The Establishment

Trans Pacific Partnership discussion & community QA with Keith Ellison, IATP & MN Fair Trade Coalition. Malaysia Round starts July 15

I was glad to help publish live video from a panel and community discussion about the controversial and incredibly dangerous Trans Pacific Partnership secret treaty now being developed by corporate weasels and a trade representative unit of the White House, with almost all of Congress barred from reviewing the document.

tpp_0.jpg

US Rep. Keith Ellison (DFL-MN5) spoke out against the TPP as a secret process saying it should be occurring in public. Josh Wise from MN Fair Trade Coalition did a great job emceeing the panel and covering a lot of detailed ground including the intellectual property leaked provisions of the draft treaty of doom. (FB MN Fair Trade)

One of them, Jim Harkness, was from the Institute for Agriculture and Trade Policy, which has achieved a lot of laudable changes in trade for small communities around the world, and non-gazillionaires in general. Unedited Video URL: http://www.youtube.com/watch?v=__Nmry3Hm_0

Full video unedited. Sorry about the bad sound sync. This video is licensed: CREATIVE COMMONS WITH ATTRIBUTION. Please Remix!! :)

Also I was able to get in the last question on the QA, proposing Rep. Ellison should post a bill to US Congress that would make it illegal for the trade representative to hold any secret documents longer than one month, which would neatly solve the authoritarian secret treaty problem, and enable all Americans to participate in US diplomatic policy processes on a far more equal basis than the current situation :)TPP_WhySoSecret.jpg

Mon., July 1, 6:00 pm - 7:30 pm

Minneapolis Regional Labor Federation

312 Central Avenue

2nd Floor

Minneapolis, Minnesota

FB: Keith Ellison explains the TPP: The largest corporate power grab you've never heard of!

LINX:U.S. Senator calls for more transparency around the Trans-Pacific Partnership | OpenMedia.ca

Home | Our Fair Deal

Senator Warren Presses White House to Release Pacific Trade Text - Businessweek

Time for transparency - why don’t Canadian representatives have same access to crucial TPP drafts as their U.S. counterparts? | OpenMedia.ca

Canada’s two-tier approach to trade talks: Geist | Toronto Star

Digital Rights Groups Shut Out of Secret TPP Negotiations | Electronic Frontier Foundation

Trans Pacific Partnership Agreement | Electronic Frontier Foundation

Take Action - petition

Reassess Trans-Pacific Partnership Agreement - Columnist - New Straits Times

The BRAD BLOG : Rep. Grayson Warns About Details of Classified 'Trans-Pacific Partnership' Agreement

Trans-Pacific Partnership (TPP): 18th Round of TPP Negotiations Set for Kota Kinabalu, Malaysia -- July 15-24, 2013 | Office of the United States Trade Representative - OFFICIAL SITE

Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

LEAKED DOCS FROM LAST JUNE: U.S. trade proposal would let corporations overrule laws | The Raw Story

Alan Grayson On Trans-Pacific Partnership: Obama Secrecy Hides 'Assault On Democratic Government' - way to go Alan! Glad he's throwing some punches on this crap.

Obama-Backed Trans-Pacific Partnership Expands Corporate Lawsuits Against Nations for Lost Profits | Democracy Now! - JUNE 6 2013

The Obama administration is facing increasing scrutiny for the extreme secrecy surrounding negotiations around a sweeping new trade deal that could rewrite the nation’s laws on everything from healthcare and Internet freedom to food safety and the financial markets. The latest negotiations over the Trans-Pacific Partnership (TPP) were recently held behind closed doors in Lima, Peru, but the Obama administration has rejected calls to release the current text. Even members of Congress have complained about being shut out of the negotiation process. Last year, a leaked chapter from the draft agreement outlined how the TPP would allow foreign corporations operating in the United States to appeal key regulations to an international tribunal. The body would have the power to override U.S. law and issue penalties for failure to comply with its rulings.

We discuss the TPP with two guests: Celeste Drake, a trade policy specialist with the AFL-CIO, and Jim Shultz, executive director of the Democracy Center, which has just released a new report on how corporations use trade rules to seize resources and undermine democracy. "What is the biggest threat to the ability of corporations to go into a country and suck out the natural resources without any regard for the environment or labor standards? The threat is democracy," Shultz says. "The threat is that citizens will be annoying and get in the way and demand that their governments take action. So what corporations need is to become more powerful than sovereign states. And the way they become more powerful is by tangling sovereign states in a web of these trade agreements."

The Trans-Pacific Partnership Agreement & copyright. "Many of the same special interests that pushed for legislation like SOPA and PIPA have special access to this forum—including privileged access to the text as well as US negotiators."


newTPP map cropped.jpg

Lots more info:: Trans-Pacific Partnership

Anyway leave it there for now. BIG DEAL, PEOPLE!! This is from the "secret government" if anything is, and will supersede whole swaths of the Constitution and assorted natural rights of people around much of the world Shock doctrine par excellence.

BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

#ForwardOnClimate: Battle within Sierra Club calling for fracking ban after 2012 $26,000,000 "House of Cards" gas donation debacle; Tea Party big oil astroturfing

The real question is: Can hydraulic fracturing ever be safe for our environment and public health?
Sierra Club’s Oil and Gas Policy: We have reviewed the Club’s Oil and Gas Policy, as revised February 2012, and are pleased that it clearly states the reasons the Club doesn’t support hydraulic fracturing because of many of the points addressed in this letter.
We do want to recognize that the policy also supports:
-Chapter advocacy for regional or state-wide moratoria
-Bans in specific local environmentally sensitive areas such as federal roadless areas, state parks and forests, designated wildlife areas, and municipal watersheds
-Local groups that call for a ban in their own communities
Given the investigative reporting that continues to provide concrete evidence of accounts of water contamination, people becoming seriously ill who live close to well sites that have been fracked, animals dying after exposure to hydraulic fracturing fluids, and the unknown health issues that will surface in the coming years, we are asking the Club to take a leadership role in calling for a nationwide ban on mining that uses hydraulic fracturing. If we take a leap of faith and call for a nationwide hydraulic fracturing ban, we will move closer to the goal of a clean and healthy energy future, but our planet requires that we act today. If we don’t, we will drag this issue out for an indefinite period of time, further endangering our environment and public health, and accelerating the climate crisis. We don’t have time to wait.
Sierra Club Poudre Canyon Group - January 31 2013

////// UPDATE TUES 2/19 AFTERNOON: See fractivist for material being drafted about this. 860 signers on petition: http://www.change.org/petitions/ask-sierra-club-to-lead-a-nationwide-ban... - also snippets: https://twitter.com/fractivist/status/303892739756531714/photo/1 https://twitter.com/fractivist/status/303899469118836737/photo/1 //////

////// UPDATE TUES 2/19 EARLY AM: I heard secondhand that the Sierra Club had been the principal roadblock to organizing direct actions on Sunday at the climate change mass gathering in Washington DC. On the Colorado side, stay tuned as wheels are definitely turning among locals. //////

Gauntlet: thrown. Demand: autonomy! It's always a little frustrating to see the world of big nongovernmental organizations getting squirrelly - and now the Chips are Down in Ft. Collins, Colorado as a local unit of the Sierra Club, supported by OccupyDenver, has called upon the national organization for an end to fracking -- in accordance with their members who are among other things terrified of getting poisoned by hundreds of chemical-injecting wells all over the state.sierraclub-throwdown-fracktivist.png

Plus "House of Cards" fans may recognize a certain continuity with NGO & fracking ties in this plotline, with Chesapeake Energy as the real-world SanCorp...

This is a rough quick post but it's a big enough deal to batch together material & wing it. This actually seems to be a serious showdown finally taking place within the Sierra Club over fracking, forced in Colorado.

If the national organization cracks down on Fort Collins Poudre Canyon Group, will possibly thousands of members break away from the organization? Plus, does this #forwardOnClimate Obama-oriented campaign really maneuver anyone into a position of political autonomy?

For the rather candid Obama view on natural gas see: 'Forward' on Fracking? Obama Scientist Makes Industry-Friendly Push for Gas Drilling Bonanza | Common Dreams

Signing the statement pressuring the national Sierra Club, posted in full below: the Poudre Canyon Group at Fort Collins, Colorado including: Shane Davis, Chair; Caroline Krumm, Vice Chair; John Gascoyne; Kerry Miller; Tyler Wilson

*******

As the more critical #forwardonclimate observers of the evening on twitter Sole & @anarchoAnon observed dynamics in the Colorado arena:

& much research credit due to these 2 accts spurring notice to this whole subject this evening. For some industrial strength doxing of fossil fuel executives & structures see: Anarcho Anon • d0x on Valero Energy Board of Directors #NoKXL & moar on the Tumblr.

Before getting to the Poudre Canyon Sierra Club material I also have to touch on some of the other issues - the "FORWARD" schema and assorted billionaires playing big games. Nothing blockbuster here but good to have in mind evaluating this whole murky scene.

*******

Environmental-activists-o-008.jpegFORWARD: Here, by the way is where the "Forward" in #forwardonclimate really comes from, as far as I can tell: the "Obama Climate and Clean Energy Legacy Campaign". I always like to trace these hashtags nowadays. [PHOTO SRC: Jonathan Ernst/Reuters - see Canada's environmental activists seen as 'threat to national security' | Environment | guardian.co.uk - not even getting into police madness vs oil protesters here].

In a loose network marked with a lot of zesty actions nationwide, would have more direct actions occurred from NGO members & oil opponents in the Washington "action" on Sunday if they were not operating inside this frame? They could have at least toured a panoply of K Street offices making zillions in this business. {this URL which is the first hit: action.sierraclub.org/site/PageNavigator/100Days.html redirects to : Stand with the Planet - not a horrible webdesign}

Anyway this is a pretty precise description of it: It's Not Dark Yet, But… [Michael Brune - January 14 2013]

[.....]Here's the challenge. In his first term, President Obama did more than any other president to reduce greenhouse gas emissions and scale up clean energy. But his administration is far from realizing its potential for strong action. In fact, the president has considerable authority that he has not yet fully used to help our country build a clean energy economy.

That's why today the Sierra Club is launching the Obama Climate and Clean Energy Legacy Campaign -- a joint effort across our campaigns to demand that the president tackle climate disruption with all the authority, determination, and ambition he can muster. Between now and Earth Day, we'll focus on 100 Days of Action to set the tone for this term's critical first year. We and our allies will host events across the country calling on the president to lead in this fight. The biggest of these, in Washington, D.C., on February 17, is shaping up to be the largest climate rally in American history.

You've been a part of the Sierra Club's biggest successes.Find out more about how we're going to succeed.

At this point, there's no longer any questionwhatPresident Obama should do. He should do everything he can. It is fair to ask, though, exactly what we think that is.

It's a lot. Here are five ways the president can lay the foundation today for a lasting legacy of climate action and clean energy:

  1. Hold fossil fuel polluters accountable for their pollution.
  2. Reject proposals to import dirty fuels like tar sands and stop the rush of fossil fuel exports, including liquefied natural gas export facilities and new coal export terminals.
  3. Double down on clean energy, with innovative financing and investment avenues for energy efficiency and renewable energy.
  4. Protect communities from future climate disasters and plan a robust and just response for those that do happen.
  5. Protect our lands, water, and wildlife from the impacts of fossil fuel development and climate disruption.

In the first months of his second term, President Obama will make many decisions that affect the climate future of this nation and the rest of the planet. We cannot afford to let him make the wrong ones. Join us in demanding that hetake a stand and make tackling climate disruption a top priority of his second term.

The other posts revolve on those five bullet points so there you have it. "Innovative financing and investment avenues", can I have some moar? Also definitely doesn't include shutting down fracking. Hence the calculation nationally to jettison this five-point thing and get real w frack chemicals poisoning their members or not.

********

The Rather Big Natural Gas Sierra Club Scandal Thing: I'd almost totally forgotten the huge Sierra Club gas scandal in Feb 2012. The original story (obviously independent media shook this loose but Sierra made sure TIME dropped it): Corporate Crime Reporter: chesapeake02022012 // After Disclosure of Sierra Club’s Gifts From Gas Driller, a Roiling Debate - NYTimes.com // Sierra Club faces gas-cash fallout - Bob King - POLITICO.com // Alliance between natural gas industry, environmental groups fractures - Washington Post

The Mea Culpa-ish blog post: The Sierra Club and Natural Gas - Coming Clean

It's time to stop thinking of natural gas as a "kinder, gentler" energy source. What's more, we do not have an effective regulatory system in this country to address the risks that gas drilling poses on our health and communities. The scope of the problems from under-regulated drilling, as well as a clearer understanding of the total carbon pollution that results from both drilling and burning gas, have made it plain that, as we phase out coal, we need to leapfrog over gas whenever possible in favor of truly clean energy. Instead of rushing to see how quickly we can extract natural gas, we should be focusing on how to be sure we are using less -- and safeguarding our health and environment in the meantime.

The Sierra Club opposes any natural gas development that poses unacceptable toxic risks to our land, water, and air. We insist that the volume and content of all fracking fluids and flowback should be disclosed, and that all toxics should be eliminated. There should be proper treatment, management, and disposal of both fracking fluids and toxic flowback. Fracking should not be permitted unless it can be demonstrated that drinking water is protected and that all cumulative impacts can be mitigated. And, of course, many beautiful areas and important watersheds across this country should be off-limits to drilling.

Exempting the natural gas industry from environmental protections was a terrible idea. It looks even dumber today, when the real risks that natural gas drilling poses to water supplies and critical watersheds are that much more apparent.

Ultimately, the only safe, smart, and responsible way to address our nation's energy needs is to look beyond coal, oil, and gas, and focus on clean, efficient energy sources such as wind, solar, and geothermal. It's clear to countries around the world that the most successful 21st-century economies will be based on using energy that is safe, secure, and sustainable. Let's get to work building that economy right here at home.

Well that is a decidedly capitalist way to look at the "green" world and probably the first critique is that capitalist thinking is not really going to wrap up this critical degradation of the biosphere.

Their page is entitled Beyond Natural Gas but it doesn't say "Beyond" in the menu tree in his blog version lol. [ good catch :D ]

goal-naturalgasmenufail-c.pngA Healthy Fear of Lawyers: The Sierra Club is also a party to various lawsuits - typical example: Sierra Club, Earthworks seek to back Longmont in oil/gas lawsuit - Boulder Daily Camera, which could help in that particular town.

The recent ugly fate of the original Texas Tar Sands Blockade via SLAPP intervention in court [with the inability of Rising Tide NGO to deflect Corporate Oil LawyerSpam correctly] it's probably important to look carefully at how 'coalition lawsuit stuff' really works.

As with the Southern Poverty Law Center and others, the lawsuit-joining strategy is a major PR chip in the system, and buttresses the authenticity of the system itself. The terrain of legal fights may cede ground that shouldn't be - or often, some of the lawyers can pressure for settlements which drag in more resistant clients because no one wants to see a fragmented front. [I don't know if I've described this well - just experience a backfired ACLU case to appreciate this problem]

******

On the flip side we have AFP and the finest degree of Tea Party astroturfing. We also have to factor in the hardened ranks of brainwashed conservatives, and the oil-and-gas hot air world is decidedly Core. Colorado Ground Zero for Green Lobby’s War on Fracking | The Colorado Observer

“Some of this is NIMBY-ism, but a lot of this is national,” said Sean Paige, co-state director of Americans for Prosperity, which supports fracking. “Who’s really pulling the strings here? Those fanatics chasing that poor woman down the street–were those really local people? There’s no question that the tone and the sensational science are trickling down from national groups.”

Well locals are Nimbys and nationals are crazy so you can't oppose this awesome plan, well played AFP staffer. Americans for Prosperity is a direct Koch brothers front & it's great to have the tip of the hand here s to AFP's agenda. This just got nicely traced anew, see: Tea Party born from Koch Industries front group and Tobacco Money | PolluterWatch and the full study: ‘To quarterback behind the scenes, third-party efforts’: the tobacco industry and the Tea Party -- Fallin et al. -- Tobacco Control

See also recently from Greg Palast: Murkier Than Oil | VICE.

Rather spin-laden segment on ABCNews: An American Oil Find That Holds More Oil Than All of OPEC - ABC News

The industry oil shale association says: NOSA - Oil shale resource in the United States is enormous

In 2011-12 the United States Geological Survey (USGS) increased its estimate of the amount of shale oil contained in Colorado, Utah and Wyoming to over4-trillion barrels. Not all of the resource is recoverable. Informed sources, such as the U.S. Department of Energy, believe 500 to 800-billion barrels is a reasonable estimate. Commercial production of oil would not occur over night, but would evolve in a methodical manner over years to achieve production levels in the range of 1.5 – 2.0 million barrels per day (30 to 40% of 2012 oil imports from OPEC countries and 100% of the oil imported into the U.S. from OPEC Persian Gulf countries).

Jeremy Boak, PhD of the Colorado School of Mines is a co-author of the attached chart (based upon 2012 USGS data). He concludes the oil shale resource in Wyoming and Colorado dwarf’s conventional U.S. crude oil reserves (the solid orange line at the bottom of the chart), even before Utah is added to the mix.

The U.S. Bureau of Land Management (BLM) controls over 70% of the western oil shale resource. Access to this resource is being sought by firms interested in developing an oil shale industry.

Buffett vs Keystone XL The Billionaire Political Philanthropy angle: Another possible issue is that the effort to block the Keystone XL Pipeline will work to the benefit of billionaires -- those who also finance "social enterprises" and large activist concerns through foundations may find benefits from influencing political resistance to rival projects. Also it's not hard to find links between billionaires, NGO lobbyists and horrible ripoff schemes like "cap and trade" carbon market lobbying, the COP REDD+ plans to capitalize remaining rainforests etc. Arguably, Colorado shale probably benefits where the Keystone XL loses, though someone oldschool would really have to break this down.

While I lack solid economic data on this, liberal darling Warren Buffett's railroad, Burlington Northern Santa Fe (BNSF) is moving lots of oil around from the US Bakken formation as well as carrying a good portion of the Canadian Alberta tar sands bitumen -- the railroad lines in Minnesota are just saturated these days with oil tank cars.

It is hard to tell if Buffett & BNSF win or lose from KXL political problems: May 2012 AP: Keystone XL: Warren Buffett Supports TransCanada's Pipeline. Jan 2012: Buffett’s Burlington Northern Among Pipeline Winners - Bloomberg. Flipside: Buffett would profit from Keystone cancellation - Washington Times. Jan 2012: Obama's Keystone XL Ban Makes Warren Buffett Richer - Investors.com. Either way, big money is up in the air & KXL's failure definitely would mean more development in Colorado.

Therefore any substantive effort needs to encompass not just KXL but the entire oil dependency system & all its players, and tracing big foundations & their oft-undisclosed major donors is necessary to determining if social movements are being used as cats-paws for big money.

[Side note: I don't see obvious links on him & the environmental realm, but Buffett's son Peter set up the Novo Foundation which is the big underwriter for V-Day NGO which did the #onebillionrising thing with a big ballroom event in NYC last week. See the latter pages of the annual report.]

Huffpo discusses the business angles re railroads: Warren Buffett On The Environment, Businesses Can't Take 'Shortcuts' // www.jm.com/sustainability/2011JMSustainabilityReport.pdf // More Buffett stuff: Pop History Dig » Warren Buffett and the environment

Another figure in this mix is Peter Ackerman who has been involved with Freedom House and bankrolling the International Center on Non-Violent Conflict. See Peter Ackerman: billionaire sponsor of toxic NGO’s « Louis Proyect: The Unrepentant Marxist. Arguably a classic guy in the Color Revolution complex [i.e. OTPOR, Gene Sharp stuff]: see - COLOR REVOLUTIONS AND GEOPOLITICS: Regime Change Inc.: Peter Ackerman's Quest to Topple Tyranny (2005) - links to NarcoNews and those revolutionary video games no one's ever played!

Plus, who is this guy, Thomas Steyer: Billionaire has unique role in official Washington: Climate change radical - Washington Post. And T. Boone Pickens was involved in funding other people too (remember his plan that involved getting control of massive amounts of water?)

They are coming out of the woodwork and I strongly recommend charting their roles via littlesis.org!

Finally, The Sierra Club Situation: The Sierra Club recently took the daring step of approving civil disobedience which has never been their style, after the Feb 2012 revelation that the org slammed coal while secretly taking millions from the natural gas industry in 2007-2010.

OccupyDenver posted this but I only just noticed. Occupy Denver Stands with Anti-Fracking Dissenters in Sierra Club | Occupy Denver | In Solidarity with Occupy Wall Street

In Fort Collins, CO the Poudre Canyon chapter of the Sierra Club, with support of other chapters and members across the nation, has officially asked Michael Brune, the national director of Sierra Club, to call for a nationwide ban on hydraulic fracturing. Hydraulic fracturing, or “fracking” is an oil & gas extraction technique that is toxic and potentially lethal to all life within miles of the extraction well pad.

While Occupy Denver and the Sierra Club operate on radically different organizing principles, it is crucial to America’s future that mainstream environmental organizations like Sierra Club take strong stances against toxic oil and gas extraction methods such as hydraulic fracturing. We support any effort to hold environmental NGOs to their commitments to ecological protection, and also recognize that due to political inertia, pressure will need to be applied to these groups, both from within and from without.

It is known that the leadership of the Sierra Club is wary to call for a fracking ban, and may formally reprimand those calling for this ban, expel them from Sierra Club, or pursue litigation against them. Occupy Denver stands in solidarity with the call issued by the Poudre Canyon Sierra Club in Fort Collins, and calls on the national Sierra Club to do the right thing, enact their mission statement, and call for a nationwide ban on hydraulic fracturing. Anything short of a complete rejection of fracking would demonstrate that Sierra Club is an environmentalist group only on paper, willing to trade away their ecological principles for political convenience.

Ways you can help!
Sign this petition asking Sierra Club Director Michael Brune to lead a nationwide ban on hydraulic fracturing:

Share this letter – Poudre Canyon Group (Fort Collins) letter to Sierra Club Executive Director Michael Brune (In addition to being a good call to arms, this letter is a comprehensive collection of diverse research data proving the many dangers of fracking):

Call Sierra Club Executive Director Michael Brune at his office, (415) 977-5500 and ask him to call for a nationwide ban on hydraulic fracturing.

Fax Sierra Club Executive Director Michael Brune at his office, (415) 977-5797 with the message:
“If your child’s life was in danger, would you pause to ask a politician if it is OK to save their life? What would John Muir do? It is time for Sierra Club to call for a nationwide ban on hydraulic fracturing.” Or another message of your choosing.

Occupy Denver calls on all Occupy networks to circulate this petition & letter from the Poudre Canyon Sierra Club group, and to participate in the call-in & fax-in actions listed above.

Solidarity to everyone everywhere fighting the toxic extraction industry

Here's that full letter - let's get Fracktivist on this NGO situation! FRACTIVIST - Assist, Reform and Protect!: Letter and Petition to Sierra Club's Michael Brune to Lead a Nationwide Ban on Fracking. This whole thing is absurdly informative and leaves very little wiggle room for the big national NGO types to blow off their concerns. I am posting the whole damn thing here because it's definitely important!

Letter and Petition to Sierra Club's Michael Brune to Lead a Nationwide Ban on Fracking

SIGN PETITION TO ASK SIERRA CLUB TO LEAD A BAN ON FRACKING (LINK)

January 31, 2013
Mr. Michael Brune
Executive Director
Sierra Club
85 Second Street, 2nd Floor
San Francisco, CA 94105
Dear Michael:
The reason for our letter is to express our concerns about the hydraulic fracturing crisis in our country and in Colorado where we live, and the Club’s Oil and Gas Policy, as revised February 2012.
As you know, the impacts from hydraulic fracturing are both an environmental and a public health issue that crosses political lines, especially in communities that are being impacted from hydraulic fracturing operations. People from around the country are coming together to ask why their local, state, and federal governments are not helping to protect their communities from water contamination, air and noise pollution, public health issues, wildlife ecosystem destruction, and more.
The most powerless feeling for families is that they are unable to protect their health and that of their children from what’s happening in their own backyards when the oil and gas industry conducts hydraulic fracturing operations. This violates two key civil rights issues – the rights to safety and the rights to protection under the Civil Rights Act.
In addition, families cannot even protect the homes they live in if an energy company wants to exercise its mineral rights by drilling under a families’ property due to the Split Estate Law in Colorado. This law also impacts families’ ability to protect the surface rights that they own with their homes. The question is: Who is protecting the property rights of innocent families?
We believe that the environmental and public health impacts from hydraulic fracturing are a crisis of historic proportions in our country, a crisis that undermines our environmental laws, and the entire philosophy upon which the Sierra Club was founded.
As a result, we are asking the Club to take a leadership role in calling for a nationwide ban on mining that uses hydraulic fracturing.
Hydraulic fracturing is destroying our land, our air, our water, wildlife ecosystems, and public health. Additionally, it has a significant negative impact on the climate crisis. The following sample data and arguments supports our assertions:
Impacts on Water
We would like to discuss how hydraulic fracturing impacts our water quantity and quality:
In the National Wildlife Federation’s report from 2011 entitled: “No More Hydraulic Fracturing in the Dark: Exposing the Hazards of Natural Gas Production and Protecting America’s Drinking Water and Wildlife Habitat,” the following was reported under “Impacts on Water Quality and Supply:” (http://www.nwf.org/What-We-Do/Energy-and-Climate/Drilling-and-Mining/Natural-Gas-Hydraulic fracturing.aspx)
“Each time that a well is hydraulically fractured, hundreds of thousands of gallons of water are required. As this procedure may be carried out many times, each well may therefore require several million gallons of water for hydraulic fracturing operations. This water normally must be withdrawn from nearby wells, lakes, rivers, or industrial or municipal water systems. Large-scale water withdrawals may result in reducing the flow of streams below levels acceptable for fish (such as brook trout) and other wildlife.”
Currently, hydraulic fracturing occurs in 34 states. Can we really afford for the oil and gas industry to have access to so much freshwater that should instead be protected for drinking water, ecosystem health, and growing our food? In the arid Intermountain West, many oil and gas companies are outbidding farmers for water. With the devastating drought that Colorado experienced last summer, and with predictions for continued drought due to the climate crisis, we really need to ask ourselves what the most beneficial use of our water really should be. We must also make it a priority to protect the health of our aquifers.
In Colorado, Initiatives 3 and 45 will be reintroduced in 2013, and were:
“Born out of the need to protect and provide for better access to Colorado’s water and preserve this precious resource now and into the future. The initiatives codifies the Public Trust Doctrine in Colorado’s Constitution and reaffirms the public’s ownership of Colorado’s water and the state as steward of the peoples’ property and is charged with its protection and enforcement of the public’s interest.” (http://protectcoloradowater.org)
Water Contamination

We are also very concerned about reports of water contamination from hydraulic fracturing operations. The following information was also reported in the National Wildlife Federation’s report referenced above, but there have also been many other documented reports of groundwater contamination from around the country:
“The process of releasing natural gas from layers of rock through hydraulic fracturing is believed to potentially lead to the migration of gases into other geological layers, including aquifers.”
“Groundwater near drilling wells has in fact been contaminated with methane, the main component of natural gas. This can pose a fire and explosion hazard; the health risks of drinking methane-contaminated water remain unknown. While some cases of methane in water may be due to other causes, a peer-reviewed study by researchers from Duke University found that water from wells closer to active natural gas drilling sites had higher concentrations of methane. The researchers sampled water from wells and found that “Methane concentrations were 17-times higher on average…in shallow wells from active drilling and extraction areas than in wells from nonactive areas.”
According to StateImpact, (http://stateimpact.npr.org), a project of National Public Radio, state environmental regulators in Pennsylvania blame methane migration for contaminated water wells in Dimock, Susquehanna County. They also found that:
Migrating gas is also the prime suspect for two problems that sprang up in May and June 2012: in Tioga County, a 30-foot geyser appeared along a road in Union Township, Tioga County. Private water wells also began overflowing, and gas puddles were discovered in a nearby creek. Similar problems surfaced 13 miles away in Leroy Township, Bradford County, where flammable puddles were discovered near a well drilled by Chesapeake Energy.”
Clean Water Action and the Poudre Canyon Group of the Sierra Club, based in Fort Collins, Colorado discovered the following data on water contamination for neighboring Weld County, Colorado: (http://www.cleanwateraction.org/files/publications/co/SC-CWA-to-COGA-2-27-2012.pdf)
From August 2003 - January 2012, 1,000 “Incident Spill Reports” for oil and gas drilling and hydraulic fracturing were reported to the Colorado Oil and Gas Conservation Commission (COGCC). Please note: the COGCC website only lists the 1,000 of the most recent reports. These publicly searchable reports, (http://cogcc.state.co.us/), reveal the following:
·       43% of spills have contaminated groundwater
·       3.1% of spills have contaminated surface water
·       43% of spills have resulted in, or been caused by, berm failures
A sampling of 60 of the 1,000 “Incident Spill Reports” reflects the following estimate of fluid contamination:
·       Up to 824,600 gallons of oil have been spilled and “unrecovered” in Weld County
·       Up to 383,600 gallons of produced water have been spilled and “unrecovered” in Weld County
·       Up to 547,400 gallons of “Other” fluid have been spilled and “unrecovered” in Weld County. (“Other” may include hydraulic fracturing fluids.)
These alarming results are for Weld County alone and do not reflect spills and groundwater contamination in the 41 other Colorado counties in which oil and gas drilling and hydraulic fracturing occurs.  In addition, surface spills under 210 US gallons do not have to be reported to the COGCC, unless they affect “waters of the state.” Aren’t they all waters of the state, considering it’s all a part of the hydrological cycle and in need of our protection?
Produced Water
What happens to flowback and produced water (toxic liquid waste water) from hydraulic fracturing operations is shocking.
In Colorado, produced water that contains hydraulic fracturing fluids may be permitted for discharge into streams and surfaces, and can be sprayed on dirt roads to reduce dust. According to the EPA, “pollutants are discharged into surface waters such as rivers, lakes or streams where they can directly impact aquatic life and drinking water sources.” This is the result of some water treatment plants not having the ability to treat this type of wastewater. This data is referenced below:
According to Colorado Oil and Gas Conservation Commission’s (COGCC) website,
“About 60% of the produced water in Colorado goes into deep and closely-regulated waste injection wells, 20% evaporates from lined pits and 20% is discharged as usable surface water under permits from the Colorado Water Quality Control Commission.”

“Evaporation is a common disposal method in the Piceance Basin, while surface discharges are common in the Raton Basin, where coal bed methane is produced, water production is significant, and the water meets or can be treated to meet surface discharge standards.”

“Produced water can also be sprayed on dirt roads to reduce dust, if authorized by the surface owner outside sensitive areas. It should not result in pooling or runoff and is supposed to meet allowable concentrations in Table 910-1. (COGCC Rule 907.c.2.D)”

According to the EPA, “Shale Gas Extraction – Industrial Effluent Guidelines – Fact Sheet dated October 2011:”

“Based on data provided by industry, it is evident that a portion of the injected fracturing fluid will return to the surface as “flowback,” sometimes called “produced water.” Up to one million gallons of shale gas wastewater may be produced from a single well within the first 30 days following fracturing.”

“These produced waters generally contain elevated salt content (often expressed as total dissolved solids, or TDS), many times higher than that contained in sea water, conventional pollutants, organics, metals, and NORM (naturally occurring radioactive material). Additional data show that flowback waters contain concentrations of some of the fracturing fluid additives.”


“While some of the shale gas wastewater is re
used or reinjected, a significant amount still requires disposal. Some shale gas wastewater is transported to public and private treatment plants, many of which are not properly equipped to treat this type of wastewater. As a result, pollutants are discharged into surface waters such as rivers, lakes or streams where they can directly impact aquatic life and drinking water sources…. EPA plans to propose new standards for public comment in 2014.”
Radioactive Tracers
Man-made radioactive tracers, along with the other substances found in hydraulic-fracturing fluid,combined with naturally occurring radioactive materials (NORM) from shale deposits, return to the surface as produced water. When NORM is concentrated or exposed by human activities, such as hydraulic fracturing, it is classified as TENORM (technologically enhanced naturally occurring radioactive material).

According to the EPA’s website, (http://www.epa.gov/rpdweb00/tenorm/about.html):


“Many of the materials that are technically TENORM have only trace amounts of radiation and are part of our everyday landscape. However, some TENORM has very high concentration of radionuclides that can result in elevated exposures to radiation.”

“EPA is working to understand the problem and to develop effective ways to protect humans and the environment from harmful exposure to the radiation in these materials. Because TENORM is produced by many industries in varying amounts and occurs in a wide variety of products, it is a particularly challenging problem in the U.S. Although EPA and others working on the problem already have learned a good deal about TENORM, we still do not understand fully all of the potential radiation exposure risks it presents to humans and the environment.”

Class II Injection Wells
According to the EPA’s website, (http://water.epa.gov/type/groundwater/uic/class2/), there are approximately 144,000 Class II injection wells in the United States that inject over 2 billion gallons of brine every day. Colorado currently has 698 Class II liquid industrial waste injection sites.
When oil and gas are extracted, large amounts of brine are typically brought to the surface. Often saltier than seawater, this brine can also contain toxic metals and radioactive substances. It can be very damaging to the environment and public health if it is discharged to surface water or the land surface. By injecting the brine deep underground, Class II wells prevent surface contamination of soil and water.”
According to an investigative report published December 28, 2012 in the Fort Collins Coloradoan, the following was reported:
Over the past 13 years, the U.S. Environmental Protection Agency has exempted only the oil and gas industry from the federal Safe Drinking Water Act to allow the disposal of waste brine and hydrocarbon-containing fluids into drinking water aquifers deep underground. The injections are occurring east of Fort Collins in northern Weld County…”

A ProPublica investigation showed that the EPA has not kept track of how many aquifer exemptions have been issued nationwide, and records the agency provided ProPublica showed that many were issued in conflict with the EPA’s requirement to protect water that could be used for drinking. ProPublica found that about 1,100 aquifer exemptions have been approved by the EPA’s Underground Injection Control Program in its Rocky Mountain regional office in Denver.”

“In most cases, the EPA granted companies permission to pollute drinking water aquiferssaying that they are not “reasonably expected” to be used for drinking water because they are too deep and too expensive to tap, making such an operation “technically impractical.”

“But Colorado may be forced to look deep underground for new water sources as shallower aquifers are depleted and water becomes more scarce as the climate changes, said Mark Williams, a hydrologist at the University of Colorado-Boulder.”
“The plan Colorado currently uses to calculate its water needs and supply through 2050 was last updated in 2012; it says very little about underground sources of water and even less about the how climate change could potentially affect the state’s water supply.”

(The Surface Water Supply Index) SWSI ignored climate change entirely because the state didn’t have enough money to address such a complex issue, the report says. But considering the impacts of climate change is critical when determining the harm oil and gas wastewater injections are doing to deep drinking water aquifers,” Williams said.

“We’re sacrificing those aquifers. In 50 or 100 years, we may actually like to have that water, and it will not be available. That’s a water quantity issue. The region’s water supply experts who say the drinking water lurking 8,000 feet or deeper underground can’t be tapped today also say the future may demand it.”

In addition, Colorado’s largest aquifer, the Ogallala, was contaminated by an EPA known frack fluid and thermogenic gas from a mining operation that uses fracking processes. For more information, please visit: http://www.fractivist.blogspot.com/2012_10_01_archive.html
Chemicals Used in Hydraulic Fracturing
The House of Representatives Committee on Energy and Commerce Report: “Chemicals Used in Hydraulic Fracturing,” (http://democrats.energycommerce.house.gov), details over 750 chemicals and other components used in the hydraulic fracturing process. Some of these chemicals are classified as carcinogenic and hazardous air pollutants. Given this, how can we, in good conscience, allow the use of these chemicals in our environment, communities, and neighborhoods?
Also, according to federal laws, the oil and gas industry does not have to disclose the chemicals they use in their proprietary hydraulic fracturing fluids. How these fluids and their effects are exempt from laws such as the Clean Water Drinking Act, the Safe Water Drinking Act, the Clean Air Act, the National Environmental Policy Act, the Resource Conservation and Recovery Act, and the Emergency Planning and Community Right-to-Know Act is unacceptable. These laws were enacted to protect our environment and our citizens. Allowing the oil and gas industry exemptions under the Halliburton Loophole undermines our most important environmental and public health laws, and consequently collides with Sierra Club’s mission statement. Isn’t it time these outrageous, unlawful exemptions are eliminated?
Below are some highlights from the Executive Summary of the report referenced above:
“Between 2005 and 2009, the 14 oil and gas service companies used more than 2,500 hydraulic fracturing products containing 750 chemicals and other components. Overall, these companies used 780 million gallons of hydraulic fracturing products – not including water added at the well site – between 2005 and 2009.”
“Some of the components used in the hydraulic fracturing products were common and generally harmless, such as salt and citric acid. Some were unexpected, such as instant coffee and walnut hulls. And some were extremely toxic, such as benzene and lead.”
“Between 2005 and 2009, the oil and gas service companies used hydraulic fracturing products containing 29 chemicals that are (1) known or possible human carcinogens, (2) regulated under the Safe Drinking Water Act for their risks to human health, or (3) listed as hazardous air pollutants under the Clean Air Act. These 29 chemicals were components of more than 650 different products used in hydraulic fracturing.”
“The BTEX compounds – benzene, toluene, xylene, and ethylbenzene – appeared in 60 of the hydraulic fracturing products used between 2005 and 2009. Each BTEX compound is a regulated contaminant under the Safe Drinking Water Act and a hazardous air pollutant under the Clean Air Act. Benzene also is a known human carcinogen. The hydraulic fracturing companies injected 11.4 million gallons of products containing at least one BTEX chemical over the five year period.”
“In many instances, the oil and gas service companies were unable to provide the Committee with a complete chemical makeup of the hydraulic fracturing fluids they used. Between 2005 and 2009, the companies used 94 million gallons of 279 products that contained at least one chemical or component that the manufacturers deemed proprietary or a trade secret. Committee staff requested that these companies disclose this proprietary information.”
“Some of these chemicals, if not disposed of safely or allowed to leach into the drinking water supply, could damage the environment or pose a risk to human health. During hydraulic fracturing, fluids containing chemicals are injected deep underground, where their migration is not entirely predictable. Well failures, such as the use of insufficient well casing, could lead to their release at shallower depths, closer to drinking water supplies.” Although some fracturing fluids are removed from the well at the end of the fracturing process, a substantial amount remains underground.”
“While most underground injections of chemicals are subject to the protections of the Safe Drinking Water Act (SDWA), Congress in 2005 modified the law to exclude “the underground injection of fluids or propping agents (other than diesel fuels) pursuant to hydraulic fracturing operations related to oil, gas, or geothermal production activities” from the Act’s protections. Unless oil and gas service companies use diesel in the hydraulic fracturing process, the permanent underground injection of chemicals used for hydraulic fracturing is not regulated by the Environmental Protection Agency (EPA).”
“Hydraulic fracturing companies used 2-butoxyethanol (2-BE) as a foaming agent or surfactant in 126 products. According to EPA scientists, 2-BE is easily absorbed and rapidly distributed in humans following inhalation, ingestion, or dermal exposure. Studies have shown that exposure to 2-BE can cause hemolysis (destruction of red blood cells) and damage to the spleen, liver, and bone marrow. The hydraulic fracturing companies injected 21.9 million gallons of products containing 2-BE between 2005 and 2009. They used the highest volume of products containing 2-BE in Texas, which accounted for more than half of the volume used. EPA recently found this chemical in drinking water wells tested in Pavillion, Wyoming.”
States with the Highest Volume of Hydraulic Fracturing Fluids Containing 2-Butoxyethanol (2005-2009):
State
Fluid Volume (gallons)
Texas
12,031,734
Oklahoma
2,186,613
New Mexico
1,871,501
Colorado
1,147,614
Louisiana
890,068
Pennsylvania
747,416
West Virginia
464,231
Utah
382,874
Montana
362,497
Arkansas
348,959
Total
20,433,507
We are aware of the FRAC Act to repeal the Halliburton Loophole that was introduced in 2008 and reintroduced in 2011 by Representatives Diana DeGette and Jared Polis, both Colorado Democrats who also sponsored the original bill. The question we must ask is: Will repealing the Halliburton Loophole require the oil and gas industry to disclose the chemicals used in their proprietary hydraulic fracturing fluids? Disclosure is not enough.
Endocrine Disruption
Dr. Theo Colborn, founder and president of The Endocrine Disruption Exchange (TEDX), based in Paonia, Colorado, is an environmental health analyst, and is known for her research on the health effects of endocrine disrupting chemicals.
Dr. Colborn’s website, (http://www.endocrinedisruption.com), details the chemicals used in natural gas operations and their health effects.  Her findings are disturbing and should be alarming to all of us.
After reviewing Dr. Colborn’s research, please consider the impacts in Colorado for a moment. There are over 49, 000 active oil and gas wells in Colorado and approximately 18,000 are located in Weld County. Some wells are located in neighborhoods and next to elementary schools and playgrounds.
Our own Sierra Club members and leaders live in communities surrounded by hundreds, and even thousands, of toxic fracking operations that use carcinogenic and endocrine disrupting chemicals to extract natural gas. The oil and gas operators fugitively emit and willfully release tons of volatile organic compounds (VOC’s) and hydrocarbon vapors from storage tanks, valves and nearly 900 parts and pieces of equipment that release fugitive emissions into their neighborhoods.
These toxic operations are close to the schools that their children attend and the playgrounds where they play. It is unethical and morally wrong that we are allowing this to happen when, according to Dr. Colborn’s research:
“Volatile organic compounds (benzene, toluene, ethylbenzene, xylene, etc.,) and fugitive natural gas (methane), escape and mix with nitrogen oxides from the exhaust of diesel-driven, mobile and stationary equipment to produce ground-level ozone.”
We have a responsibility to do something about this - for the environment and for our members. These emissions must be monitored now, not in 2015, as the COGCC suggests.
Additional concerns regarding chemical exposure in our communities involve the current setback rules in Colorado. Currently only 150’ setbacks are required in rural areas and 500’ setbacks in suburban areas for oil and natural gas wells from homes, schools, and businesses. Is this really safe, considering our own state law has a Setback Loophole that allows re-entry and re-drilling of any completed well regardless of its proximity to a residential structure? In some subdivisions, there are active and producing well sites within 50-100’ feet of homes.
Workplace Safety
We must ask: How safe are oil and gas field workers who are exposed to the impacts of hydraulic fracturing?
The National Institute for Occupational Safety and Health (NIOSH) identified:
“Exposure to airborne silica as a health hazard to workers conducting some hydraulic fracturing operations during recent field studies.”
That the exposure to hydraulic fracturing chemicals in an occupational setting needs to be examined to determine the acute and chronic effects on health. The exposure risks such as “transport, mixing, delivery, and potential accidents” have not been properly assessed.”
Air Pollution
Air pollution along the Front Range of Colorado is getting significantly worse and studies show that hydraulic fracturing is contributing to this problem.
In a study dated December 5, 2012 by the Colorado Department of Health and the Environment, we would like to call your attention to the following information provided under Table 5:
Average, speciated non-methane organic compounds (SNMOCs) concentrations were captured at 10 times those found in agricultural areas of higher oil and gas well pad density than in downtown Denver. This study clearly confirms the previous NOAA air chemistry study and Dr. Theo Colborn’s “Air Manuscript” chemical analyses of active oil and gas well pad chemical releases. The study also points to aggregate major point sources of pollution, which under the Clean Air Act, the oil and gas industry’s active well pads are considered “minor non-point sources” of pollution. This is a critical area that needs to be immediately addressed and stopped.
From the article entitled “Hydraulic fracturing’s Dirty Air Secret” dated November 15, 2012 on Earthjustice’s website: (http://earthjustice.org/blog/2012-november/fracking-s-dirty-air-secret)
“Oil and gas drilling is a contributor to ozone—better known as smog—on Colorado’s Front Range. Smog is a health problem. As the American Lung Association explains, ozone is "the most widespread pollutant in the U.S." and "is also one of the most dangerous." Smog causes shortness of breath; chest pain when inhaling; wheezing and coughing; asthma attacks; and increased need for people with lung diseases to go to the hospital to get treatment. And let's not forget death. Thousands of premature deaths occur every year due to ozone levels above the current health standard set by the EPA.”
“Thanks in part to the hydraulic fracturing drilling boom, smog has gotten worse in Colorado over the past couple of years. How bad? This summer was the worst Front Range smog year since 2006 with a month of unhealthy air days. State data for 2012 also show air in Greeley and Fort Collins north of Denver—near the heart of the hydraulic fracturing boom—exceeding health standards and getting worse.”
“And if that’s not enough, Rocky Mountain National Park was crowned the smoggiest national park outside of California this year. For the first time in the decade or so that the Park Service has records online. Can’t imagine that’s good for the tourism business, let alone the trees, wildlife and visitors.”
In an exploratory study of air pollution near natural gas operations conducted by The Endocrine Disruption Exchange (peer-reviewed and accepted for publication by Human and Ecological Risk Assessment: An International Journal on November 9, 2012), the study’s abstract described the following:   (http://www.endocrinedisruption.com/chemicals.air.php)
“This exploratory study was designed to assess air quality in a rural western Colorado area where residences and gas wells co-exist. Sampling was conducted before, during, and after drilling and hydraulic fracturing of a new natural gas well pad. Weekly air sampling for 1 year revealed that the number of non-methane hydrocarbons (NMHCs) and their concentrations were highest during the initial drilling phase and did not increase during hydraulic fracturing in this closed-loop system. Methylene chloride, a toxic solvent not reported in products used in drilling or hydraulic fracturing, was detected 73% of the time; several times in high concentrations. A literature search of the health effects of the NMHCs revealed that many had multiple health effects, including 30 that affect the endocrine system, which is susceptible to chemical impacts at very low concentrations, far less than government safety standards. Selected polycyclic aromatic hydrocarbons (PAHs) were at concentrations greater than those at which prenatally exposed children in urban studies had lower developmental and IQ scores. The human and environmental health impacts of the NMHCs, which are ozone precursors, should be examined further given that the natural gas industry is now operating in close proximity to human residences and public lands.”
A May 2012 study by the Colorado School of Public Health researchers discovered the following: (http://www.ucdenver.edu/about/newsroom/newsreleases/Pages/health-impacts-of-hydraulic fracturing-emissions.aspx)
“In a new study, researchers from the Colorado School of Public Health have shown that air pollution caused by hydraulic fracturing or hydraulic fracturing may contribute to acute and chronic health problems for those living near natural gas drilling sites. The report, based on three years of monitoring, found a number of potentially toxic petroleum hydrocarbons in the air near the wells including benzene, ethylbenzene, toluene, and xylene. Benzene has been identified by the Environmental Protection Agency as a known carcinogen.”

“…Exposure to trimethylbenzenes, aliaphatic hydrocarbons, and xylenes, all of which have neurological and/or respiratory effects, the study said. Those effects could include eye irritation, headaches, sore throat and difficulty breathing.
"We also calculated higher cancer risks for residents living nearer to the wells as compared to those residing further [away]," the report said. Benzene is the major contributor to lifetime excess cancer risk from both scenarios."

In April 2012, the EPA announced updates to nationwide air quality protections to include oil and natural gas production. In the press release entitled, “Environmental Groups Praise EPA’s First-Ever Clean Air Protections for Hydraulic fracturing,” (http://earthjustice.org/news/press/2012/environmental-groups-praise-epa-s-first-ever-clean-air-protections-for-fracking), it’s important to note:
“The EPA’s New Source Performance Standards (NSPS) and National Emission Standards for Hazardous Air Pollutants (NESHAPS) will benefit the health of Americans and our environment in many ways. The updated standards will result in major reductions in emissions of volatile organic compounds (VOCs), toxic benzene and methane, a highly potent contributor to climate disruption. These pollutants are known to cause asthma attacks, hospital admissions, emergency room visits, cancer and even premature death.”
“Today’s announcement by the EPA is a major step forward. However, the two-and-a-half-year delay in reducing pollution from wellheads is an unnecessary setback because industry can meet those standards now.”

At the same time, the EPA left out methane emissions and in turn the Club filed a class action lawsuit on behalf of its members against the EPA.
From the same press release, we would also like to highlight your statement:
“EPA Administrator Lisa Jackson is taking an important first step in closing loopholes for the natural gas industry and addressing dangerous air quality levels in and near frack-fields across the country,” said Michael Brune, Executive Director of the Sierra Club.
“The natural gas industry dumps massive amounts of air pollutants into our air every day, sickening families and children. An industry that touts its ability to efficiently drill thousands of wells thousands of feet into the earth is crying wolf when it claims it can’t build enough tanks to capture wellhead pollution. It’s time we clean up the natural gas industry’s dirty and reckless practices.”
The Climate Crisis
We are very concerned about how hydraulic fracturing is affecting the climate crisis.
As reported in the Journal of Nature on January 2, 2013: (http://www.nature.com/news/methane-leaks-erode-green-credentials-of-natural-gas-1.12123)
“Scientists are once again reporting alarmingly high methane emissions from an oil and gas field, underscoring questions about the environmental benefits of the boom in natural-gas production that is transforming the US energy system.”



“The researchers, who hold joint appointments with the National Oceanic and Atmospheric Administration (NOAA) and the University of Colorado in Boulder, first sparked concern in February 2012 with a study suggesting that up to 4% of the methane produced at a field near Denver was escaping into the atmosphere…..”

“Industry officials and some scientists contested the claim, but at an American Geophysical Union (AGU) meeting in San Francisco, California, last month, the research team reported new Colorado data that support the earlier work, as well as preliminary results from a field study in the Uinta Basin of Utah suggesting even higher rates of methane leakage — an eye-popping 9% of the total production. That figure is nearly double the cumulative loss rates estimated from industry data — which are already higher in Utah than in Colorado.”
And as stated on the Environmental Protection Agency website, methane gas is defined as follows: (http://epa.gov/climatechange/ghgemissions/gases/ch4.html)
“Methane (CH4) is the second most prevalent greenhouse gas emitted in the United States from human activities. In 2010, CH4 accounted for about 10% of all U.S. greenhouse gas emissions from human activities. Methane is emitted by natural sources such as wetlands, as well as human activities such as leakage from natural gas systems and the raising of livestock. Natural processes in soil and chemical reactions in the atmosphere help remove CH4 from the atmosphere. Methane's lifetime in the atmosphere is much shorter than carbon dioxide (CO2), but CH4 is more efficient at trapping radiation than CO2. Pound for pound, the comparative impact of CH4 on climate crisis is over 20 times greater than CO2 over a 100-year period.”

In the Scientific Case for Avoiding Dangerous Climate Change to Protect Young People and Nature, last revised March 23, 2012, (http://arxiv.org/abs/1110.1365), the following observations were made regarding fossil fuel emissions (please note: Dr. James Hansen is one of the researchers of this study)
“Maintaining a climate that resembles the Holocene, the world of stable shorelines in which civilization developed, requires rapidly reducing fossil fuel CO2 emissions. Such a scenario is economically sensible and has multiple benefits for humanity and other species. Yet fossil fuel extraction is expanding, including highly carbon-intensive sources that can push the climate system beyond tipping points such that amplifying feedbacks drive further climate change that is practically out of humanity's control. This situation raises profound moral issues as young people, future generations, and nature, with no possibility of protecting their future well-being, will bear the principal consequences of actions and inactions of today's adults.”
Many of us have seen the film “Chasing Ice.” It’s time for each one of us to ask a very important question: On a scale of 1 to 10, with 1 being the lowest and 10 being the highest, how concerned are you about climate crisis? Also, how concerned are you that our daily actions impact the vast majority of the world’s population that has not done a thing to contribute to the climate crisis – don't we have a responsibility and moral obligation to them to change the way that we live?
Making Hydraulic Fracturing Safer
Given that many of us depend upon oil and natural gas for our daily existence, there has been much discussion on what things could be done to make hydraulic fracturing safer including:
  • Full enforcement of our current environmental laws by the EPA
  • Disclosure of all proprietary fracking fluids
  • Repealing the Halliburton Loophole
  • Developing strict guidelines and imposing penalties when laws are not followed (accountability)
  • Providing the necessary inspectors to ensure compliance with all environmental laws and regulations. Currently Colorado has 17 inspectors to monitor over 49,000 active, plus 81,000 inactive wells
The real question is: Can hydraulic fracturing ever be safe for our environment and public health?
Sierra Club’s Oil and Gas Policy
We have reviewed the Club’s Oil and Gas Policy, as revised February 2012, and are pleased that it clearly states the reasons the Club doesn’t support hydraulic fracturing because of many of the points addressed in this letter.
We do want to recognize that the policy also supports:
·       Chapter advocacy for regional or state-wide moratoria
·       Bans in specific local environmentally sensitive areas such as federal roadless areas, state parks and forests, designated wildlife areas, and municipal watersheds
·       Local groups that call for a ban in their own communities
These changes to the 2009 Oil and Gas Policy were critical. Thank you for working towards these revisions – but we must do more.
Given the investigative reporting that continues to provide concrete evidence of accounts of water contamination, people becoming seriously ill who live close to well sites that have been fracked, animals dying after exposure to hydraulic fracturing fluids, and the unknown health issues that will surface in the coming years, we are asking the Club to take a leadership role in calling for a nationwide ban on mining that uses hydraulic fracturing.
If we take a leap of faith and call for a nationwide hydraulic fracturing ban, we will move closer to the goal of a clean and healthy energy future, but our planet requires that we act today. If we don’t, we will drag this issue out for an indefinite period of time, further endangering our environment and public health, and accelerating the climate crisis. We don’t have time to wait.
Sierra Club v. Morton 45 U.S. 727 (1972)
Sierra Club v. Morton was one of the most important environmental lawsuits ever pursued. Over 40 years ago, Sierra Club saw that Mineral King needed protection from a proposed ski area development. Simply, the natural world needed a voice and Sierra Club was there to provide it. The Club had the courage to stand up and challenge the Interior Department’s policies on developing Mineral King. We didn’t win but today we have another chance.
Throughout our country today, the natural environment is being destroyed through hydraulic fracturing operations, mountaintop removal mining, our individual and collection actions that contribute to our climate crisis, and a host of other issues.
The natural world needs our voice more than ever. Will the Sierra Club be courageous enough to stand up once more and be that voice for our natural world? Are we up to the challenge?
We think that the dissenting opinion of Justice William O. Douglas, in Sierra Club v. Morton, foretold the future that lies in front of us today. Below is an excerpt from his dissenting opinion:

“The critical question of "standing" would be simplified and also put neatly in focus if we fashioned a federal rule that allowed environmental issues to be litigated before federal agencies or federal courts in the name of the inanimate object about to be despoiled, defaced, or invaded by roads and bulldozers and where injury is the subject of public outrage. Contemporary public concern for protecting nature's ecological equilibrium should lead to the conferral of standing upon environmental objects to sue for their own preservation. This suit would therefore be more properly labeled as Mineral King v. Morton.”

“Inanimate objects are sometimes parties in litigation. A ship has a legal personality, a fiction found useful for maritime purposes. The corporation sole - a creature of ecclesiastical law - is an acceptable adversary and large fortunes ride on its cases. The ordinary corporation is a "person" for purposes of the adjudicatory processes, whether it represents proprietary, spiritual, aesthetic, or charitable causes.”

“So it should be as respects valleys, alpine meadows, rivers, lakes, estuaries, beaches, ridges, groves of trees, swampland, or even air that feels the destructive pressures of modern technology and modern life. The river, for example, is the living symbol of all the life it sustains or nourishes - fish, aquatic insects, water ouzels, otter, fisher, deer, elk, bear, and all other animals, including man, who are dependent on it or who enjoy it for its sight, its sound, or its life. The river as plaintiff speaks for the ecological unit of life that is part of it. Those people who have a meaningful relation to that body of water - whether it be a fisherman, a canoeist, a zoologist, or a logger - must be able to speak for the values which the river represents and which are threatened with destruction.....”

“The voice of the inanimate object, therefore, should not be stilled. That does not mean that the judiciary takes over the managerial functions from the federal agency. It merely means that before these priceless bits of Americana (such as a valley, an alpine meadow, a river, or a lake) are forever lost or are so transformed as to be reduced to the eventual rubble of our urban environment, the voice of the existing beneficiaries of these environmental wonders should be heard.”

“Perhaps they will not win. Perhaps the bulldozers of "progress" will plow under all the aesthetic wonders of this beautiful land. That is not the present question. The sole question is, who has standing to be heard?”

“ Those who merely are caught up in environmental news or propaganda and flock to defend these waters or areas may be treated differently. That is why these environmental issues should be tendered by the inanimate object itself. Then there will be assurances that all of the forms of life which it represents will stand before the court - the pileated woodpecker as well as the coyote and bear, the lemmings as well as the trout in the streams. Those inarticulate members of the ecological group cannot speak. But those people who have so frequented the place as to know its values and wonders will be able to speak for the entire ecological community…”

In 2008, Ecuador’s Constitution was the first to: “Recognize that ecosystems possess the inalienable and fundamental right to exist and flourish, and that people possess the legal authority to enforce those rights on behalf of ecosystems. In addition, these laws require the governments to remedy violations of those ecosystem rights.”
Ecuador broke new ground with the help of The Community Environmental Legal Defense Fund that: “is working with communities throughout the United States and in countries worldwide to assist in crafting and adopting new laws that change the status of natural communities and ecosystems from being regarded as property under the law to being recognized as rights-bearing entities.” (http://www.celdf.org)
Our planet needs the Sierra Club’s mission in action to endure and now, more than ever, we have the responsibility to “protect the planet” like no other time in our lives.

As the Executive Director of the Sierra Club, as an activist, a father, and a human being, we call on your leadership to call for a nationwide ban on mining that uses hydraulic fracturing. We also ask that the Sierra Club lead the discussion on “The Rights of Nature,” and establish the protections needed to ensure the long-term sustainability and viability of ecosystems to flourish and to defend their fundamental rights to exist without compromise.


We believe that the spirit to act on behalf of the natural world, and the spark to be courageous and do what’s right - not only for ourselves but for the greater good - is alive in us and in our members. This is how the Sierra Club was born.


We hope that you will have the courage to lead our country in calling for a nationwide ban on mining that uses hydraulic fracturing, regardless of the politics, and to acknowledge that the rights of our natural environment are worth fighting for. We believe that both of these things are worth the fight and we are confident that hundreds of thousands of Sierra Club’s members will stand behind you – there is no doubt.

Sincerely,
Executive Committee
The Poudre Canyon Group
Fort Collins, Colorado
Shane Davis, Chair
Caroline Krumm, Vice Chair
John Gascoyne
Kerry Miller
Tyler Wilson                                                                                                                   
cc: Sierra Club Board of Directors


****************

Whew ok... Also, this Sierra Club FracTracker appears to be more-or-less abandoned: FRAC: Fracking Regulatory Action Center. If only someone would set up some tracker that kicked moar butt for these kind of things - and crowdsourced it! ;)

Anyway I am always down for some serious oil geopolitics -- a topic suddenly on the rise in America -- and right here we have a few classic fault lines developing. Frankly it has been tough to see relative newcomers to activist politics get snowballed by hucksters.

Where the Sierra Club decides to go with this will show pretty obviously if they are on the side of power & massive fossil fuel profit-taking, or the side of the environment & their assorted members who are going to certainly get poisoned by fracking projects in significant numbers.

If whole chapters of the Sierra Club bounce on the national Org over this matter, you could have a very strong and militant base for further environmental action. Could militant shards of the Sierra Club, including the old hippies of the Rocky foothills, kick some ass? Who knew? Your move, Club members! Make some hilarious hashtag before another damn billionaire makes one for you!

Source: DOJ Feds currently at the Wells Fargo Mortgage office in Minneapolis searching around

A tip passed along from a source stated that today the US Department of Justice arrived at the Wells Fargo Home Mortgage office in the Phillips neighborhood of Minneapolis, as "auditors" presumably to search through or perhaps seize mortgage records - the old Honeywell complex around 4th Avenue & 26th/28th St. I have no feasible way to confirm this right now but it seemed like a relatively sturdy tip worth posting immediately.

I heard that it was the "middle building". We see two major clusters of buildings via GMap here, so I would assume that means right in the middle. This may have something to do with the place or office that people would call in to attempt to get their mortgages adjusted. (As Neil Barofksy's adventures in the demented banking world showed, the banks were supposed to hit a numerical target of *offers* of modifications, not actual modifications. Perhaps the DOJ is collecting the data on that right now).

wellsfargomortgage.png

Wells Fargo has been a party to a great deal of nefarious happenings in recent years, including memorably their purchase of the colossal drug money laundering giant failed bank Wachovia. Nobody cares about drug money in the banking system but there's always a little time to nibble on relatively easy auditing elements.

Here's the most recent item in the Google about their fraudulent mortgage business: Wells Fargo Settlement Isn’t Bar to False Claims Lawsuit | Foreclosure Fraud - Fighting Foreclosure Fraud by Sharing the Knowledge. The source for this photo:
Wells-Fargo.jpeg

In lieu of more detailed info about this situation, a couple random URLS about this hive of scum & villainy. Fact sheet about the Minneapolis Wells Fargo site itself. www.ci.minneapolis.mn.us/www/groups/public/@cped/documents/webcontent/convert_263603.pdf

Foursquare for site [lol]: Wells Fargo Home Mortgage - Phillips - Minneapolis, Mn

Citysearch reviews of their horrible service: Wells Fargo Home Mortgage in Minneapolis, MN - Reviews and Directions

Anyway I will leave it there - if there is some kind of confirmation available plz drop me a line!

PS: additionally there was some FBI raid in Oakland on something called the Music Box. Reported FBI Raid at punk haus, "The Music Box" in Oakland : Indybay // northern wind:

my house was raided, there was a warrant, we were all dragged outside barely clothed and forced to sit out there, no bathroom access, they broke our fucking mirror for no reason, scared the fuck out of my cat, handcuffed a housemate for trying to grab her cigarettes, claimed to be looking for some person but wouldn’t say whom, warrant gave no clues.

fuck this shit I’m so sick of waking up to guns.

We will have more info forthcoming on some other important matters, likely unrelated to the Wells Fargo thing, as soon as possible :/

Question Time: Jimmy Savile pedophile network story encompasses BBC, royal family, Parliament, Jersey, Netherlands -- crickets from US media

"What you have to understand, John, is that sometimes there are forces and events too big, too powerful, with so much at stake for other people or institutions, that you cannot do anything about them, no matter how evil or wrong they are and no matter how dedicated or sincere you are or how much evidence you have. This is simply one of the hard facts of life you have to face."
- Former CIA director and Cercle member William Colby giving advice to his friend senator John DeCamp, urging to quit his investigations into the Franklin child abuse affair and to write a book about his experiences (The Franklin Coverup, 2nd edition, foreword). via archived Institute for the Study of Globalization and Covert politics project - https://wikispooks.com/ISGP/

[TRIGGER WARNING - Your world is controlled by many abusive psychopaths - details/links below. Aside from blockquoting Icke, Madsen & other stories, this post does not reach into many details of the abuse. Some of these links & the 1993 video "Conspiracy of Silence" contain very disturbing material including direct documentation of abuse]

A creepy theme, usually derided by debunker types as 'conspiracy theory' material, has been the frequent overlap between child abuse networks and vertically hierarchical, often sexually-codified, social structures & institutions, particularly those with some degree of control over vulnerable people. However these patterns are typically 'latent' & suppressed in media awareness until the dam bursts. Whether or not this horror encompasses interdimensional entities, blackmailed Nazi operatives or other exotically creepy ideas, the sheer evil of it all can send one's imagination hunting for weird connections. After all, one principal reason this never surfaced until now is because of the cognitive dissonance that tends to deflect our attention from such unthinkable cruelty.

Whether it's the revelation of vast abuse in the United Kingdom, Catholic hierarchies or Penn State, perpetrators & handlers of human trafficking & abuse are often well-protected & truth rarely spills out.

VIDEO: Member of Parliament Tom Watson asks Prime Minister Cameron about protected pedophile activity within the highest ranks of British government at House of Commons Question Time. (source)

savile_newsletterpromo.jpeg

Across the United Kingdom, hundreds of new leads & investigations have opened up with broadening awareness that a major BBC pop music presenter and producer, Jimmy Savile, helped mastermind a vast network of child abuse across much of the United Kingdom for decades, implicating major figures in the British Broadcasting Corporation, Parliament, the Prime Ministerial and Royal Family levels of UK society in undeniable horrors.

For decades, Savile [with a creepy resemblance to the Chitty Chitty Bang Bang childcatcher character] got what amounted to a green light from the major figures in British society, the BBC and the Royal Family, to do as he pleased, with full access including keys to numerous institutions hosting vulnerable children and teens.

For years the BBC's hierarchy looked the other way as Savile used his venues to not just abuse children [including it's widely said now, even dead children] directly, but also arrange for their trafficking on behalf of many other powerful figures.

A former BBC director, Mark Thompson, is now 'incoming president and chief executive' of the New York Times, forcing NYT Publisher Arthur Sulzburger Jr to back up their man, since he is obviously under the shadow of the BBC pedo coverup situation.

See: Amid BBC Scandal, Incoming Times Chief Receives Support - NYTimes.com // BBC Scandal Threatens to Become a Political Crisis - NYTimes // BBC News - Newspaper review: Savile scandal still leads papers // Jimmy Savile child abuse probe: TV stars set to be arrested 'within days' as probe widens - Mirror // Jimmy Savile scandal: Tom Watson MP claims powerful child sex ring was linked to Downing Street - Mirror Online // Jimmy Savile: Sex fiend was a 'necrophiliac', claims former colleague Paul Gambaccini - Mirror Online // Jimmy Savile abuse scandal: Doctors claimed to have attacked patients at hospitals where Savile allegedly struck - Mirror Online // BBC News - Giving Jimmy Savile victims their voice // BBC News - Jimmy Savile scandal: Alleged victims' stories

#OTB: The quirky alternative site OccupyTheBanks.com has been covering dimensions of this: see #BELGIUM DUTROUX CHILD RAPE & SNUFF #DEMMINK #DUTCH #Savile #BBC #Hague && THE top legal officers in HOLLAND (see last post) can be a NAMED PEDOPHILE, and CHILD RAPIST // #MASSARRESTS UK POLICE 50 POLICE PEDO ARRESTS // #NETHERLANDS TOP GOVT LAW OFFICER #PEDOPHILE #Demmink #Dutch #JUSTICE // **BREAKING** NO 10 PEDO RING NAMED UK PARLIAMENT // [UPDATED 7th OCT]] SATANIC RITUAL CHILD SEXUAL ABUSE #VATICAN #NWO #ILLUMINATI etc etc. Follow @censoredNewsNow for more items - a chatty account to be sure!

It's no surprise Savile was able to gather many honorifics thanks to the Royal Family and even made a member of the Knights of Malta (Sovereign Military Order of Malta - a major sketchy European aristocratic network). (additionally, with recent work from people identifying with Anonymous in exposing child porn networks, d0xing abusers, as well as criticism of the sexist, misogynist & creepy issues plaguing such groups as Reddit & "jailbait" subreddits, the 'skeptic humanist' community etc, it seems like these broader topics are finally getting the attention & reactions they need.)

It's important to realize that pedophiles and particularly creepy 'fixers', such as for example, that John Mark Kerr creeper, who bizarrely claimed to have killed Jon Benet Ramsey several years ago, are just outer tentacles, who clearly are 'charmed' with protection from law enforcement entanglements. [In Minneapolis, the longtime Park Police chief was yet another pedo in a key power position]

Icke was right?! Of all people, noted "interdimensional reptilian conspiracy" exponent David Icke gains a certain validation for having documented both Savile's depredations and others, prevailing in exposing ugly truths despite the famously libel-locked down British publishing world. His 5500 word exegesis on this subject is posted below.

I think this statement is well-substantiated - many examples are out there: Icke: "Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control."

At this time in the UK press, former Tory Prime Minister Edward Heath & minister Sir Peter Morrison, a confidante of Heath's successor, Margaret Thatcher, are openly talked about. Former Minister says Thatcher aide was paedophile who preyed on boys' home - and Hague should have known | Mail Online

A former Tory Minister last night made incendiary claims that one of Margaret Thatcher’s closest aides was implicated in one of the most harrowing child abuse scandals of recent times.

Rod Richards, a former Conservative MP and ex-leader of the Welsh Tories, made the shocking allegation that he had seen evidence linking Sir Peter Morrison to the North Wales children’s homes case, in which up to 650 children in 40 homes were sexually, physically and emotionally abused over 20 years.

Mr Richards also linked a second leading Tory grandee – now dead – to the scandals at homes including Bryn Estyn and Bryn Alyn Hall, both near Wrexham.

He said official documents had identified the pair as frequent, unexplained visitors to the care homes.

Mr Richards – who helped establish the inquiry that unearthed the scale of the abuse – said bluntly: ‘What I do know is that Morrison was a paedophile. And the reason I know that is because of the North Wales child abuse scandal.’

He added that William Hague, who was Welsh Secretary at the time of the inquiry, ‘should have seen the evidence about Morrison’.

Morrison was Lady Thatcher’s parliamentary private secretary and deputy chairman of the Conservative Party.

Back in the 1990s -- the website ISGP.eu - [now archived via Wikispooks.com] covered a Belgian-centered dimension of the protected European elite child abuse network. This material gets very deeply disturbing & is not to be taken lightly [TRIGGER WARNING x infinity] ISGP - Beyond the Dutroux Affair // ISGP - Dutroux case and X-Dossier victim-witnesses // ISGP - Dutroux, Nihoul and X-Dossier investigators // ISGP - Belgian X-Dossiers - the accused // ISGP - Alleged assassinations in Belgium

"From East Belfast's Kincora Boys' Home, via Leicestershire, Staffordshire and London, to the children's homes of Clwyd, we have witnessed 25 years of cover-up. Cover-up, not to protect the innocent but to protect the regularly named elements of the British establishment who surface whenever widespread evidence of child abuse is exposed. From the public schools right through to the Catholic and Anglican churches, child abuse has been allowed a special place of sanctuary... Social workers, police, security services, local and national political figures remain the common factors in the fall-out from the [child abuse] inquiries... In case after case the cycle is described - a child is 'taken into care', then abused in a home, handed on to an outside pedophile ring and out on to the rent-boy/prostitution circuit beyond, if they live that long... Journalists find themselves battling first with authority, then with the libel laws, to publish the truth about a vast web of abuse."
- June 6, 1996, The Guardian, 'True scandal of the child abusers'. These lines were written by the author of the article and are not quotes.

....and so here we are in 2012, 18 years after that Guardian story was posted, previous layers breaking through to the surface anew. The 1990s saw parts of this general elite network [or layer] surface and recede again into obscurity. John DeCamp, a former CIA employee and Nebraska state representative, helped expose a major node of protected child abuse and trafficking in the American heartland.

This could almost be seen as an intra-CIA war or conflict as The Minders was a CIA-linked group that participated in child trafficking as well. Here is the long-suppressed 1993 documentary Conspiracy of Silence. The central figure in Nebraska, the late GOP rising star, Lawrence "Larry" King, bears some resemblance to Jimmy Sevile as another 'doorman to the cesspit' of protected elite child abuse.


savile_princecharles.jpegArguably, much of this ugliness, from Jim Jones to the recently deceased Rev. Sun Myung Moon to the CIA-influenced "evangelical" movement (Campus Crusade for Christ was set up as a counterpart to Mario Savio's Free Speech Movement by the CIA) all tie together ritualized group mind control and the inte-generational abuse of minors.

It could roughly add up to the distillation of MK-ULTRA & Nazi-derived research into a mind control template which could be applied across many religious & cultural gradients in Western societies. In the Scandinavian side, the Girl with the Dragon Tattoo series illustrated via fiction Nordic fascist intergenerational abuse families.

Whether or not you find plausible the notion of "entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general", the rest of the piece is an ugly read on a lot of very solid foundations.

So let's get to the Icke piece - via here Jimmy Savile ... Doorman To The Cesspit - David Icke Website && ELITE CHILD ABUSE: ‘JIMMY SAVILE… DOORMAN TO THE CESSPIT’ « 21st Century Wire::

By David Icke

Something of massive significance has happened in Britain in the last two weeks which might have been lost on most of the rest of the world. It concerns the revelations about serial child abuse over decades by a man considered by many to be a British ‘icon’ and ‘national treasure’.

Savile’s connections to the political and royal elite are undeniable.

His name is Jimmy Savile and the reason the significance of what is happening may have passed most people by outside the UK is that Savile was a major figure in these islands, but little known beyond them. What, and who, he was involved with, however, is global in nature and has the potential to expose both the staggering scale of child sexual abuse and many of the mega-famous names for whom it is a way of life.

Savile was one of the first in the entertainment field known as ‘disc jockeys’ who emerged with the 1960s music and cultural explosion known as the ‘Swinging Sixties’. I remember him well as a kid appearing on television shows, still in black and white then, and in fact you could hardly miss him. Once seen, never forgotten. He would always appear with dyed hair, mostly blond, and highly colourful and eccentric clothing accompanied by multiple rings and other jewellery. Savile was what they called a ‘one-off’, a ‘character’ and people either loved him or deeply loathed him and thought he was seriously weird. There was little of the half-way about Jimmy Savile.

He began as a disc jockey in dance halls and later managed several of them before he launched a career in the media via the legendary Radio Luxemburg in 1958 and eventually moved to the BBC which was to be his prime public platform for decades. He was a first and last presenter of the ground-breaking music chart show Top of the Pops, which ran from 1964 to 2006, but his biggest claim to fame was the BBC show Jim’ll Fix It which he presented from 1975 to 1994.

This is particularly relevant to current events because it was a programme in which children wrote in to describe what they would most like to do or who they would most like to meet. The programme then ‘fixed it’ for the children chosen to take part. The ‘fix’ could be anything from going up in a hot air balloon to meeting their favourite pop star.

Savile was also famous for his charity work, which included running many marathons. He was also a volunteer porter at the Leeds General Infirmary; a volunteer and fundraiser at Stoke Mandeville Hospital with its world-famous spinal injuries unit; and he was involved with the Broadmoor high-security psychiatric hospital where many famous killers have spent their days. Savile is reported to have had his own room at both Stoke Mandeville and Broadmoor and, it was revealed this week, he was given his own set of keys that allowed him access to many areas within Broadmoor.

His public face was of a jolly and eccentric character who was famous for his trademark expensive cigar and constantly repeated catch phrases such as ‘how’s about that, then?’, ‘now then, now then, now then’, ‘goodness gracious’, ‘as it ‘appens’ and ‘guys and gals’. But away from the screen Savile lived a very different life and operated in very different circles to the ‘man of the people’ image that he so cultivated and it is now clear that much of his charity work was designed to give him access to children and below-age teenagers.
Savile was given a hero’s funeral when he died in 2011 at the age of 84, but a recent television documentary – not by the BBC – has revealed his decades of sexual abuse of underage girls with more revelations coming out by the day. Iceberg and tip come to mind.

Saville was a regular visitor to the royal households, and was close to Prince Philip and Prince Charles.

I was first told about the real Jimmy Savile in the late 1990s in conversations with people who had serious insider knowledge about the British royal family and they said that Savile had been a close friend of Prince Philip until they had fallen out after a ‘big row’.

When I questioned why someone like Savile would be so close to the royal family I was told about his paedophilia and necrophilia (sex with dead bodies) and, of course, his famous voluntary work at hospitals would have given him potential access to the mortuaries.

Savile himself would boast about his connections to the royals and it was publicly acknowledged that he was a regular visitor to Buckingham Palace, Kensington Palace (where Princess Diana lived after her marriage ended with Prince Charles), and Highgrove (the country estate of Prince Charles).

Savile told Esquire: ‘The thing about me is I get things done and I work deep cover. I’ve known the Royal Family for a million years.’

According to the UK Daily Mail at the time of Savile’s death in 2011, he ‘was used as an intermediary in an attempt to resolve the differences between the Prince and Princess of Wales shortly before their split’. Savile said that he was invited to regular meetings with the royal family because ‘I have a natural good fun way of going on and we have a laugh.’

Would one of the world’s most powerful families invite an aging disc jockey into their inner sanctum so often just because he gave them ‘a good laugh’? Or is there likely to be a far more plausible reason for their strange closeness?

I have been writing since the 1990s and a book called The Biggest Secret about the royal family’s connection to Satanism and paedophilia and about paedophile Satanists like British Prime Minister Edward Heath and President ‘Father’ George Bush – just as I have told those who would listen about Jimmy Savile. But all I have had for my trouble from mainstream society is ridicule and dismissal.

Their minds are too closed and too programmed to make the leap into the world as it really is.

Now, in the wake of the public confirmation about Savile, it is time that they did. How many more children need to suffer before humanity grows up and faces the reality and sheer undiluted evil of the force that controls them?

Jimmy Savile and the royal family shared a love of Scotland and the sporting events known as the Highland Games. Savile was the Honorary Chieftain of the Lochaber Highland Games which he attended for 30 years. He had a secluded cottage at nearby Glencoe where Prince Charles was a visitor. Savile said after a visit by Charles in 1999: ‘I’ve had a few nosh-ups with the royals and I thought it was time I returned the hospitality.’

Charles sent a Christmas card to Savile in which he wrote: ‘Jimmy, with affectionate greetings from Charles. Give my love to your ladies in Scotland.’ The reference to the ‘ladies’ was meant for the women that Savile had arranged to serve the Prince during a visit to the Glencoe cottage.

Savile said that he had first been introduced to the royal family in 1966 by (known paedophile) Lord Louis Mountbatten, the uncle and mentor of Prince Charles. Mountbatten was Commandant General of the Royal Marines and arranged for the disc jockey to become the first civilian to be awarded the Marines’ Green Beret. It was one of a many ‘honourees’ that Savile would be awarded in the years that followed. Savile said:

Coming from Lord Louis, who was the favourite uncle of Prince Philip, that was quite something. So obviously I hooked up with the Prince – what was good enough for Lord Louis was good enough for him.

But what was ‘what’? Mountbatten was killed when a bomb exploded on his boat in Ireland in 1979 – a murder officially blamed on the Provisional IRA. New Zealand writer and researcher Greg Hallett writes in his book, Hitler was a British Agent:

Lord Louis Mountbatten was a pedophile, adulterer and homosexual incestuous lover for 10 years … the former King Edward VIII … was truly troubled by the revelations he too had betrayed the Canadians to the German Army, resulting in the open slaughter of those 4,000 men …

… the British monarchy arranged for MI-5 to blow up his boat (1979), happily covering their trail; by fitting up four IRA men … the tactic of blowing up one of your own leaders to cover up any incriminating evidence … was a face saving device to distract from even more damaging intelligence about the British monarchy working for the Germans, against peace, and for a prolonged war.

This is a young Prince Charles with his ‘mentor’ Lord Mountbatten, and father Prince Philip. Greg Hallett names both Mountbatten and Philip as paedophiles. Of course, you don’t just take one person’s word for that, but my own sources which have proved to be so accurate about Savile and others told me the same nearly 15 years ago with the addition that they were both Satanists. This is no surprise given that the British royal family, like all the royal bloodlines of Europe and further afield, are founded on Satanism and the manipulation of occult knowledge for deeply malevolent ends in league with the ‘dark suit’ expressions of the bloodlines in politics, banking, corporations and media.

But Jimmy Savile’s connections were certainly not confined to the royal family. They fanned out into the realms of politics and the rich and famous across the spectrum of human society. In short, he was not only a paedophile himself, but a supplier of children for some of the most famous paedophiles and Satanists on the planet.

The victims of his abuse that are now speaking out in the wake of the television documentary exposing his secret life are only part of a gigantic cesspit of paedophilia, Satanism, drug-running and murder in which he was involved.

I describe him as a ‘doorway to the cesspit’ because if you get past him and his fake persona you enter the sick and depraved world of the global bloodline elite. Savile was a ‘fixer’ – he described himself as such, though not in terms of what he was really fixing. As he told Esquire: ‘The thing about me is I get things done and I work deep cover.’ His most famous TV programme, Jim’ll Fix It, could not have been more appropriately named.

British police have said they are currently following 320 lines of inquiry into Savile’s abuse over decades all over the country, but if they are genuine and tenacious in their investigations and really want to know the truth they can multiply that by a very large number and still not be close to the totality.

If they do really want to uncover the truth they will have to be knocking on the door of Buckingham Palace eventually. If they don’t, it’s a cover up given the Windsors’ close relationship with Savile.

The current public revelations about Savile are being confined largely to the abuse of underage girls, but the truth about the way he supplied girls and boys for people like Prime Minister Edward Heath and so many others must also come out because the barricade is being held at the moment with only his own paedophilia and a few sleazy showbiz people. This is only one aspect of the scandal and his work as a supplier of children for the ‘elite’ is still being hidden in the mainstream media to protect the biggest names. This firewall has to be breached.

Guy Marsden today.

One of Savile’s nephews, Guy Marsden, now 59, has said publicly this week that he and his friends were taken to parties by his uncle in the late 1960s to ‘act as intermediaries for adults and younger children’. He said that the parties were attended by ‘household names’ in showbusiness, but only men – never women.

Marsden, then 13, and some friends from Leeds in the north of England, ran away to London for ‘an adventure’, he said. They were approached by men at Euston railway station and invited to a grubby flat. Then about four days later Savile turned up at the flat by coincidence because Marsden soon learned that his famous uncle mixed with ‘fellow child molesters’. He said he thought he would be in trouble for running away and not telling his parents where he was, but instead his uncle Jimmy just took him and his friends to a ‘much better place’ – the house of a ‘famous pop impresario’ which had a big indoor swimming pool and was one venue for Savile’s ‘paedophile parties’.

Marsden said that little boys and girls would disappear into bedrooms with the famous attendees and it was ‘perfectly obvious’ what was happening. ‘You heard sounds and moans and groans coming from the bedroom and knew what was going on.’ Marsden added:

At night you would get about 15 or 20 people turning up. There would be music and tables full of food, we couldn’t believe it. There was everything we needed and we just hung around.

At first we automatically assumed the children lived there, but we soon realised they didn’t. They would be brought there, sometimes by Uncle Jimmy, and would stay for six or seven hours until 3 or 4am. They were just little kids, boys and girls.

Interestingly, Marsden said that Savile sometimes arrived with a man dressed as a priest and he believed that children being abused may have come from an orphanage or children’s home. They almost certainly did – it fits the modus operandi of the paedophile rings to the letter. What better way to supply your children than have control of children’s homes?

Several of Savile’s victims who have come forward in recent times say they were abused by him at the Duncroft boarding school for ‘intelligent, emotionally disturbed girls’ in Surrey and wherever children and young people are gathered together in a boarding situation needs to be watched like a hawk. These establishments are the predators’ hunting grounds with often their own people appointed to the staff.

Savile at the infamous Haut de la Garenne children’s home in Jersey, Channel Islands.

This is Savile with the children at the infamous Haut de la Garenne children’s home on the island of Jersey in the Channel Islands. Jersey is the fiefdom of mega-rich and mega-crooked networks that combine criminal business, banking and drug operations with paedophilia and Satanism. The island of Jersey, off the French coast,, is only nine miles by five with a population of 90,000 and yet has 55 banks, more than 33,000 registered companies and hundreds of billions of dollars on deposit. It is a money laundering operation of global proportions and attracts the super wealthy with low tax rates.

Haut de la Garenne, or ‘Forest Heights’, was a ‘children’s home’ (detention centre) from 1867 to 1986 and it is clear that it played the role of providing children for sexual and violent abuse by the Jersey Mafia in all its forms – as well as the rich and famous of mainland Britain, including members of the Royal Family.

Jersey has an almost self-contained government of its own, but the Queen remains at the top of its power structure and wherever the ‘Crown’ holds sway, so does Satanism and child abuse.

The infamous Satanist, Edward Paisnel, who was dubbed ‘The Beast of Jersey’ after being jailed for 30 years for the rape of boys and girls, used to play Father Christmas at Haut de la Garenne during the 1960s. You get the picture.

A high-profile police investigation began in 2008 into historic long-term abuse at the home and, unfortunately for those involved, a decent, honest copper was in control of the investigation. This was Lenny Harper, a States of Jersey police detective who led a three-year child abuse inquiry that genuinely tried to expose what happened.

Genuine police officers and detectives who sought the truth in the Marc Dutroux child abuse and murder scandal in Belgium in the 1990s found that refusing to cover up the facts is not a good career move for law enforcement personnel if the truth is leading to rich, famous and powerful people and their networks. So it proved again with the Jersey investigation.

Both sets of genuine investigators were removed from these cases and any credible ‘investigation’ went with them. Lenny Harper, like his counterpart in the Belgian inquiry, was accused of ‘misconduct’ as a blatant excuse to get rid of him – the allegations were later proved false. Harper’s boss, Jersey police chief Graham Power, was also outrageously suspended and neutralised as part of this.
More than a hundred people came forward claiming to have been sexually and violently abused at the Jersey home and Lenny Harper has confirmed that Jimmy Savile’s name came up early in his investigation but with not enough evidence to charge him at the time. Savile denied any knowledge of ever being at the home, but a picture emerged of him at the home to show that he was lying.

Highly significantly, the name of Edward Heath, the British Prime Minister between 1970 and 1974, has also emerged in relation to abuse at Haut de la Garenne and to Jimmy Savile. I named Heath as a serial child abuser and killer and practicing Satanist in The Biggest Secret seven years before he died in 2005.

A local newspaper reporter, or an excuse for one, contacted Heath when the book was published in 1998 and read him the passage. He replied with the usual ‘Icke is crazy’ response and did nothing else. The reporter, a Charlotte Hofton, condemned me for attacking a ‘nice old man’.

I had spoken to many people who said they had been abused by Heath and witnessed his sexual abuses and satanic child murders, while I was told about Savile by those who knew from having access to the ‘inside’. I was therefore confident enough, with direct contract with the abused themselves, to name Heath in the book and defend any libel action. But that never came because what I said was true.

Those who survived Heath’s abuse were the minority. He loved to torture children and then kill them, often by cutting their throats. This was the man who ran Britain for his masters for four years as prime minister and signed us into the fascism that is the European Union.

Heath was famous as an ocean-going sailor in his yacht Morning Cloud which he used to sail to Jersey and visit the children’s home, Haut La Garenne. According to some sources it was Jimmy Savile who supplied children for Heath that would be abused at sea and probably never return.

Savile had many close and intimate contacts in British politics and he boasted that he spent Christmas with Prime Minister Margaret Thatcher and her husband Dennis every year for a decade. Thatcher replaced Heath as leader of the Conservative Party and many of her government ministers were paedophiles.

Edward Heath and Lord Mountbatten, who first introduced Savile to the royal family, have also been connected by some researchers to the Kincora Boys Home in Belfast, Northern Ireland, the centre of another paedophile ring scandal that broke in 1980. It was clear that the authorities knew what was going on for years before that, but did nothing.

Kincora was a home for working class boys, the very type of kids which Mountbatten was said to be most keen to abuse. Kincora children would also be taken to castles and other homes of the rich and aristocratic families, some of whom were connected to the Irish branch of the Hellfire Club. This is the Satanic network established in the 18th century by British politician and Chancellor of the Exchequer, Francis Dashwood, 15th Baron le Despencer, and his close friend, American hero, Benjamin Franklin.

Three members of staff at Kincora were jailed, including William McGrath, a friend and associate of Northern Ireland’s most famous politician, Ian Paisley, but none of the elite clientele were ever investigated, let alone named and charged. The official inquiry (anything but) decided there was no wider ring operating from the home when that was clearly absurd.

The same happened when a paedophile ring was exposed at children’s homes in North Wales in the 1990s, including the Bryn Alyn home in Wrexham. Policemen, social workers and prominent public figures were named during public sessions of the North Wales Child Abuse Tribunal by those abused, but its chairman, Sir Ronald Waterhouse QC, threatened the media with High Court proceedings if the names were published.

First Waterhouse said that this ban applied only to people who were alive and who did not have previous convictions for child abuse. Then he banned the naming of a man who had died 16 years before and another with two convictions of abusing children in North Wales homes. All together now…

Lord McAlpine – denies involvement.

The UK Guardian went so far as describing one of those named as ‘A man who bears the same surname as a prominent Conservative supporter’. The report added that two witnesses had told the tribunal of a rich and powerful man who belonged to the alleged ring.
The now defunct Scallywag magazine named Lord McAlpine, a treasurer of the Conservative Party, and also Derek Laud, a leading ‘mover and shaker’ in Conservative administrations. Both were close friends of long-time Conservative Prime Minister Margaret Thatcher, a close friend of Jimmy Savile. McAlpine and Laud denied the allegations. I am not saying that Margaret Thatcher knew about Savile’s background, only that his friendship with her reveals his connections into the Conservative Party at the highest levels.

Scallywag also alleged that MI5 took foreign diplomats to the North Wales homes and secretly filmed them abusing and torturing boys to use the tapes for blackmail. This is a classic Intelligence modus operandi with regard to child abuse by the famous and influential – especially politicians that they want to control..

Paedophiles and Satanists pervade the world of politics, royalty, banking, corporations and media and it is just as rife in the UK Labour and Liberal Democrat parties as it is in the Conservatives – and among the Democrat and Republican elite in the United States.

-
War criminal and long-time Prime Minister Tony Blair represented the paedophile-infested Labour Party (see website link after this article) and at his private school, Fettes in Edinburgh, Scotland, he was a close friend of its chaplain, the Very Reverend Dr Ronald Selby Wright, who was known as a persistent paedophile. Edinburgh is a major centre for elite paedophilia and secret societies. Wright was a Church of Scotland Moderator and Chaplain to the Queen and the Fettes historian Robert Philip once said that the young Blair looked up to Dr Wright as a `spiritual mentor’. Philip said: `When Mr Blair was having trouble with the establishment, he confided in Ronald. I think a lot of seeds for his religious faith were sown there.’

And what else?

Tony Blair is reported to have blocked the exposure of famous names during Operation Ore – Operation Avalanche.

Tony Blair is reported to have blocked the exposure of famous names in law, business and politics, including some in his own cabinet, during the police investigation into paedophile Internet activity known as Operation Ore, which came out of the FBI investigation in the United States called Operation Avalanche. Neither convicted any of the big fish – as usual.

The figures in Operation Ore were enormous: 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned; 140 children removed from suspected dangerous situations. But still no major names in the paedophile-infested elite levels of society. Operation Avalanche in the US produced 35,000 Internet records, but only 100 charges.

Blair was leader of the Labour Party at the time of the mass killing of children by known paedophile Thomas Hamilton who walked into Dunblane Primary School in Scotland in 1996 and shot dead 16 children and a teacher before killing himself. Hamilton, like Savile, was a procurer of children for ‘pillars’ of the Establishment.

Scottish judge Lord Cullen was appointed to head the official inquiry into Dunblane and he ordered that significant documents relating to the case should be locked away from public view for a hundred years. He said that this was to protect the victims and families when anyone with a brain could see that it was to protect the Establishment.

Cullen also led the five-judge tribunal which heard the appeal against conviction of the (innocent) Lockerbie bomber Abdelbaset Ali al-Megrahi and decided that he was guilty. It was revealed that Lord Cullen is a member of an elite Freemasonic group based at Edinburgh University known as The Speculative Society.

Lord Burton, a former Grand Master of Scottish Freemasonry, told a British Sunday newspaper that Cullen’s ‘inquiry’ was a cover up that suppressed crucial information and he linked Cullen to what he called the ‘Super Mason’ Speculative Society. He said that he had been bullied and threatened by other members of the House of Lords when he tried to raise his concerns about a Dunblane cover-up. ‘There’s no escaping the fact that there’s something sinister about the whole affair’, he said.

Thomas Hamilton wandered around Queen Victoria School, Dunblane’s only private boarding school – just like Savile did in girls’ homes and hospitals – and these people are given so much protection and free rein because they are the sources of children for the paedophiles that run government and law enforcement.

Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control.

Jimmy Savile’s involvement with politicians goes back to the 1960s and he has been a ‘friend’ of so many who have dictated the direction of national and even world affairs, including the long-time Labour Prime Minister, Harold Wilson, who I have exposed in my books as a Rothschild front man and manipulator fully aware of the Orwellian world that he was helping to create. Savile was also associated with paedophile Liberal Party leader Jeremy Thorpe and the London gangland villains, the Kray twins, who are also reported to have provided children for the famous.

The network is just so vast – and global.

Jimmy Savile was also closely associated with convicted pop music paedophiles, Jonathan King and Gary Glitter (who he publicly defended after Glitter’s conviction) and he was into far more than child molestation. Satanists get their biggest ‘high’ from having sex with dead bodies and some paedophiles get their ‘high’ from sex with mentally and physically disabled children. Savile’s charity work gave him access to both.

He was a volunteer porter at Leeds General Infirmary and had his own room at Stoke Mandeville Hospital, with its world-renowned spinal injuries unit, and the Broadmoor psychiatric hospital. Allegations of abuse have come from all three and it is said to have happened with the knowledge of staff. Some children were told by staff to act as if they were asleep when Savile came round to avoid his sexual abuse. Hospitals have mortuaries and Savile’s fellow BBC radio presenter Paul Burnett said without knowing the significance: ‘He did a lot of work as a porter in the [Leeds] hospital that he collected money for. He would go there at night and work as a porter.’ Yes, and what else?

None of this wider background is appearing in the mainstream media. The story is being sold as a famous paedophile being exposed, but of most importance to the big picture here is that Savile was a procurer of children for those in positions of national and international power.

Savile died extremely rich and no one seems to be asking where all that came from. Okay, he would have earned well enough in his prime with television, advertising and personal appearances, but he has done none of that with any serious earning capacity for a long time.

Yet he still owned a £160,000 Rolls Royce and had five other cars including a Bentley Turbo and Mercedes 500 SL. He also reported to have owned at least eight homes and left millions in his will on top of that. Where did all the money come from into old age to keep that scale of lifestyle going?

The answer is that child procurement for elite paedophiles is a very lucrative business and also ensures you protection from the law so long as you keep the secrets because if you go down so do your clients. This is why Savile could boast that he was untouchable. He told television presenter Louis Theroux: ‘I can get anything. There’s nothing I can’t get, and there’s nothing I can’t do.’

Those who stay quiet are protected. Those who threaten to speak out are soon dead. The latter was not going to happen to Savile who knew how the game worked and played it for his personal benefit.

Savile was so good at what he did – ‘working deep cover’ – that he was made a member of the Knights of Malta, an elite secret society that I have long exposed in my books, and awarded a papal knighthood by Pope John Paul II in a show of thanks and admiration from the biggest paedophile racket on Earth, the Roman Catholic Church. He was also awarded a knighthood by his friend the Queen and the Establishment in general.

Paedophile and Satanic rings are just that – rings, networks. They include people in all walks of life from politics, law enforcement, judiciary, banking, corporations and media, and they watch each other’s’ backs because their own backs depend upon it.

This happens the world over and most certainly in the United States, as I have widely exposed, and involves a mass of prominent people including US presidents like Father George Bush and major manipulators like Henry Kissinger.

Children’s homes and government mind control programmes are the major source of children for the American ‘elite’. High on the list is Boys Town, Nebraska, which is also known as ‘Father Flanagan’s Boys’ Home’ after its founder, Roman Catholic priest Father Edward J. Flanagan. He established Boys Town in 1921 for the ‘care, treatment, and education of at-risk children’.

If you read the book, The Franklin Cover Up, by former Nebraska state senator, John W DeCamp, you might wonder when the children are most ‘at risk’ – before they go to Boys Town or after. The story almost got out at one point during the Reagan and Bush administrations, but was quickly covered up after this was published in 1989.

So the question is why? Why is paedophilia so all-pervading in these elite levels of human society? The answer is that entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general, but the energy they want more than anything is that of children before puberty.

The hormonal changes that happen at puberty are only holographic expressions of deeper energetic changes and the entities want that energy before those change takes place. When the paedophile is having sex with the child the possessing entities are using the paedophile as a conduit to draw off the child’s life-force.

The bloodline-possessed are genetically and energetically stimulated to desire sex with children and when they get what they want the entities get what they want – the child’s energy. This requires an endless supply of children to constantly repeat this process and this is where the Jimmy Saviles and Thomas Hamiltons come in.

I see that I have written 5,500 words in this article and yet I could have written 30,000 and still not told the whole story of how Satanism and paedophilia are the foundation and connecting tissue of the global network of human suppression.

People find it so hard to go there, or to accept what appears to be so fantastic, but if the Savile story continues to be pursued tenaciously, and with an open mind, it can open a doorway to expose the darkest of dark.

Source: DavidIcke.com

RELATED STORY: BEN FELLOWS FULL INTERVIEW ON LIVE – EXPOSING BBC CHILD ABUSE /// RELATED STORY: 'I RAN THE GAUNTLET OF PEDOPHILES IN THE ENTERTAINMENT INDUSTRY' /// RELATED INTERVIEW: Blowing the Lid on Child Abuse in Entertainment – The Ben Fellows Radio Show

Labour25 – paedophiles in the UK Labour Party - http://labour25.com/

David Icke – Knock Knock … Who’s There? Your Apathy! (Viewer Discretion Advised) Click here to watch …

/// BELOW THE FOLD: More from Wayne Madsen & Christopher Story on disturbing pedophile networks, perhaps even the Illuminati / German authoritarian connection to PM Heath, & more ////

TRAILBLAZERs unite! Q2 & Turnkey Dictatorship, the Great Game of All the Internets & Jewel vs NSA: warrantless wiretapping lawsuit moves forward with William Binney, Thomas Drake & J. Kirk Wiebe

NSA-restructure-workstations-windows.png
TRAILBLAZER related NSA workstation privatization schema in FOUO document --- SOURCE WayneMadsenReport.com - http://www.waynemadsenreport.com/downloads/20110322_2/download - March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial (reposted/mirrored below)

Memorable scenes in "J. Edgar," the unsung biopic of FBI über-cryptocrat J. Edgar Hoover directed by Clint Eastwood, highlighted Leo DiCaprio's Hoover essentially blackmailing politicians like Robert F. Kennedy & Franklin D. Roosevelt over the decades with potentially embarrassing recordings and snippets. He reminisces with his partner-for-life Colson how well it goes every time.

Now there's an entire corporate contractor sector, nicknamed the Eagle Alliance, which has taken over many core National Security Agency functions, and each one of them are in a position to pull Hoover-like shenanigans to control the political system. This system of leverage & blackmail was described in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider" as the "Control Files."

NSA-Spying-Logo.pngJames Bamford’s NSA, the agency that could be Big Brother: [old link busted, google it :P ]

"That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide."

He added that if a dictator ever took over, the NSA "could enable [him] to impose total tyranny, and there would be no way to fight back."

At the time, the agency had the ability to listen to only what people said over the telephone or wrote in an occasional telegram; they had no access to private letters. But today, with people expressing their innermost thoughts in e-mail messages, exposing their medical and financial records to the Internet, and chatting constantly on cellphones, the agency virtually has the ability to get inside a person’s mind…

"I don’t want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."

Let's hop on down the rabbit hole. The National Security Agency and its beleaguered whistleblowers are back with the Internet's Lawyers Guild - aka the Electronic Frontier Foundation, who have saved the day on countless occasions. Now they are kicking it up a notch with a lawsuit against the 'state secret' everyone knows about -- corporate contractors copying everyone's private domestic communications.

The effort to cover up these programs - MAIN CORE, PINWALE and STELLAR WIND are thought by many to be major original code names for this. Corruption in outsourced programs such as TRAILBLAZER - which the feds went gonzo against Thomas Drake to cover up, form the texture of this story, along with the final total panopticon system which Frank Church feared. [ see earlier Hongpong.com: The late great Robert Nichols, a $250 billion Treasury Note, the Octopus Wiki (all your Iran-Contra/PROMIS style tiebacks) and Main Core, to boot // LinkBatch for August 19th 2010: In-Q-Tel CIA front funded Google Earth; Insane Clown Posse; Microdrones; Fructose tumors; Hamid Gul // Dec 2008: "The World's Largest Hedge Fund is a Fraud" but no one cared: More misc madness for Monday:

'Stellar Wind' revealed by Tamm: The grand illegal wiretapping plan was called Stellar Wind, Newsweek reveals. Good stuff. So: Stellar Wind was the sniffer, MAIN CORE is/was the master repository and/or query system into other databases, the Google or PROMIS tap to the various pockets of data... Datas fed by stuff like Stellar Wind.

See also May 2008: cryptogon.com » The Last Roundup: MAIN CORE: (& subsequent refs)

In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.

Russell Tice, Former NSA SIGINT Officer

I’m going to provide a one paragraph summary, just to make sure that the implications of this are clear to everyone:

The U.S. Government has, almost certainly, established a database and tracking system for something like eight million Americans who have been designated as threats to national security. The system is called MAIN CORE and it is being run under the auspices of highly classified Continuity of Government (COG) operations. MAIN CORE uses a variety of intelligence sources as inputs, including your email, web activity, telephone and private financial information. In the event of a major national security crisis, it is alleged that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”

The Last Roundup, by Christopher Ketcham, appeared in the May/June 2008 issue of Radar Magazine. (mirror 1, mirror 2.)

Below are some excerpts from The Last Roundup. I have provided explicit pointers to the related materials on Cryptogon:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [See:AT&T Invents Programming Language for Mass Surveillance]

He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Electronic Frontier Foundation: Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program | Electronic Frontier Foundation

July 2, 2012

Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco - Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation's (EFF's) lawsuit against the government's illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the "secret room" at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

"For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people," said EFF Legal Director Cindy Cohn. "Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We're extremely pleased that more whistleblowers have come forward to help end this massive spying program."

The three former NSA employees with declarations in EFF's brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

"The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret," said EFF Senior Staff Attorney Lee Tien. "Yet the government keeps making the same 'state secrets' claims again and again. It's time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance."

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
   Legal Director
   Electronic Frontier Foundation
   cindy@eff.org

Lee Tien
   Senior Staff Attorney
   Electronic Frontier Foundation
   tien@eff.org

/////////////////////

Jewel v. NSA | Electronic Frontier Foundation

In Jewel v. NSA, EFF is suing the NSA and other government agencies on behalf of AT&T customers to stop the illegal unconstitutional and ongoing dragnet surveillance of their communications and communications records.

Filed in 2008, Jewel v. NSA is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it. Evidence in the case includes undisputed documents provided by former AT&T telecommunications technician Mark Klein showing AT&T has routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA. That same evidence is central Hepting v. AT&T, a class-action lawsuit filed by EFF in 2006 to stop the telecom giant’s participation in the illegal surveillance program.

In addition to suing the government agencies involved in the domestic dragnet, Jewel v. NSAalso targets the individuals responsible for creating authorizing and implementing the illegal program including former President George W. Bush, former Vice President Dick Cheney, Cheney’s former chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales, and other individuals who ordered or participated in the warrantless domestic surveillance.

The Obama administration moved to dismiss Jewel in 2009, claiming that litigation over the wiretapping program would require the government to disclose privileged “state secrets” and that it was immune from suit. The court instead ruled that the case should be dismissed on standing grounds.  Fortunately, in December of 2011, the 9th U.S. Circuit Court of Appeals ruled that Jewel could proceed in district court.

/////////////////////

There aren't that many journalists who regularly cover the National Security Agency, and it's pretty obvious this beat is a shortcut to catching major gangstalking from a whole passel of shadeballs. What better way to see who SAIC will send if you piss them off & expose their enormously profitable contracting rackets & fraud?

James Bamford first wrote The Puzzle Palace, the first book on the NSA which established a great deal for the public about how it operated. His much more recent book The Shadow Factory described a number of major developments since then, including the backbone tapping system which is a major part of Jewel v. NSA.

SEE James Bamford April 2012 WIRED article: Shady Companies With Ties to Israel Wiretap the U.S. for the NSA // March 2012: The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

James Risen with the New York Times is another -- perhaps adjacent to Julian Assange, with a subpoena commanding him he is now in the crosshairs of perpetual federal investigations into the leaking of the warrantless wiretap program that finally abrogated the Fourth Amendment once and for all. NYT May 2011:

In a 30-page motion that prosecutors filed on Monday, they argued that the First Amendment did not give Mr. Risen the right to avoid testifying about his confidential sources in a criminal proceeding. The Justice Department argued that Mr. Risen was a witness and should be compelled to provide information to a jury “like any other citizen,” contending that there was no basis to conclude “that the reporter is being harassed in order to disrupt his relationship with confidential news sources.”  

DC alternative journalist Wayne Madsen, while derided by many in the mainstream & liberal networks as a conspiracy theorist etc (and I wouldn't be surprised if certain factions try to use him to plant early disinfo & poison the well in obscure stories - as often happens with journalists on weird beats) overall Wayne has kept coming up with the goods on the NSA, clearly with a number of inside and veteran sources. Code names in this case STELLAR WIND and PINWALE first entered the public arena via Madsen's site WayneMadsenReport.com.

Madsen has covered the travails of William Binney, Thomas Drake & J. Kirk Wiebe, in particular Drake over the years. Drake's case in particular involves the interests of sketchy Israel-linked contractors in penetrating Americans' private communications using backdoors such as the Narus Verint wiretapping boxes placed on Internet backbone sites, which first surfaced because of whistleblower Mark Klein, who had installed the fiber optic splitter running domestic backbone signals en masse into the 'secret room'.

Anyway much of this is available over In-Q-Tel I mean CIA I mean Google, but the stuff on WayneMadsenReport.com is not. I asked Wayne a while ago and he basically asks for a day or two (or several) for people to refrain from reposting his material outside the paywall. I ask that you support independent journalism - I am reposting these now for general public interest because the situation has finally 'broken out' a little more.

/////////////////

WAYNEMADSENREPORT.COM ITEMS:

APRIL 2012: Let's start on the late side with a April 2012 backgrounder that finally establishes a great deal of the crusade to crush Thomas Drake. It gets to, what else, Israeli contractors and extreme corruption. Plus it has tons of nice NSA program code words.

April 5-6, 2012 -- The background to the Israeli penetration of NSA - Wayne Madsen Report

In June 2005, WMR's first report at itgs inception dealt with Israeli intelligence penetration of the National Security Agency. Our friend and colleague Jim Bamford has written about further details of this penetration in an April 3 article in Wired titled "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA." In the article, Bamford describes the penetration of NSA's ultra-secret surveillance technology research and development "skunk works," the Signals Intelligence Automation Research Center (SARC), located at NSA's headquarters on the third floor of Operations Building 2B, a few doors down from the center where NSA monitored sensitive government communications in Russia.



The SARC is where companies linked to Israel helped set up NSA's controversial and top secret warrantless eavesdropping program code-named Stellar Wind. SARC's chief of staff, J. Kirk Wiebe, and the center's co-founded, Bill Binney, realized that a private company with links to Israel, Technology Development Corporation (TDC), a two-man operation with an Annapolis Junction post office box run by two brothers, Randall and Paul Jacobson of Clarksville, Maryland, was running the Stellar Wind operation using software and equipment provided by two Israeli firms, Narus, later bought by Boeing, and Verint, owned by Comverse Technology, formerly Comverse Infosys. Both companies were formed by ex-Unit 8200 personnel. Unit 8200 is the Israeli counterpart of NSA. The NSA program manager for Stellar Wind was Ben Gunn, a U.S. naturalized Scotsman who once worked for Britain's NSA equivalent, the Goverfnment Communications Headquarters (GCHQ) in Cheltenham, UK.

Rather than investigate the Jacobsons, Gunn and their Israeli interlocutors, FBI agents raided the homes of Wiebe and Binney and confiscated their computer equipment as part of the failed Justice Department investigation of former NSA official Thomas Drake, the whistle blower who exposed massive contract fraud and illegal surveillance by NSA.


Paul Jacobson had his security access pulled by NSA in 1992 and he later changed his name to "Jimmy Carter" and "Alfred Olympus von Ronsdorf." Randall Jacobson continued working for NSA and when Science Applications International Corporation (SAIC) was brought in to run the nascent Stellar Wind program, taking over from TDC, Randall Jacobson tipped Binney off to the illegal nature of the eavesdropping program, which included installing wiretapping rooms in some 20 telecommunications company switches around the United States, including the one exposed by former AT&T technician Mark Klein that was installed at the AT&T switch in downtown San Francisco.

Binney told Bamford that the NSA's advanced eavesdropping and data mining high-data analytical software may have been originally passed to Israel by a pro-Israeli technical director in NSA's Operations Directorate. The original software helped Narus and Comverse/Verint to improve on the work already performed by NSA and more advanced systems were then sold back to the NSA. The major compromise of NSA technology to the Israelis should have been made known to Binney, who was then the chairman of the NSA's Technology Advisory Panel, which monitored the signals intelligence capabilities of foreign nations. Rather than pass on to NSA the intelligence "take" of Unit 8200 using the NSA technology, Binney told Bamford that he believed that the Israeli government simply passed on the technology to Israeli start-up companies that used the NSA-developed know-how to spy on foreign countries, including the United States, and sell the technology back to countries like the United States.

The Israeli penetration of NSA was brought to WMR's attention by NSA personnel in June 2005. One of the firms mentioned as being involved in the compromise to Israel was CACI, part of an alliance of NSA contractors called the "Eagle Alliance." WMR reported: "CACI, called 'Colonels and Captains, Inc.' by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations."

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel.

Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods.

In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

[On June 5, 2005, WMR followed-up its story of Israeli spying at NSA: "Veterans of the RCA-NSA-Israeli joint SIGINT program code named DINDI report that Israeli engineer spies used the carve out contract with NSA, through RCA, to gain access to NSA and U.S. Navy secrets. In an RCA facility in Mount Laurel, NJ, the Israeli engineers had their own secured lab, and for three years that DINDI ran, they were walking out with their briefcases loaded with equipment, including scopes. When RCA engineers finally gained access to their lab, they found the prints laid out for the Trident missile system. RCA had an ongoing contract top develop the Trident communications suite at the time of the security leak. The Israeli engineers on DINDI claimed they were from the Israeli Air Force but months later, an RCA engineer was in New York and he ran into the same Israelis, but they were wearing Israeli Navy uniforms. One ex-RCA engineer commented about the DINDI Israeli spies: 'They were all a nice bunch of guys, even when they had their hands in your pockets.'] One RCA contractor for NSA later told WMR that the RCA program manager for DINDI, a Jewish engineer who he only named as "Irv," permitted the Israelis to rummage through NSA and RCA classified information.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual 'Fort Knox' of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person [then-NSA director Michael Hayden] hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, 'She's highly qualified to work in intelligence!'

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or 'WINTEL' environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to 'provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA.' This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: 'Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program.' The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

Hayden was later "rewarded" for his actions at NSA by being named the first deputy director for the Directorate of National Intelligence (DNI) and, later, director of the Central Intelligence Agency. After retiring, Hayden began working for former Department of Homeland Security Secretary Michael Chertoff, who has also been alleged to have close contacts with Israeli intelligence, at Chertoff Associates.

A journalist who previously covered the Justice Department for a major wire service told WMR that FBI agents and Justice Department prosecutors are dissuaded from investigating spies for Israel since it is known to be a "career killer" at both agencies. Moreover, Justice prosecutors have two sets of guidelines when it comes to prosecuting spies. One set calls for maximum treatment, including major criminal charges and heavy prison sentences and fines, for American spies who are charged with spying for Russia, China, Cuba, or Iran, and the lightest charges and penalties for those charged with spying for Israel, especially if they are Jewish.

//////////

Now back to the earlier material.

APRIL 2010: April 16-18, 2010 -- SPECIAL REPORT. The hidden hands behind the Thomas Drake indictment - Wayne Madsen Report

There is much more to the Obama administration's indictment on April 15 of former NSA senior executive Thomas Drake by the US Attorney for Maryland, Rod Rosenstein, a Bush holdover who has brought similar politically-motivated criminal charges against other NSA personnel. Drake is charged with ten criminal counts, including leaking classified information to a newspaper. WMR can confirm the paper is The Wall Street Journal and the reporter at the Journal who received Drake's information is Siobhan Gorman, who was also subject to electronic surveillance by the NSA and FBI while she was with the Journal and previously, The Baltimore Sun. Other charges brought against Drake, who continued to work for the NSA as a contractor after stepping down as an NSA executive, include obstruction of justice and making false statements to a federal law enforcement official.

Since leaving his executive position with the NSA, Drake has served as President and Chief Operating Officer of National Technologies Associates, Inc. of Alexandria, Virginia. The firm has revenues of $50 million and employs 600 people. Before NSA, Drake was an information technology and management consultant with Coastal Research & Technology, Inc. (CRTI).

While at NSA, Drake worked in the Signals Intelligence Division (SID), the group responsible for eavesdropping on foreign communications and, since the advent of warrantless domestic surveillance, domestic U.S. communications, as well.

WMR can report that as part of the Drake investigation, Gorman and the Wall Street Journal were subject to STELLAR WIND, warrantless wiretapping, as late as last year. The surveillance began when Gorman wrote a series of articles between 2006 and 2007 on NSA contracting cost overruns and mismanagement, information that was first reported by WMR in 2005.

From WMR, May 27, 2005: Up to now, little has been reported on how the Bush administration’s disastrous intelligence policies have affected the super secret National Security Agency (NSA). According to NSA insiders, the chief U.S. signals intelligence (SIGINT) collection agency has been wracked by much of the same internal feuding, senior management failures, and external political pressure that have plagued other U.S. intelligence agencies, including the CIA, FBI, Defense Intelligence Agency, National Geo-spatial Intelligence Agency, and National Reconnaissance Office.Drake's prosecution by the Obama administration represents a continuation of a "witch hunt" by NSA and its Stasi-like Security unit, the "Q Group," to plug all leaks from the signals intelligence and cyber-warfare agency even if the information provided to the media concerns criminal conduct like contract fraud, sexual misconduct, illegal surveillance of American citizens, and illegal "sneak an peek" break-ins of the homes of NSA employees and contractors by NSA Q Group personnel and FBI agents.

NSA insiders lay blame for the problems at NSA’s Fort Meade, Maryland headquarters squarely on the shoulders of agency Director Air Force General Michael V. Hayden and his small coterie of close advisers, a few of whom have no substantive intelligence background. Hayden has been NSA Director since March 1999, the longest tour for any NSA Director. Not only did the White House extend Hayden’s NSA tour, but also nominated him to be the first Deputy Director of National Intelligence, where he will serve under John Negroponte.

Hayden’s reign at NSA has been marked by the emaciation of the career civilian corps through forced retirements and resignations, outsourcing of government positions to contractors, intimidation, forced psychiatric and psychological examinations for "problem" employees, increased workloads for shift personnel with no personnel augmentation, unreasonable personal searches by security personnel, and withholding salary increases for career personnel. A number of NSA employees are suffering from stress and fatigue and that is adversely affecting their job performance.

One of the most pervasive operational problems at NSA stems from the fact that when newly trained civilian and military linguists, analysts, and other operational personnel arrive at NSA for duty and are integrated into various operational work centers, they are soon quickly transferred to Iraq. This puts an inordinate workload on the career civilian NSA personnel . . .

Career NSA personnel claim that their most senior member, Deputy Director of NSA William B. Black, Jr., shows little interest in their plight. One long-time NSAer said Black often nods off at Hayden’s staff meetings. In 2000, Black, a retired NSA employee with 38 years of service, was rehired by Hayden from Science Applications International Corporation (SAIC) to be his deputy. Hayden’s selection of Black from outside the agency was considered a slap in the faces of those line NSA officers who would have been normally considered next in line for promotion to the much-coveted post. That slight began to severely affect agency morale a little over a year before the September 11, 2001 terrorist attacks on New York and Washington.

After 911 and subsequent revelations that NSA had intercepted two Arabic language phone calls on September 10, 2001 ("Tomorrow is zero hour" and "The match is about to begin") that indicated an imminent attack by Al Qaeda but failed to translate and analyze them in a timely manner to be effective, Hayden was looking for scapegoats. According to NSA insiders, he found one in Maureen A. Baginski, the Director of NSA’s Signals Intelligence (SIGINT) Directorate. According to the NSA insiders, Baginski, a 27-year NSA veteran and Russian and Spanish linguist, was set up for a fall by Hayden and his team. In 2003, Baginski was named Executive Assistant Director of the FBI for Intelligence. According to NSA sources, it was Baginski who carried out Hayden's directives that farmed out many Fort Meade functions to other facilities. Another Hayden project, "Groundbreaker," the outsourcing of NSA functions to contractors, has also been used by Hayden’s advisers to assign blame for the 911 failures at NSA. According to NSA insiders, Groundbreaker has been a failure . . .

Another one of Hayden's projects that has been criticized by the NSA rank-and-file is "Trailblazer," the program to modernize NSA's SIGINT systems. For example, operators in U.S. electronic warfare aircraft rely on NSA to provide accurate electronic intelligence (ELINT) data in order to program their radar warning receivers and jamming pods. However, NSA data, provided from two databases known as EPL (Emitter Parameter List) and "Kilting." 70 percent of NSA's ELINT data is 30 years old. NSA management has forced field operators to use raw ELINT intercept data, culled from a database called "Wrangler," to program their ELINT systems. NSA operations and software engineers believe this function should be handled by NSA and not the "warfighters." Updated ELINT data is handled by ELINT Technical Reports or "ELTs." In 2003, the year the Iraq war started, there were 938 ELTs submitted on new emitter data. However, there were only 200 updates made to the ELINT databases.

The failure to update the ELINT databases may have had disastrous consequences in Iraq. For example, EPL and Kilting do not contain data on air traffic control radars and microwave communications links. Because current ELINT systems cannot differentiate between commercial signals and hostile target tracking emitters, U.S. forces in Iraq have launched attacks on non-threat targets in the belief they were hostile. NSA sources report that many of the cases of fratricide in Iraq has been due to faulty or old ELINT data. For example, the failure by NSA to update ELINT data and provide emitter parameter data to warfighting units led to the accidental shootdown by a Patriot missile of a British Royal Air Force Tornado fighter in March 2003 near the Iraqi-Kuwaiti border at the outset of the Iraq campaign. Two British crew members were killed. The ELINT data used by the Patriot misidentified the Tornado as an enemy missile and the U.S. Army blamed the British crew for the mistake, claiming they failed to switch on its Identification Friend or Foe (IFF) equipment. NSA insiders claim that allegation was false. They claim that "blue signals" (friendly) are not adequately included in the emitter data sent to field units by NSA and that claims by the Pentagon that the Tornado was shot down due to pilot error were false.

In other incidents, the radar warning receivers (RWRs) on U.S. F-16s flying over Iraq have either evaded or fired AMRAAM (Advanced Medium-Range, Air-to-Air) missiles on microwave communications towers because the microwave signals were identified as threat emitters from hostile aircraft. U.S. jammers are also adversely affected by the failure to update ELINT data.

In fact, many of NSA's developmental ELINT systems, with cover names like Beikao, Boomvang, Canyondust, Cape Lookout, Chartvein, Eagle Reach, Galaxydust, Harpstring, Hokusai, Irish Den, Jetavator, Monocle, Needleice, Platoonwolf, Quadrunner, Radiant Spruce II, Roman Alliance, Seadiver, Shadowboxer, Sharkbite, Shiloh, Starquake, Stouthearted,and Sunbeaver are not found in the master NSA ELINT project database, which also has a cover name: Brasscoin.

Many of NSA's other SIGINT systems are in the same conundrum. Rather than simplify and modernize NSA's SIGINT development and deployment, Trailblazer has done nothing to modernize or cut acquisition costs. In a suspicious move by NSA, the Trailblazer contract was sole-sourced to SAIC, the firm from which Hayden hired his deputy director. As with Groundbreaker, Trailblazer's contractors consist of a team led by a prime contractor. Trailblazer's team overlaps with Groundbreaker -- companies like CSC and Northrop Grumman are also found on the Trailblazer team. Booz Allen Hamilton and Boeing are also on the SAIC team. According to NSA officers, one SAIC official left the firm to work for Hayden at NSA during the time the Trailblazer bidding process was underway. The individual then returned to SAIC as a senior vice president, according to NSA sources. NSA employees, upset about the control that SAIC now has over the agency, refer to NSA as "NSAIC." . . .

At his Senate Select Intelligence Committee nomination hearing for Deputy Director of National Intelligence, Hayden confirmed that Trailblazer was over budget and behind schedule. He told the committee that Trailblazer's "cost was greater than anticipated in the tune, I would say, in hundreds of millions." Hayden confirmed the report of the joint congressional committee that probed the 911 intelligence failures that Trailblazer was several years behind schedule. NSA sources claim that Trailblazer is at least five years behind schedule and $600 million over budget.

However, the career NSA operational personnel may be getting squeezed not so much for policy and management differences but because of what they know about the lies of the Bush administration. In addition to the obvious lies about Iraqi WMDs, many personnel are well aware that what occurred on the morning of 911 was not exactly what was reported by the White House. For example, President Bush spoke of the heroic actions of the passengers and crew aboard United Flight 93 over rural Pennsylvania on the morning of 911. However, NSA personnel on duty at the NSOC that morning have a very different perspective. Before Flight 93 crashed in Pennsylvania, NSA operations personnel clearly heard on the intercom system monitoring military and civilian communications that the "fighters are engaged" with the doomed United aircraft. NSOC personnel were then quickly dismissed from the tactical area of the NSOC where the intercom system was located leaving only a few senior personnel in place. NSA personnel are well aware that Secretary of Defense Donald Rumsfeld did not "misspeak" when, addressing U.S. troops in Baghdad during Christmas last year, said, "the people who attacked the United States in New York, shot down the plane over Pennsylvania." They believe the White House concocted the "passengers-bring-down-plane" story for propaganda value.

Morale at NSA has plummeted from repeated cover-ups of serious breaches of security by senior officials. While rank-and-file employees are subjected to abusive psychological and psychiatric evaluations for disagreeing with summary intelligence reports provided to outside users or "consumers" and even for more mundane matters, others are given a pass. Ironically, one of the psychiatrists used by NSA to evaluate problem or disgruntled employees was recently found by police to be growing marijuana at his home in Crofton, Maryland.

In 2008, NSA and FBI surveillance of current and former NSA and Justice Department employees who were suspected of leaking information to the press about the NSA's super-classified STELLAR WIND warrantless digital surveillance program, called the "Terrorist Surveillance Program" by the Justice Department, was stepped up.

On March 10, 2008, Gorman wrote an article for the Journal titled, "NSA's Domestic Spying Grows As Agency Sweeps Up Data." Gorman wrote:

"According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called 'transactional' data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected."

The previous year, as WMR reported in May 12, 2009, former Justice Department prosecutor Thomas Tamm's home was invaded by a SWAT team of federal agents:

In 2007, Tamm's home in Potomac, Maryland was raided by zealous FBI agents who suspected him of leaking details of the so-called "Terrorist Surveillance Program" (TSP) to journalists. Tamm tried to inform Congress about the illegal program but was rebuffed by, among others, the ranking Democrat on the House Judiciary Committee, Representative John Conyers (D-MI).

At the time of its inception after 9/11, the TSP or as NSA and the Oval Office referred to it, "Stellar Wind," was so classified that only the Attorney General and one other person in the Justice Department knew about it. The TSP totally bypassed the Foreign Intelligence Surveillance Act (FISA) warrants that the OIPR prepared for approval by the Foreign Intelligence Surveillance Court (FISC). U.S. Judge James Robertson was so incensed about the bypassing of the FISC, he resigned from it in protest on December 20, 2005. U.S. Judge Royce Lamberth, nominated by President Ronald Reagan and who served as Presiding Judge of the FISC until 2002, was also adamantly opposed to TSP and its systematic bypassing of his court.

WMR's report continued: Tamm was also the first person within Justice who corroborated what NSA personnel were reporting about the agency conducting illegal data mining. One of those individuals was NSA employee Russell Tice, who was also subjected to an FBI investigation and government harassment.

Although the government employees who brought attention to the high-level criminality involving the TSP/Stellar Wind were and, in some cases like that of Tamm, are still being investigated, no criminal investigations were brought against the telecommunications companies that participated in the criminal conspiracy to spy on Americans illegally. In fact, Congress gave the telecommunications firms immunity from lawsuits and prosecution as a result of a deal worked out with the Bush administration. One of those senators who voted for the immunity deal is Barack Obama.

After the FBI conducted interviews of all OIPR employees in their quest for the leaker, on August 1, 2007, 12 government vehicles pulled in front of Tamm's home in Potomac, Maryland. Eighteen armed federal agents wearing body armor stormed into Tamm's home while his wife was cooking breakfast. Tamm was removed from his home by the agents who spent seven hours going through his and his family's property. The FBI agents even asked Tamm if there were any "secret rooms" in his house. They also inquired about any weapons in the house and whether he had been visited at home by reporters from The New York Times.

The agents tore through every room, awakening Tamm's son and daughter. The agents seized all the lap top computers, including those of Tamm's children, and a 10-year old lap top. Also seized were the Tamm family's Christmas card list and a calendar with doctors appointments.

After two days, Tamm was offered a deal that he could plead guilty to a felony in return for his testifying against journalists, including the New York Times' James Risen, and their sources at the NSA. Three days later Michael Isikoff of Newsweek phoned Tamm -- someone had leaked information about the FBI raid to Isikoff. Tamm's identity as a source about the TSP was revealed by Isikoff in the December 22, 2008, issue of Newsweek.

In 2008, one of WMR's sources discovered that his home had been broken into and anything that could store digital data had been stolen: laptops, digital cameras, USB thumb drives, etc. Moreover, relatives of the individual discovered that the lock to their home had been drilled out in what was an obvious "black bag" sneak and peel operation.

That same year, this editor discovered that the lock to his apartment door at Potomac Towers in Arlington, Virginia had been drilled out by a circular saw drill bit that drilled around the lock cylinder. When the apartment maintenance man was called to check the lock, he discovered the fragments of the lock pins scattered on the floor at the base of the door. He stated at the time that he had never experienced anything like it in the past.

FBI and NSA surveillance of people affiliated with NSA continued through last week, with this editor and one of his sources being tailed in 2009 in the suburban Maryland suburbs of Washington, DC and an additional tail of a source being conducted last week in Annapolis, Maryland.

The indictment of Drake in reminiscent of the case brought against former NSA signals intelligence (SIGINT) analyst Ken Ford, Jr. in 2006. In March 2006, Ford was sentenced to six years in prison in a case replete with prosecutorial and judicial misconduct by Rosenstein, Assistant US Attorney David Salem, and US Judge Peter Messitte. On April 30, 2007, WMR reported: "Ford was set up in a clumsy Justice Department, FBI, and NSA Security Division operation to punish him for his May 2003 signals intelligence (SIGINT) analysis report that concluded, based on intercepts of Iraqi communications, there was no truth to the Bush administration’s claim that there were weapons of mass destruction in Iraq. Ford’s report, with his name and that of his supervisor on it, ended up on Vice President Dick Cheney’s desk. From that time on, Ford was a marked man for the neo-con cabal operating within the White House, Justice Department, Pentagon, and US Intelligence Community senior staff."

At one point during Ford's trial, Messitte called Ford to his bench and asked him if he had spoken to this editor. Ford replied that he had not, whereupon Messitte asked, "Is Mr. Madsen in the court room?" I was not present at the time but I was later told by an informed source that Messitte was prepared to call me to the stand to be asked about the sources of my stories on the case. Such a development would have required me to invoke my First Amendment rights, as the press is the only occupation identified by name in the Bill of Rights as being protected. There was a risk of a contempt ruling and possible federal prison had I been present during Messitte's "kangaroo court" proceedings.

Ford continues to serve his six year sentence at Lewisburg federal prison in Pennsylvania. Attorney General Eric Holder was sent a letter by Ford's parents on November 18, 2009, calling for the appointment of a special prosecutor in the case against their son. To date, Holder has not responded to the letter.

The letter follows:

November 18, 2009

SENT CERTIFIED MAIL / E-MAIL / FACSIMILE

RETURN RECEIPT

Honorable Eric H. Holder. Jr.

Attorney General of the United States

Honorable David W. Ogden

Deputy Attorney General of the United States

950 Pennsylvania Avenue, N.W.

Washington, D.C. 2053 0-0001

United States v. Kenneth Wayne Ford. Jr.

Criminal Case No(s): 04-cr-l l8JKS, 05-cr-0098PJM and 05-cr-0235PJM

Messrs. Holder and Ogden:

In the interest of justice, we, the parents of Kenneth Wayne Ford, Jr., ("hereafter Mr. Ford") request an immediate appointment of Special Counsel to investigate unwarranted prosecutorial misconduct, vehement malicious persecution and prosecution of Mr. Ford under the Espionage Act §793 (e) - Gathering, Transmitting or Losing Defense Information. On Wednesday, September 23,2009, President Obama mandated that DOJ establishes New State Secrets Policies and Procedures.1

President Obama's implementation of State Secrets and Policies encompasses matters in this case. Prosecutors knowingly and willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation throughout this case and trial. Mr. Ford was convicted under 793(e) - Espionage and 1801 - Making A False Statement On A Government Form. Mr. Ford was sentenced to 6 years in prison for Count 1 and 3 years in prison, to be served concurrently with Count 1, for Count 2. After imprisonment, Mr.

---------

1 “It sets out clear procedures that will provide greater accountability and ensure the state secrets privilege is invoked only when necessary and in the narrowest way possible...” Attorney General Eric Holder September 23, 2009

Ford is to be on probation for 3 years. He also was ordered to pay a $200.00 assessment. Mr. Ford began serving this unjust prison sentence on May 16. 2006. He has been in prison for over 3 years and 6 months for doing absolutely nothing, except being a patriotic American and a good person.

Not only is Mr. Ford innocent, but nothing happened. This case is totally fabricated by the FBI and all involved, specifically the prosecutors and judge know it. Mr. Ford is a victim of a hate crime, a malicious prosecution and a tragic rush to jail an innocent man. See North Carolina v. Seligmann 06-cr-4332-33 (Dismissed 4/712007), Franks v. Delaware, 438 U.S. 154 (1978) and Brady v. Maryland, 373 U.S. 83 (1963). These cases demonstrate that 'false' arrest can happen to anyone - as in the matter of distinguished Harvard professor Henry Louis Gates, Jr., one of the nation's pre-eminent African-American scholars, falsely arrested in his own home.

A. Prosecutors Willfully Withheld Exculpatory Evidence From Defense

DOJ prosecutors repeatedly invoked state secret privileges, suppressed evidence as classified and deliberately withheld from Mr. Ford's defense exculpatory FBI Search Warrant Affidavits for well over 19 months. Ultimately, these search warrant affidavits were suppressed from Mr. Ford's trial. We have recently discovered that these affidavits have never been filed and are not apart of Mr. Ford's official court file.

On December 15, 2005, United States Attorney For The District of Maryland Rod J. Rosenstein and Criminal Division Assistant Attorney General Alice Fisher issued a press release in Mr. Ford's case, which stated in part, that: (Though there was conflicting evidence of what Ford intended to do with the classified information - the jury's verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information". With the admission of Rosenstein that there existed "conflicting evidence" in Mr. Ford's case and the fact that the judge removed the required elements of 'belief... and intent...' from the jury instructions, should have rendered the indictment defective. (See Exhibit A - Rosenstein Press Release dated 12/15/2005)

FBI Special Agents Michael L. Thompson and Frederick C. Marsh both submitted sworn search warrant affidavits to a federal judge alleging that a Tonya Tucker had contacted the NSA to report Ford's alleged espionage. (Ford had known Tucker for 9 weeks - from 11/13/2003 to 1/11/2004 - and decided that she definitely was not his type. He later realized Ms. Tucker is a FBI confidential informant and was placed into his life by Special Agent Michael L. Thompson.) Defense counsel subpoenaed cell phone records of Tonya Tucker from Sprint, which clearly listed the voice call details of Date, Time. Phone Number. Destination, etc. (Tucker's alleged cell phone calls were described in the Thompson affidavit and completely identified in the Marsh affidavit.

From this, we were able to subpoena thru our attorney, her cell phone records.) Sprint records affirmed that Tonya Tucker Did Not contact NSA on January 5.2004. January 9. 2004. January 10. 2004 and January 11, 2004 from her cell phone number 407-616-5683 listed on the Sprint telephone record print-out and on page 5 of 12 of FBI Special Agent Frederick C. Marsh's sworn search warrant affidavit, which he wrote was "in support of the sworn search warrant affidavit" submitted the previous day, to the same judge, by FBI Special Agent Michael L. Thompson.

With the introduction of the subpoenaed cell phone records, it is apparent the Thompson and March search warrant affidavits are perjured and fabricated. Both agents are therefore subject to penalties of perjury. Also. very importantly. the cell phone (It should be noted here that prosecutors told the jury that Ms. Tucker was a friend of Mr. Ford's and simply was a "tipster".) (See Exhibit B - FBI Affidavits and Tonya Tucker's Cell Phone Records)

Mr. Ford, as required by NSA regulations, earlier reported a threatening e-mail sent to him on Tuesday, November 25th2003 at his "AOL" address a month and a half before his arrest. The e-mail was sent by a "Dr. Takiya", who claimed to be a friend of Tonya Tucker. Based on newly discovered evidence on September 1.2009, it was confirmed that Ms. Tucker is the author of the e-mail. Ms. Tucker signed her name onto an internet guest book August 15, 2006 with the e-mail address of Msunique_2@yahoo.com, which is the same e-mail address of the treat letter sent to Kenneth Wayne Ford, Jr. on Tuesday, November 25 .2003.

The e-mail threatened Ford that his security clearances would soon be revoked. She said she knew people at NSA who had clearances just like he did. Ford reported the e-mail the very next day to NSA Head Security Officer Anne Mennis. She ignored the email, not taking it seriously at all.. Ultimately, the admission of the e-mail as exculpatory evidence to Mr. Ford was suppressed from the trial by the judge. (See Exhibit C - Threatening E-Mail / Newly Discovered Evidence).

Newly discovered evidence of a newsletter dated March 31. 2006, states that FBI Special Agent Dave Evans was the lead FBI supervisor in the case against Mr. Ford. The defendant, Mr. Ford, was never aware that FBI Special Agent Dave Evans existed. (We, his parents, discovered this newsletter on the internet in 2008.) FBI Special Agent Evan's newsletter was titled, Maryland Man Sentenced For 'Stealing Secret Documents'. However, indictments alleged that Mr. Ford was charged with 'Unauthorized Possession of National Defense Documents" - not theft of secret documents.

FBI Special Agent Evans also said that: “As it turned out, our tipster was and didn't even make the drive to the airport." Nonetheless, the prosecutors continued to prosecute and incarcerate an innocent man.

FBI Special Agent Evans also stated that: (Our agents ultimately determined ultimately ended up in." Nonetheless, prosecutors indicted and incarcerated Mr. Ford with knowledge that 6'qonflicted evi4ence" existed in this case. (See Exhibit D – FBI Special Agent Dave Evans' Newsletter dated 3/31/2006)

Certainly, the defense has a right to depose and cross-examine the FBI Special Agent who was the lead supervisor in this case. Prosecutors withheld FBI Special Agent Evans from the defense. They also withheld Special Agent Frederick C. Marsh from the defense. The Marsh affidavit was suppressed during the suppression hearing by the judge, Judge Peter J. Messitte, before the trial began on 11/29/2005. Thus, that which brought Mr. Ford into the legal system and ultimately into a federal courtroom for prosecution, was not allowed into the trial. The jury was unaware of the affidavits. (The defense did not get them until 19 months after Mr. Ford’s arrest. Please keep in mind Mr. Ford has been totally under arrest the entire time since 1/11/2004 to the present.) To date, those affidavits have never been filed. They are not listed on the docket page of the case and they are not physically in the court file. It was represented and testified to the jury by DOJ prosecutors and FBI Special Agent Michael L. Thompson that he was the lead agent and only agent assigned to the Ford Case.

B. Even If Papers Had Been Present – The Text of §793 Is Vague And Should Not Have Been Applied In This Case

First, the statutes require that a defendant transmit information relating to the national defense. There are no allegations that Mr. Ford ever transmitted, sold, stole, secreted, purloined, paid for or otherwise obtained classified information inside or outside the government - by any illegal means. Legislative history of $793 makes plain that [Congress was concerned with spying].

The government never charged Mr. Ford with spying, injury to the United States on behalf of a foreign nation or communication to any person not entitled to receive classified information. Due process requires that a criminal statute provide a person of ordinary intelligence fair notice that his contemplated conduct is forbidden. See Thomas v. Davis, 192 F.3d 445,45514n Cir. 1999). If a law is "vague or highly debatable, a defendant - actually or imputably - lacks the requisite intent to violate it." See United States v. Mallas. 7 62 F .2d 36r , 363 14'n cir.1985). criminal prosecution for the violation of an unclear duty itself violates the clear constitutional duty of the government to warn citizens whether particular conduct is legal or illegal. See U.S. v. Rosen and Weissman 05-cr-225.

A statute cannot be construed so as to delegate to prosecutors and juries the "inherently legislative task" of determining what type of possession of national defense information are so reprehensible as to be punished as crimes. See United States v. Kozminski. U.S. 93 1,949 (1988) (rejecting construction of criminal statute that would *delegate to prosecutors and juries the inherently legislative task of determining what type of coercive activities are so morally reprehensible that they should be punished as crimes").

Second, the canon of strict construction of criminal statutes and the rule of lenity ensure fair warning by resolving ambiguity in a criminal statute as to apply it only to conduct clearly covered. Lanier, 520 U.S. at 266. Third, due process bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope. Each of these three elements is based on the fact that it must have been reasonably clear the time that the defendant’s conduct was criminal.”

United States Attorney for the District of Maryland Rod Rosenstein confirmed by his own statement that: "Though there was conflicting evidence of what Ford intended to do with the classified information – the jury’s verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information.”

Therefore, one would conclude that it was apparently not 'reasonably clear' that Ford's alleged conduct was criminal. Our son was incarcerated based on “unclear conflicting evidence'. An egregious miscarriage of justice at the highest level is evident throughout this case.

Each of these three manifestations is based on the notion that it must have been "reasonably clear at the time that the defendant's conduct was criminal". Elements applied to Mr. Ford's case affirm that reasonable clarity was severely lacking. Courts have ruled that §793 (d) and (e) apply only to the transmission of tangible information. ln fact, these rulings were the basis of Special Counsel Patrick Fitzgerald's explanation as to why he did not bring charges under the Espionage Act §793 against either the government officials who leaked the name of CIA agent Valerie Plame to the press or the reporters who subsequently reported that name to millions of readers around the world.

The following exculpatory evidence, which would have exonerated our son, was suppressed from the trial and jury: 1) FBI Form 302 Statement by Tonya Tucker (FBI Confidential Informant), 2) Tonya Tucker's threatening e-mail to Mr. Ford and 3) Special Agents Thompson's and Marsh's Search Warrant Affidavits. Special Agent Marsh's affidavit clearly affirmed on January 11, 2004, page 6 of 12 that: “A review of criminal history records reflect that TUCKER has a number of arrests, including arrests for Driving while suspended, Criminal trespassing, Robbery, among others."

Courts have repeatedly ruled that the government may not excuse its presentation of false testimony by claiming that: (a) it did not know, (b) it did not understand what other agencies knew, or (c) it believed the testimony. It cannot use these excuses because they are not the law and the facts do not support them. See Mesarosh. et al v. United States, 352 U.S. I (1956); Giglio v. United States, 405 U.S. 150 (1972); and United States v. Mason, et al., 293 F.3d, 826 (5th Cir.2002). Fourth Amendment violations enumerated in the matter of Franks v. Delaware were repeated violations perpetrated on Kenneth Wayne Ford, Jr. by the United States Department of Justice (DOJ). In the matter of Franks v. Delaware, the Court held that: "Where the defendant makes a substantial preliminary showing that a false statement that a hearing be held at the defendant's request."

Federal prosecutors in Mr. Ford's case willfully applied national security standards of the suppression of evidence and discovery. DOJ prosecutors willfully enforced national security clearances upon defense counsel with full knowledge that DOJ did not obtain mandatory FISA applications and approvals.

Prosecutors ignored strict procedural requirements in accordance to the Foreign Reform Act of 2000"). Prosecutors clearly violated Title VI §603, 605 and 607. This case should never have been prosecuted. Title VI $608 provides, in part, that: "If any provision of this title (including an amendment made by this title), or the application thereof, to any person or circumstance, is held invalid, the remainder of this title (including the amendments made by this title), and the application thereof. to other persons or circumstances shall not be affected thereby.”

C. Background

Kenneth Wayne Ford, Jr. is now 38 years old. He is the cream of the crop of young American citizens. He is an African-American and is highly educated. Mr. Ford graduated from DeMatha Catholic High School in Hyattsville, Maryland in 1990. He then went to the University of Miami in Coral Gables, Florida and graduated from there in 1995 with a Bachelor of Business Administration in Management and Organization degree. Mr. Ford served 4 years in the Uniformed Division of the Secret Service, where he received two cash awards in consecutive years for outstanding service. While in the Secret Service, Mr. Ford continued his education and enrolled into Strayer University. To his credit, he graduated in 2001, summa cum laude" earning a Bachelor of Science in Computer Networking degree. Later, Mr. Ford enrolled in the Masters program at Strayer University, earning in 2004, a Master of Science in Information Technology degree.

In 2001, Mr. Ford accepted employment at NSA as a Signals Intelligence Analyst. While employed at NSA, he received a cash award for outstanding service. Later, he was recognized with a large plaque - his name listed, among others, for outstanding work on a particular project. It was disclosed in the trial by a State Department officer that Mr. Ford had security clearances that less than 150 people in the entire country hold. Mr. Ford has worked extremely hard all his life, as he was not born with a silver spoon in his mouth, inherited wealth or privilege. He has spent over 23 years acquiring an education. He would never do anything to jeopardize his life or his accomplishments. After Mr. Ford's conviction, Mr. Lambert, the probation officer assigned to formalize his pre-sentencing report, commented to me (his mother) and included in his report that "Kenneth has not even had a traffic ticket."

D. Case Overview

On Sunday, January 11. 2004. FBI Special Agent Michael L. Thompson and NSA Security Officer Robert McCaslin arrived at Mr. Ford's home at approximately 5:50 p.m. and fabricated that they wanted to talk to him about his former position. Mr. Ford invited them in because he was led to believe they wanted to get his expertise on a work-related situation. About ½ hour later, their attitudes changed and Mr. Ford realized they were unjustly accusing him of espionage. Simultaneously, with these accusations, they began searching his home - 2-I/2 hours before the search warrant arrived. FBI Special Agent Frederick Marsh arrived with a search warrant and about 23 additional agents.

During the course of this ordeal, Mr. Ford was threatened by Special Agent Michael L. Thompson's unnecessary withdrawal of his gun. He was terrorized for 7-1/2hows as the agents rampaged his home. He was not allowed to leave his residence, contact his parents or answer his telephone. He was denied food and water. He was not allowed to use his own bathroom until Thompson took him away from his home -7-1/2 hours later. See Title 18, Part I, Chapter 113C - Torture - "an act committed by a person acting under the color of law specifically intended to inflict severe physical or mental pain or suffering (other than pain or suffering incidental to lawful sanctions) upon another person within his custody or physical control." (See Exhibit E -Letter by Kenneth W. Ford, Jr. Documenting Events)

E. DOJ Triple Jeopardy Indictments

The government's 1st indictment, and 2nd case number, was filed on 3/4/2005. U.S. District Court Judge Peter J. Messitte dismissed the case without prejudice on 5/162005. The 2nd indictment, and 3rd cse number, dated 5/23/2005, contained the exact charges and language as the ls indictment. The 3rd indictment, which we had no knowledge of until recently, is dated 11/28/2005. The docket indicates that there was a superseding indictment, arraignment and plea of not guilty all on the same day – 11/28/2005. It indicates Mr. Ford appeared before Judge Messitte and gave a plea of 'not guilty' to each of the two counts against him. This is untrue. Mr. Ford never appeared before Judge Messitte or any other judge on 11/28/2005. His trial started the next day, 11/29/2005. It is impossible to appear for an arraignment one day and be tried by jury the very next day.

It should be noted here that on March 30,2006, at the end of Mr. Ford's 2ndsentencing hearing, Judge Messitte dismissed the original indictment. He and Prosecutor Salem signed papers to that effect. Judge Messitte said several times during the trial, Mr. Ford was being prosecuted on the superseding indictment. (Of course, this is impossible.) Apparently, at some point, Judge Messitte and Mr. Salem realized this. Consequently, this dismissal has never been filed, is not in Mr. Ford's court file and is not on the docket. (See Exhibit F - Indictments, Docket Listings of 1//28/2005 Superseding Indictment, Arraignment and Not Guilty Plea and Transcript Page of Dismissal of Original Indictment) Also See $3434 - Presence of Defendant - (Rule) 3

Also, there appears on all three indictments: 'Aiding and Abetting (1S U.S.C. §2)'. Mr. Ford was never charged with this crime. It does not appear anywhere else in the indictment nor was it addressed in the trial to the jury. In addition to the indictments being illegal, these acts make the indictments themselves faulty.

The 1st count was cited under Federal Criminal Code 793(e) - Espionage. FBI Receipt For Property Seized / Form 597 listed all items seized from Mr. Ford's residence. Ironically, there was not one (1) document identified as 'classified papers' prosecutors falsely alleged were taken from Mr. Ford's residence.

At the trial, FBI Special Agent Bridget Bigham, Seizing Agent, testified that she was told to put a classified sticker on a Fed Ex envelope found in a suitcase which belonged to career criminal Tonya Tucker. (The envelope is listed by FBI Special Agent Bigham as #9 on the FBI Form 597.) (See Exhibit G -FBI Form 597) Special Agent 3

-------------

3 In United States v. Randall, f 71 F.3d 195,203 (4th Cir. 1999) The Supreme Court ruled that the Fifth Amendment's grand jury guarantee does not permit a defendant to be tried on charges that are not made in the indictment against him, and therefore, 'after an indictment has been returned its charges may not be broadened through amendment except by the grand jury itself. See United States v. Randall, 471 U,S. 130, 143 (1985). See United States v. Brady, 456 U.S. 152; and United States v. Young, 470 U.S. 1, 16 (1985).

Bigham testified she did not look at the papers while in Ford's home. She further testified the alleged papers seized were not photographed in Ford's home as required by procedures, but were photographed days later at an FBI facility. (See Exhibit H - Excerpt of Agent Bigham's Transcript Testimony)

DOJ prosecutors testified during the trial that it did not have any 'surveillance evidence' nor 'any eyewitness accounts' of Mr. Ford allegedly removing classified documents from NSA. Prosecutors should have dismissed all charges against Mr. Ford.

The 2nd count was Title 18 U.S.C. $ 1801 - Making A False Statement On A Government Form. Mr. Ford accepted employment with Lockheed Martin. Prosecutor David Salem had already gotten him fired from Northrop Grumman and after working for 3 weeks at Lockheed Martin, Salem was successful in getting him fired from there also. Ford truthfully provided Lockheed Martin a 1-1/2 page written account of alleged charges against him. At the trial, Judge Messitte allowed Prosecutor Salem to severely redact Ford's written statement. Salem told the judge the statement "prejudiced him". (See Exhibit I - E-Mail Dated 10129/2004 to Lockheed Martin) AUSA David I. Salem and DOJ National Security Division Trial Attorney Mariclaire D. Rourke testified that Mr. Ford backed his pick-up truck to the loading dock and loaded these papers into his truck.

In contradiction of their testimony, Mr. Ford's former NSA supervisor, Ms. Jacqueline Welch ("hereafter Jacqueline W") testified that she in fact had seen Mr. Ford on the day in question - December 19,2003 - standing in the parking lot beside his 'cream-colored 4 door sedan (car)'. Former Counsel on redirect, ascertained whether or not she knew the difference between a 'pick-up truck and a car . She affirmed that she did. Jacqueline W further testified that she never knew Mr. Ford had a pick-up truck. At that point, DOJ's over zealous prosecutors' alleged pick-up truck was referred to as a 'vehicle'. (See Exhibit J - Excerpt of Jacqueline W's Testimony)

Special Agent Michael L. Thompson admitted under oath that there were no fingerprints belonging to Mr. Ford found on any of the thousands of sheets of classified papers allegedly found in Mr. Ford's home. Once again, none of these alleged papers were listed on the FBI's official seized evidence Form 597. (See Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony)

F. Argument

Mr. Ford is the only American citizen in the history of the Espionage Act, to be charged, prosecuted and convicted under the statute without meeting the requirements of the statute. The United States Court of Appeals for the 4th Circuit recently upheld the requirements that in order to charge under the Espionage Act of 1917 - §793(e) one has to have the belief that what one is doing will harm the United States and/or help a foreign entity and one must have the intent to harm the United States and/or help a foreign entity. See United States v. Rosen and Weissman,557 F.2d 192 4th Cir.2009).

Judge Peter J. Messitte, during the suppression hearings, willfully discarded the requirement that the government had to prove the “belief” 'element. Judge Messitte, while charging the jury, willfully eliminated the need for the government to prove the element of "intent.”

Under the federal sentencing guidelines, espionage (Federal Criminal Codes §793(d) and (e) cannot be sentenced unless there is the element of transmittal. So, effectively, since a transmittal is a prerequisite for sentencing under §793(e), then without it, there cannot be a charge. The government never alleged Ford transmitted anything. As a matter of fact, NSA Security Officer Robert McCaslin sent a letter to Prosecutor David Salem dated 713112004 saying Ford's electronic equipment at work and at home were analyzed by NSA and were found to be clean. The letter was not allowed into the trial.

Subsequently, the "CIPA" Intelligence Authorization Act for 2001- Title VI §607 - Coordination Requirements Relating to the Prosecution of Cases Involving Classified information was totally ignored by Assistant United States Prosecutor David I. Salem and Dept. of Justice Trial Attorney Mariclaire D. Rourke.

The National Security Procedure Statute 9-90.020, provides that DOJ prosecutors had no authority to make decisions in this case. "CIPA" $607 - $1.1 of Executive Order No. 12958, provides that a Senior Official, the President of the United States, must be notified prior to prosecution. ln this case, that President was former President George W. Bush, Jr. - another statutory mandate ignored and violated in the matter of Kenneth Wayne Ford, Jr. $793(e) 'unauthorized possession' is contradictory to the National Security Act which provides that NSA employees have a life-time obligation and commitment regarding NSA classified documents.

G. Violation of Dept. of Justice Guidelines/National Security Procedures

DOJ's USAM guidelines regarding National Security Procedures §9-90.020 clearly dictates that the authority to conduct prosecutions relating to the national security lies with the Justice. USAM unequivocally states, in part that:

All prosecutions affecting, involving or relating to the national security, and the responsibility for prosecuting criminal offenses, such as conspiracy, perjury and false statements, arising out of offenses related to national security, is assigned to the Assistant Attorney General of the National Security Division or higher authority. See 28 C.F.R. S 0.61 The Counterespionage Section of the National Security Division, under the supervision of the Assistant Attorney General or higher authority, conducts, handles, and supervises prosecutions affecting, involving or relating to the national security." DOJ trial attorney Mariclaire D. Rourke and AUSA David I. Salem did not have authority to prosecute a National Security Espionage case against Kenneth Wayne Ford, Jr.

We recently reviewed Mr. Ford's court file. Although there are a few orders, from 8/2005 to 1112005, appearing in the case file that indicate the Assistant Attorney General was in compliance with that particular order, it is with great concern that we ask you to investigate this. We have no proof or certification that the Assistant Attorney General's alleged involvement with this case was authentic. As in other things involving Mr. Ford's case, we suspect this too is a fabrication.

H. DOJ Violated FISA Court Statutes

FISA Court specifically prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control).

FISA allows a federal officer, authorized by the President of the United States acting through the Attorney Gener4l to obtain from a judge appointed by the FISA Court, search warrants and approval of electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information. Mandated strict FISA Court procedures were ignored by the FBI, DOJ Prosecutors and U.S. District Court of Maryland Judge Peter J. Messitte, who is not an appointed FISA Court Judge.

Specifically, FISA requires that where the target of the search or surveillance is a "United States person" - a U.S. Citizen or permanent resident alien - the judge must find that the Executive Branch's certification that a significant purpose of the search or surveillance is to obtain foreign intelligence information is not "clearly erroneous". See 50 U.S.C. §1805 and 1824. Also see Brady v. Maryland, 373 U.S. 33 (1963); Strickler v. Greene, 119 S.T. 1936 (1999).

The elements of violations are: (1) the evidence must be favorable to the accused, either because it exculpates the defendant or because it impeaches the government; (2) the evidence must have been suppressed by the government, either willfully or inadvertently; and (3) prejudice must have been ensued. See Franks v. Delaware, 438 U.S. 154 (1978); See Brady v. Maryland, 373 U.S. 83 (1963); See USA v. Rosen & Weissman 05cr-225 (E.D.Va.)

We are not elected or high level corporate officials. We are "grass roots" people who are honest and hard working. President Obama stated at the 2009 NAACP 100th Anniversary celebration, that: "America is a place where, if you work hard, you can achieve success." A grave injustice has been done to a good American citizen (Kenneth Wayne Ford, Jr.). American citizens rely upon the United States Department of Justice to follow the rule of law.

In good faith, the initiation of a formal procedural investigation and the appointment of a Special prosecutor on behalf of our son, Kenneth Wayne Ford, Jr., is warranted and specifically should include an investigation of prosecutorial misconduct, violations of national security procedures, violations of FISA Court procedures, violations of issues in applying states secrets rules and the willful suppression of exculpatory affidavits and other exculpatory evidence in this case.

We are available at any time that is convenient to you to discuss this case. The elements in this letter by no means cover all the infractions against Mr. Ford. There were just too many illegal things done to put in a letter.

We seek an immediate vacation of Mr. Ford's conviction, full restoration of his revoked clearances and an immediate apology from the Department of Justice (DOJ).

Thank vou.

Sincerely,

Kenneth W. Ford, Sr.

Gloria D. Ford

EXHIBITS

l) Exhibit A - Rosenstein Press Release dated December 15, 2005

2) Exhibit B - Affidavits by SA Michael L. Thompson & SA Frederick C. Marsh and Tonya Tucker's Subpoenaed Cell Phone Records

3) Exhibit C - Tonya Tucker's threatening e-mail to Mr. Ford/Newly Discovered Evidence

4) Exhibit D - FBI Special Agent Dave Evans' Newsletter dated 3/31/2006

5) Exhibit E - Letter from Kenneth Wayne Ford, Jr. / Document of Events

6) Exhibit F - DOJ's Double Jeopardy Indictments; Docket of 11/28/2005

Indictment; Transcript Page of Dismissal of Original Indictment

7) Exhibit G - FBI Form 597 (Seized Items) w/ Computerized Listing Of Items

8) Exhibit H - Excerpt of Agent Bridget Bigham's Testimony

9) Exhibit I - E-Mail dated 10/29/2004 from Kenneth W. Ford, Jr. to Lockheed Martin

l0) Exhibit J - Excerpt of NSA Jacqueline Welch's Testimony

1l) Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony
      

President Obama, who prides himself as a constitutional scholar, having taught constitutional law at the University of Chicago, is about to become the subject of a major constitutional case in the indictment of Thomas Drake. Drake was not only exposing high level contract fraud involving two NSA directors -- Generals Michael Hayden and Keith Alexander -- but also allegedly involved a constitutionally-protected entity -- the press -- in making details of the fraud known to the American taxpaying public. Not since Watergate have the American people been subject to runaway surveillance by the NSA and FBI.

Obama, who supported retroactive immunity from prosecution for telecommunications companies that swept up the digital communications of all American after proclaiming he was against it, will be the person on trial in the Drake case. And Obama may very well end up like Richard Nixon if the government does not impose restrictions on the public's right to know through imposition of the draconian Classified Information Procedures Act and the State Secrets Privilege.

As one NSA insider tersely put it: "I truly believe that NSA has some illegally wiretapped information (big-time dirt) on Mr. Obama, and NSA has been using it (via blackmail) against him ever since he flip-flopped on the vote for retroactive immunity for the telecommunication firms that insisted they did nothing illegal when they joined in with the Bush administration in comprehensive, 'sea to shining sea' warrantless wiretapping of all domestic U.S. communications."

//////////

JANUARY 2011: January 10, 2011 -- NSA "Q Group" protecting sex scandals while plugging potential leaks - Wayne Madsen Report

WMR's intelligence sources report that the National Security Agency's "Q Group," the directorate responsible for overall security for NSA, is actively investigating and harassing NSA employees who have reported on senior officials at the sprawling intelligence agency, which now includes the new U.S. Cyber Command, of engaging in adulterous trysts with subordinates and possessing improper sexual material, including child pornography.

WMR has previously reported on the improper activities of the Q Group, which has become a virtual uncontrolled FBI within the NSA. Q continues to protect NSA senior officials who engage in and promote a culture of sexual exploitation of junior employees at the intelligence agency. Q Group has also misused NSA psychologists and psychiatrists to deem anyone who charges senior officials of the agency with sexual misconduct or harassment unfit to hold a security clearance for reasons of mental impairment.

On August 28, 2009, WMR reported: "NSA Security, headed up by Kemp Ensor III, and NSA medical worked in tandem to deny security access to employees determined to be mentally unfit to have access to classified information at NSA.

However, due to the attrition of highly-qualified personnel, the security-medical duo is now prescribing Prozac and Zoloft for NSA employees who refuse to fall into line. NSA is abuzz with the new requirement for employees to take what they call "happy pills."

The sexual harassment scene has also reportedly changed at Fort Meade. In the past, sexual harassment at NSA involved older male managers preying on young female employees. That has now changed in what has become an environment of 'do ask and do tell.' WMR has been informed that there is an increase in complaints about sexual harassment from new young male hires about being forced into 'kinky rendezvouses' with older male managers."

Q Group has also gone outside of its legal authority to harass the families and friends of former agency employees who have brought charges against NSA for sexual harassment and misconduct. WMR has learned of NSA personnel illegally masquerading as phone company technicians who entered the property of the family of one such ex-employee. In another case, Q Group personnel poisoned two pet dogs of the family of an ex-employee under NSA surveillance. Q Group personnel have also been used to harass the ex-spouses of senior NSA officials involved in child custody cases. WMR has also been informed that Q Group has harassed NSA employees who have married the ex-wives of NSA senior officials who have ongoing legal battles with their ex-husbands.

Q Group is able to conduct its harassment of civilians in the Fort Meade area with a "wink and a nod" from local law enforcement and other officials. NSA senior managers have dipped into NSA's substantial slush fund to lavish money on community service projects and programs in cash-strapped local municipalities and counties. The concept of the "friendly NSA that provides funds and jobs" has bought loyalty and silence from local and state of Maryland officials. In addition, WMR has learned that NSA has placed agents within the congressional offices of local members of Congress in order to interdict and retaliate against NSA whistleblower congressional complaints. The NSA "embeds," who work in concert with NSA's Office of Legislative Affairs, are found within the offices of Maryland Senators Barbara Mikulski and Ben Cardin, and Maryland Representatives C.A. "Dutch" Ruppersberger, Steny Hoyer, Elijah Cummings, Chris Van Hollen, and Paul Sarbanes, and is currently inserting an agent into the office of freshman Representative Andy Harris.

As discovered in a January 2005, Q Group Personnel Security organizational chart obtained by WMR, Q2 contains an office of counter-intelligence, which WMR has reported has been involved in illegal surveillance of individuals far beyond the NSA infrastructure.

Q2.jpeg

On July 3, 2009, WMR reported: "The Obama administration, rather than lessen the pressure on the NSA personnel, has turned up the heat and is resorting to even more draconian methods to ensure silence. The word from inside NSA is that a state of fear exists and the mission of the agency, to conduct surveillance of foreign communications to provide threat indications and warnings to U.S. troops and policy makers and protect sensitive U.S. government communications from unauthorized eavesdropping is suffering as a result." Our latest information is that the Obama administration is increasing pressure on NSA personnel to deter leaks.

Obama's Justice Department is now actively retroactively pursuing U.S. intelligence community leakers from the time of the Bush administration. Former CIA officer Jeffrey Sterling has been arrested and indicted for revealing information to New York Times reporter James Risen concerning Iran's nuclear program. Former NSA official Thomas Drake has been indicted by the Obama administration for leaking details on NSA contract fraud to reporter Siobhan Gorman of The Wall Street Journal and formerly of theBaltimore Sun. Former State Department analyst Stephen Kim has been charged with leaking top secret information on North Korean nuclear testing to Fox News.

WMR has learned from informed sources that the indictments of Sterling and Drake are just the beginning of the Obama administration's policy to crack down on leaks. With the tenth anniversary of the 9/11 attack coming up this year, the U.S. Intelligence Community, working closely with Mossad, have made plans to stop any new revelations that would point to high-level U.S. and Israeli government involvement in the 9/11 attacks. The Wikileaks affair was partly concocted to draw out and identify as many potential leakers as possible, including US Army Private Bradley Manning, now imprisoned at Quantico, Virginia on suspicions that he leaked classified documents to Wikileaks.

WMR has learned from an NSA source that this editor continues to remain a top priority for NSA electronic surveillance, including phone tapping and e-mail interception. NSA is also monitoring all those who are in communications with this editor via electronic means. WMR has previously reported on this web site's sources and contacts being major targets for NSA surveillance. Just as the latest report of NSA surveillance was received, this editor experienced a second-degree burn with blistering on the right neck and shoulder, usually where my cell phone is placed during conversations. The latest warning about NSA eavesdropping was received on January 8. The burn, that began as what can be described as a bad sunburn, began on the evening of January 6. The contour of the burn mark is oddly similar to the two equal halves of my flip-top telephone, with a white stripe in the middle where the hinge is located.


SDC10481.jpeg

Second degree burns on right shoulder and neck after latest warning of full-scale NSA surveillance.

WMR's foreign intelligence sources also report that there is an ongoing project by Israeli agents-of-influence in the United States to determine the sources of information on the 9/11 attacks. This project involves in-depth probes by the Israeli agents of retired Pentagon and FBI personnel believed to possess information about the U.S. and Israeli governments' involvement in the attacks. WMR can report that radio show host Alex Jones's information and funding sources are of particular interest to the Israeli cell.

///////////////////////

MARCH 2011: March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial - Wayne Madsen Report

In the trial of former National Security Agency (NSA) executive Thomas Drake, federal prosecutors have convinced an agreeable federal judge, Richard D. Bennett, to place under court seal previously-released trial documents because they have been deemed "For Official Use Only" or FOUO. Drake is accused of leaking classified materials to the media and is only the fourth person in U.S. history to be charged with violating the 1917 Espionage Act.

FOUO is not a national security classification and it never has been one, although there were attempts by the Reagan, George H W Bush, and George W. Bush administrations to create a "restricted" or "sensitive but unclassified" (SBU) national security classification immediately below the current lowest national security classification, which is Confidential. Expansion of national security classification categories beyond the current three -- Top Secret, Secret, and Confidential, in addition to Sensitive Compartmented Information (SCI) special access categories -- but these have been unsuccessful. George W. Bush's creation of a Controlled Unclassified Information (CUI) category was rescinded by Executive Order 13556 on November 4, 2010.

Although President Obama rescinded Bush's CUI presidential memorandum, federal prosecutors are trying to argue that CUI continues to exist as a national security classification under the guise of FOUO. The argument demonstrates a complete lack of understanding of the classification scheme used by NSA. However, in past trials, notable that of NSA analyst Kenneth Ford, Jr., jailed after a political show trial waged by DOJ neocons in league with a "shopped" federal judge. In the Ford case, the NSA wanted to cover up the cooking of signals intelligence from Iraq in order to justify the attack on and occupation of Iraq

However, NSA and Justice Department prosecutors are continuing to insist that FOUO is a security classification in the trial of Drake, however, NSA and DOJ decided to go after Drake because the documents he stands accused of passing to The Baltimore Sunpoints to massive misuse of taxpayer's money and contract fraud under the NSA directorships of retired General Michael Hayden and current director General Keith Alexander. Alexander is also the commander of the U.S. Cyber Command. The fraud committed by Hayden, Alexander, and senior NSA officials amounted to hundreds of millions of dollars in wasteful expenditures. In some cases, the waste on certain contractor-supplied intelligence systems were life threatening, as far as troops on the ground were concerned. The fraudulent contract expenditures were part of NSA's massive TRAILBLAZER and GROUNDBREAKER outsourced modernization and restructuring programs.

On March 18, in response to a request from federal prosecutors, Bennett sealed two documents that were previously available on the court's own website. The documents sealed describe the classified contents of several documents seized at Drake's home, however, the documents appear to be unclassified working papers that the government, after the fact, is trying to argue are classified at the levels of Secret and Top Secret.

Drake's federal public defenders have argued in one of the sealed documents that the government's argument that the documents found in Drake's home in flawed due to the fact that the documents could not be construed as classified at Secret or Top Secret merely because they contain the words "FOUO" and "COMINT." COMINT is communications intelligence and by itself does not mean that the document is classified at "Handle Via COMINT Channels Only," a special handling caveat for SCI special access categories. In fact, the National Cryptologic Museum, which is adjacent to NSA headquarters and open to the public, freely uses "COMINT" in its displays. In addition, the commercial International Spy Museum in downtown Washington, DC has held public seminars on issues dealing with, among other tradecraft, "COMINT."

From the sealed DOJ letter arguing that the documents found in Drake's home are classified, it is clear that NSA, which has played fast and loose with the truth in previous trials and administrative actions against its whistleblowing employees, has tried to re-classify previous unclassified "working papers" as being Secret and Top Secret to bolster its case against Drake.

WMR has previously obtained NSA contractor documents that were deemed by the contractor and NSA, itself, as unclassified and the Drake documents appear to fall within the same category. The unclassified documents that were re-classified as Top Secret and Secret have titles such as "Trial and Testing," "Collections Sites," "Volume is Our Friend," "What a Success," "Regular Meetings," "Shoestring Budget," "BAG," "Buy vs. Make," "TT Notes," "Terrorism Threat," "Note Card 1", "Note Card 2," and more intriguing, "9/11 Commission." WMR previously reported that NSA's security directorate, the "Q Group," has engaged in massive surveillance of employees and journalists, including this editor, to plug any leaks on NSA information on the 9/11 attacks. Bennett, in his ruling on March 18, agreed to NSA's and lead federal prosecutor William Welch II's request that previously unclassified court filings be placed under seal.

While NSA and DOJ seek to convict Drake for having unclassified For Official use Only documents in which the terms "FOUO" and "COMINT" appear, WMR has obtained a similar Unclassified For Official Use Only (FOUO) document written by Computer Sciences Corporation (CSC), one of the major contractors for the fraud-ridden GROUNDBREAKER program. In the document, from which WMR is providing excerpts, there are clearly many more NSA-unique systems and terms described.

Cover terms for classified NSA systems such as HIGHCASTLE, LOOKINGGLASS, MILENIUM, FAST TRACK, ROTUNDPIPER, and BRASSCOIN are listed, along with "SIGINT" or "Signals Intelligence," an NSA mission term comparable to the "COMINT" acronym found in the working papers confiscated from Drake's home.

The CSC document, maintained by CSC contractors and sub-contractors in their cars, briefcases, and homes, were never indicted by the Justice Department on grounds they violated national security. On the other hand, many at NSA feel that companies like CSC, SAIC, Northrop Grumman, Lockheed Martin, and others, should have been indicted for the massive contract fraud carried out under the watches of Hayden and Alexander.

In post-9/11 America, the whistleblowers to fraud, waste, and abuse stand accused of being criminals while the criminals rake in billions of dollars in taxpayers' money and are lauded as critical components of the "intelligence team."

NSA's GROUNDBREAKER and TRAILBLAZER contractors were eager to compile as many NSA systems and sub-systems as possible to cash in on the billions of dollars they could make from the NSA outsourcing work. The database that contained all the NSA systems, projects, and components ripe for outsourcing work was code-named JACKPOT. For CSC, SAIC, and certain NSA officials who spun through the revolving door after retirement and landed high-paying jobs with the contractors, it certainly was a JACKPOT and one that NSA, Q Group, the FBI, Department of Justice, and the White House earnestly want to cover-up in the trial of Thomas Drake.

During Drake's trial, which begins next month in Baltimore, FBI agents are expected to use code words to describe different aspects of the case. One code-word that will most definitely not be heard is JACKPOT, the database of NSA contracts in which contractors and NSA retirees enriched themselves -- criminality that is only met with chirping crickets from the so-called "crime fighting" Department of Justice and FBI.

//////////////

NOTE: Here is the resealed files mirrored on hongpong.com, bitchez: SUPPRESSED: DrakeNSA1-suppressed.pdf // DrakeNSA2-SUPPRESSED.pdf // UNCLASSIFIED FOUO NSA DOC:  UNCLASSIFIEDNSAdoc.pdf .

Walter from the Big Lebowski has a word for you Fed jokers that think they can control society through secrecy & bullying:

22881085.jpeg

/////////////

MAY 2011: May 24, 2011 -- 60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years - Wayne Madsen Report

CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.

WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."

NSA and selling the nation's prized secrets to contractors

June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.


But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

/////////////

SEPTEMBER 2011: September 26-27, 2011 -- A tale of two cases - Wayne Madsen Report

On June 15, U.S. federal judge Richard B. Bennett sharply rebuked federal prosecutors for pursuing a four-year Espionage Act violation investigation and case against former National Security Agency (NSA) official Thomas Drake. At Drake's sentencing hearing in Baltimore, Bennett called the four-year long case against Drake and the prosecutors' ultimate dropping of multiple espionage charges to a single misdemeanor count of unauthorized use of a government computer "unconscionable."

Drake had been charged with providing classified information to the Baltimore Sun in 2006 and 2007. He was specifically charged with violation of sub-paragraphs (d) and (e) of the Espionage Act, which covers "transmittal" of classified information to unauthorized parties. Charges under the 1917 Espionage Act have rarely been brought by the Justice Department. The law was used against American Israel Public Affairs Committee (AIPAC) officials Steve Rosen and Kenneth Weissman for receiving highly-classified information, including Sensitive Compartmented Information (SCI), from a Pentagon official. Charges against Rosen and Weissman were dropped by Eric Holder's Justice Department on May 1, 2009.

However, the "classified material" cited by prosecutors was not originally classified and it pertained to NSA officials, particuarly then-NSA director General Michael Hayden, defrauding the government for well over a billion dollars. Hayden and his advisers awarded a failed program called Project TRAILBLAZER to a group of contractors led by Science Applications International Corporation (SAIC).

The prosecutors, acting as virtual criminal racket protection agents for Hayden and his advisers, decided to retroactively classify the unclassified whistleblowing information in order to justify the Espionage Act charges against Drake. Hayden's pet project also assisted in the program to conduct warrantless wiretapping of communications of U.S. citizens, a super-classified operation known by the code name STELLAR WIND.

Drake avoided prison and Bennett ruled against federal prosecutor's wish to have a $50,000 fine imposed on Drake. In sentencing Drake to 240 hours of community service, Bennett said "There has been financial devastation wrought upon this defendant that far exceeds any fine that can be imposed by me. And I’m not going to add to that in any way.”



Drake was represented by two federal public defenders, James Wyda and Deborah Boardman. Drake's case began to fall party after it was featured on CBS "60 Minutes." Retired NSA officials, interviewed on camera, defended Drake and his whistleblowing actions. After the bad publicity for NSA and Eric Holder's Justice Department, the espionage charges against Drake were dropped.

Five years earlier, in another federal court room in Greenbelt, Maryland, and in a case even more egregious than the one involving Drake, federal judge Peter J. Messitte sentenced former NSA "Iraqi shop" signals intelligence analyst Ken Ford Jr., to six years in prison and no fine as a result of his politically-motivated conviction for allegedly removing two boxes of classified materials from NSA during broad daylight without detection. In fact, the documents were planted in Ford's Waldorf, Maryland home in retaliation for his signals intelligence analysis report casting doubt on the White House contention that Iraq possessed weapons of mass destruction. That report, which contained Ford's name as the preparer, eventually ended up on the desk of Vice President Dick Cheney. As a result, Ford became a target of the neo-con cell operating from within Cheney's office and the White House Iraq Group (WHIG), the same cabal that compromised Valerie Plame Wilson's covert identity and mission.

The team of Assistant U.S. Attorney David Salem; federal public defenders John Chamble, Andrea Callaman, and Susan Bauer; and even the private lawyer eventually retained by Ford, conspired to ensure that Messitte was successfully "judge shopped" as the trial attorney, that at least one dubious pro-NSA jury member was selected for the trial jury, and that Ford would receive anything but a fair trial. Unlike Drake, Ford served in a lower-level analyst position. However, Ford, an African-American who previously served as a uniformed U.S. Secret Service officer at the White House, was on a fast-track for an executive position at NSA.

"60 Minutes" never covered the Ford case, even though it was as, if not more, outrageous as the case brought against Drake. The Washington Post, rather than assign one of its national security correspondents to the case, handed it to a Metro desk reporter, who parroted in his articles what was given to him by the prosecution team.

Prosecutors never cited any classified document that was said to be in Ford's possession at the time of his arrest. Prosecutors relied on the testimony of a confidential informant named Tonya Tucker, who had several other aliases and a long criminal record, who said she saw a document labeled "classified" in Ford's home. Of course, "classified" is not a national security label or designator for any documents. Salem also charged that Ford was planning on meeting a foreign agent at Dulles International Airport to transmit documents. However, Salem could not identify the foreign country involved, a flight number, a rendezvous point, or any details of what amounted to a "pre-crime" allegation. In fact, Salem made up the entire Dulles story as a way to ensure a guilty verdict, especially considering that the jury was never shown any of the alleged classified documents that were said to be in Ford's possession. In the Drake case, the jury was shown copies of "retroactively" classified documents, which were originally unclassified.

Ford is now out of prison and serving three-years of restricted travel probation in Maryland. He maintains his innocence and intends to appeal his case. However, Ford's attempt to enlist the assistance of the parties who came to the defense of Drake have been unsuccessful. There is another problem with the Ford case. The Ford case files, including those maintained by the PACER system and the federal public defenders office in Washington, DC, have all disappeared. Even Ford's original birth certificate in the District of Columbia Vital Records Office has disappeared. The only information available on the Ford case from the Justice Department are the press releases issued on the case.

The federal public defenders office in Washington is clearly nervous about the double standard applied to Ford and Drake. Moreover, the supervisor of Ford's tainted public defenders in 2004 was Wyda, the same public defender who successfully argued Drake's case.

Former Justice Department prosecutor Thomas Tamm, under a long investigation for revealing the nature of NSA's warrantless wiretapping program to The New York Times, eventually saw his investigation by the FBI suspended. However, WMR has learned that the STELLAR WIND program was routinely violated by NSA employees. Hayden, who came up with the program and sold it to then-CIA director George Tenet and Vice President Cheney, essentially canceled the provisions of U.S. Signals Intelligence Directive 18 (USSID) 18, which governed the application of the 1978 Foreign Intelligence Surveillance Act (FISA) at NSA. NSA was prohibited from eavesdropping on "U.S. persons" without a court order from the Foreign Intelligence Surveillance Court (FISC). Under Hayden's tenure, some NSA analysts were conducting e-mail surveillance of their current and former girl friends, prompting Hayden to cover his tracks by implementing a procedure that saw database security officers, including those with oversight over the PINWALE e-mail interception database, conducting after-the-fact audit trail analysis for internal abuse of the new NSA powers.
fordfamily1.jpeg


Ken Ford, Jr. [center], reunited with his father and mother after six years of imprisonment on trumped up neo-con political charges stemming from the search for phony Iraqi WMDs.

Ford's case, which involved pressure from the Bush-Cheney White House, has also met with indifference from the Obama White House and the Congressional Black Caucus. Groups like the Government Accountability Project (GAP), which assisted with Drake's defense, did not raise a finger in the Ford case.

During his incarceration at Lewisburg federal penitentiary in Pennsylvania, Ford received rank-and-file support from some current and former NSA employees. However, unlike Drake, not one high-level NSA official, current or retired, came to Ford's defense, even though his innocence was as provable as that of Drake. It is, indeed, a "tale of two cases," one with a relatively happy outcome, the other singed with racism.


/////////////

JANUARY 2012: January 18-19, 2012 -- More high-level fraud at NSA uncovered - Wayne Madsen Report

WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.

When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.

There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.

At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.

The following press release was issued on May 12, 2005:

"Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . .

OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."



Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.

Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZER contract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.

Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.

One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."

Among the spin-offs of TRAILBLAZER was the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.

Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.

Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."

/////////////

JANUARY 2012: January 18-19, 2012 -- FBI/NSA continue maintaining "mug shots" of journalists - Wayne Madsen Report

As WMR has reported in past articles, the National Security Agency (NSA) has maintained a series of "mug shots" of journalists it suspects have sources inside the NSA. Often, NSA personnel throught to have been speaking to journalists are called into NSA's "Q" security group and questioned on whether they have spoken to various journalists. Along with the names of the journalists, are photographs, described by NSA insiders, as "mug shots," likely culled from the Internet.

WMR previously reported on NSA's "rogue gallery" of journalists. From WMR, July 3, 2009: "Since the revelation of the NSA journalist monitoring database, which later added communications intercepts of journalist phone calls, emails, and faxes to its database, NSA Security has, according to information received by WMR, conducted physical surveillance of journalists it deems to be threats to the operations of the agency. The top targeted journalists, who make up a virtual 'rogues' gallery' at NSA Security, complete with photographs and other personal information, are: former Baltimore Sun and current Wall Street Journal reporter Siobhan Gorman, Washington Times reporter Bill Gertz, former Baltimore Sun and current New York Times reporter Scott Shane, Baltimore Sun reporter Phil McGowan, author James Bamford, New York Times reporters James Risen and Eric Lichtblau, and this editor, Wayne Madsen."

WMR has now learned from NSA sources that NSA and FBI counter-intelligence branches are maintaining "mug shots" of journalists. Two to three pages of journalists, along with their photographs, are known to be in the possession of FBI counter-intelligence agent Laura Pino and NSA counter-intelligence officer Ethan Andreas. Each page has two rows of photographs across with four photographs and names of journalists on each row -- a total of eight photographs and names per page. The number of journalists on the pages, therefore, could be between 16 and 24.

Three names are known to be on the pages maintained by the FBI and NSA, according to our sources: Siobhan Gorman, James Bamford, and this editor, Wayne Madsen. Gorman was believed to have been the journalist former NSA official Tom Drake was in contact with before he was criminally charges under various counts, including the the Espionage Act. Drake was a witness to high-level contract fraud and corruption within the NSA. WMR submitted a Freedom of Information Act request to NSA two years ago requesting information on the editor's photograph being used as a security warning device. After being granted expedited processing by NSA as news media for purposes of the FOIA request, NSA reversed course, denying us media status and then stonewalled responding to the request. [Related story today in WMR].


/////////////

JANUARY 2012: January 26-27, 2012 -- Obama administration assaults press freedom like no predecessor - Wayne Madsen Report

WMR has learned and has personally experienced the unprecedented assault by the Obama administration, aided and abetted by its intelligence and internal security infrastructure, on the First Amendment right of freedom of the press.

The Obama administration has indicted a total of six U.S. government employees with violating the arcane 1917 Espionage Act for allegedly communicating classified information to the press. The Obama administration, according to multi-agency U.S. government sources , has authorized the eavesdropping of journalists' e-mails, text messages, and phone calls to determine to whom they are in contact within the government, particularly in the Departments of State, Defense, Justice, the CIA, the U.S. Congress' intelligence oversight committees, and the National Security Agency (NSA). The NSA and FBI are also monitoring what websites are visited by government employees, including this one.

The six people charged under the Espionage Act with providing classified information to journalists (the "Obama Six") are:

  • John Kiriakou, former CIA, allegedly passed information on waterboarding torture tactics and the identity of a CIA torturer to someone identified by the government as "Journalist A." The chief government prosecutor is U.S. Attorney for Northern Illinois Patrick Fitzgerald, who WMR has identified as a cover-up prosecutor for the CIA ever since the days he suppressed critical intelligence in the trial of the "Blind Sheik," Omar Abdel Rahman, convicted for plotting the 1993 World Trade Center bombing and later, when he failed to bring Espionage Act charges against Dick Cheney chief of staff I. Lewis "Scooter" Libby in the Valerie Plame Wilson leak case. Fitzgerald also prosecuted former Illinois Governor Rod Blagojevich to protect the CIA's one-time agent, Barack Obama, Jr., from scandal arising from Obama's political and social activities in Chicago.
  • Jeffrey Sterling, former CIA, charged with providing The New York Times' James Risen with classified information on Iran's nuclear program.
  • Army Private First Class Bradley Manning, charged with providing over a quarter million State Department classified and unclassified cables from the SIPRnet communication system to WikiLeaks.
  • Thomas Drake, former NSA official, charged with providing classified information to journalists, including former Baltimore Sun reporter Siobhan Gorman. The charges against Drake were later reduced.
  • Stephen Kim, former State Department contractor, charged with leaking classified information about North Korea to Fox News' James Rosen.
  • Shamai Leibowitz, former FBI Hebrew translator, convicted of leaking classified FBI wiretaps to a blogger on Israeli intelligence activities in the United States directed at stirring up war fever against Iran. As yet, Leibowitz has been the only person convicted under the Espionage Act for leaking information to the media. The government fast-tracked the Leibowitz trial in order to supress coverage of Israel's massive intelligence operations in the United States.

WMR knows of six other ex-employees of NSA and the State Department who continue to face criminal probes by the Obama administration for leaking information to the press.

Government employees face constant monitoring of their government emails, as well as their personal e-mail accounts for any contact with the press. The FBI, NSA, and other agencies are also monitoring the web sites visited by government employees. At the State Department, lists of web sites visited by employees are maintained by the Diplomatic Security Service (DSS). DSS also maintains lists of charities to which State Department employees donate money.


WMR learned of one case where the U.S. Navy blocked access to the web for an employee who visited WayneMadsenReport.com from a government computer. The employee was required to explain to the system security administrator why WMR was visited and cautioned that WMR is on a "banned" list for Navy employees. At NSA, employees have been ordered not to disseminate any articles from WMR on the agency's internal e-mail system or they will face disciplinary action and possible loss of security access and their jobs.

There are also increasing reports that journalists' e-mails are being monitored or completely blocked by the U.S. government agencies and cooperating Internet Service Providers (ISPs). WMR has recently experienced such a denial-of-service by America On-Line (AOL).

The increased harassment of journalist sources by the Obama administration comes at the same time that Reporters Without Borders has dropped the United States on the World Press Freedom Index to 47 from 20 on the press freedom ranking list. At 47, the United States is tied with Romania and Argentina and ranks below the Union of Comoros in the Indian Ocean; increasingly fascist-oriented Hungary; Papua New Guinea, which has experienced a military coup; Mali; Tanzania; Botswana; Suriname; Niger; and Cape Verde. In 2002, during the second year of the Bush administration, the United States was ranked at 17.

///////////////

MARCH 2012: March 7-8, 2012 -- Justice Dept. prosecutor targeting whistle blowers and journalists has his own criminal history - Wayne Madsen Report

William Welch II was the chief of the Justice Department’s Public Integrity Section. While the title of his former office -- public integrity -- implies that Welch is dedicated to fighting corruption in the government, in President Obama's and Attorney General Eric Holder's Orwellian world of "Newspeak," Welch is the chief inquisitor of government whistle blowers and journalists who have communicated with them.

After committing ethical and legal violations in his investigation of the late Alaska Senator Ted Stevens, acts that resulted in criminal charges being dropped against Stevens and a criminal contempt of court investigation being opened against Welch, along with a Justice Department ethics probe, Welch continues to investigate national security whistle blowers. Welch has become a de facto special prosecutor, a modern day Juan de Torquemada, responsible for pursuing government "leakers" and journalists. Welch's targets have included National Security Agency fraud whistle blower Thomas Drake. He also has his sights set on former CIA officer Jeffrey Sterling and James Risen, the New York Times national security correspondent who Welch believes communicated with Sterling. Risen and the Times are fighting a subpoena for Risen to answer Welch's questions before a grand jury. Previously quashed by U.S. Judge for the U.S. District Court for Eastern Virginia Leonie Brinkema, the subpoena has been appealed by Welch and Holder to the U.S. Court of Appeals for the Fourth Circuit in Richmond, Virginia.

Welch and his team were also publicly berated by U.S. Judge Richard Bennett for faulty evidence against Drake who was being doggedly pursued by Welch for allegedly communicating with aBaltimore Sun reporter about billions of dollars in contract fraud committed at NSA, where Drake served in a senior executive position. Drake and veteran NSA colleagues found themselves being raided at gunpoint by FBI agents under Welch's supervision. Welch's case against Drake collapsed and in a plea agreement, all Welch could get from Drake's defense team was a guilty plea for a minor charge of misusing a government computer. Bennett rejected Welch's argument that Drake be given a $50,000 fine. Bennett said Welch put Drake through “four years of hell."

Bennett also criticized Welch for taking so long in bringing charges against Drake. Welch's case against Drake was conducted in anything but a speedy fashion. Welch's tactics included keeping potentially exculpatory evidence from Drake's defense team for months after the indictment was handed down. For over six months, Welch's team failed to produce evidence that one of the allegedly classified documents Drake was charged with improperly retaining was declassified two months after the indictment was issued.

Welch waited ten months to turn over evidence that another document that formed the basis of an Espionage Act charge against Drake had been - in the words of Drake's criminal defense team - “. . . published as 'unclassified' and had never been deemed 'classified' until after it was recovered from Mr. Drake's home.” The re-classification of previously de-classified documents is one of the tricks employed by the Holder Justice Department in pursuing leak investigations. Welch also informed Drake's criminal defense team that potentially exculpatory evidence relating to Drake's years-long cooperation with a Department of Defense Inspector General (DoD IG) investigation had somehow been "destroyed."

Welch has had a history with "destroyed" evidence. On December 1, 1996, Welch, who was then an assistant U.S. Attorney in Massachusetts and 33 years old, was stopped by the police on Route 10 in Southampton. Welch was arrested for driving under the influence of alcohol by a police officer after Welch failed four field sobriety tests. A special prosecutor was named in the case against Welch. According to the Union-News of Springfield, the prosecutor, Robert C. Bray, discovered that the police cruiser's video recorder failed to operate properly and the video tape could not be used as evidence against Welch. It also helped that Welch's father was Superior Court of Massachusetts judge William H. Welch. The senior Welch, who died in 2007, had been considered for four federal judgeships but was never nominated.

According to the Union-News, Southampton Police Lt. David Silvernail said that the video camera, which was purchased in November 1996 with federal grant money, 'went on when overhead cruiser lights were activated and was not supposed to go off until an officer shut it off.' Apparently, the camera had been shutting itself off after three minutes, but miraculously for Welch the problem was not discovered until Welch's arrest. 'The camera was sent back to its manufacturer to be fixed after the problem was found,' Silvernail
told the newspaper. The criminal case against Welch was dropped. The tape was later reused by Southampton police officers and the Welch arrest segment was erased.


williamwelch.jpeg


William Welch blows every case to which he is assigned. Perhaps he should blow into a plastic bag.


The story of William Welch is not an isolated one among Justice Department prosecutors. In Welch's case, someone who was so drunk he could not pass four sobriety tests on a Massachusetts highway is now entrusted by the Obama administration with the power to investigate those who challenge incompetence and wrongdoing in the U.S. intelligence community.

//////////////////////

END WAYNEMADSENREPORT.COM ITEMS >>>>

Whew.... All right. Now go read the Puzzle Palace and the Shadow Factory and everything you can find on Cryptome.org and PublicIntelligence.net about the NSA & Cryptography. GET [hash] CRACKIN!

Political duality of the week: Electoral politics crushes anti-establishment networks of Ron Paul & Wisconsin uprising reframed as #WIrecall. What now, lolcats?

Government is the Entertainment Division of the military-industrial complex.
-- attributed to Frank Zappa

The ugly realities of modern electoral politics in America hit home this week with two body blows to self-styled anti-authoritarian political networks: The Ron Paul movement finally hit the brick wall as Rand Paul (R-KY Coal Mines) endorsed Mitt Romney (R-Rich Mormon Mafia) -- utterly shocking & depressing tons of semi-libertarian Republicans along with the entire conservative side of the "Truther" and/or "Liberty" movements.

Days earlier, the Wisconsin recall election against Gov. Scott Walker (R-Petulance) turned in uglier-than-expected numbers as likely thousands of Wisconsinites were stripped of their Constitutional right to vote through ridiculous new regulations -- and of course a bunch of shady electronic voting machines run from a company in a suburban St. Cloud strip mall. Fox News flacks and nasty Gloria Borger/Sarah Palin types cackled that the unruly, rebellious hordes had been licked for good. Now, the Paulistas and the rebellious Cheesehead hordes must ask: what's next?!

Perhaps these movements never had too much in common, though you could find some overlapping supporters. Probably the biggest difference is the Liberty types are pretty darn hostile to mainstream unions while the #OccupyCapitol (which the Dems transmuted into #WIrecall) clearly ended up with unions as its main hub. But they shared a hostility to the party hierarchies, business as usual, and to some extent the elite financial/War Machine domestic & international complexes, which has triggered the financial/austerity crisis by sucking out trillions of dollars.

The anarchist strain in Wisconsin, buttressed mainly by the IWW, complemented the non-interventionist libertarian one that's been rolling since about 2007 -- it showed that the new politics that people are actively hunting for is certainly not statist or socialist in the traditional sense.

UPDATE 5:30PM June 10: I got a response of sorts to the piece sent over twitter by @superbranch which is helpful for illustrating a number of details especially Democratic Party machinations: http://pastebin.com/vKh3tfh6 - Thanks!! I only had a view from a distance for most of this affair, so it's good stuff.

UPDATE 6:10PM June 10: Someone suggested that all anarchists are by definition socialists, though I think of socialism as a statist set of philosophies. In older times some labeled this "state socialism" vs. "libertarian socialism." See an Anarchist FAQ, example Kropotkin: "[s]o long as Socialism was understood in its wide, generic, and true sense -- as an effort to abolish the exploitation of Labour by Capital -- the Anarchists were marching hand-in-hands with the Socialists of that time", etc. & also see Black Flame blog. Also Article IV of the General Bylaws of the IWW Constitution specifically forbids "Political Alliances." "To the end of promoting industrial unity and of securing necessary discipline within the organisation, the IWW refuses all alliances, direct or indirect, with any political parties or anti-political sects, and disclaims responsibility for any individual opinion or act which may be at variance with the purposes herein expressed." Thus while I would say they are still anarcho-syndicalist, they are not formally set up as 'anarchist' per se. I feel I over-generalized in how I characterized the IWW, so sorry about that! (see also The League of Peace and Freedom for an org from that era)

UPDATE June 11: I mentioned prominent libertarian Lew Rockwell & forgot about his purported role in that whole Ron Paul "racist newsletter" narrative -- Rockwell is seen by many as the main ghostwriter in the 1980s newsletters. That stuff was creepy. More info here, here, here, here, here, etc. His newsletter compadre Murray Rothbard wrote "Egalitarianism as a Revolt Against Nature" in 1973 which I think illustrates the not-cool-at-all aspect of these guys that led to the ugly views in those newsletters.

******

On the Wisconsin Side: Turning A Broad Popular Uprising Into An AFSCME Bargaining Rights Boxing Match

I've never seen such a staggering level of oppositional political energy squandered in this country like I did at the Capitol rally one clear day last spring. That night, as laborites fumed at the Labor Temple meeting hosted by the IWW and drifted downstairs to commence drinking, I collected Wobbly swag and later driving around Madison speculated with friends what could happen if people occupied dozens of sites like they had the Capitol. Or maybe an image of the future arrived early in my mind. Either way, real-world radicalism receded yet again once more into dull, conventional latency. [cartoon by Toles]

toles-wisconsin-recall.jpeg

Perhaps the greatest achievement of the Republicans (which the Dems of course walked right into) was to narrow down and reframe the scope of the opposition from broad, radical revulsion at burning down virtually all aspects of governance in Wisconsin to a small, deeply mainstream, sore-loser election shitfit over government union bargaining rights.

As a party, the Dems just didn't want -- and probably couldn't understand -- an independent network pushing back, outside their control, a decentralized resistance to the Shock Doctrine. There was a real broad and sturdy community commencing in opposition, and the Dems demanded ideological buy-in, then splintered it into a thousand pieces and cast it to the wind. They couldn't recognize the dignity of people that didn't like either party -- people for whom a Recall and Milwaukee's Mayor Barrett didn't answer their questions.

The Democrats & the motivated Wisconsinites couldn't solve the problem of the pointless election industry. in order to fix anything at all, electoral politics needs to be a consequence of organizing for a better society, not the ultimate goal of organizing in perpetual 2-year cycles. In today's system, we have all our available cash thrown at short-lived election industry organizations that produce almost nothing of lasting value -- but they do make broadcasters richer.

How much more vast and worthy a fight it seemed last year. I was there on "Go Home Day," the day the state Democrats basically told everyone to go home and organize to recall the governor. While successful recalls of some GOP state senators did save the north country from a really bad mining project that would have destroyed an Indian tribe and much else besides, (the deciding GOP senator flipped) - and apparently the Wisconsin Senate did flip to Dem control in another recall around Racine as well, the national media, and the Star Tribune, are quite happy to buy the simple GOP narrative.

While Walker's goose still looked pretty well-and-cooked by early 2012, the Democratic Party of course knew how to biff an opportunity better than anyone. At the infamous Go Home Day, those rally-goers would have done damn near anything. If the senators had called for them to do cool actions around the state every two weeks - not just rallies but actual badass shit - everyone would have gone for it. Instead, the solution was conventional election industry operations and endless, destructive primaries.

It's fitting at least the Senate flipped after all the efforts, since the shockingly illegal abuses of power really came through that body, including violating the state's open meeting law to rail through their union-busting bill. It was classic political overreach that came with Shock Doctrine, slashing corporate taxes, trying to privatize the entire U of Wi system into the "Badger Partnership," (since of course it's one of the few old Germanic-style institutions not entirely oriented to corporatism today), Voter ID to block students and minorities from voting, etc. These sudden, broader conflicts added up to an incredibly attractive, unprecedentedly broad & open class war-type super-conflict across the state, which managed to radicalize thousands of heretofore-discreet firefighters and even police officers to protest in the streets & sleep in the Capitol!

The Democratic Party masters in Washington DC must have been appalled by this uprising. It conflicted horribly with their usual approach of throwing a couple bones to organized labor while screwing over them, the students and rank-and-file Dem activist types as much as possible, as they have year after year, to the benefit of the national security and financial industries.

tumblr_lhwry1Jbe51qduy0jo1_r1_1280.png

Chris Cillizza put it in the Fix, probably with great accuracy, that the national Dems did not want to see a recall election: "There was considerable internal discussion and disagreement between Washington and Wisconsin Democrats (and organized labor) about whether to push for a recall election this summer or wait until 2014 for a chance to unseat Walker. (Washington Democrats broadly favored the latter option, Wisconsin Democrats and labor the former)."

More to the point they did not want to see an independent populism rising in this country without Dem political hacks steering it away from their big contributors, such as the Wall Street criminals that have been fleecing the rest of the party base for years. This same dynamic played out again when the federal government through Homeland Security and the FBI, and Democratic mayors coordinated to dismantle the Occupy encampments in late 2011, then the Feds turned to setting up informant based-stings into 2012 in order to psyop the media away from the message that our institutions and politicians have grossly failed us. These stings were synthesized for Mayday and the Chicago NATO Summit, it was no accident.

Now, at least, the problem of post-Citizens United elections financed mainly by the likes of the Koch brothers, casino magnate Sheldon Adelson, and corporate treasuries have been laid bare. At the bottom of the tens of millions of dollars pumped into the state by many anonymous entities, Wisconsinites were paid $50 a pop to post yard signs, $20 to attend events, etc., and now at least the people know this is the core truth of modern electoral politics. According to one person I talked to, even Walker campaign workers were depressed by the massive constant cash flow. They knew it was an arrival at a new low. He who has the gold, rules. But who will carry the truth out of cheese country?

And as always, national and local media walk away from shady election practices -- irregularities are nothing but sour grapes and jags in the already agreed-upon narrative everyone's sticking with, kid. Only weirdos like BradBlog care about the hundreds of complaints -- of citizens being stripped of the one available gesture which underpins the entire legitimacy of the system. Maybe those people, lacking a voice in their own governance, will take things to a more direct level. At this point, why shouldn't they rebel against the apparatus? Freedom's just another word for no votes left to lose....

The Dems have a decent shot at keeping the state politically divided, even with the GOP's advantageous redistricting, which for example will add conservative exurban Chicagoans to the Racine district that flipped D last week. The national GOP and the state press probably won't admit it, but the enthusiasm for scorched-earth politics has long worn off and glorious gridlock will return.

I saw on Twitter speculation about a General Strike for Milwaukee -- and a lot of activists apparently haven't enjoyed their tenure working in electoral politics with the Democrats. We could see more direct action - and with a relatively militant street protest in Milwaukee along with an Quebec sympathy march by Occupy Chicago getting beaten down by CPD last week, more radical politics along Lake Michigan is probably in the cards. People signed those recalls for a reason and they're going to want to do something different, to keep organizing against the tidal force of big money.

******

Et Tu, Rand Paul! Truthers & Liberty Movements lose their vanguard & screech to a halt?

A decidedly different arc of the spectrum finally got the letdown they've been staving off for months this week, and now they too need to put their pieces back together and move along. Antiwar.com's Justin Raimondo had Rand pegged way back in September 2010: he was playing footsie with the neocons but the Paul network people didn't want to believe it. (and mapped the wind-down in February) Today they're reeling -- it seals what they've avoided facing for a couple months, that the GOP nomination is finally out of reach. Here's the man enthusiastically endorsing Mittens:

Seriously, he looks more depressed than anyone I've ever seen touting Republicans on Fox News. But I think the back conversation is also illustrative: Rand Paul has always been clear that Kentucky coal mines are awesome and SOPA was evil & worth opposing. This is the awesome package you get with the Liberty movement.

Via Mike Adams: Linguistic analysis of Rand Paul's endorsement of Romney contradicts his words: Rand Paul is disgusted with him! I kind of had to sigh at this whole piece, which is too bad because usually Adams is peppy and kind of fun in how he sticks it to the FDA deathfood industrial complex:

It is the system itself that is broken, corrupt and defunct. This is the very point of Lew Rockwell, who explained in a recent interview with RT that the government itself is always the problem, and that no government can rescue the People from the problems of government: http://www.prisonplanet.com/lew-rockwell-ron-paul-and-rand-paul-are-d...
[.....]
Personally, I completely agree with Alex in saying there is no compromise allowed. No doing deals with the devil. If we support liberty, we must deny our support for those who oppose it. We must never allow ourselves to become part of the very system that is destroying our economy, our liberties and our future. It is widely acknowledged now -- even on the political left -- that Obama is a traitor to America, but there is no indication that Romney wouldn't be even worse. He's practically a white version of Obama, with much the same platform: Government-run socialized medicine, high taxes, War on Drugs, secret military prisons, banker bailouts, gun confiscation and so on. Having Romney runs things in Washington will produce no better results than we've already seen over the last four years. It may even be worse, if you can imagine that.

[.....] I am not yet denouncing Sen. Rand Paul, as I still hope there is a double agent aspect to his actions and that somehow he will emerge as a defender of liberty. In my view, his track record has at least earned our patience in observing this situation a little longer. However, if Rand Paul continues down this path without explanation, it is all but clear he will destroy his political career and lose virtually his entire support base -- the very people who put him in the U.S. Senate in the first place.



As with all lovers of liberty, my patience is running out, and I'm beginning to think Lew Rockwell was right all along:All government is inherently evil and destructive, and that we are all foolish to think government can ever be changed through elections.

[bold emphasis his] I'm not exactly an enthusiastic statist, but this isn't really the nation's most productive perspective. Lew Rockwell is probably best described as a hard-core Libertarian, maybe even a Voluntaryist and/or "Market Anarchist" (see the Center for a Stateless Society) which is a set of views most Anarchists vehemently disagree with. Capitalism without the collection of memes and buildings we call a government would really suck even more than it does now. If we can envision a way to somehow finally move out of capitalism and leave capitalism's main organizer, the government, behind with it, that would be a little more balanced.

But this perspective isn't coming out of left field altogether - there's in a reason that Voluntaryist type thinking is more attractive than ever on the American Right and capital-A Anarchism is way more popular than a year ago, mostly thanks to the Occupy Wall Street project that blew up way beyond anyone's expectations.

While there's an escapist quality to libertarianism and anarchism, everyone wants to escape for a reason. There's a tangible sense - backed up with countless examples - that these structures held over us through violence, coercion and endless ranks of nasty little helpers - are utterly indifferent if not outright hostile to our chances of survival, let alone defending our dwindling freedoms. Shocked anyone would feel that way? Without much effort, we can feel a prison state closing in around us, seemingly poisoning everything from our pores to our skies to our souls.

Embitterment with the corporatist two-party system and its agenda of perpetual resource wars under loathsome, almost occult, entities like the IMF and NATO, along with a collapse in the standard of living for tens if not hundreds of millions of Americans, has brought plenty of anger towards government institutions that seem to exist solely to protect corrupt corporate cartels at the expense of smaller players (see the Gibson guitar drama, or FDA's love affair with big pharma), along with running protection for a rapacious and insane financial industry which has defrauded the American people of countless trillions of dollars in assets & hard-won dollars.

But the people feeling most burned this week outside of Wisconsin might be the Truthers who believed in Ron Paul. No one's done more to tie the people who refused to buy the government narrative on the Sept 11 2011 terrorist attacks to the Ron Paul network than Texas radio host Alex Jones.

While I certainly don't agree with plenty of Jones' views -- and I told him a month ago when I had the chance that it was important for all of us to avoid being conveyor belts for fear -- many people who criticize him are partly doing so simply because the national scene of Terror Narrative skeptics aka "Truthers" is so weak and divided that he's by default That Main Guy, so it must be his fault the available views are so politically narrow & funneled into a certain electoral machine that has now failed to Deliver the Goods.

It's not Ron Paul's fault or Alex Jones' fault that the rest of DC is basically composed of feckless war chickenhawks who are totally hostile to resisting false flags, the war on drugs and other scams of the military-industrial-intelligence-congressional complex. We all know modern COINTELPRO keeps the political discussion locked in a certain box. But was Alex Jones "duped" by Ron Paul? Check this out...

Here's just a classic recent moment worth watching between Jones and the closest thing he has to a mainstream left counterpart, the bookish conspiracy wonk Webster Tarpley. In this video, Alex Jones' years-long campaign to advocate Ron Paul's election shop finally comes to a sputtering end as Tarpley points out a lot of deliciously salient yet in retrospect quite obvious political points from the campaign. For great lulz he says Paul & Romney represent the amiable merger of southern Scottish Rite Freemasonry (a la Secret Sun) and the crypto-Freemasonic beliefs of Mormonism.

Tarpley, who has a quasi-FDR style political outlook has done a lot of nice pieces and books [Synthetic Terror PDF] over the years, and as a former associate of Lyndon LaRouche (also FDR-like in a weird way) he never saw a Anglo-Dutch conspiracy he didn't like to flush out.

Tarpley points out that Ron Paul declined to really attack Romney at all in the GOP debates, generally firing on Romney's leading opponents and also deflecting their anger. With Romney's cousin Huntsman as the opposite left/centrist flank, the good doctor was able to absorb basically all the anti-establishment votes against Romney. When Jones is holding the mic, you can just hear Tarpley saying that Paul ran interference for Romney and Jones ran interference for Paul. OUCH.

Obviously I felt it was beneficial to the country to have Paul challenging the warmongers and exposing their bloodthirsty insanity, the disturbingly unvarnished Id in some of those crowds, and it would have been better to have a Paul vs Obama campaign to force the war & big brother state issues to the fore. But this was never really in the cards, even if Paul would have been a better general election candidate for the GOP than Romney (which he probably would have been).

This, after all, is American electoral politics. Frank Zappa characterized it as the entertainment wing of the military-industrial complex and of course he was right. The intelligence structures are never going to let anyone advance into office who would undo the National Security Act of 1947 and the cultish secret state it initiated to be undone.

They are perfectly happy to keep everything managed under two-party dialectics with tons of corporate money swaying all the big issues. Since we don't have a parliamentary system anywhere in this country, with party lists that would permit minority viewpoints a legislative voice, every interesting electoral project, from Howard Dean or Ralph Nader to Ron Paul and Dennis Kucinich, become exercises in futility, white knights to rally the less-brainwashed masses & follow off to electoral oblivion with great fanfare. And if things get too close, a few Nixonian dirty tricks and buffer overflows in the voting machines can clean it up in no time.

Hell, if Lyndon Johnson wouldn't even expose Richard Nixon's treasonous blocking of the Paris peace conference on Vietnam, what chance does this more lame and greasy generation of politicians have?

In the GOP process this year, the anti-Paul people made sure to lock out & dirty-trick as many Paulistas as they could, leading to memorably weird chaos at normally-staid GOP conventions across America. The Romney 'network' is about an inch deep (apart from Bain operatives making trouble China & stuff), while seemingly endless weird networks of lolcats affiliated with the Ron Paul campaign.

In the 2008 cycle, it was insightfully put that the Paul campaign was very deliberately a narrative void or a cipher, so that the Truther groups could happily write themselves into the narrative and identify with it, along with IT nerds, the post-Perot types, and at the darker end, much more creepy prejudiced nativist types & etc. (and this varied heavily state-to-state, with Michigan less creepy than Arizona, etc.).

Unfortunately, because the Truther movement just didn't have a good broad nature in the political spectrum (well it does, but it doesn't operate that way), working with the anti-militarist Paul campaign to recruit and hang onto all those rebelliously-minded people effectively diverted them from possibly amplifying other efforts. He'd talk about false flags and ideals of liberty, but did Paul ever make it clear people needed to get out of their political comfort zone to take on adversaries we all share?

The ideological buy-in needed to become a true believer in electoral politics made rivals of people that could have and should have been allies -- in their own best interests. For example, it drove a wedge between Ron Paul fans who became Rand Paul fans, who liked his deregulatory push on coal mines, against the mountaintop removal activists. That wedge is perhaps the tragedy -- could it be undone?

What if everyone had instead agitated -- in a non-partisan style -- at their state legislatures against the corrupt operations of the federal government, the false flags, the constant stings and setups targeting both left and right, not to mention Muslims? What if they'd done direct actions together in the field against minions of the police state? There was a real biffed opportunity to build a good, multi-level resistance network outside of the traps and pitfalls of electoral politics.

Hopefully the remainders of the 2012 Paul network can pick themselves up and pivot more to more broad social issues, as well as the Big Brother system which is rapidly expanding -- if they can get a handle on how the Federal Reserve, while a keystone, is in many ways just the trade association or front-plate for the politically engaged big banks (with an infinite money printer).

The Big Brother system isn't exclusively government-based either, despite what Lew Rockwell and Mike Adams believe. It's really getting implemented by less than 25 military-industrial contractors with about 300 below that, and another several hundred below them. I can only expect these people to redouble their scrutiny and fierce public resistance, sending many would-be technocratic control freaks running for cover. The gains they made in the formal GOP system will add more wrinkles to what looked like an easy rollout for the prison state.

The Big Brother complex is capitalist, not in the sense of a 'free market' but in the sense it's commidifying everything about human freedom. It arrives through statism, but with dollar signs. It's the tender mercies of the GEO Group letting 'juvies' get sexually assaulted in hellish Mississippi private prisons. It's having foot locators on everyone. Ex by Matt Stoller: Profit-Driven Surveillance and the Spectrum of Freedom: “We will offer electronic monitoring services in every state.”

******

So now, between Wisconsin and the Truthers and the Ron Paul cats, here we sit, at the long dark teatime of the soul, as Douglas Adams put it. All our shared problems mount and continue to deteriorate -- the usual foibles of humanity, greed, idolatry, the search for white knights to preserve that which never existed in the first place, the hunt for strange new threats from within and without -- all of these are still with us. Ancient Greek historians would chuckle that twenty-some centuries later, we fall for the same damn tricks every time.

Perhaps as they say there is nothing new in the universe, but I've seen a lot of synchronicity. I've seen a lot more pieces fall into place and weirdly line up than I think my traditional atheist mundane-universe perspective could explain. After all, today's militant Dawkins type atheists can't explain too well why evil -- and its handmaiden, war -- impose such a powerful force of their own. Nor can they explain what summons people to such resistance, or on occasion such luck and grace.

Even when dealt those staggering blows -- even when your political projects seemingly turn to dust overnight yet again -- besides the fond memories of fighting the good fight with your comrades, you made new friends, you built new skills, you showed the novices a thing or two. You didn't live on your knees, you threatened the despicable & illegitimate flows of authority. From time to time, you really wigged them out. And yes, you won a victory, two, or three, and inspired a few more.

The challenge, of course, is for all these people to reach outside their comfort zone, to abandon the elections-first perspective and turn to the more difficult project of politics in real time, not the deferred imaginary future image produced by the operatives of election industry, the illusionary catharsis they pitch as tomorrow's ballot box.

Bilderberg conference, evil Prince Bernhard, the Junkers & long arc of German agenda

In the aftermath of the infamous Bilderberg Conference, I would like to throw this essay out there about the long arc of everything from the Hanseatic League to the European Common Market and European Union.

It's jumping off from an old book, The Thousand Year Conspiracy, published during WWII which pointed out that Hitler's days were numbered but the geopolitical agenda of eastern German aristocracy would keep on rolling - and it certainly did in many respects. The book:

http://spitfirelist.com/books/winkler1a.pdf

http://spitfirelist.com/books/winkler1b.pdf

If you thought German policy over the decades was just kind of a void, lurching from the Kaiser and Krupp to the Nazis, this was an interesting take on a certain coherency I wasn't really aware of. (and the so-called "Windsor" family controlling Britain isn't really addressed but ties right in).

The essay: http://explosivereports.com/2012/05/28/ancient-roots-of-bilderberg-reveal-prusso-teutonic-agenda-for-world-domination/

It also gets to the filthy schemes of Dutch Prince Bernhard who has been the main mover on Bilderberg since the get-go, a classic Junker German aristocrat, setting up the corrupt corporatist greenwashing front World Wildlife Fund for Nature [sic].

I think we get a lot about bureaucrats, banks and nationalism but the long arc of aristocracy is usually written off from state-side analysis of Europe. While this writeup might be a little bit too 'pat', are there other sources along similar lines looking at long-run aristocrat geopolitical schemes?

Don't miss this writeup on the WWF 1001 Club which is full of crazed Iran Contra arms dealer types - http://www.undovedmind.org/ISGP/articles/organisations/1001_Club.htm . ISGP was a wonderful site & I'm glad it's archived now.

Der Spiegel just blew WWF out of the water for its racist corporatist policies destroying native cultures & promoting extractive soybean monocultures, etc - don't miss this story either.

UPDATE June 5th: I found a few more roundup posts on Bilderberg for the interested. MEDIAROOTS – Reporting From Outside Party Lines Abby Martin roundup // The Final Day At Bilderberg 2012 With Luke Rudkowski // Bilderberg: the covert globalist government? RT // Washington Post Finally Breaks ‘Bilderberg’ Silence | American Free Press and they mention Minnesota's own consigliere, Vin Weber // Activist Post: The Global Elite’s Digital Agenda Played Out as Censorship and Cyber Warfare // real economics: Bilderberg 2012—a gathering of the mega-Predators // Protest groups converge to denounce secretive Bilderberg conference | The Raw Story // Bilderberg 2012 - Caledonia, WI Patch // The Media is Dead….Long Live the Media (Bilderberg 2012 Review) // Occupy Bilderberg: An Experiment in Activist Journalism // Good stuff!

Sibel Edmonds narrative released in 'Classified Woman'

After many years of struggling to get her story across to the American public, 9/11 & FBI/national security whistleblower Sibel Edmonds has released "
Classified Woman"".

For many years we have tried to track aspects of Sibel's case on this site (older hub page & category) including the role of foreign agents of influence and friends of corrupt foreign powers (frequently neocons) using their government jobs to sell America down the river.

The federal government did everything possible to conceal many aspects of 9/11 including prior intelligence reports, certain corporate fronts (like Giza Technologies which had been used to proliferate nuclear technology) and long-running intel programs like those which built up Islamic fundamentalist militias around Asia and Europe, NATO operations in many cases, an aspect finally revealed in more detail in Sibel's book (which unfortunately I haven't been able to snag yet!).

Part of the problem with privatizing intelligence operations was formalized by Executive Order 12333 from Dec 1981:

2.7 Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.

.... so thus, as pointed out in the documentary about the Edmonds case, Kill the Messenger (full video), Giza's work to proliferate nuclear technology, if carried out under rules like 2.7 of EO 12333, would have to be covered up by the DOJ even after they went after the Israeli interlocutor for the nuclear goodies (roughly, a limited hangout).



There is a lot more to be added on the case, in particular now how whistleblowers get ever more ruthless treatment under the Obama Administration.
As with former CIA asset Susan Lindauer, who also had 'loose ends' of 9/11 the establishment didn't want to hear about, (special posts one and two), the nastiest tools in the national security toolkit are directed not at nefarious terrorists and evildoers, nor networks of foreign agents-of-influence in the halls of government, but whistleblowers and anyone else 'ruffling feathers' out there.
Bonus factoid - with the NATO Summit from Hell around the corner in Chicago, the powers that be hid Meleck Can Dickerson and Douglas Dickerson in the NATO bureaucracy-octopus in Brussels.
The neocons hid in various places and have re-coalesced in the Romney campaign. Oh, we will have the likes of Douglas Feith, Richard Perle, Eric Edelman and Marc Grossman to kick around again, should we be visited with the misfortune of a Romney presidency.
See also 2009: The new Boiling Frogs Post/Sibel Edmonds site; John Cole on the whole 9/11, Marc Grossman espionage complex etc.

BREAKING: Minnesota Statute used to repress Occupy Minneapolis right now: Unconstitutional speech block & apparent pseudo bomb scare drive repression

UPDATE 7:30AM: We have a slow-motion version showing KSTP videographer assaulted by MPD officer last night http://www.youtube.com/watch?v=s2uDcMI71rs as well as unedited version http://www.youtube.com/watch?v=r_iOXECa1Rw

For more info - http://occupyminneapolis.mn - http://facebook.com/occupymn

****************

We have word from downtown Minneapolis right now that the Minneapolis police are using something akin to a bomb scare to shut down the space around the relaunching Occupy Minneapolis space at Peavey Plaza. As usual the pseudo-war on terror lets those Constitutional rights get carved away one space at a time.

At this time many have gathered in Loring Park after Minneapolis PD issued an order to clear away from Peavey Plaza. According to pieces of paper distributed by people collecting government paychecks, PICTURE: Ow.ly - image uploaded by @OccupyMN -

609.74 PUBLIC NUISANCE.

I don't think this has been used before (such as the RNC) - and of course at this very moment it is being used here illegally to regulate the content of speech in an unconstitutional fashion. In this emergency circumstance, we have just received the full Westlaw analysis of MN Statute 609.74 PUBLIC NUISANCE and have attached it. We have a more interestingly extreme level of government operations going on -- the exact type of conduct which bills before the legislature seek to conceal under permanent secrecy.

As these things become more extreme, less and less transparency will happen. Basically because they are shoehorning their actions into statutes like 609.74.

DOWNLOAD: Westlaw_Document_19_49_25.doc

Obviously this statute is being applied right now to abrogate a lot of Constitutional rights, and the state government in this statute, and local police, on the streets, do not have the standing to remove & detain people for asserting their Consitutional rights tonight using this statute in a 24-hr access public park, yet here we are. The misplacing of priorities here -- rather than say, focusing their resources on fraud, etc -- is a major part of the reason our civilization is in dire straits.

Or as they say in Monty Python, "Now we see the violence inherent in the System!"

a few links tonite ---

http://twitter.com/occupymn

http://twitter.com/hongpong

http://twitter.com/uneditedcamera - & ustream!

http://facebook.com/occupymn

#occupympls

#reoccupympls


**********
Minnesota Statutes Annotated CurrentnessCrimes, Criminals (Ch. 609-624) Chapter 609. Criminal Code (Refs & Annos) Public Misconduct or Nuisance 609.74. Public nuisance
Whoever by an act or failure to perform a legal duty intentionally does any of the following is guilty of maintaining a public nuisance, which is a misdemeanor:
(1) maintains or permits a condition which unreasonably annoys, injures or endangers the safety, health, morals, comfort, or repose of any considerable number of members of the public; or
(2) interferes with, obstructs, or renders dangerous for passage, any public highway or right-of-way, or waters used by the public; or
(3) is guilty of any other act or omission declared by law to be a public nuisance and for which no sentence is spe-cifically provided.
CREDIT(S)
Laws 1963, c. 753. Amended by Laws 1971, c. 23, § 74, eff. March 5, 1971; Laws 1986, c. 444.
RULES OF CRIMINAL PROCEDURE
<Section 480.059, subd. 7, provides in part that statutes which relate to substantive criminal law found in chapter 609, except for sections 609.115 and 609.145, remain in full force and effect notwithstanding the Rules of Criminal Procedure.>
ADVISORY COMMITTEE COMMENT [1963]
2009 Main Volume
The present Minnesota statute on the subject of public nuisance is § 616.01, which reads:
“A public nuisance is a crime against the order and economy of the state and consists in unlawfully doing an act or omitting to perform a duty, which act or omission shall:
“(1) Annoy, injure, or endanger the safety, health, comfort, or repose of any considerable number of per-sons;
“(2) Offend public decency;
“(3) Unlawfully interfere with, obstruct, or tend to obstruct or render dangerous for passage, a lake, naviga-ble river, bay, stream, canal, or basin, or a public park, square, street, alley, or highway; or
“(4) In any way render a considerable number of persons insecure in life or the use of property.”
Minn.St. § 616.02 makes violation a misdemeanor and makes persons who permit a building to be used for such nuisance also liable.
The two sections will be superseded by the above recommended section. These sections were adopted in 1886 from the New York Penal Code of 1881. They have been interpreted by the New York courts as merely stating the common law on the subject.
Minnesota cases appearing on these sections are confined almost entirely to civil suits in actions for dam-ages. The New York cases construing these sections attach no material significance to terms used in these sections in reaching decisions on what constitutes a public nuisance. Common-law principles have been on the whole pursued and read into the sections.
The cases tend to involve several classes of cases:
(1) Where gambling or bawdy houses are maintained, and this has been extended to include places where drinking occurs and to which the public may go, and to establishments where abortions are performed.
It was this class of cases to which the second clause of Minn.St. § 616.01 is directed.
(2) Cases where the question is whether a particular industry is, or is conducted in such manner that it is, a public nuisance. This usually involves weighing of relative values.
This class of cases is covered by Clause 1 of § 616.01.
(3) Interference with the public use of highways, waterways, etc.
This is covered by Clause 3 of § 616.01.
No case was found which turned on the provisions of Clause 4 of § 616.01. The cases cited by the New York revision commissioners, relating to noise and offensive odors, can easily be brought under Clause 1.
A number of states do not make the maintenance of a public nuisance a crime. They rely instead on the power of prosecuting officials to bring abatement or injunction proceedings. This includes Wisconsin and Louisiana.
At the present time the power of the state or local authority to bring an injunction proceeding to abate a public nuisance is well recognized. See State ex rel. Goff v. O'Neil, 1939, 205 Minn. 366, 286 N.W. 316.
There is probably still a place for the crime of public nuisance but it is believed it should be restricted to those instances which come within the purposes of the criminal law.
This will require (1) some criminal intent and (2) limitation of the statute to such specific terms as the na-ture of the problem permits.
Clause (1): Changes from the present statutes made by Clause (1) are:
(1) The word “intentionally” has been added. This will eliminate those cases where there is a good faith claim on the part of the defendant that he has a right to continue with the activity in which he is engaged. This claim he should be entitled to make without the possibility of a criminal penalty hanging over him.
(2) The word “unreasonably” has been added. Reasonable use of one's own property is not a nuisance. This is the present law.
(3) The words “unlawfully doing an act” have been omitted. Many, if not most, nuisance cases involve conduct on one's own premises. It is not illegal unless it is a nuisance.
(4) The word “morals” has been inserted and the present Clause 2 of Minn.St. § 616.01 has been removed.
(5) “Members of the public” has been substituted for “persons.” The distinguishing aspect of a public nui-sance is that it is the public that is affected. There may be “a considerable number of persons” affected and the public still not be involved as interpreted by judicial decisions.
(6) “Creates a condition” is new. The purpose is to emphasize the characteristic feature of a nuisance; namely, that it is something which is more than a single act but is a state of affairs or situation or condition, harmful to the public. The present statute is deficient in this respect. “A certain degree of permanence ... is usually a part of the conception of a nuisance.” Holmes, in Commonwealth v. Patterson, 1885, 138 Mass. 498.
If single specific acts are sought to be prohibited, they should be the subject of a separate statute defining the act as a crime.
Clause (2): This restates Subd. 3 of § 616.01 with some addition and rewording. This is a well recognized basis for a public nuisance.
It might well be made a specific crime quite aside from the crime of nuisance, but it was believed better to continue to treat it as a nuisance and retain the remedies that go with it, such as the right of public authori-ties to bring an action for an injunction.
This will duplicate Minn.St. § 160.27, Subd. 5, Clause (1), in a measure but the duplication is not deemed objectionable.
Public parks are not specifically mentioned in this clause since a public nuisance in a public park is deemed sufficiently covered by Clause (1).
Clause (3): This covers the provision in Minn.St. § 616.02 to the same effect.
There are a number of statutes declaring certain acts public nuisances. These include:
§ 18.331:
This makes certain grain-rust producing plants and bushes public nuisances.
§ 37.21:
This makes the sale of intoxicating liquor near the state fair grounds a public nuisance.
§ 169.07:
This makes obstructing the view to highway traffic signs a public nuisance.
§ 360.032:
This makes trees and other obstructions to airport approaches public nuisances.
§ 411.40:
This empowers cities of the first class to declare public nuisances.
§ 411.45:
This preserves legal actions to abate nuisances.
§ 437.09:
This makes itinerant carnivals, street shows, etc., public nuisances.
§ 461.07:
This authorizes ordinances making dense smoke a nuisance. See also Minn.St. § 461.09 giving similar authority to cities of the third class.
§ 462.17:
This makes buildings not conforming to city ordinances public nuisances.
§ 471.92:
This makes open wells, cesspools, cisterns, etc., public nuisances.
§ 614.01:
This section is superseded by recommended §§ 609.75 to 609.76. No provision has been included in this revision making a lottery a public nuisance. However, places where lotteries are conducted contribute to injury of public morals and would thus fall within the meaning of Clause (1) of the recommended section.
§ 616.39:
This makes itinerant carnivals public nuisances.
§ 617.33:
This makes houses of prostitution public nuisances. Subsequent sections empower the county attorney to bring an action to abate the nuisance.
§ 618.14:
This makes drug addict resorts a common nuisance.
No provision has been included that is equivalent to Clause 4 of § 616.01. This was regarded as too broad and sweeping to include in a criminal statute. It adds nothing to what falls within Clause (1) of the recom-mended section.
HISTORICAL AND STATUTORY NOTES
2009 Main Volume
Derivation:
St.1961, §§ 616.01, 616.02, 616.16.
St.1927, §§ 10241, 10245.
Gen.St.1923, §§ 10241, 10245.
Gen.St.1913, §§ 8759, 8760.
Rev.Laws 1905, §§ 4987, 4988.
Gen.St.1894, §§ 6613, 6615, 6616.
Pen.Code, §§ 319, 321, 322.
Gen.St.1878, c. 98, §§ 8, 9.
Laws 1876, c. 54, §§ 1, 2.
The 1971 amendatory act substituted the specified penalty of misdemeanor for a former penalty of imprisonment for not more than 90 days or a fine of not more than $100.
Laws 1986, c. 444, authorized the removal of nonsubstantive gender specific references.
CROSS REFERENCES
Abatement, powers and duties of the board of health, see §§ 145A.04, 145A.05.Abortion, obscenity, public nuisances, see § 617.80 et seq.Buildings declared a nuisance, see § 462.17.Misdemeanor, penalty when not otherwise provided, see § 609.03.Noxious bushes and weeds, see § 18.75 et seq.Nuisance; acts constituting, see § 617.81.Nuisance defined, see § 561.01.Nuisance liability of agricultural operations, see § 561.19.Offensive trades and employments, see § 145A.05.Unauthorized signs on highways, abatement, see § 169.07.Uses of right-of-way, misdemeanors, see §§ 160.27, 160.2715.
LAW REVIEW AND JOURNAL COMMENTARIES
Animal feedlot regulation in Minnesota. Marcia R. Gelpe, 1981, 7 Wm. Mitchell L.Rev. 399.
Environmental rights act. 1972, 56 Minn.L.Rev. 575.
Governmental tort liability. Orville C. Peterson. 26 Minn.L.Rev. 613 (1942).
Jet noise in airport areas. May 1967, 51 Minn.L.Rev. 1087.
Liability of municipality and abutting property owner for injuries resulting from ice and snow. 21 Minn.L.Rev. 703 (1937).
Need for a principled expansion of the role of local government in environmental enforcement. Beverly Conerton and LeRoy Paddock, 16 Wm.Mitchell L.Rev. 949 (1990).
Obscenity and the law: Curious bed-fellows. Ronald I. Meshbesher. Feb. 1970, 38 Hennepin Law. 4.
Public water rights. William G. Peterson. 31 Bench & B.Minn. 3 (Sept. 1974).
LIBRARY REFERENCES
Nuisance 61, 95.Westlaw Topic No. 279.C.J.S. Nuisances §§ 4, 10, 34 to 39, 41 to 46, 48 to 57, 59 to 60, 62, 157.
RESEARCH REFERENCES
Treatises and Practice Aids
10 Minnesota Practice Series CRIMJIG 13.122, Public Nuisance--Defined.
25 Minnesota Practice Series § 10:12, Pre-Condemnation Procedures.
9A Minnesota Practice Series § 58.7, Nuisances.
NOTES OF DECISIONS
In general 1Animals 6Burden of proof 14Businesses 4Jury questions 15Obstruction of public right of way 9Pollution 5Private nuisance 3Probable cause 13Purpose 2Road signs 10Sidewalks 11Sirens 7Trespass 8Waters 12
1. In general
While the Legislature cannot prevent a lawful use of property by declaring a certain use to be a nuisance, which is not in fact a nuisance, and prohibiting such use, yet acts or conditions which are detrimental to the comfort and health of the community may be effectively declared nuisances by the Legislature, though not so determined at common law. State v. Chicago, M. & St. P. Ry. Co., 1911, 114 Minn. 122, 130 N.W. 545, Am.Ann.Cas. 1912B,1030. Nuisance 60
2. Purpose
Section 616.01 (repealed; see, now, this section) relating to public nuisances, was designed to protect against either intentional or negligent misconduct. Kelsey v. Chicago, R.I. & P.R. Co., 1962, 264 Minn. 49, 117 N.W.2d 559. Nuisance 60
The purpose of the provision declaring it a public nuisance to obstruct or render dangerous the exercise of the pub-lic right of passage on a highway is to secure to every one an enjoyment of a public right. Hanson v. Hall, 1938, 202 Minn. 381, 279 N.W. 227. Highways 153
The purpose of § 616.01 (repealed; see, now, this section) relating to public nuisances, was to secure to everyone an enjoyment of a public right. Op.Atty.Gen., 377-B-10-j, Apr. 10, 1951.
3. Private nuisance
Position of railroad's trestle did not constitute a public nuisance under this section even though its static physical location obstructed street intersection; this section contemplated actual obstructions caused by affirmative acts or omissions. Olmscheid v. Paterson, App.1989, 440 N.W.2d 124, review denied. Municipal Corporations 693
A public nuisance must be redressed by prosecution in name of state, while a private nuisance is redressed by pri-vate action. Hill v. Stokely-Van Camp, Inc., 1961, 260 Minn. 315, 109 N.W.2d 749. Nuisance 44; Nuisance 82
The violation of the provision of § 616.01 (repealed; see, now, this section) making it a public nuisance to obstruct or render dangerous exercise of public right of passage on highway, did not give private individual cause of action if only wrong he suffered, was wrong common to all members of public in that only his exercise of his right to travel was impeded. Hanson v. Hall, 1938, 202 Minn. 381, 279 N.W. 227. Highways 155
Where passenger elevator, installed in building under construction was fully completed except for glass in the doors and plaintiff stuck his forehead into elevator shaft through an opening in door left to receive glass and was severely injured by movement of elevator, § 616.01 (repealed; see, now, this section) relating to public nuisances, was inap-plicable. Gibbons v. Gooding, 1922, 153 Minn. 225, 190 N.W. 256. Workers' Compensation 2089
4. Businesses
Where liquor and gambling statutes were continuously and persistently violated at a public tavern which ostensibly was operated as a private club, and repeated convictions had failed to stop the offenses, the remedies at law, that of prosecution under the gambling and liquor laws, prosecution for violation of § 616.01 (repealed; see, now, this sec-tion) and of abatement of the tavern after judgment were inadequate, authorizing injunction to abate the tavern as a public nuisance. State v. Sportsmen's Country Club, 1943, 214 Minn. 151, 7 N.W.2d 495. Intoxicating Liquors 261; Nuisance 80
A complaint alleging that a small loan business, catering to a large class of poor and necessitous wage-earners, was so conducted that in every loan made the usury statute was flagrantly and intentionally violated, and that there was no adequate or effective remedy which the borrowers were willing or able to use to obtain redress for violation, stated a cause of action for injunctive relief against the maintenance of a public nuisance. State ex rel. Goff v. O'Neil, 1939, 205 Minn. 366, 286 N.W. 316. Nuisance 84
A trapdoor in floor of lavatory in restaurant in village was not a nuisance. Lyman v. Hermann, 1938, 203 Minn. 225, 280 N.W. 862.
Maintenance of truck warehouse and depot in district, at best but semiresidential, was not nuisance, either public or private, notwithstanding noise caused during nighttime by necessary pulling of endgate chains, running of motors, loading of cans, moving of loading platforms, and glare of truck lights. Village of Wadena v. Folkestad, 1935, 194 Minn. 146, 260 N.W. 221. Automobiles 109
“Nuisance” is sufficiently comprehensive to include unlawful business which necessarily works harm, injury and prejudice to the individual and is prejudicial to public welfare. State v. Guilford, 1928, 174 Minn. 457, 219 N.W. 770.
Bawdyhouses were a public nuisance under § 616.01 (repealed; see, now, this section). State v. Gilbert, 1914, 126 Minn. 95, 147 N.W. 953.
5. Pollution
Action of taconite mining and processing company in discharging taconite tailings into waters of Lake Superior in such manner as to release into air and water large quantities of minute asbestos-like amphibole fibers known to be directly associated with occurrence of cancer in humans constituted both violation of Federal Water Pollution Con-trol Act (33 U.S.C.A. § 1151 et seq., superceded by 33 U.S.C.A. § 1251 et seq.) and common-law nuisance in inter-state and intrastate waters of Lake Superior and in ambient air of surrounding communities. U. S. v. Reserve Min. Co., D.C.Minn.1974, 380 F.Supp. 11, remanded 498 F.2d 1073, application denied 94 S.Ct. 3203, 418 U.S. 911, 41 L.Ed.2d 1156, application denied 95 S.Ct. 287, 419 U.S. 802, 42 L.Ed.2d 33, application denied 95 S.Ct. 1441, 420 U.S. 1000, 43 L.Ed.2d 758, modified and remanded 514 F.2d 492, modified 529 F.2d 181, on remand 408 F.Supp. 1212, on remand 412 F.Supp. 705, on remand 417 F.Supp. 789. Environmental Law 206; Environmental Law 284; Nuisance 62
Dense smoke is not a nuisance per se, but only becomes such when it permeates the air surrounding people, and in-vades their residences and places of occupation. State v. Chicago, M. & St. P. Ry. Co., 1911, 114 Minn. 122, 130 N.W. 545, Am.Ann.Cas. 1912B,1030. Nuisance 62
6. Animals
That civil remedies were available for arrestee's allowing her animals to escape and damage property did not render pursuit of matter in criminal court objectively unreasonable for purposes of qualified immunity analysis in arrestee's § 1983 action. Myers v. Becker County, D.Minn.1993, 833 F.Supp. 1424. Civil Rights 1376(2)
Sheriff's officer who swore out summons and complaint had objectively reasonable belief that probable cause ex-isted to charge arrestee with misdemeanor public nuisance, so that he was entitled to qualified immunity in arrestee's § 1983 action; officer had information indicating that arrestee knew that her animals were escaping from her farm and allegedly causing damages to other property and that inadequate fencing was allowing animals to escape, arres-tee ignored warning about fences and took no action to abate problem, sheriff's office was contacted repeatedly by arrestee's neighbors over period of two years about animals escaping, and animals escaped onto public road adjacent to her farm. Myers v. Becker County, D.Minn.1993, 833 F.Supp. 1424. Civil Rights 1376(6)
Sheep and other domestic animals were not within the purview of § 616.01 (repealed; see, now, this section) relating to public nuisances. Op.Atty.Gen., 146f, Feb. 6, 1961.
Question whether the keeping of horses or other animals in a residential district constitutes a nuisance depends on the facts and circumstances involved, and unquestionably such keeping may be held a nuisance by reason of the location, manner of keeping, or other pertinent circumstances. Op.Atty.Gen., 441-H, Oct. 17, 1956.
7. Sirens
The blowing of village fire siren every night at eight o'clock in the evening for a curfew, was not a public nuisance within § 616.01 (repealed; see, now, this section). Op.Atty.Gen., 913, Sept. 26, 1949.
8. Trespass
Allegations by taxpayers that actions of protestors, who were arrested for criminal trespass, § 609.605, constituted a private or public nuisance did not state a cause of action for private or public nuisance, where taxpayers did not allege any interest in the affected property and did not assert any special or peculiar damage not common to the gen-eral public. North Star Legal Foundation v. Honeywell Project, App.1984, 355 N.W.2d 186, review denied. Nuisance 48; Nuisance 76
9. Obstruction of public right of way
Conducting construction operations on a portion of highway not intended to be open for public use was not “public nuisance” within this section, although done negligently. Dornack v. Barton Const. Co., 1965, 272 Minn. 307, 137 N.W.2d 536. Nuisance 62
The provisions of § 219.383, prohibiting railroad from stopping a train across a street for more than 10 minutes, modified provisions of § 616.01 (repealed; see, now, this section) relating to public nuisances and § 160.34 (re-pealed; see, now, § 160.27) and legalized any obstruction of public highway incident to a stop for not longer than 10 minutes, and there could be no violation of the latter sections by stopping a train across public highway unless the stop exceeded 10 minutes in violation of § 219.383, but where the 10 minutes was exceeded all three statutes were violated. Mlenek v. Fleming, 1947, 224 Minn. 38, 27 N.W.2d 800. Railroads 246
Section 616.01 (repealed; see, now, this section) relating to public nuisances, and § 160.34 (repealed; see, now, § 160.27), and § 219.383 which had as their common subject matter the prohibition of obstruction or closing of public highways, were in pari materia, and were to be construed together. Mlenek v. Fleming, 1947, 224 Minn. 38, 27 N.W.2d 800. Statutes 223.2(14)
If defendant had removed large quantities of rock filling from embankment of roadway within limits of highway and had removed a substantial part of support of roadway and if defendant had used explosives endangering lives and property of highway travelers, defendant was guilty of maintaining a public nuisance, but defendant's criminal con-duct would not bar injunctive relief. State v. Nelson, 1933, 189 Minn. 87, 248 N.W. 751.
Construction and maintenance of logging railroad across highway by fee owner was not incompatible with travel thereon and did not constitute a nuisance under § 616.01 (repealed; see, now, this section). Town of Kinghurst v. International Lumber Co., 1928, 174 Minn. 305, 219 N.W. 172. Highways 86
An abutting owner owns to the center of the street, subject to the easement of the public, and may use it for a pur-pose compatible with the free use by the public, and whether a use by an abutter is consistent with the free enjoy-ment of the easement by the public depends on the nature of his use and the needs and character of the occupation by the public and his use may be an obstruction inconsistent with the public easement. Kelty v. City of Minneapolis, 1923, 157 Minn. 430, 196 N.W. 487. Municipal Corporations 663(1)
Where abutting owner constructs or maintains fences within the right of way limits, impairing the usefulness of the highway to the traveling public or rendering such use dangerous, the construction and maintenance of the fences constitute a public nuisance. Op.Atty.Gen., 377-B-10-j, Apr. 10, 1951.
10. Road signs
An advertising sign in the form of crosses similar to railroad crossing signs bearing the words “Stop, Look and Lis-ten” adjacent to trunk highway was contrary to law and constituted a public nuisance, subjecting owner thereof to action to compel removal thereof or for injunction. Op.Atty.Gen.1934, No. 485, p. 739.
11. Sidewalks
Where defect in public sidewalk resulted from roots of a tree growing along front of their premises adjacent to the sidewalk and where it was the duty of the city to keep the sidewalk in a reasonably safe condition for travel, no nui-sance was committed by abutting property owners by merely permitting the roots of the tree to grow. Sand v. City of Little Falls, 1952, 237 Minn. 233, 55 N.W.2d 49. Municipal Corporations 808(1)
In action against occupant of premises abutting sidewalk for injuries sustained in fall in icy driveway over sidewalk, condition of driveway over sidewalk was not nuisance which occupant was in duty bound to abate, where its surface was not different from that of any other part of sidewalk. Abar v. Ramsey Motor Service, 1935, 195 Minn. 597, 263 N.W. 917. Municipal Corporations 808(5)
Accumulation of ice on public sidewalk, resulting when fresh snow on cornice of building melted and water dripped to sidewalk, was not public nuisance, within St.1927, § 10241 (repealed; see, now, this section) as basis for impos-ing liability on owner of building. Mesberg v. City of Duluth, 1934, 191 Minn. 393, 254 N.W. 597. Municipal Cor-porations 808(5)
Lot owner's driveway, built from street across sidewalk, wrongly obstructed sidewalk and constituted nuisance, sub-ject to abatement. City of Marshall v. Cook, 1926, 169 Minn. 248, 211 N.W. 328. Municipal Corporations 667
12. Waters
While village had authority under § 412.19 (repealed) to change natural outlet within its corporate limits of mean-dered and navigable lake, such power was subject to requirements and limitations of §§ 616.01 and 616.02 (re-pealed; see, now, this section) that new outlet should not become a nuisance by obstructing free and appropriate use of one's own property. Greenwood v. Evergreen Mines Co., 1945, 220 Minn. 296, 19 N.W.2d 726. Municipal Cor-porations 834
The erection and maintenance of a dam across a natural water course to utilize water power was not a nuisance. City Water Power Co. v. City of Fergus Falls, 1910, 113 Minn. 33, 128 N.W. 817, Am.Ann.Cas. 1912A,108. Nuisance 61
An unreasonable and unnecessary obstruction of a navigable stream may be a public nuisance in its general effect upon the public, and at the same time a private nuisance as to those individuals who suffer a special and particular damage therefrom, distinct and apart from the common injury. Page v. Mille Lacs Lumber Co., 1893, 53 Minn. 492, 55 N.W. 608, opinion vacated on rehearing 53 Minn. 492, 55 N.W. 1119. Water Law 2600
The owner of premises bounded by a navigable stream has the right to make a pier for his own use, or that of the public; but such structure must not obstruct the navigation thereof. Rippe v. Chicago, D. & M. R. Co., 1876, 23 Minn. 18. Water Law 2620
Where a frozen stream to which the public lawfully has access is not so minor as to be beyond reason, it would be doubtful that the snowmobiling public could be fenced off. Op.Atty.Gen., 1003, April 17, 1968.
Normally a riparian owner could build a fence extending into the water to the normal low-water mark if the fence did not interfere with the public use of the lake. Op.Atty.Gen., 273c-6, Oct. 26, 1960.
Whether a fence extending from the shore about four feet into a lake would constitute a public nuisance was a ques-tion of fact determinable by examination of the particular circumstances. Op.Atty.Gen., 273c-6, Oct. 26, 1960.
If operation of boats and racing hulls on the Mississippi River should result in annoying, injuring or endangering the safety, health, comfort, or repose of any considerable number of persons, the offender or offenders can be prose-cuted by city. Op.Atty.Gen., 273-D-2, Aug. 12, 1952.
Operation of speed boat so as to endanger safety of others is unlawful. Op.Atty.Gen., 273-D-2, Aug. 23, 1951.
If offense against state law was committed by placing of buoys on waters of Lake Minnetonka outside boundaries of village of Deephaven, village justice of the peace could receive complaint for such violation and issue warrant for arrest of alleged offender and try cause as a misdemeanor or, in case of charge more serious than misdemeanor, hold a preliminary hearing. Op.Atty.Gen., 273-A-14, Aug. 20, 1946.
Public nuisance constituted by a beaver dam, if a crime at all, was a misdemeanor, and whether a prosecution lay depended on facts of case. Op.Atty.Gen., 211-D-7, June 4, 1946.
Construction of an artificial point by extending a natural point at various distances commencing with 97 feet from the original natural point back to about 387 feet when finally completed, might under certain circumstances institute basis for criminal prosecution under § 616.01 (repealed; see, now, this section) as public nuisance for unlawful inter-ference with or obstruction or tending to obstruct or render dangerous for passage a lake, navigable river, bay, stream or other water. Op.Atty.Gen.1932, No. 163, p. 189.
Where maintenance of artificial channel between meandered lake and non-meandered lake injuriously affected me-andered lake with respect to interests of public in navigation, fishing, propagation, or otherwise, it could be abated as a public nuisance and owner might also be subject to criminal prosecution and would also be liable to riparian owners of meandered lake for any damage to property resulting from diversion of waters in excess of such reason-able amount as he might lawfully take within his riparian rights. Op.Atty.Gen.1930, No. 266, p. 242.
13. Probable cause
Police officers, who arrested homeowners and their guests after neighbor complained about loud party, were pro-tected by qualified immunity from claim that officers violated Fourth Amendment by arresting partygoers outside house after police had ordered them to disperse; police could have thought there was probable cause for arrests, as officers were on second call for loud party at almost 2:00 a.m. and themselves heard loud talking, giving them prob-able cause to arrest homeowners for maintaining public nuisance, and guests were resisting dispersal order. Greiner v. City of Champlin, C.A.8 (Minn.)1994, 27 F.3d 1346. Civil Rights 1376(6)
14. Burden of proof
To maintain a conviction under the public nuisance statute for endangering the safety of the public, the state must prove through testimony and evidence that the public was in fact endangered. State v. Otterstad, 2007, 734 N.W.2d 642. Nuisance 62
In a prosecution under state public nuisance statute, the state did not meet its burden of proving that defendants maintained a condition that endangered the safety of a considerable number of members of the public when they displayed political signs on bridge over state highway containing text and graphic picture of aborted fetus; there was no evidence of an accident involving motorists who could actually see signs, testimony from drivers whose ability to control their vehicle was impaired by signs, or police officer's observation of traffic disturbances involving drivers distracted by signs. State v. Otterstad, 2007, 734 N.W.2d 642. Nuisance 92
15. Jury questions
Whether property owner's rock garden was “obstruction” to public right-of-way within meaning of public nuisance statute [M.S.A. § 609.74(2)] was jury issue. State v. Davis, App.1985, 375 N.W.2d 599. Nuisance 93
M. S. A. § 609.74, MN ST § 609.74
Current with laws of the 2012 Regular Session through Chapter 131
(C) 2012 Thomson Reuters. No Claim to Orig. US Gov. Works.
END OF DOCUMENT

Syndicate content