. For related info see the Indigenous Environmental Network.
This is a major subject which has been almost totally blacked out in the media. There may be avenues of redress at the UN as this is an international-system-level statement.
My understanding, though I was not there, that there were very non-native few people on hand at the remote conference site in South Dakota which produced this document, although there were a few Earth First! and Tar Sands Blockade people as well as our media colleagues.
There is an #IdleNoMore march tomorrow, January 28th starting at Gold Medal Park which is related and also later a gathering in the Twin Cities for Indians in Minnesota to look at this treaty and consider joining.
While the NGO people have perhaps folded up and gone away (though it's hardly clear right now), the natives don't really have anywhere else to go, and have a different kind of sovereignty yet to be fully asserted in a manner more like what this new treaty expresses.
International Treaty to Protect the Sacred from Tar Sands Projects
The representatives from sovereign Indigenous Nations, tribes, and governments, participating in the Gathering to Protect the Sacred on January 23 – 25, 2013, on the 150 year anniversary of the Treaty Between the Pawnee and Yankton Sioux, have gathered on the Ihanktonwan homelands, and have resolved by our free, prior, and informed consent to enter into a treaty to be forever respected and protected. We agreed upon the following articles:
The undersigned Indigenous Peoples have inhabited and governed our respective territories according to our laws and traditions since time immemorial.
As sovereign nations, we have entered into bi-lateral and multi-lateral agreements with other nations including the Treaty Between the Pawnee and Yankton Sioux, Mother Earth Accord, the Spiritual Leaders Declaration, the Agreement to Unite to use 16 Guiding Principles, and the Black Hills Sioux Nation Treaty Council Declaration, and all the inter-tribal treaties in the Western hemisphere, among others, which promise peace, friendship, and mutual opposition to tar sands projects and energy development that threaten the lands, the waters, the air, our sacred sites, and our ways of life, and acknowledge other Indigenous Peoples such as the Yinka Dene, the People of the Earth’ who have exercised their lawful authority to ban tar sands projects from their territories through Indigenous legal instruments such as the Save the Fraser Declaration and the Coastal First Nations Declaration.
We act with inherent, lawful, and sovereign authority over our lands, waters, and air, as recognized by Article 32 of the United Nations Declaration on the Rights of Indigenous Peoples which provides:
States shall consult and cooperate in good faith with the indigenous peoples concerned through their own representative institutions in order to obtain their free and informed consent prior to the approval of any project affecting their lands or territories and other resources, particularly in connection with the development, utilization or exploitation of mineral, water or other resources.
We mutually agree that tar sands projects present unacceptable risks to the soil, the waters, the air, sacred sites, and our ways of life including:
- The destruction of rivers, lakes, boreal forests, homelands and health of the Cree, Dene, and Métis peoples in the Northern Alberta tar sands region and downstream Dene communities of Northwest Territories
- The threat of pipeline and tanker oil spills into major river systems, aquifers and water bodies such as the Salish Sea, the North Pacific coast, and the Ogallala Aquifer.
- The negative cumulative health and ecological impacts of tar sands projects on Indigenous Communities.
- The irreparable harm to irreplaceable cultural resources, burial grounds, sacred and historic places, natural resources, and environmental resources of the central plains region which is the aboriginal homelands of many Indigenous Nations.
- Greenhouse gas pollution that could lock the planet onto a path of catastrophic climate change.
We affirm that our laws define our solemn duty and responsibility to our ancestors, to ourselves, and to future generations, to protect the lands and waters of our homelands and we agree to mutually and collectively oppose tar sands projects which would impact our territories, including but not limited to the TransCanada Keystone XL pipeline, the Enbridge Northern Gateway, Enbridge lines nine (9) and sixty-seven (67), or the Kinder Morgan Trans Mountain pipeline and tanker projects.
We agree to mutually and collectively, as sovereign nations, call upon the Canadian and United States governments to respect our decision to reject tar sands projects that impact our sacred sites and homelands; to call upon the Canadian and United States governments to immediately halt and deny approval for pending tar sands projects because they threaten the soil, water, air, sacred sites, and our ways of life; and, confirm that any such approval would violate our ancestral laws, rights and responsibilities.
We agree to the mutual, collective, and lawful enforcement of our responsibilities to protect our lands, waters, and air by all means necessary, and if called on to do so, we will exercise our peace and friendship by lawfully defending one another’s lands, waters, air, and sacred sites from the threat of tar sands projects, provided that each signatory Indigenous Nation reserves and does not cede their rights to act independently as the tribal governments see fit to protect their respective tribal interests, further provided that each signatory Indigenous Nation reserves its inherent sovereign right to take whatever governmental action and strategy that its governing body sees fit to best protect and advance tribal interests affected by the pipeline project consistent with the agreements made herein and subject to the laws and available resources of each respective nation.
This Treaty of mutual defense and support is made on the occasion of the 150 year anniversary of the Treaty Between the Pawnee and Yankton Sioux concluded between the Pawnee Nation and the Ihanktonwan Oyate/Yankton Sioux Tribe on January 23rd, 1863, and the parties thereto hereby commemorate the signing of that historic treaty that has endured without violation for 150 years.
This Treaty goes into effect once ratified by the governing bodies of the signatory nations.
IN WITNESS WHEREOF, the undersigned dually authorized representatives, after having deposited their full powers found to be in due and proper form, sign this treaty on behalf of their respective governments, on the date appearing opposite their signatures.
PLEDGE OF SUPPORT to the INTERNATIONAL TREATY TO PROTECT THE SACRED FROM TAR SANDS PROJECTS
We the undersigned citizens, levels of government, businesses, unions and non-governmental organizations hereby recognize and commit ourselves to upholding the January 2013 International Treaty to Protect the Sacred from Tar Sands Projects: