Iran-Contra

More note on impending Syria Fail! Dempsey vs R2P interventionist hawks; Al-Nusra rebels caught with 2kg Sarin in May 2013, possible links to Libya Chemical Weapons stash, the Britam leaks & McCain Playing Portable Poker

Ugh, the Syria scenario is really dispiriting but I think much of the western political leadership may finally be backing down from another round of interventionism - let's hope! Here are a bunch of new notes - take em all with a grain of salt, and may they hopefully shed a bit of light on matters.

No matter how it turns out, it will be really hard to get the Middle East moving into a politically independent foundation, respectful of human rights and devoid of massacres and social 'sloshing' as mistrust escalates on all sides, with various specialists in destruction jumping in to make matters worse at every turn.

See also: Press Release mirrored here: Whistleblower ex-US Mil Intel agent Frank Ford flags VX WMD distribution in Iraq & Syria, smoking gun @ Carlyle Group chemical weapons network as new Obama target

//////

MCCAIN GAME: The terrible Sen John McCain should not even be quoted in papers let alone allowed in the government. Dan McCall at LibertyManiacs.com made this great McCain meme, along with many other fun political art pieces like NSA spoofs that - believe it or not - the NSA branding police have been trying to crush. Yes the NSA patrols against McCall's parodies as explained in interview on Corbett Report. (fb) See also Cryptome notes on this.

mccain-pokermeme.jpg

Satire: Raytheon: Delay on Syria Strike is a Threat to Freedom & Democracy Everywhere - Newslo

The Britam Defense Leak involving a Syria chemical weapons plan is denied, but perhaps one of those things like a Project Northwoods about the Syrian Chemical Weapons scenario: (Northwoods was an infamous JFK-era doc from the Joint Chiefs suggesting a fake attack involving Cubans and hijacked planes.)

Britam Defence, David Goulding and Philip Doughty | Mail Online - http://www.dailymail.co.uk/home/article-2311199/Britam-Defence-David-Goulding-Philip-Doughty.html PUBLISHED: 12:59 EST, 18 April 2013 | UPDATED: 12:59 EST, 18 April 2013

An article on 29 January reported allegations on the internet that the US Government had backed a plot to launch a chemicals weapons attack in Syria and blame it on the Assad regime.

The reports made reference to an email said to have been from David Goulding, the Business Development Director of Britam Defence, to company founder, Philip Doughty. The email had been published on the internet after Britam’s computer system was illegally hacked in Singapore. It referred to a proposal that Britam would deliver chemical weapons to Syria for enormous financial reward and suggested that the directors were willing to consider the illegal proposal.

We now accept that email was fabricated and acknowledge there is no truth in any suggestion that Britam or its directors were willing to consider taking part in such a plot, which may have led to an atrocity.

We apologise to each of them and have agreed to pay substantial damages.

A Look into the Britam Defence Data Leak Files && britam defence hacked, confidential documents leaked, site offline - cyberwarnews.info

A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline.

The attack is on britam defence (http://www.britamdefence.com/) and has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom).

The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.

Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.

A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Also on Britam: U.S. Was Offering `Enourmous` Sums of Money for Chemical Weapon Attack

More possible chemical weapons false flags from previous months: video "Chemical Weapons False Flag against Syria Update http://youtu.be/DbMdll58lis posted on August 3rd 2012.

Also worth noting this! Iraq uncovers al-Qaeda 'chemical weapons plot' BBC News June, 1 2013, and this RT report on the Turkish authorities discovery of Sarin in a Jabhat al Nusra safehouse http://youtu.be/vet0PV-XPlw in May 2013.

Reported by RT in May and firmly in the memory hole right now: 2 kilograms of sarin captured with rebels in Turkey?! WTF

Published on May 31, 2013 RussiaToday: Suspected Syrian militants have reportedly been detained in Turkey with a cylinder of highly poisonous sarin gas found in their possession. Those arrested are believed to be members of the Al-Qaeda linked Al-Nusra Front. Earlier this month, UN investigators voiced suspicion the nerve agent was being used by opposition fighters. RT's Middle East correspondent Paula Slier reports.

Obviously RT has a Russian perspective here but indeed as we will see this is not the only clue floating around about Al-Nusra & chemical weapons.

/////

Chomsky misquoted? LOCAL - Chomsky accuses Turkish daily of fabricating parts of interview

Not sure deal here - eh: High Probability Of A Major Attack On The Financial System | InvestmentWatch - anyone heard of x22report?

//////

DC alternative journalist Wayne Madsen is not always correct but this particular narrative just smells really damn likely right now. R2P is "responsibility to protect" interventionist faction of Beltway, the newest iteration of "cruise missile liberals" more-or-less. Go get em Wayne:

SOURCE: http://www.waynemadsenreport.com/articles/20130901

September 1-2, 2013 -- Special Weekend Report. Washington, DC (WMR) Obama caved under last-minute pressure from Dempsey

WMR's White House sources report that on the evening of Friday, August 29, President Obama was on track to launch a sustained 72-hour cruise missile and drone attack on pre-selected air defense and other strategic military targets in Syria.

Obama had been convinced by his national security adviser Susan Rice, UN ambassador Samantha Power, and deputy national security adviser Ben Rhodes, all "Responsibility to Protect" advocates, that he could trump congressional approval for his attack by claiming that humanitarian operations do not require approval under the War Powers Resolution or Article I, Section 8 of the U.S. Constitution.

Many of Washington's insiders went to bed Friday night firmly convinced that Obama would give the final order to attack Syria sometime during the early Saturday morning hours of August 30. However, the Chairman of the Joint Chiefs of Staff, General Martin Dempsey, made a hurried trip to the White House during the early morning hours of Saturday to make one last final plea to hold off on any attack.

WMR has learned from White House sources that Dempsey told Obama that the president's plan would not work. "If you do this, the plan will fail and you'll get in deeper. And without congressional approval, you'll be screwed," Dempsey told Obama.

Dempsey's warning about Congress had merit. Already, 210 House members signed a letter to Obama warning him not to attack Syria without congressional authorization. In addition, a head count showed that some Democrats would join Republicans in voting for impeachment if a bill were introduced.

Dempsey's argument prevailed and Obama decided to hold off on any attack until Congress reconvenes after Labor Day. Obama decided he would seek a congressional vote to authorize a military strike on Syria. However, in overriding Rice, Power, Rhodes, and Secretary of State John Kerry, who all favored a military strike, Dempsey incurred the wrath of the R2P faction that dominates the National Security Council. State Department sources began spreading the word that Obama would still attack Syria without congressional approval. The Pentagon, on the other hand, pointed out that none of the National Security Council "heavies," Rice, Power, or Rhodes had any military experience and that Kerry was channeling the wishes of his good friend Senator John McCain, who has consistently supported Al Qaeda-led rebels in Syria and Libya.

Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that "smoking gun" proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal "Iran-contra"-like scandal. The proof is said to be highly "impeachable."

The developing scandal involves Turkish, Qatari, Lebanese, and Croatian firms and front operations; Qatar Airways Cargo; ousted officials of the Mohamed Morsi government of Egypt; small Turkish and Jordanian air service companies contracted by the CIA; Saudi intelligence chief Prince Bandar bin Sultan Al Saud; the September 11, 2012 attack on the CIA annex in Benghazi; and "black" carve-out contracts with the U.S. Air Force.

[pic http://www.theage.com.au/ffximage/obama_narrowweb__300x512,4.jpg ] Barack Obama, right, dressed as a Somali Elder during his visit to Kenya, near the borders with Somalia and Ethiopia. Obama plays the role of Al Qaeda arms provider.

Obama's, Brennan's, and then-CIA director David Petraeus's knowledge of the operation was so intimate, Petraeus visited GOP presidential nominee Mitt Romney in October of last year to plead with him not to bring up the covert operation in the third presidential debate. Romney acceded to Petraeus's request.

/////

Fluoride for the Win: Frankly at this point in the demented charade, the possible Sodium Fluoride - aka fluoridated water precious bodily fluids casus belli - angle is now my favorite. Naturalnews is not always dead on either, but it's too damn appropriate I say.

See: NaturalNews: Bombshell: Syria's 'chemical weapons' turn out to be sodium fluoride used in the U.S. water supply and sold at Wal-Mart. Breaking in UK Independent: Revealed: UK Government let British company export nerve gas chemicals to Syria - UK Politics - UK - The Independent Sept 2 2013.

//////

Max Blumenthal has good points Sept 2 posted: OpEdNews - Article: Dubious Intelligence and Iran Blackmail: How Israel is driving the US to war in Syria

GlobalResearch: Dangerous Crossroads. A War on Syria, Prelude to a World War III Scenario? | Washington's Blog

//////

I am borrowing another excerpt from Madsen which includes a possible connection between major CIA pointman on the Caucasus and indeed Islamic fundamentalist network logistical support over the years (interesting in the pre-2001 interval eh) . Graham Fuller keeps popping up as a major figure in all of this, perhaps he will turn out to be something like the Oliver North of 9-11 itself - not to mention the sponsor of the Boston bombers' uncle Ruslan. Once the angles with Fuller surfaced, did anyone notice how fast mainstream press attention drained away from their backgrounds??!!!

SOURCE: http://waynemadsenreport.com/articles/20130830 - August 30-September 1, 2013 -- Partner of Boston bombers' "Uncle Ruslan" right hand man to 3 CIA directors

The murky world of the CIA's past and current support for radical Islamist groups on three continents has emerged in newly-released documents from the CIA that show that Graham Fuller, the agency's one-time top interlocutor with the Saudis, Afghan mujaheddin, and Muslim Brotherhood, was a right-hand man to three CIA directors.

Fuller, a business partner of Ruslan Tsarni (Tsarnaev), the uncle of the accused Boston Marathon bombers, served as a close adviser to CIA directors William Casey, William Webster, and Robert Gates, according to recently declassified internal CIA memoranda. Since retiring from the CIA, Fuller has been engaged in supporting the Chechen Islamist guerrilla groups fighting Russia as well as the Republic of Georgia, which has become a base for anti-Russian and anti-Syrian military activities, which includes, the transport of chemical weapons to Syrian rebels from the Pentagon-operated Richard G. Lugar Center for Public Health Research in Tbilisi, which, although a biological weapons research laboratory, also warehouses chemical agents, according to U.S. intelligence sources familiar with the facility. The Tbilisi facility was the major source of chemical agents used by Syrian rebels to attack civilians outside of Damascus in a "false flag" terrorist operation coordinated by the CIA and Mossad.

Throughout the 1980s, Fuller was front and center at many of the acts of violence in the Middle East and South Asia, from Lebanon and Syria to Iran, Iraq, Afghanistan, and South Yemen. One CIA memo describes how Fuller was also heavily involved in the early part of the CIA's stirring political activities in the Balkans during the collapse of Communism in eastern Europe. A May 22, 1985, memo from George Kolt, the CIA's National Intelligence Officer for Europe, invited Fuller to a June 11, 1985, dinner at CIA Headquarters at which the former U.S. ambassador to Bulgaria, Robert Barry, discussed at the Confidential level "The Strategic Importance of the Balkans for the United States." [......]

I'm leaving the rest of the story off for now out of respect for an indie journo making a run at this ... and moments after plugging this in, Wayne's site is having Varnish caching issues. It's all got to be cross checked - someone could be feeding him knowingly bad info for their own purposes certainly - I think we have a substantial amount of paydirt on our hands here.

Also Outrage is not a strategy: http://www.michaelyon-online.com/syria-outrage-is-not-a-strategy.htm

Anyway hope people can find this useful, or at least less useless than the mainstream spams...

"Warning shot will not be fired" by MPs trained in Martial Law in America: Military Police training: heavily patrolled domestic detention facilities, dissident/sniper warrantless searches - CONPLAN 3502 Civil Disturbance Operations training @ Ft McClellan

b. Use of Deadly and Non-deadly Force (4) (b) Warning shot will not be fired.

or better yet:

(3) In an occupied building, when the dissident's/sniper's location is unknown, all suspected rooms must be searched. The action element should try to have occupants submit voluntarily to the search of their rooms. At the same time, occupants should be questioned in an attempt to pinpoint the sniper's location. If occupants will not submit voluntarily and there is probable cause to believe that the dissident/ sniper is located in the room, a complete physical search of the room or rooms should be conducted. Use of the patrol dog will help in conducting such searches.

Another planning layer for emergency domestic military operations has been published: The 2006 US Army Military Police training manual for Civil Disturbance Operations does not concern itself with warrants in the 'search' section, indicating a certain level of Constitutional disregard in the military's planning for emergencies in what the document calls CONUS, or Continental United States.

The excellent PublicIntelligence is where this just popped up (first I saw of it anyway): U.S. Army Military Police School Civil Disturbance Operations Course | Public Intelligence - Direct PDF link (115 pages).

martial-law-mp-training-front.png

///////UPDATE JULY 11: Just talked with Alex Jones for an hour on this stuff. Here's the crib notes & PDFs you'll want to see.
/////// UPDATE July 7 AM: My interview with Darren McBreen on Infowars Nightly News: http://www.youtube.com/watch?v=fNw_m7gfqXM // Prisonplanet stories by Kurt Nimmo and "Army Manual Outlines Plan To Kill Rioters, Demonstrators In America" by Paul Watson.. Also I put it on Reddit One & Two

///////

I've only had time to read a bit of it so far, but it ties in very closely with another level of this planning framework, USNORTHCOM (Northern Command) CONPLAN 3502 Civil Disturbance Operations, which is the 21st century replacement for GARDEN PLOT, the Pentagon's plan used between the 1960s and 2002 for domestic riot control & emergency operations in such settings as the LA Riots.

In 2010 I found presentation files on a US Army Corps of Engineer server - for full story please see TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed. Having seen first hand domestic military operations at the 2008 Republican National Convention & 2009 G20 Pittsburgh, the growth and use of domestic military capacity for crowd control is a more-than-hypothetical situation -- and the subsequent obfuscation of those operations by political officeholders and appointees is quite terrifying in its implications.

This Civil Disturbance Operations Subcourse training manual ties right into material cited in the CONPLAN and supporting documents, including many of the same riot control weapons. An earlier version of a very similar manual can be found via that link.

martial-law-crowd-army-weapons-mp.png

Plus this one has quizzes!!

Billeting - I swear I heard something about revolutionaries complaining about billeting earlier... Something everyone makes a big deal out of this time of year....

There is a lot of stuff about formations -

P 62: Handy tip that rioter-impressing safe-port position is a PSYOP and tiring!

(a) The safe-port position is extremely useful in making a show of force before rioters. The above mentioned carrying position is the primary method of carrying weapons in the control force formation. It allows the Soldier to control both ends of the weapon while moving in and out of the formation and advancing the crowd.

All the stuff about gathering intel against rioting/unlawful Americans is nice and creepy and they definitely aren't saying anything about the Defense Intelligence Agency or National Geospatial Intelligence Agency.

[.............]

b. Collection.

(1) Military information elements having counterintelligence resources will maintain the ability to collect civil disturbance threat data during the period in which there is a distinct threat of actual civil disorder requiring the use of federal military forces.

(2) On activation by the Department of the Army, military intelligence elements having counterintelligence capability will:

(a) Establish and maintain contact with suitable local, state, and federal authorities.

(b) Collect civil disturbance data concerning incidents, and estimate the capability of civil authorities to control the situation. This can be achieved through direct contact with civil authorities.

(c) Report collection results to the Department of the Army in accordance with current plans.

(d) Keep appropriate commanders informed. (e) Provide intelligence support to the Personal Liaison Officer Chief of Staff of the Army.

(f) Recommend methods of overt collection, other than liaison, if required, to the Department of the Army for approval.

(3) Military intelligence elements may employ methods of collection other than liaison only on order of the Department of the Army.

(4) Covert agent operations are not used to obtain civil disturbance data on persons or organizations without specific advance approval of each operation by the Under Secretary of the Army.

(5) Basically, the following vital elements of data will be required for sound planning and operations once approval has been received:

(a) Objectives of elements which are a distinct threat to cause or are causing civil disturbances.

(b) Times and locations of disturbances.

(c) Cause of disturbances.

(d) Existence of persons, groups, or organizations which have distinctively threatened or are creating disturbances.

(e) Estimated number of persons who will be or are involved in civil disturbances. (f) Assembly areas for crowds.

(g) Presence and location of known leaders and persons who are a distinct threat to cause civil disturbances.

(h) Organization and activities planned by the leaders who are a distinct threat to cause civil disturbance.

(i) Source, types and locations of arms, equipment, and supplies available to the leaders who are a distinct threat to cause civil disturbance.

(j) Use of sewers, storm drains, and other underground systems by the elements who are a distinct threat to cause or are causing civil disturbances.

(k) Identification of new techniques and equipment not previously used by elements that are a distinct threat to cause civil disturbances.

(l) Attitude of general masses towards: (a) Groups causing civil disturbances. (b) Civil law enforcement authorities. (c) Federal intervention to control the disturbance.

(m) Possible threat to public property including private utilities. (n) Communications and control methods employed by elements referred to in paragraph 1 above.

PART C - Request for Federal Support/Training 1. Request for Federal Support.

a. Providing military support to state and local governments to assist them in quelling a civil disturbance or riot requires close coordination through a host of state and federal agencies. It requires a though briefing of Soldiers at all levels on what they can and cannot do with respect to law enforcement. Civil authorities must be briefed on the restrictions placed on federal forces by the Constitution of the United States, federal statutes and laws.

b. Under the Constitution of the United States and United State Codes the President is empowered to direct federal intervention in civil disturbances to:

(1) Respond to state request for aid in restoring order (2) Enforce the laws of the United States. (3) Protect the civil rights of citizens (4) Protect federal property and functions.

c. The Secretary of Defense retains approval for federal support to civil authorities involving the use of DOD forces, personnel, and equipment. The Secretary of the Army is the Department of Defense executive agent is the approval authority for federal emergency support in response to natural or man-made disasters (except weapons of mass destruction [WMD]). The Directorate of Military Support (DOMS) plans and executes the DOD domestic support mission to civil authorities. The DOMS is the DOD primary contact for all federal departments and agencies during DOD involvement in most domestic support operations. DOMS is also the staff agency responsible to the Chief of Staff, Army and Secretary of the Army for recommending to them appropriate measures necessary to cope with civil disturbances and terrorism and to transmit the approved recommendations to Department of Defense agencies for execution and to supervise the execution. The missions and functions of DOMS are outlined in AR 500-50. Additional roles of responsibilities of various agencies can be found in FM 3-19.15

Prior to activating federal military forces there is a sequence of steps that must occur. When data begins to show that a disturbance may develop into a situation that will require the help of federal forces, several actions are introduced at the federal level while state and local law enforcement agencies attempt to contain the disorder. Such actions may include increasing the readiness posture of forces named to help the jurisdiction concerned.

d. As the situation worsens and the state employs its National Guard, the U.S. Attorney General would send his personal agent to the scene of the disorder. This agent is named as the Senior Civilian Representative of the Attorney General (SCRAG) and is the organizer of all federal activities in the area of the disorder, including contact with local civil authorities. At the same time, the Chief of Staff of the U.S. Army would send his personal liaison officer (PLOCSA) to the scene along with members of the Department of the Army Liaison Team (DALT) that serves as his planning staff.

[.........] CROWD CONTROL PAGE 35+

c. Techniques for Crowd Control. There are numerous techniques designed to provide the commander with flexibility of action in accomplishing crowd control. He must select a combination which will produce the desired results within the framework of the selected crowd control option. The most common techniques appropriate for military usage are discussed below.

(1) Observation. This consists of deployment of persons or teams to the periphery of a crowd for the purpose of monitoring its activity. It includes gathering data on crowd size, location, mood, and reporting on the developing situation. This technique includes posting persons on strategic rooftops and other high terrain overlooking the crowd. This latter measure provides additional security to control force personnel should they become committed to other crowd control operations. Such a team may be composed of an expert marksman, a radio operator, and an observer equipped with binoculars. Care must be taken to assure that committed control forces are aware of the locations of such teams to prevent their being mistaken for sniper elements.

(2) Communication of Interest and Intent. In certain situations, effective communication with crowd and mob leaders and participants may enable the commander to control the situation without resorting to more severe actions. When planned and organized demonstrations, marches, or rallies within the disturbed area are announced, the control force commander in coordination with local authorities should meet with organizers of the activity in order to communicate the interest of the control forces. The following matters, as appropriate, should be discussed.

(a) Parade or demonstration permits. (b) Location of demonstration and routes of march. (c) Time limits for the activity. (d) Provision of marshals by activity organizers. (e) Prevention of violence. (f) Safety of all concerned.

(3) The task force commander and local authorities should also communicate to the activity organizers

their intent to cope with violence, unlawful actions, and violations of restrictions imposed on the activity. It is intended that, by this communication between activity organizers and control force personnel, the demonstration, rally, or parade will occur without incident through the mutual cooperation of all concerned. The intentions of control forces will not be effective if delivered as an ultimatum. A limited, begrudging dialogue with activity organizers reduces the opportunity for authorities to learn the plans of the demonstrators. It must be remembered that if this communication is not effected, the activity organizers might well hold the demonstration in defiance of local authorities, thereby creating a potential for violence that might not have existed if this technique had been employed.

d. Channelization. Pressure can be brought to bear on the dissident leadership to channel the crowd into an area which will minimize the disruption when the following requirements are met:

(1) When communications have been established with the dissident leadership.

(2) When the intent and nature of the crowd activity is known.

e. Diversion. When communication exists with the dissident leadership, consideration may be given to efforts to divert the leadership of the crowd itself from its stated or obvious objective. The diversion should support the objectives of the control force either by reducing the strength of the crowd situation or motivating the crowd to seek an area more easily controlled by the control force.

f. Cooperation. Decreasing the potential disruption of the crowd activity may be accomplished by an active attempt on the part of the control force to obtain cooperation of the dissident leadership. Whenever there is an attempt by the crowd leadership to seek permission and cooperation of the local government, every effort should be made to maximize this cooperation by demonstrating an attitude of facilitation. This may be accomplished by helping the leadership to organize a peaceful demonstration while establishing guidelines which will minimize the impact of the demonstration on the community.

g. Selection of Force Options.

(1) The commitment of federal military forces must be viewed as a drastic last resort. Their role, therefore, should never be greater than is absolutely necessary under the particular circumstances which exist. This does not mean, however, that the number of Soldiers used should be minimized. The degree of force required to control a disorder is often inversely proportionate to the number of available personnel. Doubts concerning the number of Soldiers required should normally be resolved in favor of large numbers since the presence of such large numbers may prevent the development of situations in which the use of deadly force is necessary. A large reserve of Soldiers should be maintained during civil disturbance operations. The knowledge that a large reserve force is available builds morale among military and law enforcement personnel and helps to prevent overreaction to annoying acts by unruly persons.

(2) In selecting an operational approach to a civil disturbance situation, the commander and his staff must follow the "minimum necessary force" principle; for example, crowd control formations or crowd control agents should not be used if the area filled with manpower would be sufficient.

(3) Every effort should be made to avoid appearing as an alien invading force and to present the image of a restrained and well-disciplined force whose sole purpose is to help to restore law and order with a minimum loss of life and property and due respect for those citizens whose involvement may be purely accidental. Further, while crowd control personnel should be visible, tactical, or force concentrations which might tend to excite rather than to calm should be avoided where possible.

(4) The normal reflex action of the well-trained combat Soldier to sniper fire is to respond with all firepower available. In a civil disturbance, this tactic endangers innocent people more than snipers. The preferred tactic is to allow a special reaction team (SRT) who is trained for this type of mission, to enter the building from which sniper fire starts. Keeping with the controlling principle that the team must use only the minimum force necessary to fulfill the mission, the commander may select any one of the following options for arming his Soldiers:

(a) Riot Shield. In the hands of a well trained soldier, the riot shield can be utilized as both a defensive and offensive weapon when contact is made with an aggressive crowd. The primary use of the riot shield is for defense of the line. However, each riot shield holder must be proficient in its retention. The Soldier holding the shield must be trained to react when a demonstrator grabs the top of the shield by slapping with his strong hand and gives the following command" Get back", "Get away" "Stop". If a rioter grabs the bottom of the shield the Soldier should be trained in forcefully dropping to one knee and pinning the rioters' fingers to the ground.

(b) Baton. The baton is most effective in a crowd control operation and is considered the primary weapon for crowd control operations. The baton is considered to be an offensive weapon with reduced lethality and unlike the rifle, the loss of a baton to the crowd does not create a serious threat. Soldier must be trained with the riot baton to the point its various techniques are automatic to them. This training must also include the vulnerable points on the body so they can avoid areas that may cause permanent injury or death when struck.

Currently there are two types of riot batons, wooden and expandable. The most common one is the 36 inch hickory riot baton with thong. There is also the 24-inch to 36 inch expandable riot baton, which has been added to the nonlethal capabilities set. Each Solder within the control force need to be proficiently trained in all techniques for blocking and striking. Improper use of the riot baton by an untrained Soldier has the potential for creating a greater problem than what already exist.

(c) Shotgun. The 12 gage shotgun is a pump action shotgun currently in the nonlethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3- inch chamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to the standard military issues weapon.

(d) Rifle. The rifle, if capable of automatic fire, must be modified to prevent automatic operation. Keeping with the controlling principle of using only the minimum force necessary to fulfill the mission. If the Soldier are equipped with their long weapons and are in the front lines of the formation, the weapon should be carried across their back from left to right with the muzzle of the weapon pointed down and the butt of the weapon pointed up. The weapon should be cleared and the magazine in the proper ammunition pouch.

(e) Non lethal weapons and munitions. Nonlethal weapons and munitions are an additional asset afforded to the commander in civil disturbance and are preferred over lethal force. The showing of force with nonlethal weapons and munitions may assist in crowd dispersing, separate, or leave the area with minimal causalities. This nonlethal capability set (NLCS) is a well-rounded, versatile package of both equipment and munitions. NLCS are dived into four distinct categories: personnel protection, personnel effectors, mission enhancers and training devices

(f) While each of the above options represents an escalation in the level of force, they are not sequential in the sense that a commander must initially select the first option, or proceed from one to another in any particular order. So long as the option selected is appropriate, considering the

existing threat, the minimum necessary force principle is not violated.

1. The rifle and rifle with bayonet attached have extremely limited offensive use as both may constitute deadly force. The primary value of the rifle or the rifle with bayonet attached is the psychological impact on the crowd. While the use of fixed bayonets can add considerably to this effect, the danger of intentional or accidental injury to demonstrators or fellow control force personnel prevents such use except with extremely violent crowds.

2. Fire by selected marksmen. Fire by selected marksmen may be necessary under certain circumstances. Marksmen should be pre-selected, trained, and thoroughly instructed. They may be placed on vehicles, in buildings, or elsewhere as required.

3. Full firepower. The most severe measure of force that can be applied by Soldiers is that of available unit firepower with the intent of producing extensive casualties. This extreme measure would be used as a last resort only after all other measures have failed or obviously would be impractical, and the consequence of failure to completely subdue the crowd would be an imminent overthrow of the government, continued mass casualties, or similar grievous conditions.

4. Shotgun. The riot shotgun is an extremely versatile weapon; its appearance and capability also produce a strong psychological effect on rioters. It is particularly suited to certain applications in civil disturbance operations. When used with No. 00 buckshot ammunition, it is an excellent point target weapon extremely effective at limited range. By varying the nonlethal munitions' M1012 and M1013 the weapon can be employed with considerably less possibility of serious injury or death. This provides the commander with a desirable flexibility in selecting the ammunition most appropriate under the existing conditions

(g) The measures described in paragraphs 1 through 5 below, may be applied in any order as deemed suitable by the responsible commander as long as his application is consonant with prescribed confrontation management techniques outlined earlier.

(1) Proclamation. A public announcement is considered an excellent medium to make known to a crowd the intentions of the control force commander. In some cases, such an announcement makes further action unnecessary. An announcement puts the population on notice that the situation demands extraordinary military measures, prepares the people to accept military presence, tends to inspire respect from lawless elements and supports law-abiding elements, gives psychological aid to the military forces trying to restore order, and shows to all concerned the gravity with which the situation is viewed. In making a proclamation, a commander may consider imposing a time limit. However, the situation may change, and not imposing a time limit may leave the commander other options as he sees fit, as long as the proclamation is specific in its instruction.

(2) Show of Force. A show of force is effective in various situations in civil disorder control operations. A show of force may as simple as Soldier dismounting from buses or trucks in plan sight of the demonstrators, but must be far enough away to prevent a provoked attack of thrown objects. When a crowd has gathered in a large area, show of force can take the form of marching a well-equipped, highly disciplined control force into their midst. When persons are scattered throughout the disturbance area in small groups, a show of force may take the form of motor marches of Soldiers throughout the area, saturation patrolling, and the manning of static posts or similar measures.

(3) Employment of Crowd Control Formations. Crowd control formations are used to contain,

disperse, block or break up a non conforming crowd; these crowd control formations are more effective in urban areas than they are in open fields or parks. When this method is utilized in urban areas, it is easy to disperse or split the crowd into small groups, isolate instigators, or funnel a crowd into a desired area. The use of such formations is part of the show of force and has a strong psychological effect on any crowd.

(4) Employment of Water. Water from a high pressure hose may be effective in moving small groups on a narrow front such as a street or in defending a barricade or roadblock. Personnel applying water should be protected by riflemen and in some cases by shields. In the use of water, the factors discuss below should be considered.

(a) Water may be used as a flat trajectory weapon utilizing pressure, or as a high trajectory weapon using water as a rainfall. The latter is highly effective during cold weather.

(b) The use of a large water tank (750 to 1,000 gallons) and a power water pump mounted on a truck with a high pressure hose and nozzle capable of searching and traversing will enable Soldiers to use water as they advance. By having at least two such water trucks, one can be held in reserve for use when required.

(c) In using water, as with other measures of force, certain restraints must be applied. Using water on innocent bystanders, such as women and children, should be avoided; ways to escape must be provided; and the more severe use, flat trajectory application, should be used only when absolutely necessary.

(d) Fire departments are normally associated with lifesaving practices rather than maintenance of law and order. In order to maintain this image, fire department equipment will not be used for riot control and crowd dispersal.

(e) Use of Crowd Control Agents. Crowd control agents are extremely useful in civil disorder control operations because they offer a humane and effective method of reducing resistance and lessen requirements for the application of more severe measures of force. Task force commanders are authorized to delegate the authority to use crowd control agents and other forms of non lethal force at their discretion.

2. Establish Area Control.

a. General. Acts of violence, such as looting, arson, and vandalism, are greatly reduced when the physical and psychological influence of lawlessness is defeated. In establishing effective area control, commanders must recognize the problem of widespread looting and arson that has accompanied most large urban disorders. Performance of this task consists of reducing or eliminating those conditions which contribute to the outbreak or continuation of lawlessness in the disturbed area.

(1) Looting. When dealing with persons involved in looting, extreme care and adherence to the principle of minimum force must be observed. Looting may start at any time or place as an isolated incident and spread quickly throughout the affected areas. Looting is not limited to any particular sex or age group; it includes the very old, the very young, women, and children. For example, many children may be looting without any idea of how serious their actions are. In the control of looting, unit leaders must recognize that deadly force is not authorized.

(2) Anti-looting. Unit commanders must be familiar with anti-looting measures which can be taken by civil authorities, such as boarding up broken or unbroken windows, covering windows with photo-

luminescent particles, and by the prompt posting of looting penalty proclamations. Anti-looting actions that can be taken by military forces include the establishment of foot and motor patrols, the posting of fixed guard posts, and the lighting of likely areas for looting. Guards at fixed posts will be briefed not to leave their posts to pursue individual looters on foot, but to remain on post and prevent looters from approaching their areas of responsibility. All guards must be briefed that looters will not be fired upon nor will deadly force be used to catch looters.

(3) Protected or Sensitive Commercial Establishments. A main consideration in the conduct of civil disturbance operations is to prevent liquor, drugs, weapons, and ammunition from falling into the hands of rioters. Therefore, liquor stores, drug stores, sporting good shops, pawn shops, and hardware stores are main targets for looters and must be kept under close observation by means of foot and motorized patrols. Normally, businesses of this type must be identified in advance and included in emergency plans.

(4) Arson. Arson is generally defined as a crime of purposely setting fire to a building or property. Acts of setting fire to buildings, property, etc., often follow disturbances. Certain situations may arise in controlling arson where the use of deadly force is authorized and necessary.

[.........] PAGE 40

(2) Imposed Restrictions. Except in the unlikely event of martial law, federal military forces will not have the authority to impose restrictions such as a curfew on the civilian population. Certain restrictions, however, may be imposed by civilian authorities to help in the control of lawlessness. Military leaders should be prepared to recommend which restrictions are of substantial value in comparison with the burden of enforcement. The most commonly used restrictions include:

Curfew. The curfew is a control measure which has proved highly effective in many civil disturbances. Its purpose is to restrict the unauthorized movement of personnel on streets and public places during specified periods of time, especially during the hours of darkness. Joint planning with civil authorities regarding the imposition of a curfew should provide for:

(a) Coordination of the initiation, enforcement, and termination of a curfew.

(b) Public announcements of the beginning and ending of curfews. Civilian authorities make these announcements through local mass media, pamphlets, and public address systems to ensure maximum exposure.

(c) Curfew exemptions and guidance on who should receive them, including written authorization or passes.

(d) Provision for the apprehension and disposition of curfew violators.

(3) Sales Restrictions. Restrictions on the sale, transfer, and possession of sensitive material such as gasoline, firearms, ammunition, and explosives will help control forces in minimizing certain forms of violence. Limiting the availability of weapons to the potential sniper or terrorist may reduce the likelihood of such violence. The effective enforcement of these restrictions, however, requires extensive planning and the commitment of adequate manpower to this effort.

So much for the Second Amendment SUCKAZ....

[.........] PAGE 22+

f. Army Detention Facilities.

(1) The Army will not operate facilities for confinement, custody, or detention of civilian personnel apprehended for violation of local or state laws as long as civil confinement facilities, operated by the Department of Justice, state, or local agencies are sufficient to accommodate the number of persons apprehended.

(2) When it appears that available local facilities are insufficient, due to the large number of persons apprehended or detained, and this fact can be verified by the person or agency responsible for the facilities, temporary confinement/detention facilities may be operated with prior approval from DA, specifically, the Chief of Staff, U.S. Army. These facilities will be operated only until custody of the persons detained can be transferred to and assumed by civil authorities. They will not be used for the confinement of persons charged or convicted under civil jurisdiction.

(3) Temporary confinement/detention facilities can be developed from local federal facilities provided they are adaptable to the requirements of custody and control. Such facilities should be established, if possible, within the affected area; this will conserve time, transportation, and escort personnel.

However, if no suitable federal property is available within the affected area, they can be located elsewhere on any property under federal control as long as the persons to be detained are apprehended in the affected area. Whenever such temporary facilities are established during civil disturbance control operations, the Army is responsible for providing those personnel, facilities, and supplies necessary for the custody, control, health, comfort, and sustenance of persons detained.

(4) Officers and key NCOs specifically trained and experienced in confinement operations are required to operate such facilities. Guards and support function personnel operating under the direct control of such officers and NCOs need not be specifically trained or experienced in confinement operations as long as they are under close and continuing supervision of trained responsible personnel. Whenever females are detained, they must be held in physically separate detention facilities and under the control of selected female guards operating under the supervision of trained and experienced confinement personnel.

(5) Temporary detention facilities should be constructed and arranged to provide for adequate custody, control, and safety of detainees. It is advisable to use existing permanent-type buildings. Where sufficient permanent structures are not available, only that amount of new construction required for temporary custody, control, and administration of prisoners should be accomplished. Temporary field- type facilities provide compartments to assure effective control.

(6) The same operational procedures that apply to the operation of installation confinement facilities and treatment of detainees apply to these temporary facilities except that those policies and procedures establishing training, employment, mail and correspondence, and administrative discipline requirements will not apply. Detailed guidance in procedures for confinement of detainees is contained in EPW Operations, FM 3-19.40.

g. Special Equipment. Certain items of equipment available to military and civil police forces can do much to limit injuries to civilian and military personnel and destruction of property. These items increase the psychological effects of a show of force and offer additional protection and versatility to civil disturbance forces during the operations.

(1) The 12 gage shotgun is a pup action shotgun currently in the non lethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3-inchchamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to standard military weapons that may be desired based on mission considerations.

(2) The shotgun, as in the case of other firearms used in civil disturbance operations, is fired only on the orders of a qualified superior officer when lesser measures of force are not effective, or when the individual Soldier has no other means of protecting his life.

(3) The M7 is a 66-millimeter vehicle-mounted NL grenade-launching device that is mounted on a HMMWV. It is a indirect fire support system that can deliver the M99 blunt trauma grenade that creates a sting-ball effect. The M315 installation kit is used to install an M7 discharger on the turret ring of appropriate HMMWV variants. An adjustable bracket allows the launch angle to be depressed for engaging targets at ranges of 50, 75 and 100 meters. The system enforces standoff distances and deters potential threats.

(4) The M1012 is a single projectile round made of hard rubber that is shaped like a bomblet and designed to be fired at a single target. With the muzzle velocity of 500 feet per second, the M1012 as the effective range of no closer that 5 meters and no further that 30 meters. Engagement inside of 5 meters could result in serious bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective.

(5) The M1013 is a multiple projectile round with .23 caliber hard rubber pellets that is designed to be fired at and employed with the purpose of affecting multiple targets. With a muzzle velocity of 900 feet per second, the M1013 has an effective range of no closer than 5 meters and no further that 30 meters. Engagements of less than 5 meter can result in seriously bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective

(6) The midsize riot control disperser (M37) is the size of a standard fire extinguisher that uses compressed air to force the RCA out to a range of 30 feet. It has the capacity to employ 18 burst of RCA into a hostile crowd while maintaining excellent standoff capabilities. The M37 can be refilled and is rechargeable. It can be refilled with CR solution (liquid agent) or CS (dry agent). For the purport of training the M37 can be filled with water and CS can be substituted with talcum power.

(7) The Squad riot control agent disperser (M33A1) is designed to provide crowd control and protection at the squad level. It is capable of projecting a ballistic stream of RCA's beyond 25 feet in up to 25 half- seconds burst. It consists of a frame and harness assembly, compressed-gas cylinder (agent container assembly) air pressure assembly, gun and hose assembly, multi-jet spray unit, and check valve assembly. The M33A1 can be refilled and is rechargeable. For training purposes, CR can be substituted with water and CS and be substituted with talcum power.

(8) The above mention items are but just a few of the non lethal weapons and munitions available to the commander and unit to utilize during a response to the civil disturbance, and can be utilized to train and prepare Soldiers. Additional non lethal weapons and munitions as well as protective gear can be found in FM 3-19.15.

3. Vehicles. Armored vehicles and transport vehicles add to the readiness of the crowd control force. The use of these vehicles increases flexibility, reduces troop commitments, and provides protection for personnel. In considering the use of vehicles, however, it must be remembered that they should be secured by foot elements.

a. Armored Security Vehicles (ASV) can be used in several ways to keep the effects of civil disturbances at a minimum.

(1) Their use adds a considerable psychological effect to riot control formations while providing added protection for Soldiers. They provide a readily accessible barrier for Soldiers to crouch behind if necessary, and excellent protection for those inside.

(2) Their use as mobile command posts offers the added advantages of security, communication, and mobility.

(3) They are well adaptable to roadblock operations providing the advantages listed above, while at the same time providing an excellent barrier.

(4) Their use for patrolling an area of violence adds to the psychological effect, and allows Soldiers to maneuver in close to snipers in order to make an apprehension.

b. Standard military transport vehicles can be modified with sandbags, armor plating, wire screening, or similar materials to give some protection against sniper fire and thrown objects. They provide mobility and communication capability for area coverage. Soldiers should be deployed with ample vehicles to provide sufficient flexibility to handle all situations in an area of civil disturbance. TOE allowances should probably be increased for this purpose.

3. Other Equipment. In addition to the special equipment discussed above, certain other items should be available for use in operations within the disturbance area.

a. Armored vests and protective masks are required for anti-sniping operations and at other times when violence is expected. Flexibility is an important consideration. For example, the limitation on visibility must be considered when requiring the use of protective masks, and the limitation on mobility when wearing the armored vests.

b. Successful conduct of the overall operation may depend on other items. Auxiliary lighting should be available to include hand-portable lights, vehicular-mounted searchlights, spotlights, flood-lights, flashlights, flares (with caution toward fires), and vehicle headlights. Prefabricated wood or metal barriers, or suitable materials, such as wire or ropes, may be used to block off an area; signs should be provided to supplement these barriers. Evidence equipment, including movie and still cameras with telescopic lenses, and recording devices should be obtained and placed into position.

c. Other items of equipment should also be provided. Helicopters should be used for observation, communication relay, illumination, resupply, reserve displacement, and numerous other tasks. Adequate firefighting and fire protection equipment are vital in civil disturbance.

d. Provisions should be made for appropriate communications equipment for use at the scene and between the scene and the operations headquarters. Every available means of communications to include public address systems--both hand-portable and vehicle-mounted--should be used.

PART E - Operational Tasks

1. General. In any civil disturbance operation, certain tasks must be accomplished to reach the ultimate objective of restoring and maintaining law and order. To do this, action must be taken to gain control of the situation. Control forces must perform certain tasks that will develop a physical and psychological environment which will permit law enforcement personnel to enforce the law and maintain order. The importance of having a high degree of flexibility and selectively in the response cannot be overemphasized. It is just as important that the tasks selected be completed only after a careful evaluation of the situation. This evaluation must consider the particular uniqueness of the situation. In this respect, the commander selects those tasks that are most likely to reduce the intensity of the given situation. Therefore, not all tasks will apply in all situations, but control force commanders and unit leaders must identify those tasks which must be performed and then develop plans and procedures for their accomplishment. The operational and integrated tasks listed below are discussed in detail in the paragraphs and lessons to follow.

a. Operational Tasks. (1) Isolate the area. (2) Secure likely targets. (3) Control crowds or mobs. (4) Establish area control. (5) Neutralize special threats.

b. Integrated Tasks.

(1) Gather, record, and report information. (2) Apprehend violators. (3) Maintain communications. (4) Maintain mobile reserves.

(5) Inform the public. (6) Protect the fire service operations. (7) Process detained personnel.

2. Isolate the Area.

a. This task includes the restriction and sealing off of the disturbed area. The objectives of sealing off the disturbed area are to prevent the disorder from spreading to unaffected areas, to prevent escape of persons bent on expanding the disturbance, to speed up the exit of the uninvolved, and to exclude unauthorized personnel from entering the affected area. In order to prevent the disturbance from expanding in size and strength, it is critical to prevent the inflow of extra demonstrators or curious onlookers into the disturbed area.

b. When military forces are committed to helping the civil authorities in controlling civil disturbances, the situation will be beyond the capability of local law enforcement agencies and a scene of major disorder should be expected. This disorder may be characterized by small, dispersed groups which are looting, burning, and generally causing havoc in the area, or it may be characterized by large groups participating in varying degrees of illegal conduct. The initial action taken by military forces to control the disorder is critical and should include the immediate isolation of the disturbed area.

c. The initial commitment of control force personnel may be required to clear a building or an area in order to isolate the persons creating the disturbance from those not yet motivated or actively involved. The primary emphasis should be on identifying what area and who has to be isolated.

3. Isolated Techniques. There are several techniques to use when isolating a disturbed area.

a. Barricades and Roadblocks. Barricades and roadblocks are physical barriers which deny or limit entry into and exit from the disturbed area. They can be used to totally deny passage of people and vehicles or to permit certain designated categories of persons and vehicles to pass. They must be positioned so as to prevent their being bypassed, surrounded, or cut off from support. In many cases, it may be impractical to physically seal an area due to the physical and geographical considerations, such as in the case of a college campus or a suburban area.

b. Barricades Against Personnel. Civil disturbance operations contingency planning should provide for the availability of portable barricades which slow down the passage of personnel. Concertina wire is a suitable material for rapid construction and effectiveness, although wooden sawhorses, ropes, and other field expedient devices may suffice. Concertina wire should be used sparingly and only under serious circumstances as it is indicative of violent disorders.

c. Roadblocks Against Vehicles. The erection of effective roadblocks which cannot be easily breached by vehicles requires large, heavy construction materials. One item that can be stockpiled in advance is 55- gallon drums to be filled with water or earth on site. Other materials include sandbags, earthworks, trees, or heavy vehicles. Several roadblocks placed at intervals of 25 to 50 feet provide sufficient depth to prevent breaches by heavy or high-speed vehicles.

d. Construction Considerations. The construction of barricades and roadblocks should provide cover from small arms fire where this threat is likely. Provisions should be for night illumination of approaches to the position; however, care must be taken not to silhouette the personnel manning it. Construction materials which would chip or shatter upon impact by thrown objects should be covered with canvas or sandbags to prevent injuries from flying fragments. Warning signs should be placed in front of the position directing authorized personnel not to approach the position. One technique of providing a quickly erected barrier is the use of vehicles parked bumper to bumper; however, this procedure may subject the vehicles to damage by a hostile crowd. Another device which may be effectively used both as a barricade and a part of a formation is the use of a locally built frame of wood or metal with wire covering.

e. Perimeter Patrols. Perimeter patrols should be established to prevent entry or exit from the disturbed area, particularly by persons or groups trying to bypass barricades and roadblocks. These patrols operate along the outer operational boundary of the disturbed area. Perimeter patrols can be integrated with area patrol routes within the disturbed area.

f. Pass and Identification Systems. Unit, installation, or municipal contingency planning should include a pass and identification system providing for the entry and exit of authorized personnel to and from the isolated area. Procedures should be established for press personnel, emergency medical personnel, public utility work crews, and for any other personnel who have a legitimate purpose for entering and exiting the isolated area. Consideration must be given to those persons residing within the disturbed area who must travel to and from work. An effective pass and identification system requires careful and detailed planning as a contingency measure.

g. Public Utility Control. Ensure that civil authorities have established a means for controlling public utilities to include street lights, gas, electric, water, and telephone services so that they may be turned on or off to support the tactics employed by the control forces.

4. Secure Likely Targets.

a. General. Certain buildings, utilities, and services are critical to the economic and physical well-being of a community and require security to prevent disruption of essential functions. In addition, certain facilities and buildings have become symbolic targets to radical or extremist elements and should be identified and afforded protection with the priorities established. Among the likely targets to be attacked are control force command posts, billeting areas, and motor parks. Another potential problem in civil disturbance operations is the threat posed by dissident elements intent on doing bodily harm to control force personnel and civilian dignitaries in the disturbed area. When such threats exist, military personnel may have to be committed to security operations. In particular, security must be placed on armories, arsenals, hardware, and sporting good stores, pawnshops, and gunsmith establishments, or other places where weapons or ammunition are stored. To conserve manpower, consideration may be given to evacuating sensitive items, such as weapons from stores and storing them in a central facility. Priorities for physical security must be established to prevent waste of available forces on less important facilities or those which have their own physical security forces. The degree of security necessary to protect various buildings and utilities is determined by considering the following: [..............]

It goes on.... Again the page is here. I'll leave it here to get this posted now. Check it out and be sure to get a handle on CONPLAN 3502 and other aspects of domestic military operations planning frameworks -- when similar emergency/disaster scenarios happen (i.e. Katrina) you see military personnel acting like this...

REX-84 under Iran Contra was 'then', and 'now' a literal US Army war to save the criminal banks from angry mobs is basically what's planned. Under this plan a nation ripped off & crippled by LIBOR peta-scale financial scams leaves forces like the military on the hook for defending the organized ring of criminals operating banks, i.e. "services ... critical to the economic... well-being of a community". What is the Pentagon supposed to do about the fact that the critical infrastructure is often operated by the criminally insane -- the very people who have pushed the US most of the way to the point where terrifying emergency plans like those above spring to life? X-(

Bilderberg conference, evil Prince Bernhard, the Junkers & long arc of German agenda

In the aftermath of the infamous Bilderberg Conference, I would like to throw this essay out there about the long arc of everything from the Hanseatic League to the European Common Market and European Union.

It's jumping off from an old book, The Thousand Year Conspiracy, published during WWII which pointed out that Hitler's days were numbered but the geopolitical agenda of eastern German aristocracy would keep on rolling - and it certainly did in many respects. The book:

http://spitfirelist.com/books/winkler1a.pdf

http://spitfirelist.com/books/winkler1b.pdf

If you thought German policy over the decades was just kind of a void, lurching from the Kaiser and Krupp to the Nazis, this was an interesting take on a certain coherency I wasn't really aware of. (and the so-called "Windsor" family controlling Britain isn't really addressed but ties right in).

The essay: http://explosivereports.com/2012/05/28/ancient-roots-of-bilderberg-reveal-prusso-teutonic-agenda-for-world-domination/

It also gets to the filthy schemes of Dutch Prince Bernhard who has been the main mover on Bilderberg since the get-go, a classic Junker German aristocrat, setting up the corrupt corporatist greenwashing front World Wildlife Fund for Nature [sic].

I think we get a lot about bureaucrats, banks and nationalism but the long arc of aristocracy is usually written off from state-side analysis of Europe. While this writeup might be a little bit too 'pat', are there other sources along similar lines looking at long-run aristocrat geopolitical schemes?

Don't miss this writeup on the WWF 1001 Club which is full of crazed Iran Contra arms dealer types - http://www.undovedmind.org/ISGP/articles/organisations/1001_Club.htm . ISGP was a wonderful site & I'm glad it's archived now.

Der Spiegel just blew WWF out of the water for its racist corporatist policies destroying native cultures & promoting extractive soybean monocultures, etc - don't miss this story either.

UPDATE June 5th: I found a few more roundup posts on Bilderberg for the interested. MEDIAROOTS – Reporting From Outside Party Lines Abby Martin roundup // The Final Day At Bilderberg 2012 With Luke Rudkowski // Bilderberg: the covert globalist government? RT // Washington Post Finally Breaks ‘Bilderberg’ Silence | American Free Press and they mention Minnesota's own consigliere, Vin Weber // Activist Post: The Global Elite’s Digital Agenda Played Out as Censorship and Cyber Warfare // real economics: Bilderberg 2012—a gathering of the mega-Predators // Protest groups converge to denounce secretive Bilderberg conference | The Raw Story // Bilderberg 2012 - Caledonia, WI Patch // The Media is Dead….Long Live the Media (Bilderberg 2012 Review) // Occupy Bilderberg: An Experiment in Activist Journalism // Good stuff!

Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys

Now with moar National Intellectual Property Rights Coordination Center ... Security unit targets ‘worst’ in world crime - John Lantigua, Palm Beach Post, Nov 26 2011

HSI is a new directorate within the Immigration and Customs Enforcement service. Formed in September, its agents are responsible for investigating large-scale international crime, such as narcotics or arms smuggling, human trafficking, money laundering and any form of terrorism. They also defend against the illegal appropriation and exporting of technology that is crucial to U.S. security.

"In other words we're looking for illegal activity that is crossing the border into the country or crossing the border out of the country," Pino says.

The HSI Special Response Team serves warrants and apprehends international criminals considered too dangerous for other law enforcement to go up against.

"A lot of these criminal organizations are very well-armed, very well-funded and some of them may come from military backgrounds in their home countries," Pino says.

While its name is new, the response team can be traced to the 1980s, before the Department of Homeland Security existed.

"It started here in Miami, in the old cocaine cowboy days," HSI Special Agent in Charge Mike Shea says. "This is the oldest and best tactical entry team in the country. High-risk entry is the core mission."

HSI consists of more than 10,000 employees, including 6,700 special agents, who are assigned to more than 200 U.S. cities and 47 countries .

A relatively monstrous SWAT style truck leads us to a whole new blob of police state developments, busy hands with little to do and a lot of hardware to do it. It's yet another plateau of mad new security bureaucracy, something in this case I was loosely aware of tectonic plates moving, but a little digging revealed quite a nasty new nucleus. Let's plow in and see what was beta-tested through the willingness of politicians to throw money at repressing immigrants. The results begin with big, black scary trucks. And the biggest intelligence group inside the Department of Homeland Security (DHS), and more. Surprise!

Via CopBlock.org's Facebook page:

Homeland Security SRT riot truck

What in the hell is the Special Response Team, why do they have eight of these things? etc. What turns up is an entirely new nasty agency gestating with Immigration & Customs Enforcement, from the burbling mass of confused federal police... a new team emerges. With exciting competitions and lurid ways of guarding the Super Bowl from Terrorist Attack - a National Special Security Event. The wikipedia page outlines the bizarre weave of this particular bureaucratic nucleus. And the List of special response units on the ol Wiki shows a spreading motif -- but this Homeland Security super-swat is perhaps the swattiest of all.

HSI SRT Training to jump off shiny new helicopters to save the Super Bowl in Miami - yayyyy!!
(this is why your schools/bridges are crumbling, America, the purposeless authoritarian spectacle at its finest ;)

This recently reorganized, months-old ICE Homeland Security Investigations (formerly known as ICE Office of Investigations) should really be on the radar of anyone because this year they are apparently 'filling in the gaps for the Secret Service' at NSSEs like G20, NATO summits and the Republican and Democratic national conventions. (unfortunately the Secret Service is now a part of DHS, not Treasury.) The Federal Protective Service, which likes to take photos around the Twin Cities (see my 2010 Fort Snelling Undercover Fail video, classic times) is now part of some weird directorate but briefly passed through ICE after being removed from the General Services Administration.

The HSI Special Response Teams are seemingly the top layer of a lot of things, from the war on terror / war on drugs motif, to the Super Bowl, to whatever the hell they are planning to do to immigrants on the I-5 near LA, which was where this pic was taken according to Copblock. ICE has a large number of staff on the Joint Terrorism Task Forces that do statistic-generating police state busywork around the country, and interestingly this HSI group is now officially becoming publicly distinguished from the rest of ICE -- and the theory of course is HSI would be spun out of ICE to become a freestanding 'directorate', a more modern and insane paramilitary FBI or whatever.

I wonder if the Secure Communities biometric collection program which was forced upon all counties in Minnesota, regardless of state & local wishes, would feed citizens' data into HSI.... just like the monstrous truck above, now moving more into the "non immigrant" category of freeform federal police activity. Perhaps they shall do some serious black ops against occupier groups angling to get to the conventions? Nevar!

Wikipedia:

The Special Agents of HSI use their broad legal authority to investigate and combat a range of issues that threaten the national security of the United Statessuch as strategic crimes, human rights violations, human smuggling, art theft,human trafficking, drug smuggling, arms trafficking and other types of smuggling(including weapons of mass destruction), immigration crimes, gang investigations; financial crimes including money laundering, bulk cash smuggling, financial fraud, and trade based money laundering; terrorism, computer crimes including the international trafficking of child pornography over the Internet, intellectual property rights crimes (trafficking of counterfeit trademark protected merchandise), cultural property crimes (theft and smuggling of antiquities and art), and import/export enforcement issues. HSI special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.[8] HSI special agents also provide security details for VIPs, witness protection, and support the U.S. Secret Service's mission during overtaxed times such as special-security events and protecting candidates running for U.S. president.

HSI was formerly known as the ICE Office of Investigations (OI). HSI Special Agents have legal authority to enforce the U.S. Immigration and Nationality Act (Title 8), U.S. Customs Laws (Title 19), along with Titles 5, 6, 12, 18 (Federal Criminal Code and Rules), 21 (drugs), 22, 26, 28, 31 (exclusive jurisdiction over Money and Finance investigations), 46, 49, and 50 (War and National Defense) statutes; giving them the broadest federal law enforcement jurisdiction of any agency. HSI has more than 8,500 Special Agents, making it the second largest federal law enforcement and criminal investigative agency within the United States government next to the FBI.

The change of names from ICE OI to HSI was announced in June 2010. Part of the reasoning behind the name change was to better describe the general activities of the agency, and to avoid the uninformed stigma that this agency only investigates immigration-related issues (ex. OI/HSI special agents duties were often mistaken by the public, other LE agencies and the media to mirror ERO agents/officers). HSI does have a public relations problem. Its the second largest investigatory agency, but the general public has never heard of it. ICE held it close to the belt and until recently, didn't publicly make the distinction as TSA does with Federal Air Marshals and CBP does with Border Patrol. In 2012, ICE and HSI have mandated a public distinction be made between both organizations. Most often news reports bury HSI's efforts as "immigrations agents" or as ICE efforts, and frequently Department of Justice and US Attorney's Office press releases of HSI-led investigations get spun up to sound like DOJ or FBI investigations that received assistance from local partners and ICE.

The name change to HSI better reflects that it is the U.S. Department of Homeland Security's primary investigative body, and as a result, its thought that someday it will be pulled out from under the ICE umbrella and stand independent under the DHS. An obscure fact is the original planned name before settling on ICE was the Bureau of Investigations and Criminal Enforcement, but the brothers at the FBI didn't approve and made their complaints heard.

Intelligence

Intelligence is a subcomponent of Homeland Security Investigations (HSI). The Office of Intelligence uses its Intelligence Research Specialists for the collection, analysis, and dissemination of strategic and tactical intelligence data for use by the operational elements of ICE and DHS. Consequently, the Office of Intelligence works closely with the Central Intelligence Agency, IRS the Federal Bureau of Investigation and U.S. Customs and Border Protection.

International Affairs

IA is a subcomponent of Homeland Security Investigations (HSI). The Office of International Affairs, with agents in over 60 locations around the world, represents DHS’ broadest footprint beyond US borders. ICE Attaché offices work with foreign counterparts to identify and combat transnational criminal organizations before they threaten the United States. IA also facilitates domestic HSI investigations.

Oh good, the CIA and FBI together at last... (and let's not forget the ICE/DHS network of detention facilities: Detention Facilities official front page- what is the HSI role for something like that applied to - somehow - non-immigrants?)

Official Site: http://www.ice.gov/about/offices/homeland-security-investigations/

The ICE Homeland Security Investigations (HSI) directorate is a critical asset in the ICE mission, responsible for investigating a wide range of domestic and international activities arising from the illegal movement of people and goods into, within and out of the United States.

HSI investigates immigration crime, human rights violations and human smuggling, smuggling of narcotics, weapons and other types of contraband, financial crimes, cybercrime and export enforcement issues. ICE special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.

In addition to ICE criminal investigations, HSI oversees the agency's international affairs operations and intelligence functions. HSI consists of more than 10,000 employees, consisting of 6,700 special agents, who are assigned to more than 200 cities throughout the U.S. and 47 countries around the world.

Report suspicious activity. Complete our tip form.....

HSI conducts criminal investigations against terrorist and other criminal organizations who threaten national security. HSI combats worldwide criminal enterprises who seek to exploit America's legitimate trade, travel and financial systems and enforces America's customs and immigration laws at and beyond our nation's borders.

HSI comprises six key divisions:

-Domestic Operations

-Intelligence

-International Affairs

-Investigative Programs

-Mission Support

-National Intellectual Property Rights (IPR) Coordination Center

The official page for the HSI Special Agent in Charge Field Offices of which there are 26:

Homeland Security Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the United States. The SAC offices are responsible for the administration and management of all investigative and enforcement activities within the geographic boundaries of the office. The SACs develop, coordinate, and implement enforcement strategies to ensure conformance with national policies and procedures and to support national intelligence programs. SACs coordinate law enforcement activities with the highest level of Federal, state, and local governments, as well as intelligence organizations and international law enforcement entities. In addition, SACs supervise all administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program is developed.

To efficiently manage their designated geographic regions, SAC offices maintain various subordinate field offices throughout their areas of responsibility, which support the enforcement mission. These subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge (ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing enforcement activities within the geographic boundaries of the office.

SAC Minneapolis/St. Paul

2901 Metro Drive, Suite 100

Bloomington, MN 55425

Main (952) 853-2940

Fax (612) 313-9045

If you search for 2901 Metro Drive Suite 100 that is the same office for other immigration, ICE & Homeland Security sub-offices.

These guys also have the completely insane National Intellectual Property Rights Coordination Center, a hearty reminder that the kafkaesque nature of what they call "intellectual property" combined with bureaucratic bloatware budget and an aggressively fascist private industry-friendly design, can truly combine to make one of the most awful, yet admittedly bold, authoritarian government logos of all time. Our Partner Agencies — National Intellectual Property Rights Coordination Center

intel-property-rights-center.png

It's almost enough to make you believe that swat teams could control all the memes they want, and even maybe the copy and paste commands too!

These are like a new branch of goons yet to be accounted for: HSI-Intel.

The ICE Homeland Security Investigations Intelligence Office (HSI-Intel) is a robust intelligence force that supports the enforcement needs of ICE’s executive leadership and operational field units.

Cutting edge technology, complex intelligence gathering tools, multifaceted investigative techniques and a high level of professionalism have enabled HSI-Intel to set the standard for federal law enforcement/intelligence agencies.

HSI-Intel also serves as home to the National Incident Response Unit (NIRU). This unit ensures that ICE is prepared to respond to national emergencies or critical events, including natural disasters, disease pandemics and terrorist attacks. NIRU plans for ICE’s continuity of operations before, during and after catastrophic incidents. During these incidents, NIRU serves as the agency’s central communications “nerve center,” coordinating the sharing of information between ICE components and other federal, state and local agencies. .....

HSI-Intel collects, analyzes and shares strategic and tactical data for use by DHS and ICE leadership and operational units. It also supports federal, state, local, tribal and international law enforcement partners.

HSI-Intel’s analysis and targeting information plays a vital role in supporting investigations related to illegal immigration, terrorism, weapons proliferation, war crimes, financial crimes, trade fraud, drug smuggling, human smuggling and trafficking, child sex tourism and other criminal activities.

I am sure they will figure out how all that drug money gets through the Federal Reserve Bank computer systems one of these days.

Organizationally parallel to ICE and the gestating HSI within it is the National Protection and Programs Directorate - Wikipedia. Has the Federal Protective Service now. A hodgepodge. Not the Center of the Action like HSI!

Oh true story... the KGB is now... wait for it... Federal Protective Service (Russia) - Wikipedia. Федеральная служба охраны, ФСО,

As far as I can tell, the following picture is not some satirical fan-boy art piece come to life. And those fonts.... christ! It looks like you can clearly see the 'investigations' part on there.

photo.jpeg

What about the Office of Investigations Special Response Team? Looks like we've found #8 and #10 so far. Both manilla and black color schemas.

Alright lets move this along & get these links out there.I found #9 for the Los Angeles set in Flickr user DFP2746 (plz forgive remixing a part of the images, you intellectual property fusion center types) Source: Homeland Security MRAP / DHS/ICE Special Response Team | Flickr - DFP2746

ice-investigation-srt-9.png

dhs-ice-srt.png

This is getting to be like Pokemon... my SRT trucks. Let me show you them...

First get the swag on eBay: specialresponseteam.JPG HOMELAND SECURITY ICE SRT SPECIAL RESPONSE PATCH | eBay

Press release from 2005 Katrina madness is nice: Department of Homeland Security Special Response Team Deploys to New Orleans Equipped with Zensah Tactical Gear

A– ICE Special Response Team (S.R.T.), an elite tactical unit attached to the Department of Homeland Security, deployed to New Orleans equipped with Zensah (http://www.zensah.com/tactical.html) tactical gear. By wearing Zensah™ moisture wicking tactical clothing, ICE special response team members receive a first line of defense against hazardous conditions found in the Gulf Coast areas affected by Hurricane Katrina.

ICE special response team members are in the affected areas to save lives, to protect lives, and to provide security to the recovery effort. ICE’s primary objectives are to support authorities in securing New Orleans and other affected communities and to provide security to federal rescue and recovery efforts.

....The ICE Special Response Team is an elite tactical team for the office of investigations under the Department of Homeland Security in Miami, Florida. Duties and responsibilities include search and arrests warrants, maritime interdiction, customs and immigration enforcement. For more information pleas visit http://www.ice.gov

Similar: Over 700 ICE Law Enforcement Personnel Were Sent to the Gulf Coast

MOAR GUNS: Tactical-Life.com » THE U.S. ICE MEN: The ICE Special Responders cometh bringing high-speed efficiency and low-drag force as required! "ICE also maintains five additional certified SRT units that are managed by ICE Detention and Operations." ... not sure if they mean 5 or 6 SRTs total. "the U.S. Customs Service evolved into a very progressive and highly successful interdiction and investigative agency. Due to the number of high-risk enforcement actions being executed on a regular basis, the U.S. Customs Service decided to establish a tactical unit called the WETT (Warrant Entry Tactical Team). In time, the U.S. Customs Service changed the name of its tactical team to the Special Response Team."

They're Hiring. Supervisory Border Patrol Agent (Special Response Team) - Homeland Security, Customs and Border Protection Job Posting

Buy training: Special Response Team Training 1: Overview & Objectives | Homeland Security Network USA newest backbone information source for First Responders

Gunfire a regular occurrence for ICE employees | California Watch. This has the following govt-produced pic, look how big that damn truck is. We can't see the apparent city-like (SAC?) insignia on the side or which number it has. It was at this Fort Benning GA training they blather about.

Another benefit of filling up society with needless paramilitary organizations is random accidental gunfire. Nice. "Roughly 80 ICE-involved shootings were unintentional and often involved agents dropping, cleaning or reaching for their guns, records show. The guns, in many cases, discharged in offices, government vehicles or during target practice. "

Special response teams prep for high risk situations at Ft. Benning - Nov 2011 press release ICE.gov

ice-special-training-ft-benning.png

City of Buffalo NY budget mentions a Major Award for it.

The confusing story of Homeland Security whistleblower Julia Davis ties into this I think. ie. see: Medal of Honor Held By The DHS PAGE 2

[ OKC Tangent. One other note -- In the Oklahoma City case I think Terry Nichols tried to tip off these Homeland Security types to a stash of explosives he'd obtained from FBI-friendly weapons dealer and Contra player Roger Moore. I don't have that info on hand here but it's around (notes on that ). It failed because some mafia guy snitched to the FBI -- the FBI has a pretty careful info cage around Nichols because of the informant-saturated nature of OKC he likes to talk about. This went down in like 2005. (Source of FBI Delay on Terry Nichols Explosives etc) So the idea is if the DOJ/FBI had a specific scheme such as OKC you could get around them through HSI. There's more to all of this, don't have the notes here, but there have been developments in recent weeks, search 'Jesse Trentadue'.. ]

201204120404.jpg

Check the ICE photos for some mad stuff. including saving the world from counterfeit NBA swag.

Conclusions? In any case it's good to know who the 'filler goons' are for NSSE campaigns of state-sponsored violence and insanity, of which 3.5 are scheduled for Chicago/Camp David, RNC & DNC this year, (along with the all important national sporting events), and ICE's new spawn HSI and the HSI SRT giant trucks will soon be a fixture at high profile gigs. There were weird Border Patrol Swat types at the 2009 G20 - See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed - BORTAC is that team. And who knows what they might do with good ol' FEMA.

What to expect: HSI's avid effort to become a domestic Swiss army knife of police activity between IRS, CIA and FBI; another layer on the Joint Terrorism Task Force cake and a free-wheeling institution in its own right, combined with a few new flashy PR initiatives (a high profile bust of a little fish or 2 perhaps, etc) in order to carry out the planned 'branding' of HSI.

Perhaps we can just shut it down and use the borrowed debt 'money' we save to be less permanently indebted to the banker police state... borrowed money to build out echelons of mass suppression is always a grim spectacle. Imagine what we could have done with the wasted resources instead. Now we know which new goonsquad will get the biometrics data from Secure Communities.

And of course, who better to 'manage' the war on drugs than the organizational descendant of the 'cocaine cowboys' and the 1980s task forces which helped pass through planeload after planeload of cocaine? That era's keywords, Barry Seal, aviation fronts like Vortex, Southern Air Transport, Evergreen, Polar Air Cross and Air America (some still thriving), operations like AMADEUS, PEGASUS and WATCHTOWER, the quasi-privatized intelligence operations authorized under proclamations like Executive Order 12333 to facilitate the drugs-for-weapons smuggling... those were a few critical points of that era.

What awaits us next? How will HSI deal with the vast scale of financial corruption? What will they do? Who are they going to point the weapons at, and where are the trucks going? Chicago, Charlotte & Tampa... but first, LA, of course. For the immigrants.

CIA Aircraft Shell Companies; FAA notices 119,000 unregistered aircraft for epic drugflight lols; Afghan drug informant/patsy blamed; Evergreen Dispersant Chemtrails; DEA rents plane from drug traffickers for total win in Fake War on Drugs

ssBOREvergreenIntl2.jpg

Screen shot 2010-12-13 at 12.31.01 AM.png

Going back to 2005:C.I.A. Expanding Terror Battle Under Guise of Charter Flights - New York Times

While posing as a private charter outfit - "aircraft rental with pilot" is the listing in Dun and Bradstreet - Aero Contractors is in fact a major domestic hub of the Central Intelligence Agency's secret air service. The company was founded in 1979 by a legendary C.I.A. officer and chief pilot for Air America, the agency's Vietnam-era air company, and it appears to be controlled by the agency, according to former employees.

Behind a surprisingly thin cover of rural hideaways, front companies and shell corporations that share officers who appear to exist only on paper, the C.I.A. has rapidly expanded its air operations since 2001 as it has pursued and questioned terrorism suspects around the world.

An analysis of thousands of flight records, aircraft registrations and corporate documents, as well as interviews with former C.I.A. officers and pilots, show that the agency owns at least 26 planes, 10 of them purchased since 2001. The agency has concealed its ownership behind a web of seven shell corporations that appear to have no employees and no function apart from owning the aircraft.

The planes, regularly supplemented by private charters, are operated by real companies controlled by or tied to the agency, including Aero Contractors and two Florida companies, Pegasus Technologies and Tepper Aviation.

....[the Masri rendition flight] ... episode illustrates the circumstantial nature of the evidence on C.I.A. flights, which often coincide with the arrest and transporting of Al Qaeda suspects. No public record states how Mr. Masri was taken to Afghanistan. But flight data shows a Boeing Business Jet operated by Aero Contractors and owned by Premier Executive Transport Services, one of the C.I.A.-linked shell companies, flew from Skopje, Macedonia, to Baghdad and on to Kabul on Jan. 24, 2004, the day after Mr. Masri's passport was marked with a Macedonian exit stamp.

Son of Air America: Aero appears to be the direct descendant of Air America, a C.I.A.-operated air "proprietary," as agency-controlled companies are called.

Just three years after the big Asian air company was closed in 1976, one of its chief pilots, Jim Rhyne, was asked to open a new air company, according to a former Aero Contractors employee whose account is supported by corporate records.

.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.

On closer examination, however, it becomes clear that those companies appear to have no premises, only post office boxes or addresses in care of lawyers' offices. Their officers and directors, listed in state corporate databases, seem to have been invented. A search of public records for ordinary identifying information about the officers - addresses, phone numbers, house purchases, and so on - comes up with only post office boxes in Virginia, Maryland and Washington, D.C.

But whoever created the companies used some of the same post office box addresses and the same apparently fictitious officers for two or more of the companies. One of those seeming ghost executives, Philip P. Quincannon, for instance, is listed as an officer of Premier Executive Transport Services and Crowell Aviation Technologies, both listed to the same Massachusetts address, as well as Stevens Express Leasing in Tennessee.

No one by that name can be found in any public record other than post office boxes in Washington and Dunn Loring, Va. Those listings for Mr. Quincannon, in commercial databases, include an anomaly: His Social Security number was issued in Washington between 1993 and 1995, but his birth year is listed as 1949.

Mr. Glerum, the C.I.A. and Air America veteran, said the use of one such name on more than one company was "bad tradecraft: you shouldn't allow an element of one entity to lead to others."

The Fake War On Drugs - exhibit 12245-12831221:

DRUGS-articleLarge.jpg

Propping Up a Drug Lord, Then Arresting Him - NYTimes.com

WASHINGTON — When Hajji Juma Khan was arrested and transported to New York to face charges under a new American narco-terrorism law in 2008, federal prosecutors described him as perhaps the biggest and most dangerous drug lord in Afghanistan, a shadowy figure who had helped keep the Taliban in business with a steady stream of money and weapons.

But what the government did not say was that Mr. Juma Khan was also a longtime American informer, who provided information about the Taliban, Afghan corruption and other drug traffickers. Central Intelligence Agency officers and Drug Enforcement Administration agents relied on him as a valued source for years, even as he was building one of Afghanistan’s biggest drug operations after the United States-led invasion of the country, according to current and former American officials. Along the way, he was also paid a large amount of cash by the United States.

Meanwhile the Federal Aviation Administration concedes that its recordkeeping on more than a hundred thousand aircraft is totally hosed. This is amusing because the FAA was from the beginning set up this way to enable the rich and powerful to use small aircraft for protected criminal conspiracies. It has always been trivial for them to use shell companies and various dead-end forms of paperwork magic to hide direct ownership of drug trafficking planes. A state employee spelled a lot of this out for me, as if it were almost common knowledge.

Evergreen, Polar Air Cross, Air America, Civil Air Transport, the Flying Tigers, L3, Titan, Skyway Aircraft, Vortex, these are just a few of the classics from then and now. AIG had tons of aircraft and got its start by insuring drug planes around Asia quite a bit.

Contractors are allowed to import as much drugz as they want, and they are able to routinely use special bypasses inside airports. For example Evergreen was frequently able to get the keys to the 'sterile corridors' at JFK Airport which let them circumvent Customs. These kinds of criminal conspiracies are what the National Security Act of 1947 is all about.

Let's have some lulz:

The Associated Press: US senator calls for hearings on plane registry

NEW YORK (AP) — The chairman of the Senate subcommittee overseeing aviation said Friday he would recommend holding congressional hearings on aircraft registration after The Associated Press reported the Federal Aviation Administration was missing data on one-third of U.S. planes.

"We need to find out why, and how it can be brought back to have a registry that has credibility," said North Dakota Sen. Byron Dorgan, a Democrat.

The FAA says as many as 119,000 of the 357,000 U.S.-registered aircraft have "questionable registration" due to missing paperwork, invalid addresses and other paperwork problems.

In reports in 2007 and 2008, the agency warned that the gaps were causing loopholes that terrorists, drug traffickers and other criminals might exploit. Law enforcement agencies were increasingly turning to the FAA for information, and the registry needed more accuracy as the government launched new computer systems to track suspicious flights, it said.

On Friday the FAA said it was taking "proactive steps" to clean up the database by requiring all aircraft owners to re-register their planes over the next three years.

"The agency is moving to a mandatory re-registration system like the ones most states use to register automobiles, so we have more current and complete registration information in our database," the agency said.

Dorgan's counterpart in the House of Representatives, Rep. Jerry Costello, D-Ill., said Friday the FAA needs to improve its recordkeeping but stopped short of calling for hearings.

"Given the security issues at stake, revising and modernizing the registration process is necessary," Costello said in a written statement. "The FAA needs to ensure the re-registration process runs as smoothly as possible and that the maintenance of records is improved, and I believe the FAA is proceeding accordingly."

Both congressmen will soon be stepping down from their leadership roles in the aviation committees. Dorgan is retiring in January, and Senate leaders have not yet chosen a new committee chair.

Costello, a Democrat, will lose the post when Republicans take control of the House in January. His likely replacement, Rep. Tom Petri, R-Wis., was unavailable for comment on Friday, a spokeswoman said.

Until now, aircraft owners were only required to register once, when they purchased an aircraft. Errors accumulated over decades as new purchasers forgot to register, owners died, invalid addresses went uncorrected and junked aircraft went unreported, the FAA says.

In addition to law enforcement purposes, the FAA said it uses the database to contact owners about safety problems and locate planes that go missing.

Pilot groups said the outdated registry was not a security risk, noting the United States has other safeguards against terrorism.

The Transportation Security Administration does background checks on student pilots from other countries, air traffic controllers watch for suspicious flights, and the Department of Homeland Security has launched new computer systems to screen aircraft arriving from other countries.

EVERGREEN 0WNZ TEH CHEMTRAIL OPS IN GULF!

Photo of fire suppressant-equipped plane from Evergreen

evergreen-airr.jpg

I got a kick out of a pretty interesting expose about Evergreen, which is a massive CIA cutout corporation created because the Church Commission was flushin' out a lot of covert ops. Evergreen's planes, many C-130s, were supposedly under the control of the US Forest Service for firefighting purposes, hence the tree name metaphor.

evergreen1.jpg

Evergreen is still extremely active and gets a lot of contracts. Evergreen International Aviation, Inc.

Screen shot 2010-12-13 at 12.18.10 AM.png

The website IntelHub.com posted that Evergreen is what else, engaged in spraying nasty chemtrails all over the place. Evergreen Air and a Secret Chemtrail Facility :

On Feb 18, 2010 NotForSale from the Intel Hub interviewed a whistleblower employed as a private contractor at an Evergreen Air facility. The information he provided was mind blowing. Never before had a whistleblower came forward about this top secret facility located in the Arizona desert north of Tucson. In the interview the whistleblower described how the facility is heavily secured by well armed personnel. During his time at the facility he was involved in retro fitting 727 and 747-c aircraft with liquid discharge tanks and aerosol sprayer devices. He has also confirmed reports of triangular black jets at the facility as well during his time there in the early 1990’s. It is also important to note that the facility owns fully functional warbirds that have been fully restored from WWII, where all of the weapon systems and bomb bay doors are operable on the craft. This type of craft is not authorized by civilian, public or private use within the U.S. This would indicate that Evergreen Air is indeed a CIA operation. The Whistleblower has also heard there is an underground base at the facility and confirms there is a possible “Black Helicopter” base on site as well.Note: Evergreen Air also specializes in unmanned aerial drones.

Riki Ott: ‘People Now Dropping Dead’ In the Gulf : - claimed here Evergreen is spraying dispersants around the Gulf even now. A ton of posts saying Evergreen is involved: Search Results evergreen :

JFK airport attacker (patsy) worked at Evergreen: ‘Plot to blow up New York airport would have made 9/11 look small’ - Times Online

It is claimed that Mr Defreitas, 63, a naturalised US citizen born in Guyana, told the informant that he wanted to attack the airport because in the early 1990s he had seen missiles being shipped to Israel while he was working for Evergreen International Aviation.

Great list here: Known CIA Fronts includes Evergreen.

SSP SCIENCE TEAM MEETS NASA OFFICIALS AT EVERGREEN AIR CENTER


Evergreen2a.jpg

Nibbles from LewRockwell.com - William Norman Grigg:

“The CIA has always been involved in drug smuggling, and Evergreen or Air America has played a big role in it,” Kleiman told me in a recent phone interview. “When I was working Customs at JFK, we had this huge problem with airline personnel using their secure keys to give unauthorized access to 'sterile corridors' that bypassed Customs inspection. Quite often this involved drug smuggling, and I've got ample reason to believe that Evergreen and other CIA assets were involved in it.”

A few notes from AllSeeingI member @ AboveTopSecret: Chemtrails Flights Exposed - Evergreen Aviation (A CIA Front), page 1

EVERGREEN AVIATION...

Is possibly the largest Aviation and logistics company which is a major front for Government Black Ops. Also possibly the company responsible for the so-called Chemtrails Flights. Read what I have to say....

I have worked in a number or different aviation related jobs at a handful of airports over the past 15 years. I worked for FedEx for a few years as well as had direct contact with Evergreen Aviation and their employees.

The USPS (United States Postal Service) contracts all of the USPS Express mail, airmail, and overnight types of USPS services to FedEx because of the FedEx Express air logistics network which always has connecting overnight aircraft.

Evergreen Aviation is contracted by the USPS to pick-up the USPS shipments from FedEx. Evergreen Aviation then sorts the deliveries and USPS trucks pick-up the sorted deliveries and takes them to the individual post offices.

This system offers the perfect opportunity for a government run package logistics cover operation. Any airport which handles USPS can therefore be used to ship secret government shipments of ANYTHING (weapons, drugs, secret equipment, tech, documents, bombs, use your darkest imagination).

Also because the USPS is operated within the government the situation allows very easy financial back-scratching both ways and makes it easy to cover it up using and a combination of methods such as contracts, special accounts, and fake front companies to pay for the shipments. Just imagine how easy it would be for a guy in a suit to show up at a post office in Washington D.C. with a package and ship it overnight via the USPS and pays a huge amount for the service using a front-company government black-budget credit card to pay for it.

At my job with FedEx at two different airports, both times FedEx had this relationship with Evergreen Aviation. They would pick up the containers filled with USPS Express shipments from FedEx once we unloaded our FedEx aircraft. Then later, Evergreen would bring back outbound shipments for us to load on outbound FedEx aircraft.

I noticed a consistency with Evergreen Aviation at both locations: Their equipment and personnel were substandard. But from what I heard they were paid very well and had great benefits. This also sounds like a government operation: Contract work which is over-budgeted overpaid employees, equipment which is poorly maintained, and employees who don’t ask questions.  

And check it their website even promotes Weather Modification!

Screen shot 2010-12-13 at 12.26.20 AM.png

Massive contracts: A bunch of these are clearly not the same Evergreen but it's funny:Federal Contracts to Contactor(s) matching "evergreen", FY 2007, list of contractors


Screen shot 2010-12-13 at 12.28.41 AM.png

A moment for the Mad Cow Productions:

We can't touch this topic without referencing MadCowProd.com and Daniel Hopsicker, who was all up in the business with schemes like the massive Wachovia/Wells Fargo giga-moneylaundering conspiracies for years. Hopsicker has had to spend a lot of time on Venice, Florida, from whence the 9/11 flight trainer conspiracy and various other weird things have emerged. Supporting Hopsicker is worthwhile because as he sez: "Today’s Drug Lords don’t look like Tony Montana in “Scarface,” but preppy Yale and Harvard-educated scions of America’s traditional political elite, which in point of fact is what that they are."

Latest: Chairman Chavez, Oliver North & "co-conspirators not named as defendants"

From Tampa Bay to Timbuktu

New DEA Chief Tough on Chavez, Soft on American DrugLords

GOTCHA! 9/11 Heroin Pilot's 10-year Crime Spree Stopped

The Brassington FilesTeterboro Crash Trial Coverup

9/11 Drug Pilot Linked to Operation Blue Lightning

Pilot for 9/11 flight school considered "grave threat to national security"

Charter Company Ran Second Jet Off Runway

Arrested Pilot Flew Jets Owned by Clinton White House Official

CIA Drug Pilot Linked to Russian Mob

Pilot in New Jersey Crash Is Key Figure in Caribbean Probe

Dusty & 'the boys' - The CIA, the Narco-Republicans, & 5.5 tons of cocaine

etc etc.

Phoenix Air has its own shadyPlanez:

opszzzimg.gif

PostScript: Tulsa has Epic DrugWar Corruption Explosion! Drugs, money, police, informants. Scandal in Tulsa. - Drug WarRant // Scandal Roils Tulsa Police - WSJ.com including fake informants!

For Moar: cryptogon.com excellent early writeup, FAA Loses Track of 119,000 Aircraft; Situation Could Facilitate Terrorism and Drug Trafficking.

.... more random bits - Via IntelHub, a researcher into rad energy systems had a creepy-as-hell VeriChip and tumor removed. Good luck Bob Boyce!!!! Bob Boyce's un-requested Verichip and associated tumor removed. SICK!

UPDATE 12/16: Consider Cryptome.info featuring the Aero operations: http://cryptome.info/cia-plane-nc.htm
Also this has some moar shells listed: http://www.wikiwatch.info/us-war/rendition/Shell-companies/

FedWire and Wachovia / Wells Fargo = Pipeline for protected money laundering sez BCCI investigator Mazur

"It would be important for this task force to have access to records of the Federal Reserve and the central banks of cooperating nations to find out which financial institutions are depositing large amounts of American dollars. (If investigators had had such access years ago, it would have been easy for them to see the billions in currency that Wachovia was shipping from Mexico.) By getting access to wire systems operated by the Fed and the Society for Worldwide Interbank Financial Telecommunication, investigators could also identify and track the accounts for which banks convert cash into wire transfers. Here again, the information should be added to the database. Eventually, all this collected data could reveal a pattern of activity that would point to dirty bankers and businessmen."

plz forgive this allcaps moment: ^^ A CLEAR ENOUGH EXPLANATION WHY EVERYTHING IS A SCAM &/OR FARCE?!

Great post back on Sept 12 in NYT - Really excellent stuff that should not be ignored... speaks to the federal corrupt system at many levels. It boggles my imagination to consider the level of criminal indifference required to hide this all these years. See earlier - Barclays Bank criminal banking operations.

Robert Mazur, a former federal agent, is the author of “The Infiltrator,” a memoir about his undercover life as a money launderer. He is the president of a private investigative agency.

Follow the Dirty Money By ROBERT MAZUR

Published: September 12, 2010

LAST month, a federal district judge approved a deal to allow Barclays, the British bank, to pay a $298 million fine for conducting transactions with Cuba, Iran, Libya, Myanmar and Sudan in violation of United States trade sanctions. Barclays was discovered to have systematically disguised the movement of hundreds of millions of dollars through wire transfers that were stripped of the critical information required by law that would have enabled the world to know that for more than 10 years the bank was moving huge sums of money for enemy governments. Yet all federal prosecutors wanted to settle the problem was a small piece of the action.

When Judge Emmet Sullivan of federal district court in Washington, who ultimately approved the deal with Barclays, asked the obvious question, “Why isn’t the government getting rough with these banks?” the remarkable response was that the government had investigated but couldn’t find anyone responsible.

How preposterous. Banks can commit crimes only through the acts of their employees. Federal law enforcement agencies are simply failing to systematically gather the intelligence they need to effectively monitor the crime.

The Barclays deal was just one in a long line of wrist slaps that big banks have recently received from the United States. Last May, when ABN Amro Bank (now largely part of the Royal Bank of Scotland) was caught funneling money for the benefit of Iran, Libya and Sudan, it was fined $500 million, and no one went to jail. Last December, Credit Suisse Group agreed to pay a $536 million fine for doing the same. In recent years, Union Bank of California, American Express Bank International, BankAtlantic and Wachovia have all been caught moving huge sums of drug money, but no one went to jail. The banks just admitted to criminal conduct and paid the government a cut of their profits.

Wachovia alone had moved more than $400 billion for account holders in Mexico, $14 billion of which was in bulk currency that had been driven in armored cars or flown to the United States. Just who in Mexico did anyone think had that kind of cash? Of course, the government did a thorough investigation but could find no individuals responsible.

Bankers are escaping prosecution because law enforcement is failing to expose the evidence that some bankers market dirty money. Years after the transactions occur, any effort to prove what was known at the time is practically impossible. The bankers simply say they didn’t know where the money came from. Naturally, prosecutors look for ways to get around trying to prosecute those sorts of cases, and instead make deals.

It should be up to law enforcement agencies to bring prosecutors solid proof of what the bankers knew and said at the time they knowingly handled ill-gotten money. This is not difficult, only time-consuming.

In the 1990s, while I was a federal agent working to gather evidence against Colombian drug cartels, I spent a year and a half building a sophisticated undercover identity as a money launderer, with the help of a half-dozen informants and concerned citizens. Then, for the next two and a half years, I infiltrated the highest levels of one cartel and began dealing with their banking contacts. I recorded hundreds of conversations behind boardroom doors with sophisticated international bankers.

They readily gave me access to all the tools of their trade, starting with lawyers who knew how to create offshore corporations for crooks in places like Panama, Hong Kong, the British Virgin Islands and Gibraltar. The bankers also provided secret safe deposit boxes abroad, and arranged for currency to be shipped in safes to places like Dubai and Abu Dhabi, where large cash deposits are not recorded. My money could then be repatriated to the United States disguised as offshore loans. Account details were whispered in secret meetings so that paper never crossed borders. And any records sought by any government could simply be destroyed.

The evidence I gathered led, in the early 1990s, to the demise of the Bank of Credit and Commerce International, the seventh largest privately held bank in the world, and Capcom, a multinational commodities trading company. More important, it put a slew of bankers behind bars and got their tongues wagging, so much so that we learned where Manuel Noriega, the former Panamanian general, had hidden his fortune in payoffs from Colombian cartel leaders.

Revenues from global drug trafficking — estimated to add up to more than $400 billion a year — are just one small component of the money, known as flight capital, that criminals try to hide from governments. This capital also includes proceeds from things like tax evasion, trade with countries under sanctions and arms dealing. It’s big business. The desire to have a share in this business has led the private client divisions of many international banks to develop sophisticated skills to avoid scrutiny from regulators.

Tracking and confiscating the fortunes of terrorist organizations, drug cartels and organized criminals is important for national security, and yet no single federal law enforcement agency systematically investigates the international bankers and businessmen who launder this money. What’s needed is a small but elite multi-agency task force, including representatives of the intelligence community and accomplished members of law enforcement agencies from other nations, that could identify the institutions and businesses that handle the bulk of the dirty money flowing around the globe. A task force numbering 100 people or less, at least initially, could compile a database containing detailed information about bad banks and money launderers.

Some of this data could be culled from the various law enforcement agencies’ existing files. But investigators should also debrief the hundreds of high-level criminals now being held in our prisons to get detailed information about their allies in the banking and business community.

The task force should also try to identify every asset used by major criminal and terrorist organizations. If one of them buys a million-dollar airplane, for example, investigators should find out where the money to buy it came from. All this information should be kept in the same database.

It would be important for this task force to have access to records of the Federal Reserve and the central banks of cooperating nations to find out which financial institutions are depositing large amounts of American dollars. (If investigators had had such access years ago, it would have been easy for them to see the billions in currency that Wachovia was shipping from Mexico.) By getting access to wire systems operated by the Fed and the Society for Worldwide Interbank Financial Telecommunication, investigators could also identify and track the accounts for which banks convert cash into wire transfers. Here again, the information should be added to the database. Eventually, all this collected data could reveal a pattern of activity that would point to dirty bankers and businessmen.

To make use of this intelligence, undercover agents from around the world should be trained and equipped with the tools needed to infiltrate the banking and business community. Working with the information in the database, they could inflict a devastating blow to the fortunes of the underworld and its money launderers. Finally, the government would be able to prosecute the people personally responsible for laundering billions of dollars worth of criminal profits.

Fort Snelling Undercover Fail; Ollie's 1985 Gander false flag crash; Bilderberg 2010; Watersports with the White House Press Corpse; the Coming Artilect War and more!

Special greetings to Rule of Law Radio / Axxiom for Liberty listeners! We had a great time chatting last Friday for moar than an hour about every cutting edge dimension of the military-industrial police state, hosted by Kaye Beach and her friend (nickname Matrix? I forget). Get the live recording of all 2 hours here (110MB) or 13MB lo-fi version. I joined about a half-hour in, but in the first minutes they talked about being Ron Paul delegates at the 2008 RNC, thoroughly abused by the Man, and leaving as changed people. A great springboard into fusion centers, the NAFTA superhighway and more, with a guest from OK SAFE as well. [I forget her name right now as well but she was kewl!]*******
I've been there and back again lately, leaving far too little time to check in. We are expecting new videoz to leakify from points interesting Real Soon Here. Stay tuned for that one... And now, my video exposé of the Fort Snelling Undercover - in all his epic fail glory:

Intrusive photographer admits it: a government employee spies on rallies against Fort Snelling & immigration policies at the Whipple Federal Building. He gets a "thumbs up" from Haukoos, lead Department of Homeland Security/Federal Protective Service security officer. At Fort Snelling, the photographer admits he's a government employee but won't say if he's a federal employee, then refuses to show his lanyard (even though he says it has his ID) and he promptly runs away in his blue truck.  Same logic of "Federal Control" persists for centuries, but this video shows everyone can deal with sleazy spy photographers: block them, tape them, confront them about their chain of command. Organizers try to mitigate his efforts to collect intelligence on rally participants. Another element: Homeland Security radio transmission seems to order operations "systematically". Could this man be photographing everyone for addition to federal facial recognition databases? What data practices rules apply to this man's camera and his taxpayer-financed salary? Amazingly, some people do not realize this conduct & aggressive spying on political dissent happens all the time even under a Democratic presidency. Video edited by Dan Feidt for Twin Cities Indymedia - http://tc.indymedia.org Video shot by Dan Feidt & Sally Jo Sorensen - http://bluestemprairie.com (Sally Jo clips of him @ Whipple Building) LICENSE: This video is licensed Creative Commons/ShareAlike. Please remix and share!!

Helen Thomas, who gave em hell consistently for decades, got knocked out of the Capitol Press Corps in favor of the hard working White House Beach Party krew - warning you may spit on yr kbd at this: Our hard-core, adversarial press corps - Glenn Greenwald.

Here was the transcript of the whole Helen Thomas clip, which of course was released in a heavily spun way [via Balloon Juice » You Got Played]

Q: Any advice for these young people over here for starting out in the press corps?

Thomas: Go for it. You’ll never be unhappy. You’ll always keep people informed, you’ll always keep learning. The greatest thing of the profession is you’ll never stop learning.

Q: Today they are covering the Jewish Heritage Month.

Thomas: ... and meet the President.

A: Any comments on Israel? We’re asking everyone today, any comments on..

Thomas: Tell them to get the hell out of Palestine.

Q: Oooh. Any better comments?

Thomas: Remember, these people are occupied, and it’s their land. It’s not German and it’s not Poland.

Q: So where should they go, what should they do?

Thomas: They can go home.

Q: Where is home?

Thomas: Poland. Germany.

Q: So you are saying Jews should go back to Poland?

Thomas: And America and everywhere else. Why push people out who have lived their for centuries? See?

Q: Now, are you familiar with the history of that region and what took place?

Thomas: Very much. I’m of Arab background.

{It goes on for a little while with friendly banter about languages they both speak with words I can not even begin to spell.}

Q: Thank you.

Thomas: All the best to you (directed at the Jewish students). Go for it- go for journalism, you’ll never regret it.

Rabbi Nesenoff himself has very few offensive or dubious clips out there himself -- oh wait: Rabbi Who Brought Down Helen Thomas Has Great ‘Mexican’ Impression | RaceWire. A Helen Thomas gallery.

*******

killingrobot.jpg

AUTHORITARIAN ESCHATON == ARTILECT OF DOOM!: Last night I remembered that the Roomba cleaning robot is made by a company that also makes killer robots. A review of what they're up to now: the scary wikipedia page, PackBot, iRobot Negotiator , & more. "Chembot is a DARPA-funded prototype of a shape-shifting robot without motors, wheels or any rigid elements. It runs on chemical power and is made using dielectric elastomers, which are extremely flexible and can alter their shape in electric or magnetic fields. Ultimately, the program aims to build a robot that is completely squishy and able to squeeze through a hole 'the size of a 10 pence piece'.when was this made"

What will control these killer robots in 80 years or so? Via cryptogon.com, The spooky new idea to check out is the ARTILECT -- aka the bossy killer super-intelligence that will wipe us all out like ants. Now some guy who's leading the charge to build China's artificial brain has actually considered the implications of his work. From the fine new Technofascism blog, Hugo de Garis and The Coming Artilect War:

If you haven’t heard of Hugo de Garis, AI researcher and Professor at China’s Xiamen University, then you’ve probably never heard of an Artilect either. A contraction of Artificial Intellect, the Artilects are future creations that, according to de Garis, will be immortal, godlike robotic beings that, due to being built on a substrate of nanoscale computer chips, will have billions of times the intelligence of the average human. Needless to say, these Artilects would not for a second hesitate in wiping out the entire human species if their need dictates; much like a human wouldn’t trouble themselves over running over an ant colony on their way to work.

It’s important to listen to de Garis because he is one of those rare scientific researchers that actually considers the implications of his work. In de Garis’ view, in the late 21st century humanity will have the technological ability to create the Artilects. At that point, humans will be divided into three camps: the Terrans, who will attempt to violently prevent the creation of the Artilects; the Cosmists, who think building them is a good idea; and the Cyborgists, who will attempt to merge with the Artilects to preserve some shred of their humanity.   These three camps will fight it out and the winner will decide the fate of the planet.   Since the war will be fought with late 21st century weaponry, the death toll is expected to be in the billions.

Check the wiki profile And more in that Forbes article The Coming Artilect War - Forbes.com

Considering all this, I predict that humanity will split into three major philosophical, ideological, political groups, which I label as follows.

--The Cosmists (based on the word "cosmos") will be in favor of building these godlike machines (the artilects), who would be immortal, think a million times faster than humans, have unlimited memory, go anywhere, do anything and take any shape. The Cosmists would take a quasi-religious view that they are god builders. Privately, I am a Cosmist, but publicly, I have mixed feelings about the rise of the artilect.

--The Terrans (based on the word "terra," meaning the earth) will be opposed to the construction of artilects, fearing that in a highly advanced form, the artilects may decide to wipe us out. To ensure that the probability that this might happen is zero, the Terrans will insist that the artilects are never built in the first place. But this strategy runs utterly contrary to what the Cosmists want. The Terrans will be prepared to go to war against the Cosmists to ensure the survival of the human species.

--The Cyborgists (based on the word "cyborg," meaning cybernetic organism that is part machine, part human) will want to become artilect gods themselves by adding artilectual components to their own brains, thus avoiding the bitter conflict between the Cosmists and the Terrans.

Photo of MAARS Robot with M240B machine gun, via CommonDreams.org / 2009 McClatchy: Pentagon Exploring Robot Killers That Can Fire on Their Own | CommonDreams.org

*******

1985 GANDER FALSE FLAG AIR CRASH CONCEALS NEUTRON BOMB TEST etc: Moving right along, I would like to add something about a 1985 false-flag plane crash. aka: Arrow Air Flight 1285 - Wikipedia.

A while ago I ran into someone who was involved with this. A private transport plane carrying lots of military personnel and cargo from Cairo to the US crashed near Gander, Canada in 1985. It obviously exploded somehow, and actually for once the National Transportation Safety Board failed to unanimously peddle the establishment coverup.

This was actually a false-flag bombing carried out by people friendly with Oliver North & the Usual Suspects of Iran-Contra fame. It was a bombing "required" to advance numerous coverups, included a need to get rid of bodies from dead illegal Special Forces operations in Lebanon, and also the remains of illegal neutron bomb testing in the Sinai Peninsula. [US military personnel cooked with neutrons were murdered en route rather than risk public exposure after reaching a stateside medical facility]

The records of the Gander Crash have been sealed for 70 years because it was a false-flag coverup -- and additionally there has been at least one direct death threat from a 'credible source' to shut people up.

I was pleased to find a surprisingly good video about it, from a show on Spike TV no less? For students of conspiracy video styles, I thought the editing on this segment was concise & excellent as well:

Congressional speakers on the coverup - circa 1989: GANDER, NEWFOUNDLAND, CRASH REMAINS A MYSTERY TO CANADIAN AND AMERICAN PUBLIC. etc. Anyway, add this one to the list of murderous crimes of state within the Iran-Contra/Octopus criminal complex -- quite from the thick of it, really. Be sure to look @ the transcript of this video program for more on how the overall coverup commenced. [PDF]. Memorial video. Kind of a Loose Change style video.

*******

Bilderberg 2010 is ON baby! I like the Charlie Skelton coverage News blog + Charlie Skelton's Bilderblog | News | guardian.co.uk. And lol he found Dutch Queen Beatrix, a key globalist in the old skewl style. Bilderberg 2010: Help us identify the delegates. Gallery! "Picture 1: He’s a big Swede, he’s on the board of Coca-Cola, and he’s a Knight of the Order of the Seraphim. But who is he?" Nicely done. Bilderberg 2010: Plutocracy with palm trees. Bilderberg 2010: Why the protesters are your very best friends | World news | guardian.co.uk

Let's include a list of these rockstars, via where else, Cryptome.org! Bilderberg Participants 2010 and another one here.

Date: Sat, 29 May 2010 14:11:39 +0100

To: pepis[at]googlegroups.com,pepis[at]yahoogroups.com

From: Tony Gosling <tony[at]cultureshop.org.uk>
Subject: [PEPIS] Leaked participants of 2010 meeting?
Bilderberg participants 2010 (in alphabetic order)
(Present) Occupation
BEL Davignon, Etienne F. Honorary Chairman, Bilderberg Meetings; Vice Chairman,
Suez Tractebel
DEU Ackermann, Josef Chairman of the Management Board and the Group Executive
Committee, Deutsche Bank AG
USA Alexander, Keith B. Director, National Security Agency
GRC Alogoskoufis, George Member of Parliament
USA Altman, Roger C. Chairman and CEO, Evercore Partners, Inc.
GRC Arapoglou, Takis Chairman and CEO, National Bank of Greece
TUR Babacan, Ali Minister of State and Deputy Prime Minister
GRC Bakoyannis, Dora Minister of Foreign Affairs
NOR Baksaas, Jon Fredrik President and CEO, Telenor Group
PRT Balsemão, Francisco Pinto Chairman and CEO, IMPRESA, S.G.P.S.; Former Prime
Minister
FRA Baverez, Nicolas Partner, Gibson, Dunn & Crutcher LLP
ITA Bernabè, Franco CEO Telecom Italia SpA
SWE Bildt, Carl Minister of Foreign Affairs
SWE Björklund, Jan Minister for Education; Leader of the Lìberal Party
CHE Blocher, Christoph Former Swiss Counselor; Former Chairman and CEO, EMS Group
FRA Bompard, Alexandre CEO, Europe 1
USA Boot, Max Jeane J. Kirkpatrick Senior Fellow for National Security Studies, Council
on Foreign Relations
AUT Bronner, Oscar Publisher and Editor, Der Standard
FRA Castries, Henri de Chairman of the Management Board and CEO, AXA
ESP Cebrián, Juan Luis CEO, Grupo PRISA
BEL Coene, Luc Vice Governor, National Bank of Belgium
USA Collins, Timothy C. Senior Managing Director and CEO, Ripplewood Holdings, LLC
GRC David, George A. Chairman, Coca-Cola Hellenic Bottling Co. (H.B.C.) S.A.
GRC Diamantopoulou, Anna Member of Parliament
ITA Draghi, Mario Governor, Banca d'Italia
USA Eberstadt, Nicholas N. Henry Wendt Scholar in Political Economy, American
Enterprise Institute for Public Policy Research
DNK Eldrup, Anders President, DONG Energy A/S
ITA Elkann, John Chairman, EXOR S.p.A.; Vice Chairman, Fiat S.p.A.
DEU Enders, Thomas CEO, Airbus SAS
ESP Entrecanales, José Manuel Chairman, Acciona
AUT Faymann, Werner Federal Chancellor
USA Ferguson, Niall Laurence A. Tisch Professor of History, Harvard University
IRL Gleeson, Dermot Chairman, AIB Group
USA Graham, Donald E. Chairman and CEO, The Washington Post Company
NLD Halberstadt, Victor Professor of Economics, Leiden University; Former
Honorary Secretary General of Bilderberg Meetings
NLD Hirsch Ballin, Ernst M.H. Minister of Justice
USA Holbrooke, Richard C. US Special Representative for Afghanistan and Pakistan
NLD Hommen, Jan H.M. Chairman, ING N.V.
INT Hoop Scheffer, Jaap G. de Secretary General, NATO
USA Johnson, James A. Vice Chairman, Perseus, LLC
USA Jordan, Jr., Vernon E. Senior Managing Director, Lazard Frères & Co. LLC
FIN Katainen, Jyrki Minister of Finance
USA Keane, John M. Senior Partner, SCP Partners; General, US Army, Retired
USA Kent, Muhtar President and CEO, The Coca-Cola Company
GBR Kerr, John Member, House of Lords; Deputy Chairman, Royal Dutch Shell plc
DEU Klaeden, Eckart von Foreign Policy Spokesman, CDU/CSU
USA Kleinfeld, Klaus President and CEO, Alcoa Inc.
TUR Koç, Mustafa V. Chairman, Koç Holding A.S.
DEU Koch, Roland Prime Minister of Hessen
TUR Kohen, Sami Senior Foreign Affairs Columnist, Milliyet
USA Kravis, Henry R. Senior Fellow, Hudson Institute, Inc.
INT Kroes, Neelie Commissioner, European Commission
GRC Kyriacopoulos, Ulysses Chairman and Board member of subsidiary companies
of the S&B Group
FRA Lagarde, Christine Minister for the Economy, Industry and Employment
INT Lamy, Pascal Director General, World Trade Organization
PRT Leite, Manuela Ferreira Leader, PSD
ESP León Gross, Bernardino General Director of the Presidency of the Spanish
Government
DEU Löscher, Peter CEO, Siemens AG
GBR Mandelson, Peter Secretary of State for Business, Enterprise & Regulatory
Reform
INT Maystadt, Philippe President, European Investment Bank
CAN McKenna, Frank Former Ambassador to the US
GBR Micklethwait, John Editor-in-Chief, The Economist
FRA Montbrial, Thierry de President, French Institute for International Relations
ITA Monti, Mario President, Universita Commerciale Luigi Bocconi
ESP Moratinos Cuyaubé, Miguel A. Minister of Foreign Affairs
USA Mundie, Craig J. Chief Research and Strategy Officer, Microsoft Corporation
CAN Munroe-Blum, Heather Principal and Vice Chancellor, McGill University
NOR Myklebust, Egil Former Chairman of the Board of Directors SAS, Norsk Hydro ASA
DEU Nass, Matthias Deputy Editor, Die Zeit
NLD Beatrix, H.M. the Queen of the Netherlands
ESP Nin Génova, Juan Maria President and CEO, La Caixa
FRA Olivennes, Denis CEO and Editor in Chief, Le Nouvel Observateur
FIN Ollila, Jorma Chairman, Royal Dutch Shell plc
GBR Osborne, George Shadow Chancellor of the Exchequer
FRA Oudéa, Frédéric CEO, Société Générale
ITA Padoa-Schioppa, Tommaso Former Minister of Finance; President of Notre Europe
GRC Papahelas, Alexis Journalist, Kathimerini
GRC Papalexopoulos, Dimitris Managing Director, Titan Cement Co. S.A.
GRC Papathanasiou, Yannis Minister of Economy and Finance
USA Perle, Richard N. Resident Fellow, American Enterprise Institute for Public
Policy Research
BEL Philippe, H.R.H. Prince
PRT Pinho, Manuel Minister of Economy and Innovation
INT Pisani-Ferry, Jean Director, Bruegel
CAN Prichard, J. Robert S. President and CEO, Metrolinx
ITA Prodi, Romano Chairman, Foundation for Worldwide Cooperation
FIN Rajalahti, Hanna Managing Editor, Talouselämä
CAN Reisman, Heather M. Chair and CEO, Indigo Books & Music Inc.
NOR Reiten, Eivind President and CEO, Norsk Hydro ASA
CHE Ringier, Michael Chairman, Ringier AG
USA Rockefeller, David Former Chairman, Chase Manhattan Bank
USA Rubin, Barnett R. Director of Studies and Senior Fellow, Center for
International Cooperation, New York University
TUR Sabanci Dinçer, Suzan Chairman, Akbank
CAN Samarasekera, Indira V. President and Vice-Chancellor, University of Alberta
AUT Scholten, Rudolf Member of the Board of Executive Directors, Oesterreichische
Kontrollbank AG
USA Sheeran, Josette Executive Director, UN World Food Programme
ITA Siniscalco, Domenico Vice Chairman, Morgan Stanley International
ESP Solbes, Pedro Vice-President of Spanish Government; Minister of Economy and
Finance
ESP Sophia, H.M. the Queen of Spain
USA Steinberg, James B. Deputy Secretary of State
INT Stigson, Bjorn President, World Business Council for Sustainable Development
GRC Stournaras, Yannis Research Director, Foundation for Economic and Industrial
Research (IOBE)
IRL Sutherland, Peter D. Chairman, BP plc and Chairman, Goldman Sachs International
INT Tanaka, Nobuo Executive Director, IEA
GBR Taylor, J. Martin Chairman, Syngenta International AG
USA Thiel, Peter A. President, Clarium Capital Management, LLC
DNK Thorning-Schmidt, Helle Leader ofThe Social Democratic Party
DNK Thune Andersen, Thomas Partner and CEO, Maersk Oil
AUT Treichl, Andreas Chairman and CEO, Erste Group Bank AG
INT Trichet, Jean-Claude President, European Central Bank
GRC Tsoukalis, Loukas President of the Hellenic Foundation for European and
Foreign Policy (ELlAMEP)
TUR Ugur, Agah CEO, Borusan Holding
FIN Vanhanen, Matti Prime Minister
CHE Vasella, Daniel L. Chairman and CEO, Novartis AG
NLD Veer, Jeroen van der Chief Executive, Royal Dutch Shell plc
USA Volcker, Paul A. Chairman, Economic Recovery Advisory Board
SWE Wallenberg, Jacob Chairman, Investor AB
SWE Wallenberg, Marcus Chairman, SEB
NLD Wellink, Nout President, De Nederlandsche Bank
NLD Wijers, Hans Chairman, AkzoNobel NV
GBR Wolf, Martin H. Associate Editor & Chief Economics Commentator, The Financial
Times
USA Wolfensohn, James D. Chairman, Wolfensohn & Company, LLC
USA Wolfowitz, Paul Visiting Scholar, American Enterprise Institute for Public
Policy Research
INT Zoellick, Robert B. President, The World Bank Group
GBR Bredow, Vendeline von Business Correspondent, The Economist (Rapporteur)
GBR McBride, Edward Business Editor, The Economist (Rapporteur)
• AUT Austria
• BEL Belgium
• CHE Switzerland
• CAN Canada
• DEU Germany
• DNK Denmark
• ESP Spain
• FRA France
• FIN Finland
• GBR Great Britain
• GRC Greece
• IRL Ireland
• INT International
• ITA Italy
• NOR Norway
• NLD Netherlands
• PRT Portugal
• SWE Sweden
• TUR Turkey
• USA United States of America
--
Please consider seriously the reason why these elite institutions are not
discussed in the mainstream press despite the immense financial and political
power they wield?

There are sick and evil occultists running the Western World. They are power
mad lunatics like something from a kid's cartoon with their fingers on the
nuclear button! Armageddon is closer than you thought. Only God can save our
souls from their clutches, at least that's my considered opinion - Tony

Wolfowitz & Perle be plottin a comeback, watch yo self ....plus the new site? http://www.bilderbergmeetings.org/index.html

*********

Can has Drupal 7? In Drupal news, well the Drupal community is slowly chugging through to Drupal 7, and there are a few things people can do to help - see Drupal core improvements | drupal.org for a roundup on that. It is currently on Drupal 7.0 Alpha 5 released as of May 23. There are 67 critical issues right now; when that hits zero it's release time.

*********

I know that LRAD! Russia Today has done a fine job covering the latest developments in crushing North American dissent - what nice LRAD footage from Chicago Indymedia (provided courtesy Glass Bead Collective :-D )

When facing the police state, badass military sunglasses from WileyX might do the job? It's impossible to puncture them with .22 ammo even!
Gizmodo on the photographer crackdown: Are Cameras the New Guns? Wowz: DHS Testing 360-Degree Video Camera

That's all for now - don't let the oilpocalypse get you down!

The biggest scandal in world history; WANTAGATE, Leo Wanta, the post-Soviet trillions and lots of tangled disinfo from shady operatives (or not)

Draft conspiracy post note - this rough draft story lacks links but I want to get it up anyways... Have fun everyone!

UPDATE: Hi to everyone from http://groups.yahoo.com/group/Leo_Wanta/ - keep it up :)

   

This guy, Leo Wanta / Lee Wanta / Ambassador Leo Wanta, could be the key to the biggest financial conspiracy of all time. Or maybe it's a huge thing of hot air.

It seems we can all agree Wanta was a buddy of Ronald Reagan, and a financial intelligence operative who performed some maneuvers which helped bring about the financial collapse of the Soviet Union. I think everyone agrees on this. Wanta was written about some years back in Claire Sterling's "Thieves' World: The Threat of the New Global Network of Organized Crime (1994)."

Wanta got incarcerated in Wisconsin on the premise of some bizarre tax thing for a while, and apparently he got sympathetic help from a UK finance/conspiracy journalist, Christopher Story (WorldReports.org), who loaned him some skrilla to post bail, which Wanta then welched on.

Things get murkier from here. The storyline is that Wanta somehow controls the 'winnings' of bringing down the Soviet Union thru currency operations. The idea is that Wanta is the trustee or custodian of trillions of dollars leftover from 'winning the Cold War'. This pile of cash, which really ought to go to the US Treasury methinks, has attracted the Usual Suspects into stealing and otherwise manipulating the money. The Clintons and the Bushes, and associated operatives, all want to make off with the money, or use it as collateral to get other financial instruments going.

Also, Wanta, as an Office of Naval Intelligence operative, was apparently friends with Michael Delmart Vreeland, an ONI operative who most infamously was arrested in Canada before 9/11 and tipped off his captors that Pentagon & World Trade Center attacks were on the way. [Let one happen, stop the rest..] Vreeland's bizarre story, which involved allegations that the Russians and Saddam Hussein were involved somehow, became the basis for a few chapters in Michael Ruppert's Crossing The Rubicon. (Vreeland seems very much like Richard Case Nagell, the "Man Who Knew Too Much" in the JFK assassination, and put himself under custody just prior to that shady staged event. The Vreeland stuff is a tangent right now tho :)

So we come to a strange idea of WANTAGATE that is not widely reported: the resolution of huge sums of money behind the scenes. Christopher Story claims, roughly, that a financial arrangement known as 'the settlements' would bring this huge amount of money back onto the balance sheets of the US Treasury, but sneeky dudes like Geithner, Bushes, Clintons, etc., want to try to keep the shadow money moving and use it to rebuild the great fraudulent derivatives scheme.

At this point, Story claims that somehow (how the media, even US underground media, doesn't catch onto this, I don't get at all) that the US Treasury is under a lien, the World Court and these INTERPOL forces are basically cleaning house, which was why INTERPOL got its privileges boosted from Obama's Executive Order in December.

A whole galaxy of confusing actors and disinfo agents are around this. It gets right around to some low profile characters going back to the Clinton years and Iran-Contra/BCCI. Story introduces the idea that 'DVD' is a secret Nazi black intelligence agency in Germany, the descendant of the CIA-sponsored Gehlen Organization after WWII. WIkipedia: "He also claims that former British Prime Minister Edward Heath was "recruited by the Nazis before the war" and was an agent of the "the secret Nazi strategic continuum since exposed as Deutsche Verteidigungs Dienst (DVD), Dachau."

Story says that Kissinger and HW Bush are part of the secret German agenda (as well as Wanta), and if we look back to more old-skewl Nazi links, the role of Skull and Bones as a Germanic order that illustrates how closely intertwined Eastern families are with the Nazis... Nazis of course just being a right-dialectic wing of the Illuminati agenda...

Story used to be cool with Wanta but is now against him. Story posted the texts of documents indicating that Thomas Heneghan acted as Wanta's financial agent.

Thomas Heneghan is a self proclaimed intelligence expert, who actually at one point jacked my Sibel Edmonds image off the site, blogs on Myspace in a fairly odd way. Heneghan seems to be allied with Tom Flocco and Stew Webb, who was something of a whistleblower on BCCI/Iran-Contra and other weird Clinton banking scam things. Pretty sure it was Webb who did the most awesome flowchart of Clinton/Bush mega-conspiracy. He also writes on FBI creeps (Tim White, Jeff Fisher seem uber creepy members of the mythical FBI Division Five). Somehow satellites become involved with votefraud... Heneghan is really a weird one, part of a certain knot in the fabric.

Eva Teleki. Story says she is part of the evil German operation. She is like some minion sent around by the Bush family to open accounts or something. Best name in the scheme.

CASPER: Casper (pseudonym) seems to be a sort of stock market huckster with intelligence connections. Story talks a ton of smack about Casper and Casper kind of is like 'you don't know whats up over here and also this particular odd loan was not a CIA ponzi scheme.' Casper is part of an ongoing mess posted at the oft-updated FourWinds website.

Sorcha Faal: While seeming to be a woman, Sorcha Faal seems to actually be a Catholic intelligence guy in Virginia. Faal seems to post something around provocative/subversive tone but this would seem to be CIA gatekeeping of the fringe. Or not. But Faal seems to have annoyed people widely.http://whatdoesitmean.com/.

Story wrote:
In this connection we need to reiterate that anonymous, unprovenanced reports by a fictitious source calling itself Sorcha Faal and purporting to be derived from the Kremlin, is actually a diversionary disinformation operation perpetrated by an Irishman, S. L. O’Huallachain and by Commander J. Forrest Sharpe, of Light in the Darkness Publications, Vienna, VA, located, as we recently pointed out, deep in US intelligence communitysville, according to our sources.

RumorMillNews.com - (Check this post) likes to post around sides of this issue but also seems to attract flowz of the big disinfo. Hard to say what the role is but has been around for a long time. Story is pissed with them (he doesn't seem to like conspiracy sites and thinks a lot of them are carrying 'diversionary claptrap.' Fair enough.) http://rumormillnews.com/

Mysterious Wanta items

Anything within about 2 hops of Leo Wanta turns into a lot of smudgy faxes and strange narrative chunks. These could be red herrings but they reflect the texture of what's going around - these faxes are one 'stillpoint' version. Story claimed stillpoint was a plan to crash America, but the other guys said it was nothing of the sort. And this appeared thru Heneghan...

http://d.yimg.com/kq/groups/9721343/1575128449/name/SecCode_STILLPOINT_Part

The Arctic Beacon: some people regarded as a first-generation CIA disinfo website, or used for limited hangouts, and there quite is a lot of Wanta stuff that's come thru there. This may be an unfair characterization of Greg Syzmanski who is involved with GCN Radio Network (Genesis Communications Network - The Alex Jones & other quirky stuff radio net). See http://www.google.com/search?q=arctic+beacon+leo+wanta for hits. Related Syzmanski describes his version of the Wanta story, which makes Bush2 out to be the bad guy: http://www.articlecity.com/articles/politics_and_government/article_420.shtml

Four Winds: big arguments about it all posted a lot here http://www.fourwinds10.com/

I thought this Wanta article was super funny, by Marilyn Barnewall, http://newswithviews.com/Barnewall/marilyn125.htm

GodlikeProductions is a chill forum, they hashed over Sorcha Faal vs Story http://www.godlikeproductions.com/forum1/message728540/pg1

By far the best discussion thread (at least the longest) about what in the hell this adds up to was @ The Unhived Mind, which appears to be mainly about anti-DeepCatholicism (i.e. Templars, the weird Legatius group, Vatican ops, etc) . http://z10.invisionfree.com/The_Unhived_Mind_II/index.php?showtopic=2134...

that's one heckuva thread.

Anyway this is only a rough roundup of some major factors, but should lead the way to where the discussions and axes of new exposures and arguments might be around Leo Wanta, the multi trillion dollar incarcerated German/Reagan financial operative, who ended up with the money that "won" the Cold War. Before he got thrown in jail in Wisconsin. :-/

Controlling 9/11 "crippled epistemology" via fake 'CIA' Internet Conspiracy Theories, COINTELPRO & "cognitive infiltration of extremist groups": Huge jackass/Obama Info Czar Cass Sunstein favors infiltrating conspiracy groups, planting disinfo, diversions

140110top2.jpg"....we will suggest below that if the hard core arises for certain identifiable reasons, it can be broken up or at least muted by government action." .... "We suggest a role for government efforts, and agents, in introducing such diversity.  Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action."

SSRN-Conspiracy Theories by Cass Sunstein, Adrian Vermeule

This is one hell of a chestnut. It seems obvious, in retrospect, the best way to conceal the truth of establishment shady business and institutionalized crime is to mix in a ton of bullshit in order to turn all the skeptics and inquirers against each other. Only now it's Obama's dang 'information czar' pitching the strategy!

Interestingly, the more I broaden my sources, the more I appreciate the broad spectrum of people that have cancelled their subscriptions to Establishment Bollox and the Lies of the Mighty Wurlitzer. It's amazing how so many features of Establishment Reality are so widely loathed from within so many different worldviews.

This important fact is what people like Cass Sunstein don't understand. Like faux Establishment 'Centrists', they believe that ontological truth, or even the 'optimal' policy outcome, is like @ the 50% mark between where the dialectical left & right goalposts are placed.

It's like Howard Fineman - accurately dubbed the Weathervane because you only have to look which way he's pointing to determine what reassuring centrist reality is today's hot item. Howard Fineman is the precise opposite of a 'conspiracy theorist' in Sunstein's world.

The Establishment's Hegelian social control techniques are obvious: just set the left and right goalposts, stir and repeat. Problem-reaction-solution. If one can influence both the left and right goalposts in the great false dichotomy, it makes the product of "centrists" far more acceptable. Everything floating around outside this parlor game is the prima materia of 'conspiracy' that the State should attack professionally, Sunstein says!

Sunstein's tidy worldview brushes over the complex role of deceptive bullshit operatives around there, laying the groundwork for stupid establishment narratives. For example, what are we to make of the ever-shady Gerald Posner, spoonfed the FBI goodies on China? Or Adam Ciralski, helping Blackwater's Erik Prince perpetrate some classic exposure-threatening graymail about U.S. covert ops. Are these merely products of rotten epistomology? [PD Scott with a solid takedown of Posner - Scott's the real deal with The War Conspiracy and more here.]

*****

Anyhow Cass Sunstein was appointed by President Obama as some kind of info czar. Interestingly he wrote a paper about how to manipulate conspiracy theorists by attempting to throw their groups off the Hegelian deep end, thus opening an opportunity for defamatory information warfare. Fascinating stuff, and it's got Alex Jones incensed!!

More links, then some snippets: Obama Information Czar Calls For Banning Free Speech, Sunstein’s Paper Provides More Evidence COLINTELPRO Still Operational, etc.

This whole thing reminds me of how the JFK conspiracy scene is managed as "A Story/B Story" wherein there are two alternate, mutually irreconcilable narratives. Dribs and drabs of facts supporting A and B (roughly, CIA/Mafia and Lone Gunman, usually) can be offered and safely paddle around on the History Channel.

Let us share a few choice links about how the CIA type control system AKA the Intelligence Power controls the World of Conspiracy. This is good stuff -- this is exactly how Mama Cass wants the world of conspiracies organized.

For The Win: Fintan Dunne called the Sunstein approach years ago!

My favorite all-in-one shotgun approach comes from Fintan Dunne of BreakForNews.com: BreakForNews.com : The CIA's Internet Fakes


The CIA Fakes is a catchphrase term to describe a group which includes:

-- Covert Operatives of the CIA, NSA and DIA; of the U.S. Corporate/Military Industrial Complex; of the intelligence services of U.K. Spain, France Holland, Germany, and Russia.
-- Political Agents working within the Democratic Party, Republican Party, Democratic Black Caucus, Green Party, and Patriot Movement.
--
Politicians in the U.S., U.K. Spain, France, Germany and Russia --who pose as 9/11 skeptics.
-- Media, including
Mainstream, Alternative Media and Internet broadcasting media who either front for, cooperate with, or are directly employed by intelligence services mentioned above.

The primary objectives of the CIA FAKES are:

-- To leverage the Fakes into position as the leadership/spokespersons
    for the 9/11 skeptics movement.
-- To splinter and divide that movement.
-- To promote lame, tame and/or booby-trapped questions about 9/11.
-- To be sufficiently over-the-top as to prevent the 9/11 issue getting
    any traction in the media or left-wing.
-- To ensure that the movement would not have a politically-active
    leadership capable of turning it into an effective political lobby campaign.

The questions about 9/11 were bound to be asked, the important
aspect for the perpetrators was and is ...by whom?

Bravo, Mr. Dunne, Bravo. You scored big on this one... A general roundup to be found @ The Next Level :: View topic - Uncovered: The Rat's Nest of 9/11 of effective gatekeepers -- and its true that his set of people, in aggregate, has the 9/11 conspiracy topic cornered and setup a certain way.
More along these lines: 9/11, 7/7 & the War on Freedom :: View topic - The Planned Demolition of Alex Jones, The COUP had foreknowledge of 9-11 (YES!), the criticism about Sibel Edmonds, Scheuer, Ray McGovern, etc: WagNews: Our Good Friends in the CIA - NOT !, (i.e "The alternative media is ridden with ex-FBI, ex-CIA, ex-NSA, ex-MI5 people who are on "our side". It's all total BS.") WagNews: Alex Jones, Hopsicker & the 9/11 CIA Fakes -Audio.

This one is suddenly salient: WagNews: Ellsberg, Sibel Edmonds & The Secret Team:

WHAT FLAVOR CONSPIRACY YOU WANT?

One big corner of that overall 9/11 picture is formed by four disparate-seeming individuals: a veteran whistleblower, an attractive novice whistleblower, a campaigning journalist and a reputed lingerie model; jigsaw peices called Ellsberg, Edmonds, Hopsicker and Keller. Ellsberg supports Edmonds, confirmed by Hopsicker --backed by eyewitness accounts from Keller. But they're all telling different flavors of the same story.

To specify which story that is, let's take a look at the popular tales of 9/11. The notorious main division is between LIHOP and MIHOP. But it's much more detailed than that. Explanations come in a full range of flavors --starting with the official story:

A. Official story:
CIA/FBI were incompetent; Bush and/or Clinton were complacent.
B. Official Lame Conspiracy:
CIA/FBI were incompetent; Bush/Cheney maybe let it happen; Israelis Knew.
C. Official LIHOP Conspiracy:
CIA/FBI were compromised; Bush/Cheney did let it happen; Israelis Helped.
D. Official LIHOP Wild Conspiracy:
CIA/FBI compromised; Bush/Cheney/Neocons let it happen; Israelis Did It.
E. Official LIHOP Tinfoil Conspiracy:
Israelis/Neocons/Bush/Cheney Did It; CIA/FBI looked the other way.
F. Official MIHOP 'Serious' Conspiracy:
Israelis/Neocons/CIA/FBI/Bush/Cheney/Military-Industrial-Complex Did It.
G. Official Loony Conspiracies:
Rothschilds and/or Rockefellers and/or CFR and/or Bildebergers did it.
Globalists who want to run everything in a World Government did it.
Jews and Jewish bankers -who already run everything- did it.
Satanists, Opus Dei or Reptilians did it.
It's a terrific variety of theories.
It plays out something like this:
  • The mainstream media push version A; hint at B; sneer at G.
  • The controlled right/intellectual media pushes version B.
  • The controlled left/intellectual media pushes version C.
  • The 'moderate' Fake internet sites push versions C and D.
  • The 'softcore' Fake internet sites push versions D and E.
  • The 'independent' Fake internet sites push version F.
  • The 'loony' Fake interent sites push variations of version G.
But every single one, from A to G are OFFICIAL versions, sanctioned and promoted by the 9/11 intelligence coverup operation and their CIA Fakes network. They have a flavor for every market.

The creation of this multiplicity of explanations is a core element of the coverup. Left to their own devices, people on the Internet might have figured out the truth themselves. But with this circus in action, there is always plenty of distraction and lots of division in opinion.

The intelligence coverup is not trying to stop 9/11 conspiracy theories on the internet. It's creating them. Then playing off supporters of the different theories against each other. That's a classic Cointelpro-style tactic.

***********More from good Ol L Fletcher Prouty on CIA / Ellsberg limited hangout type conspiracy control!
Let's get to the brand-new material from the White House info czar, it's wild!!...... Conspiracy Theories by Cass Sunstein & Adrian Vermeule:

Our main though far from exclusive focus – our running example – involves

conspiracy theories relating to terrorism, especially theories that arise from and post-date

the 9/11 attacks. These theories exist within the United States and, even more virulently,

in foreign countries, especially Muslim countries. The existence of both domestic and

foreign conspiracy theories, we suggest, is no trivial matter, posing real risks to the

government’s antiterrorism policies, whatever the latter may be. Terrorism-related

theories are thus a crucial testing ground for the significance, causes, and policy

implications of widespread conspiracy theorizing. As we shall see, an understanding of

conspiracy theories has broad implications for the spread of information and beliefs;

many erroneous judgments are a product of the same forces that produce conspiracy

theories, and if we are able to see how to counteract such theories, we will have some

clues about how to correct widespread errors more generally.

Part I explores some definitional issues and lays out some of the mechanisms that

produce conspiracy theories and theorists. We begin by discussing different

understandings of the nature of conspiracy theories and different accounts of the kinds of

errors made by those who hold them. Our primary claim is that conspiracy theories

typically stem not from irrationality or mental illness of any kind but from a “crippled

epistemology,” in the form of a sharply limited number of (relevant) informational

sources. Those who hold conspiracy theories do so because of what they read and hear. In

that sense, acceptance of such theories is not irrational from the standpoint of those who

adhere to them. There is a close connection, we suggest, between our claim on this count

and the empirical association between terrorist behavior and an absence of civil rights

and civil liberties.10 When civil rights and civil liberties are absent, people lack multiple

information sources, and they are more likely to accept conspiracy theories.

Part II discusses government responses and legal issues, in light of the discussion

in Part I. We address several dilemmas of governmental response to conspiracy theories,

such as the question whether it is better to rebut such theories, at the risk of legitimating

them, or to ignore them, at the risk of leaving them unrebutted. Conspiracy theories turn

out to be especially hard to undermine or dislodge; they have a self-sealing quality,

rendering them particularly immune to challenge. We suggest several policy responses

that can dampen the supply of conspiracy theorizing, in part by introducing diverse

viewpoints and new factual assumptions into the hard-core groups that produce such

theories. Our principal claim here involves the potential value of cognitive infiltration of

extremist groups, designed to introduce informational diversity into such groups and to

expose indefensible conspiracy theories as such.

Tell me this, Sunstein: how does all that drug money get through the Federal Reserve System? Everyone has been so eager to confront that 'conspiracy theory,' haven't they?

Blah blah blah... let's get to the good stuff: [Below the fold - favorite chunks of much of the crazy essay]

The late great Robert Nichols, a $250 billion Treasury Note, the Octopus Wiki (all your Iran-Contra/PROMIS style tiebacks) and Main Core, to boot

In a popular culture that has gotten more sympathetic to conspiracies, things that nagged at us out on the shady Internets have been shot into the mainstream in a weird way lately - it seems people like Glenn Beck and Michele Bachmann are "gatekeeping" around very weird stories -- they inject a bunch of crazy spin to some very strange, but real, facts, leaving a messy ideological wreckage behind, leaving existing small Internet communities of thoughtful observers dazed and confused...

(the leading recent example here would be how Alex Jones tried to raise alarm about the "FEMA Camp" federal paperwork and policies out there, and Bachmann and Beck parachuted in and made it all seem crazy, which caused the documentation-driven alarm from Jones to get totally overrun with nonsense. Not that Jones' analytic framework is necessarily good all the time - but in this case it was substantive).

But no one like Beck or Bachmann will stir up the loose change left behind by Danny Casolaro or the Octopus. You can bet on it.

*****

One of the great figures in the whole Iran-Contra/BCCI/Savings&Loan scandal complex mix was Danny Casolaro, a journalist who got into what he called the Octopus. Casolaro was abruptly murdered by someone like Oliver North's henchmen, or something roughly along those lines.

A new Octopus tentacle, which happens to match pretty well with an old one, washed up dead in Switzerland. Robert Nichols' name goes right back through everything, and it matches nicely the latest turn -- sadly, he turned up dead in February. From there, it gets into the Original Big Murky Ink Cloud.

One angle to this whole thing is that corrupt and powerful people can sometimes obtain really awesome letters of credit from government entities, and stash them away. The notes can then be used to build new financial instruments and complex frauds - Al Martin's book The Conspirators (almartinraw.com) had a bunch of stuff about the Bush family doing this in the 1980s.

So it made a very certain sense to me when I caught this story - off a site that seems to be run by Casolaro's daughter (or someone else whose parent was murdered in the broader Iran Contra/Octopus mix). Haters of the Federal Reserve, check it out!

$250 Billion Treasury Note Cloaked in Mystery – Evades Public Scrutiny | Desertfae

It all started with a Bloomberg News article entitled “Bayou’s Israel Cheated in Scam,” published on July 15, 2008 by court reporters David Glovin and Bob Van Voris.http://www.bloomberg.com/apps/news?pid=20601127&sid=aLCwdJsx0V3M&refer=law

The article talked about Samuel Israel of Bayou Management Group LLC being cheated by Robert Booth Nichols, “who in a 1993 lawsuit claimed to have worked for the U.S. Central Intelligence Agency for 20 years. Nichols was also the target of a 1987 probe by the Federal Bureau of Investigation of organized crime in the entertainment industry,” wrote Bloomberg.

An excerpt of the article read as follows: “As Samuel Israel grew desperate to raise money in 2004 to save his Bayou Group LLC hedge fund firm, he turned for help to a Hawaii man who promised a windfall and then conned him out of $10 million, said a U.K. investigator.

“Robert Booth Nichols cheated Israel, later convicted in his own $400 million theft, in a ‘prime bank’ fraud, a scheme used by con-artists promising quick riches in secret markets, the U.K. investigator said in a document filed in June in federal court in New York. U.S. prosecutors seeking to recover funds for Bayou investors won a British judge’s ruling in November freezing $1 million Nichols held there, and they may be pursuing millions more in Singapore, Nichols’s lawyer said.

Robert Booth Nichols, 65, denied wrongdoing and sought to retain the $1 million in London. He said in court papers that he helped Israel invest in a legitimate, though unspecified “project” involving U.S. government obligations. Nichols said he had no reason to believe Israel was engaged in fraud.

“He was asked to find something, and he found it,” Nichols’s lawyer, Joseph Bainton, told Bloomberg, declining to elaborate. “There are very few people capable of performing this service, for which he was paid a lump sum of $10 million.

Nichols said in court papers that he believed the investment was on behalf of Israel personally, that Nichols was told his services involved matters of national interest,” and that a first cousin of President G. W. Bush, John P. Ellis, vouched for the legitimacy of the transaction. Nichols said the deal required him to contact representatives of foreign governments that he knew, according to court documents.

Nichols’ lawyer told Bloomberg that Mr. Ellis attended some meetings and gave Mr. Nichols some assurance with respect to the approval of the United States. Ellis worked at GH Venture Partners in 2004, according to Nichols’ court documents.

The criminal case is U.S. v. Israel, 05cr1039, U.S. District Court, Southern District of New York (Manhattan).

The bankruptcy case is In re Bayou Group LLC, 06-22306, U.S. Bankruptcy Court, Southern District New York (White Plains).

The missing link in the above story is the $250 Billion Treasury Note secured by 2,500 metric tons of gold at the Atlanta Federal Reserve, Serial Number SC 3040-20. Robert Booth Nichols’ lawyer described this to Bloomberg as an unspecified “project” involving U.S. government obligations. However, the reporters had no knowledge at the time they wrote the story that the “project” for which Nichols was paid $10 million allegedly involved Nichols locating and obtaining the Treasury Note for Samuel Israel and depositing it at the London Safe Deposit Box Company Ltd. http://londonsafedeposit.co.uk/

Yumz. Now we are getting somewhere. Christopher Story (Worldreports.org) also talked a lot about this certain raid against the London safe deposit boxes - the idea is that several months ago the London Metropolitan Police raided a huge bunch of safe deposit boxes, and these boxes contained all sorts of weird items, blackmail, leverage, the shadow wealth of a bunch of players who believed themselves untouchable.

But London Metro managed to take their stuff, and thereby actually, roughly speaking, damaged a huge chunk of the shady "intelligence power" as Mr Story likes to call it.

So that is one side... i will leave it there for now. Wayne Madsen had stuff on it too.

Anyway the Desert Fae blog has a lot of backstories like for example the Frank Sinatra mob stuff - Dr Nichols is showing up at the Cabazon Indian Reservation in the 1980s (Cabazon was where, according to the great Iran Contra Octopus tapestry, they were hacking PROMIS backdoors, something about weird weapons and the Contras, it was quite a classic set of data points that you find, when you go looking....)

Meanwhile running attached is The Octopus Wiki! Not too shabby!! It sort of suggests that major drug cartels and the Italian mob are subsets or sub-pathways of the Octopus. From the Wiki front page, just a few of the angles you need to nibble at:

The Inslaw Affair

Danny Casolaro, Michael Riconosciuto, Robert Booth Nichols, and others were mentioned rather prominently in the final House of Representatives Report #102-857 released to the public on September 10, 1992. The Investigative Report, put together by the Committee on the Judiciary headed by Senator Jack Brooks of Texas, entitled “The Inslaw Affair,” summarized a three year investigation into the theft of the PROMIS software from Bill and Nancy Hamilton, owners of Inslaw Corporation in Washington D.C. (The investigators who handled the three-year probe were listed on the Report as James E. Lewin, Chief Investigator, and John D. Cohen, Investigator.)

As a result of media exposure, Inslaw’s owners, Bill and Nancy Hamilton, had received information which subsequently led them to believe that the Department’s actions were part of a high level conspiracy within Justice to steal the “enhanced” version of PROMIS.

Inslaw alleged that former Attorney General Edwin Meese and Deputy Attorney General Lowell Jensen forced Inslaw into bankruptcy by intentionally creating a sham contract dispute over the terms and conditions of the contract which led to the withholding of payments due Inslaw by the Department.

Two federal court judges and the House Judiciary Committee ultimately concluded that “the United States Department of Justice‎ acted willfully and fraudently” and “took, converted and stole” Inslaw’s enhanced PROMIS software by “trickery, fraud and deceit.”

EXCERPTED from High Times Magazine, August 2001 issue, Vol. No. 313 – Title of article: "The Ghost ofDanny Casolaro.” [3]

“ --- Danny Casolaro's tragic death essentially opened a Pandora's Box which the DOJ was never able to close. During the last week of his life, Danny had discovered a connection between Mike Abbell, a former director of international affairs for the Justice Department, the Cali Drug Cartel, and Robert Booth Nichols, an international intelligence operative whom he had been interviewing extensively for months. Danny's last phone bills indicated he'd spent hundreds of hours on the phone with Nichols, most of the calls averaged one to two hours. This in effect, was one tentacle of the Octopus.

“Danny had confronted Nichols about Mike Abbell and the Cali Cartel while staying in Martinsburg. It was the last conversation Danny ever had with Nichols, and with Bob Bickel, a friend whom Danny confided in. Bickel subsequently confirmed the conversation, but for reasons unknown, the Abbell - Cali Cartel connection was never published in any of the official investigative reports on Danny's death. These included the DOJ report of September 27, 1994.

“In fact, a note handwritten by Danny four days before his death, found by relatives, read as follows: ‘Bill Hamilton - August 6. MR … also brought up 'Gilberto.’ Unknown to anyone outside the DOJ at that time, a [secret]FBI investigation of Mike Abbell was underway at the time of Danny's death. Years later, an indictment unsealed in Miami on June 6, 1995 charged Abbell with laundering money for the Cali Cartel. Surveillance reports indicated he'd made frequent visits to the home of Gilberto Rodriguez, leader of the Cali Cartel in Bogota, Columbia.

Top notch.

PROMIS was originally Prosecutor's Management Information System - early in the era, it seems to have been a kind of nice IT case management system that would let the suits tie into various government databases. According to reams of odd stuff out there (yet never definitively presented to the American public) it got stolen from INSLAW and mutated by the CIA and other assorted lunatics. (American intelligence sold a backdoor'd PROMIS to the RCMP and the Mounties were fucking pissed when they found out - I want Dan Aykroyd to play the Mountie boss in the film.)

From there PROMIS sort of seems to morph into a magic skeleton key into all types of data mining - by extending its ability to probe around into all government databases.

It seems too much the handy conspiracy program: It sort of plays like a MacGuffin or other placeholder "program that all the players have, to dominate reality in bizarre and invisible ways." There's no other program out there in the Internet conspiracy world I know of that compares to PROMIS. But I don't get what that means!

The idea from Chris Ketcham is that PROMIS became extended into MAIN CORE, the master NSA program that was spun out of DARPA's Total Information Awareness effort. Check this out - it does have the areas about "Continuity of Government" -- which is often an odd kind of logistical code or cipher for hardcore martial law, it seems, especially in the REX84 era (also Operation Sledgehammer, and Ollie North's Civilian Labor Inmate Facility [CLIF] proposal) --- myahhh I'm getting caught up in keywords now.

Check the Ketcham article for how MAIN CORE grew from PROMIS:   The Last Roundup : Information Clearing House - ICH

More goods:

http://en.wikipedia.org/wiki/Main_Core
http://www.informationclearinghouse.info/article19871.htm
http://digitizedrevolution.wordpress.com/2008/05/23/christopher-ketcham-the-last-roundup-2/
(great google ads at the end of this one ^ )
http://harpers.org/archive/2008/05/hbc-90002972
http://cryptogon.com/?p=2590

Excerpt of Wayne Madsen: http://www.waynemadsenreport.com/articles/20090508

May 8-10, 2009 -- Was Clan Bush involved in looting of other Federal Reserve Banks?

There is additional information to report on the Treasury Note that is secured by $250 billion in gold (2500 metric tons) at the Federal Reserve Bank of Atlanta. After the sudden resignation of New York Federal Reserve Bank Chairman Stephen Friedman, a one-time top economic adviser to President George W. Bush and someone who apparently profited from the government's bailout of Goldman Sachs while he served as both Chairman of the New York Fed and as a board member for Goldman Sachs, the entire Federal Reserve Bank system appears to be involved in a massive ploy to loot the United States of its gold and cash reserves.

On May 5, 2009, WMR reported: "According to WMR's sources, the FBI and London police are working together on a case that involved a $250 billion U.S. Treasury Note seized by the FBI from a London safety deposit box company, London Safe Deposit Company, Ltd. The box was reportedly placed at the London firm by self-described 20-year CIA veteran Robert Booth Nichols, who reportedly died in Geneva, Switzerland on February 14, 2009.

A heart attack was believed to have been the cause of death but there was a blow to Nichols's head. A 'friend' of Nichols, a New York stockbroker who was reportedly helping Booth move a large sum of cash, bonds and gold in Geneva, arranged for a quick cremation of Nichols's body and the U.S. embassy in Bern was notified. ........

Well, consider yourself educated at least in a few classic slices of Octopus lore, and how, in theory, they fit into the modern NSA panopticon. That's the damn thing about these freakkin conspiracies:

the same people pop up over and over and over. It's really fuckin' annoying.

Syndicate content