PSYOPS

Exclusive: National Security Agency to spy on Boston for 2024 Olympics in National Special Security Event SIGINT Spectacular, Snowden leak shows

nsa-olympics-spying.jpg

Most people have no idea that the National Security Agency gets involved in big events like national political conventions and the Olympics: National Special Security Events (NSSEs) with security led by the Secret Service, which is now a part of the Department of Homeland Security.

This was apparently overlooked until now: the National Security Agency lists one of its top level "strategic missions" as getting involved with NSSEs such as the Olympics, according to a file published by the NY Times in Nov 2013 and attributed to Edward Snowden. See also: Olympics in Boston would require an unprecedented security effort - Boston Globe (Jan 15)

Many ideas taken for granted - including the separation of military and civilian life within the US - evaporate in NSSEs. Many, many federal agencies send little teams, including advanced military intelligence.

Header_Logo.pngI had only recently rejoiced that the 2016 Democratic National Convention wouldn't land in Minneapolis. The new crowd running Minneapolis actually saw the light there. These giant spectacles are a huge diversion of focus, don't help cities achieve their goals, at a vastly inflated expense, while compromising the rights of city residents. Many opponents are acting including No Boston Olympics and NoBoston2024 | Independent voices of Boston area residents opposed to the Boston 2024 Olympic bid.

This is apparently the first time that it has been really noted the NSA's director in 2007 officially stated that NSSE's are strategic missions. This in turn means that the NSA must have had *some* role at the 2008 Republican National Convention in Minneapolis. (see our RNC documentary Terrorizing Dissent here & RNC08Report for docs) More background below the doc fulltext.

It's hard to overstate the nasty, elitist, disruptive effects of the Olympics. As a new resident of Boston, the unfortunate news that the 2024 Olympics now has this city in its crosshairs is disappointing & fear inducing. After all I ran into (at least) four FBI informants because of the 2008 RNC, gassed & shot at by the authorities.

2829703418_1958b3785c_b.jpg

2008 RNC memories - Photo Creative commons by Nigel Parry @flyingmonkeyair - src

I am publishing almost the whole document here except for the short page 2, as it is annoyingly difficult to locate online anyway. There are a lot of typos in the Optical Character Recognition, oh well.. See a little earlier coverage: Top Level Telecommunications: NSA's Strategic Mission List and Report: S. Korea key intelligence target for US eavesdropping - Zoom in Korea | Zoom in Korea (Nov 2013).

SOURCE: https://www.eff.org/files/2013/11/15/20131104-nyt-sigint_goals.pdf

/////

United States SIGINT System January 2007 Strategic Mission List

Introduction - Director’s Intent

(S//SI) The SIGINT Strategic Mission List represents the intent of the Director, National Security Agency in regard to mission priorities and risks for the United States S1G1NT System (USSS) over the next 12-18 months The list is derived from review of the Intelligence Community National Intelligence Priorities Framework, DC1/DNI Guidance, the Strategic Warning List, National SIGINT Requirements Process (NSRP) and other strategic planning documents The missions included on the list are in relative priority order and represent the most urgent tasks for the USSS The list is not intended to be all encompassing, but is intended to set forth guidance on the highest priorities.

Topical Missions and Enduring Targets

(S//S1) The SIGINT Strategic Mission List is divided into two parts. It includes 16 critical topical missions in Part I of the list, which represent missions discerned to be areas of highest priority for the USSS, where SIGINT can make key contributions. In addition to the 16 critical topical missions, Part U of the SIGINT Strategic Mission List includes 6 enduring targets that are included due to the need to work these targets holistically because o f their strategic importance. In addition to their long-term strategic importance, the enduring targets can potentially "trump" the highest priority topical missions on the list at any time, based upon evolving world events. Elements o f these targets are also represented throughout the topical target sets. For each of the 16 topical missions and each of the 6 enduring targets the Strategic Mission List includes:

1) Focus Areas - critically important targets against which the SIGINT enterprise is placing emphasis. DIRNSA designation of a target as a focus area constitutes his guidance to the SIGINT System that it is a "must do” target for that mission
2) Accepted Risks strategically significant targets against which the USSS is not placing emphasis and for which SIGINT should not be relied upon as a primary source. DIRNSA's reasons for accepting these risks include high difficulty and lack of resources or as an “Economy of Force Measure,” in order to achieve focus on the most critical targets

A Strategic Investment Tool for SIGINT Resources

(S//S1) Given a finite level of resources available in all mission areas, the Strategic Mission List provides high-level strategic direction to the global SIGINT system to focus resources on the most important/highest priority areas. “Risks” identify targets that cannot be resourced to the level of a Focus Area, thereby acknowledging that shortfalls will exist. As world circumstances change, these or other targets can be added to the list as needed, targets no longer of critical importance can also be removed from the Focus Area category. In addition, other targets, not listed as focus or risk areas, can also be wrorked by the USSS to a lesser degree to meet other customer requirements. The Strategic Mission List will be reviewed bi- annually by the USSS Signals Intelligence leadership Team Missions. Focus areas, and Accepted Risks will be adjusted as a means of providing high-level steerage to the Nation’s agile SIGINT System.

[….]

United States SIGINT System Strategic Mission L ist- January 2007

(U) I. Strategic Mission List - Topical Missions

(S//S1) A. MISSION: Terrorism: Winning the Global War on Terrorism. Focus Areas:

a. All Interagency Intelligence Committee on Terrorism (I1CT) Tier 0 and 1 terrorist groups with capabilities and intentions to attack the US, its interests or allies, or groups actively planning or carrying out a terrorist attack against U.S. persons, facilities, or interests

b. Key individuals and Terrorist Support Entities (TSE) involved in the facilitation, financing, and recruitmentorradicalizationofallIICT Tier0and 1terroristgroupnetworksglobally.

Accepted Risks: All IICT Tier 2,3, and 4 terrorist groups, and TSEs.

(S//S1) B. MISSION: Homeland Security: Protecting the U.S. Homeland from terrorist attack and other transnational threats to safeguard U.S. persons, freedoms, critical information, infrastructure, property and economy.
Focus Areas:

a Border Security (land, air, sea).
b. Direct defense against terrorist attack.
c. Diseases, epidemics, and pandemics.
d. Executive Protection/U.S.-Based NSSEs
e. Illicit Facilitation as it relates to special interest aliens and CBRN materials and technology

Accepted Risks:

a Accepted risks as stated in the “Terrorism” mission.
b. Global coverage o f all illicit activities of potential concern to the Homeland.

(S//SI//REL USA, AUS, CAN, GBR) C. MISSION: W M P and CBRN Programs and Proliferation: Combating the Threat of Development and Proliferation of Weapons of Mass Destruction, CBRN, and Delivery Methods (particularly ballistic and nuclear-capable cruise missiles).
Focus Areas:

a. Development, Acquisition, or Use of CBRN.
b.State W'MD and ballistic and cruise missile programs of:

China (biological, chemical, nuclear, ballistic and cruise missiles) India (nuclear, ballistic missiles)
Iran (biological, chemical, nuclear, and ballistic missiles)
North Korea (biological, chemical, nuclear, ballistic missiles) Pakistan (nuclear, ballistic missiles)

Russia (biological, chemical, nuclear, ballistic and cruise missiles)

Syria (chemical, nuclear, ballistic missiles).
c.W MD and missile proliferation activities by states:

China (nuclear, ballistic missiles), Israel (cruise missiles) North Korea (nuclear, ballistic missiles)

Pakistan (nuclear, ballistic missiles)

Russia (ballistic missile).
d.W.MD and missile acquisition activities by states:

China (cruise missiles)
India (cruise missiles)
Iran (nuclear, ballistic missiles)
Pakistan (cruise missiles)
Saudi Arabia (nuclear, ballistic missiles).

e.Safety and Security ofWMD: Pakistan (nuclear)
Russia (nuclear).

Accepted Risks:
State WMD and ballistic and cruise missile programs of: Egypt (ballistic missiles)
Libya (ballistic missiles)
Taiwan (ballistic missiles).

(S//S1) D. MISSION: U.S. Forces at Risk (Military Support): Protecting U.S. Military Forces Deployed Overseas and Enabling their Operations.
Focus Areas:

a. U.S. forces deployed in: Iraq. Afghanistan. Mideast Region. Korea, and Philippines.
b. Support to military planning and operations: Support to OPLAN 5027 (Korea).
c. Intentions of foreign and indigenous anti-coalition forces, command and control. OOB, and

operational support in Iraq and Afghanistan.
d. Support to U.S. forces in identification of HVTs in Afghanistan/ Pakistan and Iraq

Accepted Risks:

a Protection of U S forces deployed in: Balkans (Kosovo),
b South Korea leadership intentions in OPLAN 5027.
c Routine military support to U.S. forces deployed in non-combat situations.

(S//S1) E. MISSION: State/Political Stability: Providing Warning of Impending State Instability. Focus Areas:

a. Internal political activities that could threaten the survivability of leadership in countries where US has interest in regime continuity Iraq, Afghanistan, Pakistan, and Saudi Arabia.

b. Internal political activities that could result in crisis in. North Korea, Sudan/Dafur humanitarian crisis. Cuba, Kosovo, Turkey, Nigeria, Lebanon, Venezuela, Syria, Bolivia, Latin American Bolivarian Developments, and Palestinian Authority.

Accepted Risks: Internal political stability of: Egypt, Zimbabwe, Cote d'Ivoire, Liberia, DROC, Bangladesh, Georgia, Jordan, and Haiti.

(S//SI) F. MISSION: Warning of Strategic Nuclear Missile Threats: Providing Warning of a Strategic Nuclear Missile Attack on the territory of the 50 United States.
Focus Areas: Areas covered under a peacetime SIGINT strategy maintaining full capabilities with reasonably sufficient coverage for the provision of warning include: Russia's Nuclear C3, Mobile

ICBMs, strategic navy missiles, and Bombers; China's Nuclear C3, Mobile ICBMs, and SSBNs; and North Korea's Nuclear C3 and potential ICBM (TD-2) Threat.
Accepted Risks: Strategic Targets where SIGINT is not a primary intelligence source in providing warning: Russia's Silo-based ICBMs; China's Silo-based ICBMs.

(S//SI) G. MISSION: Regional Conflict and Crisis/Flashpoints to War: Monitoring Regional Tensions that Could Escalate to Conflict/Crisis.
Focus Areas:
Regional flashpoints that could pose a significant threat to U.S. strategic interests: Arab,Iran-Israel conflict, Korean Peninsula, China-Taiwan, India-Pakistan, Venezuela (impact on surrounding region), and Russia/Georgia.

Accepted Risks: Regional flashpoints in: Ethiopia-Eritrea and Africa Great Lakes Region

(S//REL USA. AUS. CAN, GBR. NZL) H. MISSION: Information Operations: Mastering Cyberspace and Preventing an Attack on U.S. Critical Information Systems.
Focus Areas:

a (S//SI) Enabling Computer Network Defense (CND): Provide cyber threat warning, detection, characterization, and mitigation services for U.S. and allied computer network operators: Named Intrusion Sets (Including, but not limited to Gadget Hiss. Seed Sphere/Byzantine Trace. Makers Mark. Byzantine Candor), New intrusions.

b. (S//REL USA, AUS, CAN. GBR, NZL) Enabling Computer Network Attack (CNA): Deliver intelligence, access, and dual-use capabilities in support of U.S. computer network attack objectives. c. (S//SI) Foreign Intelligence Serv ices' Cyber Threat Activities: Deliver intelligence on the capabilities.

vulnerabilities, plans and intentions o f foreign actors to conduct CNO against USG networks and those of interest to the USG. Identify what Foreign Intel Services know about USG capabilities, vulnerabilities, plans and intentions to conduct CNO: China, Russia, Iran, and al-Qa'ida

d (S//SI) Enabling Electronic Warfare (EW): Provide cognizance ofthe EM environment, signal detection/geolocation, and characterization through intelligence (ELINT. COMINT, Tech SIGINT) and other technical means to U.S. EW planners and operators: China. Russia, Iran, Iraq/Afghanistan (IED's) and North Korea.

e. (S//SI) Enabling Influence Operations: Support U.S. military deception (MILDEC) and psychological operations (PSYOP), and inter-agency Strategic Communication objectives to influence target behavior and activities: Terrorist groups. China. North Korea. Iran, and Venezuela.

Accepted Risks:

a. Enabling CND: Isolated malicious activity that could pose a serious threat.
b. Enabling CNA.
c. FIS Cyber Threat: France, Israel, Cuba, India, and North Korea.
d. Enabling EW: (producers.'’prolifcrators): Sweden, Japan. Germany, Israel, and France, e Enabling Influence Operations: Pakistan and Russia.

(S//SI) I. MISSION: Military Modernization: Providing Early Detection ofCritical Developments in Foreign Military Programs.
Focus Areas:

b. Activities of state and non-state actors (gray arms dealers) in supplying advanced conventional weapons.

c. Threats posed by foreign space and counter-space systems: China and Russia Accepted Risks:

a Weapons and force developments in: Saudi Arabia, and India
b Threats posed by foreign space and counter-space systems India and France

(S//SI) J. MISSION: Emerging Strategic Technologies: Preventing Technological Surprise.
Focus Areas:
Critical technologies that could provide a strategic military, economic, or political advantage: high energy lasers, low energy lasers, advances in computing and information technology, directed energy weapons, stealth and counter-stealth, electronic warfare technologies, space and remote sensing, electro-optics, nanotechnologies, energetic materials The emerging strategic technology threat is expected to come mainly from Russia. China. India, Japan. Germany, France. Korea. Israel, Singapore, and Sweden.

Accepted Risks: Technological advances and/or basic S&T development on a global basis elsewhere.

(S//S1) K. MISSION: Foreign Policy ((includes Intention of Nations and Multinational Orgs)): Ensuring Diplomatic Advantage for the US.
Focus Areas:
Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could significantly impact U.S. national security interests: China, Russia, France, Germany, Japan. Iran. Israel. Saudi Arabia, North Korea, Afghanistan. Iraq. UN, Venezuela, Syria. Turkey, Mexico, South Korea, India and Pakistan.

Accepted Risks: Positions, objectives, programs, and actions on the part of governments or multilateral organizations that could impact U.S. foreign policy or security interests: Taiwran.

(S//SI) l~ MISSION: Energy Security: Ensuring a Steady and Reliable Energy Supply for the US. Focus Areas: Threats to the production and global distribution/transportation of energy supplies of: Iraq, Saudi Arabia, V enezuela, Iran, Russia and Nigeria. Accepted Risks: Global impact o f the state o f energy industries in: Mexico and China.

(S//SI) M. MISSION: Foreign Intelligence, Counterintelligence; Denial & Deception Activities: Countering Foreign Intelligence Threats.
Focus Areas:
Espionage/intelligence collection operations and manipulation/influence operations conducted by foreign intelligence services directed against U.S. government, military', science & technology and Intelligence Community from: China, Russia, Cuba, Israel, Iran, Pakistan, North Korea. France. Venezuela, and South Korea

Accepted Risks: Espionage'intelligence collection operations against U.S. government, military, science & technology and Intelligence Community from: Taiwan and Saudi Arabia

(S//S1) N. MISSION: Narcotics and Transnational Criminal Syndicates and Networks: Mitigating the impact on U.S. national interests from drug trafficking organizations (DTOs) and transnational criminal syndicates and networks (TCSNs).
Focus Areas:

a. DTOs and associated enabling activities in Afghanistan, Mexico and Colombia that threaten U.S.interests.

b.TCSNs based in (or originating in) Russia that threaten U.S. or allied interests.

c. Money laundering that benefits TCSNs within, into, and out of Colombia and Mexico.

d. Criminal facilitators acting as a nexus between crime/narcotics and terrorism.

e. State-sponsored money laundering by Iran and North Korea. Accepted Risks:

a Drug production/trafficking within the Golden Triangle, China, and North Korea b. TCSNs operating in Central Asia, former Eastern Europe, and Asia,
c Criminal associated money laundering in Afghanistan, and Iraq.

State-sponsored money laundering by Syria.

(S//S1) O. MISSION: Economic Stability/Influence: Ensuring U.S. Economic Advantage and Policy Strategies.
Focus Areas:
Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: China, Japan, Iraq, and Brazil.

Accepted Risks: Economic stability, financial vulnerability, and economic influence of states of strategic interest to the US: Turkey and India.

(S//S1) P. Mission: Global Signals Cognizance: The core communications infrastructure and global network information needed to achieve and maintain baseline knowledge. Capture knowledge of location, characterization, use, and status of military and civil communications infrastructure, including command, control, communications and computer networks: intelligence, surveillance, reconnaissance and targeting systems; and associated structures incidental to pursuing Strategic Mission List priorities. Focus of mission is creating knowledge databases that enable SIGINT efforts against future unanticipated threats and allow continuity on economy of force targets not currently included on the Strategic Mission List. Focus Areas:

Global Environment knowledge Signals knowledge.

Network knowledge.

Target knowledge.
Accepted Risks: Degree of maturity may greatly vary by target

(U) II. Strategic Mission List - Enduring Targets

(S//S1) A. MISSION: China: Enabling U.S. policy and avoiding strategic surprise. Focus Areas: Provide U.S. decision makers with a holistic SIGINT perspective oftrends and developments in China, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U.S. interests. Such analysis must consider China’s strategic foreign and economic policy trends that impact U S. interests or degrade U.S. influence, the pace, scope, doctrine, and economic sustainability of China’s military modernization, the proliferation of PRC weapons and technology; the prospects for regional conflict or strategic nuclear attack; domestic economic transformation and its consequences for economic, political, and social stability'; subversive threats to U.S. institutions through hostile intelligence and information operations, and the interdependencies among these developments Accepted Risks: Certain domestic problem sets, such as demographic issues; lower-level political institutional growth; civil society' issues such as crime and human rights; environmental problems and planning; and agricultural production and food security'. Also, issues that transcend national boundaries, such as Chinese involvement in international organized crime; energy demand, production, and acquisition; and infectious disease and health.

(S//S1) B. MISSION: North Korea: Enabling the US to counteract North Korea’s development/use/proliferation of WMD, deter its aggression, and shape its behavior while maintaining U.S. readiness for collapse/war. Focus Areas: Provide U.S. decision-makers with a holistic SIGINT perspective of trends and developments in North Korea, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S interests and provide warning o f strategic threat. Such analysis must consider the stability of the North Korean regime and how it employs domestic and foreign policies to maintain its grip on power; the relationship between regime stability/behavior and its access to income from illicit activities and weapons proliferation; how Chinese and South Korean “carrots and sticks” enable or constrain North Korean behavior; the impact of the decaying North Korean economy on military' readiness; and how the interplay between U S policy initiatives toward North Korea and all of the above elements affect North Korea’s strategic calculus, the material disposition of its nuclear weapons, and the status of its military Accepted Risks: For domestic issues, risks include non-defense oriented industrial production, demographic issues, and environmental problems. Regarding issues that transcend borders, risks include non-counterintelligence associated ties between North Korean state- sponsored illicit activities and international organized crime institutions and individuals; North Korean agent activity in South Korea and Japan; non-state sponsored corruption and illicit behavior; and North Korean economic refugee flows into China

(S//S1) C. MISSION: Iraq: Enabling Coalition efforts to assist Iraq in establishing a secure, unified, democratic, and sovereign state. Focus Areas: Provide U S decision makers with a holistic SIGINT perspective of trends and developments, assessing Iraq’s progress toward establishing a viable, stable government; securing public order, suppressing insurgent opposition, ensuring reliable access to basic services and commodities; safeguarding strategic resources; and restoring a more sound economic footing. Provide intelligence on relevant factors, forces, leaders, and regional actors to facilitate U.S. Governmentpolicy or actions in support of the Iraqi process and to seize the strategic communications initiative.

Accepted Risks: none

(S//S1) D. MISSION: Iran: Enabling policymakers in preventing Iran from achieving its regional dominance objectives and pursuing policies that impact U.S. global interests. Focus Areas: Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U.S. interests. Assess Iran's foreign policy trends and leadership intentions that impact U.S. interests or degrade U.S. influence. Provide warning of Iran's capability to produce a nuclear weapon or its plans to use terrorist surrogates to attack Israel or U.S. forces and interests Assess the regime's progress in initiatives that enhance its pursuit of regional power objectives in the political, economic, energy, and religious or ideological arenas

Provide indicators of regime stability and/or susceptibility to democratic reform initiatives Accepted Risks: Efforts to ascertain the scope of Iran's narcotics'organized crime elements and economic stability/influence.

(S//S1) E. MISSION: Russia: Assuring diplomatic and strategic advantage and avoiding critical surprise. Focus Areas: Provide U.S. policy and decision makers with a holistic SIGINT perspective of developments and trends in Russia, assessing and/or predicting strategic direction, plans, intentions, and capabilities that impact U S. interests Such analysis must consider Russia's strategic foreign policy and economic intentions and actions as they pertain to U S interests and influence in the region and globally; the strength of Russia's economy and its impact on Russian power projection capability and strategic positioning; Russia's efforts to regain military strength and stimulate economic growth through the development and sale ofadvanced technology and weaponry', and the role ofWMD, organized crime and counterintelligence in enabling Russian strategic initiatives. Accepted Risks: Certain domestic issues such as demographics, regional politics, development of civil society in the country, and monitoring of low-level military' training activities. Also, issues that transcend national boundaries such as Russia’s plans, intentions and capabilities regarding influence on the former Soviet space

(S//S1) F. MISSION: Venezuela: Enabling policymakers in preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests. Focus Areas: Provide U.S. decision makers with a holistic SIGINT perspective of regional trends and developments, assessing and/or predicting strategic direction, plans, intentions and capabilities that impact U S interests Assess Venezuela's foreign policy trends and leadership intentions that impact U S

interests or degrade U S. influence Assess Chavez’ progress in his initiatives to pursue regional power objectives in the political, economic, energy, and ideological arenas. Provide indicators of regime stability, particularly in the energy sector. Assess the depth and breadth of Venezuela's relations with countries of strategic concern to the United States, particularly Iran, Cuba, China, and Russia. Accepted R i s k s : E f f o r t s t o a s c e r t a i n t h e s c o p e o f V e n e z u e l a ’s n a r c o t i c s / o r g a n i z e d c r i m e e l e m e n t s a n d e c o n o m i c stability/influence.

Nice to have a record of all this so it's easier to find later. I might write some more stories about lesser known NSSE features that apply to this impending nightmare if I can find the time. For now...

/////

Quick notes: Lesser-known agencies such as the National Geospatial Intelligence Agency and US Northern Command also get very busy in the domestic battlespace indeed. NSSEs are part of their annual activity cycle of exercises and practice operations.

See previously: Nov 2010: USNORTHCOM: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com - CONPLAN3502 is another story altogether - but it makes you wonder what the NSA connection to NORTHCOM's 'civil disturbance operations' would be.

Feb 2009: Targeting the RNC Welcoming Committee: A Case Study in Political Paranoia | Dissident Voice

Having declared the RNC a National Security Special Event (NSSE), one that derived its “authorization” to target activists and journalists from the top secret 2006 National Security Presidential Directive-46/Homeland Security Presidential Directive-15 (NSPD-46/HSPD-15), local, state and federal law enforcement entities, the U.S. military, intelligence agencies such as the National Geospatial-Intelligence Agency (NGA) and corporate partners in the telecommunications industry and elsewhere, preemptively disrupted legal political dissent by a score of protest groups.

Revealing RNC document leaked: RNC '08 Report: Text: Revealing RNC document leaked (ACLU Nov 21 2008)

RNC '08 Report: Police & Security Documents: Powerpoint presentation: National Special Security Events (NSSE) - background involving March 2008.

Digging around - the NGA pulled its old Pathfinder issues. You'll have to look in Archive.org - January/February Pathfinder 2009

Boston skyline source Creative Commons: http://upload.wikimedia.org/wikipedia/commons/3/3c/Boston_Skyline_Panorama_Dusk_Edit_1.jpg

Upper right logo by Dan McCall - libertyManiacs.com - http://cdn0.dailydot.com/uploaded/images/original/2013/8/27/NSA-Listens-Shirtmock.jpg

Cyberpunk art: http://boingboing.net/2015/05/08/your-cyberpunk-games-are-dange.html

LICENSE: CREATIVE COMMONS WITH ATTRIBUTION TO HONGPONG.COM. PLEASE SHARE!

Iran-Contra is not dead: Gary Webb's Dark Alliance on the big screen! Kill the Messenger tackles corporate media & CIA-aligned drug trafficking

"Even now, those who like to say Iran-Contra’s long over, are wrong.

There are still Congressional hearings about it today that we don’t hear much about because they’re behind closed doors, but there is still media interest in it.

There are many people within the government who can still be hurt, and they are in even higher positions than they were then. That’s why it remains sensitive.”Al Martin, The Conspirators: Secrets of an Iran Contra Insider p282 (2002)

kill-the-messenger1400-1000x428.jpg

Nothing is ever really acknowledged in America until it gets the Hollywood treatment, wrapped by a screenplay and soundtrack into that big image-stream narrative America tells itself as it reproduces its existence every day. The difficult map of intelligence agencies and the war on drugs has mostly been skirted by Hollywood, but in an overdue turn of good fortune Gary Webb’s story finally gets pinned to the Big Board pretty well.

Journalist Gary Webb used the Internet to nearly bring the war on drugs to the brink of collapse by exposing intelligence connections to leading cocaine flows in the US during Iran-Contra. In the 1990s major media forces were faced with critical new voices undermining the credibility of America's post-EO12333 drug war system. Like many before and since, Webb got the corporate media banhammer, portrayed here in incisive and indicting detail (looking at you, Walter Pincus).

"For the better part of a decade, a San Francisco Bay Area drug ring sold tons of cocaine to the Crips and Bloods street gangs of Los Angeles and funneled millions in drug profits to an arm of the contra guerrillas of Nicaragua run by the Central Intelligence Agency, the San Jose Mercury News has found." Gary Webb circa 1996.

Leading the way with a star-studded cast in Focus Features’ Kill the Messenger, a decent set of films taking on Iran-Contra-related intelligence intrigue and the war on drugs is hitting the US this month, and a veritable wave of news stories exploring these old narratives are popping up nationwide!

I was very lucky to get into an advance screening & now trying to provide here more links for those both new and old to this sick twisted tale at the heart of the American Dream. Iran-Contra really fascinated me in 2007 & I got books, started putting videos together until l’Affair d’2008RNC pulled me away into more local concerns. "Iran-Contra Goggles” remain useful to decode the same basic corrupt systems we have today.

Kill the Messenger covers Webb’s tragic story, as he exposes the roles of CIA assets moving literally tons of cocaine into the US to create a covert money source for the Contras in Nicaragua. Freeway Ricky Ross, the key recipient of the cocaine, has a film coming out Oct 17th, Freeway: Crack in the System and Shadows of Liberty also features a Gary Webb-oriented segment, “Killing the Messenger".

dark-alliance-7anim.gifKill the Messenger encompasses Gary’s story, Dark Alliance, the first groundbreaking news story to really go viral over the Internet, providing readers around the world with primary source documents and more to explore. Animated gifs - a new technology at the time - showed cocaine pathways flowing into the US.

Iran-Contra aficionados and Gary’s family, who supported the film’s production, will feel a strong sense of vindication, although the latter third of the story quits expanding our view of this high-level drug underworld as the bottom of Gary’s life gradually falls out.

We get a sound foundation under the story, it seems they didn’t cut any especially bad corners that would undermine this critical shot at contextualizing Webb in American journalism.

This film doesn’t explain Southern Air Transport or Barry Seal, later extensions of similar work, or the similar sad fates of Danny Casolaro, Michael Ruppert and others.

darktop.gifAs is tradition, it’s already been belittled in the New York Times - by David Carr, who frames the notion of CIA drug trafficking networks as it "might ring some distant, skeptical bell” — ignoring his own paper’s recent reporting on Karzai’s brother’s CIA-backed cartel style operation etc.

Jeremy Renner played a laudable role getting this whole thing out the door: "It resonated with movies like 'All the President's Men' and 'The Parallax View.’”

The CIA leisure suits, aviator sunglasses and careful color palettes harken to these carefully styled 1970s paranoia thrillers, both directed by Alan J Pakula in the “Paranoia Trilogy”.

Andy Garcia as Norwin Meneses and Michael Kenneth Williams as Freeway Ricky Ross are excellent, while Oliver Platt as the rumpled, dubious editor, Michael Sheen as the bureaucrat, all of these are well-crafted roles if brief. West Wing's Richard Schiff as the Washington Post's coverup editor ringleader was just right.

Ray Liotta’s surprise covert ops "nighttime of the soul” scene is also pretty damn good.

////

This nice media wave is a good chance for everyone to learn more, and hear from the old journalists who also got the banhammer for daring to push the truth out there. Robert Parry has a new piece: The CIA/MSM Contra-Cocaine Cover-Up (Oct 3 2014).

photo-hall.jpg

I’ll suggest giving money to NarcoNews to help them keep rolling, if you can. Part of the backstory contextualized by NarcoNews: The Field: Hollywood’s Gary Webb Movie and the Message that Big Media Couldn’t Kill. NarcoNews is hosting the original Dark Alliance archive here. Sept 24th update with the family: Narco News: Gary Webb: Vindicated

The CIA has even released its creepy internal reaction piece for PR control via FOIA: http://www.foia.cia.gov/sites/default/files/DOC_0001372115.pdf - "Managing a Nightmare: CIA Public Affairs and the Drug Conspiracy Story,” and the Intercept IDed the CIA writer as Nicholas Dujmovic.

“It’s like we say “Iran-Contra”. "Iran-Contra" activity continues to go on today. In some cases, it’s the very same names and faces. In other cases, it’s a newer, younger generation of names and faces. But the narcotics, weapons and fraud aspects still continue to this day.” - Al Martin p330

////

More coverage and reviews: How Kill the Messenger Will Vindicate Investigative Journalist Gary Webb | The Informer | LA Weekly

Positive review in Variety: ‘Kill the Messenger’ Review: Jeremy Renner Plays Journalist Gary Webb | Varietybush-cocaine.jpg

Skeptical review: 'Kill the Messenger' Review: Jeremy Renner's Muckraking Feels Half-Baked in This Biopic - TheWrap (Sept 26th)

'Kill the Messenger': Film Review - The Hollywood Reporter

Esquire Sept 2013: The late Chuck Bowden’s The Pariah - Esquire. A must-read on this whole equation. (on Scribd)

Ex-L.A. Times Writer Apologizes for "Tawdry" Attacks | News | Los Angeles | Los Angeles News and Events | LA Weekly

Robert Parry 2013: Contra-Cocaine Was a Real Conspiracy | Consortiumnews discussing how he and Brian Barger started the Contra-cocaine scandal unravelling at the AP in 1985.

cia-cocaine-reagan-bush-clinton.jpg“Kill the Messenger”: The dark side of journalism - Opinion Shop Sept 19 2014

Jeremy Renner Wears a Wedding Ring -Showbiz411 discusses film

Out On The Weekend - Esquire - Sept 5, quick story referencing Gary

The film is also based on a book by Nick Schou of the same name. Interview here. Book: Kill the Messenger: How the CIA's Crack-Cocaine Controversy Destroyed Journalist Gary Webb: Nick Schou, Charles Bowden. Audiobook read by Bowden.

Nick Schou on the adaptation of 'Kill the Messenger' | Creative Loafing Atlanta

Kill The Messenger: the Gary Webb story has holes but Renner's performance still sticks – review | Film | theguardian.com (Sept 26th)

CinemaBlend positive review: Kill The Messenger Review - CINEMABLEND

Pretty good WSWS writeup on recent FOIA: CIA document details cover-up of drug trafficking by Contras - World Socialist Web Site

We lost Charles Bowden recently and he was a true friend of Gary Webb. Charles Bowden has died, but his voice is louder than ever | the narcosphere Sept 2 2014

Public radio interview

Rotten Tomatoes only has 6 reviews up. This is #7 - and the only one with Ollie DC-6 gif below!

10658685_540006192768011_8256912623796221139_o.jpg

////

Freeway Ricky Ross is making his move in all this, somehow having survived everything so far. Last summer: Freeway Rick Is Dreaming - Los Angeles Magazine (May 2013) An odd story by Jesse Katz who had a unique long term relationship with him as a journalist.

Trailer for Freeway: Crack in the System: Dropping Oct 18th:

////

Another film, Shadows of Liberty, (FB) released in 2012 & playing Midwest theaters lately, includes everything from a “Killing the Messenger” segment on Webb & Dark Alliance to a Iraq marketing section covering Iraq Intel war spoofing, Iraqi National Congress, Rendon Group psyops discussed by James Bamford. Both hit the New York Times pretty hard, as well they should, in propagandizing for Iraq & attacking Webb.

In a latter section Sibel Edmonds and Phil Giraldi look at covert agents among US nuclear secrets & Marc Grossman at the State Dept. Really a nicely rounded collection, even if I’m not a big fan of some of the film participants. Detailed notes here. New Zealand review here.

////

Other materials. From inside the CIA: Statement of the CIA IG Hitz in 1998: https://www.uspiked.com/assets/article-assets/Shadows of Liberty/Statement of CIA Inspector General to The House Committee On Intelligence - March 16, 1998 - Wikisource, the free online library.pdf (also here) STATEMENT BY FREDERICK P. HITZ, INSPECTOR GENERAL, CIA.. Volume 1: https://www.cia.gov/library/reports/general-reports-1/cocaine/overview-of-report-of-investigation-2.html

Introduction: The Contra Story — Central Intelligence Agency

Namebase index from Hitz Report. Better know a player: CIA Report on Contras and Cocaine

Fusion: A drug cartel guide to laundering millions — Fusion (9/30/2014)

Freeway Ricky Ross as advocate for literacy: Former Drug Kingpin ‘Freeway’ Rick Ross Becomes Advocate for Literacy | Atlanta Daily World (9/26/2014)

/////

Supporting material: Panthers, Crips & Bloods: Bastards of the Party - Top Documentary Films (2005) a must see for the development of Los Angeles gang structure in the context of massive importation of drugs & sophisticated police & federal operations since the days of the Black Panthers.

Pissed off CIA honcho Duane Clarridge - “there’s never been a conspiracy in this country!” (great clip in two of these films)

EO12333: The Private Contractor angle: roughly speaking, once this executive order was created, devious operations could be wrapped in corporate fronts like “Southern Air Transport”, “Vortex”, “Evergreen International” and others even lesser known.

2.7 Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.

Executive Order 12333 is back in the news: The Ghost of Ronald Reagan Authorizes Most NSA Spying - The Intercept

They also point to a gap in the public reaction to Ed Snowden’s revelations about those programs. Despite that fact that most of the NSA’s spying relies on Reagan’s directive, Executive Order 12333, the vast majority of reform efforts have concentrated on the Foreign Intelligence Surveillance Act (FISA) and other legislative fixes. “Congress’s reform efforts have not addressed the executive order,” notes Alex Abdo of the ACLU, ”and the bulk of the government’s disclosures in response to the Snowden revelations have conspicuously ignored the NSA’s extensive mandate under EO 12333.”

The documents assert that mandate baldly. A legal factsheet from the NSA, dated June 2013, states that the FISA, which requires judicial oversight over spying on Americans, “only regulates a subset of the NSA’s signals intelligence activities. NSA conducts the majority of its SIGINT activities solely pursuant to the authority provided by Executive Order 12333.”

Often referred to as “twelve triple three” or EO 12333, the executive order came into being in 1981 under Reagan. Much of the post-Snowden debate, particularly with respect to the bulk collection of Americans’ phone records, has focused on the interlocking legal authorities of Section 215 of the Patriot Act and the 2008 FISA Amendments Act. But, the ACLU notes, “because the executive branch issued and now implements the executive order all on its own, the programs operating under the order are subject to essentially no oversight from Congress or the courts.” The documents describe procedures for safeguarding the rights of Americans whose information might be “incidentally” collected under 12333, but those procedures are overseen by the director of national intelligence or the attorney general.

gary-webb-cartoon.jpg

Classic item: The only memo that made it out of Ollie’s Shredding Party, the Annotated Oliver North memo: Oliver North – Release of American Hostages in Beirut ("Diversion Memo") | Genius

From the Wilderness, Michael Ruppert’s old website: C.I.A. IG Report - Vol II - Oliver North is Toast!

Basic writeup: (3/23/98) CIA Admits Knowledge of Contra Drug Trafficking

The CIA IG report Part II: Volume II: The Contra Story — Central Intelligence Agency

////

Who? Oliver Hardy? Andy Garcia’s great line in Kill the Messenger about how it was Ollie’s idea to run drugs & guns around is a nod to Oliver North’s wonderful note: The “Honduran DC-6 which is being used for runs out of New Orleans is probably being used for drug runs into U.S."

dc6notes.gif

A personal favorite :]

////

The 1996 Los Angeles CIA Town Hall meeting on drug trafficking was a critical moment. I would identify this meeting as the closest point to total collapse of the war on drugs edifice since Nixon, and it’s worth noting Deutch resigned shortly thereafter. This meeting cost the director of the CIA his job - and two years later they had to concede so much of Gary’s work was 100% accurate.

cia-drug-trafficking-townhall.png

////

Another regular day - Day 28 of Iran Contra hearings Part 1, July 14 1987: They get into the weird Continuity of Government stuff in the 3rd hour.

////

Gary Webb on Gary Webb - CIA Drug Smuggling [2004] - YouTube

////

Mr Blum - portrayed in similar hairstyle fashion in Kill the Messenger: CIA Allegations of Cocaine Trafficking Conspiracy - Crack Epidemic (1996) - YouTube. Good stuff around 47 minutes about the prosecution manipulations.

blum.png

////

Immortal Technique - Immortal Technique - Peruvian Cocaine feat Diabolic, Tonedeff, Poison Pen, Loucipher, C-Rayz Walz - YouTube. The Scarface-sampling hiphop opus magnum of this whole damn thing.

////

Classic: Gary Webb on C-SPAN 1996: How Crack Funded a CIA War: Gary Webb Interview on the Contras and Ronald Reagan (1996) - YouTube

////

OTHER LINKS:10561558_519106554857975_5309717516771745206_n.jpg August 2005: Judas Retires: Jerry Ceppos and the Burning Memory of Gary Webb: Judas Retires: Jerry Ceppos and the Burning Memory of Gary Webb | the narcosphere. Still around at the LSU Mass Comm school: LSU Manship School of Mass Communication

Meh 2005 piece from AJR on Webb: American Journalism Review

Timeline: Understanding the Iran-Contra Affairs

Bill Conroy 2005: "He Drew Blood" » CounterPunch - includes Bowden discussion.

Esquire: Gary Webb's Glorious Comeback - Esquire June 2013

Esquire: Gary Webb And The Limits Of Vindication - Esquire June 2013

Semi-related: alt journalist Wayne Madsen on Franklin sex trafficking scandal which had Iran-contra financing connections. The “Conspiracy of Silence” is related but goes way, way beyond all this. Wayne also suspects a similar Iran-Contra-like complex role related to 9-11 and the Pinal Air Park intel aviation field in Arizona, I wouldn’t be surprised if that’s how it turns out. (The late author Philip Marshall seemed to be on this tack as well before his weird death in early 2013.)

garywebb.jpg

////

MOAR BIBLIOGRAPHY:10606152_537701239665173_8067769002059518467_n.jpg Dark Alliance is now available in paperback and you should buy it at your local bookseller.

Powderburns by Cele Castillo covers much of the same arena. Here is his Webb web page.

The Politics of Heroin in Southeast Asia (1972) by Alfred McCoy is *critical* because it’s probably the first academic book that shows how heroin is used geopolitically by US covert forces to finance their allies through the power of chemical dependency combined with covert logistics and the monopoly granted by the force of the state. Everything subsequent follows this pattern. [PDF 1] [PDF 2]

Film: The House I Live In by Eugene Jarecki (2012) & How to Make Money Selling Drugs (2012) by Matthew Cooke.

Al Martin: The Conspirators: Secrets of An Iran-Contra Insider (2002). Horribly edited but you won’t find a better collection of names and front companies, code words and the true texture of Reagan era intel/fraud complexes. *Not* for beginners.

Life During Wartime: Resisting Counterinsurgency by AK Press. Kristian Williams (Editor); Lara Messersmith-Glavin (Editor); William Munger (Editor). Great guide to drug war militarization in its most sophisticated forms.

Barry & The Boys: The CIA, the Mob & America’s Secret History (2001, 2006) by Daniel Hopsicker. Covers Iran-Contra related nodes especially Florida and New Orleans aviation and shell activities, Barry Seal and a lot of hemispheric covert operations in a jaunty style. Mad Cow Morning News has been persisting in Iran-Contra style exposures for a long time in Florida .

End Times: The Death of the Fourth Estate (Counterpunch): Alexander Cockburn, Jeffrey St. Clair. Covers corporate media corruption with major case study of media hit on Webb,

Cocaine Politics: Drugs, Armies and the CIA and Central America by Peter Dale Scott and Jonathan Marshall. (1991)

The Iran Contra Connection: Secret Teams and Covert Operations in the Reagan Era by Jonathan Marshall, Peter Dale Scott and Jane Hunter (1987)

The Killing Game by Gary Webb (2011). There are plenty of other good books but this can get you started, anyway.

////

Kill the Messenger was also the title of a film about FBI whistleblower Sibel Edmonds, produced in 2007. Watch it here, I thought it was quite good.

Also: Support NarcoNews! Narco News Needs Your Help at this Exciting Moment

A final note: Michael Kenneth Williams, who notably played gangsta-assassin Omar on the Wire, does a great job as Ricky Ross. He also plays an oddly related role in 2014’s “The Purge: Anarchy”, a pulpy dystopian fantasy about the government granting everyone the “right” to kill each other 12 hours a year. Williams’ character is the revolutionary who recognizes & resists how the elite surveil them and clink champagne glasses, as the lower classes kill each other mercilessly to maintain social stratification. I couldn’t think of a better parallel to the modern American war on drugs.

gary-webb-drive.png

Keep riding with those Aviators, Gary.
RIP Truth Tellers.

Welcome to the Skinner Box: Corporate industrial psychology, consent-free operant conditioning of Hennepin County residents, "mystery shoppers" & mental illness

Hennepin Skinner.jpg

"Now you never know… the owner sends people to buy things here and see how you act…."

Oone-dimensional-man.jpgne pernicious pattern in our modern age is the application of Industrial & Organizational Psychology to control the masses. Arguably the I/O Psych modern trend started in the 1920s, with strategies like Ed Bernays' Propaganda approach. Gradually this converted a nation of independent & frequently militant people into pacified corporate consumers through "massification" (PDF) of egos & identity, as left-wing scholar & intelligence specialist Herbert Marcuse put it. (see One-Dimensional Man text)

Let's look at abusive industrial psychological practices in Hennepin County for a moment. Some people are trying to take action, and it appears a pervasive but latent social control conflict is spilling into the open. [Photo illustration courtesy Ulya Aviral]

Local examples of abusive psychological programs run by government and corporations abound, but they lack broader context and scrutiny. A recent one: In April-May 2012 a number of Minneapolis activists discovered a program called Drug Recognition Evaluator training (DRE) was enticing people to take drugs and possibly receive drugs from law enforcement, without any Institutional Review Board or informed consent paperwork involved. This was documented by us in 'MK Occupy Minnesota'. It continues to be unraveled in a federal lawsuit handled by my friend, attorney Nathan Hansen (more info here). [And don't forget pro sports as mass mind control & the illegally financed Vikings stadium…]

Today's case is but a small example of the total social control system, an unexpected window into how corporations manipulate individual employees. While activist circles fear & loathe government and corporate informants, everyday employees, including independent contractors and those working on sales commissions, are conditioned by trained corporate managers to fear another type of encounter: the "Mystery Shopper" or secret shopper. Mystery shoppers are people hired to pose as regular customers, and then they test the behavior of the employee or contractor without their explicit consent. This provides an opportunity for the corporate managers to punish the employees for supposedly failing on some point of behavior.

Arguably, one desired effect of the mystery shopper system is to trigger mental illness. It exists to cause anxiety & create more uncertainty: after all, if one cannot be sure if a fake persona is going to try and manipulate you at work while you are selling Comcast cable boxes or lawnmowers on commission, you will certainly become more anxious. In a higher state of anxiety, is it easier to control all the employees and keep them subjugated, as well as create new levers to demote and punish them. Weirdly, it feels like a commercialized version of the FBI's anxiety-inducing informant system.

Hennepin County will soon be releasing a new plan for handling mental health, and the conflict here is between those who want psychologically abusive corporate tactics to be regulated, vs those who do not want this issue formally acknowledged by the county.

In Hennepin County, this system is currently a free-for-all, which enables corporations to develop large programs to psychologically traumatize and control their employees through generating more stress and mental illness. Another point: whenever a mystery shopper eats up the time of an employee or contractor working on sales commissions, it prevents them from earning commissions from legitimate customers.

A few members of an obscure citizen volunteer board in Hennepin County have been looking into this, conducting extensive research on the industrial psychology of secret shoppers with an eye to compelling these organizations to be regulated, since there are certain statutes and county rules that in theory could subject the corporations to some kind accountability. [Notes below - in Nevada mystery shoppers have to be licensed under private investigators!]

The Adult Mental Health Local Advisory Council (LAC) meets on the third Thursday of each month from 1:30 to 4:00 p.m. at the Hosmer Library, 347 E. 36th St., Minneapolis. [more official info PDF] On August 21st it seems the issue will actually get addressed, though this has been in question.

Here is a message from volunteer Hennepin County Local Advisory Council Adult Mental Illness consumer member Neil Elavsky earlier today about pushing for licensure for industrial and organizational psychologists.
Below the fold...

The Gentleperson's Guide to Forum Spies - for decoding astroturfing & malicious forum & Internet operations, trolls, sockpuppets, crapflooding & disinfo specialists

Reposting this as it's a much more handy summary than I could give. Neato! I think we're seeing this get more and more privatized as well -- I have a couple flagrant sockpuppets I know and love, they are like a handy little COINTELPRO weathervane. When talking Information Operations (not to mention spinstorms) this is stuff that should be right on hand.

******

The Gentleperson's Guide To Forum Spies - Via Cryptome.org - read cryptome every day if you're not already :)

****

A sends:

The Gentleperson's Guide To Forum Spies (spooks, feds, etc.)

http://pastebin.com/irj4Fyd5

1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression
______________________________________________________________________________________

COINTELPRO Techniques for dilution, misdirection and control of a internet forum..

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a 'uncontrolled forum.'

Technique #1 - 'FORUM SLIDING'

If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to 'age.' Each of these misdirectional forum postings can then be called upon at will to trigger a 'forum slide.' The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a 'forum slide' and 'flush' the critical post out of public view it is simply a matter of logging into each account both real and fake and then 'replying' to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting 'slides' down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 - 'CONSENSUS CRACKING'

A second highly effective technique (which you can see in operation all the time at www.abovetopsecret.com) is 'consensus cracking.' To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.' Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'

Technique #3 - 'TOPIC DILUTION'

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a 'RESOURCE BURN.' By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a 'gossip mode.' In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to 'drive in the wedge.' By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 - 'INFORMATION COLLECTION'

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a 'show you mine so me yours' posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your 'favourite weapon' and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite 'technique of operation.' From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 - 'ANGER TROLLING'

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes - without the requirement to 'stage' a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to 'lead' the forum by replying to your own posting with your own statement of violent intent, and that you 'do not care what the authorities think!!' inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 - 'GAINING FULL CONTROL'

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the 'ultimate victory' as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a 'honey pot' gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.
______________________________________________________________________________________

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don't discuss it -- especially if you are a public figure, news anchor, etc. If it's not reported, it didn't happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the 'How dare you!' gambit.

3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such 'arguable rumors'. If you can associate the material with the Internet, use this fact to certify it a 'wild rumor' from a 'bunch of kids on the Internet' which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent's argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule. This is also known as the primary 'attack the messenger' ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as 'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual deviates', and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning -- simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent's viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough 'jargon' and 'minutia' to illustrate you are 'one who knows', and simply say it isn't so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man -- usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with - a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues -- so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the 'high road' and 'confess' with candor that some innocent mistake, in hindsight, was made -- but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, 'just isn't so.' Others can reinforce this on your behalf, later, and even publicly 'call for an end to the nonsense' because you have already 'done the right thing.' Done properly, this can garner sympathy and respect for 'coming clean' and 'owning up' to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can 'argue' with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents. If you can't do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how 'sensitive they are to criticism.'

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the 'play dumb' rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations -- as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.
______________________________________________________________________________________

Eight Traits of the Disinformationalist

1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial. They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions. An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.

Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo.

With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'freudian', so to speak, in that perhaps they really root for the side of truth deep within.

I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.

c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

______________________________________________________________________________________

How to Spot a Spy (Cointelpro Agent)

One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?

1) The message doesn't get out.
2) A lot of time is wasted
3) The activist is frustrated and discouraged
4) Nothing good is accomplished.

FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.

Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.

Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.

The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.

This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.

It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.

In some situations, to get control, the agent will tell the activist:

"You're dividing the movement."

[Here, I have added the psychological reasons as to WHY this maneuver works to control people]

This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of "dedication to the cause." Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she - being truly dedicated to the movement - becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that "on purpose." It's amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: "they did that unconsciously... they didn't really mean it... I can help them by being forgiving and accepting " and so on and so forth.

The agent will tell the activist:

"You're a leader!"

This is designed to enhance the activist's self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.

This is "malignant pseudoidentification." It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist's identification with him/her, thus increasing the activist's vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.

Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.

The goal of the agent is to increase the activist's general empathy for the agent through pseudo-identification with the activist's self-concepts.

The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of "twinship". It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.

The activist's "felt quality of perfection" [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim's own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is "mirroring" them.

The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that "twinship alliances" between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally "lose touch with reality."

Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be "helpers" endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.

Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist's narcissistic investment in self as the embodiment of goodness.

The agent's expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.

It can usually be identified by two events, however:

First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being "emotionally hooked," will be able to remain cool and unaffected by such emotional outpourings by the agent.

As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that "the play has ended, the curtain has fallen," and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.

The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow the leader" is a waste of time.

A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.

Some agents take on a pushy, arrogant, or defensive manner:

1) To disrupt the agenda
2) To side-track the discussion
3) To interrupt repeatedly
4) To feign ignorance
5) To make an unfounded accusation against a person.

Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.

Saboteurs

Some saboteurs pretend to be activists. She or he will ....

1) Write encyclopedic flyers (in the present day, websites)
2) Print flyers in English only.
3) Have demonstrations in places where no one cares.
4) Solicit funding from rich people instead of grass roots support
5) Display banners with too many words that are confusing.
6) Confuse issues.
7) Make the wrong demands.
Cool Compromise the goal.
9) Have endless discussions that waste everyone's time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist's work.

Provocateurs

1) Want to establish "leaders" to set them up for a fall in order to stop the movement.
2) Suggest doing foolish, illegal things to get the activists in trouble.
3) Encourage militancy.
4) Want to taunt the authorities.
5) Attempt to make the activist compromise their values.
6) Attempt to instigate violence. Activisim ought to always be non-violent.
7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.

Informants

1) Want everyone to sign up and sing in and sign everything.
2) Ask a lot of questions (gathering data).
3) Want to know what events the activist is planning to attend.
4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.

Recruiting

Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.

Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.

Surveillance

ALWAYS assume that you are under surveillance.

At this point, if you are NOT under surveillance, you are not a very good activist!

Scare Tactics

They use them.

Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up "exposure," they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.

This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.

If an agent is "exposed," he or she will be transferred or replaced.

COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.

The FBI counterintelligence program's stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. "National Security" means the FBI's security from the people ever finding out the vicious things it does in violation of people's civil liberties.

______________________________________________________________________________________

Seventeen Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it's not reported, if it's not news, it didn't happen.

2. Wax indignant. This is also known as the "How dare you?" gambit.

3. Characterize the charges as "rumors" or, better yet, "wild rumors." If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through "rumors." (If they tend to believe the "rumors" it must be because they are simply "paranoid" or "hysterical.")

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like "conspiracy theorist," "nutcase," "ranter," "kook," "crackpot," and, of course, "rumor monger." Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the "more reasonable" government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own "skeptics" to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as "old news."

9. Come half-clean. This is also known as "confession and avoidance" or "taking the limited hangout route." This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal "mistakes." This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster "suicide" note was forged, they would have reported it. They haven't reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as "bump and run" reporting.

15. Baldly and brazenly lie. A favorite way of doing this is to attribute the "facts" furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges "expose" scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, "What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?" Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

"Warning shot will not be fired" by MPs trained in Martial Law in America: Military Police training: heavily patrolled domestic detention facilities, dissident/sniper warrantless searches - CONPLAN 3502 Civil Disturbance Operations training @ Ft McClellan

b. Use of Deadly and Non-deadly Force (4) (b) Warning shot will not be fired.

or better yet:

(3) In an occupied building, when the dissident's/sniper's location is unknown, all suspected rooms must be searched. The action element should try to have occupants submit voluntarily to the search of their rooms. At the same time, occupants should be questioned in an attempt to pinpoint the sniper's location. If occupants will not submit voluntarily and there is probable cause to believe that the dissident/ sniper is located in the room, a complete physical search of the room or rooms should be conducted. Use of the patrol dog will help in conducting such searches.

Another planning layer for emergency domestic military operations has been published: The 2006 US Army Military Police training manual for Civil Disturbance Operations does not concern itself with warrants in the 'search' section, indicating a certain level of Constitutional disregard in the military's planning for emergencies in what the document calls CONUS, or Continental United States.

The excellent PublicIntelligence is where this just popped up (first I saw of it anyway): U.S. Army Military Police School Civil Disturbance Operations Course | Public Intelligence - Direct PDF link (115 pages).

martial-law-mp-training-front.png

///////UPDATE JULY 11: Just talked with Alex Jones for an hour on this stuff. Here's the crib notes & PDFs you'll want to see.
/////// UPDATE July 7 AM: My interview with Darren McBreen on Infowars Nightly News: http://www.youtube.com/watch?v=fNw_m7gfqXM // Prisonplanet stories by Kurt Nimmo and "Army Manual Outlines Plan To Kill Rioters, Demonstrators In America" by Paul Watson.. Also I put it on Reddit One & Two

///////

I've only had time to read a bit of it so far, but it ties in very closely with another level of this planning framework, USNORTHCOM (Northern Command) CONPLAN 3502 Civil Disturbance Operations, which is the 21st century replacement for GARDEN PLOT, the Pentagon's plan used between the 1960s and 2002 for domestic riot control & emergency operations in such settings as the LA Riots.

In 2010 I found presentation files on a US Army Corps of Engineer server - for full story please see TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed. Having seen first hand domestic military operations at the 2008 Republican National Convention & 2009 G20 Pittsburgh, the growth and use of domestic military capacity for crowd control is a more-than-hypothetical situation -- and the subsequent obfuscation of those operations by political officeholders and appointees is quite terrifying in its implications.

This Civil Disturbance Operations Subcourse training manual ties right into material cited in the CONPLAN and supporting documents, including many of the same riot control weapons. An earlier version of a very similar manual can be found via that link.

martial-law-crowd-army-weapons-mp.png

Plus this one has quizzes!!

Billeting - I swear I heard something about revolutionaries complaining about billeting earlier... Something everyone makes a big deal out of this time of year....

There is a lot of stuff about formations -

P 62: Handy tip that rioter-impressing safe-port position is a PSYOP and tiring!

(a) The safe-port position is extremely useful in making a show of force before rioters. The above mentioned carrying position is the primary method of carrying weapons in the control force formation. It allows the Soldier to control both ends of the weapon while moving in and out of the formation and advancing the crowd.

All the stuff about gathering intel against rioting/unlawful Americans is nice and creepy and they definitely aren't saying anything about the Defense Intelligence Agency or National Geospatial Intelligence Agency.

[.............]

b. Collection.

(1) Military information elements having counterintelligence resources will maintain the ability to collect civil disturbance threat data during the period in which there is a distinct threat of actual civil disorder requiring the use of federal military forces.

(2) On activation by the Department of the Army, military intelligence elements having counterintelligence capability will:

(a) Establish and maintain contact with suitable local, state, and federal authorities.

(b) Collect civil disturbance data concerning incidents, and estimate the capability of civil authorities to control the situation. This can be achieved through direct contact with civil authorities.

(c) Report collection results to the Department of the Army in accordance with current plans.

(d) Keep appropriate commanders informed. (e) Provide intelligence support to the Personal Liaison Officer Chief of Staff of the Army.

(f) Recommend methods of overt collection, other than liaison, if required, to the Department of the Army for approval.

(3) Military intelligence elements may employ methods of collection other than liaison only on order of the Department of the Army.

(4) Covert agent operations are not used to obtain civil disturbance data on persons or organizations without specific advance approval of each operation by the Under Secretary of the Army.

(5) Basically, the following vital elements of data will be required for sound planning and operations once approval has been received:

(a) Objectives of elements which are a distinct threat to cause or are causing civil disturbances.

(b) Times and locations of disturbances.

(c) Cause of disturbances.

(d) Existence of persons, groups, or organizations which have distinctively threatened or are creating disturbances.

(e) Estimated number of persons who will be or are involved in civil disturbances. (f) Assembly areas for crowds.

(g) Presence and location of known leaders and persons who are a distinct threat to cause civil disturbances.

(h) Organization and activities planned by the leaders who are a distinct threat to cause civil disturbance.

(i) Source, types and locations of arms, equipment, and supplies available to the leaders who are a distinct threat to cause civil disturbance.

(j) Use of sewers, storm drains, and other underground systems by the elements who are a distinct threat to cause or are causing civil disturbances.

(k) Identification of new techniques and equipment not previously used by elements that are a distinct threat to cause civil disturbances.

(l) Attitude of general masses towards: (a) Groups causing civil disturbances. (b) Civil law enforcement authorities. (c) Federal intervention to control the disturbance.

(m) Possible threat to public property including private utilities. (n) Communications and control methods employed by elements referred to in paragraph 1 above.

PART C - Request for Federal Support/Training 1. Request for Federal Support.

a. Providing military support to state and local governments to assist them in quelling a civil disturbance or riot requires close coordination through a host of state and federal agencies. It requires a though briefing of Soldiers at all levels on what they can and cannot do with respect to law enforcement. Civil authorities must be briefed on the restrictions placed on federal forces by the Constitution of the United States, federal statutes and laws.

b. Under the Constitution of the United States and United State Codes the President is empowered to direct federal intervention in civil disturbances to:

(1) Respond to state request for aid in restoring order (2) Enforce the laws of the United States. (3) Protect the civil rights of citizens (4) Protect federal property and functions.

c. The Secretary of Defense retains approval for federal support to civil authorities involving the use of DOD forces, personnel, and equipment. The Secretary of the Army is the Department of Defense executive agent is the approval authority for federal emergency support in response to natural or man-made disasters (except weapons of mass destruction [WMD]). The Directorate of Military Support (DOMS) plans and executes the DOD domestic support mission to civil authorities. The DOMS is the DOD primary contact for all federal departments and agencies during DOD involvement in most domestic support operations. DOMS is also the staff agency responsible to the Chief of Staff, Army and Secretary of the Army for recommending to them appropriate measures necessary to cope with civil disturbances and terrorism and to transmit the approved recommendations to Department of Defense agencies for execution and to supervise the execution. The missions and functions of DOMS are outlined in AR 500-50. Additional roles of responsibilities of various agencies can be found in FM 3-19.15

Prior to activating federal military forces there is a sequence of steps that must occur. When data begins to show that a disturbance may develop into a situation that will require the help of federal forces, several actions are introduced at the federal level while state and local law enforcement agencies attempt to contain the disorder. Such actions may include increasing the readiness posture of forces named to help the jurisdiction concerned.

d. As the situation worsens and the state employs its National Guard, the U.S. Attorney General would send his personal agent to the scene of the disorder. This agent is named as the Senior Civilian Representative of the Attorney General (SCRAG) and is the organizer of all federal activities in the area of the disorder, including contact with local civil authorities. At the same time, the Chief of Staff of the U.S. Army would send his personal liaison officer (PLOCSA) to the scene along with members of the Department of the Army Liaison Team (DALT) that serves as his planning staff.

[.........] CROWD CONTROL PAGE 35+

c. Techniques for Crowd Control. There are numerous techniques designed to provide the commander with flexibility of action in accomplishing crowd control. He must select a combination which will produce the desired results within the framework of the selected crowd control option. The most common techniques appropriate for military usage are discussed below.

(1) Observation. This consists of deployment of persons or teams to the periphery of a crowd for the purpose of monitoring its activity. It includes gathering data on crowd size, location, mood, and reporting on the developing situation. This technique includes posting persons on strategic rooftops and other high terrain overlooking the crowd. This latter measure provides additional security to control force personnel should they become committed to other crowd control operations. Such a team may be composed of an expert marksman, a radio operator, and an observer equipped with binoculars. Care must be taken to assure that committed control forces are aware of the locations of such teams to prevent their being mistaken for sniper elements.

(2) Communication of Interest and Intent. In certain situations, effective communication with crowd and mob leaders and participants may enable the commander to control the situation without resorting to more severe actions. When planned and organized demonstrations, marches, or rallies within the disturbed area are announced, the control force commander in coordination with local authorities should meet with organizers of the activity in order to communicate the interest of the control forces. The following matters, as appropriate, should be discussed.

(a) Parade or demonstration permits. (b) Location of demonstration and routes of march. (c) Time limits for the activity. (d) Provision of marshals by activity organizers. (e) Prevention of violence. (f) Safety of all concerned.

(3) The task force commander and local authorities should also communicate to the activity organizers

their intent to cope with violence, unlawful actions, and violations of restrictions imposed on the activity. It is intended that, by this communication between activity organizers and control force personnel, the demonstration, rally, or parade will occur without incident through the mutual cooperation of all concerned. The intentions of control forces will not be effective if delivered as an ultimatum. A limited, begrudging dialogue with activity organizers reduces the opportunity for authorities to learn the plans of the demonstrators. It must be remembered that if this communication is not effected, the activity organizers might well hold the demonstration in defiance of local authorities, thereby creating a potential for violence that might not have existed if this technique had been employed.

d. Channelization. Pressure can be brought to bear on the dissident leadership to channel the crowd into an area which will minimize the disruption when the following requirements are met:

(1) When communications have been established with the dissident leadership.

(2) When the intent and nature of the crowd activity is known.

e. Diversion. When communication exists with the dissident leadership, consideration may be given to efforts to divert the leadership of the crowd itself from its stated or obvious objective. The diversion should support the objectives of the control force either by reducing the strength of the crowd situation or motivating the crowd to seek an area more easily controlled by the control force.

f. Cooperation. Decreasing the potential disruption of the crowd activity may be accomplished by an active attempt on the part of the control force to obtain cooperation of the dissident leadership. Whenever there is an attempt by the crowd leadership to seek permission and cooperation of the local government, every effort should be made to maximize this cooperation by demonstrating an attitude of facilitation. This may be accomplished by helping the leadership to organize a peaceful demonstration while establishing guidelines which will minimize the impact of the demonstration on the community.

g. Selection of Force Options.

(1) The commitment of federal military forces must be viewed as a drastic last resort. Their role, therefore, should never be greater than is absolutely necessary under the particular circumstances which exist. This does not mean, however, that the number of Soldiers used should be minimized. The degree of force required to control a disorder is often inversely proportionate to the number of available personnel. Doubts concerning the number of Soldiers required should normally be resolved in favor of large numbers since the presence of such large numbers may prevent the development of situations in which the use of deadly force is necessary. A large reserve of Soldiers should be maintained during civil disturbance operations. The knowledge that a large reserve force is available builds morale among military and law enforcement personnel and helps to prevent overreaction to annoying acts by unruly persons.

(2) In selecting an operational approach to a civil disturbance situation, the commander and his staff must follow the "minimum necessary force" principle; for example, crowd control formations or crowd control agents should not be used if the area filled with manpower would be sufficient.

(3) Every effort should be made to avoid appearing as an alien invading force and to present the image of a restrained and well-disciplined force whose sole purpose is to help to restore law and order with a minimum loss of life and property and due respect for those citizens whose involvement may be purely accidental. Further, while crowd control personnel should be visible, tactical, or force concentrations which might tend to excite rather than to calm should be avoided where possible.

(4) The normal reflex action of the well-trained combat Soldier to sniper fire is to respond with all firepower available. In a civil disturbance, this tactic endangers innocent people more than snipers. The preferred tactic is to allow a special reaction team (SRT) who is trained for this type of mission, to enter the building from which sniper fire starts. Keeping with the controlling principle that the team must use only the minimum force necessary to fulfill the mission, the commander may select any one of the following options for arming his Soldiers:

(a) Riot Shield. In the hands of a well trained soldier, the riot shield can be utilized as both a defensive and offensive weapon when contact is made with an aggressive crowd. The primary use of the riot shield is for defense of the line. However, each riot shield holder must be proficient in its retention. The Soldier holding the shield must be trained to react when a demonstrator grabs the top of the shield by slapping with his strong hand and gives the following command" Get back", "Get away" "Stop". If a rioter grabs the bottom of the shield the Soldier should be trained in forcefully dropping to one knee and pinning the rioters' fingers to the ground.

(b) Baton. The baton is most effective in a crowd control operation and is considered the primary weapon for crowd control operations. The baton is considered to be an offensive weapon with reduced lethality and unlike the rifle, the loss of a baton to the crowd does not create a serious threat. Soldier must be trained with the riot baton to the point its various techniques are automatic to them. This training must also include the vulnerable points on the body so they can avoid areas that may cause permanent injury or death when struck.

Currently there are two types of riot batons, wooden and expandable. The most common one is the 36 inch hickory riot baton with thong. There is also the 24-inch to 36 inch expandable riot baton, which has been added to the nonlethal capabilities set. Each Solder within the control force need to be proficiently trained in all techniques for blocking and striking. Improper use of the riot baton by an untrained Soldier has the potential for creating a greater problem than what already exist.

(c) Shotgun. The 12 gage shotgun is a pump action shotgun currently in the nonlethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3- inch chamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to the standard military issues weapon.

(d) Rifle. The rifle, if capable of automatic fire, must be modified to prevent automatic operation. Keeping with the controlling principle of using only the minimum force necessary to fulfill the mission. If the Soldier are equipped with their long weapons and are in the front lines of the formation, the weapon should be carried across their back from left to right with the muzzle of the weapon pointed down and the butt of the weapon pointed up. The weapon should be cleared and the magazine in the proper ammunition pouch.

(e) Non lethal weapons and munitions. Nonlethal weapons and munitions are an additional asset afforded to the commander in civil disturbance and are preferred over lethal force. The showing of force with nonlethal weapons and munitions may assist in crowd dispersing, separate, or leave the area with minimal causalities. This nonlethal capability set (NLCS) is a well-rounded, versatile package of both equipment and munitions. NLCS are dived into four distinct categories: personnel protection, personnel effectors, mission enhancers and training devices

(f) While each of the above options represents an escalation in the level of force, they are not sequential in the sense that a commander must initially select the first option, or proceed from one to another in any particular order. So long as the option selected is appropriate, considering the

existing threat, the minimum necessary force principle is not violated.

1. The rifle and rifle with bayonet attached have extremely limited offensive use as both may constitute deadly force. The primary value of the rifle or the rifle with bayonet attached is the psychological impact on the crowd. While the use of fixed bayonets can add considerably to this effect, the danger of intentional or accidental injury to demonstrators or fellow control force personnel prevents such use except with extremely violent crowds.

2. Fire by selected marksmen. Fire by selected marksmen may be necessary under certain circumstances. Marksmen should be pre-selected, trained, and thoroughly instructed. They may be placed on vehicles, in buildings, or elsewhere as required.

3. Full firepower. The most severe measure of force that can be applied by Soldiers is that of available unit firepower with the intent of producing extensive casualties. This extreme measure would be used as a last resort only after all other measures have failed or obviously would be impractical, and the consequence of failure to completely subdue the crowd would be an imminent overthrow of the government, continued mass casualties, or similar grievous conditions.

4. Shotgun. The riot shotgun is an extremely versatile weapon; its appearance and capability also produce a strong psychological effect on rioters. It is particularly suited to certain applications in civil disturbance operations. When used with No. 00 buckshot ammunition, it is an excellent point target weapon extremely effective at limited range. By varying the nonlethal munitions' M1012 and M1013 the weapon can be employed with considerably less possibility of serious injury or death. This provides the commander with a desirable flexibility in selecting the ammunition most appropriate under the existing conditions

(g) The measures described in paragraphs 1 through 5 below, may be applied in any order as deemed suitable by the responsible commander as long as his application is consonant with prescribed confrontation management techniques outlined earlier.

(1) Proclamation. A public announcement is considered an excellent medium to make known to a crowd the intentions of the control force commander. In some cases, such an announcement makes further action unnecessary. An announcement puts the population on notice that the situation demands extraordinary military measures, prepares the people to accept military presence, tends to inspire respect from lawless elements and supports law-abiding elements, gives psychological aid to the military forces trying to restore order, and shows to all concerned the gravity with which the situation is viewed. In making a proclamation, a commander may consider imposing a time limit. However, the situation may change, and not imposing a time limit may leave the commander other options as he sees fit, as long as the proclamation is specific in its instruction.

(2) Show of Force. A show of force is effective in various situations in civil disorder control operations. A show of force may as simple as Soldier dismounting from buses or trucks in plan sight of the demonstrators, but must be far enough away to prevent a provoked attack of thrown objects. When a crowd has gathered in a large area, show of force can take the form of marching a well-equipped, highly disciplined control force into their midst. When persons are scattered throughout the disturbance area in small groups, a show of force may take the form of motor marches of Soldiers throughout the area, saturation patrolling, and the manning of static posts or similar measures.

(3) Employment of Crowd Control Formations. Crowd control formations are used to contain,

disperse, block or break up a non conforming crowd; these crowd control formations are more effective in urban areas than they are in open fields or parks. When this method is utilized in urban areas, it is easy to disperse or split the crowd into small groups, isolate instigators, or funnel a crowd into a desired area. The use of such formations is part of the show of force and has a strong psychological effect on any crowd.

(4) Employment of Water. Water from a high pressure hose may be effective in moving small groups on a narrow front such as a street or in defending a barricade or roadblock. Personnel applying water should be protected by riflemen and in some cases by shields. In the use of water, the factors discuss below should be considered.

(a) Water may be used as a flat trajectory weapon utilizing pressure, or as a high trajectory weapon using water as a rainfall. The latter is highly effective during cold weather.

(b) The use of a large water tank (750 to 1,000 gallons) and a power water pump mounted on a truck with a high pressure hose and nozzle capable of searching and traversing will enable Soldiers to use water as they advance. By having at least two such water trucks, one can be held in reserve for use when required.

(c) In using water, as with other measures of force, certain restraints must be applied. Using water on innocent bystanders, such as women and children, should be avoided; ways to escape must be provided; and the more severe use, flat trajectory application, should be used only when absolutely necessary.

(d) Fire departments are normally associated with lifesaving practices rather than maintenance of law and order. In order to maintain this image, fire department equipment will not be used for riot control and crowd dispersal.

(e) Use of Crowd Control Agents. Crowd control agents are extremely useful in civil disorder control operations because they offer a humane and effective method of reducing resistance and lessen requirements for the application of more severe measures of force. Task force commanders are authorized to delegate the authority to use crowd control agents and other forms of non lethal force at their discretion.

2. Establish Area Control.

a. General. Acts of violence, such as looting, arson, and vandalism, are greatly reduced when the physical and psychological influence of lawlessness is defeated. In establishing effective area control, commanders must recognize the problem of widespread looting and arson that has accompanied most large urban disorders. Performance of this task consists of reducing or eliminating those conditions which contribute to the outbreak or continuation of lawlessness in the disturbed area.

(1) Looting. When dealing with persons involved in looting, extreme care and adherence to the principle of minimum force must be observed. Looting may start at any time or place as an isolated incident and spread quickly throughout the affected areas. Looting is not limited to any particular sex or age group; it includes the very old, the very young, women, and children. For example, many children may be looting without any idea of how serious their actions are. In the control of looting, unit leaders must recognize that deadly force is not authorized.

(2) Anti-looting. Unit commanders must be familiar with anti-looting measures which can be taken by civil authorities, such as boarding up broken or unbroken windows, covering windows with photo-

luminescent particles, and by the prompt posting of looting penalty proclamations. Anti-looting actions that can be taken by military forces include the establishment of foot and motor patrols, the posting of fixed guard posts, and the lighting of likely areas for looting. Guards at fixed posts will be briefed not to leave their posts to pursue individual looters on foot, but to remain on post and prevent looters from approaching their areas of responsibility. All guards must be briefed that looters will not be fired upon nor will deadly force be used to catch looters.

(3) Protected or Sensitive Commercial Establishments. A main consideration in the conduct of civil disturbance operations is to prevent liquor, drugs, weapons, and ammunition from falling into the hands of rioters. Therefore, liquor stores, drug stores, sporting good shops, pawn shops, and hardware stores are main targets for looters and must be kept under close observation by means of foot and motorized patrols. Normally, businesses of this type must be identified in advance and included in emergency plans.

(4) Arson. Arson is generally defined as a crime of purposely setting fire to a building or property. Acts of setting fire to buildings, property, etc., often follow disturbances. Certain situations may arise in controlling arson where the use of deadly force is authorized and necessary.

[.........] PAGE 40

(2) Imposed Restrictions. Except in the unlikely event of martial law, federal military forces will not have the authority to impose restrictions such as a curfew on the civilian population. Certain restrictions, however, may be imposed by civilian authorities to help in the control of lawlessness. Military leaders should be prepared to recommend which restrictions are of substantial value in comparison with the burden of enforcement. The most commonly used restrictions include:

Curfew. The curfew is a control measure which has proved highly effective in many civil disturbances. Its purpose is to restrict the unauthorized movement of personnel on streets and public places during specified periods of time, especially during the hours of darkness. Joint planning with civil authorities regarding the imposition of a curfew should provide for:

(a) Coordination of the initiation, enforcement, and termination of a curfew.

(b) Public announcements of the beginning and ending of curfews. Civilian authorities make these announcements through local mass media, pamphlets, and public address systems to ensure maximum exposure.

(c) Curfew exemptions and guidance on who should receive them, including written authorization or passes.

(d) Provision for the apprehension and disposition of curfew violators.

(3) Sales Restrictions. Restrictions on the sale, transfer, and possession of sensitive material such as gasoline, firearms, ammunition, and explosives will help control forces in minimizing certain forms of violence. Limiting the availability of weapons to the potential sniper or terrorist may reduce the likelihood of such violence. The effective enforcement of these restrictions, however, requires extensive planning and the commitment of adequate manpower to this effort.

So much for the Second Amendment SUCKAZ....

[.........] PAGE 22+

f. Army Detention Facilities.

(1) The Army will not operate facilities for confinement, custody, or detention of civilian personnel apprehended for violation of local or state laws as long as civil confinement facilities, operated by the Department of Justice, state, or local agencies are sufficient to accommodate the number of persons apprehended.

(2) When it appears that available local facilities are insufficient, due to the large number of persons apprehended or detained, and this fact can be verified by the person or agency responsible for the facilities, temporary confinement/detention facilities may be operated with prior approval from DA, specifically, the Chief of Staff, U.S. Army. These facilities will be operated only until custody of the persons detained can be transferred to and assumed by civil authorities. They will not be used for the confinement of persons charged or convicted under civil jurisdiction.

(3) Temporary confinement/detention facilities can be developed from local federal facilities provided they are adaptable to the requirements of custody and control. Such facilities should be established, if possible, within the affected area; this will conserve time, transportation, and escort personnel.

However, if no suitable federal property is available within the affected area, they can be located elsewhere on any property under federal control as long as the persons to be detained are apprehended in the affected area. Whenever such temporary facilities are established during civil disturbance control operations, the Army is responsible for providing those personnel, facilities, and supplies necessary for the custody, control, health, comfort, and sustenance of persons detained.

(4) Officers and key NCOs specifically trained and experienced in confinement operations are required to operate such facilities. Guards and support function personnel operating under the direct control of such officers and NCOs need not be specifically trained or experienced in confinement operations as long as they are under close and continuing supervision of trained responsible personnel. Whenever females are detained, they must be held in physically separate detention facilities and under the control of selected female guards operating under the supervision of trained and experienced confinement personnel.

(5) Temporary detention facilities should be constructed and arranged to provide for adequate custody, control, and safety of detainees. It is advisable to use existing permanent-type buildings. Where sufficient permanent structures are not available, only that amount of new construction required for temporary custody, control, and administration of prisoners should be accomplished. Temporary field- type facilities provide compartments to assure effective control.

(6) The same operational procedures that apply to the operation of installation confinement facilities and treatment of detainees apply to these temporary facilities except that those policies and procedures establishing training, employment, mail and correspondence, and administrative discipline requirements will not apply. Detailed guidance in procedures for confinement of detainees is contained in EPW Operations, FM 3-19.40.

g. Special Equipment. Certain items of equipment available to military and civil police forces can do much to limit injuries to civilian and military personnel and destruction of property. These items increase the psychological effects of a show of force and offer additional protection and versatility to civil disturbance forces during the operations.

(1) The 12 gage shotgun is a pup action shotgun currently in the non lethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3-inchchamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to standard military weapons that may be desired based on mission considerations.

(2) The shotgun, as in the case of other firearms used in civil disturbance operations, is fired only on the orders of a qualified superior officer when lesser measures of force are not effective, or when the individual Soldier has no other means of protecting his life.

(3) The M7 is a 66-millimeter vehicle-mounted NL grenade-launching device that is mounted on a HMMWV. It is a indirect fire support system that can deliver the M99 blunt trauma grenade that creates a sting-ball effect. The M315 installation kit is used to install an M7 discharger on the turret ring of appropriate HMMWV variants. An adjustable bracket allows the launch angle to be depressed for engaging targets at ranges of 50, 75 and 100 meters. The system enforces standoff distances and deters potential threats.

(4) The M1012 is a single projectile round made of hard rubber that is shaped like a bomblet and designed to be fired at a single target. With the muzzle velocity of 500 feet per second, the M1012 as the effective range of no closer that 5 meters and no further that 30 meters. Engagement inside of 5 meters could result in serious bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective.

(5) The M1013 is a multiple projectile round with .23 caliber hard rubber pellets that is designed to be fired at and employed with the purpose of affecting multiple targets. With a muzzle velocity of 900 feet per second, the M1013 has an effective range of no closer than 5 meters and no further that 30 meters. Engagements of less than 5 meter can result in seriously bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective

(6) The midsize riot control disperser (M37) is the size of a standard fire extinguisher that uses compressed air to force the RCA out to a range of 30 feet. It has the capacity to employ 18 burst of RCA into a hostile crowd while maintaining excellent standoff capabilities. The M37 can be refilled and is rechargeable. It can be refilled with CR solution (liquid agent) or CS (dry agent). For the purport of training the M37 can be filled with water and CS can be substituted with talcum power.

(7) The Squad riot control agent disperser (M33A1) is designed to provide crowd control and protection at the squad level. It is capable of projecting a ballistic stream of RCA's beyond 25 feet in up to 25 half- seconds burst. It consists of a frame and harness assembly, compressed-gas cylinder (agent container assembly) air pressure assembly, gun and hose assembly, multi-jet spray unit, and check valve assembly. The M33A1 can be refilled and is rechargeable. For training purposes, CR can be substituted with water and CS and be substituted with talcum power.

(8) The above mention items are but just a few of the non lethal weapons and munitions available to the commander and unit to utilize during a response to the civil disturbance, and can be utilized to train and prepare Soldiers. Additional non lethal weapons and munitions as well as protective gear can be found in FM 3-19.15.

3. Vehicles. Armored vehicles and transport vehicles add to the readiness of the crowd control force. The use of these vehicles increases flexibility, reduces troop commitments, and provides protection for personnel. In considering the use of vehicles, however, it must be remembered that they should be secured by foot elements.

a. Armored Security Vehicles (ASV) can be used in several ways to keep the effects of civil disturbances at a minimum.

(1) Their use adds a considerable psychological effect to riot control formations while providing added protection for Soldiers. They provide a readily accessible barrier for Soldiers to crouch behind if necessary, and excellent protection for those inside.

(2) Their use as mobile command posts offers the added advantages of security, communication, and mobility.

(3) They are well adaptable to roadblock operations providing the advantages listed above, while at the same time providing an excellent barrier.

(4) Their use for patrolling an area of violence adds to the psychological effect, and allows Soldiers to maneuver in close to snipers in order to make an apprehension.

b. Standard military transport vehicles can be modified with sandbags, armor plating, wire screening, or similar materials to give some protection against sniper fire and thrown objects. They provide mobility and communication capability for area coverage. Soldiers should be deployed with ample vehicles to provide sufficient flexibility to handle all situations in an area of civil disturbance. TOE allowances should probably be increased for this purpose.

3. Other Equipment. In addition to the special equipment discussed above, certain other items should be available for use in operations within the disturbance area.

a. Armored vests and protective masks are required for anti-sniping operations and at other times when violence is expected. Flexibility is an important consideration. For example, the limitation on visibility must be considered when requiring the use of protective masks, and the limitation on mobility when wearing the armored vests.

b. Successful conduct of the overall operation may depend on other items. Auxiliary lighting should be available to include hand-portable lights, vehicular-mounted searchlights, spotlights, flood-lights, flashlights, flares (with caution toward fires), and vehicle headlights. Prefabricated wood or metal barriers, or suitable materials, such as wire or ropes, may be used to block off an area; signs should be provided to supplement these barriers. Evidence equipment, including movie and still cameras with telescopic lenses, and recording devices should be obtained and placed into position.

c. Other items of equipment should also be provided. Helicopters should be used for observation, communication relay, illumination, resupply, reserve displacement, and numerous other tasks. Adequate firefighting and fire protection equipment are vital in civil disturbance.

d. Provisions should be made for appropriate communications equipment for use at the scene and between the scene and the operations headquarters. Every available means of communications to include public address systems--both hand-portable and vehicle-mounted--should be used.

PART E - Operational Tasks

1. General. In any civil disturbance operation, certain tasks must be accomplished to reach the ultimate objective of restoring and maintaining law and order. To do this, action must be taken to gain control of the situation. Control forces must perform certain tasks that will develop a physical and psychological environment which will permit law enforcement personnel to enforce the law and maintain order. The importance of having a high degree of flexibility and selectively in the response cannot be overemphasized. It is just as important that the tasks selected be completed only after a careful evaluation of the situation. This evaluation must consider the particular uniqueness of the situation. In this respect, the commander selects those tasks that are most likely to reduce the intensity of the given situation. Therefore, not all tasks will apply in all situations, but control force commanders and unit leaders must identify those tasks which must be performed and then develop plans and procedures for their accomplishment. The operational and integrated tasks listed below are discussed in detail in the paragraphs and lessons to follow.

a. Operational Tasks. (1) Isolate the area. (2) Secure likely targets. (3) Control crowds or mobs. (4) Establish area control. (5) Neutralize special threats.

b. Integrated Tasks.

(1) Gather, record, and report information. (2) Apprehend violators. (3) Maintain communications. (4) Maintain mobile reserves.

(5) Inform the public. (6) Protect the fire service operations. (7) Process detained personnel.

2. Isolate the Area.

a. This task includes the restriction and sealing off of the disturbed area. The objectives of sealing off the disturbed area are to prevent the disorder from spreading to unaffected areas, to prevent escape of persons bent on expanding the disturbance, to speed up the exit of the uninvolved, and to exclude unauthorized personnel from entering the affected area. In order to prevent the disturbance from expanding in size and strength, it is critical to prevent the inflow of extra demonstrators or curious onlookers into the disturbed area.

b. When military forces are committed to helping the civil authorities in controlling civil disturbances, the situation will be beyond the capability of local law enforcement agencies and a scene of major disorder should be expected. This disorder may be characterized by small, dispersed groups which are looting, burning, and generally causing havoc in the area, or it may be characterized by large groups participating in varying degrees of illegal conduct. The initial action taken by military forces to control the disorder is critical and should include the immediate isolation of the disturbed area.

c. The initial commitment of control force personnel may be required to clear a building or an area in order to isolate the persons creating the disturbance from those not yet motivated or actively involved. The primary emphasis should be on identifying what area and who has to be isolated.

3. Isolated Techniques. There are several techniques to use when isolating a disturbed area.

a. Barricades and Roadblocks. Barricades and roadblocks are physical barriers which deny or limit entry into and exit from the disturbed area. They can be used to totally deny passage of people and vehicles or to permit certain designated categories of persons and vehicles to pass. They must be positioned so as to prevent their being bypassed, surrounded, or cut off from support. In many cases, it may be impractical to physically seal an area due to the physical and geographical considerations, such as in the case of a college campus or a suburban area.

b. Barricades Against Personnel. Civil disturbance operations contingency planning should provide for the availability of portable barricades which slow down the passage of personnel. Concertina wire is a suitable material for rapid construction and effectiveness, although wooden sawhorses, ropes, and other field expedient devices may suffice. Concertina wire should be used sparingly and only under serious circumstances as it is indicative of violent disorders.

c. Roadblocks Against Vehicles. The erection of effective roadblocks which cannot be easily breached by vehicles requires large, heavy construction materials. One item that can be stockpiled in advance is 55- gallon drums to be filled with water or earth on site. Other materials include sandbags, earthworks, trees, or heavy vehicles. Several roadblocks placed at intervals of 25 to 50 feet provide sufficient depth to prevent breaches by heavy or high-speed vehicles.

d. Construction Considerations. The construction of barricades and roadblocks should provide cover from small arms fire where this threat is likely. Provisions should be for night illumination of approaches to the position; however, care must be taken not to silhouette the personnel manning it. Construction materials which would chip or shatter upon impact by thrown objects should be covered with canvas or sandbags to prevent injuries from flying fragments. Warning signs should be placed in front of the position directing authorized personnel not to approach the position. One technique of providing a quickly erected barrier is the use of vehicles parked bumper to bumper; however, this procedure may subject the vehicles to damage by a hostile crowd. Another device which may be effectively used both as a barricade and a part of a formation is the use of a locally built frame of wood or metal with wire covering.

e. Perimeter Patrols. Perimeter patrols should be established to prevent entry or exit from the disturbed area, particularly by persons or groups trying to bypass barricades and roadblocks. These patrols operate along the outer operational boundary of the disturbed area. Perimeter patrols can be integrated with area patrol routes within the disturbed area.

f. Pass and Identification Systems. Unit, installation, or municipal contingency planning should include a pass and identification system providing for the entry and exit of authorized personnel to and from the isolated area. Procedures should be established for press personnel, emergency medical personnel, public utility work crews, and for any other personnel who have a legitimate purpose for entering and exiting the isolated area. Consideration must be given to those persons residing within the disturbed area who must travel to and from work. An effective pass and identification system requires careful and detailed planning as a contingency measure.

g. Public Utility Control. Ensure that civil authorities have established a means for controlling public utilities to include street lights, gas, electric, water, and telephone services so that they may be turned on or off to support the tactics employed by the control forces.

4. Secure Likely Targets.

a. General. Certain buildings, utilities, and services are critical to the economic and physical well-being of a community and require security to prevent disruption of essential functions. In addition, certain facilities and buildings have become symbolic targets to radical or extremist elements and should be identified and afforded protection with the priorities established. Among the likely targets to be attacked are control force command posts, billeting areas, and motor parks. Another potential problem in civil disturbance operations is the threat posed by dissident elements intent on doing bodily harm to control force personnel and civilian dignitaries in the disturbed area. When such threats exist, military personnel may have to be committed to security operations. In particular, security must be placed on armories, arsenals, hardware, and sporting good stores, pawnshops, and gunsmith establishments, or other places where weapons or ammunition are stored. To conserve manpower, consideration may be given to evacuating sensitive items, such as weapons from stores and storing them in a central facility. Priorities for physical security must be established to prevent waste of available forces on less important facilities or those which have their own physical security forces. The degree of security necessary to protect various buildings and utilities is determined by considering the following: [..............]

It goes on.... Again the page is here. I'll leave it here to get this posted now. Check it out and be sure to get a handle on CONPLAN 3502 and other aspects of domestic military operations planning frameworks -- when similar emergency/disaster scenarios happen (i.e. Katrina) you see military personnel acting like this...

REX-84 under Iran Contra was 'then', and 'now' a literal US Army war to save the criminal banks from angry mobs is basically what's planned. Under this plan a nation ripped off & crippled by LIBOR peta-scale financial scams leaves forces like the military on the hook for defending the organized ring of criminals operating banks, i.e. "services ... critical to the economic... well-being of a community". What is the Pentagon supposed to do about the fact that the critical infrastructure is often operated by the criminally insane -- the very people who have pushed the US most of the way to the point where terrifying emergency plans like those above spring to life? X-(

Review: "Contagion": Minneapolis faces instant social collapse in latest Hollywood portrayal of martial law!

contagion-diseased.png

SPOILER ALERTS! -- Plagued man (lower left) staggers off bus at Lake & Lyndale; Paltrow croaks at Fairview University Medical Center; MDH painted as buffoons; Matt Damon defends saddest Minnesota XMas ever w/ shotgun & sweaters!

contagionfear.png

Snagged advance tickets to Steven Soderbergh's A-List disease disaster flick "Contagion." Rumpled but sagacious institutions going through the motions make for a dour rhythm & pacing. Overall it resembles a video news release designed to make us feel comfortable with lining up for shots at the FEMA/Red Cross center -- that's the whole catharsis at the end basically. Thanks to Cryptogon for the tip on this film!

But weirdly, a whole vision of wintertime midwest social collapse goes down in my general neighborhood -- Minneapolis to the Martial Law-lockdown Wisconsin border!

The Minneapolis Armory downtown is transformed into a pandemic doomcenter!

contagion-mpls-arena-medical.png

It's kind of an initiation into USNORTHCOM CONPLAN 2591 for Dummies: Line up You Crazed Minnesotans! It's NCIS: Team Bacteria, basically plodding dialogue rarely gets any humor catharsis.

It's too bad this stolid film could have been so sardonic – come on, with Fargo you've got a real Minnesota film. Even though few shots except say the downtown Armory actually appeared to be shot here. Still, the blue light & Thanksgiving-Xmas interval of complete doom bore the mark of a dark winter experience. Still this film needed humor -- they just couldn't put much in at all.

Quickly in Minnesota, panic and total social collapse sets in at martial food distribution ops and the grocery store.

contagion-mpls-foodfail.png contagion-groceryfail.png

Army trucks all over downtown in the morning hours:

contagion-mpls-martial-law.png contagion-groceryfail2.png

Martial law is setup at the Minnesota/Wisconsin border -- closed by the Wisconsin National Guard. Not filmed in Stillwater but should have been. I actually made a sketch of similar Wi/Mn border bridge freakout one time -- this film has it all!

contagion-wisconsin2.png

contagion-wisconsin1.png

contagion-MDH.png

Minnesota Department of Health (MDH) deserves far more credit than the obligatory "baffled public official" exposition scene. They're actually very good at tracing outbreaks -- E Coli strains in industrial food for example -- but get zero credit really. Except for a You-Betcha-Bubble-Suit-Next-to-Mass-Graves type moment.

contagion-massgraves.png

contagion-technocrats.png

No one is really portrayed solving things cleverly except Fishburne's people. Will this look kind of like a Duck-And-Cover propaganda film in 50 years? "Cheating" or taking risks bending the rules is peculiarly rewarded -- i.e scientist with Biohazard Level 3 lab still finds the virus growth medium after they try ordering him to shut down.

Jude Law is a pigeonholed as conspiracy disease blogger and you never ultimately see if he's a shady fear profiteer. By the end he's painted as vaguely pitching profitable homeopathic cure for a possible hedge fund payoff. The hedge fund turns him in to Homeland Security. Doesn't make sense. He's left filming silently people lining up at a Red Cross/FEMA arena as they peacefully await shots like lambs.

contagion-judelaw.png

Even as masked pillagers go through "suburban Minneapolis" in no sense are neighbors considered to be banding together in Minnesota -- though in China a whole village tries to hold the health scientist Cotillard hostage for vaccines.

It felt like there'd been battles over the script. Something about the way that the plots were stubbed out...

Adjuvants get a mention as needed to really get the immune response kicked into action. Delicious thimerosol win! (of course high levels of gross damaging adjuvants are needed because frequently vaccines are weak failsauce)

Just-in-time commercial inventory spells direct social fail: Surprise! I felt like the kind of preparation which local organization like the U of M's top notch Center for Infectious Disease Research & Policy which advises better supply chain strategies during dangerous pandemics. The pandemic supply chain fail basically leads straight to pandemonium in Minnesota.

There's no real sense of proper preparation -- a lack of creativity here. Actor Bryan Cranston as the military guy was pretty good.

Spoiler deets-

-- the crucial clue on Paltrow's camera -- Damon finally notices month later. Seriously they never found this earlier?

contagion-camerafail.png

contagion-camerafail2.png

-- if they point out that fatality level from malnutrition is variable to nutrition, they could have promoted vitamin D but didn't

-- You get vaccinated == Arm Band seemed like prescripting or an introduction, as well as catharsis in plot!contagion-vaccines.png

-- At least no one gets chipped (altho vaccine fans will point out you can hide unique signatures in vaccine fluid)

-- No real 'mitigating' approach - be it neighborhood security radio or taking more vitamins -- no one is really creative outside of the government

-- Dr. Sanjay Gupta - CNN, NBC/Comcast KARE 11 are the media snippets. Gupta mediates the Fishburne/Law throwdown between CDC & Conspiracybloggers.

-- Chinese cooks hug western executive while greasy with pig guts fresh from the Chinese interior.

-- People coughing in the theater are scary!

-- Big FEMA Red Cross polite line of vaccine recipients is the catharsis "landing" basically

contagion-arena.png

I didn't bother to stick around and look at the thank-yous to see who was involved in production. The way that it feels like you're mainly plodding, tumbling through the CDC's cogs reminded me of another similar film The Next Three Days wherein Russell Crowe triggers off similar National Security machinations. Hell the new Transformers movie has the military as a major character collectively. It just doesn't make the stories move along to cover all these institutions and their fictionally presented wonderful operations.

This site is promoted on the trailer -- it doesn't even mention Minneapolis after all this trouble!

takepart-contagion.png

Matt Damon gits a shotgun which weirdly wasn't looted from his neighbors -- while the food was.

contagion-guns.png

Chicago gets the martial law treatment like the FEMA Region V headquarters it is.

contagion-chicago-femaregion.png contagion-martiallaw.png

Homeland Security Guy always seems like a douche but He Means Well.

contagion-homelandsecurity.png

Dimitri Martin handles yr viruses

contagion-level4.png

I think this scene was cut? Or was I not paying attention.

contagion-testimony.png

Obligatory red blooming map

contagion-obligatory-red-map.png

That about covers it. I always wash my hands and try to avoid touching my face. Minnesota is kind-of used to this stuff so I rather resent we are now portrayed as the exemplars of public panic!

2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles

Jesse Trentadue: …who’s testifying about Howe had reported that the plan to bomb the Murrah building four months in advance, had gone with Strassmeir and others to scout the target – the first thing the U.S. Attorney does when Graham stops testifying is ask the judge to seal the transcript, and the judge says why, and he says, "We don’t want it getting out and mucking up the McVeigh trial: the fact that here an ATF agent, an informant, had gone to Oklahoma City to scout the Murrah building to be bombed with people other than McVeigh four months in advance." And the judge granted the order, and he ordered the transcript sealed.

*******

Jesse Trentadue is an attorney whose brother got killed in prison, probably because the FBI thought he was the Oklahoma City Bombing's enigmatic John Doe #2. Trentadue has been seeking justice for years and has finally hit an unexpected CIA FOIA lawsuit wall in the cases.

The line is still more-or-less that McVeigh was in with a bunch of FBI / ATF informants -- making the whole thing a preventable false flag attack. Also discussed here is the role of the Southern Poverty Law Center, which may have done cutout informant operations for the FBI because they couldn't get into Elohim City as a specifically "religious" compound.

Also a white supremacist style Midwestern bank robbery ring that McVeigh apparently ran with had some undercover operatives. Roger Moore, a gun dealer and wealthy veteran of the aviation world, was "held up" by Terry Nichols apparently to provide the Kinestiks needed for the Murrah bombing.

Nichols claims McVeigh spilled the beans that one top FBI agent named Potts was controlling or handling McVeigh. The a Nichols deposition about the subject is in the file directory listed below.

Additionally the FBI has obviously tampered with the videocamera evidence and in fact the video expert from the OJ Simpson trial died of a "heart attack" after telling them the tapes were obviously erased! Between that, Trentadue's unlucky brother, and one of the bank robbers, the full spectrum of international and domestic espionage operations setting up Oklahoma City emerge.

Nichols claimed McVeigh knew Elohim City was "ATF City", i.e. obviously loaded with informants, but he wanted to go there and do it anyway with the various other agencies, almost as a kind of audience or support grid for a false flag attack in Oklahoma City -- perhaps McVeigh wanted to play it out and see if they would let him pull this off?

The new CIA angle is probably related to information about Andreas Strassmeir, the German national who was involved as an informant for possibly the German BND service as well as the FBI or ATF.

Additionally there is a good discussion of how the oh-so-wonderful Southern Poverty Law Center was running informant activities, probably operating as an FBI cutout, at Elohim City. Another element is how current US Attorney General Eric Holder was the direct lead DOJ goon for covering up Trentadue's murder.

Previously in 2007: New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? | HongPong.com.

First a couple other things from Antiwar.com. Kudos to them for following this. The wall of secrecy goes right to the usual suspects.

Populism, Left and Right by Justin Raimondo -- Antiwar.com

At Least 50 Killed in Pakistan’s Weekend of Bombings -- News from Antiwar.com

Defense Spending Is Much Greater than You Think | The Beacon

*********

Key interview lays it out: They Are Lying to You About the Oklahoma City Bombing by Scott Horton -- Antiwar.com

Scott Horton interviews Jesse Trentadue, April 19, 2010

Interview conducted March 30, 2010. Listen to the interview. Scott’s collection of OKC audio clips here. Scott’s collection of Jesse Trentadue’s court files here.

For Antiwar.com and KAOS radio 95.9 in Austin, Texas, I’m Scott Horton. This is Antiwar Radio. And our first guest on the show today is Jesse Trentadue. He’s an attorney from Salt Lake City, Utah. Welcome to the show, Jesse, how’re you doing?

Jesse Trentadue: Thank you very much.

Scott Horton: I really appreciate you joining us here. All right, so, I guess I’ll give a short introduction to the story here, just to catch everybody up, and I’ll try to make the long story short if I can: Jesse’s brother, Kenneth Michael Trentadue, was tortured to death in federal custody in the summer of 1995. And it turns out the reason, the probable reason anyway that he was tortured to death in federal custody, was because it was a case of mistaken identity. They were trying to get him to admit that he was a guy named Richard Lee Guthrie, who was one of the John Does suspected in the Oklahoma City bombing. And Kenneth Trentadue, unfortunately, was just at the wrong place at the wrong time with the wrong color hair, the wrong truck, the wrong dragon tattoo on his arm, and they were just convinced that he was Richard Guthrie, and he paid for it with his life. And a massive cover-up commenced, but they didn’t realize that they were messing with Jesse Trentadue, who happens to be a lawyer in Utah and knows how to work the system to, well, approach a remedy and justice. And so this is how Jesse’s story has become one with the story, the true story, of what happened behind the Oklahoma City bombing. And just in the last week Jesse has gotten refused by the court on some motions, some Freedom of Information Act suits that he had filed against the Central Intelligence Agency for any files that they had about the Oklahoma City bombing, and even though the files that he was suing for were denied, the judge’s decision on why he was denied was full of all kinds of extra interesting things itself. So, do I have that basically right, Jesse? Please correct me if I went off the story anywhere there, and then maybe please let’s get into what the judge’s decision actually said here.

Trentadue: Nope, I think you’re absolutely right. And one of the things your listeners should know is, I didn’t start out to solve the Oklahoma City bombing. I started out to find out who killed my brother, and as it happened, every lead I came across took me back to the bombing in Oklahoma City in April of 1995, including a message I received from Tim McVeigh shortly before he was executed. I mean they sent me a message that when he saw my brother’s picture and heard what happened to him, he said that I want you to know that essentially the FBI probably killed him because they thought he was John Doe 2, who was Richard Lee Guthrie.

[......]Horton: All right, well, so, what do we find out this week? What’s in these new documents? This judge told you, no, basically, your latest suit from Freedom of Information Act against the CIA has failed, correct?

Trentadue: It has, but, as you pointed out, [the judge] did a lot for me and he did a lot for the American people. He told us things that otherwise we would never have known. What happened is, I, in order to document the link between my brother’s murder and the bombing, and the connection to Guthrie, I filed a number of Freedom of Information Act suits. I sued the FBI. This time I sued the CIA. And it was sort of on a hunch, I said to the CIA I want all documents showing your involvement in the Oklahoma City bombing or prior knowledge of that attack. And they came back and gave me 37 blank pages, 12 documents all together, 37 blank pages, and they were stamped Secret, National Security. And they said, "Oh by the way, we have all these other documents that are so super secret we can’t even give you blank pages." So…

Trentadue: Well, I sued them and said I want those documents, and the judge, of course, they came in, and it’s the very first time anyone in my Freedom of Information suits has ever asserted national security and the exemption of producing. And that’s like, it’s a rock that you can’t get around, once the government throws up national security. And they did more than that. They said to release these documents would pose a grave threat to the security of the United States of America. And the judge’s hands are tied at that point. It’s like a shield that he can’t go beyond, behind. But what he did, and I think he did this intentionally, is he wrote his opinion to let me know and the public know that there was a foreign connection to the Oklahoma City bombing. And he goes through it and he discusses the CIA’s assistance in helping prosecute Tim McVeigh and Terry Nichols. And he talks about the contacts with foreign informants, foreign witnesses. He paints a very clear picture that there was foreign involvement, and of course there has to be because the CIA is a foreign intelligence agency. By law it cannot operate within the borders of the United States unless, unless there is a foreign element here.

......Horton: Well, now, do you have any real indication as to what he’s talking about, if this is perhaps, you know, has to do with Andreas Strassmeir or whether this is, you know, along the lines of Jayna Davis and the American Enterprise Institute and trying to pin it on Middle Easterners?

Trentadue: I think it, I think it was Strassmeir, a German national and a former Army officer and counterterrorist person from the Republic of Germany. That’s my opinion. Of course he doesn’t say who, but it’s my feeling that’s the person.

.......Trentadue: No, but I think it’s significant, what he’s done. I mean, in one of the documents is talking about trying to extradite an organized crime figure from another country, that’s part of the bombing prosecution. And these things are, this is happening after, after the FBI says "We’ve caught Tim McVeigh and Terry Nichols, they’re the ones who did it, end of story." So, long after they’re telling the American public that, the CIA is running down witnesses and suspects in foreign countries for the FBI and the Department of Justice. But, I think this was important for a number of reasons. It’s the first time it’s ever been documented, no one even suspected, that the CIA was involved in the Oklahoma City bombing. And, more than that, one of the things that came out is they actually had the Geospatial Intelligence Agency involved. Now I imagine very few if any of your listeners know what that is, and I certainly didn’t until the name came up in these CIA documents. And that’s the spy satellite program the CIA operates. So you have not only the CIA involved, you have the spy satellite folks involved.

Horton: Well, you know, I wonder, after all these releases, have you figured out who was running Strassmeir exactly? I mean, it seems like it would be kind of strange if the CIA was running him the whole time and then they go doing a big investigation about him after the fact, you know?

Trentadue: I think it was a joint operation between the FBI and the German government. You remember the people they targeted were the emerging neo-Nazi movement. It came to life in the United States. It was being exported back to Europe. The German government was petrified that this would take root there. And so I think it was a joint effort by the German government and the United States through the FBI to do this, infiltrate these groups. And I’ve come across a name that makes me believe that is so, because they refer to this operation as PatCon, the FBI did, P-A-T-C-O-N, which was an acronym for Patriot Conspiracy. And I think the objective was to infiltrate the militia movement, and they targeted this group, a potentially dangerous group in eastern Oklahoma who lived in a compound called Elohim City. Strassmeir worked his way into that compound as the explosives and weapons inspector, and I think he was an agent provocateur. I think he ginned those folks up to bomb the Murrah building.

Horton: Yeah, it does seem to be a question of – well and I don’t to get too far into speculation here because honestly after all these years, you know, my memory fails, and also I’m not so sure anymore about some of the things I used to think I was more sure about, but it certainly seems as though, you know, Strassmeir was not the only FBI agent or informant in on this and that there’s enough hard evidence to show, well for example, the last time we spoke we talked about how the ATF informant, Carol Howe, was reporting back on this group of, you know, terrorist plotters and even as admitted by her ATF handler under oath, she even went with them to case the building, and then the next day drove her ATF handler on the same route and said "That’s the building we cased," before the bombing ever even happened. And, so it sure is, it sure seems pretty clear to me that, you know, there was some kind of infiltration, as you said, going on there, but then I guess the question comes down to, doesn’t it, whether it was a sting that got out of control or whether this guy Strassmeir’s mission actually was to get a bombing done. I mean, after all, there was a bombing, killed 168 people. Somebody built that bomb.

Trentadue: Carol Howe reported that four months before the bomb went off. In one of the documents reported this to the ATF, she went with Strassmeir and others to scout the target. One of the documents that came out as a result of my suing the FBI was a teletype from FBI headquarters, then Director Louis Freeh, to his field office in Oklahoma City saying that two days before the bombing McVeigh had called Elohim City to speak with Strassmeir asking for more help to carry out the attack. I mean, they clearly knew, clearly knew in advance it was going to happen. Now this is something you struggle with and I struggle with, did it go south on them, was the plan to catch the people in the act, or did they really want it to happen. I – God I had to think it – as much as I hate the FBI, I hate to think it’s the latter. You have to look at what they get when there’s a terrorist attack. They get all new funding, they get the Patriot Act, they get all these other laws that take away our rights.

.......Horton: All right, now, for anybody who remembers back then who paid attention and tried to have an unbiased eye to what was going on, I think it was pretty apparent that the trials of McVeigh and Nichols both in Denver were ridiculous sham fake trials, the kind that you would expect to see in some Third World dictatorship or something. They did nothing but bring witness after witness to talk about how sad they were and then they did nothing but exclude anybody who could shed light on what actually happened there. And in fact, I have the clip here, I guess I won’t play it now, I might try to stick it on the end of the interview here, but there’s a clip from "60 Minutes" where one of McVeigh’s jurors says, "Well, you know, if he didn’t do it, I would expect for someone to come in and testify that, you know, he was with me that day or something, and since that didn’t happen, I had to go ahead and convict." In other words, the state did not prove their case at all, the national government, the U.S. Attorney’s office, did not prove their case beyond saying we’re really, really sure it was McVeigh. Now, I don’t doubt that it was McVeigh, or not very much, I guess I got a 1% doubt, but – maybe less than 1% – but certainly there is no doubt whatsoever that they refused to put on a real trial because if they put on a real trial all this stuff about the prior knowledge and Andreas Strassmeir and Carol Howe and all the rest of it would have come out. In fact, you know, if I’m going to go as far as compare it to a Third World dictatorship, let me go ahead and add the detail, they indicted Carol Howe for having a pipe in her garage and white supremacist literature consistent with her costume as undercover informant and charged her with conspiracy to bomb people so that she would be under indictment at the time of the McVeigh trial and unable to testify. And then as soon as the trial was over they dropped the charges against her, they didn’t even try to prosecute her. It was just a scheme to keep her off the stand, even though Stephen Jones, the lawyer, tried to subpoena her over and over again, obviously.

Trentadue: …who’s testifying about Howe had reported that the plan to bomb the Murrah building four months in advance, had gone with Strassmeir and others to scout the target – the first thing the U.S. Attorney does when Graham stops testifying is ask the judge to seal the transcript, and the judge says why, and he says, "We don’t want it getting out and mucking up the McVeigh trial: the fact that here an ATF agent, an informant, had gone to Oklahoma City to scout the Murrah building to be bombed with people other than McVeigh four months in advance." And the judge granted the order, and he ordered the transcript sealed.

.......Trentadue: And it gets more incredible, I mean, one of the things I have is I have affidavits from the people who knew how the surveillance system worked in the Murrah building including one from an Oklahoma City police officer who was on the scene immediately after the blast trying to find survivors and rescue them and they’re ordered out of the building and the FBI takes the cameras down. I mean…

Horton: Mmhmm. Well, and you know there were three different bomb scares after the bombing where they said "We found an undetonated bomb, everybody run." And I guess I used to just be convinced that that meant that they found an undetonated bomb, but maybe there was something else going on there. I guess JD Cash thought that there were not internal explosives but that the ATF, for example, had a tow missile up in their offices that they had to get rid of and maybe some other things. And I guess you’re saying it sounds like one of these bomb scares was about getting rid of the security cameras.

Trentadue: It was. They went in immediately and took the cameras down off the building. And why, within minutes of the blast, when people are searching frantically due to rubble trying to rescue the people and save lives, would the FBI order the rescuers out and then remove the cameras?

........Horton: All right, now, what do you have, and you know, I just, I shouldn’t make this personal, but I guess I kind of am making it personal. Every day I turn on TV and somebody from the Southern Poverty Law Center is saying that anyone who does not approve of whatever the administration is doing at any given time is basically a neo-Nazi, basically responsible for the Oklahoma City bombing. If you’re a member of the Tea Party movement, which I am certainly not and have not much in common with, but according to them, if you’re a member of the Tea Party movement, then, well, you’re basically John Doe No. 2. And, you know, it’s extra frustrating to me since John Doe 2 apparently was an undercover FBI informant and they get to go ahead and continue to, you know, beat any dissent against a Democratic [Party] controlled government over the head with this bombing. Um, but it’s always somebody from the Southern Poverty Law Center who is the guest, the expert guest, who gets to tell us how many hate groups there are in America at any given time and conflate basically anybody to the right of Rachel Maddow together with Timothy McVeigh. And so I’m kinda curious to know what evidence you have, Jesse, that the Southern Poverty Law Center was in any way involved with the neo-Nazi/cops who did the Oklahoma bombing.

Trentadue: Well it appears, and first of all, I agree with you, it’s a sad state in our country’s history where to voice an opinion means you’re attacked from one side or the other. It means you no longer discuss things as a nation or a people. That we’ve become so divided now that you’re either one side or the other or forced into one side or the other. But for the Southern Poverty Law Center, they had, and they’ve had – they had apparently informants, another level of informant, at Elohim City at the same time that Strassmeir and Carol Howe and the other government informants were there. These documents that I’ve had them produce, and not widely reported on, refer to the Southern Poverty Law Center reporting to the FBI the information it was receiving from its informants at Elohim City about the bombing.

Horton: Now do you know who those informants were?

Trentadue: I do not.

Horton: Are there any indications whether…

Trentadue: The names are blacked out. The FBI pleaded with the judge not to turn over any of the documents because they said they had guaranteed five or six people anonymity and confidentiality and it would expose them to risk of their life if their names were disclosed, and the judge said "Well, black out the names but turn the documents over." So I have documents talking about the informants, but the informants’ names are redacted or blacked out. By their own admission they’ve had five or six there that they had promised protection.

Horton: Hmm. But I guess, are there any other… because, you know, I remember JD Cash talking about this back in the day and I forget whether he said there was any other indication as to the identities of the informants that were working with Morris Dees.

Trentadue: I suspect that Strassmeir was reporting to the Southern Poverty Law Center too.

Horton: See that was something about this, right? – was Janet Reno’s order restricting, I think this is what JD Cash told me, that there was a guideline from the Justice Department that went down that said or that in some way restricted the authority of the FBI to infiltrate groups.

Trentadue: A religious compound. I talked to JD about that and he’s absolutely right. He believed that it was a cutout operation that the FBI was, that the Southern Poverty Law Center was a straw man being run by the FBI in this operation because the FBI could not, because it was a governmental entity, invade this religious compound. And Elohim City claimed to be a right-wing Christian fundamentalist compound.

Horton: Well but there’s all kinds of other evidence that any number of these guys were actually working for the FBI as either cops or like perhaps Strassmeir paid informants, people who’ve been, you know, threatened with prosecution and then turned state’s witness and, you know, should we go down the list here? I mean there’s quite a bit of FBI work going on at Elohim City. Was it all being outsourced through the SPLC?

Trentadue: I don’t know, but I think a large part may have been, at least from the documents that I’ve been given, I mean, or that the judge has ordered released. They were very active there. But I don’t think it was all run through them. The ATF for example had Carol Howe and probably others.

Controlling 9/11 "crippled epistemology" via fake 'CIA' Internet Conspiracy Theories, COINTELPRO & "cognitive infiltration of extremist groups": Huge jackass/Obama Info Czar Cass Sunstein favors infiltrating conspiracy groups, planting disinfo, diversions

140110top2.jpg"....we will suggest below that if the hard core arises for certain identifiable reasons, it can be broken up or at least muted by government action." .... "We suggest a role for government efforts, and agents, in introducing such diversity.  Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action."

SSRN-Conspiracy Theories by Cass Sunstein, Adrian Vermeule

This is one hell of a chestnut. It seems obvious, in retrospect, the best way to conceal the truth of establishment shady business and institutionalized crime is to mix in a ton of bullshit in order to turn all the skeptics and inquirers against each other. Only now it's Obama's dang 'information czar' pitching the strategy!

Interestingly, the more I broaden my sources, the more I appreciate the broad spectrum of people that have cancelled their subscriptions to Establishment Bollox and the Lies of the Mighty Wurlitzer. It's amazing how so many features of Establishment Reality are so widely loathed from within so many different worldviews.

This important fact is what people like Cass Sunstein don't understand. Like faux Establishment 'Centrists', they believe that ontological truth, or even the 'optimal' policy outcome, is like @ the 50% mark between where the dialectical left & right goalposts are placed.

It's like Howard Fineman - accurately dubbed the Weathervane because you only have to look which way he's pointing to determine what reassuring centrist reality is today's hot item. Howard Fineman is the precise opposite of a 'conspiracy theorist' in Sunstein's world.

The Establishment's Hegelian social control techniques are obvious: just set the left and right goalposts, stir and repeat. Problem-reaction-solution. If one can influence both the left and right goalposts in the great false dichotomy, it makes the product of "centrists" far more acceptable. Everything floating around outside this parlor game is the prima materia of 'conspiracy' that the State should attack professionally, Sunstein says!

Sunstein's tidy worldview brushes over the complex role of deceptive bullshit operatives around there, laying the groundwork for stupid establishment narratives. For example, what are we to make of the ever-shady Gerald Posner, spoonfed the FBI goodies on China? Or Adam Ciralski, helping Blackwater's Erik Prince perpetrate some classic exposure-threatening graymail about U.S. covert ops. Are these merely products of rotten epistomology? [PD Scott with a solid takedown of Posner - Scott's the real deal with The War Conspiracy and more here.]

*****

Anyhow Cass Sunstein was appointed by President Obama as some kind of info czar. Interestingly he wrote a paper about how to manipulate conspiracy theorists by attempting to throw their groups off the Hegelian deep end, thus opening an opportunity for defamatory information warfare. Fascinating stuff, and it's got Alex Jones incensed!!

More links, then some snippets: Obama Information Czar Calls For Banning Free Speech, Sunstein’s Paper Provides More Evidence COLINTELPRO Still Operational, etc.

This whole thing reminds me of how the JFK conspiracy scene is managed as "A Story/B Story" wherein there are two alternate, mutually irreconcilable narratives. Dribs and drabs of facts supporting A and B (roughly, CIA/Mafia and Lone Gunman, usually) can be offered and safely paddle around on the History Channel.

Let us share a few choice links about how the CIA type control system AKA the Intelligence Power controls the World of Conspiracy. This is good stuff -- this is exactly how Mama Cass wants the world of conspiracies organized.

For The Win: Fintan Dunne called the Sunstein approach years ago!

My favorite all-in-one shotgun approach comes from Fintan Dunne of BreakForNews.com: BreakForNews.com : The CIA's Internet Fakes


The CIA Fakes is a catchphrase term to describe a group which includes:

-- Covert Operatives of the CIA, NSA and DIA; of the U.S. Corporate/Military Industrial Complex; of the intelligence services of U.K. Spain, France Holland, Germany, and Russia.
-- Political Agents working within the Democratic Party, Republican Party, Democratic Black Caucus, Green Party, and Patriot Movement.
--
Politicians in the U.S., U.K. Spain, France, Germany and Russia --who pose as 9/11 skeptics.
-- Media, including
Mainstream, Alternative Media and Internet broadcasting media who either front for, cooperate with, or are directly employed by intelligence services mentioned above.

The primary objectives of the CIA FAKES are:

-- To leverage the Fakes into position as the leadership/spokespersons
    for the 9/11 skeptics movement.
-- To splinter and divide that movement.
-- To promote lame, tame and/or booby-trapped questions about 9/11.
-- To be sufficiently over-the-top as to prevent the 9/11 issue getting
    any traction in the media or left-wing.
-- To ensure that the movement would not have a politically-active
    leadership capable of turning it into an effective political lobby campaign.

The questions about 9/11 were bound to be asked, the important
aspect for the perpetrators was and is ...by whom?

Bravo, Mr. Dunne, Bravo. You scored big on this one... A general roundup to be found @ The Next Level :: View topic - Uncovered: The Rat's Nest of 9/11 of effective gatekeepers -- and its true that his set of people, in aggregate, has the 9/11 conspiracy topic cornered and setup a certain way.
More along these lines: 9/11, 7/7 & the War on Freedom :: View topic - The Planned Demolition of Alex Jones, The COUP had foreknowledge of 9-11 (YES!), the criticism about Sibel Edmonds, Scheuer, Ray McGovern, etc: WagNews: Our Good Friends in the CIA - NOT !, (i.e "The alternative media is ridden with ex-FBI, ex-CIA, ex-NSA, ex-MI5 people who are on "our side". It's all total BS.") WagNews: Alex Jones, Hopsicker & the 9/11 CIA Fakes -Audio.

This one is suddenly salient: WagNews: Ellsberg, Sibel Edmonds & The Secret Team:

WHAT FLAVOR CONSPIRACY YOU WANT?

One big corner of that overall 9/11 picture is formed by four disparate-seeming individuals: a veteran whistleblower, an attractive novice whistleblower, a campaigning journalist and a reputed lingerie model; jigsaw peices called Ellsberg, Edmonds, Hopsicker and Keller. Ellsberg supports Edmonds, confirmed by Hopsicker --backed by eyewitness accounts from Keller. But they're all telling different flavors of the same story.

To specify which story that is, let's take a look at the popular tales of 9/11. The notorious main division is between LIHOP and MIHOP. But it's much more detailed than that. Explanations come in a full range of flavors --starting with the official story:

A. Official story:
CIA/FBI were incompetent; Bush and/or Clinton were complacent.
B. Official Lame Conspiracy:
CIA/FBI were incompetent; Bush/Cheney maybe let it happen; Israelis Knew.
C. Official LIHOP Conspiracy:
CIA/FBI were compromised; Bush/Cheney did let it happen; Israelis Helped.
D. Official LIHOP Wild Conspiracy:
CIA/FBI compromised; Bush/Cheney/Neocons let it happen; Israelis Did It.
E. Official LIHOP Tinfoil Conspiracy:
Israelis/Neocons/Bush/Cheney Did It; CIA/FBI looked the other way.
F. Official MIHOP 'Serious' Conspiracy:
Israelis/Neocons/CIA/FBI/Bush/Cheney/Military-Industrial-Complex Did It.
G. Official Loony Conspiracies:
Rothschilds and/or Rockefellers and/or CFR and/or Bildebergers did it.
Globalists who want to run everything in a World Government did it.
Jews and Jewish bankers -who already run everything- did it.
Satanists, Opus Dei or Reptilians did it.
It's a terrific variety of theories.
It plays out something like this:
  • The mainstream media push version A; hint at B; sneer at G.
  • The controlled right/intellectual media pushes version B.
  • The controlled left/intellectual media pushes version C.
  • The 'moderate' Fake internet sites push versions C and D.
  • The 'softcore' Fake internet sites push versions D and E.
  • The 'independent' Fake internet sites push version F.
  • The 'loony' Fake interent sites push variations of version G.
But every single one, from A to G are OFFICIAL versions, sanctioned and promoted by the 9/11 intelligence coverup operation and their CIA Fakes network. They have a flavor for every market.

The creation of this multiplicity of explanations is a core element of the coverup. Left to their own devices, people on the Internet might have figured out the truth themselves. But with this circus in action, there is always plenty of distraction and lots of division in opinion.

The intelligence coverup is not trying to stop 9/11 conspiracy theories on the internet. It's creating them. Then playing off supporters of the different theories against each other. That's a classic Cointelpro-style tactic.

***********More from good Ol L Fletcher Prouty on CIA / Ellsberg limited hangout type conspiracy control!
Let's get to the brand-new material from the White House info czar, it's wild!!...... Conspiracy Theories by Cass Sunstein & Adrian Vermeule:

Our main though far from exclusive focus – our running example – involves

conspiracy theories relating to terrorism, especially theories that arise from and post-date

the 9/11 attacks. These theories exist within the United States and, even more virulently,

in foreign countries, especially Muslim countries. The existence of both domestic and

foreign conspiracy theories, we suggest, is no trivial matter, posing real risks to the

government’s antiterrorism policies, whatever the latter may be. Terrorism-related

theories are thus a crucial testing ground for the significance, causes, and policy

implications of widespread conspiracy theorizing. As we shall see, an understanding of

conspiracy theories has broad implications for the spread of information and beliefs;

many erroneous judgments are a product of the same forces that produce conspiracy

theories, and if we are able to see how to counteract such theories, we will have some

clues about how to correct widespread errors more generally.

Part I explores some definitional issues and lays out some of the mechanisms that

produce conspiracy theories and theorists. We begin by discussing different

understandings of the nature of conspiracy theories and different accounts of the kinds of

errors made by those who hold them. Our primary claim is that conspiracy theories

typically stem not from irrationality or mental illness of any kind but from a “crippled

epistemology,” in the form of a sharply limited number of (relevant) informational

sources. Those who hold conspiracy theories do so because of what they read and hear. In

that sense, acceptance of such theories is not irrational from the standpoint of those who

adhere to them. There is a close connection, we suggest, between our claim on this count

and the empirical association between terrorist behavior and an absence of civil rights

and civil liberties.10 When civil rights and civil liberties are absent, people lack multiple

information sources, and they are more likely to accept conspiracy theories.

Part II discusses government responses and legal issues, in light of the discussion

in Part I. We address several dilemmas of governmental response to conspiracy theories,

such as the question whether it is better to rebut such theories, at the risk of legitimating

them, or to ignore them, at the risk of leaving them unrebutted. Conspiracy theories turn

out to be especially hard to undermine or dislodge; they have a self-sealing quality,

rendering them particularly immune to challenge. We suggest several policy responses

that can dampen the supply of conspiracy theorizing, in part by introducing diverse

viewpoints and new factual assumptions into the hard-core groups that produce such

theories. Our principal claim here involves the potential value of cognitive infiltration of

extremist groups, designed to introduce informational diversity into such groups and to

expose indefensible conspiracy theories as such.

Tell me this, Sunstein: how does all that drug money get through the Federal Reserve System? Everyone has been so eager to confront that 'conspiracy theory,' haven't they?

Blah blah blah... let's get to the good stuff: [Below the fold - favorite chunks of much of the crazy essay]

Mike Connell's mysterious plane crash via 'jackals'? SV40 & cancer; Alternative news gatekeepers? a linkpack! etc etc

200912070232.jpg

Damn straight - those are the chips they are gonna track you with. CHIPS CARRIED BY BIG FRICKIN ANTS. Via the too-speculative ATS thread RFID Microchips In The Swine Flu Vaccine?

It's time to push out some links and see if they lead somewhere....This weekend I've been building up a sweet new InfoSpace via a refurb'd Pentium 4 and a new LCD screen, from which I will be able to make awesome websites... It's powered by CentOS - centos.org - The Community ENTerprise Operating System

Hopefully better ones than the late Mike Connell, who seems like a guy too-nice-by-half to be tangled up with the people that might have done him in... He was getting dragged in to testify on the 2004 Ohio election fraud (perhaps since as some have alleged, his computers were involved when They spoofed the vote!)

The Late Mike Connell, GOP web guy extraordinaire... The BRAD BLOG : Exclusive: Mike Connell's Family Copes With His Mysterious Death, Tipsters, Legal Options

Conspiracy theories aside, Perkins says the U.S. government has historically used assassination jackals abroad and says it should come as no surprise that they are contracted domestically. "The U.S. President hires Blackwater to do that sort of work for the U.S. government so why wouldn't they do it for themselves particularly if they needed it? If you're a plumber and you fix everybody else's plumbing and your sink breaks, you're probably going to fix yours too."

Heather states if there is an informant, she wants to know who that person is. She also says she'd like the "trusted friend who told Mike not to fly" to come forward.

Shannon says if there were proof of foul play, she believes her family would file a wrongful death suit against Karl Rove. But she says she's not sure her family will ever know what really happened that day in December.

Recently, the Connell family has been dealt another blow --- an anonymous memo penned by someone identifying themselves as "Mark Felt" (the name of the man who was ultimately revealed to be "Deep Throat"), cataloguing an order and mission to remotely intercept and rig the instrument panel of Mike Connell's plane then "sanitize" the area.

Heather confirms receipt of this memo, which was cc'd to six unknown recipients.

Those close to the case believe the person behind the memo is a real informant with inside knowledge about Connell's plane crash. There are a number of Intelligence officials looking into it, including the FBI. The FBI field agent in charge of the case, Jack Vickery, did not return my calls. But Cliff Arnebeck, the prosecuting attorney in the case and the one who deposed Mike Connell last November, issued the following statement:

We received copies of the "deep throat" letter and redacted report of a jackal that "is not supposed to exist." We passed on to the FBI this and other information we have relevant to the matter. Our impression is that the FBI is doing its job of investigating specific allegations regarding the assassination of a vital witness in our federal election fraud case.

The "Jackal" that Arnebeck refers to is a hired assassin. Former CIA operative John Perkins wrote about such "jackals" in his book, Confessions of an Economic HitMan, and says while he doesn't have any inside knowledge about Connell's death, he would not be surprised if he was murdered.

"It wouldn't surprise me a bit. They've certainly assassinated a lot of people in this country. The Kennedys were assassinated. Martin Luther King Jr. was assassinated. It's entirely possible that Paul Wellstone was assassinated. We've had a long, long history of assassinations. It's extremely successful in terms of turning politics around and getting people off cases. In a way, Bill Clinton was assassinated but it was a personality assassination. The Connell case is just one more possibility."

Perkins adds, plane crashes have always been a weapon of choice among Jackals. "It' so easy to cover it up. The evidence is destroyed and everybody knows airplanes are fragile anyway, small airplanes in particular. So it's a very clean type of assassination in terms of ways to do it because the area where the plane crash happens can be quickly cordoned off…and the evidence can be cleaned up very quickly and most of it is destroyed anyway. But if there's anything left, it can be disposed of very, very quickly."

........

"I think Mike got caught up in some other people's lives and didn't know how to get out or was trying to get out. You know, I'm real cynical about whether justice will be done. A lot of the government officials probably have gotten away with a lot of things. My position now is what's going to make this different? What's different with my brother's death that's any different than Paul Wellstone's?"

For notes on the Brad Friedman vs. Wayne Madsen spat see below...

Bioweapons galore: see Amazon.com: Dr. Mary's Monkey: How the Unsolved Murder of a Doctor, a Secret Laboratory in New Orleans and Cancer-Causing Monkey Viruses are Linked to Lee Harvey Oswald, ... Assassination and Emerging Global Epidemics... It all comes around to SV-40 in polio vaccines turning into cancer, with a side of secret monkeys!

Sprint 8 million! Who doesn't enjoy hearing about Sprint's spiffy GPS auto login portal for the cops - but how can we forget Sprint manager: ‘Half’ of all police surveillance includes text messaging | Raw Story. The post that started it all slight paranoia: 8 Million Reasons for Real Surveillance Oversight.

Let's get inventive! Make an Independent Movie on the Cheap - Wired How-To Wiki

Glenn Beck movie fail! Exclusive: Beck’s movie bombs in New York, Boston — and Washington, D.C. | Raw Story

Blackwater's Erik Prince decides to yap it up. t r u t h o u t | Blackwater Founder Tells of Extensive Government-Contracted Assassinations. More Blackwater behind plan to kill or snatch - BlackListed News

Everyone gets money! The US sponsors the Taliban but let's sponsor West Bank settlers too: why not?! How does the U.S. help fund pro-settler IDF troops? - Haaretz. For a good time in dense thickets of British financial conspiracy chatter and shell-chasing, see THE FINANCING OF AL-QAEDA BY U.S. INTELLIGENCE from UK'er Christopher Story. Also SIGNS OF AN END-GAME SHOWDOWN WITH WASHINGTON. Banks suck worse than Enron.

PETA is terrorists so check all that apply: Government forms are the best! Well perhaps I have not been given enough credit to PETA: The USDA APHIS Facility Security Profile reminds us that political activities intersecting with capital are deemed terrorism: PETA Listed as “Domestic Terrorists” by USDA »GreenIsTheNewRed.com (made the NYT)

B. Terrorist Threat. What terrorist activities have occurred in or around your building/facility in the past 5 years (documented cases)? Please check all that apply.

[ ] Attack from international terrorists
[ ] Attack from domestic special interest terrorists
-[ ] Earth Liberation Front (ELF)
-[ ] Animal Liberation Front (ALF)
-[ ] People for the Ethical Treatment of Animals (PETA)
-[ ] Animal Defense League (ADL)
-[ ] Stop Huntingdon Animal Cruelty (SHAC)
-[ ] Formal hate group(s) (please specify):
-[ ] Other (please specify): ____________________
[ ] Cyber Attack from a known or unknown source.

RELATED - for the domestic terrorist in yr kitchen: Sarah Kramer and Her “Domestic Terrorist” Apron »GreenIsTheNewRed.com

The secret tale of Alex Jones vs Jeff Rense: Skip this graf if you don't care about conspiracy world infighting: Jones and Rense are two talk show type guys out on the great American 'fringe' or alternative media, call it what you will -- Overall they are generally constructive it seems to me. Jones has a lot of bombast while Rense is low-key and more into cool vibes, alternative health and UFOs. They were once pretty closely aligned it seems, then had a big falling-out. This one lady, Lorie Kramer, posted a big website on the "Alex Jones Machine" which is sure to freak out his most avid supporters. Also on this rather ugly/offensive site Jones is accused of being basically a Zionist due to links among his supporters, lawyer & local radio station. (that site also complains about the Jewish assault on glorious White America - it only takes a couple hyperlinks to land at this nasty racism once you go looking into conspiracy spats :-(

Bonus: Brad Friedman vs Wayne Madsen: Speaking of conspiracy spats be sure to check out the thread on this BRAD BLOG - Story on Edmonds 'Outs' Video-taped, 'Blackmailed' Dem Congresswoman; Alleges State Dept. Mole at NYTimes... Friedman was accused by Madsen of essentially working for/covering/being a weenie hack for the Turkish-Israeli ring because he refused to come out and name Schakowsky. Friedman defends himself and makes interesting points on Madsen in the notes. Overall Friedman seems greasy though he does often have goodies.

Health bits (a good example of a Rense post) MSG Causes Obesity, Hides Behind Many Fake Names. Also Rense has archives like of this late anti-NWO paranoid European guy Philip Jones.

The Sound of Silence: As long as we're on a roll here - of course we need a theory about HDTV and mind control - The Sound of Silence: The Antithesis of Freedom by A. True Ott, PhD, ND. It reminds me of that one Vonnegut story.

Notes from the left: Conflict between race and labor organizing is a pretty deep loop played expertly by rich white dudes for a long time. Along these lines - back in 2007 The Sojourner Truth Organization: Notes Toward a History :: The White Skin Privilege Concept: From Margin to Center of Revolutionary Politics.

Democrats Fail! On the mainstream side see Jane Hamsher leads left away from White House - POLITICO.com. What Stupak? Not So Pretty in Pink - I like how Barbara Ehrenreich has ripped apart the mess of therapeutic self-help culture.

Students screwed: t r u t h o u t | A Quiet War On Students. Student loans not crooked? That'll be the day. There's usury needed! Network of Resistance to the "Structural Adjustment" of U.S. Universities - Infoshop News (also here) See edufactory2009's Channel. The Occupation Movement: Take Back The Land Call To Action For Mayday 2010 - Infoshop News. Communities Rising (NOLA) We are the Crisis: WE ARE THE CRISIS: The Student Movement and the Coming Decade. etc.

Martial Law and terroristic mischief: this made the rounds: Greg Everson Warns: U.S. Forces Plan Direct Action Against American Citizens. NORTHCOM CONPLAN 3502 no doubt. Isn’t “Terroristic Mischief” a Contradiction in Terms?. Also: 5 Reasons that Corporate Media Coverage is Pro-War. Comply With the FTC's New Blogger Disclosure Rules With Amusing Icons

Greece situations: Another Update From Greece | Anarchist news dot org. Huge roiling of stuff for anniversary of infamous police assassination. Greece Weekend of 12/06. Bankrupt the System, Exploit The University | Anarchist news dot org

War Sux: Craig Murray - Obama Is Wrong On Both Counts. Maddow: Is Obama Following The Bush Doctrine?. Chicago Indymedia: PHOTOS: Hundreds protest Obama 'surge' in Afghanistan. Local - fun with a bike! Anti-war protesters march in Minneapolis, arrests made. (viddy)

Banks fail: SHOOT: Entire countries face bankruptcy

Google DNS: The Next Phase of Google’s Internet. Inspires loathing -- but current cable practices are loathesome..

Now listening: the Birds & the Beats mixtape by M.anifest. see Liner Notes: to Enhance Listening... I lost the download link. But lol this monkey see monkey do. What production!

-- That is all for this LinkPack --

Some notes from the Abyss; Fusion Centers going to fuse the future & NATO PSYOPS info operations schema exposed

We're on the brink of disaster | Salon!

As people lose confidence in the ability of markets and governments to solve the global crisis, they are likely to erupt into violent protests or to assault others they deem responsible for their plight, including government officials, plant managers, landlords, immigrants and ethnic minorities. (The list could, in the future, prove long and unnerving.) If the present economic disaster turns into what President Obama has referred to as a "lost decade," the result could be a global landscape filled with economically fueled upheavals.

Indeed, if you want to be grimly impressed, hang a world map on your wall and start inserting red pins where violent episodes have already occurred. Athens (Greece), Longnan (China), Port-au-Prince (Haiti), Riga (Latvia), Santa Cruz (Bolivia), Sofia (Bulgaria), Vilnius (Lithuania) and Vladivostok (Russia) would be a start. Many other cities from Reykjavik, Paris, Rome and Zaragoza to Moscow and Dublin have witnessed huge protests over rising unemployment and falling wages that remained orderly thanks in part to the presence of vast numbers of riot police. If you inserted orange pins at these locations -- none as yet in the United States -- your map would already look aflame with activity. And if you're a gambling man or woman, it's a safe bet that this map will soon be far better populated with red and orange pins.

jobsrecessions.jpg

Kuntsler says it's one of those times when the abyss looks back at you. In that, he's right. I mean, it definitely feels like about halfway to the Eschaton right now.

The US Army ordered millions of dollars of riot gear. U.S. Army To Buy $6 Million Of Riot Equipment Fortunately Open Government brings this to us via the Webs:


Picture 54.png

Earlier: NorthCom Denies Troops To Be Used For Crowd Control

Wikileaks cracked a batch of encrypted Public Relations / Strategic Communications / information warfare / PSYOPS items from some dumb chumps' server. The secret password was progress!

Wikileaks cracks NATO's Master Narrative for Afghanistan - Wikileaks
nato-psysops.jpg

Bonus item: "Psy Ops media"!
psyops2.gif

[GIRoA actually means "Government of the Islamic Republic of Afghanistan." Which makes the weird military press releases with people talking about GIRoA most impressive.]

We are going into more debt to gear up the cops. Including here in Minnesota. Militarizing Police Depts. With Your Bailout Money

Meanwhile there are a debt-financed $250 million for fusion centers: Stimulus bill has $250m for fusion centers -- Federal Computer Week:

An economic stimulus package that the Senate is set to consider would provide $250 million for state and locally-run information sharing and coordination centers that are part of anti-terrorism efforts.

The Senate's $888 billion measure would include $250 million to modify existing state and local emergency operations centers and intelligence fusion centers or to build new ones. The $819 billion economic stimulus bill The House passed Jan. 28 did not authorize the same funding.

The fusion centers and emergency operations centers use technology and information technology to improve information sharing, situational awareness and coordination, and the Bush administration made fusion centers central to efforts to share terrorism-related information between federal and non-federal authorities.

The centers are owned and operated by states and local governments, and many of the more than 50 centers rely heavily on Homeland Security Department grants administered by DHS’ Federal Emergency Management Agency.

"Emergency operations centers" are the flip side of the Department of Homeland Security's increasing cash/grant powers around the country - many states have "Homeland Security and Emergency Management" departments. Us Mac students heard directly one time from fomer St. Paul DFL Mayor Randy Kelly that his endorsement of Bush had paved the way to extra emergency gear getting awarded from those corrupt apparachiks in DHS.

Fusion centers are an overlooked element of the emergent nationwide law-and-order Great Leap Forward. And very important. Fusion centers are basically heavily contractor-run headquarters for different law enforcement and increasingly military-supplied outposts of Total Situational Awareness.

American Civil Liberties Union : What's Wrong With Fusion Centers - Executive Summary

A new institution is emerging in American life: Fusion Centers. These state, local and regional institutions were originally created to improve the sharing of anti-terrorism intelligence among different state, local and federal law enforcement agencies. Though they developed independently and remain quite different from one another, for many the scope of their mission has quickly expanded - with the support and encouragement of the federal government - to cover "all crimes and all hazards." The types of information they seek for analysis has also broadened over time to include not just criminal intelligence, but public and private sector data, and participation in these centers has grown to include not just law enforcement, but other government entities, the military and even select members of the private sector.

These new fusion centers, over 40 of which have been established around the country, raise very serious privacy issues at a time when new technology, government powers and zeal in the "war on terrorism" are combining to threaten Americans' privacy at an unprecedented level.

Of course we are now learning that the North Central Texas Fusion Center (sounds like a lovely place) was ordered to track anti-war groups and lobbying organizations. ACLU: Fusion Center Encourages Improper Investigations Of Lobbying Groups And Anti-War Activists | CommonDreams.org

Bad kids say that Government Prepares the Public for Cradle to Grave Surveillance which references some new Lockheed Martin red light tracking systems & other schemes.

This is because there is not enough serious crime and terrorism to satisfy the great need for these people to find something to do. It is one giant perpetual data mining fishing expedition in the works.

200903012342.jpgMore nascent plans for domestic militarization & the Big Service Programs o' doom!: These have become quite trendy lately. Whether it's Alcee Hastings' new FEMA Camp plan or the nationalization of the whole economy, or the Rahm Emanuel Vaguely Menacing Civilian Quasi-Militarized Training Corps, well it's all a shade weird lately.

Bad kids write: Democrats Introduce Public National Service Bills such as: Dodd, Cochran, DeLauro Announce “Service For All Ages” Initiative and Service for All Ages Press Conference | servicewire.org

Everyone in tinfoil country heard about this one: YouTube - Obama Civilian Security and called it the Stasi. Ok a bit harsh, but the whole thing is weird. Bonus points to prisonplanet for the quasi-Rising Sun style artwork.

More from the bad kids: Lawmaker Warns Of “Forced Servitude” Under Obama and Analysts: New Era Of Chaos Has Taken Hold

And of course: Urban Warfare Drills Linked To Coming Economic Rage

Check out the size of ALL derivatives: Semiannual OTC derivatives statistics at end-June 2008 Download this PDF for the full data. System shocks could cause these multi trillions to fail to roll over. Data from the Bank for International Settlements, which will probably get mutated by the Great Intervention soon enough.

BAD MATH!! VERY BAD MATH!!
200903012331.jpg

Don't miss it: Wired: Recipe for Disaster: The Formula That Killed Wall Street (more on this) This is the research paper that actually caused all the fake AAA derivatives to become taken as "real." AMAZING!!!

For your somewhat wild UK financial investigator view to the Great Financial Arson of our times, consider Worldreports.org with Christopher Story. News - CATASTROPHIC BANKERS’ RAMP TO CONTINUE UNDER OBAMA and News - GEITHNER TO LAUNCH WORLD’S BIGGEST PONZI SCAM. AKA no one wants to buy the repackaged toxic paper, which led of course to the chortling Trader Floor Conspiracy of Chicago.

FT.com / Markets / Insight - Insight: Time to expose those CDOs. Get ready. Early April will see a lot of economic turbulence I bet, because many banks'll be proven insolvent.

Krugman's feeling the zombie vibe: All the President’s zombies.

Hard to crash COMEX than we thought! It looks like the great paper gold reservoir is bigger than expected, which means it'll be harder for goldbugs to 'crash' the paper gold system (which currently creates a huge 'virtual supply' to bet on). See Chart: COMEX Gold Inventory « Meltdown 2011.

This guy is bent on something about Shadow Powers. Mwahaha. And Of Layoffs & Riots… And Think Tank’s 2009 predictions. Also why not? WSJ Talks Amero.

and Cartel’s End Game Has a “Nasty Twist”.

Also some people are saying silver is due to go up - it usually hangs around about 55x smaller than gold. See The Silver Catapult Is Loaded.

Don't Miss Global Guerrillas: BREAKING THE BANK and THE QUICK ROAD TO GLOBAL INSURGENCY and RC JOURNAL: US Foreclosures and the Tactics of Delay and JOURNAL: Swarming Attacks

Data flow notes: I have spun up a bit more twitter activity @ twitter.com/hongpong .

As Capitol press corps shrinks, government controls message | OKG Scene.com

Signed up for Jim Sinclair’s MineSet. Old school financial prognosticator. See Officially “Out Of Control”.

Time to throw a fuss: Facebook open-sources its terms of service | The Open Road - CNET News

Local Labor Revolution! Go Wobblies! Twin Cities Starbucks Workers Union

Ron Paul talkin smack: YouTube - Ron Paul's opening statement 2009.02.25 upsets the CNBC anchors!! The usual suspects complement him. CNBC sad.

Well that's all for now. Have fun kids!

Syndicate content