Disclaimer: This site is *not* affiliated with AIPAC, Ahmed Chalabi, K Street, ClearChannel, or Urban Moving Systems of Weehawken, NJ. In case you were curious. Full disclosure: I have a "long Apple position" and therefore I have an Apple bias.
If secret federal aviation is the Big Lebowski, Bristow is the rug that really ties the room together.
It's been thrilling to watch one of my favorite topics, aviation in covert operations, hit the bigtime over the last few news cycles.A few tweets about suspicious plane hovering over Baltimore 'disturbances' registered to a ghostly "NG Research" at a Bristow, Virginia PO Box cued the story. The FBI conceding to Washington Post that it was their flight set the stage for this. These stories have quietly been leaching out for years. As far back as 2003 (or 2006 in WIRED) references to small aircraft doing domestic surveillance have been popping up. After the Boston Marathon bombing, a small aircraft was traced to the same Bristow VA cluster. Today the story hit turbo with a big AP story, FBI behind mysterious surveillance aircraft over US cities, but there are lots more to find because the AP didn't really go outside of Bristow. You'll find plenty of N Numbers to snoop on below - and cool new tracking techniques too!! Quote of the year?
The FBI asked the AP not to disclose the names of the fake companies it uncovered, saying that would saddle taxpayers with the expense of creating new cover companies to shield the government's involvement, and could endanger the planes and integrity of the surveillance missions. The AP declined the FBI's request because the companies' names — as well as common addresses linked to the Justice Department — are listed on public documents and in government databases.
In my own scoping in the last week or so it appears that these shell company registration were mostly set up around 2010 or 2011, making this an Obama operation through and through. I apologize for not tipping yall more quickly to this impending development but I have been too busy!
This story shows that secret airlines are becoming an obsolete method for the [deep] state, because with the Internet and planespotters it becomes possible to observe and end-run around the secrecy of the networks, as the last big wave of awareness around secret detainee flights in the Bush years really revealed (though mostly in Eurasia, not North America). (2007 Cryptome Story and Category:Alleged CIA pilots - SourceWatch)
.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.
Years ago I asked a staff research person at the Minnesota Department of Transportation if there was something weird about how FAA registration works, if it is designed to hide ownership, and he assured me it had been that way since the FAA had been set up - and went on to tell me that when he was much younger, in the late 1980s he had traced a disappeared pilot to Texas, then found that someone had pulled the flight plans from the FAA file. This shadowy story was literally the first thing I heard from a government employee when I went asking, confirming my long-running theory that everyone has some kind of story that touches on the corrupt secret government or deep state.
Naturally the FBI/DOJ also has its own similar shells. Due to incredible laziness the feds registered tons of them with the same name pattern at the same locale in Bristow VA. Here, have some original art I made on May 25, well before the Star Tribune and Associated Press picked up this story!
Several independent parties put these pieces together and triggered the massive news snowball today. Probably the first to catch a large section of it was john wiseman (@lemonodor), who figured out good methods for tracing the transmitters and radio traffic. My friend Sam Richards (@MinneapoliSam) was the first as far as I know to put together the larger data set about the Bristow VA node, after getting a tip about a sketchy spy flight over Minneapolis, although Wiseman verifiably came up with a whole bunch of the shells in early May. Wiseman explains his narrative in new post: Tracking FBI aerial surveillance (with images, tweets) · jjwiseman · Storify
Below is a listing of 100 aircraft registered to shell companies that do not exist. The US Department of Justice can claim plausible deniability for owning and operating these aircraft however that is a flimsy defense. At the time of posting, a number of these aircraft may be airborne over American cities, equipped with surveillance, stingray, or other hardware. FOIAs are being drafted and will be submitted so it is only a matter of time before a brighter light is shined upon these secretive operations.
For examples of the flight patterns conducted by many of these aircraft within the last few days, check:
Here's an article by the ACLU highlighting why these operations are of concern https://www.aclu.org/blog/ohio-aerial-surveillance-system-moving-forward... "ARGUS, the high-flying drone technology capable of capturing super-high-definition video of a 15-square mile area and automatically tracking all moving vehicles and people within that area. I pointed out that this makes possible our nightmare scenario for drones: wide-area mass surveillance and location tracking of entire cities and towns."
Now the FBI is an onerous position where they have to turn over, de-register or re-register all of these planes, somehow reconciling rebuilding the secrecy of the fleet exposed above with the FAA's registration system, and the hordes of planespotters out there now reinforced by tons of interested activists cued into the national scope of this operation. Good luck Feds!
SOURCE: View image: image5. This plane has been flagged as using the JENA code which seems to be the usual code until probably around now. Images scaled down, resize to see more. N959JT is of course registered in Bristow VA. Bonus points awarded for pink toenails in spotting this secret aircraft machinery which seems to resemble the gear spotted on the recent Minneapolis plane.
I live in Phoenix and my coworker was telling me she's been noticing this plane circling around their neighborhood the past 12 days. They started tracking the planes on Flightradar24 and she sent me these screenshots of some of their flight paths: http://postimg.org/image/tpdhpd789/http://postimg.org/image/o2h4rw4pl/http://postimg.org/image/uuc58hj2x/ She even had a pilot friend go down to the airport that they've been flying out of and do some snooping. He found took this photo of the camera equipment mounted to the bottom of the plane: http://postimg.org/image/hm861sw61/ She said that it's always the same 3 tail fin numbers which take turns doing the same flight path. They start at daybreak and only stop late in the night.
Update: Here's another pic my coworker got of one of the planes parked at the Deer Valley Airport in Phoenix. You can see the camera equipment on the side: http://postimg.org/image/oj5bwlcjn/
She also said over the past couple days all the tail fin numbers changed on Flightradar24 and they are now all showing up as some variation of "JENA". Screenshot: http://postimg.org/image/n3ahqjgql/
Finally it is worth noting it has been difficult but not impossible to get credit to independent journalists for blowing up this story. I appreciate Bob Collins at Minnesota Public Radio's Newscut for engaging on Twitter when we pressed him on the issue of crediting the story, and including references to Sam's original medium.com story, while the Star Tribune and AP did not credit Sam at all. (Although the Strib has been communicative recently and I have some hope they will circle back within a few days).
Additionally I suspect "CHAPPARRAL AIR GROUP" may be another front, they got a craft from the DEA: N540DB. seeHelicopter Flying Above Claycord on Thursday Afternoon —claycord CLAYCORD.com: "A google search of the tail ID can help you confirm this also, where you will find no shortage of photographs of this specific aircraft operating out of Concord and San Jose. Note that the federal government recently (2011) transferred registration of 15 Federal law enforcement helicopters out of the names of the Department of Justice, DEA, to an entity in Texas called the Chaparral Air Group."
Before the story broke we had a bunch of diggings, now it's time to share! MORE RELATED RAW DATA:
NOTE there are some false positives and general "NOISE" in here, please proceed with discernment!!!
In broader context, the Obama administration has continuted to expand the use of intelligence tracking, including fusion centers and electronic intelligence, to keep rebellious groups under control, as addressed here
On April 29, a Cessna 206H registered to National Aircraft Leasing Corporation circled overhead for hours at about 3,500 feet, flying repetitively over western Baltimore. On the nights of April 30, May 1 and May 2, another aircraft, a Cessna Model 182T registered to a company named NG Research in Bristow, Virginia, flew over the same areas at a similar low altitude.
Also on May 1 and May 2, an unidentified Cessna Citation V jet made similar nighttime flights, orbiting Baltimore at the relatively low altitudes (for a jet aircraft) of 6,400 and 9,400 feet, based on records from Flightradar24.
Kind of vague hit comes up for the google search on National Aircraft Leasing Corporation
Edit 3: After looking through the list of aircraft registered in Bristow, VA for a town of 15,000 there are 64 aircraft registered including one owned by the Department of Justice. All within the past decade most within the past 3 years. Most of them are owned by companies with 3 letters then what they do RKT Productions, PSL Surveying, KQM Aviation, LCB Leasing, NBY productions etc. They also all are operation 182t Cessna’s. All of the companies only have a PO Box in Bristow. Looks like an FBI airport.
The one tail number that the initial Washington Post article linked to is N39MY, which is a Cessna 182T registered to NG Research, PO Box 722 in Bristow, VA. That company's web presence is close to zero, basically below the noise floor.
If you google [po box bristow va] you find FAA records for a bunch of other oddly named companies that all have similarly close-to-zero web presence and addresses that are PO Boxes in Bristow: FVX Research, NBR Aviation, NBY Productions, OBR Leasing, OTV Leasing, PSL Surveys, PXW Services. They all seem to like Cessna 182Ts.
If you Google the tail numbers of aircraft registered to those companies, you start to find forum and mailing list posts (often at sites that tilt toward paranoid/conspiracy/right wing, but not always) with people discussing these specific tail numbers and linking them to the FBI. Some of the supposed evidence includes details of radio communications that people have heard, e.g. talking about "being on station" or using callsigns that start with JENNA, JENA or ROSS, which are supposedly used by the FBI. Other posts claim that DOJ/FBI surveillance aircraft often squawk 4414 or 4415 on their transponders.
I monitor aircraft in Los Angeles using an RTL-SDR dongle. I keep a database of almost every transponder ping I receive. You can see some more info, analysis and examples of stuff I've seen (U-2, AF1, AF2, EXEC-1F, E-6 "Doomsday" planes) at
I decided to check my database for planes that have squawked 4414/4415 or used one of the suspicious callsigns: I found 8 aircraft in the past 2 months, several of which exhibit suspicious behavior: Flying for hours at a time without going anywhere in particular (I don't have position information for them, but I know they're in the air and not leaving the LA area), flying almost every day for months at a time, squawking 4414 or 4415, and one that used a JENNA callsign. 2 of them are registered to companies with PO Boxes in Bristow, VA. Another is registered to AEROGRAPHICS INC. 10678 AVIATION LN, MANASSAS VIRGINIA, which googling shows has also been linked to the FBI/DOJ. Several others are registered to WORLDWIDE AIRCRAFT LEASING CORP and NATIONAL AIRCRAFT LEASING CORP in Delaware, similar to other suspected FBI front companies (e.g. Northwest Aircraft Leasing Corp. in Newark, Delaware).
(I call what I'm doing "persistent sousveillance": using historical sensor data to retroactively identify and track new subjects, it's just that my subjects are the government. One of the surprising things I've found is that all you need to do is look: the weird stuff jumps out right away, e.g. Cessnas registered to fake-sounding companies that loiter overhead for hours every day.)
It's a lot of circumstantial evidence, but at this point it doesn't seem far-fetched that I'm monitoring aircraft involved in persistent FBI aerial surveillance.
Edit: One other thing worth mentioning is that I was surprised at how many local news stories I turned up while googling these planes & companies that fit the template of "Citizens complain about mystery Cessna flying low, circling over their neighborhood".)
The FAA manages this program and NBAA no longer has any policy or administrative control over the FAA ASDI Block program. However, if you have general questions or concerns about the FAA process, contact NBAA's Operations Service Group email@example.com (202) 783-9250.
The FAA’s primary electronic mailbox for all aircraft blocking and unblocking requests and for related inquiries directed to the ASDI blocking program isASDIBlock@faa.gov.
102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JUNCTION, VA 24529-3110461AJ 18282225 RKT PR
ODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA 20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS PO BOX 502BRISTOW,VA 20136-0502912EX 18282231
OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632
N-Number Serial Number Name Address102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JU
NCTION, VA 24529-3110461AJ 18282225 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS
similarly there are some hits here. for entire listing in LOUDOUN county
PO BOX 502BRISTOW, VA 20136-0502912EX 18282231 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-063
Possible tech or similar
PERSISTENT REAL-TIME INTELLIGENCE OVER A WIDE AREA -- DAY & NIGHT
A little over 51 years ago Albert Thomas, chair of congressional subcommittee for defense appropriations, winked at Lyndon Baines Johnson aboard Air Force One immediately after Pres. Kennedy was murdered in Dallas. [Thomas' underling Jack Valenti went on to run MPAA for many years.] Thomas went on to hand out billions for the Vietnam War.
51 years later the American public is still as infantilized by the national security state as ever. Tons of documents around the assassination are still classified for decades, setting the pattern for managing perceptions of 'deep state events' clearly intersecting with intelligence players like Iran-Contra & 9/11.
The surest sign that Watergate majordomo Howard Hunt's deathbed confession recording is accurate is how thoroughly mainstream media ignored it, while instead promoting discredited plagiarist shills like Gerald Posner. Hunt said that LBJ was at the "head of a long line of people waiting for some change in the executive branch" and had "an almost maniacal urge to become president," with Rolling Stone, Coast to Coast and the alt media among the very few to take this seriously.
Hunt said CIA's Cord Meyer led the task for LBJ, embittered because Cord's wife had been one of JFK's mistresses. He also ID'd David Atlee Phillips, "in Miami and elsewhere" referencing JM/WAVE CIA station, Watergate alumnus Frank Sturgis, "Operation 40" mercenary David Morales, all players within the nucleus related of intelligence operations diligently identified by researchers since 1963. "In short it was a very mobile experience" said the Watergate chieftain, "I was a benchwarmer on it."
Kennedy was no saint, but Dallas was a display intended to traumatize the American public into accepting that a brutal machine behind the scenes would now more openly, literally, call the shots, and as our country continues to spin along an ugly trajectory, achieving some kind of tangible political freedom from these forces of intelligence intrigue and social control has never been more necessary.
Nothing is ever really acknowledged in America until it gets the Hollywood treatment, wrapped by a screenplay and soundtrack into that big image-stream narrative America tells itself as it reproduces its existence every day. The difficult map of intelligence agencies and the war on drugs has mostly been skirted by Hollywood, but in an overdue turn of good fortune Gary Webb’s story finally gets pinned to the Big Board pretty well.
Journalist Gary Webb used the Internet to nearly bring the war on drugs to the brink of collapse by exposing intelligence connections to leading cocaine flows in the US during Iran-Contra. In the 1990s major media forces were faced with critical new voices undermining the credibility of America's post-EO12333 drug war system. Like many before and since, Webb got the corporate media banhammer, portrayed here in incisive and indicting detail (looking at you, Walter Pincus).
"For the better part of a decade, a San Francisco Bay Area drug ring sold tons of cocaine to the Crips and Bloods street gangs of Los Angeles and funneled millions in drug profits to an arm of the contra guerrillas of Nicaragua run by the Central Intelligence Agency, the San Jose Mercury News has found." Gary Webb circa 1996.
Leading the way with a star-studded cast in Focus Features’ Kill the Messenger, a decent set of films taking on Iran-Contra-related intelligence intrigue and the war on drugs is hitting the US this month, and a veritable wave of news stories exploring these old narratives are popping up nationwide!
I was very lucky to get into an advance screening & now trying to provide here more links for those both new and old to this sick twisted tale at the heart of the American Dream. Iran-Contra really fascinated me in 2007 & I got books, started putting videos together until l’Affair d’2008RNC pulled me away into more local concerns. "Iran-Contra Goggles” remain useful to decode the same basic corrupt systems we have today.
Kill the Messenger covers Webb’s tragic story, as he exposes the roles of CIA assets moving literally tons of cocaine into the US to create a covert money source for the Contras in Nicaragua. Freeway Ricky Ross, the key recipient of the cocaine, has a film coming out Oct 17th, “Freeway: Crack in the System” and Shadows of Liberty also features a Gary Webb-oriented segment, “Killing the Messenger".
Kill the Messenger encompasses Gary’s story, Dark Alliance, the first groundbreaking news story to really go viral over the Internet, providing readers around the world with primary source documents and more to explore. Animated gifs - a new technology at the time - showed cocaine pathways flowing into the US.
Iran-Contra aficionados and Gary’s family, who supported the film’s production, will feel a strong sense of vindication, although the latter third of the story quits expanding our view of this high-level drug underworld as the bottom of Gary’s life gradually falls out.
We get a sound foundation under the story, it seems they didn’t cut any especially bad corners that would undermine this critical shot at contextualizing Webb in American journalism.
This film doesn’t explain Southern Air Transport or Barry Seal, later extensions of similar work, or the similar sad fates of Danny Casolaro, Michael Ruppert and others.
The CIA leisure suits, aviator sunglasses and careful color palettes harken to these carefully styled 1970s paranoia thrillers, both directed by Alan J Pakula in the “Paranoia Trilogy”.
Andy Garcia as Norwin Meneses and Michael Kenneth Williams as Freeway Ricky Ross are excellent, while Oliver Platt as the rumpled, dubious editor, Michael Sheen as the bureaucrat, all of these are well-crafted roles if brief. West Wing's Richard Schiff as the Washington Post's coverup editor ringleader was just right.
Ray Liotta’s surprise covert ops "nighttime of the soul” scene is also pretty damn good.
This nice media wave is a good chance for everyone to learn more, and hear from the old journalists who also got the banhammer for daring to push the truth out there. Robert Parry has a new piece: The CIA/MSM Contra-Cocaine Cover-Up (Oct 3 2014).
“It’s like we say “Iran-Contra”. "Iran-Contra" activity continues to go on today. In some cases, it’s the very same names and faces. In other cases, it’s a newer, younger generation of names and faces. But the narcotics, weapons and fraud aspects still continue to this day.” - Al Martin p330
Freeway Ricky Ross is making his move in all this, somehow having survived everything so far. Last summer: Freeway Rick Is Dreaming - Los Angeles Magazine (May 2013) An odd story by Jesse Katz who had a unique long term relationship with him as a journalist.
Another film, Shadows of Liberty, (FB) released in 2012 & playing Midwest theaters lately, includes everything from a “Killing the Messenger” segment on Webb & Dark Alliance to a Iraq marketing section covering Iraq Intel war spoofing, Iraqi National Congress, Rendon Group psyops discussed by James Bamford. Both hit the New York Times pretty hard, as well they should, in propagandizing for Iraq & attacking Webb.
In a latter section Sibel Edmonds and Phil Giraldi look at covert agents among US nuclear secrets & Marc Grossman at the State Dept. Really a nicely rounded collection, even if I’m not a big fan of some of the film participants. Detailed notes here. New Zealand review here.
Supporting material: Panthers, Crips & Bloods:Bastards of the Party - Top Documentary Films (2005) a must see for the development of Los Angeles gang structure in the context of massive importation of drugs & sophisticated police & federal operations since the days of the Black Panthers.
Pissed off CIA honcho Duane Clarridge - “there’s never been a conspiracy in this country!” (great clip in two of these films)
EO12333: The Private Contractor angle: roughly speaking, once this executive order was created, devious operations could be wrapped in corporate fronts like “Southern Air Transport”, “Vortex”, “Evergreen International” and others even lesser known.
2.7 Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.
They also point to a gap in the public reaction to Ed Snowden’s revelations about those programs. Despite that fact that most of the NSA’s spying relies on Reagan’s directive, Executive Order 12333, the vast majority of reform efforts have concentrated on the Foreign Intelligence Surveillance Act (FISA) and other legislative fixes. “Congress’s reform efforts have not addressed the executive order,” notes Alex Abdo of the ACLU, ”and the bulk of the government’s disclosures in response to the Snowden revelations have conspicuously ignored the NSA’s extensive mandate under EO 12333.”
The documents assert that mandate baldly. A legal factsheet from the NSA, dated June 2013, states that the FISA, which requires judicial oversight over spying on Americans, “only regulates a subset of the NSA’s signals intelligence activities. NSA conducts the majority of its SIGINT activities solely pursuant to the authority provided by Executive Order 12333.”
Often referred to as “twelve triple three” or EO 12333, the executive order came into being in 1981 under Reagan. Much of the post-Snowden debate, particularly with respect to the bulk collection of Americans’ phone records, has focused on the interlocking legal authorities of Section 215 of the Patriot Act and the 2008 FISA Amendments Act. But, the ACLU notes, “because the executive branch issued and now implements the executive order all on its own, the programs operating under the order are subject to essentially no oversight from Congress or the courts.” The documents describe procedures for safeguarding the rights of Americans whose information might be “incidentally” collected under 12333, but those procedures are overseen by the director of national intelligence or the attorney general.
Who? Oliver Hardy? Andy Garcia’s great line in Kill the Messenger about how it was Ollie’s idea to run drugs & guns around is a nod to Oliver North’s wonderful note: The “Honduran DC-6 which is being used for runs out of New Orleans is probably being used for drug runs into U.S."
A personal favorite :]
The 1996 Los Angeles CIA Town Hall meeting on drug trafficking was a critical moment. I would identify this meeting as the closest point to total collapse of the war on drugs edifice since Nixon, and it’s worth noting Deutch resigned shortly thereafter. This meeting cost the director of the CIA his job - and two years later they had to concede so much of Gary’s work was 100% accurate.
Another regular day - Day 28 of Iran Contra hearings Part 1, July 14 1987: They get into the weird Continuity of Government stuff in the 3rd hour.
Semi-related: alt journalist Wayne Madsen on Franklin sex trafficking scandal which had Iran-contra financing connections. The “Conspiracy of Silence” is related but goes way, way beyond all this. Wayne also suspects a similar Iran-Contra-like complex role related to 9-11 and the Pinal Air Park intel aviation field in Arizona, I wouldn’t be surprised if that’s how it turns out. (The late author Philip Marshall seemed to be on this tack as well before his weird death in early 2013.)
MOAR BIBLIOGRAPHY: Dark Alliance is now available in paperback and you should buy it at your local bookseller.
The Politics of Heroin in Southeast Asia (1972) by Alfred McCoy is *critical* because it’s probably the first academic book that shows how heroin is used geopolitically by US covert forces to finance their allies through the power of chemical dependency combined with covert logistics and the monopoly granted by the force of the state. Everything subsequent follows this pattern. [PDF 1] [PDF 2]
A final note: Michael Kenneth Williams, who notably played gangsta-assassin Omar on the Wire, does a great job as Ricky Ross. He also plays an oddly related role in 2014’s “The Purge: Anarchy”, a pulpy dystopian fantasy about the government granting everyone the “right” to kill each other 12 hours a year. Williams’ character is the revolutionary who recognizes & resists how the elite surveil them and clink champagne glasses, as the lower classes kill each other mercilessly to maintain social stratification. I couldn’t think of a better parallel to the modern American war on drugs.
Keep riding with those Aviators, Gary.
RIP Truth Tellers.
Ugh, the Syria scenario is really dispiriting but I think much of the western political leadership may finally be backing down from another round of interventionism - let's hope! Here are a bunch of new notes - take em all with a grain of salt, and may they hopefully shed a bit of light on matters.
No matter how it turns out, it will be really hard to get the Middle East moving into a politically independent foundation, respectful of human rights and devoid of massacres and social 'sloshing' as mistrust escalates on all sides, with various specialists in destruction jumping in to make matters worse at every turn.
The Britam Defense Leak involving a Syria chemical weapons plan is denied, but perhaps one of those things like a Project Northwoods about the Syrian Chemical Weapons scenario: (Northwoods was an infamous JFK-era doc from the Joint Chiefs suggesting a fake attack involving Cubans and hijacked planes.)
An article on 29 January reported allegations on the internet that the US Government had backed a plot to launch a chemicals weapons attack in Syria and blame it on the Assad regime.
The reports made reference to an email said to have been from David Goulding, the Business Development Director of Britam Defence, to company founder, Philip Doughty. The email had been published on the internet after Britam’s computer system was illegally hacked in Singapore. It referred to a proposal that Britam would deliver chemical weapons to Syria for enormous financial reward and suggested that the directors were willing to consider the illegal proposal.
We now accept that email was fabricated and acknowledge there is no truth in any suggestion that Britam or its directors were willing to consider taking part in such a plot, which may have led to an atrocity.
We apologise to each of them and have agreed to pay substantial damages.
A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline.
The attack is on britam defence (http://www.britamdefence.com/) and has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom).
The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.
Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.
A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.
More possible chemical weapons false flags from previous months: video "Chemical Weapons False Flag against Syria Update http://youtu.be/DbMdll58lis posted on August 3rd 2012.
Also worth noting this! Iraq uncovers al-Qaeda 'chemical weapons plot' BBC News June, 1 2013, and this RT report on the Turkish authorities discovery of Sarin in a Jabhat al Nusra safehouse http://youtu.be/vet0PV-XPlw in May 2013.
Reported by RT in May and firmly in the memory hole right now: 2 kilograms of sarin captured with rebels in Turkey?! WTF
Published on May 31, 2013RussiaToday: Suspected Syrian militants have reportedly been detained in Turkey with a cylinder of highly poisonous sarin gas found in their possession. Those arrested are believed to be members of the Al-Qaeda linked Al-Nusra Front. Earlier this month, UN investigators voiced suspicion the nerve agent was being used by opposition fighters. RT's Middle East correspondent Paula Slier reports.
Obviously RT has a Russian perspective here but indeed as we will see this is not the only clue floating around about Al-Nusra & chemical weapons.
DC alternative journalist Wayne Madsen is not always correct but this particular narrative just smells really damn likely right now. R2P is "responsibility to protect" interventionist faction of Beltway, the newest iteration of "cruise missile liberals" more-or-less. Go get em Wayne:
September 1-2, 2013 -- Special Weekend Report. Washington, DC (WMR) Obama caved under last-minute pressure from Dempsey
WMR's White House sources report that on the evening of Friday, August 29, President Obama was on track to launch a sustained 72-hour cruise missile and drone attack on pre-selected air defense and other strategic military targets in Syria.
Obama had been convinced by his national security adviser Susan Rice, UN ambassador Samantha Power, and deputy national security adviser Ben Rhodes, all "Responsibility to Protect" advocates, that he could trump congressional approval for his attack by claiming that humanitarian operations do not require approval under the War Powers Resolution or Article I, Section 8 of the U.S. Constitution.
Many of Washington's insiders went to bed Friday night firmly convinced that Obama would give the final order to attack Syria sometime during the early Saturday morning hours of August 30. However, the Chairman of the Joint Chiefs of Staff, General Martin Dempsey, made a hurried trip to the White House during the early morning hours of Saturday to make one last final plea to hold off on any attack.
WMR has learned from White House sources that Dempsey told Obama that the president's plan would not work. "If you do this, the plan will fail and you'll get in deeper. And without congressional approval, you'll be screwed," Dempsey told Obama.
Dempsey's warning about Congress had merit. Already, 210 House members signed a letter to Obama warning him not to attack Syria without congressional authorization. In addition, a head count showed that some Democrats would join Republicans in voting for impeachment if a bill were introduced.
Dempsey's argument prevailed and Obama decided to hold off on any attack until Congress reconvenes after Labor Day. Obama decided he would seek a congressional vote to authorize a military strike on Syria. However, in overriding Rice, Power, Rhodes, and Secretary of State John Kerry, who all favored a military strike, Dempsey incurred the wrath of the R2P faction that dominates the National Security Council. State Department sources began spreading the word that Obama would still attack Syria without congressional approval. The Pentagon, on the other hand, pointed out that none of the National Security Council "heavies," Rice, Power, or Rhodes had any military experience and that Kerry was channeling the wishes of his good friend Senator John McCain, who has consistently supported Al Qaeda-led rebels in Syria and Libya.
Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that "smoking gun" proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal "Iran-contra"-like scandal. The proof is said to be highly "impeachable."
The developing scandal involves Turkish, Qatari, Lebanese, and Croatian firms and front operations; Qatar Airways Cargo; ousted officials of the Mohamed Morsi government of Egypt; small Turkish and Jordanian air service companies contracted by the CIA; Saudi intelligence chief Prince Bandar bin Sultan Al Saud; the September 11, 2012 attack on the CIA annex in Benghazi; and "black" carve-out contracts with the U.S. Air Force.
Obama's, Brennan's, and then-CIA director David Petraeus's knowledge of the operation was so intimate, Petraeus visited GOP presidential nominee Mitt Romney in October of last year to plead with him not to bring up the covert operation in the third presidential debate. Romney acceded to Petraeus's request.
Fluoride for the Win: Frankly at this point in the demented charade, the possible Sodium Fluoride - aka fluoridated water precious bodily fluids casus belli - angle is now my favorite. Naturalnews is not always dead on either, but it's too damn appropriate I say.
I am borrowing another excerpt from Madsen which includes a possible connection between major CIA pointman on the Caucasus and indeed Islamic fundamentalist network logistical support over the years (interesting in the pre-2001 interval eh) . Graham Fuller keeps popping up as a major figure in all of this, perhaps he will turn out to be something like the Oliver North of 9-11 itself - not to mention the sponsor of the Boston bombers' uncle Ruslan. Once the angles with Fuller surfaced, did anyone notice how fast mainstream press attention drained away from their backgrounds??!!!
The murky world of the CIA's past and current support for radical Islamist groups on three continents has emerged in newly-released documents from the CIA that show that Graham Fuller, the agency's one-time top interlocutor with the Saudis, Afghan mujaheddin, and Muslim Brotherhood, was a right-hand man to three CIA directors.
Fuller, a business partner of Ruslan Tsarni (Tsarnaev), the uncle of the accused Boston Marathon bombers, served as a close adviser to CIA directors William Casey, William Webster, and Robert Gates, according to recently declassified internal CIA memoranda. Since retiring from the CIA, Fuller has been engaged in supporting the Chechen Islamist guerrilla groups fighting Russia as well as the Republic of Georgia, which has become a base for anti-Russian and anti-Syrian military activities, which includes, the transport of chemical weapons to Syrian rebels from the Pentagon-operated Richard G. Lugar Center for Public Health Research in Tbilisi, which, although a biological weapons research laboratory, also warehouses chemical agents, according to U.S. intelligence sources familiar with the facility. The Tbilisi facility was the major source of chemical agents used by Syrian rebels to attack civilians outside of Damascus in a "false flag" terrorist operation coordinated by the CIA and Mossad.
Throughout the 1980s, Fuller was front and center at many of the acts of violence in the Middle East and South Asia, from Lebanon and Syria to Iran, Iraq, Afghanistan, and South Yemen. One CIA memo describes how Fuller was also heavily involved in the early part of the CIA's stirring political activities in the Balkans during the collapse of Communism in eastern Europe. A May 22, 1985, memo from George Kolt, the CIA's National Intelligence Officer for Europe, invited Fuller to a June 11, 1985, dinner at CIA Headquarters at which the former U.S. ambassador to Bulgaria, Robert Barry, discussed at the Confidential level "The Strategic Importance of the Balkans for the United States." [......]
I'm leaving the rest of the story off for now out of respect for an indie journo making a run at this ... and moments after plugging this in, Wayne's site is having Varnish caching issues. It's all got to be cross checked - someone could be feeding him knowingly bad info for their own purposes certainly - I think we have a substantial amount of paydirt on our hands here.
b. Use of Deadly and Non-deadly Force (4) (b) Warning shot will not be fired.
or better yet:
(3) In an occupied building, when the dissident's/sniper's location is unknown, all suspected rooms must be searched. The action element should try to have occupants submit voluntarily to the search of their rooms. At the same time, occupants should be questioned in an attempt to pinpoint the sniper's location. If occupants will not submit voluntarily and there is probable cause to believe that the dissident/ sniper is located in the room, a complete physical search of the room or rooms should be conducted. Use of the patrol dog will help in conducting such searches.
Another planning layer for emergency domestic military operations has been published: The 2006 US Army Military Police training manual for Civil Disturbance Operations does not concern itself with warrants in the 'search' section, indicating a certain level of Constitutional disregard in the military's planning for emergencies in what the document calls CONUS, or Continental United States.
I've only had time to read a bit of it so far, but it ties in very closely with another level of this planning framework, USNORTHCOM (Northern Command) CONPLAN 3502 Civil Disturbance Operations, which is the 21st century replacement for GARDEN PLOT, the Pentagon's plan used between the 1960s and 2002 for domestic riot control & emergency operations in such settings as the LA Riots.
In 2010 I found presentation files on a US Army Corps of Engineer server - for full story please see TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed. Having seen first hand domestic military operations at the 2008 Republican National Convention & 2009 G20 Pittsburgh, the growth and use of domestic military capacity for crowd control is a more-than-hypothetical situation -- and the subsequent obfuscation of those operations by political officeholders and appointees is quite terrifying in its implications.
This Civil Disturbance Operations Subcourse training manual ties right into material cited in the CONPLAN and supporting documents, including many of the same riot control weapons. An earlier version of a very similar manual can be found via that link.
Plus this one has quizzes!!
Billeting - I swear I heard something about revolutionaries complaining about billeting earlier... Something everyone makes a big deal out of this time of year....
There is a lot of stuff about formations -
P 62: Handy tip that rioter-impressing safe-port position is a PSYOP and tiring!
(a) The safe-port position is extremely useful in making a show of force before rioters. The above mentioned carrying position is the primary method of carrying weapons in the control force formation. It allows the Soldier to control both ends of the weapon while moving in and out of the formation and advancing the crowd.
All the stuff about gathering intel against rioting/unlawful Americans is nice and creepy and they definitely aren't saying anything about the Defense Intelligence Agency or National Geospatial Intelligence Agency.
(1) Military information elements having counterintelligence resources will maintain the ability to collect civil disturbance threat data during the period in which there is a distinct threat of actual civil disorder requiring the use of federal military forces.
(2) On activation by the Department of the Army, military intelligence elements having counterintelligence capability will:
(a) Establish and maintain contact with suitable local, state, and federal authorities.
(b) Collect civil disturbance data concerning incidents, and estimate the capability of civil authorities to control the situation. This can be achieved through direct contact with civil authorities.
(c) Report collection results to the Department of the Army in accordance with current plans.
(d) Keep appropriate commanders informed. (e) Provide intelligence support to the Personal Liaison Officer Chief of Staff of the Army.
(f) Recommend methods of overt collection, other than liaison, if required, to the Department of the Army for approval.
(3) Military intelligence elements may employ methods of collection other than liaison only on order of the Department of the Army.
(4) Covert agent operations are not used to obtain civil disturbance data on persons or organizations without specific advance approval of each operation by the Under Secretary of the Army.
(5) Basically, the following vital elements of data will be required for sound planning and operations once approval has been received:
(a) Objectives of elements which are a distinct threat to cause or are causing civil disturbances.
(b) Times and locations of disturbances.
(c) Cause of disturbances.
(d) Existence of persons, groups, or organizations which have distinctively threatened or are creating disturbances.
(e) Estimated number of persons who will be or are involved in civil disturbances. (f) Assembly areas for crowds.
(g) Presence and location of known leaders and persons who are a distinct threat to cause civil disturbances.
(h) Organization and activities planned by the leaders who are a distinct threat to cause civil disturbance.
(i) Source, types and locations of arms, equipment, and supplies available to the leaders who are a distinct threat to cause civil disturbance.
(j) Use of sewers, storm drains, and other underground systems by the elements who are a distinct threat to cause or are causing civil disturbances.
(k) Identification of new techniques and equipment not previously used by elements that are a distinct threat to cause civil disturbances.
(l) Attitude of general masses towards: (a) Groups causing civil disturbances. (b) Civil law enforcement authorities. (c) Federal intervention to control the disturbance.
(m) Possible threat to public property including private utilities. (n) Communications and control methods employed by elements referred to in paragraph 1 above.
PART C - Request for Federal Support/Training 1. Request for Federal Support.
a. Providing military support to state and local governments to assist them in quelling a civil disturbance or riot requires close coordination through a host of state and federal agencies. It requires a though briefing of Soldiers at all levels on what they can and cannot do with respect to law enforcement. Civil authorities must be briefed on the restrictions placed on federal forces by the Constitution of the United States, federal statutes and laws.
b. Under the Constitution of the United States and United State Codes the President is empowered to direct federal intervention in civil disturbances to:
(1) Respond to state request for aid in restoring order (2) Enforce the laws of the United States. (3) Protect the civil rights of citizens (4) Protect federal property and functions.
c. The Secretary of Defense retains approval for federal support to civil authorities involving the use of DOD forces, personnel, and equipment. The Secretary of the Army is the Department of Defense executive agent is the approval authority for federal emergency support in response to natural or man-made disasters (except weapons of mass destruction [WMD]). The Directorate of Military Support (DOMS) plans and executes the DOD domestic support mission to civil authorities. The DOMS is the DOD primary contact for all federal departments and agencies during DOD involvement in most domestic support operations. DOMS is also the staff agency responsible to the Chief of Staff, Army and Secretary of the Army for recommending to them appropriate measures necessary to cope with civil disturbances and terrorism and to transmit the approved recommendations to Department of Defense agencies for execution and to supervise the execution. The missions and functions of DOMS are outlined in AR 500-50. Additional roles of responsibilities of various agencies can be found in FM 3-19.15
Prior to activating federal military forces there is a sequence of steps that must occur. When data begins to show that a disturbance may develop into a situation that will require the help of federal forces, several actions are introduced at the federal level while state and local law enforcement agencies attempt to contain the disorder. Such actions may include increasing the readiness posture of forces named to help the jurisdiction concerned.
d. As the situation worsens and the state employs its National Guard, the U.S. Attorney General would send his personal agent to the scene of the disorder. This agent is named as the Senior Civilian Representative of the Attorney General (SCRAG) and is the organizer of all federal activities in the area of the disorder, including contact with local civil authorities. At the same time, the Chief of Staff of the U.S. Army would send his personal liaison officer (PLOCSA) to the scene along with members of the Department of the Army Liaison Team (DALT) that serves as his planning staff.
[.........] CROWD CONTROL PAGE 35+
c. Techniques for Crowd Control. There are numerous techniques designed to provide the commander with flexibility of action in accomplishing crowd control. He must select a combination which will produce the desired results within the framework of the selected crowd control option. The most common techniques appropriate for military usage are discussed below.
(1) Observation. This consists of deployment of persons or teams to the periphery of a crowd for the purpose of monitoring its activity. It includes gathering data on crowd size, location, mood, and reporting on the developing situation. This technique includes posting persons on strategic rooftops and other high terrain overlooking the crowd. This latter measure provides additional security to control force personnel should they become committed to other crowd control operations. Such a team may be composed of an expert marksman, a radio operator, and an observer equipped with binoculars. Care must be taken to assure that committed control forces are aware of the locations of such teams to prevent their being mistaken for sniper elements.
(2) Communication of Interest and Intent. In certain situations, effective communication with crowd and mob leaders and participants may enable the commander to control the situation without resorting to more severe actions. When planned and organized demonstrations, marches, or rallies within the disturbed area are announced, the control force commander in coordination with local authorities should meet with organizers of the activity in order to communicate the interest of the control forces. The following matters, as appropriate, should be discussed.
(a) Parade or demonstration permits. (b) Location of demonstration and routes of march. (c) Time limits for the activity. (d) Provision of marshals by activity organizers. (e) Prevention of violence. (f) Safety of all concerned.
(3) The task force commander and local authorities should also communicate to the activity organizers
their intent to cope with violence, unlawful actions, and violations of restrictions imposed on the activity. It is intended that, by this communication between activity organizers and control force personnel, the demonstration, rally, or parade will occur without incident through the mutual cooperation of all concerned. The intentions of control forces will not be effective if delivered as an ultimatum. A limited, begrudging dialogue with activity organizers reduces the opportunity for authorities to learn the plans of the demonstrators. It must be remembered that if this communication is not effected, the activity organizers might well hold the demonstration in defiance of local authorities, thereby creating a potential for violence that might not have existed if this technique had been employed.
d. Channelization. Pressure can be brought to bear on the dissident leadership to channel the crowd into an area which will minimize the disruption when the following requirements are met:
(1) When communications have been established with the dissident leadership.
(2) When the intent and nature of the crowd activity is known.
e. Diversion. When communication exists with the dissident leadership, consideration may be given to efforts to divert the leadership of the crowd itself from its stated or obvious objective. The diversion should support the objectives of the control force either by reducing the strength of the crowd situation or motivating the crowd to seek an area more easily controlled by the control force.
f. Cooperation. Decreasing the potential disruption of the crowd activity may be accomplished by an active attempt on the part of the control force to obtain cooperation of the dissident leadership. Whenever there is an attempt by the crowd leadership to seek permission and cooperation of the local government, every effort should be made to maximize this cooperation by demonstrating an attitude of facilitation. This may be accomplished by helping the leadership to organize a peaceful demonstration while establishing guidelines which will minimize the impact of the demonstration on the community.
g. Selection of Force Options.
(1) The commitment of federal military forces must be viewed as a drastic last resort. Their role, therefore, should never be greater than is absolutely necessary under the particular circumstances which exist. This does not mean, however, that the number of Soldiers used should be minimized. The degree of force required to control a disorder is often inversely proportionate to the number of available personnel. Doubts concerning the number of Soldiers required should normally be resolved in favor of large numbers since the presence of such large numbers may prevent the development of situations in which the use of deadly force is necessary. A large reserve of Soldiers should be maintained during civil disturbance operations. The knowledge that a large reserve force is available builds morale among military and law enforcement personnel and helps to prevent overreaction to annoying acts by unruly persons.
(2) In selecting an operational approach to a civil disturbance situation, the commander and his staff must follow the "minimum necessary force" principle; for example, crowd control formations or crowd control agents should not be used if the area filled with manpower would be sufficient.
(3) Every effort should be made to avoid appearing as an alien invading force and to present the image of a restrained and well-disciplined force whose sole purpose is to help to restore law and order with a minimum loss of life and property and due respect for those citizens whose involvement may be purely accidental. Further, while crowd control personnel should be visible, tactical, or force concentrations which might tend to excite rather than to calm should be avoided where possible.
(4) The normal reflex action of the well-trained combat Soldier to sniper fire is to respond with all firepower available. In a civil disturbance, this tactic endangers innocent people more than snipers. The preferred tactic is to allow a special reaction team (SRT) who is trained for this type of mission, to enter the building from which sniper fire starts. Keeping with the controlling principle that the team must use only the minimum force necessary to fulfill the mission, the commander may select any one of the following options for arming his Soldiers:
(a) Riot Shield. In the hands of a well trained soldier, the riot shield can be utilized as both a defensive and offensive weapon when contact is made with an aggressive crowd. The primary use of the riot shield is for defense of the line. However, each riot shield holder must be proficient in its retention. The Soldier holding the shield must be trained to react when a demonstrator grabs the top of the shield by slapping with his strong hand and gives the following command" Get back", "Get away" "Stop". If a rioter grabs the bottom of the shield the Soldier should be trained in forcefully dropping to one knee and pinning the rioters' fingers to the ground.
(b) Baton. The baton is most effective in a crowd control operation and is considered the primary weapon for crowd control operations. The baton is considered to be an offensive weapon with reduced lethality and unlike the rifle, the loss of a baton to the crowd does not create a serious threat. Soldier must be trained with the riot baton to the point its various techniques are automatic to them. This training must also include the vulnerable points on the body so they can avoid areas that may cause permanent injury or death when struck.
Currently there are two types of riot batons, wooden and expandable. The most common one is the 36 inch hickory riot baton with thong. There is also the 24-inch to 36 inch expandable riot baton, which has been added to the nonlethal capabilities set. Each Solder within the control force need to be proficiently trained in all techniques for blocking and striking. Improper use of the riot baton by an untrained Soldier has the potential for creating a greater problem than what already exist.
(c) Shotgun. The 12 gage shotgun is a pump action shotgun currently in the nonlethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3- inch chamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to the standard military issues weapon.
(d) Rifle. The rifle, if capable of automatic fire, must be modified to prevent automatic operation. Keeping with the controlling principle of using only the minimum force necessary to fulfill the mission. If the Soldier are equipped with their long weapons and are in the front lines of the formation, the weapon should be carried across their back from left to right with the muzzle of the weapon pointed down and the butt of the weapon pointed up. The weapon should be cleared and the magazine in the proper ammunition pouch.
(e) Non lethal weapons and munitions. Nonlethal weapons and munitions are an additional asset afforded to the commander in civil disturbance and are preferred over lethal force. The showing of force with nonlethal weapons and munitions may assist in crowd dispersing, separate, or leave the area with minimal causalities. This nonlethal capability set (NLCS) is a well-rounded, versatile package of both equipment and munitions. NLCS are dived into four distinct categories: personnel protection, personnel effectors, mission enhancers and training devices
(f) While each of the above options represents an escalation in the level of force, they are not sequential in the sense that a commander must initially select the first option, or proceed from one to another in any particular order. So long as the option selected is appropriate, considering the
existing threat, the minimum necessary force principle is not violated.
1. The rifle and rifle with bayonet attached have extremely limited offensive use as both may constitute deadly force. The primary value of the rifle or the rifle with bayonet attached is the psychological impact on the crowd. While the use of fixed bayonets can add considerably to this effect, the danger of intentional or accidental injury to demonstrators or fellow control force personnel prevents such use except with extremely violent crowds.
2. Fire by selected marksmen. Fire by selected marksmen may be necessary under certain circumstances. Marksmen should be pre-selected, trained, and thoroughly instructed. They may be placed on vehicles, in buildings, or elsewhere as required.
3. Full firepower. The most severe measure of force that can be applied by Soldiers is that of available unit firepower with the intent of producing extensive casualties. This extreme measure would be used as a last resort only after all other measures have failed or obviously would be impractical, and the consequence of failure to completely subdue the crowd would be an imminent overthrow of the government, continued mass casualties, or similar grievous conditions.
4. Shotgun. The riot shotgun is an extremely versatile weapon; its appearance and capability also produce a strong psychological effect on rioters. It is particularly suited to certain applications in civil disturbance operations. When used with No. 00 buckshot ammunition, it is an excellent point target weapon extremely effective at limited range. By varying the nonlethal munitions' M1012 and M1013 the weapon can be employed with considerably less possibility of serious injury or death. This provides the commander with a desirable flexibility in selecting the ammunition most appropriate under the existing conditions
(g) The measures described in paragraphs 1 through 5 below, may be applied in any order as deemed suitable by the responsible commander as long as his application is consonant with prescribed confrontation management techniques outlined earlier.
(1) Proclamation. A public announcement is considered an excellent medium to make known to a crowd the intentions of the control force commander. In some cases, such an announcement makes further action unnecessary. An announcement puts the population on notice that the situation demands extraordinary military measures, prepares the people to accept military presence, tends to inspire respect from lawless elements and supports law-abiding elements, gives psychological aid to the military forces trying to restore order, and shows to all concerned the gravity with which the situation is viewed. In making a proclamation, a commander may consider imposing a time limit. However, the situation may change, and not imposing a time limit may leave the commander other options as he sees fit, as long as the proclamation is specific in its instruction.
(2) Show of Force. A show of force is effective in various situations in civil disorder control operations. A show of force may as simple as Soldier dismounting from buses or trucks in plan sight of the demonstrators, but must be far enough away to prevent a provoked attack of thrown objects. When a crowd has gathered in a large area, show of force can take the form of marching a well-equipped, highly disciplined control force into their midst. When persons are scattered throughout the disturbance area in small groups, a show of force may take the form of motor marches of Soldiers throughout the area, saturation patrolling, and the manning of static posts or similar measures.
(3) Employment of Crowd Control Formations. Crowd control formations are used to contain,
disperse, block or break up a non conforming crowd; these crowd control formations are more effective in urban areas than they are in open fields or parks. When this method is utilized in urban areas, it is easy to disperse or split the crowd into small groups, isolate instigators, or funnel a crowd into a desired area. The use of such formations is part of the show of force and has a strong psychological effect on any crowd.
(4) Employment of Water. Water from a high pressure hose may be effective in moving small groups on a narrow front such as a street or in defending a barricade or roadblock. Personnel applying water should be protected by riflemen and in some cases by shields. In the use of water, the factors discuss below should be considered.
(a) Water may be used as a flat trajectory weapon utilizing pressure, or as a high trajectory weapon using water as a rainfall. The latter is highly effective during cold weather.
(b) The use of a large water tank (750 to 1,000 gallons) and a power water pump mounted on a truck with a high pressure hose and nozzle capable of searching and traversing will enable Soldiers to use water as they advance. By having at least two such water trucks, one can be held in reserve for use when required.
(c) In using water, as with other measures of force, certain restraints must be applied. Using water on innocent bystanders, such as women and children, should be avoided; ways to escape must be provided; and the more severe use, flat trajectory application, should be used only when absolutely necessary.
(d) Fire departments are normally associated with lifesaving practices rather than maintenance of law and order. In order to maintain this image, fire department equipment will not be used for riot control and crowd dispersal.
(e) Use of Crowd Control Agents. Crowd control agents are extremely useful in civil disorder control operations because they offer a humane and effective method of reducing resistance and lessen requirements for the application of more severe measures of force. Task force commanders are authorized to delegate the authority to use crowd control agents and other forms of non lethal force at their discretion.
2. Establish Area Control.
a. General. Acts of violence, such as looting, arson, and vandalism, are greatly reduced when the physical and psychological influence of lawlessness is defeated. In establishing effective area control, commanders must recognize the problem of widespread looting and arson that has accompanied most large urban disorders. Performance of this task consists of reducing or eliminating those conditions which contribute to the outbreak or continuation of lawlessness in the disturbed area.
(1) Looting. When dealing with persons involved in looting, extreme care and adherence to the principle of minimum force must be observed. Looting may start at any time or place as an isolated incident and spread quickly throughout the affected areas. Looting is not limited to any particular sex or age group; it includes the very old, the very young, women, and children. For example, many children may be looting without any idea of how serious their actions are. In the control of looting, unit leaders must recognize that deadly force is not authorized.
(2) Anti-looting. Unit commanders must be familiar with anti-looting measures which can be taken by civil authorities, such as boarding up broken or unbroken windows, covering windows with photo-
luminescent particles, and by the prompt posting of looting penalty proclamations. Anti-looting actions that can be taken by military forces include the establishment of foot and motor patrols, the posting of fixed guard posts, and the lighting of likely areas for looting. Guards at fixed posts will be briefed not to leave their posts to pursue individual looters on foot, but to remain on post and prevent looters from approaching their areas of responsibility. All guards must be briefed that looters will not be fired upon nor will deadly force be used to catch looters.
(3) Protected or Sensitive Commercial Establishments. A main consideration in the conduct of civil disturbance operations is to prevent liquor, drugs, weapons, and ammunition from falling into the hands of rioters. Therefore, liquor stores, drug stores, sporting good shops, pawn shops, and hardware stores are main targets for looters and must be kept under close observation by means of foot and motorized patrols. Normally, businesses of this type must be identified in advance and included in emergency plans.
(4) Arson. Arson is generally defined as a crime of purposely setting fire to a building or property. Acts of setting fire to buildings, property, etc., often follow disturbances. Certain situations may arise in controlling arson where the use of deadly force is authorized and necessary.
[.........] PAGE 40
(2) Imposed Restrictions. Except in the unlikely event of martial law, federal military forces will not have the authority to impose restrictions such as a curfew on the civilian population. Certain restrictions, however, may be imposed by civilian authorities to help in the control of lawlessness. Military leaders should be prepared to recommend which restrictions are of substantial value in comparison with the burden of enforcement. The most commonly used restrictions include:
Curfew. The curfew is a control measure which has proved highly effective in many civil disturbances. Its purpose is to restrict the unauthorized movement of personnel on streets and public places during specified periods of time, especially during the hours of darkness. Joint planning with civil authorities regarding the imposition of a curfew should provide for:
(a) Coordination of the initiation, enforcement, and termination of a curfew.
(b) Public announcements of the beginning and ending of curfews. Civilian authorities make these announcements through local mass media, pamphlets, and public address systems to ensure maximum exposure.
(c) Curfew exemptions and guidance on who should receive them, including written authorization or passes.
(d) Provision for the apprehension and disposition of curfew violators.
(3) Sales Restrictions. Restrictions on the sale, transfer, and possession of sensitive material such as gasoline, firearms, ammunition, and explosives will help control forces in minimizing certain forms of violence. Limiting the availability of weapons to the potential sniper or terrorist may reduce the likelihood of such violence. The effective enforcement of these restrictions, however, requires extensive planning and the commitment of adequate manpower to this effort.
So much for the Second Amendment SUCKAZ....
[.........] PAGE 22+
f. Army Detention Facilities.
(1) The Army will not operate facilities for confinement, custody, or detention of civilian personnel apprehended for violation of local or state laws as long as civil confinement facilities, operated by the Department of Justice, state, or local agencies are sufficient to accommodate the number of persons apprehended.
(2) When it appears that available local facilities are insufficient, due to the large number of persons apprehended or detained, and this fact can be verified by the person or agency responsible for the facilities, temporary confinement/detention facilities may be operated with prior approval from DA, specifically, the Chief of Staff, U.S. Army. These facilities will be operated only until custody of the persons detained can be transferred to and assumed by civil authorities. They will not be used for the confinement of persons charged or convicted under civil jurisdiction.
(3) Temporary confinement/detention facilities can be developed from local federal facilities provided they are adaptable to the requirements of custody and control. Such facilities should be established, if possible, within the affected area; this will conserve time, transportation, and escort personnel.
However, if no suitable federal property is available within the affected area, they can be located elsewhere on any property under federal control as long as the persons to be detained are apprehended in the affected area. Whenever such temporary facilities are established during civil disturbance control operations, the Army is responsible for providing those personnel, facilities, and supplies necessary for the custody, control, health, comfort, and sustenance of persons detained.
(4) Officers and key NCOs specifically trained and experienced in confinement operations are required to operate such facilities. Guards and support function personnel operating under the direct control of such officers and NCOs need not be specifically trained or experienced in confinement operations as long as they are under close and continuing supervision of trained responsible personnel. Whenever females are detained, they must be held in physically separate detention facilities and under the control of selected female guards operating under the supervision of trained and experienced confinement personnel.
(5) Temporary detention facilities should be constructed and arranged to provide for adequate custody, control, and safety of detainees. It is advisable to use existing permanent-type buildings. Where sufficient permanent structures are not available, only that amount of new construction required for temporary custody, control, and administration of prisoners should be accomplished. Temporary field- type facilities provide compartments to assure effective control.
(6) The same operational procedures that apply to the operation of installation confinement facilities and treatment of detainees apply to these temporary facilities except that those policies and procedures establishing training, employment, mail and correspondence, and administrative discipline requirements will not apply. Detailed guidance in procedures for confinement of detainees is contained in EPW Operations, FM 3-19.40.
g. Special Equipment. Certain items of equipment available to military and civil police forces can do much to limit injuries to civilian and military personnel and destruction of property. These items increase the psychological effects of a show of force and offer additional protection and versatility to civil disturbance forces during the operations.
(1) The 12 gage shotgun is a pup action shotgun currently in the non lethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3-inchchamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to standard military weapons that may be desired based on mission considerations.
(2) The shotgun, as in the case of other firearms used in civil disturbance operations, is fired only on the orders of a qualified superior officer when lesser measures of force are not effective, or when the individual Soldier has no other means of protecting his life.
(3) The M7 is a 66-millimeter vehicle-mounted NL grenade-launching device that is mounted on a HMMWV. It is a indirect fire support system that can deliver the M99 blunt trauma grenade that creates a sting-ball effect. The M315 installation kit is used to install an M7 discharger on the turret ring of appropriate HMMWV variants. An adjustable bracket allows the launch angle to be depressed for engaging targets at ranges of 50, 75 and 100 meters. The system enforces standoff distances and deters potential threats.
(4) The M1012 is a single projectile round made of hard rubber that is shaped like a bomblet and designed to be fired at a single target. With the muzzle velocity of 500 feet per second, the M1012 as the effective range of no closer that 5 meters and no further that 30 meters. Engagement inside of 5 meters could result in serious bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective.
(5) The M1013 is a multiple projectile round with .23 caliber hard rubber pellets that is designed to be fired at and employed with the purpose of affecting multiple targets. With a muzzle velocity of 900 feet per second, the M1013 has an effective range of no closer than 5 meters and no further that 30 meters. Engagements of less than 5 meter can result in seriously bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective
(6) The midsize riot control disperser (M37) is the size of a standard fire extinguisher that uses compressed air to force the RCA out to a range of 30 feet. It has the capacity to employ 18 burst of RCA into a hostile crowd while maintaining excellent standoff capabilities. The M37 can be refilled and is rechargeable. It can be refilled with CR solution (liquid agent) or CS (dry agent). For the purport of training the M37 can be filled with water and CS can be substituted with talcum power.
(7) The Squad riot control agent disperser (M33A1) is designed to provide crowd control and protection at the squad level. It is capable of projecting a ballistic stream of RCA's beyond 25 feet in up to 25 half- seconds burst. It consists of a frame and harness assembly, compressed-gas cylinder (agent container assembly) air pressure assembly, gun and hose assembly, multi-jet spray unit, and check valve assembly. The M33A1 can be refilled and is rechargeable. For training purposes, CR can be substituted with water and CS and be substituted with talcum power.
(8) The above mention items are but just a few of the non lethal weapons and munitions available to the commander and unit to utilize during a response to the civil disturbance, and can be utilized to train and prepare Soldiers. Additional non lethal weapons and munitions as well as protective gear can be found in FM 3-19.15.
3. Vehicles. Armored vehicles and transport vehicles add to the readiness of the crowd control force. The use of these vehicles increases flexibility, reduces troop commitments, and provides protection for personnel. In considering the use of vehicles, however, it must be remembered that they should be secured by foot elements.
a. Armored Security Vehicles (ASV) can be used in several ways to keep the effects of civil disturbances at a minimum.
(1) Their use adds a considerable psychological effect to riot control formations while providing added protection for Soldiers. They provide a readily accessible barrier for Soldiers to crouch behind if necessary, and excellent protection for those inside.
(2) Their use as mobile command posts offers the added advantages of security, communication, and mobility.
(3) They are well adaptable to roadblock operations providing the advantages listed above, while at the same time providing an excellent barrier.
(4) Their use for patrolling an area of violence adds to the psychological effect, and allows Soldiers to maneuver in close to snipers in order to make an apprehension.
b. Standard military transport vehicles can be modified with sandbags, armor plating, wire screening, or similar materials to give some protection against sniper fire and thrown objects. They provide mobility and communication capability for area coverage. Soldiers should be deployed with ample vehicles to provide sufficient flexibility to handle all situations in an area of civil disturbance. TOE allowances should probably be increased for this purpose.
3. Other Equipment. In addition to the special equipment discussed above, certain other items should be available for use in operations within the disturbance area.
a. Armored vests and protective masks are required for anti-sniping operations and at other times when violence is expected. Flexibility is an important consideration. For example, the limitation on visibility must be considered when requiring the use of protective masks, and the limitation on mobility when wearing the armored vests.
b. Successful conduct of the overall operation may depend on other items. Auxiliary lighting should be available to include hand-portable lights, vehicular-mounted searchlights, spotlights, flood-lights, flashlights, flares (with caution toward fires), and vehicle headlights. Prefabricated wood or metal barriers, or suitable materials, such as wire or ropes, may be used to block off an area; signs should be provided to supplement these barriers. Evidence equipment, including movie and still cameras with telescopic lenses, and recording devices should be obtained and placed into position.
c. Other items of equipment should also be provided. Helicopters should be used for observation, communication relay, illumination, resupply, reserve displacement, and numerous other tasks. Adequate firefighting and fire protection equipment are vital in civil disturbance.
d. Provisions should be made for appropriate communications equipment for use at the scene and between the scene and the operations headquarters. Every available means of communications to include public address systems--both hand-portable and vehicle-mounted--should be used.
PART E - Operational Tasks
1. General. In any civil disturbance operation, certain tasks must be accomplished to reach the ultimate objective of restoring and maintaining law and order. To do this, action must be taken to gain control of the situation. Control forces must perform certain tasks that will develop a physical and psychological environment which will permit law enforcement personnel to enforce the law and maintain order. The importance of having a high degree of flexibility and selectively in the response cannot be overemphasized. It is just as important that the tasks selected be completed only after a careful evaluation of the situation. This evaluation must consider the particular uniqueness of the situation. In this respect, the commander selects those tasks that are most likely to reduce the intensity of the given situation. Therefore, not all tasks will apply in all situations, but control force commanders and unit leaders must identify those tasks which must be performed and then develop plans and procedures for their accomplishment. The operational and integrated tasks listed below are discussed in detail in the paragraphs and lessons to follow.
a. Operational Tasks. (1) Isolate the area. (2) Secure likely targets. (3) Control crowds or mobs. (4) Establish area control. (5) Neutralize special threats.
b. Integrated Tasks.
(1) Gather, record, and report information. (2) Apprehend violators. (3) Maintain communications. (4) Maintain mobile reserves.
(5) Inform the public. (6) Protect the fire service operations. (7) Process detained personnel.
2. Isolate the Area.
a. This task includes the restriction and sealing off of the disturbed area. The objectives of sealing off the disturbed area are to prevent the disorder from spreading to unaffected areas, to prevent escape of persons bent on expanding the disturbance, to speed up the exit of the uninvolved, and to exclude unauthorized personnel from entering the affected area. In order to prevent the disturbance from expanding in size and strength, it is critical to prevent the inflow of extra demonstrators or curious onlookers into the disturbed area.
b. When military forces are committed to helping the civil authorities in controlling civil disturbances, the situation will be beyond the capability of local law enforcement agencies and a scene of major disorder should be expected. This disorder may be characterized by small, dispersed groups which are looting, burning, and generally causing havoc in the area, or it may be characterized by large groups participating in varying degrees of illegal conduct. The initial action taken by military forces to control the disorder is critical and should include the immediate isolation of the disturbed area.
c. The initial commitment of control force personnel may be required to clear a building or an area in order to isolate the persons creating the disturbance from those not yet motivated or actively involved. The primary emphasis should be on identifying what area and who has to be isolated.
3. Isolated Techniques. There are several techniques to use when isolating a disturbed area.
a. Barricades and Roadblocks. Barricades and roadblocks are physical barriers which deny or limit entry into and exit from the disturbed area. They can be used to totally deny passage of people and vehicles or to permit certain designated categories of persons and vehicles to pass. They must be positioned so as to prevent their being bypassed, surrounded, or cut off from support. In many cases, it may be impractical to physically seal an area due to the physical and geographical considerations, such as in the case of a college campus or a suburban area.
b. Barricades Against Personnel. Civil disturbance operations contingency planning should provide for the availability of portable barricades which slow down the passage of personnel. Concertina wire is a suitable material for rapid construction and effectiveness, although wooden sawhorses, ropes, and other field expedient devices may suffice. Concertina wire should be used sparingly and only under serious circumstances as it is indicative of violent disorders.
c. Roadblocks Against Vehicles. The erection of effective roadblocks which cannot be easily breached by vehicles requires large, heavy construction materials. One item that can be stockpiled in advance is 55- gallon drums to be filled with water or earth on site. Other materials include sandbags, earthworks, trees, or heavy vehicles. Several roadblocks placed at intervals of 25 to 50 feet provide sufficient depth to prevent breaches by heavy or high-speed vehicles.
d. Construction Considerations. The construction of barricades and roadblocks should provide cover from small arms fire where this threat is likely. Provisions should be for night illumination of approaches to the position; however, care must be taken not to silhouette the personnel manning it. Construction materials which would chip or shatter upon impact by thrown objects should be covered with canvas or sandbags to prevent injuries from flying fragments. Warning signs should be placed in front of the position directing authorized personnel not to approach the position. One technique of providing a quickly erected barrier is the use of vehicles parked bumper to bumper; however, this procedure may subject the vehicles to damage by a hostile crowd. Another device which may be effectively used both as a barricade and a part of a formation is the use of a locally built frame of wood or metal with wire covering.
e. Perimeter Patrols. Perimeter patrols should be established to prevent entry or exit from the disturbed area, particularly by persons or groups trying to bypass barricades and roadblocks. These patrols operate along the outer operational boundary of the disturbed area. Perimeter patrols can be integrated with area patrol routes within the disturbed area.
f. Pass and Identification Systems. Unit, installation, or municipal contingency planning should include a pass and identification system providing for the entry and exit of authorized personnel to and from the isolated area. Procedures should be established for press personnel, emergency medical personnel, public utility work crews, and for any other personnel who have a legitimate purpose for entering and exiting the isolated area. Consideration must be given to those persons residing within the disturbed area who must travel to and from work. An effective pass and identification system requires careful and detailed planning as a contingency measure.
g. Public Utility Control. Ensure that civil authorities have established a means for controlling public utilities to include street lights, gas, electric, water, and telephone services so that they may be turned on or off to support the tactics employed by the control forces.
4. Secure Likely Targets.
a. General. Certain buildings, utilities, and services are critical to the economic and physical well-being of a community and require security to prevent disruption of essential functions. In addition, certain facilities and buildings have become symbolic targets to radical or extremist elements and should be identified and afforded protection with the priorities established. Among the likely targets to be attacked are control force command posts, billeting areas, and motor parks. Another potential problem in civil disturbance operations is the threat posed by dissident elements intent on doing bodily harm to control force personnel and civilian dignitaries in the disturbed area. When such threats exist, military personnel may have to be committed to security operations. In particular, security must be placed on armories, arsenals, hardware, and sporting good stores, pawnshops, and gunsmith establishments, or other places where weapons or ammunition are stored. To conserve manpower, consideration may be given to evacuating sensitive items, such as weapons from stores and storing them in a central facility. Priorities for physical security must be established to prevent waste of available forces on less important facilities or those which have their own physical security forces. The degree of security necessary to protect various buildings and utilities is determined by considering the following: [..............]
It goes on.... Again the page is here. I'll leave it here to get this posted now. Check it out and be sure to get a handle on CONPLAN 3502 and other aspects of domestic military operations planning frameworks -- when similar emergency/disaster scenarios happen (i.e. Katrina) you see military personnel acting like this...
REX-84 under Iran Contra was 'then', and 'now' a literal US Army war to save the criminal banks from angry mobs is basically what's planned. Under this plan a nation ripped off & crippled by LIBOR peta-scale financial scams leaves forces like the military on the hook for defending the organized ring of criminals operating banks, i.e. "services ... critical to the economic... well-being of a community". What is the Pentagon supposed to do about the fact that the critical infrastructure is often operated by the criminally insane -- the very people who have pushed the US most of the way to the point where terrifying emergency plans like those above spring to life? X-(
In the aftermath of the infamous Bilderberg Conference, I would like to throw this essay out there about the long arc of everything from the Hanseatic League to the European Common Market and European Union.
It's jumping off from an old book, The Thousand Year Conspiracy, published during WWII which pointed out that Hitler's days were numbered but the geopolitical agenda of eastern German aristocracy would keep on rolling - and it certainly did in many respects. The book:
If you thought German policy over the decades was just kind of a void, lurching from the Kaiser and Krupp to the Nazis, this was an interesting take on a certain coherency I wasn't really aware of. (and the so-called "Windsor" family controlling Britain isn't really addressed but ties right in).
It also gets to the filthy schemes of Dutch Prince Bernhard who has been the main mover on Bilderberg since the get-go, a classic Junker German aristocrat, setting up the corrupt corporatist greenwashing front World Wildlife Fund for Nature [sic].
I think we get a lot about bureaucrats, banks and nationalism but the long arc of aristocracy is usually written off from state-side analysis of Europe. While this writeup might be a little bit too 'pat', are there other sources along similar lines looking at long-run aristocrat geopolitical schemes?
HSI is a new directorate within the Immigration and Customs Enforcement service. Formed in September, its agents are responsible for investigating large-scale international crime, such as narcotics or arms smuggling, human trafficking, money laundering and any form of terrorism. They also defend against the illegal appropriation and exporting of technology that is crucial to U.S. security.
"In other words we're looking for illegal activity that is crossing the border into the country or crossing the border out of the country," Pino says.
The HSI Special Response Team serves warrants and apprehends international criminals considered too dangerous for other law enforcement to go up against.
"A lot of these criminal organizations are very well-armed, very well-funded and some of them may come from military backgrounds in their home countries," Pino says.
While its name is new, the response team can be traced to the 1980s, before the Department of Homeland Security existed.
"It started here in Miami, in the old cocaine cowboy days," HSI Special Agent in Charge Mike Shea says. "This is the oldest and best tactical entry team in the country.High-risk entry is the core mission."
HSI consists of more than 10,000 employees, including 6,700 special agents, who are assigned to more than 200 U.S. cities and 47 countries .
A relatively monstrous SWAT style truck leads us to a whole new blob of police state developments, busy hands with little to do and a lot of hardware to do it. It's yet another plateau of mad new security bureaucracy, something in this case I was loosely aware of tectonic plates moving, but a little digging revealed quite a nasty new nucleus. Let's plow in and see what was beta-tested through the willingness of politicians to throw money at repressing immigrants. The results begin with big, black scary trucks. And the biggest intelligence group inside the Department of Homeland Security (DHS), and more. Surprise!
What in the hell is the Special Response Team, why do they have eight of these things? etc. What turns up is an entirely new nasty agency gestating with Immigration & Customs Enforcement, from the burbling mass of confused federal police... a new team emerges. With exciting competitions and lurid ways of guarding the Super Bowl from Terrorist Attack - a National Special Security Event. The wikipedia page outlines the bizarre weave of this particular bureaucratic nucleus. And the List of special response units on the ol Wiki shows a spreading motif -- but this Homeland Security super-swat is perhaps the swattiest of all.
HSI SRT Training to jump off shiny new helicopters to save the Super Bowl in Miami - yayyyy!! (this is why your schools/bridges are crumbling, America, the purposeless authoritarian spectacle at its finest ;)
This recently reorganized, months-old ICE Homeland Security Investigations (formerly known as ICE Office of Investigations) should really be on the radar of anyone because this year they are apparently 'filling in the gaps for the Secret Service' at NSSEs like G20, NATO summits and the Republican and Democratic national conventions. (unfortunately the Secret Service is now a part of DHS, not Treasury.) The Federal Protective Service, which likes to take photos around the Twin Cities (see my 2010 Fort Snelling Undercover Fail video, classic times) is now part of some weird directorate but briefly passed through ICE after being removed from the General Services Administration.
The HSI Special Response Teams are seemingly the top layer of a lot of things, from the war on terror / war on drugs motif, to the Super Bowl, to whatever the hell they are planning to do to immigrants on the I-5 near LA, which was where this pic was taken according to Copblock. ICE has a large number of staff on the Joint Terrorism Task Forces that do statistic-generating police state busywork around the country, and interestingly this HSI group is now officially becoming publicly distinguished from the rest of ICE -- and the theory of course is HSI would be spun out of ICE to become a freestanding 'directorate', a more modern and insane paramilitary FBI or whatever.
I wonder if the Secure Communities biometric collection program which was forced upon all counties in Minnesota, regardless of state & local wishes, would feed citizens' data into HSI.... just like the monstrous truck above, now moving more into the "non immigrant" category of freeform federal police activity. Perhaps they shall do some serious black ops against occupier groups angling to get to the conventions? Nevar!
The Special Agents of HSI use their broad legal authority to investigate and combat a range of issues that threaten the national security of the United Statessuch as strategic crimes, human rights violations, human smuggling, art theft,human trafficking, drug smuggling, arms trafficking and other types of smuggling(including weapons of mass destruction), immigration crimes, gang investigations; financial crimes including money laundering, bulk cash smuggling, financial fraud, and trade based money laundering; terrorism, computer crimes including the international trafficking of child pornography over the Internet, intellectual property rights crimes (trafficking of counterfeit trademark protected merchandise), cultural property crimes (theft and smuggling of antiquities and art), and import/export enforcement issues. HSI special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation. HSI special agents also provide security details for VIPs, witness protection, and support the U.S. Secret Service's mission during overtaxed times such as special-security events and protecting candidates running for U.S. president.
HSI was formerly known as the ICE Office of Investigations (OI). HSI Special Agents have legal authority to enforce the U.S. Immigration and Nationality Act (Title 8), U.S. Customs Laws (Title 19), along with Titles 5, 6, 12, 18 (Federal Criminal Code and Rules), 21 (drugs), 22, 26, 28, 31 (exclusive jurisdiction over Money and Finance investigations), 46, 49, and 50 (War and National Defense) statutes; giving them the broadest federal law enforcement jurisdiction of any agency. HSI has more than 8,500 Special Agents, making it the second largest federal law enforcement and criminal investigative agency within the United States government next to the FBI.
The change of names from ICE OI to HSI was announced in June 2010. Part of the reasoning behind the name change was to better describe the general activities of the agency, and to avoid the uninformed stigma that this agency only investigates immigration-related issues (ex. OI/HSI special agents duties were often mistaken by the public, other LE agencies and the media to mirror ERO agents/officers). HSI does have a public relations problem. Its the second largest investigatory agency, but the general public has never heard of it. ICE held it close to the belt and until recently, didn't publicly make the distinction as TSA does with Federal Air Marshals and CBP does with Border Patrol. In 2012, ICE and HSI have mandated a public distinction be made between both organizations. Most often news reports bury HSI's efforts as "immigrations agents" or as ICE efforts, and frequently Department of Justice and US Attorney's Office press releases of HSI-led investigations get spun up to sound like DOJ or FBI investigations that received assistance from local partners and ICE.
The name change toHSI better reflects that it is the U.S. Department of Homeland Security's primary investigative body, and as a result, its thought that someday it will be pulled out from under the ICE umbrella and stand independent under the DHS. An obscure fact is the original planned name before settling on ICE was the Bureau of Investigations and Criminal Enforcement, but the brothers at the FBI didn't approve and made their complaints heard.
IA is a subcomponent of Homeland Security Investigations (HSI). The Office of International Affairs, with agents in over 60 locations around the world, represents DHS’ broadest footprint beyond US borders. ICE Attaché offices work with foreign counterparts to identify and combat transnational criminal organizations before they threaten the United States. IA also facilitates domestic HSI investigations.
Oh good, the CIA and FBI together at last... (and let's not forget the ICE/DHS network of detention facilities: Detention Facilities official front page- what is the HSI role for something like that applied to - somehow - non-immigrants?)
The ICE Homeland Security Investigations (HSI) directorate is a critical asset in the ICE mission, responsible for investigating a wide range of domestic and international activities arising from the illegal movement of people and goods into, within and out of the United States.
HSI investigates immigration crime, human rights violations and human smuggling, smuggling of narcotics, weapons and other types of contraband, financial crimes, cybercrime and export enforcement issues. ICE special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.
In addition to ICE criminal investigations, HSI oversees the agency's international affairs operations and intelligence functions. HSI consists of more than 10,000 employees, consisting of 6,700 special agents, who are assigned to more than 200 cities throughout the U.S. and 47 countries around the world.
Report suspicious activity. Complete our tip form.....
HSI conducts criminal investigations against terrorist and other criminal organizations who threaten national security. HSI combats worldwide criminal enterprises who seek to exploit America's legitimate trade, travel and financial systems and enforces America's customs and immigration laws at and beyond our nation's borders.
HSI comprises six key divisions:
-National Intellectual Property Rights (IPR) Coordination Center
The official page for the HSI Special Agent in Charge Field Offices of which there are 26:
Homeland Security Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the United States. The SAC offices are responsible for the administration and management of all investigative and enforcement activities within the geographic boundaries of the office. The SACs develop, coordinate, and implement enforcement strategies to ensure conformance with national policies and procedures and to support national intelligence programs. SACs coordinate law enforcement activities with the highest level of Federal, state, and local governments, as well as intelligence organizations and international law enforcement entities. In addition, SACs supervise all administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program is developed.
To efficiently manage their designated geographic regions, SAC offices maintain various subordinate field offices throughout their areas of responsibility, which support the enforcement mission. These subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge (ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing enforcement activities within the geographic boundaries of the office.
SAC Minneapolis/St. Paul
2901 Metro Drive, Suite 100
Bloomington, MN 55425
If you search for 2901 Metro Drive Suite 100 that is the same office for other immigration, ICE & Homeland Security sub-offices.
These guys also have the completely insane National Intellectual Property Rights Coordination Center, a hearty reminder that the kafkaesque nature of what they call "intellectual property" combined with bureaucratic bloatware budget and an aggressively fascist private industry-friendly design, can truly combine to make one of the most awful, yet admittedly bold, authoritarian government logos of all time. Our Partner Agencies — National Intellectual Property Rights Coordination Center
It's almost enough to make you believe that swat teams could control all the memes they want, and even maybe the copy and paste commands too!
These are like a new branch of goons yet to be accounted for: HSI-Intel.
The ICE Homeland Security Investigations Intelligence Office (HSI-Intel) is a robust intelligence force that supports the enforcement needs of ICE’s executive leadership and operational field units.
Cutting edge technology, complex intelligence gathering tools, multifaceted investigative techniques and a high level of professionalism have enabled HSI-Intel to set the standard for federal law enforcement/intelligence agencies.
HSI-Intel also serves as home to the National Incident Response Unit (NIRU). This unit ensures that ICE is prepared to respond to national emergencies or critical events, including natural disasters, disease pandemics and terrorist attacks. NIRU plans for ICE’s continuity of operations before, during and after catastrophic incidents. During these incidents, NIRU serves as the agency’s central communications “nerve center,” coordinating the sharing of information between ICE components and other federal, state and local agencies. .....
HSI-Intel collects, analyzes and shares strategic and tactical data for use by DHS and ICE leadership and operational units. It also supports federal, state, local, tribal and international law enforcement partners.
HSI-Intel’s analysis and targeting information plays a vital role in supporting investigations related to illegal immigration, terrorism, weapons proliferation, war crimes, financial crimes, trade fraud, drug smuggling, human smuggling and trafficking, child sex tourism and other criminal activities.
I am sure they will figure out how all that drug money gets through the Federal Reserve Bank computer systems one of these days.
A ICE Special Response Team (S.R.T.), an elite tactical unit attached to the Department of Homeland Security, deployed to New Orleans equipped with ZensahÂ (http://www.zensah.com/tactical.html) tactical gear. By wearing Zensah moisture wicking tactical clothing, ICE special response team members receive a first line of defense against hazardous conditions found in the Gulf Coast areas affected by Hurricane Katrina.
ICE special response team members are in the affected areas to save lives, to protect lives, and to provide security to the recovery effort. ICEÂs primary objectives are to support authorities in securing New Orleans and other affected communities and to provide security to federal rescue and recovery efforts.
....The ICE Special Response Team is an elite tactical team for the office of investigations under the Department of Homeland Security in Miami, Florida. Duties and responsibilities include search and arrests warrants, maritime interdiction, customs and immigration enforcement. For more information pleas visithttp://www.ice.gov
MOAR GUNS:Tactical-Life.com » THE U.S. ICE MEN: The ICE Special Responders cometh bringing high-speed efficiency and low-drag force as required! "ICE also maintains five additional certified SRT units that are managed by ICE Detention and Operations." ... not sure if they mean 5 or 6 SRTs total. "the U.S. Customs Service evolved into a very progressive and highly successful interdiction and investigative agency. Due to the number of high-risk enforcement actions being executed on a regular basis, the U.S. Customs Service decided to establish a tactical unit called the WETT (Warrant Entry Tactical Team). In time, the U.S. Customs Service changed the name of its tactical team to the Special Response Team."
Another benefit of filling up society with needless paramilitary organizations is random accidental gunfire. Nice. "Roughly 80 ICE-involved shootings were unintentional and often involved agents dropping, cleaning or reaching for their guns, records show. The guns, in many cases, discharged in offices, government vehicles or during target practice. "
[ OKC Tangent. One other note -- In the Oklahoma City case I think Terry Nichols tried to tip off these Homeland Security types to a stash of explosives he'd obtained from FBI-friendly weapons dealer and Contra player Roger Moore. I don't have that info on hand here but it's around (notes on that ). It failed because some mafia guy snitched to the FBI -- the FBI has a pretty careful info cage around Nichols because of the informant-saturated nature of OKC he likes to talk about. This went down in like 2005. (Source of FBI Delay on Terry Nichols Explosives etc) So the idea is if the DOJ/FBI had a specific scheme such as OKC you could get around them through HSI. There's more to all of this, don't have the notes here, but there have been developments in recent weeks, search 'Jesse Trentadue'.. ]
Conclusions? In any case it's good to know who the 'filler goons' are for NSSE campaigns of state-sponsored violence and insanity, of which 3.5 are scheduled for Chicago/Camp David, RNC & DNC this year, (along with the all important national sporting events), and ICE's new spawn HSI and the HSI SRT giant trucks will soon be a fixture at high profile gigs. There were weird Border Patrol Swat types at the 2009 G20 - See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed - BORTAC is that team. And who knows what they might do with good ol' FEMA.
What to expect: HSI's avid effort to become a domestic Swiss army knife of police activity between IRS, CIA and FBI; another layer on the Joint Terrorism Task Force cake and a free-wheeling institution in its own right, combined with a few new flashy PR initiatives (a high profile bust of a little fish or 2 perhaps, etc) in order to carry out the planned 'branding' of HSI.
Perhaps we can just shut it down and use the borrowed debt 'money' we save to be less permanently indebted to the banker police state... borrowed money to build out echelons of mass suppression is always a grim spectacle. Imagine what we could have done with the wasted resources instead. Now we know which new goonsquad will get the biometrics data from Secure Communities.
And of course, who better to 'manage' the war on drugs than the organizational descendant of the 'cocaine cowboys' and the 1980s task forces which helped pass through planeload after planeload of cocaine? That era's keywords, Barry Seal, aviation fronts like Vortex, Southern Air Transport, Evergreen, Polar Air Cross and Air America (some still thriving), operations like AMADEUS, PEGASUS and WATCHTOWER, the quasi-privatized intelligence operations authorized under proclamations like Executive Order 12333 to facilitate the drugs-for-weapons smuggling... those were a few critical points of that era.
What awaits us next? How will HSI deal with the vast scale of financial corruption? What will they do? Who are they going to point the weapons at, and where are the trucks going? Chicago, Charlotte & Tampa... but first, LA, of course. For the immigrants.
While posing as a private charter outfit - "aircraft rental with pilot" is the listing in Dun and Bradstreet - Aero Contractors is in fact a major domestic hub of the Central Intelligence Agency's secret air service. The company was founded in 1979 by a legendary C.I.A. officer and chief pilot for Air America, the agency's Vietnam-era air company, and it appears to be controlled by the agency, according to former employees.
Behind a surprisingly thin cover of rural hideaways, front companies and shell corporations that share officers who appear to exist only on paper, the C.I.A. has rapidly expanded its air operations since 2001 as it has pursued and questioned terrorism suspects around the world.
An analysis of thousands of flight records, aircraft registrations and corporate documents, as well as interviews with former C.I.A. officers and pilots, show that the agency owns at least 26 planes, 10 of them purchased since 2001. The agency has concealed its ownership behind a web of seven shell corporations that appear to have no employees and no function apart from owning the aircraft.
The planes, regularly supplemented by private charters, are operated by real companies controlled by or tied to the agency, including Aero Contractors and two Florida companies, Pegasus Technologies and Tepper Aviation.
....[the Masri rendition flight] ... episode illustrates the circumstantial nature of the evidence on C.I.A. flights, which often coincide with the arrest and transporting of Al Qaeda suspects. No public record states how Mr. Masri was taken to Afghanistan. But flight data shows a Boeing Business Jet operated by Aero Contractors and owned by Premier Executive Transport Services, one of the C.I.A.-linked shell companies, flew from Skopje, Macedonia, to Baghdad and on to Kabul on Jan. 24, 2004, the day after Mr. Masri's passport was marked with a Macedonian exit stamp.
Son of Air America: Aero appears to be the direct descendant of Air America, a C.I.A.-operated air "proprietary," as agency-controlled companies are called.
Just three years after the big Asian air company was closed in 1976, one of its chief pilots, Jim Rhyne, was asked to open a new air company, according to a former Aero Contractors employee whose account is supported by corporate records.
.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.
On closer examination, however, it becomes clear that those companies appear to have no premises, only post office boxes or addresses in care of lawyers' offices. Their officers and directors, listed in state corporate databases, seem to have been invented. A search of public records for ordinary identifying information about the officers - addresses, phone numbers, house purchases, and so on - comes up with only post office boxes in Virginia, Maryland and Washington, D.C.
But whoever created the companies used some of the same post office box addresses and the same apparently fictitious officers for two or more of the companies. One of those seeming ghost executives, Philip P. Quincannon, for instance, is listed as an officer of Premier Executive Transport Services and Crowell Aviation Technologies, both listed to the same Massachusetts address, as well as Stevens Express Leasing in Tennessee.
No one by that name can be found in any public record other than post office boxes in Washington and Dunn Loring, Va. Those listings for Mr. Quincannon, in commercial databases, include an anomaly: His Social Security number was issued in Washington between 1993 and 1995, but his birth year is listed as 1949.
Mr. Glerum, the C.I.A. and Air America veteran, said the use of one such name on more than one company was "bad tradecraft: you shouldn't allow an element of one entity to lead to others."
WASHINGTON — When Hajji Juma Khan was arrested and transported to New York to face charges under a new American narco-terrorism law in 2008, federal prosecutors described him as perhaps the biggest and most dangerous drug lord in Afghanistan, a shadowy figure who had helped keep the Taliban in business with a steady stream of money and weapons.
But what the government did not say was that Mr. Juma Khan was also a longtime American informer, who provided information about the Taliban, Afghan corruption and other drug traffickers. Central Intelligence Agency officers and Drug Enforcement Administration agents relied on him as a valued source for years, even as he was building one of Afghanistan’s biggest drug operations after the United States-led invasion of the country, according to current and former American officials. Along the way, he was also paid a large amount of cash by the United States.
Meanwhile the Federal Aviation Administration concedes that its recordkeeping on more than a hundred thousand aircraft is totally hosed. This is amusing because the FAA was from the beginning set up this way to enable the rich and powerful to use small aircraft for protected criminal conspiracies. It has always been trivial for them to use shell companies and various dead-end forms of paperwork magic to hide direct ownership of drug trafficking planes. A state employee spelled a lot of this out for me, as if it were almost common knowledge.
Evergreen, Polar Air Cross, Air America, Civil Air Transport, the Flying Tigers, L3, Titan, Skyway Aircraft, Vortex, these are just a few of the classics from then and now. AIG had tons of aircraft and got its start by insuring drug planes around Asia quite a bit.
Contractors are allowed to import as much drugz as they want, and they are able to routinely use special bypasses inside airports. For example Evergreen was frequently able to get the keys to the 'sterile corridors' at JFK Airport which let them circumvent Customs. These kinds of criminal conspiracies are what the National Security Act of 1947 is all about.
NEW YORK (AP) — The chairman of the Senate subcommittee overseeing aviation said Friday he would recommend holding congressional hearings on aircraft registration after The Associated Press reported the Federal Aviation Administration was missing data on one-third of U.S. planes.
"We need to find out why, and how it can be brought back to have a registry that has credibility," said North Dakota Sen. Byron Dorgan, a Democrat.
The FAA says as many as 119,000 of the 357,000 U.S.-registered aircraft have "questionable registration" due to missing paperwork, invalid addresses and other paperwork problems.
In reports in 2007 and 2008, the agency warned that the gaps were causing loopholes that terrorists, drug traffickers and other criminals might exploit. Law enforcement agencies were increasingly turning to the FAA for information, and the registry needed more accuracy as the government launched new computer systems to track suspicious flights, it said.
On Friday the FAA said it was taking "proactive steps" to clean up the database by requiring all aircraft owners to re-register their planes over the next three years.
"The agency is moving to a mandatory re-registration system like the ones most states use to register automobiles, so we have more current and complete registration information in our database," the agency said.
Dorgan's counterpart in the House of Representatives, Rep. Jerry Costello, D-Ill., said Friday the FAA needs to improve its recordkeeping but stopped short of calling for hearings.
"Given the security issues at stake, revising and modernizing the registration process is necessary," Costello said in a written statement. "The FAA needs to ensure the re-registration process runs as smoothly as possible and that the maintenance of records is improved, and I believe the FAA is proceeding accordingly."
Both congressmen will soon be stepping down from their leadership roles in the aviation committees. Dorgan is retiring in January, and Senate leaders have not yet chosen a new committee chair.
Costello, a Democrat, will lose the post when Republicans take control of the House in January. His likely replacement, Rep. Tom Petri, R-Wis., was unavailable for comment on Friday, a spokeswoman said.
Until now, aircraft owners were only required to register once, when they purchased an aircraft. Errors accumulated over decades as new purchasers forgot to register, owners died, invalid addresses went uncorrected and junked aircraft went unreported, the FAA says.
In addition to law enforcement purposes, the FAA said it uses the database to contact owners about safety problems and locate planes that go missing.
Pilot groups said the outdated registry was not a security risk, noting the United States has other safeguards against terrorism.
The Transportation Security Administration does background checks on student pilots from other countries, air traffic controllers watch for suspicious flights, and the Department of Homeland Security has launched new computer systems to screen aircraft arriving from other countries.
EVERGREEN 0WNZ TEH CHEMTRAIL OPS IN GULF!
Photo of fire suppressant-equipped plane from Evergreen
I got a kick out of a pretty interesting expose about Evergreen, which is a massive CIA cutout corporation created because the Church Commission was flushin' out a lot of covert ops. Evergreen's planes, many C-130s, were supposedly under the control of the US Forest Service for firefighting purposes, hence the tree name metaphor.
On Feb 18, 2010 NotForSale from the Intel Hub interviewed a whistleblower employed as a private contractor at an Evergreen Air facility. The information he provided was mind blowing. Never before had a whistleblower came forward about this top secret facility located in the Arizona desert north of Tucson. In the interview the whistleblower described how the facility is heavily secured by well armed personnel. During his time at the facility he was involved in retro fitting 727 and 747-c aircraft with liquid discharge tanks and aerosol sprayer devices. He has also confirmed reports of triangular black jets at the facility as well during his time there in the early 1990’s. It is also important to note that the facility owns fully functional warbirds that have been fully restored from WWII, where all of the weapon systems and bomb bay doors are operable on the craft. This type of craft is not authorized by civilian, public or private use within the U.S. This would indicate that Evergreen Air is indeed a CIA operation. The Whistleblower has also heard there is an underground base at the facility and confirms there is a possible “Black Helicopter” base on site as well.Note: Evergreen Air also specializes in unmanned aerial drones.
It is claimed that Mr Defreitas, 63, a naturalised US citizen born in Guyana, told the informant that he wanted to attack the airport because in the early 1990s he had seen missiles being shipped to Israel while he was working for Evergreen International Aviation.
Nibbles from LewRockwell.com - William Norman Grigg:
“The CIA has always been involved in drug smuggling, and Evergreen or Air America has played a big role in it,” Kleiman told me in a recent phone interview. “When I was working Customs at JFK, we had this huge problem with airline personnel using their secure keys to give unauthorized access to 'sterile corridors' that bypassed Customs inspection. Quite often this involved drug smuggling, and I've got ample reason to believe that Evergreen and other CIA assets were involved in it.”
Is possibly the largest Aviation and logistics company which is a major front for Government Black Ops. Also possibly the company responsible for the so-called Chemtrails Flights. Read what I have to say....
I have worked in a number or different aviation related jobs at a handful of airports over the past 15 years. I worked for FedEx for a few years as well as had direct contact with Evergreen Aviation and their employees.
The USPS (United States Postal Service) contracts all of the USPS Express mail, airmail, and overnight types of USPS services to FedEx because of the FedEx Express air logistics network which always has connecting overnight aircraft.
Evergreen Aviation is contracted by the USPS to pick-up the USPS shipments from FedEx. Evergreen Aviation then sorts the deliveries and USPS trucks pick-up the sorted deliveries and takes them to the individual post offices.
This system offers the perfect opportunity for a government run package logistics cover operation. Any airport which handles USPS can therefore be used to ship secret government shipments of ANYTHING (weapons, drugs, secret equipment, tech, documents, bombs, use your darkest imagination).
Also because the USPS is operated within the government the situation allows very easy financial back-scratching both ways and makes it easy to cover it up using and a combination of methods such as contracts, special accounts, and fake front companies to pay for the shipments. Just imagine how easy it would be for a guy in a suit to show up at a post office in Washington D.C. with a package and ship it overnight via the USPS and pays a huge amount for the service using a front-company government black-budget credit card to pay for it.
At my job with FedEx at two different airports, both times FedEx had this relationship with Evergreen Aviation. They would pick up the containers filled with USPS Express shipments from FedEx once we unloaded our FedEx aircraft. Then later, Evergreen would bring back outbound shipments for us to load on outbound FedEx aircraft.
I noticed a consistency with Evergreen Aviation at both locations: Their equipment and personnel were substandard. But from what I heard they were paid very well and had great benefits. This also sounds like a government operation: Contract work which is over-budgeted overpaid employees, equipment which is poorly maintained, and employees who don’t ask questions.
And check it their website even promotes Weather Modification!
We can't touch this topic without referencing MadCowProd.com and Daniel Hopsicker, who was all up in the business with schemes like the massive Wachovia/Wells Fargo giga-moneylaundering conspiracies for years. Hopsicker has had to spend a lot of time on Venice, Florida, from whence the 9/11 flight trainer conspiracy and various other weird things have emerged. Supporting Hopsicker is worthwhile because as he sez: "Today’s Drug Lords don’t look like Tony Montana in “Scarface,” but preppy Yale and Harvard-educated scions of America’s traditional political elite, which in point of fact is what that they are."
"It would be important for this task force to have access to records of the Federal Reserve and the central banks of cooperating nations to find out which financial institutions are depositing large amounts of American dollars. (If investigators had had such access years ago, it would have been easy for them to see the billions in currency that Wachovia was shipping from Mexico.) By getting access to wire systems operated by the Fed and the Society for Worldwide Interbank Financial Telecommunication, investigators could also identify and track the accounts for which banks convert cash into wire transfers. Here again, the information should be added to the database. Eventually, all this collected data could reveal a pattern of activity that would point to dirty bankers and businessmen."
plz forgive this allcaps moment: ^^ A CLEAR ENOUGH EXPLANATION WHY EVERYTHING IS A SCAM &/OR FARCE?!
Great post back on Sept 12 in NYT - Really excellent stuff that should not be ignored... speaks to the federal corrupt system at many levels. It boggles my imagination to consider the level of criminal indifference required to hide this all these years. See earlier - Barclays Bank criminal banking operations.
Robert Mazur, a former federal agent, is the author of “The Infiltrator,” a memoir about his undercover life as a money launderer. He is the president of a private investigative agency.
LAST month, a federal district judge approved a deal to allow Barclays, the British bank, to pay a $298 million fine for conducting transactions with Cuba, Iran, Libya, Myanmar and Sudan in violation of United States trade sanctions. Barclays was discovered to have systematically disguised the movement of hundreds of millions of dollars through wire transfers that were stripped of the critical information required by law that would have enabled the world to know that for more than 10 years the bank was moving huge sums of money for enemy governments. Yet all federal prosecutors wanted to settle the problem was a small piece of the action.
How preposterous. Banks can commit crimes only through the acts of their employees. Federal law enforcement agencies are simply failing to systematically gather the intelligence they need to effectively monitor the crime.
The Barclays deal was just one in a long line of wrist slaps that big banks have recently received from the United States. Last May, when ABN Amro Bank (now largely part of the Royal Bank of Scotland) was caught funneling money for the benefit of Iran, Libya and Sudan, it was fined $500 million, and no one went to jail. Last December, Credit Suisse Group agreed to pay a $536 million fine for doing the same. In recent years, Union Bank of California, American Express Bank International, BankAtlantic and Wachovia have all been caught moving huge sums of drug money, but no one went to jail. The banks just admitted to criminal conduct and paid the government a cut of their profits.
Wachovia alone had moved more than $400 billion for account holders in Mexico, $14 billion of which was in bulk currency that had been driven in armored cars or flown to the United States. Just who in Mexico did anyone think had that kind of cash? Of course, the government did a thorough investigation but could find no individuals responsible.
Bankers are escaping prosecution because law enforcement is failing to expose the evidence that some bankers market dirty money. Years after the transactions occur, any effort to prove what was known at the time is practically impossible. The bankers simply say they didn’t know where the money came from. Naturally, prosecutors look for ways to get around trying to prosecute those sorts of cases, and instead make deals.
It should be up to law enforcement agencies to bring prosecutors solid proof of what the bankers knew and said at the time they knowingly handled ill-gotten money. This is not difficult, only time-consuming.
In the 1990s, while I was a federal agent working to gather evidence against Colombian drug cartels, I spent a year and a half building a sophisticated undercover identity as a money launderer, with the help of a half-dozen informants and concerned citizens. Then, for the next two and a half years, I infiltrated the highest levels of one cartel and began dealing with their banking contacts. I recorded hundreds of conversations behind boardroom doors with sophisticated international bankers.
They readily gave me access to all the tools of their trade, starting with lawyers who knew how to create offshore corporations for crooks in places like Panama, Hong Kong, the British Virgin Islands and Gibraltar. The bankers also provided secret safe deposit boxes abroad, and arranged for currency to be shipped in safes to places like Dubai and Abu Dhabi, where large cash deposits are not recorded. My money could then be repatriated to the United States disguised as offshore loans. Account details were whispered in secret meetings so that paper never crossed borders. And any records sought by any government could simply be destroyed.
The evidence I gathered led, in the early 1990s, to the demise of the Bank of Credit and Commerce International, the seventh largest privately held bank in the world, and Capcom, a multinational commodities trading company. More important, it put a slew of bankers behind bars and got their tongues wagging, so much so that we learned where Manuel Noriega, the former Panamanian general, had hidden his fortune in payoffs from Colombian cartel leaders.
Revenues from global drug trafficking — estimated to add up to more than $400 billion a year — are just one small component of the money, known as flight capital, that criminals try to hide from governments. This capital also includes proceeds from things like tax evasion, trade with countries under sanctions and arms dealing. It’s big business. The desire to have a share in this business has led the private client divisions of many international banks to develop sophisticated skills to avoid scrutiny from regulators.
Tracking and confiscating the fortunes of terrorist organizations, drug cartels and organized criminals is important for national security, and yet no single federal law enforcement agency systematically investigates the international bankers and businessmen who launder this money. What’s needed is a small but elite multi-agency task force, including representatives of the intelligence community and accomplished members of law enforcement agencies from other nations, that could identify the institutions and businesses that handle the bulk of the dirty money flowing around the globe. A task force numbering 100 people or less, at least initially, could compile a database containing detailed information about bad banks and money launderers.
Some of this data could be culled from the various law enforcement agencies’ existing files. But investigators should also debrief the hundreds of high-level criminals now being held in our prisons to get detailed information about their allies in the banking and business community.
The task force should also try to identify every asset used by major criminal and terrorist organizations. If one of them buys a million-dollar airplane, for example, investigators should find out where the money to buy it came from. All this information should be kept in the same database.
It would be important for this task force to have access to records of the Federal Reserve and the central banks of cooperating nations to find out which financial institutions are depositing large amounts of American dollars. (If investigators had had such access years ago, it would have been easy for them to see the billions in currency that Wachovia was shipping from Mexico.) By getting access to wire systems operated by the Fed and the Society for Worldwide Interbank Financial Telecommunication, investigators could also identify and track the accounts for which banks convert cash into wire transfers. Here again, the information should be added to the database. Eventually, all this collected data could reveal a pattern of activity that would point to dirty bankers and businessmen.
To make use of this intelligence, undercover agents from around the world should be trained and equipped with the tools needed to infiltrate the banking and business community. Working with the information in the database, they could inflict a devastating blow to the fortunes of the underworld and its money launderers. Finally, the government would be able to prosecute the people personally responsible for laundering billions of dollars worth of criminal profits.