Sheriff Stanek lied on Minnesota Public Radio this morning about marijuana and local violence

Super quick note: Sheriff Stanek lied on Minnesota Public Radio this morning claiming that tons of people are intoxicated on marijuana when they commit violent crimes - a dramatic distortion of yesterday's Stanek Star Tribune op-ed saying more than 50% of people booked at Hennepin Co Jail test positive (as one can test positive for weeks after smoking MJ).

Harry Anslinger abandoned this particular tactic decades ago. MPR mentioned my tweet around noon "Dan says Stanek just lied on MPR" and now the meme is rolling around further ;) stay tuned …..

See:

http://minnesota.publicradio.org/display/web/2013/09/19/daily-circuit-ri... http://www.startribune.com/opinion/commentaries/224151231.html

Lies on MPR: "When you show me that in a jail that books 40,000 people a year for a variety of offenses, whether drunk driving, domestic assault, rape, robbery, murder, and I don't have 54 percent of them under the influence of marijuana, maybe I'll say something different," he said. "But at this point the facts speak for themselves."

Star Tribune totally different claim: "I have seen firsthand in Hennepin County that there is a direct connection between marijuana and violent crime. Drug task forces here have linked marijuana to assaults and homicides. In the Hennepin County Adult Detention Center, marijuana is the most commonly detected drug among the 36,000 inmates who are booked into the facility each year. According to our most recent data, approximately 54 percent of males arrested for violent crime test positive for marijuana in Hennepin County."

You're busted for lying about the war on drugs and drug effects, sheriff. Alcohol causes way more violence.

UPDATE 3:45 Saturday: Aaron Rupar @ City Pages expands in more detail on the falsity of the pot/violence link as shown in relatively plentiful academic studies. 459 FB likes, 27 tweets and 119 local comments. Hennepin County Sheriff Rich Stanek thinks pot makes you violent - thanks @atrupar for the hat tip! On Friday, the Star Tribune carried a good op-ed from west coast radio host Russ Belville as well: Sheriff Stanek's misdirection on marijuana | Star Tribune.

Susan Perry in MinnPost also wrote a more detailed medical perspective: Sheriff Stanek's marijuana comments confuse correlation and causation | MinnPost. Well done everyone!

Occupy Boulder Flood Relief gets rolling as oil oozes around Colorado; Japanese typhoon could create complex Fukushima super-meltdown; Sunday LinkDump

boulder-climate.jpg

The good news is that people are organizing for flood relief in Colorado along the proven lines of previous efforts at Occupy Sandy. URLZ: #boulderflood relief :: Boulder Flood Relief - Get help & get involved

First meeting 28 mins video: Boulder Flood Relief - Orientation Meeting - YouTube

Donations on wepay at $2k currently: Boulder Flood Relief:

Boulder Flood Relief provides immediate assistance to those affected by the Boulder flood of September 13, 2013. We are currently providing physical labor such as cleanup help for those affected by the flood. More volunteers are joining by the hour and we will be able to fill more needs as new skill sets present themselves. If you have any need please link, call, or email here:

boulderfloodrelief.org

720-943-4482

BoulderFloodRelief@gmail.com

100% of donations from this page support these relief efforts. They go toward cleanup equipment, administrative costs, and other immediate needs. Funds may also go toward providing material goods and food for affected Boulder county residents.

We work in relationship with Four Mile Fire Relief, which is a local, relief-oriented 501(c)(3) non-profit. They provide financial oversight and make your donation tax deductible.

If you can donate food or material goods please contact YMCA Boulder, as we are not accepting physical donations at this time.

YMCA Boulder 303-442-2778

2850 Mapleton Avenue, Boulder CO

If you are in need of assistance please go to boulderfloodrelief.org and fill out an assistance form. We will contact you asap. Thank you, from your friends and neighbors at Boulder Flood Relief.

/////

Another long and productive day with Boulder Flood Relief. In under 72 hours we've:

- Built a volunteer database of over 500 individuals.

- Started work sites with over 30 volunteers on the ground helping homeowners.

- Sent canvassers to affected neighborhoods to assess needs.

- Built information systems that will allow the organization to scale and be transparent to itself (using a combination of open source and cloud based software).

- Began building a peer to peer marketplace of goods and services so folks can self-organize to relieve and recover.

Not bad for three days. If you're in Boulder we invite you to get involved in whatever way you can. Go to our website (www.boulderfloodrelief.org) and register as a volunteer and/or share your needs.

There is much work to be done, and we are the ones to do it.

#boulderflood #boulderfloodrelief

Facebizzle: Occupy Boulder Flood Relief. Small tumblr: Occupy Boulder Flood Relief. Twitter: #BoulderFlood Relief (BoulderRelief) on Twitter

Some app for help: SparkRelief.org | Community Driven Disaster Relief

spark-relief.png

Reddit help info index: 9/13/2013 - Colorado Flooding Resources : Colorado

Large and detailed Google Docs info on Boulder CO support resources: A snippet:

Logistics

Headquarters/Hub/Incident Command Post:

[location to be announced tomorrow]

[9/13 location: 1:30 pm @ Innisfree Coffee, 1203 13th St., Boulder, 80302]


Remote Supplies Location:

[to be determined]

Vital Numbers:

Cel.ly Loop: text @floodrelief to 23559

The Internet

Common Hashtags:

#BoulderFlood, #COwx, #WaldoFlood, #COflood #LongmontFlood #LyonsFlood, #Ftcollinsflood, #CCCF, #JeffCoFlood, #ColoradoFlood, #larimerflood

Related Searches:

#Boulder, Boulder flash flooding,


Google Community:

https://plus.google.com/communities/110401760903189735343 for sharing information documents inter-organizationaly


Twitter Accounts:

@ArvadaPolice

@BoulderCounty [Boulder Local Government]

@BoulderOEM [Boulder Office of Emergency Management]

@COEmergency

@femaregion8

@jeffcosheriffco [Emergency info for Jefferson County]

@LarimerSheriff

@NWSBoulder [National Weather Service, Boulder]

@OccupyRelief [part of @OccupySandy]

@Occuweather

@RedCrossDenver

@bowandarchery

Alerts and Closures

For Road Closures: @ColoradoDOT, BoulderOEM Road Closure Update

For Current Emergency Information/Emergency Status: http://boulderoem.org/emergency-status

For National Weather Service Alerts: http://www.crh.noaa.gov/bou/

For CU University Campus Alerts: http://alerts.colorado.edu/

For Greeley city updates: http://greeleygov.com/PIO/Lists/News%20Releases/DispForm.aspx?ID=1802&Source=http%3A%2F%2Fgreeleygov.com%2FPIO%2FMedia.aspx

General Links

National Weather Service Hydrograph:

http://water.weather.gov/ahps2/hydrograph.php?wfo=bou&gage=bocc2

http://streamstatsags.cr.usgs.gov/ThreatenedGages/ThreatenedGages_seq.html

Colorado Division of Water Resources -- Boulder Creek Gage Height West of Broadway:

http://www.dwr.state.co.us/SurfaceWater/data/detail_graph.aspx?ID=BOCOBOCO&MTYPE=GAGE_HT

Google Boulder News Aggregator

http://goo.gl/news/58WN

Cleanup Guide:

http://www.floodsafety.com/media/pdfs/cleanup/Cleanup_after_flood.pdf

Maps

Boulder Flood Hazard Mapping

http://gisweb.ci.boulder.co.us/agswebsites/pds/floodmap/

For Google Maps (shelters, animal shelters, road closures, evac zones): https://m

apsengine.google.com/map/viewer?mid=zYYdhADI7PvQ.kzJSidMtEIqY

Xcel Power Outage Map: http://www.xcelenergy.com/portal/site/xe-en/menuitem.471846b0c2475abf262a71986b108a0c/?vgnextoid=02b6719a0b3cd210VgnVCM100000b40b98aaRCRD&vgnextchannel=e97c6113f220f210VgnVCM100000b40b98aaRCRD&appInstanceName=xe


Community Map with Instagram photo layers:

https://boulderflood2013.communityos.org/cms/node/1

Current EvacuationsFor Evacuation Center Info:, http://boulderoem.org/emergency-status

//////

From the Occupy Sandy days, relief network theory info: Home - FLO Solutions for Disaster Relief

//////

The OOZE: It's almost like drilling and fracking willy-nilly could set the stage for complex or compound environmental disasters. Colorado Floods Causing Fracking Spills?: Natural and Human-made Disasters Portend Future of Toxic Catastrophe | Earth First! Newswire

Is there a media blackout on the fracking flood disaster in Colorado? From an email:

I see you’ve noticed the underwater wells in Weld County, Colorado. Amazing; we’ve emailed the Denver TV stations, other media, and state and local politicians. We’ve sent pictures that our members have taken. It’s like the media and politicians have been TOLD not to say anything about it. There has been no mention of the gas wells on the Denver newscasts either last night or this evening although all stations have had extensive and extended flood coverage. You can see underwater wells in the background of some of the newscast videos, and yet the reporters say absolutely nothing.

Here’s a picture one of our members took yesterday in Weld County, Colorado. We’ve got tons more on our website. Check it out. The tanks are tipping and, in some cases, have fallen over. They have to be leaking toxins into the flood waters. There have to be hundreds if not thousands of underwater well pads in Weld County as a result of the flooding.

Please publicize this in Texas since our media people and politicians have gone silent!

https://www.facebook.com/EastBoulderCountyUnited

East Boulder County United

Lafayette, Colorado

WeldCountyFloatingTank-e1379213713195.jpg

Colorado Floods Causing Fracking Spills?: Natural and Human-made Disasters Portend Future of Toxic Catastrophe | Earth First! Newswire

National Geographic, Sept 14 2013: Amid Drought, Explaining Colorado’s Extreme Floods as the drought weakens absorption capacity of the land.

Navajo flooding in AZ: Dine' Resources and Information Center » Navajo Nation Operation Storm Surge – Volunteers Needed

▶ Raw video: Extreme flooding in Weld County - YouTube

//////

Impending Japanese DoomSphere: With the release of a new Ghost in the Shell series, ARISE [ see http://www.ghostintheshellarise.com/anime/ghost-in-the-shell-arise/borde... ] it is time once again to ponder how the land of the Rising Sun will get into a post-apocalyptic state required of the finest anime.

Fukushima could get flooded once again by Typhoon Man-yi, but perhaps they will have a lucky break. Typhoon hits Japan - fears for Fukushima plant - World - NZ Herald News. Tracking map URL next 12 hours are the Big Deal: http://www.wunderground.com/hurricane/western-pacific/2013/Tropical-Stor...

Commentary from Michael C Ruppert:

If you are psychologically and emotionally able...

First watch the aerial footage of the flooding around Boulder and Lyons, Colorado (below). Watch all of it, no matter how difficult that might be.

Then read this quote from this posting about Man-yi:

"Man-yi might also inundate Fukushima, where utility crews are struggling to contain highly radioactive water leaking from and flowing under the crippled Fukushima No. 1 nuclear plant and into the Pacific Ocean at an estimated rate of 300 tons a day".

Now understand that the earth at Fukshima has already been horribly compromised by flooding -- for two and a half years straight. The reactor buildings are unstable and ready to fall. The unwelded storage tanks are already failing, and the spent fuel pools are teetering above ground with their ever-present threat of an open-air, uncontrolled fission reaction.

Now add rainfall like what has just hit Boulder... Instead of many huge sections of roadway, bridges and buildings falling away into the torrent, picture the reactor buildings, the fuel pools and all the stored super-radioactive water being washed away, either into the sea, or being scattered and dispersed for hundreds, maybe thousands of miles by 50-60-70 mph winds.

And the hardest thing of all to imagine is the fuel pools collapsing in the middle of a tropical storm or typhoon, triggering an open-air reaction in the middle of all that wind.

Forget all of these other times the cliche "The Perfect Storm" has been used before. […..] When highly complex civilizations fail, they fail spectacularly. The cascade of problems becomes its own Fukushima tsunami. […..]

[CO Flood Post] Words are absolutely inadequate to describe this footage. I could not help continually viewing this as a metaphor, a symbolic viewing, of how difficult it will be to address the life-threatening crises that are bearing down so hard with so much infrastructure gone in so many places.

No matter where we are, this is showing us what our world is going to be resembling in the near future, whether as a result of floods, quakes, radiation, lack of maintenance, lack of resources and ultimately lack of will.

As local, immediate survival becomes a priority almost everywhere, our ability to address the larger issues causing these events collapses, evaporates and is gone with the wind.

Let your heart watch this right beside your mind. One way or another, this is the future for all of us, unless we can all unite on the same page, and at the same levels of consciousness.

AFP-JIJI: Typhoon Man-yi heads for Chubu | The Japan Times: "Man-yi might also inundate Fukushima, where utility crews are struggling to contain highly radioactive water leaking from and flowing under the crippled Fukushima No. 1 nuclear plant and into the Pacific Ocean at an estimated rate of 300 tons a day."

Petition w 1.5K signers right now: STOP FUKUSHIMA RADIATION- UN ACTION NEEDED

Terrible nuclear Olympics of 2020 scheduled: Endless Fukushima catastrophe: 2020 Olympics under contamination threat — RT Op-Edge

ENEnews tracking this like ballers: Fukushima reactor cores may have had “Melt Through to China Syndrome” and went into the earth itself — Includes over 1,500 pounds of plutonium

Tritium levels of groundwater in Fukushima now at their highest - The Japan Daily Press

Sept 13th: Interview: Fukushima melted fuel “could have burned through floor and now in earth underneath reactors”

///////

Jet Stream climate change: It's not just the CO2 coefficient, it's shifting wind patterns. For animated archives: Animation of Archived Jet Stream Analyses for North America

///////

Nazis of popular culture: Mr Brand razzed Hugo Boss, the stylists of the Third Reich, prompting a nasty microcosm of larger 'soft fascism' to iterate anew. Well trolled good sir: Russell Brand and the GQ awards: 'It's amazing how absurd it seems' | Culture | The Guardian

///////

Now for the Misc Linkdump… First: Great Game Roundup: For Sun Sept 15th: Sibel Edmonds' Boiling Frogs Post. Lawrence Wilkerson speculates on Israeli false flag CW operation in Syria: Ex-Bush II Administration Official: Israel could have used Chemical Weapons in Syria | Global Research. Conspiracy lulz: Activist Post: Syria's "Rebels" Threaten UN - Will Use US Weapons.

Five Ways a Wider Syrian War Could Go Nuclear | Common Dreams

SWIFT NSA infiltrations: NSA Successfully Figured Out How to Tap Into VISA’s ‘Complex Transaction Network’ | The Dissenter // Internet snooping: Backdoor dealings | The Economist

Petraeus protests going viral: Protests of David Petraeus's lectures to continue, say CUNY students | World news | theguardian.com

Tech punditry and the attention economy: pretty clutch stuff here, the art of self interested trolling and TED talks. Tech Cyber-Critics

Neat poem:

Shine, Republic by Robinson Jeffers

The quality of these trees, green height; of the sky, shining, of

water, a clear flow; of the rock, hardness

And reticence: each is noble in its quality. The love of freedom

has been the quality of Western man.

There is a stubborn torch that flames from Marathon to Concord,

its dangerous beauty binding three ages

Into one time; the waves of barbarism and civilization have

eclipsed but have never quenched it.

For the Greeks the love of beauty, for Rome of ruling; for the

present age the passionate love of discovery;

But in one noble passion we are one; and Washington, Luther,

Tacitus, Aeschylus, one kind of man.

And you, America, that passion made you. You were not born

to prosperity, you were born to love freedom.

You did not say 'en masse,' you said 'independence.' But we

cannot have all the luxuries and freedom also.

Freedom is poor and laborious; that torch is not safe but hungry,

and often requires blood for its fuel.

You will tame it against it burn too clearly, you will hood it

like a kept hawk, you will perch it on the wrist of Caesar.

But keep the tradition, conserve the forms, the observances, keep

the spot sore. Be great, carve deep your heel-marks.

The states of the next age will no doubt remember you, and edge

their love of freedom with contempt of luxury.

Robinson Jeffers

//////

Classwar lulz: Watch Barney Frank Leave Wall Street Defenders Speechless

Spacelulz: Searching for the ruins of alien civilisations – Paul Gilster – Aeon

///////

Lol the Waste Confidence Directorate:

This is email sent Friday Sept 13, 2013 by the NRC Nuclear Regulatory Commission

Hello,

Three important Federal Register notices were published today.

· The NRC’s proposed Waste Confidence rule for public comment: https://federalregister.gov/a/2013-21708

· The NRC’s Notice of Availability for the Waste Confidence draft generic environmental impact statement (DGEIS): https://federalregister.gov/a/2013-21715

· The Environmental Protection Agency’s Notice of Availability of the Waste Confidence DGEIS: https://federalregister.gov/a/2013-22363

The publication of these notices starts the 75-day public comment period on the Waste DGEIS (http://pbadupws.nrc.gov/docs/ML1322/ML13224A106.pdf) and proposed rule. The public comment period ends on Wednesday, November 27, 2013. Comments received after November 27, 2013, will be considered as practicable. However, the NRC can only guarantee consideration of comments received on or before November 27, 2013.

In addition to presenting oral comments at any of our twelve public meetings, there are many ways to submit written comments on the DGEIS and proposed rule. The NRC gives all comments equal weight, no matter who submits them or how they are submitted. You can submit written comments through any of the methods below.

E-mail comments to Rulemaking.Comments@nrc.gov, citing Docket ID No. NRC–2012–0246

Submit comments online at www.regulations.gov using Docket ID No. NRC–2012–0246

(Direct link to comment submission: http://www.regulations.gov/#!submitComment;D=NRC-2012-0246-0361)

Mail comments to Secretary

U.S. Nuclear Regulatory Commission

Washington, DC 20555-0001

ATTN: Rulemakings and Adjudications Staff

Fax comments to Secretary

U.S. Nuclear Regulatory Commission

301-415-1101, citing Docket ID No. NRC–2012–0246

Hand-deliver comments to 11555 Rockville Pike, Rockville, Maryland 20852, between 7:30 a.m. and 4:15 p.m. (Eastern Time) on Federal workdays; telephone 301-415-1677.

If you have any questions about the information in this e-mail please contact Sarah Lopas at (301) 287-0675 or Sarah.Lopas@nrc.gov. For additional details on our 12 public meetings and how to register to attend these meetings, please go to our Waste Confidence Public Involvement webpage: http://www.nrc.gov/waste/spent-fuel-storage/wcd/pub-involve.html.

Thank you,

Staff of the Nuclear Regulatory Commission

Waste Confidence Directorate

////////

Financial collapse still impending: With Currency Wars guy Jim Rickards: [KR497] Keiser Report: Deja Fraud | Max Keiser // Portuguese Return to Farming to Counter Unemployment, Austerity - Bloomberg

Neil Young at Tar Sands: 'Fort McMurray is a wasteland': Neil Young slams oil patch, Keystone plans - The Globe and Mail. Alberta politicians as the new Southern Man!

Sad reefs and CO2 bubbles make carbonic acid: Pacific Ocean takes perilous turn | Sea Change: Ocean acidification | The Seattle Times // International Scientists Warn Climate Deniers Are Enabling Earth's Suicide // Image of the Day: Satellite view of record heat wave in China, 5-12 August 2013 // Shitloads of Methane as reptilian alien "They Live" conspiracy bears fruit: Arctic News: Methane reaches 2571 ppb

Some theory: The Absurdity of Authenticity – Nature Bats Last

Fed Chair Baseball: Summers over | Felix Salmon

Cool and clever energy tech may help make new storage systems using basically air and water: Technology - LightSail Energy

Coconut Revolution: ▶ Coconut Revolution - "The world's first successful eco-revolution." - HQ - Full - YouTube

Why not? “Chemtrails Are Happening All Over The World” According to Former British Columbia Premier | Collective-Evolution

Leaving it there for now...

Leon Trotsky discusses Freemasonry as inspiration for Communism

karl_marx_062010.jpgPoppa Karl makes the Sign of the Itchy Belly

Here is an interesting angle which I just found. The connection between Freemasonry and Communism is debatable but a favorite of conspiracy cats, full of ironic twists.

While Trotsky talks about how Freemasons in different areas formed a revolutionary network of sorts, on the flip side high-ranking Freemason Robert Welch formed the classic anti-Communist John Birch Society.

Also For the lulz and early version of the "usual conspiracy theory narrative", a PDF the 1884 version of the Freemasonry/Satan/Illuminsm storyline by Monsignor George Dillon: http://www.iamthewitness.com/books/George.F.Dillon/Grand.Orient.Freemaso...

Anyway: from the Grand Lodge of British Columbia and Yukon: Trotsky on Freemasonry

Born on 26 October 1879 to Ukrainian farmers, Lev Davidovich Bronstein was a revolutionary student instrumental in founding the South Russia Workers Union and in 1898 the Russian Social Democratic Labour Party (RSDLP). Arrested for his political activities, it was in prison in Odessa in 1898 that he read, in the prison library, back issues of Orthodox Review: "The articles dealing with freemasonry in the theological magazines aroused my interest. Where did this strange movement come from? I asked myself. How would Marxism explain it? [1] In 1902 he escaped to London and adopted the name Leon Trotsky. in 1903 at the Second Congress of the RSDLP, the Bolsheviks were led by Lenin, while Trotsky was among the Menshevik leaders. Trotsky participated actively in the first Russian Revolution in 1905, and in December that year he was elected President of the St Petersburg Soviet. Arrested and sent to Siberia in 1907, he again escaped to London where, among other work, he published Pravda. Returning to Russia in 1917, Trotsky became a member of the Central Committee of the Bolshevik Party. In 1918 Trotsky was appointed People’s Commissar for Military and Naval Affairs and was the Soviet Union’s first Foreign Minister. In 1927 Stalin had Trotsky expelled from the Executive Committe of Comintern and, the following year from the USSR. He eventually found asylum in Mexico. On 20 August 1940 Leon Trotsky was attacked with an ice-axe in his office in Mexico City by one of Stalin’s followers. He died the following day, survived by his wife Natal'ia Ivanovna Sedova (1882 - 1962). His children predeceased him: one daughter committed suicide, the other died of tuberculosis, both sons were killed by Stalin’s orders.

It was during that period that I became interested in freemasonry. For several months, I avidly studied books on its history, books given to me by relatives and friends in the town. Why had the merchants, artists, bankers, officials, and lawyers, from the first quarter of the seventeenth century on, begun to call themselves masons and tried to recreate the ritual of the mediaeval guilds? What was all this strange masquerade about? Gradually the picture grew clearer. The old guild was more than a producing organization; it regulated the ethics and mode of life of its members as well. It completely embraced the life of the urban population, especially the guilds of semi-artisans and semi-artists of the building trades. The break-up of the guild system brought a moral crisis in a society which had barely emerged from mediaevalism. The new morality was taking shape much more slowly than the old was being cut down. Hence, the attempt, so common in history, to preserve a form of moral discipline when its social foundations, which in this instance were those of the industrial guilds, had long since been undermined by the processes of history. Active masonry became theoretical masonry.

But the old moral ways of living, which men were trying to keep just for the sake of keeping them, acquired a new meaning. In certain branches of freemasonry, elements of an obvious reactionary feudalism were prominent, as in the Scottish system. In the eighteenth century, freemasonry became expressive of a militant policy of enlightenment, as in the case of theIlluminati, who were the forerunners of revolution; on its left, it culminated in the Carbonari. Freemasons counted among their members both Louis XVI [false - ed.] and the Dr. Guillotin who invented the guillotine. In southern Germany, freemasonry assumed an openly revolutionary character, whereas at the court of Catherine the Great it was a masquerade reflecting the aristocratic and bureaucratic hierarchy. A freemason Novikov was exiled to Siberia by a freemason empress.

Although in our day of cheap and ready-made clothing hardly anybody is still wearing his grandfather’s surtout, in the world of ideas thesurtout and the crinoline are still in fashion. Ideas are handed down from generation to generation, although, like grandmother’s pillows and covers, they reek of staleness. Even those who are obliged to change the substance of their opinions force them into ancient moulds. The revolution in industry has been much more far-reaching than it has in ideas, where piece-work is preferred to new structures. That is why the French parliamentarians of the petty bourgeoisie could find no better way of creating moral ties to hold the people together against the disruptiveness of modern relations than to put on white aprons and arm themselves with a pair of compasses or a plumb-line. They were really thinking less of erecting a new building than of finding their way back into the old one of parliament or ministry.

As the prison rules demanded that a prisoner give up his old exercise-book when he was given a new one, I got for my studies on freemasonry an exercise-book with a thousand numbered pages, and entered in it, in tiny characters, excerpts from many books, interspersed with my own reflections on freemasonry, as well as on the materialist conception of history. This took up the better part of a year. I edited each chapter carefully, copied it into a note-book which had been smuggled in to me, and then sent that out to friends in other cells to read. For contriving this, we had a complicated system which we called the "telephone." The person for whom the package was intended-that is, if his cell was not too far away-would attach a weight to a piece of string, and then, holding his hand as far as he could out of the window, would swing the weight in a circle. As previously arranged through tapping, I would stick my broom out so that the weight could swing around it. Then I would draw the broom in and tie the manuscript to the string. When the person to whom I wanted to send it was too far away, we managed it by a series of stages, which of course made things more complicated.

Toward the end of my stay in the Odessa prison, the fat exercise-book, protected by the signature of the senior police sergeant, Usov, had become a veritable well of historical erudition and philosophic thought. I don't know whether it could be printed to-day as I wrote it then. I was learning too much at a time, from too many different spheres, epochs, and countries, and I am afraid that I was too anxious to tell everything at once in my first work. But I think that its main ideas and conclusions were correct. I felt, even at that time, that I was standing firmly on my own feet, and as the work progressed, I had the feeling even more strongly. I would give a great deal to-day to find that manuscript. It went with me into exile, although there I discontinued my work on freemasonry to take up the study of Marxian economics. After my escape abroad, Alexandra Lvovna* forwarded the script to me from Siberia, through my parents, when they visited me in Paris in 1903. Later on, when I went on a secret mission to Russia, it was left in Geneva with the rest of my modest émigré archives, to become part of the Iskra’s archives and to find there an untimely grave. After my second escape from Siberia, I tried to recover it, but in vain. Apparently it had been used to light fires or some such thing by the Swiss landlady who had been intrusted with the custody of the archives. I can't refrain here from conveying my reproaches to that worthy woman.

The way in which my work on freemasonry had to be carried on, in prison, where literary resources at my disposal were of course very limited, served me in good stead. At that time I was still comparatively ignorant of the basic literature of the Marxists. The essays by Labriola were really philosophic pamphlets and presumed a knowledge that I didn't have, and for which I had to substitute guesswork. I finished them with a bunch of hypotheses in my head. The work on freemasonry acted as a test for these hypotheses. I made no new discoveries; all the methodological conclusions at which I had arrived had been made long ago and were being applied in practice. But I groped my way to them, and somewhat independently. I think this influenced the whole course of my subsequent intellectual development. In the writings of Marx, Engels, Plekhanov and Mehring, I later found confirmation for what in prison seemed to me only a guess needing verification and theoretical justification. I did not absorb historical materialism at once, dogmatically. The dialectic method revealed itself to me for the first time not-as abstract defiftitions but as a living spring which I had found in the historical process as I tried to understand it.

* Alexandra Lvovna Sokolovskaya, who was exiled to Siberia with the author and became his wife.-Translator. [2]


1. Leon Trotsky (1879-1940), My life : an attempt at an autobiography. With an introd. by Joseph Hansen. New York : Pathfinder Press, Inc., 1970. xxxvii, 602 p ; 23 cm Seventh printing 1987 ISBN: 0-863480-143-7 [translated from the Russian MS.] Also see: My Life: The Rise and Fall of a Dictator, Leon Trotsky. London: Thornton Butterworth Ltd, 1930, London, 1930. Cloth. First Edition. Red cloth boards, gilt titles. MOIA ZHIZN' (Russian Transliteration MY LIFE) ; MOIA ZHIZN', Leon Trotsky. Berlin Izd-vo "Granit" 1930. 2 volumes. First edition. 8vo, beige wrappers, lettered in Russian in black on the spines and in black and red on the upper covers. Red morocco over cloth clamshell box, lettered in gilt on the spine between raised bands. 325 (contents), 338 (contents). Note: anti-masons will misquote and quote out of context from My Life: The Rise and Fall of a Dictator to imply that Freemasonry was Trotsky’s inspiration for revolution. pp. 119, 120-23.

2. [Aleksandra L'vovna Sokolovskaia, m. Bronshteina (1872 - 1938) arrested, banished, shot]. "She [Sedova] was to remain his companion for the rest of his life and to share with him to the full triumph and defeat. Sokolovskaya [Sokolovskaia], however, remained his legal wife and bore his name. To all three the legal niceties of their connexion did not matter at all - like other revolutionaries they disregarded on principle the canons of middle-class respectability. [...] As far as we know, the question of a reunion between Trotsky and his first wife never arose. When he and Sedova returned to Russia there was no suggestion of discord. Ties of respect and a high-minded friendship were to bind the three of them to the end; and eventually his political fortunes affected with equal tragedy both the women and the children of both" [Deutscher, I.: The prophet armed, London, 2003, p.59]

See earlier: Kanye West Masonic/Egyptian "Power"; Viktor Bout's Back Baby! Videobits, FDA criminal Pfizer shell company & newstuff | HongPong.com // HongPong.com: Pop conspiratoria: Da Vinci Code & the Freemason States of America: George Washington hated the Illuminati. Really!! // Dashing Wartime Philosopher Bernard Henri Lévy ties Libyan rebels & Netanyahu, lolz at teh Bilderberg conspiracy - and your French Revolution Freemason delirium too! | HongPong.com.

DoublePlus Bonus points for the lulz: 76 days ago almaverdad2 a commenter at cryptogon.net suspects me of being a Freemasonry/sayanim/masonic mole disinfo agent. almaverdad2 finds some good stuff quite often but anyway lol: "Deceived World: Masonic U.S. Remains a British-manipulated Colony" « Cryptogon News Network. There are more links about their take on it the wider picture there. Good times!

Terrible proposed shield law spells doom for journalists, in particular me :[

mediashieldlawdifi.jpg

Here is some horrible news. I am inquiring further since of course it's people like me that this is intended to chill and/or enable grand juries to throw in prison without charges…. I have put in inquiries with MN Sens. Klobuchar and Franken offices to determine if they believe reporters should be divided into classes, and what is the deal with grand juries here and etc.

Full report by Kevin Gosztola, another non-journalist: Media Shield Law, Which Aims to Protect Only ‘Real Reporters,’ Moves Onward to the Senate | The Dissenter

The Senate Judiciary Committee passed legislation that would establish a federal shield law for reporters or journalists in the United States. The legislation was amended, before passing out of committee, to define who would be a “covered journalist” under the proposed shield legislation.

The proposed shield legislation, the Free of Flow of Information Act of 2013, was introduced by Sen. Chuck Schumer as news of the Justice Department seizing an overly broad set of the Associated Press’ phone records for a leak investigation and of an FBI agent labeling Fox News reporter James Rosen an “aider, abettor and co-conspirator” in a leak investigation were making headlines. However, there is nothing immediately obvious in the proposed media shield that would protect the press from an agency in government committing those kind of abuses. It would not protect someone like New York Times reporter James Risen, who the administration of President Barack Obama has tried to force to testify against his source in a leak case despite protest from media organizations.[….]

MOAR: Why Sen. Feinstein Is Wrong About Who’s a “Real Reporter” | Electronic Frontier Foundation && Why “Members of the News Media” Should Welcome a Shield for the Act of Journalism | emptywheel

PASSED SENATE JUDICIARY: Text of S. 987: Free Flow of Information Act of 2013 (Introduced version) - GovTrack.us

S 987 IS

113th CONGRESS

1st Session

S. 987

To maintain the free flow of information to the public by providing conditions for the federally compelled disclosure of information by certain persons connected with the news media.

IN THE SENATE OF THE UNITED STATES

May 16, 2013

Mr. SCHUMER (for himself and Mr. GRAHAM) introduced the following bill; which was read twice and referred to the Committee on the Judiciary


A BILL

To maintain the free flow of information to the public by providing conditions for the federally compelled disclosure of information by certain persons connected with the news media.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

This Act may be cited as the ‘Free Flow of Information Act of 2013’.

SEC. 2. COMPELLED DISCLOSURE FROM COVERED PERSONS.

(a) Conditions for Compelled Disclosure- In any proceeding or in connection with any issue arising under Federal law, a Federal entity may not compel a covered person to comply with a subpoena, court order, or other compulsory legal process seeking to compel the disclosure of protected information, unless a Federal court in the jurisdiction where the subpoena, court order, or other compulsory legal process has been or would be issued determines, after providing notice and an opportunity to be heard to such covered person--

(1) that the party seeking to compel disclosure of the protected information has exhausted all reasonable alternative sources (other than a covered person) of the protected information; and

(2) that--

(A) in a criminal investigation or prosecution--

(i) if the party seeking to compel disclosure is the Federal Government, based on public information or information obtained from a source other than the covered person, there are reasonable grounds to believe that a crime has occurred;

(ii) based on public information or information obtained from a source other than the covered person, there are reasonable grounds to believe that the protected information sought is essential to the investigation or prosecution or to the defense against the prosecution;

(iii) the Attorney General certifies that the decision to request compelled disclosure was made in a manner consistent with section 50.10 of title 28, Code of Federal Regulations, if compelled disclosure is sought by a member of the Department of Justice in circumstances governed by section 50.10 of title 28, Code of Federal Regulations; and

(iv) the covered person has not established by clear and convincing evidence that disclosure of the protected information would be contrary to the public interest, taking into account both the public interest in gathering and disseminating the information or news at issue and maintaining the free flow of information and the public interest in compelling disclosure (including the extent of any harm to national security); or

(B) in a matter other than a criminal investigation or prosecution, based on public information or information obtained from a source other than the covered person--

(i) the protected information sought is essential to the resolution of the matter; and

(ii) the party seeking to compel disclosure of the protected information has established that the interest in compelling disclosure clearly outweighs the public interest in gathering and disseminating the information or news at issue and maintaining the free flow of information.

(b) Limitations on Content of Information- A subpoena, court order, or other compulsory legal process seeking to compel the disclosure of protected information under subsection (a) shall, to the extent possible, be narrowly tailored in purpose, subject matter, and period of time covered so as to avoid compelling disclosure of peripheral, nonessential, or speculative information.

SEC. 3. EXCEPTION RELATING TO CRIMINAL CONDUCT.

(a) In General- Section 2 shall not apply to any information, record, document, or item obtained as the result of the eyewitness observations of, or obtained during the course of, alleged criminal conduct by the covered person, including any physical evidence or visual or audio recording of the conduct.

(b) Exception- This section shall not apply, and, subject to sections 4 and 5, section 2 shall apply, if the alleged criminal conduct is the act of communicating the documents or information at issue.

SEC. 4. EXCEPTION TO PREVENT DEATH, KIDNAPPING, SUBSTANTIAL BODILY INJURY, SEX OFFENSES AGAINST MINORS, OR INCAPACITATION OR DESTRUCTION OF CRITICAL INFRASTRUCTURE.

Section 2 shall not apply to any protected information that is reasonably necessary to stop, prevent, or mitigate a specific case of--

(1) death;

(2) kidnapping;

(3) substantial bodily harm;

(4) conduct that constitutes a criminal offense that is a specified offense against a minor (as those terms are defined in section 111 of the Adam Walsh Child Protection and Safety Act of 2006 (42 U.S.C. 16911)), or an attempt or conspiracy to commit such a criminal offense; or

(5) incapacitation or destruction of critical infrastructure (as defined in section 1016(e) of the USA PATRIOT Act (42 U.S.C. 5195c(e))).

SEC. 5. EXCEPTION TO PREVENT TERRORIST ACTIVITY OR HARM TO THE NATIONAL SECURITY.

(a) In General- Section 2 shall not apply to any protected information if--

(1) the party seeking to compel disclosure is the Federal Government; and

(2)(A) in a criminal investigation or prosecution of the allegedly unlawful disclosure of properly classified information, the court finds by a preponderance of the evidence that the protected information for which compelled disclosure is sought would materially assist the Federal Government in preventing or mitigating--

(i) an act of terrorism; or

(ii) other acts that are reasonably likely to cause significant and articulable harm to national security; or

(B) in any other criminal investigation or prosecution, the court finds by a preponderance of the evidence that the protected information for which compelled disclosure is sought would materially assist the Federal Government in preventing, mitigating, or identifying the perpetrator of--

(i) an act of terrorism; or

(ii) other acts that have caused or are reasonably likely to cause significant and articulable harm to national security.

(b) Deference- In assessing the existence or extent of the harm described in subsection (a), a Federal court shall give appropriate deference to a specific factual showing submitted to the court by the head of any executive branch agency or department concerned.

(c) Relationship to Section 2- Subsection (a) shall not apply, and, subject to sections 3 and 4, section 2 shall apply, to any criminal investigation or prosecution of the allegedly unlawful disclosure of properly classified information other than one in which the protected information is sought by the Federal Government to prevent or mitigate the harm specified in subsection (a)(2)(A). In considering the extent of any harm to national security when applying section 2 to such cases, a Federal court shall give appropriate deference to any specific factual showing submitted to the court by the head of any executive branch agency or department concerned.

(d) Subsequent Unlawful Disclosure- The potential for a subsequent unlawful disclosure of information by the source sought to be identified shall not, by itself and without any showing of additional facts beyond such potential disclosure, be sufficient to establish that compelled disclosure of the protected information would materially assist the Federal Government in preventing or mitigating--

(1) an act of terrorism; or

(2) other acts that are reasonably likely to cause significant and articulable harm to national security.

SEC. 6. COMPELLED DISCLOSURE FROM COMMUNICATIONS SERVICE PROVIDERS.

(a) Conditions for Compelled Disclosure-

(1) IN GENERAL- Except as provided in paragraph (2), if any document or other information from the account of a person who is known to be, or reasonably likely to be, a covered person is sought from a communications service provider, sections 2 through 5 shall apply in the same manner that such sections apply to any document or other information sought from a covered person.

(2) EXCEPTION- If any document or other information from the account of a person who is known to be, or reasonably likely to be, a covered person is sought from a communications service provider under section 2709 of title 18, United States Code, the provisions of sections 2 through 5 governing criminal investigations and prosecutions shall apply in the same manner that such sections apply to any document or other information sought from a covered person in the course of a criminal investigation or prosecution, except that clauses (i) and (iii) of section 2(a)(2)(A) and the phrase ‘particularly with reference to directly establishing guilt or innocence’ in section 2(a)(2)(A)(ii) shall not apply.

(b) Notice and Opportunity Provided to Covered Persons- A Federal court may compel the disclosure of a document or other information described in this section only after the covered person from whose account the document or other information is sought has been given--

(1) notice from the party seeking the document or other information through a subpoena or other compulsory request, not later than the time at which such subpoena or request is issued to the communications service provider; and

(2) an opportunity to be heard before the court before compelling testimony or the disclosure of a document.

(c) Exception to Notice Requirement- Notice under subsection (b)(1) may be delayed for not more than 45 days if the Federal court involved determines by clear and convincing evidence that such notice would pose a substantial threat to the integrity of a criminal investigation, a national security investigation, or intelligence gathering, or that exigent circumstances exist. This period may be extended by the court for an additional period of not more than 45 days each time the court makes such a determination.

(d) Notice to Communications Service Provider- In all cases in which notice is required to be provided to the covered person under this section, a copy of such notice shall be provided simultaneously to the communications service provider from whom disclosure is sought. Once it has received such notice, the communications service provider shall not comply with the request for disclosure unless and until disclosure is either ordered by the court or authorized in writing by the covered person.

SEC. 7. SOURCES AND WORK PRODUCT PRODUCED WITHOUT PROMISE OR AGREEMENT OF CONFIDENTIALITY.

Nothing in this Act shall supersede, dilute, or preclude any law or court decision compelling or not compelling disclosure by a covered person or communications service provider of--

(1) information identifying a source who provided information without a promise or agreement of confidentiality made by the covered person as part of engaging in journalism; or

(2) records, other information, or contents of a communication obtained without a promise or agreement that such records, other information, or contents of a communication would be confidential.

SEC. 8. PROCEDURES FOR REVIEW AND APPEAL.

(a) Conditions for Ex Parte Review or Submissions Under Seal- With regard to any determination made by a Federal court under this Act, upon a showing of good cause, that Federal court may receive and consider submissions from the parties in camera or under seal, and if the court determines it is necessary, ex parte.

(b) Contempt of Court- With regard to any determination made by a Federal court under this Act, a Federal court may find a covered person to be in civil or criminal contempt if the covered person fails to comply with an order of a Federal court compelling disclosure of protected information.

(c) To Provide for Timely Determination- With regard to any determination to be made by a Federal court under this Act, that Federal court, to the extent practicable, shall make that determination not later than 30 days after the date of receiving a motion requesting the court make that determination.

(d) Expedited Appeal Process-

(1) IN GENERAL- The courts of appeal shall have jurisdiction--

(A) of appeals by a Federal entity or covered person of an interlocutory order of a Federal court under this Act; and

(B) in an appeal of a final decision of a Federal court by a Federal entity or covered person, to review any determination of a Federal court under this Act.

(2) EXPEDITION OF APPEALS- It shall be the duty of a Federal court to which an appeal is made under this subsection to advance on the docket and to expedite to the greatest possible extent the disposition of that appeal.

SEC. 9. RULE OF CONSTRUCTION.

Nothing in this Act may be construed to--

(1) preempt any law or claim relating to defamation, slander, or libel;

(2) modify the requirements of section 552a of title 5, United States Code, or Federal laws or rules relating to grand jury secrecy (except that this Act shall apply in any proceeding and in connection with any issue arising under that section or the Federal laws or rules relating to grand jury secrecy);

(3) create new obligations, or affect or modify the authorities or obligations of a Federal entity with respect to the acquisition or dissemination of information pursuant to the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.); or

(4) preclude voluntary disclosure of information to a Federal entity in a situation that is not governed by this Act.

SEC. 10. AUDIT.

(a) In General- The Inspector General of the Department of Justice shall perform a comprehensive audit of the use of this Act during the period beginning on the date of enactment of this Act and ending on December 31, 2016. The audit shall include an examination of each instance in which a court failed to compel the disclosure of protected information under this Act, and whether this Act has created any procedural impediments that have had a detrimental operational impact on the activities of the Federal Bureau of Investigation.

(b) Report- Not later than June 30, 2017, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives a report containing the results of the audit conducted under subsection (a).

(c) Review- Not later than 30 days before the submission of the report under subsection (b), the Inspector General of the Department of Justice shall provide the report to the Attorney General and the Director of National Intelligence. The Attorney General or the Director of National Intelligence may provide such comments to be included in the report submitted under subsection (b) as the Attorney General or the Director of National Intelligence may consider necessary.

(d) Form- The report submitted under subsection (b) and any comments included under subsection (c) shall be in unclassified form, but may include a classified annex.

SEC. 11. DEFINITIONS.

In this Act:

(1) COMMUNICATIONS SERVICE PROVIDER- The term ‘communications service provider’--

(A) means any person that transmits information of the customer’s choosing by electronic means; and

(B) includes a telecommunications carrier, an information service provider, an interactive computer service provider, and an information content provider (as such terms are defined in section 3 or 230 of the Communications Act of 1934 (47 U.S.C. 153 and 230)).

(2) COVERED PERSON- The term ‘covered person’--

(A) means a person who--

(i) with the primary intent to investigate events and procure material in order to disseminate to the public news or information concerning local, national, or international events or other matters of public interest, regularly gathers, prepares, collects, photographs, records, writes, edits, reports or publishes on such matters by--

(I) conducting interviews;

(II) making direct observation of events; or

(III) collecting, reviewing, or analyzing original writings, statements, communications, reports, memoranda, records, transcripts, documents, photographs, recordings, tapes, materials, data, or other information whether in paper, electronic, or other form;

(ii) has such intent at the inception of the process of gathering the news or information sought; and

(iii) obtains the news or information sought in order to disseminate the news or information by means of print (including newspapers, books, wire services, news agencies, or magazines), broadcasting (including dissemination through networks, cable, satellite carriers, broadcast stations, or a channel or programming service for any such media), mechanical, photographic, electronic, or other means;

(B) includes a supervisor, employer, parent company, subsidiary, or affiliate of a person described in subparagraph (A); and

(C) does not include any person who is or is reasonably likely to be--

(i) a foreign power or an agent of a foreign power, as those terms are defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801);

(ii) a member or affiliate of a foreign terrorist organization designated under section 219(a) of the Immigration and Nationality Act (8 U.S.C. 1189(a));

(iii) designated as a Specially Designated Global Terrorist by the Department of the Treasury under Executive Order No. 13224 (50 U.S.C. 1701);

(iv) a specially designated terrorist, as that term is defined in section 595.311 of title 31, Code of Federal Regulations (or any successor thereto);

(v) a terrorist organization, as that term is defined in section 212(a)(3)(B)(vi)(II) of the Immigration and Nationality Act (8 U.S.C. 1182(a)(3)(B)(vi)(II));

(vi) committing or attempting to commit the crime of terrorism, as that offense is defined in section 2331(5) or 2332b(g)(5) of title 18, United States Code;

(vii) committing or attempting the crime of providing material support, as that term is defined in section 2339A(b)(1) of title 18, United States Code, to a terrorist organization; or

(viii) aiding, abetting, or conspiring in illegal activity with a person or organization defined in clauses (i) through (vii).

(3) DOCUMENT- The term ‘document’ means writings, recordings, and photographs, as those terms are defined by rule 1001 of the Federal Rules of Evidence (28 U.S.C. App.).

(4) FEDERAL ENTITY- The term ‘Federal entity’ means an entity or employee of the judicial or executive branch or an administrative agency of the Federal Government with the power to issue a subpoena or issue other compulsory process.

(5) PROPERLY CLASSIFIED INFORMATION- The term ‘properly classified information’ means information that is classified in accordance with any applicable Executive orders, statutes, or regulations regarding classification of information.

(6) PROTECTED INFORMATION- The term ‘protected information’ means--

(A) information identifying a source who provided information under a promise or agreement of confidentiality made by a covered person as part of engaging in journalism; or

(B) any records, contents of a communication, documents, or information that a covered person obtained or created--

(i) as part of engaging in journalism; and

(ii) upon a promise or agreement that such records, contents of a communication, documents, or information would be confidential.

////

This is Washington-Speak for "SILENCE PEONS - CHILLING EFFECTS ARE THE NEW FREEDOM". Ughhhh terrible. More to follow.

Exclusive New Court Docs: Oklahoma City Truth is Back! Trentadue's court process unfolds in epic FOIA fight for missing Murrah & motel videotapes

Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]

jessetrentadue.jpg

Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.

Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.

The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.

Press coverage: Sept 9 2013: Judge orders trial in allegedly missing Oklahoma City bombing video case | Deseret News:

SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.

U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.

"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."

At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.

Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.

The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.

Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.

Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.

Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.

Previously on HongPong.com: Apr 19 2010: 2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles | HongPong.com // March 11 2007: New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? | HongPong.com. June 21 2011: Two murky major elements of covert American power: The US Treasury Exchange Stabilization Fund (ESF) & the FBI's little "S Drive" of deleted filez | HongPong.com . Briefly noted tangent at April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com. Item on Dec 28 2010: Russia & China not buying BIS Fractional Reserve Gold currency scheme pushed by the Ben Bernank; FBI ALF informant developing Firefox 4 security, reminds OpenBSD FBI Backdoor | HongPong.com

Moar Notes: For the thoughtful documentary released in 2012 by local activists: Oklahoma City Bombing | Murrah Federal Building 1995 | A Noble Lie. See also notes from Kaye: jesse trentadue | AxXiom for Liberty. Oct 2012: Jesse Trentadue exposes who the FBI uses for informants. A lot of this gets to the FBI's shady secret file pockets such as the mysterious "S Drive": S is for Secret: Jesse Trentadue Discovers the FBI’s S Drive (June 2011). 2009 from IntelWire.com: Trentadue CIA Vaughan Index Sept 2009.

A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.

The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.

While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]

//////

So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?

Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.

Anyway let's have ourselves some fresh court documents:

//////

Trentadue-court Order Grant Motion Strike Deny Motion Sj Ecf

//////

Trentadue-fifth Hardy Declaration Ecf

//////

Trentadue-plaintiff's Opposition Motion to Strike Ecf

//////

Trentadue-memo Motion to Strike Fifth Supplemental Declaration_ecf

OLDER DOCS for yr viewing pleasures:

FBI INFORMANT MANUAL - very important for beginning to discern how informants insert 'fake decision trees' into our reality:

FBI Informant Manual

//////

Intelwire writeup by JM Berger on the Roger Moore angle and such:

29355734 Trentadue CIA Vaughan Index Sept 2009

//////

Anyway I will leave it there for now, but it is great to see this slowly developing story jump forward for another round vs the national security coverup machine!

CIA Revolving Door Resistance: Petraeus called out at CUNY & touring at Duke; Day job operating for fossil fuel Wall Street heavies at KKR

One axiom of the Interwebs research world is that the CIA is Wall Street and Wall Street is the CIA. This reflects many key dynamics, a personal favorite example is laundering of drug money through Wall Street for the benefit of CIA proxies in the "war on drugs".

Anyway a big Wall Street leveraged buyout company, Kohlberg, Kravis, Roberts has obtained Petraeus' services and he is also inserting himself into New York academia on the side. Wall Street Journal: Petraeus Reboots With Private-Equity Giant KKR - WSJ.com. Bloomberg: KKR Hires Ex-CIA Chief Petraeus to Lead Firm’s New Unit - Bloomberg.

Press Release: KKR & Co. L.P. - KKR Appoints General David Petraeus Chairman of KKR Global Institute

NEW YORK--(BUSINESS WIRE)-- Kohlberg Kravis Roberts & Co. L.P. today announced the appointment of retired four-star General and former Director of the CIA David Petraeus as Chairman of the newly created KKR Global Institute.

Henry Kravis, Co-Founder and Co-CEO of KKR, stated: "I have long known and respected General Petraeus and, on behalf of everyone at KKR, I welcome him to the firm. As the world changes and we expand how and where we invest, we are always looking to sharpen the ‘KKR edge.' With the addition of General Petraeus, we are building on the work we have done to understand the investment implications of public policy, macro-economic, regulatory and technology trends globally. We are pleased to bring all of this expertise together under one umbrella, the KKR Global Institute, to deliver the best of KKR's insights for our investors."

Over the past several years, macro-economic and geopolitical considerations, including the heightened role of central banks following the financial crisis, new regulation and major changes in public policy, have led to KKR's increased engagement on these areas and on environmental, social and governance issues. At the same time, KKR is a global firm investing in new and emerging markets that have new risks and opportunities. The KKR Global Institute will be the nexus of KKR's focus on the investment implications of these issues. It will also further build on the firm's efforts to help KKR's portfolio companies expand globally, and it will periodically serve as an outlet for publishing the firm's thought leadership products, including views from portfolio managers and industry experts.

As Chairman of the KKR Global Institute, General Petraeus will work with a team at KKR and in tandem with Ken Mehlman, Global Head of Public Affairs, and Henry McVey, Global Head of Macro & Asset Allocation. In addition to his role as Chairman of the KKR Global Institute, General Petraeus will also support KKR's investment teams in the diligence process, especially when the Firm is considering investments in new geographies.

"KKR is one of the best investment firms in the world," General Petraeus observed. "I am very pleased to join such a great team. I have watched KKR evolve as it adapted to the post-financial crisis world and became a go-to partner for companies worldwide. I look forward to supporting the investment teams in their pursuit of the best opportunities for clients and also being a part of a new initiative to provide additional insights to KKR's clients and companies."

[Yes it is the former Republican Party Chairman Ken Mehlman, CFR member & notable component of log cabin style GOP.]

The opportunistic David Petraeus is attempting to burnish his credentials at CUNY in New York City and was met by student protesters - 90 sec video: CUNY Students Confront War Criminal David Petraeus - YouTube. April 23 NYT: David Petraeus to Join CUNY as Visiting Professor - NYTimes.com.

Also noted earlier on WMR: August 2-4, 2013 -- State Department "foreign affairs" - Wayne Madsen Report

However, political scandal month has just started. Another former high-ranking government official is already preparing his lesson plans for his college course at the City University of New York. Former CIA director David Petraeus, brought down by an affair with Army reserve officer Paula Broadwell, will be teaching courses that favor the building of the Keystone XL pipeline and the benefits of gas fracking and "clean coal."

Petraeus's Wall Street employer, Kohlberg, Kravis, Roberts (KKR) has significant financial stakes in all three energy projects. So, when Petraeus ignited a firestorm of protest at CUNY by accepting a $150,000 salary for teaching a single three-hour course a week, he changed his mind and said he would teach the course for a mere $1. Obviously, KKR's deep-pocketed pals at TransCanada are picking up the difference.

official site: KKR. Kohlberg Kravis Roberts - Wikipedia. Huffpo summarized press release in May: David Petraeus To Head Private Equity Firm KKR's New Global Institute. NYTIMES: K.K.R. Hires Petraeus to Lead Institute - NYTimes.com

POLITICO: Petraeus calls on Congress to back White House Sept 7 2013:

On Wednesday, Petraeus will give his first paid speech since resigning as CIA director in November. It’ll be at Duke University and is titled, “America and the World: A Conversation with Gen. David Petraeus.” Petraeus is working with six veterans’ support groups, and is chairman of the newly created KKR Global Institute for Kohlberg Kravis Roberts. He also is teaching this fall at the University of Southern Californiam, and beginning Monday at the City University of New York.

Ugh anyway that is a nibble on Petraeus for now.

Suspended radio network warns against consolidation of industry // Low Power FM FCC applications due in October

A radio network that once syndicated such grumpycats as Laura Ingraham, Michael Savage and Monica Crowley, previously Dick Morris etc claims to be halting operations because of abuses by the massive Westwood One network, which is attempting to merge with Cumulus Radio.

Having driven around a lot lately, it's clear American radio is really quite terrible nowadays, with mindless auto-repeats of top hits copied and re-copied around the country, the only local content crudely spliced Emergency Alert System weather alerts. Talk Radio Network (TRN) seems pretty typical of the industry but indeed more consolidation will just make things worse.

Press release: SOURCE Monday, September 9, 2013 - TALKERS.COM

TRN Issues Response to Reports of Financial Problems at the Company. TALKERS magazine has received a press release from Talk Radio Network and CEO Mark Masters in response to reports of financial problems at the company. Below is the full press statement as received from TRN at 2:30 pm ET on 9/9:

ARE YOU DIAL GLOBAL’S (WESTWOOD ONE’S) NEXT VICTIM?

The truth about the proposed merger between Dial Global/Westwood One and Cumulus is a dark one for our industry. Dial Global/Westwood One’s market power in programming and sales representation, combined with Cumulus Network’s programming and distribution power in the top 100 U.S. markets, will have a devastating effect on most every area of the radio industry. Our previous experience with Dial Global/Westwood consists of improper, illegal, and/or unethical conduct that is set forth in the second amended complaint http://www.trn1.com/uploads/files/SecondAmendedComplaint.pdf in our pending antitrust action against Dial Global/Westwood One and others.   If this merger is allowed to occur, the results of our previous experiences with Dial Global/Westwood One will be magnified tenfold to radio stations and content producers, which will be at the mercy of the newly empowered Dial (Westwood One)/Cumulus and the leverage that can be brought to bear by this new behemoth.

If this merger is allowed to occur, the culture of corruption at Dial/Westwood, as described in our second amended complaint, and other filings, will surely infect and spread within the new behemoth entity and victimize the rest of the industry, resulting in a super monopoly.

Sadly, the actions described in the second amended complaint are forcing the TRN companies to cut back to the basic operating essentials pending resolution of the multiple issues raised in their legal actions against Dial Global/Westwood One. We had hoped that the change in management at Dial Global/Westwood One would bring about a new paradigm focused on correcting the prior harms in a manner which would be helpful to our companies and the industry as a whole. Sadly, recent events have shown that the opposite is true and that the behaviors that gave rise to the lawsuits against Dial/Westwood One are endemic throughout the Dial/Westwood One monopoly. The ruthless and unethical behaviors that have continued through multiple executive teams at Dial/Westwood are breathtaking in their scope and arrogance.

We encourage the rest of our industry to stand together, and with us, now. We have been in business for 20 years, and have had excellent relationships with the other companies in our industry during that time. But this is a horse of a different color. Please contact the Federal Trade Commission’s Bureau of Competition (antitrust@ftc.gov) and the Antitrust Division of the Department of Justice (antitrust.complaints@usdoj.gov or (202) 307-2040), your state’s Attorney General, and your local member of Congress about the dangers of this proposed merger and its threat to your First Amendment rights, business and products. As for us, we will continue to pursue Dial Global/Westwood One in federal court and other appropriate forums, for monopoly and other improper behaviors, expose the behaviors described in the second amended complaint, and achieve ultimate victory from the tragedy that Dial Global/Westwood One have imposed upon our companies and others within the industry.

DIAL/WESTWOOD ONE SCORES INITIAL VICTORY WITH ARNN

The actions described in the second amended complaint with respect to America’s Radio News Network (“ARNN”), and additional actions which will be the subject of future filings, have now succeeded on an interim basis with respect to ARNN. Specifically, ARNN has been forced to suspend its broadcast operations, effective at the close of its broadcast day on Friday, September 6, 2013, pending the successful outcome of its actions against Dial Global/Westwood. ARNN has arranged for appropriate feeds to be provided to its affiliates for a reasonable period of time to enable them to secure alternate programming.

AS TO RUMORS OF OTHER ONGOING OPERATIONS

All of the TRN companies have been severely damaged by the Dial Global/Westwood One conduct addressed above and also addressed in the various legal actions which the TRN companies have brought, or will bring, against Dial Global/Westwood.   That conduct has forced all of these companies to make wrenching internal decisions and to take painful internal actions. As Dial Global/Westwood One has been collecting our advertising revenues, but refusing to pay them over to us or to account for them, these companies have now been forced to reduce as many operating costs as possible. However, the current rumors of an alleged shutdown of broadcasting operations for non-ARNN programming are unfounded. Broadcasts of the other programs are continuing without interruption.

CALL TO ACTION!

If Dial/Westwood can do this to us, they certainly can do this to you – so you need to join together, and with us, in opposing this dangerous merger, with as much force as you can muster, so that you can have a future that is not controlled by a monopoly http://www.trn1.com/uploads/files/SecondAmendedComplaint.pdf

///////

See also :: Talk Radio Network - Wikipedia // Talk Radio Network: Company News //

Is anyone interested in Low power FM licenses? See FCC Update: Low Power Window Announced at Last! | Prometheus Radio Project Due in October with awesome 4 month window of opportunity :/

Preparing to Apply Checklist | Prometheus Radio Project

The new low power application form is out! To get a sense of what is on the application and what you need to do, Prometheus has prepared a checklist. This checklist is designed to help organizations along the path to apply for low power FM (LPFM) radio licenses.

Be sure to fill out the Prometheus applicant support form to get updates and support through the application process.

Click the number to the left to read the full details about each task.

Meet the FCC Requirements

(1)

We have confirmed that there is an available channel at our location.

(2)

We are an eligible nonprofit (or school, government agency, or Indian Tribe) and we can prove it.

(3)

The members of our board either meet all eligibility requirements or fall into the listed exceptions and we can prove it.

(4)

Our organization is based close enough to our transmitter site and can prove it.

(5)

We have a description of our organization’s educational program and ­how our proposed station will be used to advance it.

(6)

We have a detailed description of the nature of our proposed station programming and, if possible, program schedules.

Improve Your Chances

(7)

We meet the 2-year established community presence point and can prove it. +1 point!

(8)

We can pledge to produce at least 8 hours of locally originated programming every day. +1 point!

(9)

We can pledge to maintain a publicly accessible studio in our community and staff the studio at least 20 hours a week. +1 point!

(10)

We pledge to meet both of the above criteria (we will produce locally originated programming AND maintain a staffed studio). +1 point!

(11)

Our organization has no other broadcast stations. +1 point!

(12)

We are a Tribal Applicant and our station will be located on our Tribal lands. +1 point!

Find a Channel and Antenna Location

(13)  

We have identified an antenna location and we can prove that we have permission to use it.

(14)

If there are multiple channels available at our site, we have identified which one we will apply for.

(15)

Our proposed station complies with all technical rules and we have collected all necessary data about our antenna site.

(16)

We agree to operate within the power and height restrictions that the FCC will calculate based on the data we provide.

(17)

We have identified a possible studio location.

/////

New data mining revelations, DEA drawn in quickly; Privacy & Surveillance DICE, PROTON, CRISSCROSS & CLEARWATER partial master programs? Lexis-Nexis on private side

It's a pretty woolly political scene right now & wanted to slam up some docs leading different directions on this. At least the damn narrative is moving along.

More or less we're looking at the merging of criminal investigations with direct military signals intelligence (SIGINT) technology run by the same contractors that recently ran these technocratic social control 'kinetic' programs for the Pentagon in assorted occupied lands around the Middle East etc.

Naturally the war on drugs first brought this war home - special bonus points for the Viktor Bout angle of the DEA SOD/DICE projects story from Reuters earlier...

Latest: Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987. ......

Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

The program was started in 2007, according to the slides, and has been carried out in great secrecy.

“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

Oh the war on drugs, will your terrible travesties never end... Nice work exposing this program by all involved!! A spectacular catch for sure.

////

Meanwhile we also have yet to deal with the terrible secret Special Operations Division which as this slide makes clear, subverts the entire concept of criminal defense and discovery. Therefore probably all drug cases should be thrown out, eh?

SOD-DEA-coverup.jpeg

Rules of SOD Photo Source - REUTERS

Exclusive: U.S. directs agents to cover up program used to investigate Americans | Reuters via Cryptogon.com: U.S. COMMUNICATIONS INTELLIGENCE SECRETLY SHARED WITH LAW ENFORCEMENT FOR USE AGAINST AMERICANS IN CRIMINAL INVESTIGATIONS

By John Shiffman and Kristina Cooke

WASHINGTON | Mon Aug 5, 2013 3:25pm EDT

(Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.

"I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

"It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

THE SPECIAL OPERATIONS DIVISION

The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.

Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential.

"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."

.....SOD'S BIG SUCCESSES

The unit also played a major role in a 2008 DEA sting in Thailand against Russian arms dealer Viktor Bout; he was sentenced in 2011 to 25 years in prison on charges of conspiring to sell weapons to the Colombian rebel group FARC. The SOD also recently coordinated Project Synergy, a crackdown against manufacturers, wholesalers and retailers of synthetic designer drugs that spanned 35 states and resulted in 227 arrests.

Since its inception, the SOD's mandate has expanded to include narco-terrorism, organized crime and gangs. A DEA spokesman declined to comment on the unit's annual budget. A recent LinkedIn posting on the personal page of a senior SOD official estimated it to be $125 million.

Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE.

The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said.

About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.

"We use it to connect the dots," the official said. ...

//////

OK so let's get to PROTON, CRISSCROSS, CLEARWATER and Lexis-Nexis. I think this covers a lot of new ground. Hard to say if the DOJ side of the story ties in, but the Lexis-Nexis level is pretty clearly documented already but not well known outside of research circles. Also some of this gets to the SCS - Special Collection Service - which I think would have been part of Snowden's tour of duty in CIA.

SOURCE: http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

18 August 2013

PROTON, CLEARWATER and Lexis-Nexis

A Proton/Crisscross job ad below.


A sends:

PROTON, CLEARWATER and LEXIS-NEXIS

Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals.

I suggest American guerillas seek non-Internet modes of communication. If you think Rex Sherwood was pulled over for not using a turn signal, you are wrong.

I was "read on" the PROTON/CRISSCROSS program in late 2006 and was a frequent user of this system for over a year. As part of my duties, I employed PROTON/CRISSCROSS in HUMINT exploitation role. In the Intelligence Community, PROTON/CRISSCROSS is referred to as PROTON. Unless otherwise specified, the same is true in this report.

PROTON is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling. PROTON is the program name as well as the name of the technology. It has been described as "SAP-like", and I suspect that PROTON was once a DEA special program. PROTON is well known in HUMINT and DOJ clandestine law enforcement. It remains the primary, if not fundamental, tool of HUMINT and DOJ law enforcement operations, both of which have considerable overlap in phenomenology and methodology. PROTON carries the FISA caveat because Top Secret FISA collection is contained in PROTON's massive database.

Through my professional associations within the Intelligence Community, I became aware of a Department of Justice (DOJ) system called CLEARWATER. CLEARWATER is similar to PROTON but at the SECRET/NOFORN level of classification and exclusively a DOJ program, where PROTON is CIA, DOJ and DOD. Most DOJ Special Agents and analysts do not have Top Secret clearance. Every informant is run through CLEARWATER, every witness gets vetted through the system.

PROTON and CLEARWATER are not just analytic tools, they provide actionable intelligence and both programs are used everyday for target discovery and development. CLEARWATER practically leads FBI and DEA investigations. PROTON is used throughout HUMINT for asset validation, recruitment, background checks on sources, etc. The FBI and DEA as both law enforcement and intelligence community members have resources of both sides and domestic law enforcement by these agencies is more of a HUMINT operation of the type seen in Afghanistan. Find, Fix, Arrest. PROTON and CLEARWATER work so well that Special Agents and Case Officers can't wait to get data into the system and see how it networks together.

Top Secret and FISA mean NSA sensitive sources and foreign collection. NSA resources are unneeded in America---CALEA and the DOJ have that covered for you under Title III, the Patriot Act and opinion from the federal kangaroo judiciary.

FISA is not only used against terrorists and spies but also private and quasi-government organizations . The most impressive network I ever laid eyes upon was the PROTON derived communications network of the Netherlands and Swiss SWIFT. Allot of target discovery there. It's how you find a needle in a haystack. The U.S. hosts one of three SWIFT secure messaging centers. Well, the NSA and CIA have insured SWIFT is allot less secure. SWIFT is a major communications target and the NSA is deep in that This is a modern take on "follow the money." If Americans are wondering how the IRS found their secret bank accounts..well, here 'ya go.

When I read the description of Drug Enforcement Administrations (DEA) DEA Internet Connectivity Environment (DICE) system: the billions of records, partnership with CIA, NSA and DOD, the need to cover sources at the expense of a fair trail--- it struck me that what was described sounded more like PROTON and/or CLEARWATER.

As I read further, DICE was sounding more like a legitimate DEA program that was being used to provide cover for PROTON and/or CLEARWATER---either intentionally or sacrificially. The early descriptions of DICE present it as an information sharing and collaboration tool through the Internet. The recent public descriptions of DICE are awkward and contrived when compared to past information.

DICE is being used to cover PROTON and/or CLEARWATER.

Properly, CRISSCROSS is the database of telecommunications selectors. Selectors are, in NSA terms, that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI---really any telecommunications "number" or "address" a person would have as a means to contact another, are contained in CRISSCROSS.

PROTON is the operating software written in JAVA for cross-platform usability and runs on JWICS for connectivity to CRISSCROSS.

PROTON contains the tools for network analysis and would be familiar to anyone who has experience in undergraduate social network analysis, statistics and data visualization.

CRISSCROSS has an interesting and murky history. As it was explained to me by a PROTON Program Officer, CRISSCROSS was originally a very secret DEA program to provide a repository for DEA collected selectors. It was, by every account, an excellent resource. With the post-911 reorganization of the Intelligence Community, everyone was required to share their resources for the "War of Terror." CRISSCROSS was very successful and well-received and ultimately exceeded DEA capabilities to manage. The CIA took over as executive agent---but CRISSCROSS is shared by the DOD and DOJ in a co-ownership manner.

It's uncertain if PROTON received Special Collection Service (SCS) data when it was a solely DEA activity, but PROTON presently receives SCS collection amounting to about 1 one terabyte monthly, and that's just selectors, not content. PROTON also receives data from Computer Network Exploitation (CNE), by the now famous Tailored Access Office (TAO). Included as well is an enormous repository of Title III data from CALEA enabled domestic collection, FISA and an enormous amount of purchased data from various communications providers like Intellius.

PROTON does not contain content, only selectors for targeting. Consider that in the context of one (1) terabyte of just selectors per month (just from the SCS) for over 10 years. I have no idea how much the TAO provides, however the two biggest contributors to PROTON are the SCS and TAO.

An analyst or law enforcement officer can "run" a selector in PROTON and visualize the social network of correspondents associated with that selector in a visual format. The user can select and display most frequent numbers called or have called, duration of call, and other functions familiar to social network analysis. An analyst may choose to look at the network in terms of who called who: persons of importance typically have allot of people calling them so we can build a network based on that to determine centricity. We can build a network based on call duration, frequency, date---pick a variable. Sometimes it's useful to look at the outliers which may be hang-arounds to some drug trafficking organization. We can task NSA or DOJ for collection on these hang-arounds and begin network deconstruction from the ground up.

These calling networks include family, friends and other non-target persons. Non-target persons, like family members, are very useful in developing the target and as leverage. Non-target communications provide intelligence from things spoken between people in confidence who may not be aware of the targets activities or associations, like the location of a fugitive who has ceased using his known selectors, but communicates with his mother through her known selectors.

Another very useful feature is the Bankswitch function, which allows network discovery by the calling pattern, not necessarily by a selector. Often, groups of U.S. government interest will use a cellphone, then dispose of them , preventing further intelligence collection from that group of cellphones. Bankswitch allows the analyst to quickly rediscover the calling network that has switched phones. Humans typically have some constant behavior in who and how they make their calls and persons. Groups and enterprises not having supplicated to the U.S. government avarice will have a whole additional set of behaviors in who and how they call.

This is highly useful for calling networks that dispose and rotate telephones regularly. A fresh cellphone provides enough of a lead to discover the calling pattern of the whole network based on historical calling records. Both the DEA and FBI have found this useful in their activities in Columbia, Mexico and the United States.

I know for certain PROTON contains communications selectors on American Citizens (AMCITS) since I ran a query on a number using only a Maryland area code and a partial prefix. PROTON returned a huge list of "masked" domestic numbers. An NSA masked number is always domestic and reveals only the area code and prefix with the rest of the number obscured. A PROTON user can email the NSA with a request to unmask the number---it's in the database, but a user has to present some justification for a number to be unmasked. Voice cuts are available through a similar process.

PROTON is really well thought out. Not only does it provide a wealth of network investigative tools, it also allows for the easy introduction of data. Let's say you're a DEA Special Agent surveilling local boat captains as part of OPERATION PANAMA EXPRESS (PANEX) in Barranquilla Columbia---a major Port of Origin for drugs to the U.S. and someone gives you a business card. Just run the number and see if it hits. The Special Agent" can take that card and mail it to the PROTON Program Office (PPO). Scans, cell pictures of the information are also acceptable to ingest.

An FBI Case Officer attending a UAV conference in Las Vegas can take all the "grey literature" and hand that to the PROTON office as well. The numbers find their way into the database The PROTON office will also ingest entire phone books---still popular in some parts of Europe and Asia. They use a method similar to Google books to automatically turn pages and scan data from them.

Anything that contains a selector can go into PROTON. Part of the PROTON program is the resource that provides software engineering to order unordered data and otherwise make raw data ingestible. PROTON users can add and edit PROTON data as well. If a user discovers the identity of a previously unidentified selector, one can edit that record or leave notes for other users.

With PROTON, you can see who's talking to whom in a telecommunications relationship context. How you hit that network is up to you.

Network deconstruction techniques vary throughout the 'Community. Domestically, the DOJ prefers the highly publicized raid with the media providing the entertainment backdrop. The DEA prefers covertness. The DOD prefers a Predator strike. Yes, those drone attacks are network deconstruction techniques and target selection is often facilitated, if not provided, by PROTON.

As stated earlier, CLEARWATER is a SECRET/NOFORN version of PROTON. The DEA red herring called DICE reportedly contained NSA collection which rules-out CLEARWATER (a S//NF system) and highlights PROTON (a TS//SI system) as the source of DICE intelligence.

I'm providing information on both since the government is no longer under constitutional restraint and is illegitimate. Parallel Construction. You fuckers. A cornerstone of American law and western culture sacrificed for the security of the Elites.

With the CALEA requirements, TITLE III collection is very simple affair involving a court order and the Cisco routers which, through CALEA legislation, are engineered for surveillance. Cisco is a very enthusiastic partner to the Intelligence Community---one of those sensitive relationships managed through the NSA Special Source Operations office. The NSA finesses such relationships---with the DOJ, you get a thug in a nice suit and the quiet menace of federal law enforcement. If you think the DOJ is a law enforcement agency, you're stupid. Internal security is DOJ Job #1. As we have seen, the DOJ is maintaining internal security by both legal and extralegal means with the full support of the federal judiciary and the lukewarm animus of the U.S. Congress.

Federal judges and congress persons are largely immune to DOJ surveillance. You are not. The "new" counter-insurgency operations by the government concentrate on a Reasonable Suspicion by persons and groups---not on Probable Cause.

CLEARWATER contains selectors from any number of sources: TITLE III, purchased data from telecommunications data brokers, National Security Letters, subpoenas, technical operations by FBI TACOPS, search warrant, informant production, arrests, detentions. If the DOJ has searched you, arrested you or let you go, count on that data being in CLEARWATER. Did you give the Special Agent your telephone number?

Arresting someone to search them without needing consent or court order is not an unheard of means to get a Person of Interests selectors into CLEARWATER. Something laying openly on your desk? A cell-phone snap and email to the program office. How about those utility bills you throw away without shredding? If you're a Person of Interest, somebody is walking away with your trash.

There is a a real motivation by DOJ Special Agents to get telecommunications selectors into PROTON or CLEARWATER to build the networks for analysis and deconstruction.

CLEARWATER has all the features of PROTON and at least one other---mapping. An FBI Case Officer operating domestically can query say, Lahore Pakistan, and place on a map, those locations in the U.S. where those calls originated or terminate---a choropleth map with colored density clusters, all in a spatial context. With that, the DOJ knows where to focus it's domestic security efforts. A DEA Special Agent can run a selector seized in an amphetamine investigation and, within a few minutes, have the calling network and visualize the correspondents locations on a map. That's how DOJ led task forces show up in your neighborhood.

Watching a OWS protester enter a number into their cell phone is perfectly legal without consent or a warrant and once I get that number, we'll look at that calling network, find the node that is you, and walk that back to that moment we shared under the chestnut tree.

If you're visiting the USA from abroad, you may have your wallet and pocket litter photocopied at secondary screening. Then an email to the National Counterrorism Center (NCTC) Terrorist Identities Datamart Environment (TIDE) office, and from there, a Forward to the PROTON office.

PROTON, CLEARWATER and LEXIS-NEXIS all provide data export into Analyst Notebook file format (and PDF for ease of sharing).

All members of the Intelligence Community have access to LEXIS-NEXIS. LEXIS-NEXIS contains biographic information on most Americans having a driver or occupational license. Your state sells the contents of its drivers license database to companies like LEXIS-NEXIS for a profit. They can do this since that information is considered in the public domain---driving is a privilege and if you don't want to be in database then don't get a drivers license. LEXIS-NEXIS contains other highly personal and granular information depending on which state is providing information. Florida provides pretty much everything it can to LEXIS-NEXIS. Automobile information, luxury water craft, occupational licenses---if you submit information to a state agency, it can end up in LEXIS-NEXIS. All domestic law enforcement has access to LEXIS-NEXIS, its a fundamental investigative tool. IRS, DOJ, Treasury, Local PD, Sheriffs Office all have a LEXIS-NEXIS access or the means to pull data from them.

Law Enforcement Officers can have their data removed from LEXIS-NEXIS. An LAPD and NYPD "spokesperson" informed me that this is the case. Imagine your a citizen in New York and you get surveilled by one of the numerous surveillance technicians the NYPD has fielded since 9-11 , a quick look-up via mobile device or WiFi and they know who you are now.

So, a Special Agent or analyst simply runs the selectors in PROTON and CLEARWATER, then runs those names or other biographic/vital information again in LEXIS-NEXIS, all that data related to the TARGET is exported in Analyst Notebook format, those files are imported into the Analyst Notebook application and...viola!...a relatively complete social network and biographics of the TARGET. That could be you of course.

By Supreme Court decision and other judicial misadventures, LEXIS-NEXIS contains public information and you do not have an expectation of privacy. There is no need for Probable Cause or Reasonable Suspicion because this data is, by judicial opinion, public. Something to think about next time you're at the DMV. Citizens are queried regularly in LEXIS-NEXIS. CLEARWATER and PROTON provides network association and the selectors. A subpoena, NSL or search warrant to the telecommunications provider of that selector gives us names and locations. LEXIS-NEXIS provides Pattern of Life, geolocation and personalia. I was able to see my past three residential addresses, past telephone numbers and identifying information about my previous automobile. LEXIS-NEXIS is coupled to Automatic License Plate Recognition Systems (ALPRS) as well. Who you are, where you were and where you are.

The DOJ and Intelligence Community access LEXIS-NEXIS through a VPN and a proxy (government). A DOD proxy is registered to the Virginia Contracting Office, but it's a non-logging proxy so, good luck in your discovery. LEXIS-NEXIS has no idea of the individual accessing it's database and, according to the spokesperson, does not maintain logs of government clients. A subpoena cannot discover what is not there.

Around 2008, LEXIS-NEXIS purchased Choicepoint to start their new product line. I recall some representative, at a promotional meeting, extolling the virtues of Choicepoint---all the data in a easy to use format. A user of Choicepoint could run a query and not only get biographics and addresses but have that information located on a map or satellite image (by Pinpoint, Inc. or a Google map server). The Choicepoint representative giving the presentation said no Social Security Numbers or drivers license pictures would be included in the database in order to protect the rights of the citizen. Such conceits are good ethics in Washington, D.C.

That said, CLEARWATER and PROTON are not omnipotent. Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated. Of the many systems used by NSA and DOJ, CLEARWATER, PROTON and LEXIS-NEXIS are the most significant from a "boots on the ground" investigative prospective.

There is real concern that PROTON may be to widely known for such a program and efforts are being made to walk it back into a compartment.


A Proton/Crisscross job ad:
http://jobs.cgi.com/job/Hanover-SIGINT-Analyst-Job-MD-21075/1184801/

SIGINT Analyst Job

Date: Aug 14, 2013

Location: Hanover, MD, US
Job Order: J0311-0630 - Permanent Full Time
Title: SIGINT Analyst
Category: Consulting / Business / Functional
City: Hanover, Maryland, United States

Job Description: SIGINT Analyst

CGI Federal is seeking a SIGINT Analyst to work in our Hanover, MD office.

Specific Duties:

Applicants will work as a member of a government-contractor team whose primary focus will be providing support to deployed analysts and software developers.

In this capacity, uses an in-depth knowledge of general communications procedures, traffic analysis and reporting formats and vehicles to produce time-sensitive and event-oriented reports

Provide support to force protection, indications and warning and situational awareness; provides target continuity and mentorship to a junior and rotating workforce; conducts research to answer RFIs and produces working aids to support new tool development.

Must be willing to receive and conduct training on new systems, databases, processes and procedures.

Analyst will be supporting deployed US military troops and must understand the military decision making process and miliary doctrine.

Minimum of five (5) years experience with the military or government agency using the collection management cycle, intelligence cycle, targeting cycle, and the SIGINT intelligence fusion process from tactical to national level required.

Additional Requirements:

Experience with Falconview, Analyst Notebook, Arc View, Arc-GIS, Arc-Editor, AIM, Pathfinder, SEAS, STARLIGHT, GCCS and other current analyst tools.

Active TS/SCI security clearance w/ polygraph required.

Preferred:

Experience with NSANET, RTRG tool suite, Global Reach, Proton/Criss Cross, Broom Stick, CW II, Banyan. Geo Bootcamp and knowledge of ArcGIS a plus.

Preferred experience includes analysis in OIF/OEF, NSA, INSCOM, or ACE At CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 71,000 professionals located in more than 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com.

This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.

We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.

No unsolicited agency referrals please.

WE ARE AN EQUAL OPPORTUNITY EMPLOYER.

Skills

- Analytical Thinking
- Signal Intelligence (SIGINT)

Reference: 137685

//////

Check out the BOLO - be on the lookout - National Guard civil disturbance training program photos here:North Carolina National Guard Rapid Reaction Force Civil Unrest Training Photos | Public Intelligence. Obviously PROTON, DICE, CRISSCROSS, CLEARWATER style database technology would be useful in composing intelligence

Official description: CHARLOTTE, N.C. – Soldiers of the North Carolina National Guard train for Rapid Reaction Force duty at the Catawba River Pump Station here today. The training scenario tests the Soldiers ability to use nonlethal force to disperse a crowd of aggressors from a water plant. This training prepares the Soldiers to support state and local first responders and county emergency management agencies. The RRF is a quick reaction team that, on order, is deployable anywhere in North Carolina within 24 to 36 hours of a critical event. In times of crisis, the RRF may be ordered by the President of the United States or the Governor of North Carolina in order to augment Federal or State Authorities in response to actions such as a known terrorist attack, civil unrest or a natural and/or man-made disaster. (U.S. Army National Guard photo by Sgt. 1s Class Robert Jordan / released)

nc-rrf-3.jpg nc-rrf-9-1024x724.png nc-rrf-8-1024x708.png

/////

Other targetings: Russia Issues International Travel Advisory to Its Hackers | Threat Level | Wired.com

WaPo/Snowden: U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show - The Washington Post

Black Budget semi-surfaces: ‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post

Israel listed as major counterintelligence threat in Black Budget: Leaked documents reveal US sees Israel as a spying threat (Video) - The Hill's Global Affairs

WIRED on cryptology cracking in black budget: New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | Wired.com

Login Lulz for Snowden in Ars Technica Aug 29th: Sysadmin security fail: NSA finds Snowden hijacked officials’ logins | Ars Technica

.... Leaving it there for now...

More note on impending Syria Fail! Dempsey vs R2P interventionist hawks; Al-Nusra rebels caught with 2kg Sarin in May 2013, possible links to Libya Chemical Weapons stash, the Britam leaks & McCain Playing Portable Poker

Ugh, the Syria scenario is really dispiriting but I think much of the western political leadership may finally be backing down from another round of interventionism - let's hope! Here are a bunch of new notes - take em all with a grain of salt, and may they hopefully shed a bit of light on matters.

No matter how it turns out, it will be really hard to get the Middle East moving into a politically independent foundation, respectful of human rights and devoid of massacres and social 'sloshing' as mistrust escalates on all sides, with various specialists in destruction jumping in to make matters worse at every turn.

See also: Press Release mirrored here: Whistleblower ex-US Mil Intel agent Frank Ford flags VX WMD distribution in Iraq & Syria, smoking gun @ Carlyle Group chemical weapons network as new Obama target

//////

MCCAIN GAME: The terrible Sen John McCain should not even be quoted in papers let alone allowed in the government. Dan McCall at LibertyManiacs.com made this great McCain meme, along with many other fun political art pieces like NSA spoofs that - believe it or not - the NSA branding police have been trying to crush. Yes the NSA patrols against McCall's parodies as explained in interview on Corbett Report. (fb) See also Cryptome notes on this.

mccain-pokermeme.jpg

Satire: Raytheon: Delay on Syria Strike is a Threat to Freedom & Democracy Everywhere - Newslo

The Britam Defense Leak involving a Syria chemical weapons plan is denied, but perhaps one of those things like a Project Northwoods about the Syrian Chemical Weapons scenario: (Northwoods was an infamous JFK-era doc from the Joint Chiefs suggesting a fake attack involving Cubans and hijacked planes.)

Britam Defence, David Goulding and Philip Doughty | Mail Online - http://www.dailymail.co.uk/home/article-2311199/Britam-Defence-David-Goulding-Philip-Doughty.html PUBLISHED: 12:59 EST, 18 April 2013 | UPDATED: 12:59 EST, 18 April 2013

An article on 29 January reported allegations on the internet that the US Government had backed a plot to launch a chemicals weapons attack in Syria and blame it on the Assad regime.

The reports made reference to an email said to have been from David Goulding, the Business Development Director of Britam Defence, to company founder, Philip Doughty. The email had been published on the internet after Britam’s computer system was illegally hacked in Singapore. It referred to a proposal that Britam would deliver chemical weapons to Syria for enormous financial reward and suggested that the directors were willing to consider the illegal proposal.

We now accept that email was fabricated and acknowledge there is no truth in any suggestion that Britam or its directors were willing to consider taking part in such a plot, which may have led to an atrocity.

We apologise to each of them and have agreed to pay substantial damages.

A Look into the Britam Defence Data Leak Files && britam defence hacked, confidential documents leaked, site offline - cyberwarnews.info

A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline.

The attack is on britam defence (http://www.britamdefence.com/) and has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom).

The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.

Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.

A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Also on Britam: U.S. Was Offering `Enourmous` Sums of Money for Chemical Weapon Attack

More possible chemical weapons false flags from previous months: video "Chemical Weapons False Flag against Syria Update http://youtu.be/DbMdll58lis posted on August 3rd 2012.

Also worth noting this! Iraq uncovers al-Qaeda 'chemical weapons plot' BBC News June, 1 2013, and this RT report on the Turkish authorities discovery of Sarin in a Jabhat al Nusra safehouse http://youtu.be/vet0PV-XPlw in May 2013.

Reported by RT in May and firmly in the memory hole right now: 2 kilograms of sarin captured with rebels in Turkey?! WTF

Published on May 31, 2013 RussiaToday: Suspected Syrian militants have reportedly been detained in Turkey with a cylinder of highly poisonous sarin gas found in their possession. Those arrested are believed to be members of the Al-Qaeda linked Al-Nusra Front. Earlier this month, UN investigators voiced suspicion the nerve agent was being used by opposition fighters. RT's Middle East correspondent Paula Slier reports.

Obviously RT has a Russian perspective here but indeed as we will see this is not the only clue floating around about Al-Nusra & chemical weapons.

/////

Chomsky misquoted? LOCAL - Chomsky accuses Turkish daily of fabricating parts of interview

Not sure deal here - eh: High Probability Of A Major Attack On The Financial System | InvestmentWatch - anyone heard of x22report?

//////

DC alternative journalist Wayne Madsen is not always correct but this particular narrative just smells really damn likely right now. R2P is "responsibility to protect" interventionist faction of Beltway, the newest iteration of "cruise missile liberals" more-or-less. Go get em Wayne:

SOURCE: http://www.waynemadsenreport.com/articles/20130901

September 1-2, 2013 -- Special Weekend Report. Washington, DC (WMR) Obama caved under last-minute pressure from Dempsey

WMR's White House sources report that on the evening of Friday, August 29, President Obama was on track to launch a sustained 72-hour cruise missile and drone attack on pre-selected air defense and other strategic military targets in Syria.

Obama had been convinced by his national security adviser Susan Rice, UN ambassador Samantha Power, and deputy national security adviser Ben Rhodes, all "Responsibility to Protect" advocates, that he could trump congressional approval for his attack by claiming that humanitarian operations do not require approval under the War Powers Resolution or Article I, Section 8 of the U.S. Constitution.

Many of Washington's insiders went to bed Friday night firmly convinced that Obama would give the final order to attack Syria sometime during the early Saturday morning hours of August 30. However, the Chairman of the Joint Chiefs of Staff, General Martin Dempsey, made a hurried trip to the White House during the early morning hours of Saturday to make one last final plea to hold off on any attack.

WMR has learned from White House sources that Dempsey told Obama that the president's plan would not work. "If you do this, the plan will fail and you'll get in deeper. And without congressional approval, you'll be screwed," Dempsey told Obama.

Dempsey's warning about Congress had merit. Already, 210 House members signed a letter to Obama warning him not to attack Syria without congressional authorization. In addition, a head count showed that some Democrats would join Republicans in voting for impeachment if a bill were introduced.

Dempsey's argument prevailed and Obama decided to hold off on any attack until Congress reconvenes after Labor Day. Obama decided he would seek a congressional vote to authorize a military strike on Syria. However, in overriding Rice, Power, Rhodes, and Secretary of State John Kerry, who all favored a military strike, Dempsey incurred the wrath of the R2P faction that dominates the National Security Council. State Department sources began spreading the word that Obama would still attack Syria without congressional approval. The Pentagon, on the other hand, pointed out that none of the National Security Council "heavies," Rice, Power, or Rhodes had any military experience and that Kerry was channeling the wishes of his good friend Senator John McCain, who has consistently supported Al Qaeda-led rebels in Syria and Libya.

Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that "smoking gun" proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal "Iran-contra"-like scandal. The proof is said to be highly "impeachable."

The developing scandal involves Turkish, Qatari, Lebanese, and Croatian firms and front operations; Qatar Airways Cargo; ousted officials of the Mohamed Morsi government of Egypt; small Turkish and Jordanian air service companies contracted by the CIA; Saudi intelligence chief Prince Bandar bin Sultan Al Saud; the September 11, 2012 attack on the CIA annex in Benghazi; and "black" carve-out contracts with the U.S. Air Force.

[pic http://www.theage.com.au/ffximage/obama_narrowweb__300x512,4.jpg ] Barack Obama, right, dressed as a Somali Elder during his visit to Kenya, near the borders with Somalia and Ethiopia. Obama plays the role of Al Qaeda arms provider.

Obama's, Brennan's, and then-CIA director David Petraeus's knowledge of the operation was so intimate, Petraeus visited GOP presidential nominee Mitt Romney in October of last year to plead with him not to bring up the covert operation in the third presidential debate. Romney acceded to Petraeus's request.

/////

Fluoride for the Win: Frankly at this point in the demented charade, the possible Sodium Fluoride - aka fluoridated water precious bodily fluids casus belli - angle is now my favorite. Naturalnews is not always dead on either, but it's too damn appropriate I say.

See: NaturalNews: Bombshell: Syria's 'chemical weapons' turn out to be sodium fluoride used in the U.S. water supply and sold at Wal-Mart. Breaking in UK Independent: Revealed: UK Government let British company export nerve gas chemicals to Syria - UK Politics - UK - The Independent Sept 2 2013.

//////

Max Blumenthal has good points Sept 2 posted: OpEdNews - Article: Dubious Intelligence and Iran Blackmail: How Israel is driving the US to war in Syria

GlobalResearch: Dangerous Crossroads. A War on Syria, Prelude to a World War III Scenario? | Washington's Blog

//////

I am borrowing another excerpt from Madsen which includes a possible connection between major CIA pointman on the Caucasus and indeed Islamic fundamentalist network logistical support over the years (interesting in the pre-2001 interval eh) . Graham Fuller keeps popping up as a major figure in all of this, perhaps he will turn out to be something like the Oliver North of 9-11 itself - not to mention the sponsor of the Boston bombers' uncle Ruslan. Once the angles with Fuller surfaced, did anyone notice how fast mainstream press attention drained away from their backgrounds??!!!

SOURCE: http://waynemadsenreport.com/articles/20130830 - August 30-September 1, 2013 -- Partner of Boston bombers' "Uncle Ruslan" right hand man to 3 CIA directors

The murky world of the CIA's past and current support for radical Islamist groups on three continents has emerged in newly-released documents from the CIA that show that Graham Fuller, the agency's one-time top interlocutor with the Saudis, Afghan mujaheddin, and Muslim Brotherhood, was a right-hand man to three CIA directors.

Fuller, a business partner of Ruslan Tsarni (Tsarnaev), the uncle of the accused Boston Marathon bombers, served as a close adviser to CIA directors William Casey, William Webster, and Robert Gates, according to recently declassified internal CIA memoranda. Since retiring from the CIA, Fuller has been engaged in supporting the Chechen Islamist guerrilla groups fighting Russia as well as the Republic of Georgia, which has become a base for anti-Russian and anti-Syrian military activities, which includes, the transport of chemical weapons to Syrian rebels from the Pentagon-operated Richard G. Lugar Center for Public Health Research in Tbilisi, which, although a biological weapons research laboratory, also warehouses chemical agents, according to U.S. intelligence sources familiar with the facility. The Tbilisi facility was the major source of chemical agents used by Syrian rebels to attack civilians outside of Damascus in a "false flag" terrorist operation coordinated by the CIA and Mossad.

Throughout the 1980s, Fuller was front and center at many of the acts of violence in the Middle East and South Asia, from Lebanon and Syria to Iran, Iraq, Afghanistan, and South Yemen. One CIA memo describes how Fuller was also heavily involved in the early part of the CIA's stirring political activities in the Balkans during the collapse of Communism in eastern Europe. A May 22, 1985, memo from George Kolt, the CIA's National Intelligence Officer for Europe, invited Fuller to a June 11, 1985, dinner at CIA Headquarters at which the former U.S. ambassador to Bulgaria, Robert Barry, discussed at the Confidential level "The Strategic Importance of the Balkans for the United States." [......]

I'm leaving the rest of the story off for now out of respect for an indie journo making a run at this ... and moments after plugging this in, Wayne's site is having Varnish caching issues. It's all got to be cross checked - someone could be feeding him knowingly bad info for their own purposes certainly - I think we have a substantial amount of paydirt on our hands here.

Also Outrage is not a strategy: http://www.michaelyon-online.com/syria-outrage-is-not-a-strategy.htm

Anyway hope people can find this useful, or at least less useless than the mainstream spams...

Google State Network Operations: Google Eric Schmidt, Jared Cohen, State Department nexus problem - Julian Assange notes they're holding the shit-bag

Date 2011-02-09 15:05:19
From burton@stratfor.com
To secure@stratfor.com
Others MessageId: <4D529F1F.30708@stratfor.com>
InReplyTo: 2045570843-1297258457-cardhu_decombobulator_blackberry.rim.net-421530589-@bda877.bisx.prod.on.blackberry
Text
** Cohen had dinner in Cairo the night before the Google Exec was picked up by GOE State Security.....one-hour after the dinner, the Gypo exec was grabbed off the streets heading into a friends apt.

More to follow.....

----------------------------------------------------------------------------------------------

http://www.foreignpolicy.com/articles/2010/09/07/jared_cohen

State Department Innovator Goes to Google

Jared Cohen, a high-profile advocate of the State Department's forays into "21st-century statecraft," is leaving Foggy Bottom for New York. In an exclusive interview with FP, he talks about his time at State and his new project: building a "think/do tank" called Google Ideas.

via 1122191_Egypt - Google ** Suggest you read | Al Akhbar English. Jeremy Hammond's freedom died to bring you this information :[

"Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do..." as Burton at Stratfor put it... As Jeremy Hammond rots in jail for the Stratfor leak, the emails in that leak showed that Eric Schmidt's wingman Jared Cohen was involved in using Google as an avenue to boil up unrest in various countries - and not merely by making blogs indexable either. It's gotten into a far more complicated game now. I am reposting some key articles on this. Julian Assange describes Cohen as a Generation Y Kissinger figure which is a pretty good way to put it.

Let's go back to 2012 for a bit here and see how the Jared Cohen / State Department thing got shaken out of the Wikileaks-supported Stratfor leak.

//////

By: Yazan al-Saadi - StratforLeaks: Google Ideas Director Involved in ‘Regime Change’ | Al Akhbar English

Published Wednesday, March 14, 2012

Top Google execs, including the company’s CEO and one of Barack Obama’s major presidential campaign donors Eric Schmidt, informed the intelligence agency Stratfor about Google’s activities and internal communication regarding “regime change” in the Middle East, according to Stratfor emails released by WikiLeaks and obtained by Al-Akhbar. The other source cited was Google’s director for security and safety Marty Lev.

Email exchanges suggest that Google execs were suspicious that Cohen was coordinating his moves with the White House.

The briefings mainly focused on the movements of Jared Cohen, currently the director of Google Ideas, a “think/do-tank” billed as a vehicle for spreading American-style liberal democracy. Cohen was also a former member of US Secretary of State’s Policy Planning Staff and former advisor to Condoleezza Rice and Hillary Clinton.

Email exchanges, starting February 2011, suggest that Google execs were suspicious that Cohen was coordinating his moves with the White House and cut Cohen’s mission short at times for fear he was taking too many risks. Stratfor’s vice-president of counter-terrorism Fred Burton, who seemed opposed to Google’s alleged covert role in “foaming” uprisings, describes Cohen as a “loose Cannon” whose killing or kidnapping “might be the best thing to happen” to expose Google.

The Cohen Conspiracy

Stratfor’s spotlight on Cohen began on 9 February 2012 after Burton forwarded to the secure email list a Foreign Policy article discussing Cohen’s move from the State Department to Google Ideas. With this article, Burton noted that Cohen had dinner in Cairo with Wael Ghonim on January 27, 2011 just hours before the Egyptian Google Executive was famously picked up by Egypt’s State Security. (doc-id 1122191)

On the same day, Stratfor’s staff make reference to a Huffington Post article which highlighted Cohen’s role in “delaying the scheduled maintenance on Twitter so the Iranian revolution could keep going” and a Foreign Policy article that noted that Cohen “was a Rhodes scholar, spent time in Iran, [and] hung out in Iraq during the war…”. These casual discovers further perked Stratfor’s curiosity about Cohen. (doc-id 1629270)

The following day, Burton forwarded a message to the secure email list from “a very good Google source” who claimed that Cohen “[was] off to Gaza next week”. Burton added, “Cohen, a Jew, is bound to get himself whacked….Google is not clear if Cohen is operating [with a] State Dept [or] WH [White House] license, or [is] a hippie activist.”

Korena Zucha, another senior analyst on the list, queried, “Why hasn’t Google cut ties to Cohen yet? Or is Cohen’s activity being endorsed by those higher up in the [company] than your contact?”

In turn, Burton replied, “Cohen’s rabbi is Eric Schmidt and Obama lackey. My source is trying to find out if the billionaire owners are backing Cohen’s efforts for regime change.” (doc-id 1111729)

Later on, Burton forwarded information from the “Google source” of Cohen’s links in establishing Movements.org. The source added, “A site created to help online organization of groups and individuals to move democracy in stubborn nations. Funded through public-private partnerships.” Burton pointed out that the US State Department is the organization’s public sponsor.” (doc-id 1118344)

Indeed, the State Department, partnering with a number of corporations, was the main sponsor for the 2008 inaugural Alliance of Youth Movements summit in New York City that subsequently established Movements.org. Hillary Clinton endorsed the organization and presented a video message during the second summit held in Mexico City a year later.

On 11 February, Burton wrote to the secure email list that Cohen was still planning to head to Gaza. He added, “The dude is a loose can[n]on. GOOGLE is trying to stop his entry into Gaza now because the dude is like scorched earth. It’s unclear to GOOGLE if he’s driving without a license, but GOOGLE believes he’s on a specific mission of “regime change” on the part of leftist fools inside the WH who are using him for their agendas.” (doc-id 1113596)

Throughout this day, the idea proposed by Burton, and seemingly felt by his Google contacts as well, of Cohen and the White House’s involvement in the uprisings was actively discussed among the analysts, especially in regards to who would be targeted next. (doc-id 1113965)

By Monday, 14 February 2011, Burton shared intelligence with George Friedman, Stratfor’s founder, and Scott Stewart, vice-president of Stratfor’s tactical department, from his source in Google that Cohen was ordered not to go to Gaza. Burton’s Google source further stated, “Also, thinking I [the unnamed source] may be on the right track about him despite his denials [in reference to Cohen working for the White House/State Department].”

When asked to clarify his sources on Cohen, Burton claimed that they were Marty Lev, Google’s director for security and safety, and Eric Schmidt, the current CEO of Google. (doc-id 398679)

A week later, Burton forwarded an internal Google email obtained from a ‘senior Google executive’. This email was seemingly sent by Cohen to the senior Google executive to discuss Cohen’s planned trip in March.

“GOOGLE are doing things the CIA cannot do."

In it, Cohen wrote, “I wanted to follow-up and get a sense of your latest thinking on the proposed March trip to UAE, Azerbaijan, and Turkey. The purpose of this trip is to exclusively engage the Iranian community to better understand the challenges faced by Iranians as part of one of our Google Ideas groups on repressive societies. Here is what we are thinking: Drive to Azerbaijan/Iranian border and engage the Iranian communities closer to the border (this is important because we need the Azeri Iranian perspective).”

After reading Cohen’s email, Stewart remarked, “Cohen might end up having an accident if he is not careful. This is not child’s play.”

Burton responded, “GOOGLE is getting WH [White House] and State Dept. support and air cover. In reality, they are doing things the CIA cannot do. But, I agree with you. He’s going to get himself kidnapped or killed. Might be the best thing to happen to expose GOOGLE’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and GOOGLE is left holding the shit bag.” (doc-id 1121800)

On 10 March 2011, Burton forwarded another message from his ‘senior Google executive’ source detailing how Cohen was requested not to travel on his proposed trip. The source explained that Google had concerns over Cohen’s “baggage” as a “US State Dept. policy maker, his research and publications on Muslim extremists and youth movements and his presence in Egypt just as the uprising started.”The source also stated that Cohen was recommended to “take a lower profile on this specific trip and let time pass before being visible and associated with people known by their states to be active in challenging repressive societies.” (doc-id 1164190)

A subsequent message from Burton’s source on 22 March 2011 affirmed that Cohen “heeded the advice not to go to Turkey or UAE for those meetings.” (doc-id 1133861)

The final email dealing with Cohen was on 30 March 2011.
Here, Burton forwarded to the alpha (secure) email list a response by his source to Burton’s question of whether Cohen was playing any role in Libya at the time. The source stated, “Not that I’m aware of. He heeded the advice to avoid Turkey and UAE and didn’t go on that trip.” (doc-id 1160182)

Google Ideas: Politicizing Technology

Certainly, there is more than meets the eye to Cohen and his actions; even his superiors in Google seem to think so.

The belief, chiefly by Burton, that Cohen had seemingly played a role in fermenting the uprisings that toppled Zine el Abidine Ben Ali and Hosni Mubarak underplays, and at times entirely disregards, the ability and agency by local movements in Tunisia and Egypt.

Nevertheless, Google Ideas, which Cohen directs, is a new animal. According to a report by the Financial Times published last July, Google Ideas seems to bond idealistic activist sensibilities with Google’s pursuit for continued global expansion - blurring the lines between business and political action. Schmidt and Cohen dub Google Ideas as a “think/do-tank” that aims to tackle political and diplomatic matters through the use of technology.

The first public event for the think/do-tank, in partnership with the Council on Foreign Relations and the Tribeca Film Festival, was held last June in Dublin. It gathered around 80 ‘former’ extremists, including former Muslim radicals, neo-Nazis, US gang members, and others, in a “Summit Against Violent Extremism”. The announcement by Google declared that the summit’s aim is “to initiate a global conversation on how best to prevent young people from becoming radicalised and how to de-radicalise others” and that “the ideas generated at the Dublin summit will be included in a study to be published later in the year.”

One spin off was the creation of the Against Violent Extremism group, apparently a network for those who attended the Dublin Summit. Beyond merely networking, the group also advertises certain projects that are in need of funding. Notably, much of the projects pertain to the Middle East, including an “Al-Awlaki Counter-Campaign” - Anwar al-Awlaki, an American citizen of Yemeni origin, was assassinated in September of last year by the US for his alleged al-Qaeda connections.

But the Against Violent Extremism site does not seem to be presently active. The last update for projects in need of funding was made in September and the last announcement regarding the workings of the site was made in October.

More recently, Foreign Policy reported in January that the Brookings Institute, one of the oldest and most influential think-tanks in Washington, DC, named Google Ideas as “the best new think tankestablished in the last 18 months.” Such accolades arguably suggests that Google Ideas is expected to be a major player in the near future.

////

Now Julian Assange goes into this mix pointing out the weird Google ventures

http://thestringer.com.au/google-and-the-nsa-whos-holding-the-shit-bag-now

The Stringer (Australia), August 24, 2013

Google and the NSA: Who’s holding the ‘shit-bag’ now?

by Julian Assange

It has been revealed today, thanks to Edward Snowden, that Google and other US tech companies received millions of dollars from the NSA for their compliance with the PRISM mass surveillance system.

So just how close is Google to the US securitocracy? Back in 2011 I had a meeting with Eric Schmidt, the then Chairman of Google, who came out to see me with three other people while I was under house arrest. You might suppose that coming to see me was gesture that he and the other big boys at Google were secretly on our side: that they support what we at WikiLeaks are struggling for: justice, government transparency, and privacy for individuals. But that would be a false supposition. Their agenda was much more complex, and as we found out, was inextricable from that of the US State Department. The full transcript of our meeting is available online through the WikiLeaks website.

The pretext for their visit was that Schmidt was then researching a new book, a banal tome which has since come out as The New Digital Age. My less than enthusiastic review of this book was published in the New York Times in late May of this year. On the back of that book are a series of pre-publication endorsements: Henry Kissinger, Bill Clinton, Madeleine Albright, Michael Hayden (former head of the CIA and NSA) and Tony Blair. Inside the book Henry Kissinger appears once again, this time given pride of place in the acknowledgements.

Schmidt’s book is not about communicating with the public. He is worth $6.1 billion and does not need to sell books. Rather, this book is a mechanism by which Google seeks to project itself into Washington. It shows Washington that Google can be its partner, its geopolitical visionary, who will help Washington see further about America’s interests. And by tying itself to the US state, Google thereby cements its own security, at the expense of all competitors.

Two months after my meeting with Eric Schmidt, WikiLeaks had a legal reason to call Hilary Clinton and to document that we were calling her. It’s interesting that if you call the front desk of the State Department and ask for Hillary Clinton, you can actually get pretty close, and we’ve become quite good at this. Anyone who has seen Doctor Strangelove may remember the fantastic scene when Peter Sellers calls the White House from a payphone on the army base and is put on hold as his call gradually moves through the levels. Well WikiLeaks journalist Sarah Harrison, pretending to be my PA, put through our call to the State Department, and like Peter Sellers we started moving through the levels, and eventually we got up to Hillary Clinton’s senior legal advisor, who said that we would be called back.

Shortly afterwards another one of our people, WikiLeaks’ ambassador Joseph Farrell, received a call back, not from the State Department, but from Lisa Shields, the then girlfriend of Eric Schmidt, who does not formally work for the US State Department. So let’s reprise this situation: The Chairman of Google’s girlfriend was being used as a back channel for Hillary Clinton. This is illustrative. It shows that at this level of US society, as in other corporate states, it is all musical chairs.

That visit from Google while I was under house arrest was, as it turns out, an unofficial visit from the State Department. Just consider the people who accompanied Schmidt on that visit: his girlfriend Lisa Shields, Vice President for Communications at the CFR; Scott Malcolmson, former senior State Department advisor; and Jared Cohen, advisor to both Hillary Clinton and Condoleezza Rice, a kind of Generation Y Kissinger figure -- a noisy Quiet American as the author Graham Greene might have put it.

Google started out as part of Californian graduate student culture around San Francisco’s Bay Area. But as Google grew it encountered the big bad world. It encountered barriers to its expansion in the form of complex political networks and foreign regulations. So it started doing what big bad American companies do, from Coca Cola to Northrop Grumman. It started leaning heavily on the State Department for support, and by doing so it entered into the Washington DC system. A recently released statistic shows that Google now spends even more money than Lockheed Martin on paid lobbyists in Washington.

Jared Cohen was the co-writer of Eric Schmidt’s book, and his role as the bridge between Google and the State Department speaks volumes about how the US securitocracy works. Cohen used to work directly for the State Department and was a close advisor to both Condolezza Rice and Hillary Clinton. But since 2010 he has been Director of Google Ideas, its in-house ‘think/do’ tank.

Documents published last year by WikiLeaks obtained from the US intelligence contractor Stratfor, show that in 2011 Jared Cohen, then (as he is now) Director of Google Ideas, was off running secret missions to the edge of Iran in Azerbaijan. In these internal emails, Fred Burton, Stratfor’s Vice President for Intelligence and a former senior State Department official, describes Google as follows:

"Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do... [Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag."

In further internal communication, Burton subsequently clarifies his sources on Cohen’s activities as Marty Lev, Google’s director of security and safety and ... Eric Schmidt.

WikiLeaks cables also reveal that previously Cohen, when working for the State Department, was in Afghanistan trying to convince the four major Afghan mobile phone companies to move their antennas onto US military bases. In Lebanon he covertly worked to establish, on behalf of the State Department, an anti-Hezbollah Shia think tank. And in London? He was offering Bollywood film executives funds to insert anti-extremist content into Bollywood films and promising to connect them to related networks in Hollywood. That is the Director of Google Ideas. Cohen is effectively Google’s director of regime change. He is the State Department channeling Silicon Valley.

That Google was taking NSA money in exchange for handing over people’s data comes as no surprise. When Google encountered the big bad world, Google itself got big and bad.

END

///

Keyhole Google and the CIA: Another dimension of this relationship worth noting is the essentially Google/CIA joint venture known as Google Earth. It's well known to researchers but not widely: one of Google's principle products, Google Earth, started as Keyhole, turbocharged by the CIA's venture capital fund In-Q-Tel. See Oct. 2004: Google buys CIA-backed mapping startup • The Register. This is an interesting take: http://dusk.geo.orst.edu/Pickup/AAG2009/6-Cloud9_Keyhole.pdf

In-Q-Tel Announces Strategic Investment in Keyhole - 2003 I think: - original: http://www.iqt.org/press/2003/Keyhole_06-25-03.html

ARLINGTON, Va. and MOUNTAIN VIEW, Calif., June 25 /PRNewswire-FirstCall/ -

- In-Q-Tel, a private nonprofit venture funded by the Central Intelligence

Agency, today announced a strategic investment in Keyhole Corp., a pioneer of

interactive 3D earth visualization. The investment, made in February 2003,

was In-Q-Tel's first engagement with a company on behalf of the National

Imagery and Mapping Agency (NIMA).

Immediately demonstrating the value of Keyhole's technology to the

national security community, NIMA used the technology to support United States

troops in Iraq. "Within two weeks of In-Q-Tel's engagement with Keyhole, we

implemented the technology to support our mission within the Pentagon," said

Rob Zitz, Director of NIMA's InnoVision directorate. "Introducing

technologies like Keyhole is part of NIMA's effort to transform the

intelligence business, and the way we serve our customers."

Keyhole's EarthViewer 3D client application uses videogame-like 3D

graphics and access to massive databases of network-hosted earth information,

including satellite imagery and aerial photography, to produce an interactive

digital model of the earth. Keyhole's EarthSystem(TM) combines a tradition

of 3D graphics technology for flight simulators with innovative network-

streaming technology to deliver enterprise software solutions for large

business and government customers, as well as an Application Service Provider

solution for professional and consumer users. The result is a virtual flyover

experience-so compelling that multiple TV media networks recently used

EarthViewer 3D to 'fly' over Iraqi cities and landscapes in news broadcasts

using publicly available satellite images. In addition to media customers,

Keyhole solutions serve a broad range of markets including real estate,

transportation, insurance, consumer and government.

"In-Q-Tel invested in Keyhole because it offers government and commercial

users a new capability to radically enhance critical decision making. Through

its ability to stream very large geospatial datasets over the Internet and

private networks, Keyhole has created an entirely new way to interact with

earth imagery and feature data," said Gilman Louie, CEO of In-Q-Tel. "With

Keyhole's technology, individuals can see and manipulate their world in 3D,

meeting their business and operational challenges in powerful geographic

context."

"Keyhole's strategic relationship with In-Q-Tel means that the

Intelligence Community can now benefit from the massive scalability and high

performance of the Keyhole enterprise solution," said John Hanke, CEO of

Keyhole. "By capitalizing on trends in commercial markets, In-Q-Tel is

supporting an ever-higher standard of advanced technology adoption in

government. Keyhole is pleased to help set that standard for large-scale 3D

geospatial visualization."

NIMA's success with Keyhole highlights the significant overlap between

technology needs across the agencies of the Intelligence Community. "By

investing in Keyhole, In-Q-Tel is helping CIA and NIMA leverage limited

resources and gain access to a technology of high potential value to both

organizations," said Louie. Working through CIA, NIMA became a limited partner

with In-Q-Tel in the summer of 2002. In addition to an equity investment,

In-Q-Tel is partnering with Keyhole to further enhance Keyhole EarthSytem's

compatibility with a variety of government datasets through adoption of

advanced GIS data standards.

About In-Q-Tel

In-Q-Tel is a private, independent, enterprise funded by the CIA. Launched

in 1999, In-Q-Tel's mission is to identify and invest in companies developing

cutting-edge information technologies that serve United States national

security interests. Working from an evolving strategic blueprint that defines

the CIA's critical information technology needs, In-Q-Tel engages with

entrepreneurs, established companies, researchers and venture capitalists to

deliver technologies that pay out in superior intelligence capabilities for

the CIA and the larger Intelligence Community.

About Keyhole

Based in Mountain View, CA, Keyhole, Inc., is the pioneer of interactive

3D earth visualization and creator of the groundbreaking rich-mapping

EarthViewer 3D system that transforms the way users interact with geographic

information and earth imagery. Keyhole's EarthViewer 3D accelerates and

enhances decisions for business and government by enabling fast, fluid

interaction with massive network-resident databases of earth imagery and

geospatial information. Users can "fly" from space to street level seamlessly

while interactively exploring layers of information including roads, schools,

businesses, and demographics. Further information about Keyhole is available

at http://www.earthviewer.com .

About NIMA

NIMA ( http://www.nima.mil ) is a member of the National Intelligence

Community and a DoD Combat Support Agency. NIMA's mission is to provide

timely, relevant and accurate Geospatial Intelligence in support of national

security. Geospatial Intelligence is the analysis and visual representation

of security-related activities on the Earth. Headquartered in Bethesda, Md.,

NIMA operates major facilities in the northern Virginia, Washington, D.C., and

St. Louis, Mo. areas. NIMA Support Teams serve customers around the nation

and the world.

SOURCE Keyhole Corp.

////

Few more notes: In-Q-Tel Keyhole Google Earth and CIA | Laboratory of Hidden Alternatives

Going to leave this post here for now but may expand upon the idea later....

Syndicate content