Censorship

TRAILBLAZERs unite! Q2 & Turnkey Dictatorship, the Great Game of All the Internets & Jewel vs NSA: warrantless wiretapping lawsuit moves forward with William Binney, Thomas Drake & J. Kirk Wiebe

NSA-restructure-workstations-windows.png
TRAILBLAZER related NSA workstation privatization schema in FOUO document --- SOURCE WayneMadsenReport.com - http://www.waynemadsenreport.com/downloads/20110322_2/download - March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial (reposted/mirrored below)

Memorable scenes in "J. Edgar," the unsung biopic of FBI über-cryptocrat J. Edgar Hoover directed by Clint Eastwood, highlighted Leo DiCaprio's Hoover essentially blackmailing politicians like Robert F. Kennedy & Franklin D. Roosevelt over the decades with potentially embarrassing recordings and snippets. He reminisces with his partner-for-life Colson how well it goes every time.

Now there's an entire corporate contractor sector, nicknamed the Eagle Alliance, which has taken over many core National Security Agency functions, and each one of them are in a position to pull Hoover-like shenanigans to control the political system. This system of leverage & blackmail was described in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider" as the "Control Files."

NSA-Spying-Logo.pngJames Bamford’s NSA, the agency that could be Big Brother: [old link busted, google it :P ]

"That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide."

He added that if a dictator ever took over, the NSA "could enable [him] to impose total tyranny, and there would be no way to fight back."

At the time, the agency had the ability to listen to only what people said over the telephone or wrote in an occasional telegram; they had no access to private letters. But today, with people expressing their innermost thoughts in e-mail messages, exposing their medical and financial records to the Internet, and chatting constantly on cellphones, the agency virtually has the ability to get inside a person’s mind…

"I don’t want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."

Let's hop on down the rabbit hole. The National Security Agency and its beleaguered whistleblowers are back with the Internet's Lawyers Guild - aka the Electronic Frontier Foundation, who have saved the day on countless occasions. Now they are kicking it up a notch with a lawsuit against the 'state secret' everyone knows about -- corporate contractors copying everyone's private domestic communications.

The effort to cover up these programs - MAIN CORE, PINWALE and STELLAR WIND are thought by many to be major original code names for this. Corruption in outsourced programs such as TRAILBLAZER - which the feds went gonzo against Thomas Drake to cover up, form the texture of this story, along with the final total panopticon system which Frank Church feared. [ see earlier Hongpong.com: The late great Robert Nichols, a $250 billion Treasury Note, the Octopus Wiki (all your Iran-Contra/PROMIS style tiebacks) and Main Core, to boot // LinkBatch for August 19th 2010: In-Q-Tel CIA front funded Google Earth; Insane Clown Posse; Microdrones; Fructose tumors; Hamid Gul // Dec 2008: "The World's Largest Hedge Fund is a Fraud" but no one cared: More misc madness for Monday:

'Stellar Wind' revealed by Tamm: The grand illegal wiretapping plan was called Stellar Wind, Newsweek reveals. Good stuff. So: Stellar Wind was the sniffer, MAIN CORE is/was the master repository and/or query system into other databases, the Google or PROMIS tap to the various pockets of data... Datas fed by stuff like Stellar Wind.

See also May 2008: cryptogon.com » The Last Roundup: MAIN CORE: (& subsequent refs)

In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.

Russell Tice, Former NSA SIGINT Officer

I’m going to provide a one paragraph summary, just to make sure that the implications of this are clear to everyone:

The U.S. Government has, almost certainly, established a database and tracking system for something like eight million Americans who have been designated as threats to national security. The system is called MAIN CORE and it is being run under the auspices of highly classified Continuity of Government (COG) operations. MAIN CORE uses a variety of intelligence sources as inputs, including your email, web activity, telephone and private financial information. In the event of a major national security crisis, it is alleged that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”

The Last Roundup, by Christopher Ketcham, appeared in the May/June 2008 issue of Radar Magazine. (mirror 1, mirror 2.)

Below are some excerpts from The Last Roundup. I have provided explicit pointers to the related materials on Cryptogon:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [See:AT&T Invents Programming Language for Mass Surveillance]

He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Electronic Frontier Foundation: Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program | Electronic Frontier Foundation

July 2, 2012

Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco - Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation's (EFF's) lawsuit against the government's illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the "secret room" at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

"For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people," said EFF Legal Director Cindy Cohn. "Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We're extremely pleased that more whistleblowers have come forward to help end this massive spying program."

The three former NSA employees with declarations in EFF's brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

"The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret," said EFF Senior Staff Attorney Lee Tien. "Yet the government keeps making the same 'state secrets' claims again and again. It's time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance."

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
   Legal Director
   Electronic Frontier Foundation
   cindy@eff.org

Lee Tien
   Senior Staff Attorney
   Electronic Frontier Foundation
   tien@eff.org

/////////////////////

Jewel v. NSA | Electronic Frontier Foundation

In Jewel v. NSA, EFF is suing the NSA and other government agencies on behalf of AT&T customers to stop the illegal unconstitutional and ongoing dragnet surveillance of their communications and communications records.

Filed in 2008, Jewel v. NSA is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it. Evidence in the case includes undisputed documents provided by former AT&T telecommunications technician Mark Klein showing AT&T has routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA. That same evidence is central Hepting v. AT&T, a class-action lawsuit filed by EFF in 2006 to stop the telecom giant’s participation in the illegal surveillance program.

In addition to suing the government agencies involved in the domestic dragnet, Jewel v. NSAalso targets the individuals responsible for creating authorizing and implementing the illegal program including former President George W. Bush, former Vice President Dick Cheney, Cheney’s former chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales, and other individuals who ordered or participated in the warrantless domestic surveillance.

The Obama administration moved to dismiss Jewel in 2009, claiming that litigation over the wiretapping program would require the government to disclose privileged “state secrets” and that it was immune from suit. The court instead ruled that the case should be dismissed on standing grounds.  Fortunately, in December of 2011, the 9th U.S. Circuit Court of Appeals ruled that Jewel could proceed in district court.

/////////////////////

There aren't that many journalists who regularly cover the National Security Agency, and it's pretty obvious this beat is a shortcut to catching major gangstalking from a whole passel of shadeballs. What better way to see who SAIC will send if you piss them off & expose their enormously profitable contracting rackets & fraud?

James Bamford first wrote The Puzzle Palace, the first book on the NSA which established a great deal for the public about how it operated. His much more recent book The Shadow Factory described a number of major developments since then, including the backbone tapping system which is a major part of Jewel v. NSA.

SEE James Bamford April 2012 WIRED article: Shady Companies With Ties to Israel Wiretap the U.S. for the NSA // March 2012: The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

James Risen with the New York Times is another -- perhaps adjacent to Julian Assange, with a subpoena commanding him he is now in the crosshairs of perpetual federal investigations into the leaking of the warrantless wiretap program that finally abrogated the Fourth Amendment once and for all. NYT May 2011:

In a 30-page motion that prosecutors filed on Monday, they argued that the First Amendment did not give Mr. Risen the right to avoid testifying about his confidential sources in a criminal proceeding. The Justice Department argued that Mr. Risen was a witness and should be compelled to provide information to a jury “like any other citizen,” contending that there was no basis to conclude “that the reporter is being harassed in order to disrupt his relationship with confidential news sources.”  

DC alternative journalist Wayne Madsen, while derided by many in the mainstream & liberal networks as a conspiracy theorist etc (and I wouldn't be surprised if certain factions try to use him to plant early disinfo & poison the well in obscure stories - as often happens with journalists on weird beats) overall Wayne has kept coming up with the goods on the NSA, clearly with a number of inside and veteran sources. Code names in this case STELLAR WIND and PINWALE first entered the public arena via Madsen's site WayneMadsenReport.com.

Madsen has covered the travails of William Binney, Thomas Drake & J. Kirk Wiebe, in particular Drake over the years. Drake's case in particular involves the interests of sketchy Israel-linked contractors in penetrating Americans' private communications using backdoors such as the Narus Verint wiretapping boxes placed on Internet backbone sites, which first surfaced because of whistleblower Mark Klein, who had installed the fiber optic splitter running domestic backbone signals en masse into the 'secret room'.

Anyway much of this is available over In-Q-Tel I mean CIA I mean Google, but the stuff on WayneMadsenReport.com is not. I asked Wayne a while ago and he basically asks for a day or two (or several) for people to refrain from reposting his material outside the paywall. I ask that you support independent journalism - I am reposting these now for general public interest because the situation has finally 'broken out' a little more.

/////////////////

WAYNEMADSENREPORT.COM ITEMS:

APRIL 2012: Let's start on the late side with a April 2012 backgrounder that finally establishes a great deal of the crusade to crush Thomas Drake. It gets to, what else, Israeli contractors and extreme corruption. Plus it has tons of nice NSA program code words.

April 5-6, 2012 -- The background to the Israeli penetration of NSA - Wayne Madsen Report

In June 2005, WMR's first report at itgs inception dealt with Israeli intelligence penetration of the National Security Agency. Our friend and colleague Jim Bamford has written about further details of this penetration in an April 3 article in Wired titled "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA." In the article, Bamford describes the penetration of NSA's ultra-secret surveillance technology research and development "skunk works," the Signals Intelligence Automation Research Center (SARC), located at NSA's headquarters on the third floor of Operations Building 2B, a few doors down from the center where NSA monitored sensitive government communications in Russia.



The SARC is where companies linked to Israel helped set up NSA's controversial and top secret warrantless eavesdropping program code-named Stellar Wind. SARC's chief of staff, J. Kirk Wiebe, and the center's co-founded, Bill Binney, realized that a private company with links to Israel, Technology Development Corporation (TDC), a two-man operation with an Annapolis Junction post office box run by two brothers, Randall and Paul Jacobson of Clarksville, Maryland, was running the Stellar Wind operation using software and equipment provided by two Israeli firms, Narus, later bought by Boeing, and Verint, owned by Comverse Technology, formerly Comverse Infosys. Both companies were formed by ex-Unit 8200 personnel. Unit 8200 is the Israeli counterpart of NSA. The NSA program manager for Stellar Wind was Ben Gunn, a U.S. naturalized Scotsman who once worked for Britain's NSA equivalent, the Goverfnment Communications Headquarters (GCHQ) in Cheltenham, UK.

Rather than investigate the Jacobsons, Gunn and their Israeli interlocutors, FBI agents raided the homes of Wiebe and Binney and confiscated their computer equipment as part of the failed Justice Department investigation of former NSA official Thomas Drake, the whistle blower who exposed massive contract fraud and illegal surveillance by NSA.


Paul Jacobson had his security access pulled by NSA in 1992 and he later changed his name to "Jimmy Carter" and "Alfred Olympus von Ronsdorf." Randall Jacobson continued working for NSA and when Science Applications International Corporation (SAIC) was brought in to run the nascent Stellar Wind program, taking over from TDC, Randall Jacobson tipped Binney off to the illegal nature of the eavesdropping program, which included installing wiretapping rooms in some 20 telecommunications company switches around the United States, including the one exposed by former AT&T technician Mark Klein that was installed at the AT&T switch in downtown San Francisco.

Binney told Bamford that the NSA's advanced eavesdropping and data mining high-data analytical software may have been originally passed to Israel by a pro-Israeli technical director in NSA's Operations Directorate. The original software helped Narus and Comverse/Verint to improve on the work already performed by NSA and more advanced systems were then sold back to the NSA. The major compromise of NSA technology to the Israelis should have been made known to Binney, who was then the chairman of the NSA's Technology Advisory Panel, which monitored the signals intelligence capabilities of foreign nations. Rather than pass on to NSA the intelligence "take" of Unit 8200 using the NSA technology, Binney told Bamford that he believed that the Israeli government simply passed on the technology to Israeli start-up companies that used the NSA-developed know-how to spy on foreign countries, including the United States, and sell the technology back to countries like the United States.

The Israeli penetration of NSA was brought to WMR's attention by NSA personnel in June 2005. One of the firms mentioned as being involved in the compromise to Israel was CACI, part of an alliance of NSA contractors called the "Eagle Alliance." WMR reported: "CACI, called 'Colonels and Captains, Inc.' by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations."

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel.

Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods.

In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

[On June 5, 2005, WMR followed-up its story of Israeli spying at NSA: "Veterans of the RCA-NSA-Israeli joint SIGINT program code named DINDI report that Israeli engineer spies used the carve out contract with NSA, through RCA, to gain access to NSA and U.S. Navy secrets. In an RCA facility in Mount Laurel, NJ, the Israeli engineers had their own secured lab, and for three years that DINDI ran, they were walking out with their briefcases loaded with equipment, including scopes. When RCA engineers finally gained access to their lab, they found the prints laid out for the Trident missile system. RCA had an ongoing contract top develop the Trident communications suite at the time of the security leak. The Israeli engineers on DINDI claimed they were from the Israeli Air Force but months later, an RCA engineer was in New York and he ran into the same Israelis, but they were wearing Israeli Navy uniforms. One ex-RCA engineer commented about the DINDI Israeli spies: 'They were all a nice bunch of guys, even when they had their hands in your pockets.'] One RCA contractor for NSA later told WMR that the RCA program manager for DINDI, a Jewish engineer who he only named as "Irv," permitted the Israelis to rummage through NSA and RCA classified information.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual 'Fort Knox' of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person [then-NSA director Michael Hayden] hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, 'She's highly qualified to work in intelligence!'

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or 'WINTEL' environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to 'provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA.' This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: 'Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program.' The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

Hayden was later "rewarded" for his actions at NSA by being named the first deputy director for the Directorate of National Intelligence (DNI) and, later, director of the Central Intelligence Agency. After retiring, Hayden began working for former Department of Homeland Security Secretary Michael Chertoff, who has also been alleged to have close contacts with Israeli intelligence, at Chertoff Associates.

A journalist who previously covered the Justice Department for a major wire service told WMR that FBI agents and Justice Department prosecutors are dissuaded from investigating spies for Israel since it is known to be a "career killer" at both agencies. Moreover, Justice prosecutors have two sets of guidelines when it comes to prosecuting spies. One set calls for maximum treatment, including major criminal charges and heavy prison sentences and fines, for American spies who are charged with spying for Russia, China, Cuba, or Iran, and the lightest charges and penalties for those charged with spying for Israel, especially if they are Jewish.

//////////

Now back to the earlier material.

APRIL 2010: April 16-18, 2010 -- SPECIAL REPORT. The hidden hands behind the Thomas Drake indictment - Wayne Madsen Report

There is much more to the Obama administration's indictment on April 15 of former NSA senior executive Thomas Drake by the US Attorney for Maryland, Rod Rosenstein, a Bush holdover who has brought similar politically-motivated criminal charges against other NSA personnel. Drake is charged with ten criminal counts, including leaking classified information to a newspaper. WMR can confirm the paper is The Wall Street Journal and the reporter at the Journal who received Drake's information is Siobhan Gorman, who was also subject to electronic surveillance by the NSA and FBI while she was with the Journal and previously, The Baltimore Sun. Other charges brought against Drake, who continued to work for the NSA as a contractor after stepping down as an NSA executive, include obstruction of justice and making false statements to a federal law enforcement official.

Since leaving his executive position with the NSA, Drake has served as President and Chief Operating Officer of National Technologies Associates, Inc. of Alexandria, Virginia. The firm has revenues of $50 million and employs 600 people. Before NSA, Drake was an information technology and management consultant with Coastal Research & Technology, Inc. (CRTI).

While at NSA, Drake worked in the Signals Intelligence Division (SID), the group responsible for eavesdropping on foreign communications and, since the advent of warrantless domestic surveillance, domestic U.S. communications, as well.

WMR can report that as part of the Drake investigation, Gorman and the Wall Street Journal were subject to STELLAR WIND, warrantless wiretapping, as late as last year. The surveillance began when Gorman wrote a series of articles between 2006 and 2007 on NSA contracting cost overruns and mismanagement, information that was first reported by WMR in 2005.

From WMR, May 27, 2005: Up to now, little has been reported on how the Bush administration’s disastrous intelligence policies have affected the super secret National Security Agency (NSA). According to NSA insiders, the chief U.S. signals intelligence (SIGINT) collection agency has been wracked by much of the same internal feuding, senior management failures, and external political pressure that have plagued other U.S. intelligence agencies, including the CIA, FBI, Defense Intelligence Agency, National Geo-spatial Intelligence Agency, and National Reconnaissance Office.Drake's prosecution by the Obama administration represents a continuation of a "witch hunt" by NSA and its Stasi-like Security unit, the "Q Group," to plug all leaks from the signals intelligence and cyber-warfare agency even if the information provided to the media concerns criminal conduct like contract fraud, sexual misconduct, illegal surveillance of American citizens, and illegal "sneak an peek" break-ins of the homes of NSA employees and contractors by NSA Q Group personnel and FBI agents.

NSA insiders lay blame for the problems at NSA’s Fort Meade, Maryland headquarters squarely on the shoulders of agency Director Air Force General Michael V. Hayden and his small coterie of close advisers, a few of whom have no substantive intelligence background. Hayden has been NSA Director since March 1999, the longest tour for any NSA Director. Not only did the White House extend Hayden’s NSA tour, but also nominated him to be the first Deputy Director of National Intelligence, where he will serve under John Negroponte.

Hayden’s reign at NSA has been marked by the emaciation of the career civilian corps through forced retirements and resignations, outsourcing of government positions to contractors, intimidation, forced psychiatric and psychological examinations for "problem" employees, increased workloads for shift personnel with no personnel augmentation, unreasonable personal searches by security personnel, and withholding salary increases for career personnel. A number of NSA employees are suffering from stress and fatigue and that is adversely affecting their job performance.

One of the most pervasive operational problems at NSA stems from the fact that when newly trained civilian and military linguists, analysts, and other operational personnel arrive at NSA for duty and are integrated into various operational work centers, they are soon quickly transferred to Iraq. This puts an inordinate workload on the career civilian NSA personnel . . .

Career NSA personnel claim that their most senior member, Deputy Director of NSA William B. Black, Jr., shows little interest in their plight. One long-time NSAer said Black often nods off at Hayden’s staff meetings. In 2000, Black, a retired NSA employee with 38 years of service, was rehired by Hayden from Science Applications International Corporation (SAIC) to be his deputy. Hayden’s selection of Black from outside the agency was considered a slap in the faces of those line NSA officers who would have been normally considered next in line for promotion to the much-coveted post. That slight began to severely affect agency morale a little over a year before the September 11, 2001 terrorist attacks on New York and Washington.

After 911 and subsequent revelations that NSA had intercepted two Arabic language phone calls on September 10, 2001 ("Tomorrow is zero hour" and "The match is about to begin") that indicated an imminent attack by Al Qaeda but failed to translate and analyze them in a timely manner to be effective, Hayden was looking for scapegoats. According to NSA insiders, he found one in Maureen A. Baginski, the Director of NSA’s Signals Intelligence (SIGINT) Directorate. According to the NSA insiders, Baginski, a 27-year NSA veteran and Russian and Spanish linguist, was set up for a fall by Hayden and his team. In 2003, Baginski was named Executive Assistant Director of the FBI for Intelligence. According to NSA sources, it was Baginski who carried out Hayden's directives that farmed out many Fort Meade functions to other facilities. Another Hayden project, "Groundbreaker," the outsourcing of NSA functions to contractors, has also been used by Hayden’s advisers to assign blame for the 911 failures at NSA. According to NSA insiders, Groundbreaker has been a failure . . .

Another one of Hayden's projects that has been criticized by the NSA rank-and-file is "Trailblazer," the program to modernize NSA's SIGINT systems. For example, operators in U.S. electronic warfare aircraft rely on NSA to provide accurate electronic intelligence (ELINT) data in order to program their radar warning receivers and jamming pods. However, NSA data, provided from two databases known as EPL (Emitter Parameter List) and "Kilting." 70 percent of NSA's ELINT data is 30 years old. NSA management has forced field operators to use raw ELINT intercept data, culled from a database called "Wrangler," to program their ELINT systems. NSA operations and software engineers believe this function should be handled by NSA and not the "warfighters." Updated ELINT data is handled by ELINT Technical Reports or "ELTs." In 2003, the year the Iraq war started, there were 938 ELTs submitted on new emitter data. However, there were only 200 updates made to the ELINT databases.

The failure to update the ELINT databases may have had disastrous consequences in Iraq. For example, EPL and Kilting do not contain data on air traffic control radars and microwave communications links. Because current ELINT systems cannot differentiate between commercial signals and hostile target tracking emitters, U.S. forces in Iraq have launched attacks on non-threat targets in the belief they were hostile. NSA sources report that many of the cases of fratricide in Iraq has been due to faulty or old ELINT data. For example, the failure by NSA to update ELINT data and provide emitter parameter data to warfighting units led to the accidental shootdown by a Patriot missile of a British Royal Air Force Tornado fighter in March 2003 near the Iraqi-Kuwaiti border at the outset of the Iraq campaign. Two British crew members were killed. The ELINT data used by the Patriot misidentified the Tornado as an enemy missile and the U.S. Army blamed the British crew for the mistake, claiming they failed to switch on its Identification Friend or Foe (IFF) equipment. NSA insiders claim that allegation was false. They claim that "blue signals" (friendly) are not adequately included in the emitter data sent to field units by NSA and that claims by the Pentagon that the Tornado was shot down due to pilot error were false.

In other incidents, the radar warning receivers (RWRs) on U.S. F-16s flying over Iraq have either evaded or fired AMRAAM (Advanced Medium-Range, Air-to-Air) missiles on microwave communications towers because the microwave signals were identified as threat emitters from hostile aircraft. U.S. jammers are also adversely affected by the failure to update ELINT data.

In fact, many of NSA's developmental ELINT systems, with cover names like Beikao, Boomvang, Canyondust, Cape Lookout, Chartvein, Eagle Reach, Galaxydust, Harpstring, Hokusai, Irish Den, Jetavator, Monocle, Needleice, Platoonwolf, Quadrunner, Radiant Spruce II, Roman Alliance, Seadiver, Shadowboxer, Sharkbite, Shiloh, Starquake, Stouthearted,and Sunbeaver are not found in the master NSA ELINT project database, which also has a cover name: Brasscoin.

Many of NSA's other SIGINT systems are in the same conundrum. Rather than simplify and modernize NSA's SIGINT development and deployment, Trailblazer has done nothing to modernize or cut acquisition costs. In a suspicious move by NSA, the Trailblazer contract was sole-sourced to SAIC, the firm from which Hayden hired his deputy director. As with Groundbreaker, Trailblazer's contractors consist of a team led by a prime contractor. Trailblazer's team overlaps with Groundbreaker -- companies like CSC and Northrop Grumman are also found on the Trailblazer team. Booz Allen Hamilton and Boeing are also on the SAIC team. According to NSA officers, one SAIC official left the firm to work for Hayden at NSA during the time the Trailblazer bidding process was underway. The individual then returned to SAIC as a senior vice president, according to NSA sources. NSA employees, upset about the control that SAIC now has over the agency, refer to NSA as "NSAIC." . . .

At his Senate Select Intelligence Committee nomination hearing for Deputy Director of National Intelligence, Hayden confirmed that Trailblazer was over budget and behind schedule. He told the committee that Trailblazer's "cost was greater than anticipated in the tune, I would say, in hundreds of millions." Hayden confirmed the report of the joint congressional committee that probed the 911 intelligence failures that Trailblazer was several years behind schedule. NSA sources claim that Trailblazer is at least five years behind schedule and $600 million over budget.

However, the career NSA operational personnel may be getting squeezed not so much for policy and management differences but because of what they know about the lies of the Bush administration. In addition to the obvious lies about Iraqi WMDs, many personnel are well aware that what occurred on the morning of 911 was not exactly what was reported by the White House. For example, President Bush spoke of the heroic actions of the passengers and crew aboard United Flight 93 over rural Pennsylvania on the morning of 911. However, NSA personnel on duty at the NSOC that morning have a very different perspective. Before Flight 93 crashed in Pennsylvania, NSA operations personnel clearly heard on the intercom system monitoring military and civilian communications that the "fighters are engaged" with the doomed United aircraft. NSOC personnel were then quickly dismissed from the tactical area of the NSOC where the intercom system was located leaving only a few senior personnel in place. NSA personnel are well aware that Secretary of Defense Donald Rumsfeld did not "misspeak" when, addressing U.S. troops in Baghdad during Christmas last year, said, "the people who attacked the United States in New York, shot down the plane over Pennsylvania." They believe the White House concocted the "passengers-bring-down-plane" story for propaganda value.

Morale at NSA has plummeted from repeated cover-ups of serious breaches of security by senior officials. While rank-and-file employees are subjected to abusive psychological and psychiatric evaluations for disagreeing with summary intelligence reports provided to outside users or "consumers" and even for more mundane matters, others are given a pass. Ironically, one of the psychiatrists used by NSA to evaluate problem or disgruntled employees was recently found by police to be growing marijuana at his home in Crofton, Maryland.

In 2008, NSA and FBI surveillance of current and former NSA and Justice Department employees who were suspected of leaking information to the press about the NSA's super-classified STELLAR WIND warrantless digital surveillance program, called the "Terrorist Surveillance Program" by the Justice Department, was stepped up.

On March 10, 2008, Gorman wrote an article for the Journal titled, "NSA's Domestic Spying Grows As Agency Sweeps Up Data." Gorman wrote:

"According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called 'transactional' data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected."

The previous year, as WMR reported in May 12, 2009, former Justice Department prosecutor Thomas Tamm's home was invaded by a SWAT team of federal agents:

In 2007, Tamm's home in Potomac, Maryland was raided by zealous FBI agents who suspected him of leaking details of the so-called "Terrorist Surveillance Program" (TSP) to journalists. Tamm tried to inform Congress about the illegal program but was rebuffed by, among others, the ranking Democrat on the House Judiciary Committee, Representative John Conyers (D-MI).

At the time of its inception after 9/11, the TSP or as NSA and the Oval Office referred to it, "Stellar Wind," was so classified that only the Attorney General and one other person in the Justice Department knew about it. The TSP totally bypassed the Foreign Intelligence Surveillance Act (FISA) warrants that the OIPR prepared for approval by the Foreign Intelligence Surveillance Court (FISC). U.S. Judge James Robertson was so incensed about the bypassing of the FISC, he resigned from it in protest on December 20, 2005. U.S. Judge Royce Lamberth, nominated by President Ronald Reagan and who served as Presiding Judge of the FISC until 2002, was also adamantly opposed to TSP and its systematic bypassing of his court.

WMR's report continued: Tamm was also the first person within Justice who corroborated what NSA personnel were reporting about the agency conducting illegal data mining. One of those individuals was NSA employee Russell Tice, who was also subjected to an FBI investigation and government harassment.

Although the government employees who brought attention to the high-level criminality involving the TSP/Stellar Wind were and, in some cases like that of Tamm, are still being investigated, no criminal investigations were brought against the telecommunications companies that participated in the criminal conspiracy to spy on Americans illegally. In fact, Congress gave the telecommunications firms immunity from lawsuits and prosecution as a result of a deal worked out with the Bush administration. One of those senators who voted for the immunity deal is Barack Obama.

After the FBI conducted interviews of all OIPR employees in their quest for the leaker, on August 1, 2007, 12 government vehicles pulled in front of Tamm's home in Potomac, Maryland. Eighteen armed federal agents wearing body armor stormed into Tamm's home while his wife was cooking breakfast. Tamm was removed from his home by the agents who spent seven hours going through his and his family's property. The FBI agents even asked Tamm if there were any "secret rooms" in his house. They also inquired about any weapons in the house and whether he had been visited at home by reporters from The New York Times.

The agents tore through every room, awakening Tamm's son and daughter. The agents seized all the lap top computers, including those of Tamm's children, and a 10-year old lap top. Also seized were the Tamm family's Christmas card list and a calendar with doctors appointments.

After two days, Tamm was offered a deal that he could plead guilty to a felony in return for his testifying against journalists, including the New York Times' James Risen, and their sources at the NSA. Three days later Michael Isikoff of Newsweek phoned Tamm -- someone had leaked information about the FBI raid to Isikoff. Tamm's identity as a source about the TSP was revealed by Isikoff in the December 22, 2008, issue of Newsweek.

In 2008, one of WMR's sources discovered that his home had been broken into and anything that could store digital data had been stolen: laptops, digital cameras, USB thumb drives, etc. Moreover, relatives of the individual discovered that the lock to their home had been drilled out in what was an obvious "black bag" sneak and peel operation.

That same year, this editor discovered that the lock to his apartment door at Potomac Towers in Arlington, Virginia had been drilled out by a circular saw drill bit that drilled around the lock cylinder. When the apartment maintenance man was called to check the lock, he discovered the fragments of the lock pins scattered on the floor at the base of the door. He stated at the time that he had never experienced anything like it in the past.

FBI and NSA surveillance of people affiliated with NSA continued through last week, with this editor and one of his sources being tailed in 2009 in the suburban Maryland suburbs of Washington, DC and an additional tail of a source being conducted last week in Annapolis, Maryland.

The indictment of Drake in reminiscent of the case brought against former NSA signals intelligence (SIGINT) analyst Ken Ford, Jr. in 2006. In March 2006, Ford was sentenced to six years in prison in a case replete with prosecutorial and judicial misconduct by Rosenstein, Assistant US Attorney David Salem, and US Judge Peter Messitte. On April 30, 2007, WMR reported: "Ford was set up in a clumsy Justice Department, FBI, and NSA Security Division operation to punish him for his May 2003 signals intelligence (SIGINT) analysis report that concluded, based on intercepts of Iraqi communications, there was no truth to the Bush administration’s claim that there were weapons of mass destruction in Iraq. Ford’s report, with his name and that of his supervisor on it, ended up on Vice President Dick Cheney’s desk. From that time on, Ford was a marked man for the neo-con cabal operating within the White House, Justice Department, Pentagon, and US Intelligence Community senior staff."

At one point during Ford's trial, Messitte called Ford to his bench and asked him if he had spoken to this editor. Ford replied that he had not, whereupon Messitte asked, "Is Mr. Madsen in the court room?" I was not present at the time but I was later told by an informed source that Messitte was prepared to call me to the stand to be asked about the sources of my stories on the case. Such a development would have required me to invoke my First Amendment rights, as the press is the only occupation identified by name in the Bill of Rights as being protected. There was a risk of a contempt ruling and possible federal prison had I been present during Messitte's "kangaroo court" proceedings.

Ford continues to serve his six year sentence at Lewisburg federal prison in Pennsylvania. Attorney General Eric Holder was sent a letter by Ford's parents on November 18, 2009, calling for the appointment of a special prosecutor in the case against their son. To date, Holder has not responded to the letter.

The letter follows:

November 18, 2009

SENT CERTIFIED MAIL / E-MAIL / FACSIMILE

RETURN RECEIPT

Honorable Eric H. Holder. Jr.

Attorney General of the United States

Honorable David W. Ogden

Deputy Attorney General of the United States

950 Pennsylvania Avenue, N.W.

Washington, D.C. 2053 0-0001

United States v. Kenneth Wayne Ford. Jr.

Criminal Case No(s): 04-cr-l l8JKS, 05-cr-0098PJM and 05-cr-0235PJM

Messrs. Holder and Ogden:

In the interest of justice, we, the parents of Kenneth Wayne Ford, Jr., ("hereafter Mr. Ford") request an immediate appointment of Special Counsel to investigate unwarranted prosecutorial misconduct, vehement malicious persecution and prosecution of Mr. Ford under the Espionage Act §793 (e) - Gathering, Transmitting or Losing Defense Information. On Wednesday, September 23,2009, President Obama mandated that DOJ establishes New State Secrets Policies and Procedures.1

President Obama's implementation of State Secrets and Policies encompasses matters in this case. Prosecutors knowingly and willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation throughout this case and trial. Mr. Ford was convicted under 793(e) - Espionage and 1801 - Making A False Statement On A Government Form. Mr. Ford was sentenced to 6 years in prison for Count 1 and 3 years in prison, to be served concurrently with Count 1, for Count 2. After imprisonment, Mr.

---------

1 “It sets out clear procedures that will provide greater accountability and ensure the state secrets privilege is invoked only when necessary and in the narrowest way possible...” Attorney General Eric Holder September 23, 2009

Ford is to be on probation for 3 years. He also was ordered to pay a $200.00 assessment. Mr. Ford began serving this unjust prison sentence on May 16. 2006. He has been in prison for over 3 years and 6 months for doing absolutely nothing, except being a patriotic American and a good person.

Not only is Mr. Ford innocent, but nothing happened. This case is totally fabricated by the FBI and all involved, specifically the prosecutors and judge know it. Mr. Ford is a victim of a hate crime, a malicious prosecution and a tragic rush to jail an innocent man. See North Carolina v. Seligmann 06-cr-4332-33 (Dismissed 4/712007), Franks v. Delaware, 438 U.S. 154 (1978) and Brady v. Maryland, 373 U.S. 83 (1963). These cases demonstrate that 'false' arrest can happen to anyone - as in the matter of distinguished Harvard professor Henry Louis Gates, Jr., one of the nation's pre-eminent African-American scholars, falsely arrested in his own home.

A. Prosecutors Willfully Withheld Exculpatory Evidence From Defense

DOJ prosecutors repeatedly invoked state secret privileges, suppressed evidence as classified and deliberately withheld from Mr. Ford's defense exculpatory FBI Search Warrant Affidavits for well over 19 months. Ultimately, these search warrant affidavits were suppressed from Mr. Ford's trial. We have recently discovered that these affidavits have never been filed and are not apart of Mr. Ford's official court file.

On December 15, 2005, United States Attorney For The District of Maryland Rod J. Rosenstein and Criminal Division Assistant Attorney General Alice Fisher issued a press release in Mr. Ford's case, which stated in part, that: (Though there was conflicting evidence of what Ford intended to do with the classified information - the jury's verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information". With the admission of Rosenstein that there existed "conflicting evidence" in Mr. Ford's case and the fact that the judge removed the required elements of 'belief... and intent...' from the jury instructions, should have rendered the indictment defective. (See Exhibit A - Rosenstein Press Release dated 12/15/2005)

FBI Special Agents Michael L. Thompson and Frederick C. Marsh both submitted sworn search warrant affidavits to a federal judge alleging that a Tonya Tucker had contacted the NSA to report Ford's alleged espionage. (Ford had known Tucker for 9 weeks - from 11/13/2003 to 1/11/2004 - and decided that she definitely was not his type. He later realized Ms. Tucker is a FBI confidential informant and was placed into his life by Special Agent Michael L. Thompson.) Defense counsel subpoenaed cell phone records of Tonya Tucker from Sprint, which clearly listed the voice call details of Date, Time. Phone Number. Destination, etc. (Tucker's alleged cell phone calls were described in the Thompson affidavit and completely identified in the Marsh affidavit.

From this, we were able to subpoena thru our attorney, her cell phone records.) Sprint records affirmed that Tonya Tucker Did Not contact NSA on January 5.2004. January 9. 2004. January 10. 2004 and January 11, 2004 from her cell phone number 407-616-5683 listed on the Sprint telephone record print-out and on page 5 of 12 of FBI Special Agent Frederick C. Marsh's sworn search warrant affidavit, which he wrote was "in support of the sworn search warrant affidavit" submitted the previous day, to the same judge, by FBI Special Agent Michael L. Thompson.

With the introduction of the subpoenaed cell phone records, it is apparent the Thompson and March search warrant affidavits are perjured and fabricated. Both agents are therefore subject to penalties of perjury. Also. very importantly. the cell phone (It should be noted here that prosecutors told the jury that Ms. Tucker was a friend of Mr. Ford's and simply was a "tipster".) (See Exhibit B - FBI Affidavits and Tonya Tucker's Cell Phone Records)

Mr. Ford, as required by NSA regulations, earlier reported a threatening e-mail sent to him on Tuesday, November 25th2003 at his "AOL" address a month and a half before his arrest. The e-mail was sent by a "Dr. Takiya", who claimed to be a friend of Tonya Tucker. Based on newly discovered evidence on September 1.2009, it was confirmed that Ms. Tucker is the author of the e-mail. Ms. Tucker signed her name onto an internet guest book August 15, 2006 with the e-mail address of Msunique_2@yahoo.com, which is the same e-mail address of the treat letter sent to Kenneth Wayne Ford, Jr. on Tuesday, November 25 .2003.

The e-mail threatened Ford that his security clearances would soon be revoked. She said she knew people at NSA who had clearances just like he did. Ford reported the e-mail the very next day to NSA Head Security Officer Anne Mennis. She ignored the email, not taking it seriously at all.. Ultimately, the admission of the e-mail as exculpatory evidence to Mr. Ford was suppressed from the trial by the judge. (See Exhibit C - Threatening E-Mail / Newly Discovered Evidence).

Newly discovered evidence of a newsletter dated March 31. 2006, states that FBI Special Agent Dave Evans was the lead FBI supervisor in the case against Mr. Ford. The defendant, Mr. Ford, was never aware that FBI Special Agent Dave Evans existed. (We, his parents, discovered this newsletter on the internet in 2008.) FBI Special Agent Evan's newsletter was titled, Maryland Man Sentenced For 'Stealing Secret Documents'. However, indictments alleged that Mr. Ford was charged with 'Unauthorized Possession of National Defense Documents" - not theft of secret documents.

FBI Special Agent Evans also said that: “As it turned out, our tipster was and didn't even make the drive to the airport." Nonetheless, the prosecutors continued to prosecute and incarcerate an innocent man.

FBI Special Agent Evans also stated that: (Our agents ultimately determined ultimately ended up in." Nonetheless, prosecutors indicted and incarcerated Mr. Ford with knowledge that 6'qonflicted evi4ence" existed in this case. (See Exhibit D – FBI Special Agent Dave Evans' Newsletter dated 3/31/2006)

Certainly, the defense has a right to depose and cross-examine the FBI Special Agent who was the lead supervisor in this case. Prosecutors withheld FBI Special Agent Evans from the defense. They also withheld Special Agent Frederick C. Marsh from the defense. The Marsh affidavit was suppressed during the suppression hearing by the judge, Judge Peter J. Messitte, before the trial began on 11/29/2005. Thus, that which brought Mr. Ford into the legal system and ultimately into a federal courtroom for prosecution, was not allowed into the trial. The jury was unaware of the affidavits. (The defense did not get them until 19 months after Mr. Ford’s arrest. Please keep in mind Mr. Ford has been totally under arrest the entire time since 1/11/2004 to the present.) To date, those affidavits have never been filed. They are not listed on the docket page of the case and they are not physically in the court file. It was represented and testified to the jury by DOJ prosecutors and FBI Special Agent Michael L. Thompson that he was the lead agent and only agent assigned to the Ford Case.

B. Even If Papers Had Been Present – The Text of §793 Is Vague And Should Not Have Been Applied In This Case

First, the statutes require that a defendant transmit information relating to the national defense. There are no allegations that Mr. Ford ever transmitted, sold, stole, secreted, purloined, paid for or otherwise obtained classified information inside or outside the government - by any illegal means. Legislative history of $793 makes plain that [Congress was concerned with spying].

The government never charged Mr. Ford with spying, injury to the United States on behalf of a foreign nation or communication to any person not entitled to receive classified information. Due process requires that a criminal statute provide a person of ordinary intelligence fair notice that his contemplated conduct is forbidden. See Thomas v. Davis, 192 F.3d 445,45514n Cir. 1999). If a law is "vague or highly debatable, a defendant - actually or imputably - lacks the requisite intent to violate it." See United States v. Mallas. 7 62 F .2d 36r , 363 14'n cir.1985). criminal prosecution for the violation of an unclear duty itself violates the clear constitutional duty of the government to warn citizens whether particular conduct is legal or illegal. See U.S. v. Rosen and Weissman 05-cr-225.

A statute cannot be construed so as to delegate to prosecutors and juries the "inherently legislative task" of determining what type of possession of national defense information are so reprehensible as to be punished as crimes. See United States v. Kozminski. U.S. 93 1,949 (1988) (rejecting construction of criminal statute that would *delegate to prosecutors and juries the inherently legislative task of determining what type of coercive activities are so morally reprehensible that they should be punished as crimes").

Second, the canon of strict construction of criminal statutes and the rule of lenity ensure fair warning by resolving ambiguity in a criminal statute as to apply it only to conduct clearly covered. Lanier, 520 U.S. at 266. Third, due process bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope. Each of these three elements is based on the fact that it must have been reasonably clear the time that the defendant’s conduct was criminal.”

United States Attorney for the District of Maryland Rod Rosenstein confirmed by his own statement that: "Though there was conflicting evidence of what Ford intended to do with the classified information – the jury’s verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information.”

Therefore, one would conclude that it was apparently not 'reasonably clear' that Ford's alleged conduct was criminal. Our son was incarcerated based on “unclear conflicting evidence'. An egregious miscarriage of justice at the highest level is evident throughout this case.

Each of these three manifestations is based on the notion that it must have been "reasonably clear at the time that the defendant's conduct was criminal". Elements applied to Mr. Ford's case affirm that reasonable clarity was severely lacking. Courts have ruled that §793 (d) and (e) apply only to the transmission of tangible information. ln fact, these rulings were the basis of Special Counsel Patrick Fitzgerald's explanation as to why he did not bring charges under the Espionage Act §793 against either the government officials who leaked the name of CIA agent Valerie Plame to the press or the reporters who subsequently reported that name to millions of readers around the world.

The following exculpatory evidence, which would have exonerated our son, was suppressed from the trial and jury: 1) FBI Form 302 Statement by Tonya Tucker (FBI Confidential Informant), 2) Tonya Tucker's threatening e-mail to Mr. Ford and 3) Special Agents Thompson's and Marsh's Search Warrant Affidavits. Special Agent Marsh's affidavit clearly affirmed on January 11, 2004, page 6 of 12 that: “A review of criminal history records reflect that TUCKER has a number of arrests, including arrests for Driving while suspended, Criminal trespassing, Robbery, among others."

Courts have repeatedly ruled that the government may not excuse its presentation of false testimony by claiming that: (a) it did not know, (b) it did not understand what other agencies knew, or (c) it believed the testimony. It cannot use these excuses because they are not the law and the facts do not support them. See Mesarosh. et al v. United States, 352 U.S. I (1956); Giglio v. United States, 405 U.S. 150 (1972); and United States v. Mason, et al., 293 F.3d, 826 (5th Cir.2002). Fourth Amendment violations enumerated in the matter of Franks v. Delaware were repeated violations perpetrated on Kenneth Wayne Ford, Jr. by the United States Department of Justice (DOJ). In the matter of Franks v. Delaware, the Court held that: "Where the defendant makes a substantial preliminary showing that a false statement that a hearing be held at the defendant's request."

Federal prosecutors in Mr. Ford's case willfully applied national security standards of the suppression of evidence and discovery. DOJ prosecutors willfully enforced national security clearances upon defense counsel with full knowledge that DOJ did not obtain mandatory FISA applications and approvals.

Prosecutors ignored strict procedural requirements in accordance to the Foreign Reform Act of 2000"). Prosecutors clearly violated Title VI §603, 605 and 607. This case should never have been prosecuted. Title VI $608 provides, in part, that: "If any provision of this title (including an amendment made by this title), or the application thereof, to any person or circumstance, is held invalid, the remainder of this title (including the amendments made by this title), and the application thereof. to other persons or circumstances shall not be affected thereby.”

C. Background

Kenneth Wayne Ford, Jr. is now 38 years old. He is the cream of the crop of young American citizens. He is an African-American and is highly educated. Mr. Ford graduated from DeMatha Catholic High School in Hyattsville, Maryland in 1990. He then went to the University of Miami in Coral Gables, Florida and graduated from there in 1995 with a Bachelor of Business Administration in Management and Organization degree. Mr. Ford served 4 years in the Uniformed Division of the Secret Service, where he received two cash awards in consecutive years for outstanding service. While in the Secret Service, Mr. Ford continued his education and enrolled into Strayer University. To his credit, he graduated in 2001, summa cum laude" earning a Bachelor of Science in Computer Networking degree. Later, Mr. Ford enrolled in the Masters program at Strayer University, earning in 2004, a Master of Science in Information Technology degree.

In 2001, Mr. Ford accepted employment at NSA as a Signals Intelligence Analyst. While employed at NSA, he received a cash award for outstanding service. Later, he was recognized with a large plaque - his name listed, among others, for outstanding work on a particular project. It was disclosed in the trial by a State Department officer that Mr. Ford had security clearances that less than 150 people in the entire country hold. Mr. Ford has worked extremely hard all his life, as he was not born with a silver spoon in his mouth, inherited wealth or privilege. He has spent over 23 years acquiring an education. He would never do anything to jeopardize his life or his accomplishments. After Mr. Ford's conviction, Mr. Lambert, the probation officer assigned to formalize his pre-sentencing report, commented to me (his mother) and included in his report that "Kenneth has not even had a traffic ticket."

D. Case Overview

On Sunday, January 11. 2004. FBI Special Agent Michael L. Thompson and NSA Security Officer Robert McCaslin arrived at Mr. Ford's home at approximately 5:50 p.m. and fabricated that they wanted to talk to him about his former position. Mr. Ford invited them in because he was led to believe they wanted to get his expertise on a work-related situation. About ½ hour later, their attitudes changed and Mr. Ford realized they were unjustly accusing him of espionage. Simultaneously, with these accusations, they began searching his home - 2-I/2 hours before the search warrant arrived. FBI Special Agent Frederick Marsh arrived with a search warrant and about 23 additional agents.

During the course of this ordeal, Mr. Ford was threatened by Special Agent Michael L. Thompson's unnecessary withdrawal of his gun. He was terrorized for 7-1/2hows as the agents rampaged his home. He was not allowed to leave his residence, contact his parents or answer his telephone. He was denied food and water. He was not allowed to use his own bathroom until Thompson took him away from his home -7-1/2 hours later. See Title 18, Part I, Chapter 113C - Torture - "an act committed by a person acting under the color of law specifically intended to inflict severe physical or mental pain or suffering (other than pain or suffering incidental to lawful sanctions) upon another person within his custody or physical control." (See Exhibit E -Letter by Kenneth W. Ford, Jr. Documenting Events)

E. DOJ Triple Jeopardy Indictments

The government's 1st indictment, and 2nd case number, was filed on 3/4/2005. U.S. District Court Judge Peter J. Messitte dismissed the case without prejudice on 5/162005. The 2nd indictment, and 3rd cse number, dated 5/23/2005, contained the exact charges and language as the ls indictment. The 3rd indictment, which we had no knowledge of until recently, is dated 11/28/2005. The docket indicates that there was a superseding indictment, arraignment and plea of not guilty all on the same day – 11/28/2005. It indicates Mr. Ford appeared before Judge Messitte and gave a plea of 'not guilty' to each of the two counts against him. This is untrue. Mr. Ford never appeared before Judge Messitte or any other judge on 11/28/2005. His trial started the next day, 11/29/2005. It is impossible to appear for an arraignment one day and be tried by jury the very next day.

It should be noted here that on March 30,2006, at the end of Mr. Ford's 2ndsentencing hearing, Judge Messitte dismissed the original indictment. He and Prosecutor Salem signed papers to that effect. Judge Messitte said several times during the trial, Mr. Ford was being prosecuted on the superseding indictment. (Of course, this is impossible.) Apparently, at some point, Judge Messitte and Mr. Salem realized this. Consequently, this dismissal has never been filed, is not in Mr. Ford's court file and is not on the docket. (See Exhibit F - Indictments, Docket Listings of 1//28/2005 Superseding Indictment, Arraignment and Not Guilty Plea and Transcript Page of Dismissal of Original Indictment) Also See $3434 - Presence of Defendant - (Rule) 3

Also, there appears on all three indictments: 'Aiding and Abetting (1S U.S.C. §2)'. Mr. Ford was never charged with this crime. It does not appear anywhere else in the indictment nor was it addressed in the trial to the jury. In addition to the indictments being illegal, these acts make the indictments themselves faulty.

The 1st count was cited under Federal Criminal Code 793(e) - Espionage. FBI Receipt For Property Seized / Form 597 listed all items seized from Mr. Ford's residence. Ironically, there was not one (1) document identified as 'classified papers' prosecutors falsely alleged were taken from Mr. Ford's residence.

At the trial, FBI Special Agent Bridget Bigham, Seizing Agent, testified that she was told to put a classified sticker on a Fed Ex envelope found in a suitcase which belonged to career criminal Tonya Tucker. (The envelope is listed by FBI Special Agent Bigham as #9 on the FBI Form 597.) (See Exhibit G -FBI Form 597) Special Agent 3

-------------

3 In United States v. Randall, f 71 F.3d 195,203 (4th Cir. 1999) The Supreme Court ruled that the Fifth Amendment's grand jury guarantee does not permit a defendant to be tried on charges that are not made in the indictment against him, and therefore, 'after an indictment has been returned its charges may not be broadened through amendment except by the grand jury itself. See United States v. Randall, 471 U,S. 130, 143 (1985). See United States v. Brady, 456 U.S. 152; and United States v. Young, 470 U.S. 1, 16 (1985).

Bigham testified she did not look at the papers while in Ford's home. She further testified the alleged papers seized were not photographed in Ford's home as required by procedures, but were photographed days later at an FBI facility. (See Exhibit H - Excerpt of Agent Bigham's Transcript Testimony)

DOJ prosecutors testified during the trial that it did not have any 'surveillance evidence' nor 'any eyewitness accounts' of Mr. Ford allegedly removing classified documents from NSA. Prosecutors should have dismissed all charges against Mr. Ford.

The 2nd count was Title 18 U.S.C. $ 1801 - Making A False Statement On A Government Form. Mr. Ford accepted employment with Lockheed Martin. Prosecutor David Salem had already gotten him fired from Northrop Grumman and after working for 3 weeks at Lockheed Martin, Salem was successful in getting him fired from there also. Ford truthfully provided Lockheed Martin a 1-1/2 page written account of alleged charges against him. At the trial, Judge Messitte allowed Prosecutor Salem to severely redact Ford's written statement. Salem told the judge the statement "prejudiced him". (See Exhibit I - E-Mail Dated 10129/2004 to Lockheed Martin) AUSA David I. Salem and DOJ National Security Division Trial Attorney Mariclaire D. Rourke testified that Mr. Ford backed his pick-up truck to the loading dock and loaded these papers into his truck.

In contradiction of their testimony, Mr. Ford's former NSA supervisor, Ms. Jacqueline Welch ("hereafter Jacqueline W") testified that she in fact had seen Mr. Ford on the day in question - December 19,2003 - standing in the parking lot beside his 'cream-colored 4 door sedan (car)'. Former Counsel on redirect, ascertained whether or not she knew the difference between a 'pick-up truck and a car . She affirmed that she did. Jacqueline W further testified that she never knew Mr. Ford had a pick-up truck. At that point, DOJ's over zealous prosecutors' alleged pick-up truck was referred to as a 'vehicle'. (See Exhibit J - Excerpt of Jacqueline W's Testimony)

Special Agent Michael L. Thompson admitted under oath that there were no fingerprints belonging to Mr. Ford found on any of the thousands of sheets of classified papers allegedly found in Mr. Ford's home. Once again, none of these alleged papers were listed on the FBI's official seized evidence Form 597. (See Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony)

F. Argument

Mr. Ford is the only American citizen in the history of the Espionage Act, to be charged, prosecuted and convicted under the statute without meeting the requirements of the statute. The United States Court of Appeals for the 4th Circuit recently upheld the requirements that in order to charge under the Espionage Act of 1917 - §793(e) one has to have the belief that what one is doing will harm the United States and/or help a foreign entity and one must have the intent to harm the United States and/or help a foreign entity. See United States v. Rosen and Weissman,557 F.2d 192 4th Cir.2009).

Judge Peter J. Messitte, during the suppression hearings, willfully discarded the requirement that the government had to prove the “belief” 'element. Judge Messitte, while charging the jury, willfully eliminated the need for the government to prove the element of "intent.”

Under the federal sentencing guidelines, espionage (Federal Criminal Codes §793(d) and (e) cannot be sentenced unless there is the element of transmittal. So, effectively, since a transmittal is a prerequisite for sentencing under §793(e), then without it, there cannot be a charge. The government never alleged Ford transmitted anything. As a matter of fact, NSA Security Officer Robert McCaslin sent a letter to Prosecutor David Salem dated 713112004 saying Ford's electronic equipment at work and at home were analyzed by NSA and were found to be clean. The letter was not allowed into the trial.

Subsequently, the "CIPA" Intelligence Authorization Act for 2001- Title VI §607 - Coordination Requirements Relating to the Prosecution of Cases Involving Classified information was totally ignored by Assistant United States Prosecutor David I. Salem and Dept. of Justice Trial Attorney Mariclaire D. Rourke.

The National Security Procedure Statute 9-90.020, provides that DOJ prosecutors had no authority to make decisions in this case. "CIPA" $607 - $1.1 of Executive Order No. 12958, provides that a Senior Official, the President of the United States, must be notified prior to prosecution. ln this case, that President was former President George W. Bush, Jr. - another statutory mandate ignored and violated in the matter of Kenneth Wayne Ford, Jr. $793(e) 'unauthorized possession' is contradictory to the National Security Act which provides that NSA employees have a life-time obligation and commitment regarding NSA classified documents.

G. Violation of Dept. of Justice Guidelines/National Security Procedures

DOJ's USAM guidelines regarding National Security Procedures §9-90.020 clearly dictates that the authority to conduct prosecutions relating to the national security lies with the Justice. USAM unequivocally states, in part that:

All prosecutions affecting, involving or relating to the national security, and the responsibility for prosecuting criminal offenses, such as conspiracy, perjury and false statements, arising out of offenses related to national security, is assigned to the Assistant Attorney General of the National Security Division or higher authority. See 28 C.F.R. S 0.61 The Counterespionage Section of the National Security Division, under the supervision of the Assistant Attorney General or higher authority, conducts, handles, and supervises prosecutions affecting, involving or relating to the national security." DOJ trial attorney Mariclaire D. Rourke and AUSA David I. Salem did not have authority to prosecute a National Security Espionage case against Kenneth Wayne Ford, Jr.

We recently reviewed Mr. Ford's court file. Although there are a few orders, from 8/2005 to 1112005, appearing in the case file that indicate the Assistant Attorney General was in compliance with that particular order, it is with great concern that we ask you to investigate this. We have no proof or certification that the Assistant Attorney General's alleged involvement with this case was authentic. As in other things involving Mr. Ford's case, we suspect this too is a fabrication.

H. DOJ Violated FISA Court Statutes

FISA Court specifically prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control).

FISA allows a federal officer, authorized by the President of the United States acting through the Attorney Gener4l to obtain from a judge appointed by the FISA Court, search warrants and approval of electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information. Mandated strict FISA Court procedures were ignored by the FBI, DOJ Prosecutors and U.S. District Court of Maryland Judge Peter J. Messitte, who is not an appointed FISA Court Judge.

Specifically, FISA requires that where the target of the search or surveillance is a "United States person" - a U.S. Citizen or permanent resident alien - the judge must find that the Executive Branch's certification that a significant purpose of the search or surveillance is to obtain foreign intelligence information is not "clearly erroneous". See 50 U.S.C. §1805 and 1824. Also see Brady v. Maryland, 373 U.S. 33 (1963); Strickler v. Greene, 119 S.T. 1936 (1999).

The elements of violations are: (1) the evidence must be favorable to the accused, either because it exculpates the defendant or because it impeaches the government; (2) the evidence must have been suppressed by the government, either willfully or inadvertently; and (3) prejudice must have been ensued. See Franks v. Delaware, 438 U.S. 154 (1978); See Brady v. Maryland, 373 U.S. 83 (1963); See USA v. Rosen & Weissman 05cr-225 (E.D.Va.)

We are not elected or high level corporate officials. We are "grass roots" people who are honest and hard working. President Obama stated at the 2009 NAACP 100th Anniversary celebration, that: "America is a place where, if you work hard, you can achieve success." A grave injustice has been done to a good American citizen (Kenneth Wayne Ford, Jr.). American citizens rely upon the United States Department of Justice to follow the rule of law.

In good faith, the initiation of a formal procedural investigation and the appointment of a Special prosecutor on behalf of our son, Kenneth Wayne Ford, Jr., is warranted and specifically should include an investigation of prosecutorial misconduct, violations of national security procedures, violations of FISA Court procedures, violations of issues in applying states secrets rules and the willful suppression of exculpatory affidavits and other exculpatory evidence in this case.

We are available at any time that is convenient to you to discuss this case. The elements in this letter by no means cover all the infractions against Mr. Ford. There were just too many illegal things done to put in a letter.

We seek an immediate vacation of Mr. Ford's conviction, full restoration of his revoked clearances and an immediate apology from the Department of Justice (DOJ).

Thank vou.

Sincerely,

Kenneth W. Ford, Sr.

Gloria D. Ford

EXHIBITS

l) Exhibit A - Rosenstein Press Release dated December 15, 2005

2) Exhibit B - Affidavits by SA Michael L. Thompson & SA Frederick C. Marsh and Tonya Tucker's Subpoenaed Cell Phone Records

3) Exhibit C - Tonya Tucker's threatening e-mail to Mr. Ford/Newly Discovered Evidence

4) Exhibit D - FBI Special Agent Dave Evans' Newsletter dated 3/31/2006

5) Exhibit E - Letter from Kenneth Wayne Ford, Jr. / Document of Events

6) Exhibit F - DOJ's Double Jeopardy Indictments; Docket of 11/28/2005

Indictment; Transcript Page of Dismissal of Original Indictment

7) Exhibit G - FBI Form 597 (Seized Items) w/ Computerized Listing Of Items

8) Exhibit H - Excerpt of Agent Bridget Bigham's Testimony

9) Exhibit I - E-Mail dated 10/29/2004 from Kenneth W. Ford, Jr. to Lockheed Martin

l0) Exhibit J - Excerpt of NSA Jacqueline Welch's Testimony

1l) Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony
      

President Obama, who prides himself as a constitutional scholar, having taught constitutional law at the University of Chicago, is about to become the subject of a major constitutional case in the indictment of Thomas Drake. Drake was not only exposing high level contract fraud involving two NSA directors -- Generals Michael Hayden and Keith Alexander -- but also allegedly involved a constitutionally-protected entity -- the press -- in making details of the fraud known to the American taxpaying public. Not since Watergate have the American people been subject to runaway surveillance by the NSA and FBI.

Obama, who supported retroactive immunity from prosecution for telecommunications companies that swept up the digital communications of all American after proclaiming he was against it, will be the person on trial in the Drake case. And Obama may very well end up like Richard Nixon if the government does not impose restrictions on the public's right to know through imposition of the draconian Classified Information Procedures Act and the State Secrets Privilege.

As one NSA insider tersely put it: "I truly believe that NSA has some illegally wiretapped information (big-time dirt) on Mr. Obama, and NSA has been using it (via blackmail) against him ever since he flip-flopped on the vote for retroactive immunity for the telecommunication firms that insisted they did nothing illegal when they joined in with the Bush administration in comprehensive, 'sea to shining sea' warrantless wiretapping of all domestic U.S. communications."

//////////

JANUARY 2011: January 10, 2011 -- NSA "Q Group" protecting sex scandals while plugging potential leaks - Wayne Madsen Report

WMR's intelligence sources report that the National Security Agency's "Q Group," the directorate responsible for overall security for NSA, is actively investigating and harassing NSA employees who have reported on senior officials at the sprawling intelligence agency, which now includes the new U.S. Cyber Command, of engaging in adulterous trysts with subordinates and possessing improper sexual material, including child pornography.

WMR has previously reported on the improper activities of the Q Group, which has become a virtual uncontrolled FBI within the NSA. Q continues to protect NSA senior officials who engage in and promote a culture of sexual exploitation of junior employees at the intelligence agency. Q Group has also misused NSA psychologists and psychiatrists to deem anyone who charges senior officials of the agency with sexual misconduct or harassment unfit to hold a security clearance for reasons of mental impairment.

On August 28, 2009, WMR reported: "NSA Security, headed up by Kemp Ensor III, and NSA medical worked in tandem to deny security access to employees determined to be mentally unfit to have access to classified information at NSA.

However, due to the attrition of highly-qualified personnel, the security-medical duo is now prescribing Prozac and Zoloft for NSA employees who refuse to fall into line. NSA is abuzz with the new requirement for employees to take what they call "happy pills."

The sexual harassment scene has also reportedly changed at Fort Meade. In the past, sexual harassment at NSA involved older male managers preying on young female employees. That has now changed in what has become an environment of 'do ask and do tell.' WMR has been informed that there is an increase in complaints about sexual harassment from new young male hires about being forced into 'kinky rendezvouses' with older male managers."

Q Group has also gone outside of its legal authority to harass the families and friends of former agency employees who have brought charges against NSA for sexual harassment and misconduct. WMR has learned of NSA personnel illegally masquerading as phone company technicians who entered the property of the family of one such ex-employee. In another case, Q Group personnel poisoned two pet dogs of the family of an ex-employee under NSA surveillance. Q Group personnel have also been used to harass the ex-spouses of senior NSA officials involved in child custody cases. WMR has also been informed that Q Group has harassed NSA employees who have married the ex-wives of NSA senior officials who have ongoing legal battles with their ex-husbands.

Q Group is able to conduct its harassment of civilians in the Fort Meade area with a "wink and a nod" from local law enforcement and other officials. NSA senior managers have dipped into NSA's substantial slush fund to lavish money on community service projects and programs in cash-strapped local municipalities and counties. The concept of the "friendly NSA that provides funds and jobs" has bought loyalty and silence from local and state of Maryland officials. In addition, WMR has learned that NSA has placed agents within the congressional offices of local members of Congress in order to interdict and retaliate against NSA whistleblower congressional complaints. The NSA "embeds," who work in concert with NSA's Office of Legislative Affairs, are found within the offices of Maryland Senators Barbara Mikulski and Ben Cardin, and Maryland Representatives C.A. "Dutch" Ruppersberger, Steny Hoyer, Elijah Cummings, Chris Van Hollen, and Paul Sarbanes, and is currently inserting an agent into the office of freshman Representative Andy Harris.

As discovered in a January 2005, Q Group Personnel Security organizational chart obtained by WMR, Q2 contains an office of counter-intelligence, which WMR has reported has been involved in illegal surveillance of individuals far beyond the NSA infrastructure.

Q2.jpeg

On July 3, 2009, WMR reported: "The Obama administration, rather than lessen the pressure on the NSA personnel, has turned up the heat and is resorting to even more draconian methods to ensure silence. The word from inside NSA is that a state of fear exists and the mission of the agency, to conduct surveillance of foreign communications to provide threat indications and warnings to U.S. troops and policy makers and protect sensitive U.S. government communications from unauthorized eavesdropping is suffering as a result." Our latest information is that the Obama administration is increasing pressure on NSA personnel to deter leaks.

Obama's Justice Department is now actively retroactively pursuing U.S. intelligence community leakers from the time of the Bush administration. Former CIA officer Jeffrey Sterling has been arrested and indicted for revealing information to New York Times reporter James Risen concerning Iran's nuclear program. Former NSA official Thomas Drake has been indicted by the Obama administration for leaking details on NSA contract fraud to reporter Siobhan Gorman of The Wall Street Journal and formerly of theBaltimore Sun. Former State Department analyst Stephen Kim has been charged with leaking top secret information on North Korean nuclear testing to Fox News.

WMR has learned from informed sources that the indictments of Sterling and Drake are just the beginning of the Obama administration's policy to crack down on leaks. With the tenth anniversary of the 9/11 attack coming up this year, the U.S. Intelligence Community, working closely with Mossad, have made plans to stop any new revelations that would point to high-level U.S. and Israeli government involvement in the 9/11 attacks. The Wikileaks affair was partly concocted to draw out and identify as many potential leakers as possible, including US Army Private Bradley Manning, now imprisoned at Quantico, Virginia on suspicions that he leaked classified documents to Wikileaks.

WMR has learned from an NSA source that this editor continues to remain a top priority for NSA electronic surveillance, including phone tapping and e-mail interception. NSA is also monitoring all those who are in communications with this editor via electronic means. WMR has previously reported on this web site's sources and contacts being major targets for NSA surveillance. Just as the latest report of NSA surveillance was received, this editor experienced a second-degree burn with blistering on the right neck and shoulder, usually where my cell phone is placed during conversations. The latest warning about NSA eavesdropping was received on January 8. The burn, that began as what can be described as a bad sunburn, began on the evening of January 6. The contour of the burn mark is oddly similar to the two equal halves of my flip-top telephone, with a white stripe in the middle where the hinge is located.


SDC10481.jpeg

Second degree burns on right shoulder and neck after latest warning of full-scale NSA surveillance.

WMR's foreign intelligence sources also report that there is an ongoing project by Israeli agents-of-influence in the United States to determine the sources of information on the 9/11 attacks. This project involves in-depth probes by the Israeli agents of retired Pentagon and FBI personnel believed to possess information about the U.S. and Israeli governments' involvement in the attacks. WMR can report that radio show host Alex Jones's information and funding sources are of particular interest to the Israeli cell.

///////////////////////

MARCH 2011: March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial - Wayne Madsen Report

In the trial of former National Security Agency (NSA) executive Thomas Drake, federal prosecutors have convinced an agreeable federal judge, Richard D. Bennett, to place under court seal previously-released trial documents because they have been deemed "For Official Use Only" or FOUO. Drake is accused of leaking classified materials to the media and is only the fourth person in U.S. history to be charged with violating the 1917 Espionage Act.

FOUO is not a national security classification and it never has been one, although there were attempts by the Reagan, George H W Bush, and George W. Bush administrations to create a "restricted" or "sensitive but unclassified" (SBU) national security classification immediately below the current lowest national security classification, which is Confidential. Expansion of national security classification categories beyond the current three -- Top Secret, Secret, and Confidential, in addition to Sensitive Compartmented Information (SCI) special access categories -- but these have been unsuccessful. George W. Bush's creation of a Controlled Unclassified Information (CUI) category was rescinded by Executive Order 13556 on November 4, 2010.

Although President Obama rescinded Bush's CUI presidential memorandum, federal prosecutors are trying to argue that CUI continues to exist as a national security classification under the guise of FOUO. The argument demonstrates a complete lack of understanding of the classification scheme used by NSA. However, in past trials, notable that of NSA analyst Kenneth Ford, Jr., jailed after a political show trial waged by DOJ neocons in league with a "shopped" federal judge. In the Ford case, the NSA wanted to cover up the cooking of signals intelligence from Iraq in order to justify the attack on and occupation of Iraq

However, NSA and Justice Department prosecutors are continuing to insist that FOUO is a security classification in the trial of Drake, however, NSA and DOJ decided to go after Drake because the documents he stands accused of passing to The Baltimore Sunpoints to massive misuse of taxpayer's money and contract fraud under the NSA directorships of retired General Michael Hayden and current director General Keith Alexander. Alexander is also the commander of the U.S. Cyber Command. The fraud committed by Hayden, Alexander, and senior NSA officials amounted to hundreds of millions of dollars in wasteful expenditures. In some cases, the waste on certain contractor-supplied intelligence systems were life threatening, as far as troops on the ground were concerned. The fraudulent contract expenditures were part of NSA's massive TRAILBLAZER and GROUNDBREAKER outsourced modernization and restructuring programs.

On March 18, in response to a request from federal prosecutors, Bennett sealed two documents that were previously available on the court's own website. The documents sealed describe the classified contents of several documents seized at Drake's home, however, the documents appear to be unclassified working papers that the government, after the fact, is trying to argue are classified at the levels of Secret and Top Secret.

Drake's federal public defenders have argued in one of the sealed documents that the government's argument that the documents found in Drake's home in flawed due to the fact that the documents could not be construed as classified at Secret or Top Secret merely because they contain the words "FOUO" and "COMINT." COMINT is communications intelligence and by itself does not mean that the document is classified at "Handle Via COMINT Channels Only," a special handling caveat for SCI special access categories. In fact, the National Cryptologic Museum, which is adjacent to NSA headquarters and open to the public, freely uses "COMINT" in its displays. In addition, the commercial International Spy Museum in downtown Washington, DC has held public seminars on issues dealing with, among other tradecraft, "COMINT."

From the sealed DOJ letter arguing that the documents found in Drake's home are classified, it is clear that NSA, which has played fast and loose with the truth in previous trials and administrative actions against its whistleblowing employees, has tried to re-classify previous unclassified "working papers" as being Secret and Top Secret to bolster its case against Drake.

WMR has previously obtained NSA contractor documents that were deemed by the contractor and NSA, itself, as unclassified and the Drake documents appear to fall within the same category. The unclassified documents that were re-classified as Top Secret and Secret have titles such as "Trial and Testing," "Collections Sites," "Volume is Our Friend," "What a Success," "Regular Meetings," "Shoestring Budget," "BAG," "Buy vs. Make," "TT Notes," "Terrorism Threat," "Note Card 1", "Note Card 2," and more intriguing, "9/11 Commission." WMR previously reported that NSA's security directorate, the "Q Group," has engaged in massive surveillance of employees and journalists, including this editor, to plug any leaks on NSA information on the 9/11 attacks. Bennett, in his ruling on March 18, agreed to NSA's and lead federal prosecutor William Welch II's request that previously unclassified court filings be placed under seal.

While NSA and DOJ seek to convict Drake for having unclassified For Official use Only documents in which the terms "FOUO" and "COMINT" appear, WMR has obtained a similar Unclassified For Official Use Only (FOUO) document written by Computer Sciences Corporation (CSC), one of the major contractors for the fraud-ridden GROUNDBREAKER program. In the document, from which WMR is providing excerpts, there are clearly many more NSA-unique systems and terms described.

Cover terms for classified NSA systems such as HIGHCASTLE, LOOKINGGLASS, MILENIUM, FAST TRACK, ROTUNDPIPER, and BRASSCOIN are listed, along with "SIGINT" or "Signals Intelligence," an NSA mission term comparable to the "COMINT" acronym found in the working papers confiscated from Drake's home.

The CSC document, maintained by CSC contractors and sub-contractors in their cars, briefcases, and homes, were never indicted by the Justice Department on grounds they violated national security. On the other hand, many at NSA feel that companies like CSC, SAIC, Northrop Grumman, Lockheed Martin, and others, should have been indicted for the massive contract fraud carried out under the watches of Hayden and Alexander.

In post-9/11 America, the whistleblowers to fraud, waste, and abuse stand accused of being criminals while the criminals rake in billions of dollars in taxpayers' money and are lauded as critical components of the "intelligence team."

NSA's GROUNDBREAKER and TRAILBLAZER contractors were eager to compile as many NSA systems and sub-systems as possible to cash in on the billions of dollars they could make from the NSA outsourcing work. The database that contained all the NSA systems, projects, and components ripe for outsourcing work was code-named JACKPOT. For CSC, SAIC, and certain NSA officials who spun through the revolving door after retirement and landed high-paying jobs with the contractors, it certainly was a JACKPOT and one that NSA, Q Group, the FBI, Department of Justice, and the White House earnestly want to cover-up in the trial of Thomas Drake.

During Drake's trial, which begins next month in Baltimore, FBI agents are expected to use code words to describe different aspects of the case. One code-word that will most definitely not be heard is JACKPOT, the database of NSA contracts in which contractors and NSA retirees enriched themselves -- criminality that is only met with chirping crickets from the so-called "crime fighting" Department of Justice and FBI.

//////////////

NOTE: Here is the resealed files mirrored on hongpong.com, bitchez: SUPPRESSED: DrakeNSA1-suppressed.pdf // DrakeNSA2-SUPPRESSED.pdf // UNCLASSIFIED FOUO NSA DOC:  UNCLASSIFIEDNSAdoc.pdf .

Walter from the Big Lebowski has a word for you Fed jokers that think they can control society through secrecy & bullying:

22881085.jpeg

/////////////

MAY 2011: May 24, 2011 -- 60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years - Wayne Madsen Report

CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.

WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."

NSA and selling the nation's prized secrets to contractors

June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.


But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

/////////////

SEPTEMBER 2011: September 26-27, 2011 -- A tale of two cases - Wayne Madsen Report

On June 15, U.S. federal judge Richard B. Bennett sharply rebuked federal prosecutors for pursuing a four-year Espionage Act violation investigation and case against former National Security Agency (NSA) official Thomas Drake. At Drake's sentencing hearing in Baltimore, Bennett called the four-year long case against Drake and the prosecutors' ultimate dropping of multiple espionage charges to a single misdemeanor count of unauthorized use of a government computer "unconscionable."

Drake had been charged with providing classified information to the Baltimore Sun in 2006 and 2007. He was specifically charged with violation of sub-paragraphs (d) and (e) of the Espionage Act, which covers "transmittal" of classified information to unauthorized parties. Charges under the 1917 Espionage Act have rarely been brought by the Justice Department. The law was used against American Israel Public Affairs Committee (AIPAC) officials Steve Rosen and Kenneth Weissman for receiving highly-classified information, including Sensitive Compartmented Information (SCI), from a Pentagon official. Charges against Rosen and Weissman were dropped by Eric Holder's Justice Department on May 1, 2009.

However, the "classified material" cited by prosecutors was not originally classified and it pertained to NSA officials, particuarly then-NSA director General Michael Hayden, defrauding the government for well over a billion dollars. Hayden and his advisers awarded a failed program called Project TRAILBLAZER to a group of contractors led by Science Applications International Corporation (SAIC).

The prosecutors, acting as virtual criminal racket protection agents for Hayden and his advisers, decided to retroactively classify the unclassified whistleblowing information in order to justify the Espionage Act charges against Drake. Hayden's pet project also assisted in the program to conduct warrantless wiretapping of communications of U.S. citizens, a super-classified operation known by the code name STELLAR WIND.

Drake avoided prison and Bennett ruled against federal prosecutor's wish to have a $50,000 fine imposed on Drake. In sentencing Drake to 240 hours of community service, Bennett said "There has been financial devastation wrought upon this defendant that far exceeds any fine that can be imposed by me. And I’m not going to add to that in any way.”



Drake was represented by two federal public defenders, James Wyda and Deborah Boardman. Drake's case began to fall party after it was featured on CBS "60 Minutes." Retired NSA officials, interviewed on camera, defended Drake and his whistleblowing actions. After the bad publicity for NSA and Eric Holder's Justice Department, the espionage charges against Drake were dropped.

Five years earlier, in another federal court room in Greenbelt, Maryland, and in a case even more egregious than the one involving Drake, federal judge Peter J. Messitte sentenced former NSA "Iraqi shop" signals intelligence analyst Ken Ford Jr., to six years in prison and no fine as a result of his politically-motivated conviction for allegedly removing two boxes of classified materials from NSA during broad daylight without detection. In fact, the documents were planted in Ford's Waldorf, Maryland home in retaliation for his signals intelligence analysis report casting doubt on the White House contention that Iraq possessed weapons of mass destruction. That report, which contained Ford's name as the preparer, eventually ended up on the desk of Vice President Dick Cheney. As a result, Ford became a target of the neo-con cell operating from within Cheney's office and the White House Iraq Group (WHIG), the same cabal that compromised Valerie Plame Wilson's covert identity and mission.

The team of Assistant U.S. Attorney David Salem; federal public defenders John Chamble, Andrea Callaman, and Susan Bauer; and even the private lawyer eventually retained by Ford, conspired to ensure that Messitte was successfully "judge shopped" as the trial attorney, that at least one dubious pro-NSA jury member was selected for the trial jury, and that Ford would receive anything but a fair trial. Unlike Drake, Ford served in a lower-level analyst position. However, Ford, an African-American who previously served as a uniformed U.S. Secret Service officer at the White House, was on a fast-track for an executive position at NSA.

"60 Minutes" never covered the Ford case, even though it was as, if not more, outrageous as the case brought against Drake. The Washington Post, rather than assign one of its national security correspondents to the case, handed it to a Metro desk reporter, who parroted in his articles what was given to him by the prosecution team.

Prosecutors never cited any classified document that was said to be in Ford's possession at the time of his arrest. Prosecutors relied on the testimony of a confidential informant named Tonya Tucker, who had several other aliases and a long criminal record, who said she saw a document labeled "classified" in Ford's home. Of course, "classified" is not a national security label or designator for any documents. Salem also charged that Ford was planning on meeting a foreign agent at Dulles International Airport to transmit documents. However, Salem could not identify the foreign country involved, a flight number, a rendezvous point, or any details of what amounted to a "pre-crime" allegation. In fact, Salem made up the entire Dulles story as a way to ensure a guilty verdict, especially considering that the jury was never shown any of the alleged classified documents that were said to be in Ford's possession. In the Drake case, the jury was shown copies of "retroactively" classified documents, which were originally unclassified.

Ford is now out of prison and serving three-years of restricted travel probation in Maryland. He maintains his innocence and intends to appeal his case. However, Ford's attempt to enlist the assistance of the parties who came to the defense of Drake have been unsuccessful. There is another problem with the Ford case. The Ford case files, including those maintained by the PACER system and the federal public defenders office in Washington, DC, have all disappeared. Even Ford's original birth certificate in the District of Columbia Vital Records Office has disappeared. The only information available on the Ford case from the Justice Department are the press releases issued on the case.

The federal public defenders office in Washington is clearly nervous about the double standard applied to Ford and Drake. Moreover, the supervisor of Ford's tainted public defenders in 2004 was Wyda, the same public defender who successfully argued Drake's case.

Former Justice Department prosecutor Thomas Tamm, under a long investigation for revealing the nature of NSA's warrantless wiretapping program to The New York Times, eventually saw his investigation by the FBI suspended. However, WMR has learned that the STELLAR WIND program was routinely violated by NSA employees. Hayden, who came up with the program and sold it to then-CIA director George Tenet and Vice President Cheney, essentially canceled the provisions of U.S. Signals Intelligence Directive 18 (USSID) 18, which governed the application of the 1978 Foreign Intelligence Surveillance Act (FISA) at NSA. NSA was prohibited from eavesdropping on "U.S. persons" without a court order from the Foreign Intelligence Surveillance Court (FISC). Under Hayden's tenure, some NSA analysts were conducting e-mail surveillance of their current and former girl friends, prompting Hayden to cover his tracks by implementing a procedure that saw database security officers, including those with oversight over the PINWALE e-mail interception database, conducting after-the-fact audit trail analysis for internal abuse of the new NSA powers.
fordfamily1.jpeg


Ken Ford, Jr. [center], reunited with his father and mother after six years of imprisonment on trumped up neo-con political charges stemming from the search for phony Iraqi WMDs.

Ford's case, which involved pressure from the Bush-Cheney White House, has also met with indifference from the Obama White House and the Congressional Black Caucus. Groups like the Government Accountability Project (GAP), which assisted with Drake's defense, did not raise a finger in the Ford case.

During his incarceration at Lewisburg federal penitentiary in Pennsylvania, Ford received rank-and-file support from some current and former NSA employees. However, unlike Drake, not one high-level NSA official, current or retired, came to Ford's defense, even though his innocence was as provable as that of Drake. It is, indeed, a "tale of two cases," one with a relatively happy outcome, the other singed with racism.


/////////////

JANUARY 2012: January 18-19, 2012 -- More high-level fraud at NSA uncovered - Wayne Madsen Report

WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.

When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.

There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.

At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.

The following press release was issued on May 12, 2005:

"Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . .

OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."



Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.

Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZER contract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.

Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.

One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."

Among the spin-offs of TRAILBLAZER was the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.

Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.

Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."

/////////////

JANUARY 2012: January 18-19, 2012 -- FBI/NSA continue maintaining "mug shots" of journalists - Wayne Madsen Report

As WMR has reported in past articles, the National Security Agency (NSA) has maintained a series of "mug shots" of journalists it suspects have sources inside the NSA. Often, NSA personnel throught to have been speaking to journalists are called into NSA's "Q" security group and questioned on whether they have spoken to various journalists. Along with the names of the journalists, are photographs, described by NSA insiders, as "mug shots," likely culled from the Internet.

WMR previously reported on NSA's "rogue gallery" of journalists. From WMR, July 3, 2009: "Since the revelation of the NSA journalist monitoring database, which later added communications intercepts of journalist phone calls, emails, and faxes to its database, NSA Security has, according to information received by WMR, conducted physical surveillance of journalists it deems to be threats to the operations of the agency. The top targeted journalists, who make up a virtual 'rogues' gallery' at NSA Security, complete with photographs and other personal information, are: former Baltimore Sun and current Wall Street Journal reporter Siobhan Gorman, Washington Times reporter Bill Gertz, former Baltimore Sun and current New York Times reporter Scott Shane, Baltimore Sun reporter Phil McGowan, author James Bamford, New York Times reporters James Risen and Eric Lichtblau, and this editor, Wayne Madsen."

WMR has now learned from NSA sources that NSA and FBI counter-intelligence branches are maintaining "mug shots" of journalists. Two to three pages of journalists, along with their photographs, are known to be in the possession of FBI counter-intelligence agent Laura Pino and NSA counter-intelligence officer Ethan Andreas. Each page has two rows of photographs across with four photographs and names of journalists on each row -- a total of eight photographs and names per page. The number of journalists on the pages, therefore, could be between 16 and 24.

Three names are known to be on the pages maintained by the FBI and NSA, according to our sources: Siobhan Gorman, James Bamford, and this editor, Wayne Madsen. Gorman was believed to have been the journalist former NSA official Tom Drake was in contact with before he was criminally charges under various counts, including the the Espionage Act. Drake was a witness to high-level contract fraud and corruption within the NSA. WMR submitted a Freedom of Information Act request to NSA two years ago requesting information on the editor's photograph being used as a security warning device. After being granted expedited processing by NSA as news media for purposes of the FOIA request, NSA reversed course, denying us media status and then stonewalled responding to the request. [Related story today in WMR].


/////////////

JANUARY 2012: January 26-27, 2012 -- Obama administration assaults press freedom like no predecessor - Wayne Madsen Report

WMR has learned and has personally experienced the unprecedented assault by the Obama administration, aided and abetted by its intelligence and internal security infrastructure, on the First Amendment right of freedom of the press.

The Obama administration has indicted a total of six U.S. government employees with violating the arcane 1917 Espionage Act for allegedly communicating classified information to the press. The Obama administration, according to multi-agency U.S. government sources , has authorized the eavesdropping of journalists' e-mails, text messages, and phone calls to determine to whom they are in contact within the government, particularly in the Departments of State, Defense, Justice, the CIA, the U.S. Congress' intelligence oversight committees, and the National Security Agency (NSA). The NSA and FBI are also monitoring what websites are visited by government employees, including this one.

The six people charged under the Espionage Act with providing classified information to journalists (the "Obama Six") are:

  • John Kiriakou, former CIA, allegedly passed information on waterboarding torture tactics and the identity of a CIA torturer to someone identified by the government as "Journalist A." The chief government prosecutor is U.S. Attorney for Northern Illinois Patrick Fitzgerald, who WMR has identified as a cover-up prosecutor for the CIA ever since the days he suppressed critical intelligence in the trial of the "Blind Sheik," Omar Abdel Rahman, convicted for plotting the 1993 World Trade Center bombing and later, when he failed to bring Espionage Act charges against Dick Cheney chief of staff I. Lewis "Scooter" Libby in the Valerie Plame Wilson leak case. Fitzgerald also prosecuted former Illinois Governor Rod Blagojevich to protect the CIA's one-time agent, Barack Obama, Jr., from scandal arising from Obama's political and social activities in Chicago.
  • Jeffrey Sterling, former CIA, charged with providing The New York Times' James Risen with classified information on Iran's nuclear program.
  • Army Private First Class Bradley Manning, charged with providing over a quarter million State Department classified and unclassified cables from the SIPRnet communication system to WikiLeaks.
  • Thomas Drake, former NSA official, charged with providing classified information to journalists, including former Baltimore Sun reporter Siobhan Gorman. The charges against Drake were later reduced.
  • Stephen Kim, former State Department contractor, charged with leaking classified information about North Korea to Fox News' James Rosen.
  • Shamai Leibowitz, former FBI Hebrew translator, convicted of leaking classified FBI wiretaps to a blogger on Israeli intelligence activities in the United States directed at stirring up war fever against Iran. As yet, Leibowitz has been the only person convicted under the Espionage Act for leaking information to the media. The government fast-tracked the Leibowitz trial in order to supress coverage of Israel's massive intelligence operations in the United States.

WMR knows of six other ex-employees of NSA and the State Department who continue to face criminal probes by the Obama administration for leaking information to the press.

Government employees face constant monitoring of their government emails, as well as their personal e-mail accounts for any contact with the press. The FBI, NSA, and other agencies are also monitoring the web sites visited by government employees. At the State Department, lists of web sites visited by employees are maintained by the Diplomatic Security Service (DSS). DSS also maintains lists of charities to which State Department employees donate money.


WMR learned of one case where the U.S. Navy blocked access to the web for an employee who visited WayneMadsenReport.com from a government computer. The employee was required to explain to the system security administrator why WMR was visited and cautioned that WMR is on a "banned" list for Navy employees. At NSA, employees have been ordered not to disseminate any articles from WMR on the agency's internal e-mail system or they will face disciplinary action and possible loss of security access and their jobs.

There are also increasing reports that journalists' e-mails are being monitored or completely blocked by the U.S. government agencies and cooperating Internet Service Providers (ISPs). WMR has recently experienced such a denial-of-service by America On-Line (AOL).

The increased harassment of journalist sources by the Obama administration comes at the same time that Reporters Without Borders has dropped the United States on the World Press Freedom Index to 47 from 20 on the press freedom ranking list. At 47, the United States is tied with Romania and Argentina and ranks below the Union of Comoros in the Indian Ocean; increasingly fascist-oriented Hungary; Papua New Guinea, which has experienced a military coup; Mali; Tanzania; Botswana; Suriname; Niger; and Cape Verde. In 2002, during the second year of the Bush administration, the United States was ranked at 17.

///////////////

MARCH 2012: March 7-8, 2012 -- Justice Dept. prosecutor targeting whistle blowers and journalists has his own criminal history - Wayne Madsen Report

William Welch II was the chief of the Justice Department’s Public Integrity Section. While the title of his former office -- public integrity -- implies that Welch is dedicated to fighting corruption in the government, in President Obama's and Attorney General Eric Holder's Orwellian world of "Newspeak," Welch is the chief inquisitor of government whistle blowers and journalists who have communicated with them.

After committing ethical and legal violations in his investigation of the late Alaska Senator Ted Stevens, acts that resulted in criminal charges being dropped against Stevens and a criminal contempt of court investigation being opened against Welch, along with a Justice Department ethics probe, Welch continues to investigate national security whistle blowers. Welch has become a de facto special prosecutor, a modern day Juan de Torquemada, responsible for pursuing government "leakers" and journalists. Welch's targets have included National Security Agency fraud whistle blower Thomas Drake. He also has his sights set on former CIA officer Jeffrey Sterling and James Risen, the New York Times national security correspondent who Welch believes communicated with Sterling. Risen and the Times are fighting a subpoena for Risen to answer Welch's questions before a grand jury. Previously quashed by U.S. Judge for the U.S. District Court for Eastern Virginia Leonie Brinkema, the subpoena has been appealed by Welch and Holder to the U.S. Court of Appeals for the Fourth Circuit in Richmond, Virginia.

Welch and his team were also publicly berated by U.S. Judge Richard Bennett for faulty evidence against Drake who was being doggedly pursued by Welch for allegedly communicating with aBaltimore Sun reporter about billions of dollars in contract fraud committed at NSA, where Drake served in a senior executive position. Drake and veteran NSA colleagues found themselves being raided at gunpoint by FBI agents under Welch's supervision. Welch's case against Drake collapsed and in a plea agreement, all Welch could get from Drake's defense team was a guilty plea for a minor charge of misusing a government computer. Bennett rejected Welch's argument that Drake be given a $50,000 fine. Bennett said Welch put Drake through “four years of hell."

Bennett also criticized Welch for taking so long in bringing charges against Drake. Welch's case against Drake was conducted in anything but a speedy fashion. Welch's tactics included keeping potentially exculpatory evidence from Drake's defense team for months after the indictment was handed down. For over six months, Welch's team failed to produce evidence that one of the allegedly classified documents Drake was charged with improperly retaining was declassified two months after the indictment was issued.

Welch waited ten months to turn over evidence that another document that formed the basis of an Espionage Act charge against Drake had been - in the words of Drake's criminal defense team - “. . . published as 'unclassified' and had never been deemed 'classified' until after it was recovered from Mr. Drake's home.” The re-classification of previously de-classified documents is one of the tricks employed by the Holder Justice Department in pursuing leak investigations. Welch also informed Drake's criminal defense team that potentially exculpatory evidence relating to Drake's years-long cooperation with a Department of Defense Inspector General (DoD IG) investigation had somehow been "destroyed."

Welch has had a history with "destroyed" evidence. On December 1, 1996, Welch, who was then an assistant U.S. Attorney in Massachusetts and 33 years old, was stopped by the police on Route 10 in Southampton. Welch was arrested for driving under the influence of alcohol by a police officer after Welch failed four field sobriety tests. A special prosecutor was named in the case against Welch. According to the Union-News of Springfield, the prosecutor, Robert C. Bray, discovered that the police cruiser's video recorder failed to operate properly and the video tape could not be used as evidence against Welch. It also helped that Welch's father was Superior Court of Massachusetts judge William H. Welch. The senior Welch, who died in 2007, had been considered for four federal judgeships but was never nominated.

According to the Union-News, Southampton Police Lt. David Silvernail said that the video camera, which was purchased in November 1996 with federal grant money, 'went on when overhead cruiser lights were activated and was not supposed to go off until an officer shut it off.' Apparently, the camera had been shutting itself off after three minutes, but miraculously for Welch the problem was not discovered until Welch's arrest. 'The camera was sent back to its manufacturer to be fixed after the problem was found,' Silvernail
told the newspaper. The criminal case against Welch was dropped. The tape was later reused by Southampton police officers and the Welch arrest segment was erased.


williamwelch.jpeg


William Welch blows every case to which he is assigned. Perhaps he should blow into a plastic bag.


The story of William Welch is not an isolated one among Justice Department prosecutors. In Welch's case, someone who was so drunk he could not pass four sobriety tests on a Massachusetts highway is now entrusted by the Obama administration with the power to investigate those who challenge incompetence and wrongdoing in the U.S. intelligence community.

//////////////////////

END WAYNEMADSENREPORT.COM ITEMS >>>>

Whew.... All right. Now go read the Puzzle Palace and the Shadow Factory and everything you can find on Cryptome.org and PublicIntelligence.net about the NSA & Cryptography. GET [hash] CRACKIN!

Special Guest Column! CIA Whistleblower Susan Lindauer on the Patriot Act: "When Truth Becomes Treason" - Thuggish National Security Coverup & Grand Jury Mechanisms for Iraq & 9-11

Screen shot 2011-05-24 at 8.24.34 PM.pngSweet: CIA Whistleblower & 9/11 covert ops witness sends an important essay for HongPong.com!

National Security Whistleblowers are a tough bunch. Susan Lindauer worked as a CIA asset for many years before 9-11, including issues related to Libya & the Lockerbie bombing, as well as a major backchannel contact to Saddam Hussein's government. Lindauer was one of very few Americans charged under the PATRIOT Act, accused of acting as an agent of influence for Iraq after she tried to blow the whistle on Capitol Hill.

Lindauer fought tenaciously to clear her name and assert in the US court system that she was in fact in the service of the CIA, working the Iraq embassy back into the 1990s, even as coverup specialist handlers like the corrupt Michael Mukasey tried to make sure she fell down the memory hole.

Prosecuted for years, the Obama/Holder DOJ finally dropped the charges against Lindauer and she wrote a book about her experiences, 'Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq' which I really want to read.

Lindauer has been touring the alternative media in the last couple months but she's pretty thoroughly blacked out of mainstream coverage. She noticed that I have posted links about her story to HongPong.com and asked me to publish the following essay. No problem and thanks for asking! :-D

Previous HongPong.com Coverage: More Fun Notes: LinkDump for May 9 2011, Big Bad Pharma, Loose Ends of 9/11 Revisited (May 9 2011) // LinkDump March 27 2011 - We looked into the fire and the fire looked back // Russia & China not buying BIS Fractional Reserve Gold currency scheme pushed by the Ben Bernank (Dec 28 2010).

She's hoping that alternative media can raise more awareness of the way the PATRIOT Act works in conjunction with secret grand juries to crush decent people inside the system, not save Amurrca From Turrurists. Additional info about the scuttled peace deal with Saddam and 9/11 CIA foreknowledge and Mossad "complicity" disclosed by her CIA handler Dr. Fuisz in particular tie right into other alternative narratives for 9/11 already out there. (My general conclusion is that several foreign/military-industrial intelligence networks were involved & this has been covered up thoroughly)

More Lindauer links: Great interview with Kevin Barrett should be listened to! // Susan Lindauer - Political Prisoner // Russia Today interview: 'War for Libyan oil planned long ago, no one cares about people'. She was on the inside of the Lockerbie false-flag coverup (it was a CIA hit on DIA using PFLP patsies to coverup drugz opz in Lebanon roughly). Susan Lindauer | Veterans Today columns. // Explosive Revelations From 9/11 Whistleblower Susan Lindauer on Pre 9/11 Warnings and the Iraq War | The Intel Hub Radio // The Lockerbie Case: American Cassandra - Susan Lindauer’s Story. Solid review by Michael Collins (who gets credit for drawing my interest): The Hornet's Nest Kicked Back - A Review of Susan Lindauer's Extreme Prejudice | The Agonist & more Collins stories: American Cassandra.

Anyhow enough preamble - let's read a first-person account of this Patriot Act crackdown against an operative who know too much and wouldn't stay on script.

***********

The Patriot Act: When Truth Becomes Treason

By Susan Lindauer, former Asset covering Iraq & Libya and the second non-Arab American indicted on the Patriot Act

Many Americans think they understand the dangers of the Patriot Act, which Congress has vowed to extend 4 more years in a vote later this week. Trust me when I say, Americans are not nearly frightened enough.Unfortunately, Bradley Manning is also subject to some of these rules, so it's important for his supporters to understand what's ahead.

Ever wonder why the truth about 9/11 never got exposed? Why Americans don't have a clue about leadership fraud surrounding the War on Terror? Why Americans don't know if the 9/11 investigation was really successful? Why the Iraqi Peace Option draws a blank? Somebody has known the whereabouts of Osama bin Laden--- or his grave—for the past 10 years. But nobody's talking to the people.

In significant part, that's because of the Patriot Act--- a law that equates free speech with sedition. It's got a big agenda, with 7,000 pages of Machiavellian code designed to interrupt individual questioning of government policy. In this brave new world, free speech under the Bill of Rights effectively has been declared a threat to government controls for maintaining stability. And the Patriot Act has become the premiere weapon to attack whistle blowers and dissidents who challenge the comfort of political leaders hiding inconvenient truths from the public. It's all the rage on Capitol Hill, as leaders strive to score TV ratings, while demogauging their "outstanding leadership performance" on everything from national security to environmental policy.

Truth has Become Treason

But wait---Congress assures us the Patriot Act only targets foreigners, who come to our shores seeking to destroy our way of life through violent, criminal acts. Good, law abiding Americans have nothing to fear. The Patriot Act restricts its powers of "roving wiretaps" and warrantless searches to international communications among "bad guys." Congress has sworn, with hand on heart, it's only purpose is breaking down terrorist cells and hunting out "lone wolf" mad men.

That's what they told you, right? And you believed them? You trust the government. Well, that was your first mistake. With regards to the Patriot Act, it's a fatal one. Would the government lie to you? You betcha! And they have.

The Patriot Act reaches far beyond terrorism prevention. In my home state of Maryland, State Police invoked the Patriot Act to run surveillance on the Chesapeake Climate Action Network dedicated to wind power, recycling and protection of the Chesapeake Bay. They infiltrated the DC Anti War Network, suggesting the group might be a front for "white supremacists," and Amnesty International, claiming to investigate "civil rights abuses." Opponents of the death penalty also got targeted (in case they got violent).

Bottom line: truth tellers who give Americans too much insight on any number of issues are vulnerable to a vast arsenal of judicial weapons typically associated with China or Mynamar. In the Patriot Act, the government has created a powerful tool to hunt out free thinking on the left or right. It doesn't discriminate. Anyone who opposes government policy is at risk

How do I know all this? Because I was the second non-Arab American ever indicted on the Patriot Act. My arrest defied all expectations about the law. I was no terrorist plotting to explode the Washington Monument. Quite the opposite, I had worked in anti-terrorism for almost a decade, covering Iraq and Libya, Yemen, Egypt and Malaysia at the United Nations. At the instruction of my CIA handler, I had delivered advance warnings about the 9/11 attack to the private staff of Attorney General John Ashcroft and the Office of Counter-Terrorism in August, 2001. FBI wire taps prove that I carried details of a comprehensive peace framework with Iraq up and down the hallowed corridors of Capitol Hill for months before the invasion, arguing that War was totally unnecessary.

I delivered those papers to Democrats and Republicans alike; to my own second cousin, White House Chief of Staff Andrew Card; and to Secretary of State Colin Powell, who lived next door to my CIA handler. Gratis of the Patriot Act, we had the manila envelope and my hand written notes to Secretary Powell, dated a week before his infamous speech at the United Nations. My papers argued that no WMDs would be found inside Iraq, and that the peace framework could achieve all U.S. objectives without firing a shot.

In short, I was an Asset who loudly opposed War with Iraq, and made every effort to correct the mistakes in assumptions on Capitol Hill.

Then I did the unthinkable. I phoned the offices of Senator Trent Lott and Senator John McCain, requesting to testify before a brand new, blue ribbon Commission investigating Pre-War Intelligence. Proud and confident of my efforts, I had no idea Congress was planning to blame "bad intelligence" for the unpopular War.

Over night I became Public Enemy Number One on Capitol Hill.

Thirty days later I awoke to hear FBI agents pounding on my door. My nightmare on the Patriot Act lasted 5 years--- Four years after my arrest, the Court granted me one morning of evidentiary testimony by two supremely credible witnesses. Parke Godfrey verified my 9/11 warnings under oath. Otherwise, I never got my day in Court.

The Patriot Act's Arsenal to Stop Free Speech

If you care about America and the traditions of freedom, whether you're progressive or conservative, you should be angry about this law.

First come the warrantless searches and FBI tracking surveillance. My work in anti-terrorism gave me no protection. I got my first warrantless search after meeting an undercover FBI agent to discuss my support for free elections in Iraq and my opposition to torture and sexual humiliation of Iraqi detainees. (Sorry guys, body wires don't lie.)

If truth tellers don't get the message to shut their mouths, the Justice Department ratchets up the pressure. Defendants face secret charges, secret evidence and secret grand jury testimony. Throughout five years of indictment, my attorneys and I never got to read a single FBI interview or grand jury statement. Under the Patriot Act, the whistleblower/defendant has no right to know who has accused him or her of what criminal activities, or the dates of the alleged offenses, or what laws got broken.

Of course, I was able to piece together my activities. I knew that "sometime in October, 2001" an Iraqi diplomat gave me the English translation of a book on depleted uranium, which showed how cancer rates and birth defects had spiked in Iraqi children.

And I was quite certain that on October 14, 1999, an Iraqi diplomat asked me how to channel major financial contributions to the Presidential Campaign of George Bush and Dick Cheney. The Justice Department got the date from me, since I reported my conversation immediately to my Defense Intelligence handler, Paul Hoven.

It's unlikely the grand jury knew that, since the Justice Department has the prerogative to keep a grand jury in the dark. In this brave new world, a grand jury can be compelled to consider indictments carrying 10 years or more in prison, without the right to review evidence, or otherwise determine whether an individual's actions rise to the level of criminal activity at all.

That's just the beginning. Once Congress scores an indictment against a political opponent, the Justice Department can force Defense attorneys to undergo protracted security clearances, while the whistle blower cum defendant waits in prison--- usually in solitary confinement or the SHU. After the security clearance, prosecutors have an ironclad right to bar attorneys from communicating communications from the prosecution to the defendant, on threat of disbarment, stiff fines or prison sentence.

Scared yet? Once you get to trial, the situation gets much worse. The Patriot Act declares that a prosecutor has no obligation to show evidence of criminal activity to a jury at all. And the Defense can be denied the right to argue a rebuttal to those secret charges, because it requires speculation that might mislead the jury—or might expose issues that the government considers, well, secret. After all that a Judge can instruct a jury that the prosecution regards the secret evidence as sufficient to merit conviction on the secret charges. The Jury can be barred from considering the lack of evidence in weighing whether to convict.

Think I'm exaggerating? You would be wrong. That's what happened to me. All of it—with one major glitch. All of this presumes the whistle blower's lucky enough to get a trial. I was denied mine, though I fought vigorously for my rights. Instead, citing the Patriot Act, I got thrown in prison on a Texas military base without so much as a hearing—and threatened with indefinite detention and forcible drugging, to boot.

Americans are not nearly afraid enough.

Neither is Congress. As of this week, members of Congress should be very afraid. Anyone who votes to extend the Patriot Act should expect to pack their bags in 2012. They will be targeted for defeat. Above all, the words "freedom" and "Constitution" will never appear in their campaigns without suffering extreme public scorn—never, ever again.

   --- END---

Susan Lindauer is the author of Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq, which reveals details of her CIA team's 9/11 warnings and a comprehensive peace option with Iraq.

Mort Zuckerman, Charter Member of Generation of Swine sez "WikiLeaks, Cyber War Threaten Our Way of Life" / I say, You Kids Get Off My Cyber-Lawn!

MORT.png

I've noticed that the shadiest old men of the Establishment frequently make political arguments that boil down to 'GET OFF MY LAWN YOU DAMN KIDS'. For example, the corrupt paleo-reaganite federal judge in Minnesota who tossed the Shepard Road RNC lawsuit said he didn't care about illegal government operations because GET OFF MY LAWN. Interesting philosophy, to which the kids respond "Ok we'll become anarchists then." The tighter they squeeze, the moar star systems slip thru their clumsy fingers.

One of the more nasty old Weasels of the Woodwork, Mort Zuckerman, posted another of his characteristic Grumpy Old Man rants, because wrecking America wasn't enough he has to blather about Hacktivists© now too.

So we need to destroy the internets now because the national security state is weak & feckless in the face of anarchic HTTP protocols and Denial of Service attacks.

As A Victim Of Cyberwar © Myself This Week, I mean damn, I had a DDoS take Hongpong.com's shared box off the internets all damn day yesterday, and you know what?

Denial of Service attacks don't matter for jack! I survived, everything's fine, it's annoying but it's like spilling yr beverage. Wash out the keyboard, let it dry, get on with things.

Anyway the Old Zuckster, a nasty racist old man who hates Palestinians and loves his criminal financial operative besties friends, let loose with this broadside: WikiLeaks, Cyber War Threaten Our Way of Life - US News and World Report (related he wrote in WSJ Mortimer Zuckerman: How to Fight and Win the Cyberwar)

Which literally included an 80-year old disinfo bit about Anarchism © :

Anarchists have a long history in America of acting to create and at times threaten a violent overthrow of civil society. An anarchist assassinated President William McKinley in 1901 and others tried to kill Attorney General A. Mitchell Palmer in 1919; anarchists sent 36 parcel bombs to prominent citizens in 1919 and exploded a lethal bomb on Wall Street in 1920. Our cyber anarchists would be appalled at any comparison, but their intent is the same—the creation of chaos—and the philosophy is the same, characterized as are all anarchic movements by an inability to distinguish liberty from license and an overriding narcissistic contempt for the rights of others. Of course, the license is pre-emptively asserted in the name of "the people."

Actually I'm pretty sure it was your buddies on Wall Street that acted for the creation of chaos etc...

Read All 18 Comments - Anyway I think my response was pretty good:

You Kids Get Off My Cyber-Lawn!

Mr. Zuckerman, your corrupt generation of swine has virtually destroyed the United States, and you've been a cheerleader of the most perfidious rings of financial criminals every step of the way -- your personal friends are the core of our nation's problems. As the official mascot for obsolete & grumpy old men everywhere, you're leading by anti-example, showing us all how to march towards the apocalypse with aplomb. Perhaps in the afterlife you'll be sentenced to a Groundhog Day-like scenario, experiencing directly the destruction your generation of unstoppable criminals has wrought, from the West Bank bulldozers to the nuked pension funds.

The more vengeful and abusive shady old people like you get, the more young people turn away from your deadwood ideology by the thousands. Raiding the Royal Carriage, the kids in England chant 'Off With Their Heads' as the Grumpy Old Men fume and ask their grandkids to setup the DVD player. You will have no ideological heirs, sorry Mort! The National Security state is a layer cake of lies, and it's so weak just proclaiming a few bits from the rooftops sends it spinning into Chaos. On Internets we call this a LOL: your dictatorship of information control is eroding exponentially. It's not the anarchists' fault these hierarchies are falling apart!

It's a good feeling that the snarling geriatric types are losing their grip - but I fear within 10 years or so, nearly demonic geezers like Zuckerman and Dick Cheney could be effectively almost immortal/zombie-like due to medical advances. Transhumanist Grumpy Hyper-Old Men would be awful.

I'll leave it there - oh wait here's an awesome roundup describing how evil this man is, how he treats his media employees abusively, and nukes their 401Ks while lunching at the Four Seasons. A Look Back: Ten Years of Branding Mort Zuckerman As A Boring Monster: lulz:

Over the last ten years, the New York Post has called Daily News owner Mort Zuckerman a cheapskate, a tyrant, an illegal maid-payer, a friend to unsavory characters, a bad businessman, a racist, a friend of terrorism, a firer of pregnant women, a publisher who uses his editorial page for the his own real estate interests, a constructor of dangerous buildings, the provoker of staff suicides, as well as wild-eyed, mercurial, panicky, a cheater of readers, a scoffer at laws, a "horrible, nickel-and-diming boss," and the publisher of boring publications.

Let's hope the real estate crash bankrupts him before he can rant again!

Assange == Auction the leaks? Lamo was a Honeypot and other tales from the Wikileaks Underbelly; Plus Hushmail a bust

Vatican Endorses "The Blues Brothers" - ABC News - nothing else matters too much.

"The issue here is that Assange and Manning (the primary source of Wikileaks Iraq and Afghanistan leaks) hoped to jointly profit by selling some of the data by auction" -- Supposed "Wikileaks Insider" @ Cryptome

*******

[Adrian] Lamo, who currently works as a journalist and security expert, says that the situation was anything but ordinary. He states, "People confess federal crimes to me every day and I don't turn them in. But those cases didn't have this kind of national security risk."

He says that Manning's initial leaks might have been justified. He says, "Certainly, releasing the gun cam footage would have been something I would have done in his place." Jason Mick - DailyTech.com

Response from chromal: "People confess federal crimes to me every day and I don't turn them in. Uh, something tells me that not anymore, they don't." LOL

********

Oh yikes -- Cryptome's John Young is still on a tear versus Wikileaks and Julian Assange. Pesky though, there was a funny one about Adrian Lamo the honeypot, but Cryptome remarks roll so quickly off the front page and Young has blocked the Archive.org bot. Blah...

Additionally I was sent a link to an interview with the aptly named ex-hacker Lamo, who turned in Bradley Manning for talking about classified materials. Tip for leakers: don't count on someone who settled a plea with the Feds, if for no other reason than they may have more permanent strings attached.

Wayne Madsen claimed Wikileaks as essentially a Quantum Fund/Soros-friendly front (zapping the Swiss Bank Julius Baer's depositor data in order to obliterate its value, and make it ripe for a Goldman/Quantum takeover!). Madsen alleges that for years Assange was kind of a honeypot himself, a high profile front man there to catch more Mannings & dispose of them. Too bad there's been so much decent work product.

The video release, allegedly via Manning, of an Afghan military massacre is impending. DailyBeast (in the post Posner era of rebuilding :P ) "Assange acknowledges in the email today that he is in custody of the May 2009 video that shows the airstrike on the Afghan village of Garani, believed to be the most lethal combat strike in Afghanistan—in terms of civilian deaths—since the United States invaded the country in 2001. Assange writes that “we are still working on” preparations for release of the video of 'the Garani massacre.' "

Weekly Standard has a lol: Is Wikileaks Secure? | The Weekly Standard. Turns out Hushmail spills the beans all too easily - surprise!

But first, a couple more fun ones... Good times with the Oath Keepers in Mother Jones.

Corporate news complains Mexican armed cartels are getting "three counties" into Arizona. Wonder how far the drug money gets? More in New Yawrker. [Bonus points tho: Assange forwarded a key early Gary Webb CIA-Contra story in 1996 onto Cypherpunks, so hat tip there. With luck the State Dept CableDump will totally prove more modern Afghan Drug LOL OPS all around? We can has dreamz]

Michael Ruppert's back, now on the amusing Keiser Report with Max Keiser. Now this is economic news I can handle:

European Union law sux.

*********

So let's get to whatever Mr Young at Cryptome is putting out there, FYIz:

Young posted Assange posts from Cypherpunks email listserv 1995-2002. http://cryptome.org/0001/assange-cpunks.htm

http://cryptome.org/0001/wikileaks-dogs.htm "Wikileaks will throw Manning to the Dogs"

   Via PGPboard, 14 June 2010:

Cryptome published the following:-

Quote [From: http://www.wired.com/threatlevel/2010/06/conscience/]

He said that Julian Assange had offered him (Manning) a position at Wikileaks. But he said,” I’m not interested right now. Too much excess baggage.”

endquote

There will never be any transcripts of Manning's communications with Assange. The issue here is that Assange and Manning (the primary source of Wikileaks Iraq and Afghanistan leaks) hoped to jointly profit by selling some of the data by auction to interested news and media organisations such as AFP, Reuters and CNN, and several British daily newspapers.

Assange will throw Manning to the dogs. As we speak, Assange will not accept any communications from Manning. Manning will be hung out to dry in order to cover Assange’s ass.

A Wikileaks Insider   

********

http://cryptome.org/0001/wikileaks-maybe.htm

15 June 2010. Based on spelling errors and syntax, this message does not appear to be written by Julian Assange, perhaps by someone on his behalf. Could be a forgery to gather data on WL supporters. To protect identity of supporters, WL is usually careful to authenticate its communications. However, security may be lax due to the furor roiling WL into losing control of opsec discipline -- the very technique Bradley Manning asserts led to the Army's negligence into protecting its assets from him. Not that what Lamo and Paulsen claim Manning chatted has been authenticated. More likely, the usual threats, lies, disinfo, exaggeration and braggardy are being spread to advance seemingly competing interests. Seemingly. Could be mutual back-scratching, the secretkeepers' and secret peddlers' most-favored operation. No threat, no need for secrets, no market for leaks. Best to work together to fleece the gullible with national security confidence gaming.   

**********

Wikileaks crib notes!

http://cryptome.org/0001/wikileaks-haven.htm

Date: Wed, 16 Jun 2010 22:21:43 +0200
From: 
To: cypherpunks[at]al-qaeda.net, info[at]postbiota.org
Subject: WikiLeaks inspired "New media haven" proposal passes Parliament

----- Forwarded message from Julian Assange <julian[at]wikileaks.org> -----

From: Julian Assange <julian[at]wikileaks.org>
Date: Wed, 16 Jun 2010 18:20:18 +0100 (BST)
To: eugen[at]leitl.org
Subject: WikiLeaks inspired "New media haven" proposal passes Parliament

FYI:

Reykjavik, Iceland; 4:00 UTC, June 16th 2010.

The WikiLeaks advised proposal to build an international
"new media haven" in Iceland, with the world's strongest
press and whistleblower protection laws, and a "Nobel" prize for 
for Freedom of Expression, has unaminously passed the
Icelandic Parliament.

50 votes were cast in favor, zero against, one abstained. Twelve
members of parliament were not present. Vote results are available
at http://www.althingi.is/dba-bin/atkvgr.pl?nnafnak=43014

One of the inspirations for the proposal was the dramatic August 2009 gagging of
of Iceland's national broadcaster, RUV by Iceland's then largest bank, Kaupthing:

http://wikileaks.org/wiki/Financial_collapse:_Confidential_exposure_analysis_of_
205_companies_each_owing_above_EUR45M_to_Icelandic_bank_Kaupthing,_26_Sep_2008

Two changes were made to the proposal from its original form as per
the opinion of the parliament's general affairs committee
[http://www.althingi.is/altext/138/s/1329.html]. The first of these
altered slightly the wording of the first paragraph so as to widen
the arena for research. The second of these added two new items to
the list of tasks for the government:

   - That the government should perform a detailed analysis,
     especially with respect to operational security,
     for the prospect of operating data centers in Iceland.

   - That the government should organize an international conference
     in Iceland regarding the changes to the legal environment being caused
     by expansion of cloud computing, data havens, and the judicial state
     of the Internet.

Video footage from the proposal's vote will be available at:

http://www.althingi.is/altext/hlusta.php?raeda=rad20100616T033127&horfa=1
http://www.althingi.is/altext/hlusta.php?raeda=rad20100616T033306&horfa=1

For details of the proposal and press contacts, please see

http://www.immi.is
*********

Blog Title: Is Wikileaks Secure?

Your Email Address: jya[at]pipeline.com

Your Comment:

Wikileaks communications security is well beyond that of Hushmail which is known to be weak by comsec followers. This is not to suggest that national-grade countermeasures could not break Wikileaks protection. More likely is that national-grade surveillance of Wikileaks and similar providers of hard to get governmental and banned information is a continuing covert operation.

Online surveillance by authorities is common, either by direct access to worldwide Internet infrastructure or by cooperation of Internet Service Providers and commercial firms which provide hardware and software for digital communications and are obliged by law to provide lawful access to user data. There are a number of lawful spying guides available on the Internet, many hosted on Cryptome.org and elsewhere.

Wikileaks is assuredly aware of these invasive practices and its protection for communications is far superior to commercially-provided protection which is so weak that it verges on being criminally deceptive.

National authorities unfortunately are not accountable to the public for its surveillance of lawful activities, and Wikileaks is justified in helping increase accountability, including that related to national security which is excessively hidden from the public by secrecy amok.

John Young
Cryptome.org
212-873-8700

*********

http://cryptome.org/0001/wikileaks-costs.htm

   A send via PGPboard, 15 June 2010:

Inside WIKILEAKS An UPDATE

---------------------------------------------------

What most people don't realise is just how WIKILEAKS internal structure resembles an absolute dictatorship. Forget the invisible nine so called board members composed of technologists and media representatives, they do not exist, and they never have.

Forget about Daniel Schmitt, one of WIKILEAKS public faces, he is of absolutely no consequence and has no influence, editorial or otherwise within WIKILEAKS.

WIKILEAKS is, and always has been the brain child of Julian Assange, a convicted ex hacker, who's original concept was to attach a value to leaked information, and sell it to the highest bidder. From an initial base of approximately eight high value sponsors, and an Internet community ready to buy into Assange's snake oil of protecting the whistleblower by guaranteeing anonymity based upon technological means and legal support if the smelly stuff really hit the fan..!!

WIKILEAKS is essentially a one man band, with a core of unpaid volunteers, who provide all of the grunt work and server space for WIKILEAKS. There is no huge bill for server space. Assange fronts for an organisational infrastructure donated gratis by others. So you may justifiably ask just how much does it cost to run WIKILEAKS?

The basic expenses incurred by WIKILEAKS such as minor running expenses, paying for the server space that is not donated, and communications costs is approximately $55K per year. This figure excludes Assange's so called promotional expenses, which include international travel in business class, hotel accommodation, taxis, clothing, and personal expenses. For FY 2009 and YTD, these are estimated to be in excess of $225,000.

There are no internal accounts at WIKILEAKS accurately detailing expenditure of monies received from donors, and Assange has no visible income streams.

Unfortunately for Assange, his involvement with whistleblower Manning, was originally based upon trying to sell US government leaked information to the Media is not working, and has seriously back-fired. The link between Manning and Assange is strong. So strong in fact, that Assange has been desperately trying to erase all evidence of email trails on WIKILEAKS servers.

Assange's latest ploy is a variation on his usual, "They're out to get me" routine. He is now using the ploy that WIKILEAKS needs a cash infusion to meet the expenses incurred in flying a legal team out to Kuwait to defend Manning. I'm sorry to say that this is an absolute misrepresentation. Assange won't even speak or communicate directly with Manning. WIKILEAKS cannot afford the high level team that would be required to defend Manning. Currently WIKILEAKS have received no pro bono offers.

Again Assange is relying upon the Internet community to stump up the cash, with no clear audit trail of disbursements and expenditure

The philosophy behind WIKILEAKS is good, unfortunately Assange has run out of goodwill from WIKILEAKS original contributors.

ASSANGE IS A LIABILITY TO WIKILEAKS. IF WIKILEAKS IS TO SURVIVE ASSANGE MUST GO. AND GO NOW..!!

Wikileaks Insider

**********

http://cryptome.org/0001/wikileaks-funds.htm Wikileaks Funding Drive

Date: Sun, 16 May 2010 13:09:14 +0100
From: Walshingham2000 <pgpboard[at]gmail.com>
To: cryptome[at]earthlink.net
Subject: FORWARDED MESSAGE PGPBOARD (160510 1306 GMT)


WIKILEAKS FUNDING DRIVE
-----------------------------------------------

Julian Assange's very public fund raising campaign has effectively
stalled with past and potential investors fading into the
background. As previously indicated it is NOT the philosophy of
WIKILEAKS that is in question, but Assange's credibility. 

The lack of any significant high rollers backing Assange has led
to a significant change of direction concerning fund raising.
These are paid interviews and appearances, and appeals to the
internet community to send money.

Keeping in mind that Assange has publicly stated that he needs
$200,000 USD just to keep the lights on, and $600,000 USD to be
fully funded; then just how much has Assange received, how much
has been spent, and on what? A pressing point when one
considered WIKILEAKS is still effectively closed down, and
Assange continues to enjoy a particularly luxurious lifestyle in
South Africa with no comparable income streams.

From information received, since January 2010 WIKILEAKS income
until end of April 2010 has been:

Internet Donations:         $132,347 USD

Media Interviews etc.     $82,892 USD

Sponsorships:                 $28,657 USD

The total income YTD is $243,896 USD.  Then why aren't the
lights on at WIKILEAKS Mr. Assange?? When will you provide
audited accounts of WIKILEAKS operating expenditure??

Finally, just keep in mind that Assange has not abandoned the
concept of selling information by auction to media groups on an
exclusive basis. Now just where does that fit into WIKILEAKS
philosophy? To put it brutally, it does not, it's a scheme
designed exclusively to fill Assange offshore bank accounts..

Regards
A WIKILEAKS Insider

**********

HUSHMAIL FAIL, another bit from Cryptome:

   A2 sends:

What would be a better anonymous email service as compared to hushmail?

Cryptome: Don't know of one. Might double-up by encrypting the message prior to sending by Hushmail. Use a Hushmail address only once. Don't send from you own computer. Use a strange computer only once. Be wary of any "secure" comms. Encryption is never enough by itself and it betrays by leaving evidence of its usage and transmission track. Anything digital is penetrable. The Internet and email are especially insecure ways to communicate. Sec experts suggest the old standby snail mail remains the best means short of an armed courier. Best of all is to keep very quiet.

*******

Alright that's it for now -- beware, tinfoil hats actually amplify certain freqs!

War on WikiLeaks? Nasty intelligence plan to destroy "center of gravity" Wikileaks as threat to INFOSEC & Cyber CounterIntelligence: Military principle of total war against the media??


Well this is grim! The ACIC or Army Counterintelligence Center published in March 2008 a National Security Information Special Report, under the auspices of the Department of Defense Intelligence Analysis Program (DIAP). Michael D Horvath of the Cyver Counterintelligence Assessments Branch does not really believe or understand the First Amendment, apparently, and his mind must be a spooky place. It was a HQ Department of Army Production Requirement C764-97-0005 and ACIC Product ID Number is RB08-0617.

This document indicates that the Pentagon is pretty dangerous. But what else is new?

Source: U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008

U.S. Intelligence planned to destroy WikiLeaks

WikiLeaks release: March 15, 2010

keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SECRET,

NOFORN

restraint: Classified SECRET/NOFORN (US)

title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups?

date: March 18, 2008

group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; Department

of Defence Intelligence Analysis Program

author: Michael D. Horvath

link: http://wikileaks.org/file/us-intel-wikileaks.pdf

pages: 32

Description

By Julian Assange (julian@wikileaks.org)

This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks.

“The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing

sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize

the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the

insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment,

criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage

or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”.

[As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan

was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China,

Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.

The report provides further justification by enumerating embarrassing stories broken by WikiLeaks—U.S. equipment

expenditure in Iraq, probable U.S. violations of the Cemical Warfare Convention Treaty in Iraq, the battle over the

Iraqi town of Fallujah and human rights violations at Guantanmo Bay. Note that the report contains a number of

inaccurances, for instance, the claim that WikiLeaks has no editorial control. The report concludes with 13 items of

intelligence to be answered about WikiLeaks.


(U) Wikileaks.org—An Online Reference to Foreign

Intelligence Services, Insurgents, or Terrorist Groups?

NGIC-2381-0617-08

Information Cutoff Date: 28 February 2008

Publication Date: 18 March 2008

National Security Information

Unauthorized Disclosure Subject to Criminal Sanctions

Derived from: Multiple sources

Declassify on: Source documents marked 25X1

Date of source: 20060725

This Counterintelligence Analysis Report is published under the auspices of the Department of

Defense Intelligence Analysis Program (DIAP).

Prepared by:

Michael D. Horvath

Cyber Counterintelligence Assessments Branch

Army Counterintelligence Center

External Coordination: National Ground Intelligence Center[1]

This product responds to HQ, Department of Army, production requirement C764-97-0005.

ACIC Product Identification Number is RB08-0617.

(U) Purpose

(U) This special report assesses the counterintelligence threat posed to the US Army by the

Wikileaks.org Web site.

 

SECRET//NOFORN

SECRET//NOFORN

Page 2 of 32

(U) Executive Summary

(S//NF) Wikileaks.org, a publicly accessible Internet Web site, represents a potential force

protection, counterintelligence, operational security (OPSEC), and information security

(INFOSEC) threat to the US Army. The intentional or unintentional leaking and posting of US

Army sensitive or classified information to Wikileaks.org could result in increased threats to

DoD personnel, equipment, facilities, or installations. The leakage of sensitive and classified

DoD information also calls attention to the insider threat, when a person or persons motivated by

a particular cause or issue wittingly provides information to domestic or foreign personnel or

organizations to be published by the news media or on the Internet. Such information could be of

value to foreign intelligence and security services (FISS), foreign military forces, foreign

insurgents, and foreign terrorist groups for collecting information or for planning attacks against

US force, both within the United States and abroad.

(S//NF) The possibility that a current employee or mole within DoD or elsewhere in the US

government is providing sensitive information or classified information to Wikileaks.org cannot

be ruled out. Wikileaks.org claims that the ―leakers‖ or ―whistleblowers‖ of sensitive or

classified DoD documents are former US government employees. These claims are highly

suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or

whistleblowers is one of its primary goals. Referencing of leakers using codenames and

providing incorrect employment information, employment status, and other contradictory

information by Wikileaks.org are most likely rudimentary OPSEC measures designed to protect

the identity of the current or former insiders who leaked the information. On the other hand, one

cannot rule out the possibility that some of the contradictions in describing leakers could be

inadvertent OPSEC errors by the authors, contributors, or Wikileaks.org staff personnel with

limited experience in protecting the identity of their sources.

(U) The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal

behavior, and wrongdoing within corrupt corporations and oppressive regimes in Asia, the

former Soviet bloc, Sub-Saharan Africa, and the Middle East. To do so, the developers of the

Wikileaks.org Web site want to provide a secure forum to where leakers, contributors, or

whistleblowers from any country can anonymously post or send documentation and other

information that exposes corruption or wrongdoing by governments or corporations. The

developers believe that the disclosure of sensitive or classified information involving a foreign

government or corporation will eventually result in the increased accountability of a democratic,

oppressive, or corrupt the government to its citizens.[2]

(S//NF) Anyone can post information to the Wikileaks.org Web site, and there is no editorial

review or oversight to verify the accuracy of any information posted to the Web site. Persons

accessing the Web site can form their own opinions regarding the accuracy of the information

posted, and they are allowed to post comments. This raises the possibility that the Wikileaks.org

Web site could be used to post fabricated information; to post misinformation, disinformation,

and propaganda; or to conduct perception management and influence operations designed to

convey a negative message to those who view or retrieve information from the Web site.[3]

 

 

(U) Diverse views exist among private persons, legal experts, advocates for open government

and accountability, law enforcement, and government officials in the United States and other

countries on the stated goals of Wikileaks.org. Some contend that the leaking and posting of

information on Wikileaks.org is constitutionally protected free speech, supports open society and

open government initiatives, and serves the greater public good in such a manner that outweighs

any illegal acts that arise from the posting of sensitive or classified government or business

information. Others believe that the Web site or persons associated with Wikileaks.org will face

legal challenges in some countries over privacy issues, revealing sensitive or classified

government information, or civil lawsuits for posting information that is wrong, false,

slanderous, libelous, or malicious in nature. For example, the Wikileaks.org Web site in the

United States was shutdown on 14 February 2008 for 2 weeks by court order over the publishing

of sensitive documents in a case involving charges of money laundering, grand larceny, and tax

evasion by the Julius Bare Bank in the Cayman Islands and Switzerland. The court case against

Wikileaks.org was dropped by Julius Bare Bank, the US court order was lifted and the Web site

was restored in the United States. Efforts by some domestic and foreign personnel and

organizations to discredit the Wikileaks.org Web site include allegations that it wittingly allows

the posting of uncorroborated information, serves as an instrument of propaganda, and is a front

organization of the US Central Intelligence Agency (CIA).[4]

(S//NF) The governments of China, Israel, North Korea, Russia, Thailand, Zimbabwe, and

several other countries have blocked access to Wikileaks.org-type Web sites, claimed they have

the right to investigate and prosecute Wikileaks.org and associated whistleblowers, or insisted

they remove false, sensitive, or classified government information, propaganda, or malicious

content from the Internet. The governments of China, Israel, and Russia claim the right to

remove objectionable content from, block access to, and investigate crimes related to the posting

of documents or comments to Web sites such as Wikileaks.org. The governments of these

countries most likely have the technical skills to take such action should they choose to do so.[5]

(S//NF) Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and

whistleblowers who pass information to Wikileaks.org personnel or who post information to the

Web site that they will remain anonymous. The identification, exposure, or termination of

employment of or legal actions against current or former insiders, leakers, or whistleblowers

could damage or destroy this center of gravity and deter others from using Wikileaks.org to make

such information public.

 

 

(U) Key Judgments

(S//NF) Wikileaks.org represents a potential force protection, counterintelligence,

OPSEC, and INFOSEC threat to the US Army.

(S//NF) Recent unauthorized release of DoD sensitive and classified documents provide

FISS, foreign terrorist groups, insurgents, and other foreign adversaries with potentially

actionable information for targeting US forces.

(S//NF) The possibility that current employees or moles within DoD or elsewhere in the

US government are providing sensitive or classified information to Wikileaks.org cannot

 

be ruled out. The claim made by Wikileaks.org that former US government employees

leaked sensitive and classified information is highly suspect, however, since

Wikileaks.org states that the anonymity of the whistleblowers or leakers is one of its

primary goals.

(U//FOUO) The Wikileaks.org Web site could be used to post fabricated information,

misinformation, disinformation, or propaganda and could be used in perception

management and influence operations to convey a positive or negative message to

specific target audiences that view or retrieve information from the Web site.

(U//FOUO) Several countries have blocked access to the Wikileaks.org Web site and

claim the right to investigate and prosecute Wikileaks.org members and whistleblowers

or to block access to or remove false, sensitive, or classified government information,

propaganda, or other malicious content from the Internet.

(U//FOUO) Wikileaks.org most likely has other DoD sensitive and classified information

in its possession and will continue to post the information to the Wikileaks.org Web site.

(U//FOUO) Web sites such as Wikileaks.org use trust as a center of gravity by protecting

the anonymity and identity of the insiders, leakers, or whistleblowers. The identification,

exposure, termination of employment, criminal prosecution, legal action against current

or former insiders, leakers, or whistleblowers could potentially damage or destroy this

center of gravity and deter others considering similar actions from using the

Wikileaks.org Web site.

(U) Table of Contents

(U) Purpose

(U) Executive Summary

(U) Key Judgments

(U) Background

(U) Discussion

(U) Intelligence Gaps

(U) Conclusions

(U) Point of Contact

(U) References

(U) Appendix A: Glossary

(U) Appendix B: Methodology Used by Authors for Analysis of Leaked Tables of

Equipment for US Forces in Iraq and Afghanistan

(U) Tables

(U) Table 1. Abbreviated Listing of the Iraq Transition Team (UIC - M94216) Table of

Equipment (TOE)

(U) Table 2. Descriptive Entry of the File and How it is Catalogued by Wikileaks.org for

the NGIC Report Entitled ―(U) Complex Environments: Battle of Fallujah I, April 2004‖

[NGIC-1127-7138-06] posted on its Web site

 

(U) Figures

(U) Figure 1. M33A1 Bulk CS Chemical Dispenser

(S//NF) Figure 2. Map from Page 4 of NGIC Report Entitled ―(U) Complex

Environments: Battle of Fallujah I, April 2004‖ As Published in a Wikileaks.org Article.

 

 

(U) Background

(U//FOUO) Wikileaks.org was founded by Chinese dissidents, journalists, mathematicians, and

technologists from the United States, China, Taiwan, Europe, Australia, and South Africa. Its

Web site became operational in early 2007. The advisory board for Wikileaks.org includes

journalists, cryptographers, a ―former US intelligence analyst,‖ and expatriates from Chinese,

Russian, and Tibetan refugee communities. The ACIC does not have any information to

associate or link the ―former US intelligence analyst‖ on the Wikileaks.org advisory board with

the leakage of sensitive or classified DoD documents posted to the Web site.[6]

(U) Wikileaks.org claims to have developed an uncensorable version of the publicly available

Wikipedia interface that is intended for mass leakage of sensitive documents that expose

wrongdoing and for allowing users to comment on the documents posted to the Web site.

Through its Web site, Wikileaks.org encourages large-scale anonymous leaking and posting of

sensitive and confidential government and business documents on the Internet. Wikileaks.org

claims to have received more than 1.2 million documents from dissident communities and

anonymous sources throughout the world. If true, additional articles involving sensitive or

classified DoD will most likely be posted to the Wikileaks.org Web site in the future.[7]

(S//NF) Wikileaks.org uses its own coded software combined with Wiki, MediaWiki, OpenSSL,

FreeNet, TOR, and PGP to make it difficult for foreign governments, FISS, law enforcement

agencies, and foreign businesses to determine where a leaked document originated from and who

was responsible for leaking the document. The goal of Wikileaks.org is to ensure that leaked

information is distributed across many jurisdictions, organizations, and individual users because

once a leaked document is placed on the Internet it is extremely difficult to remove the document

entirely.[8]

(S//NF) The obscurification technology[9] used by Wikileaks.org has exploitable vulnerabilities.

Organizations with properly trained cyber technicians, the proper equipment, and the proper

technical software could most likely conduct computer network exploitation (CNE) operations or

use cyber tradecraft to obtain access to Wikileaks.org‘s Web site, information systems, or

networks that may assist in identifying those persons supplying the data and the means by which

they transmitted the data to Wikileaks.org. Forensic analysis of DoD unclassified and classified

networks may reveal the location of the information systems used to download the leaked

documents. The metadata, MD5 hash marks, and other unique identifying information within

digital documents may assist in identifying the parties responsible for leaking the information. In


 

addition, patterns involving the types of leaked information, classification levels of the leaked

information, development of psychological profiles, and inadvertent attribution of an insider

through poor OPSEC could also assist in the identification of insiders.

(U) Wikileaks.org supports the US Supreme Court ruling regarding the unauthorized release of

the Pentagon Papers by Daniel Ellsberg, which stated that ―only a free and unrestrained press can

effectively expose deception in government.‖ The Wikileaks.org Web site further states the

following:

―We aim for maximum political impact. We believe that transparency in

government activities leads to reduced corruption, better government, and

stronger democracies. All governments can benefit from increased scrutiny by the

world community, as well as their own people. We believe this scrutiny requires

information. Historically that information has been costlyin terms of human life

and human rights. But with technological advancesthe Internet, and

cryptographythe risks of conveying important information can be lowered.‖[10]

(U) The OPSEC measures used in the submission of leaked information to Wikileaks using the

Internet are designed to protect the identity and personal security of the persons or entities

sending or posting information to the Web site. Wikileaks.org claims that any attempt at trace

routing of IP addresses, MAC addresses, and other identifying information of a home computer

submissions (as opposed to cyber café submissions) through Wikileaks.org‘s Internet submission

system would require a knowledge of information available only to Wikileaks.org programmers

and to a rights organization serving the electronic community, or would require specialized

ubiquitous traffic analysis of Internet messages and routing systems. Nevertheless, it remains

technically feasible for FISS, law enforcement organizations, and foreign businesses that have

the motivation, intentions, capability, and opportunity to gain online access or physical access to

Wikileaks.org information systems to identify and trace whistleblowers through cyber

investigations, advanced cyber tools, and forensics.[11]

(U) Another method of posting leaked information to the Web site anonymously is for leakers to

use postal mail to send the information to volunteers in various countries who have agreed to

receive encrypted CDs and DVDs from leakers. These volunteers then forward the information

to designated personnel, who then upload the data on the CDs and DVDs to the Wikileaks.org

Web servers. To protect or mask the sender, leakers can take OPSEC measures such as using

Wikileaks.org encryption protocols when writing CDs and DVDs; using gloves while wrapping,

taping, handling, and mailing packages; and not including a return address or including a fake

return address on packages containing leaked information. Such measures are designed to protect

the identity of the leakers and prevent FISS, law enforcement, and postal inspectors from

intercepting the mail and decoding the information on the data storage devices in transit.

Wikileaks.org also claims that it is developing easy-to-use software to encrypt the CDs and

DVDs. Use of such methods also protects facilitators or intermediaries from harm because they

would not know the content of the encrypted submissions.[12]

(U) A Wikileaks.org spokesperson stated in early January 2007 that about 22 persons are

involved in the Open Society Initiative to make governments and corporations more accountable

 

to the citizens of the world. Wikileaks intends to seek funding from individual persons and

groups such as humanitarian organizations that fund sociopolitical activity intended to promote

democracy and human rights around the world through open access to government and business

information.[13]

(S//NF) Several foreign countries including China, Israel, North Korea, Russia, Vietnam, and

Zimbabwe have denounced or blocked access to the Wikileaks.org Web site to prevent citizens

or adversaries from accessing sensitive information, embarrassing information, or alleged

propaganda. The governments of China, Israel, and Russia have asserted that they have a right to

remove from the Internet protected government information, disinformation, and propaganda that

is intended to embarrass or make false allegations against their governments. China, Israel, North

Korea, and Russia are assessed to have state-sponsored CNE, computer network attack (CNA),

and cyber forensics capabilities that would most likely allow penetration or disrupt viewing of

the Wikileaks.org Web site. China, Israel, and Russia have used or are suspected of having used

CNA to target terrorist or dissident Web sites that have posted objectionable material intended to

embarrass, harm, or encourage terrorism or opposition to the government.[14]

 

(U) Discussion

(U//FOUO) An insider could present a potential force protection, counterintelligence, OPSEC, or

INFOSEC threat to the US Army through deliberate unauthorized release of official DoD

documents and posting of sensitive or classified information to the Internet. Several recent

postings to the Wikileaks.org Web site in November 2007 of sensitive US Army information

marked UNCLASSIFIED//FOR OFFICIAL USE ONLY and in December 2007 of US Army

information classified SECRET//NOFORN highlight the insider threat to DoD. The actual

perpetrators responsible for the unauthorized released of such documents could be subject to

administrative action, nonjudicial punishment, or criminal charges and prosecution if they are

identified.

Controlling 9/11 "crippled epistemology" via fake 'CIA' Internet Conspiracy Theories, COINTELPRO & "cognitive infiltration of extremist groups": Huge jackass/Obama Info Czar Cass Sunstein favors infiltrating conspiracy groups, planting disinfo, diversions

140110top2.jpg"....we will suggest below that if the hard core arises for certain identifiable reasons, it can be broken up or at least muted by government action." .... "We suggest a role for government efforts, and agents, in introducing such diversity.  Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action."

SSRN-Conspiracy Theories by Cass Sunstein, Adrian Vermeule

This is one hell of a chestnut. It seems obvious, in retrospect, the best way to conceal the truth of establishment shady business and institutionalized crime is to mix in a ton of bullshit in order to turn all the skeptics and inquirers against each other. Only now it's Obama's dang 'information czar' pitching the strategy!

Interestingly, the more I broaden my sources, the more I appreciate the broad spectrum of people that have cancelled their subscriptions to Establishment Bollox and the Lies of the Mighty Wurlitzer. It's amazing how so many features of Establishment Reality are so widely loathed from within so many different worldviews.

This important fact is what people like Cass Sunstein don't understand. Like faux Establishment 'Centrists', they believe that ontological truth, or even the 'optimal' policy outcome, is like @ the 50% mark between where the dialectical left & right goalposts are placed.

It's like Howard Fineman - accurately dubbed the Weathervane because you only have to look which way he's pointing to determine what reassuring centrist reality is today's hot item. Howard Fineman is the precise opposite of a 'conspiracy theorist' in Sunstein's world.

The Establishment's Hegelian social control techniques are obvious: just set the left and right goalposts, stir and repeat. Problem-reaction-solution. If one can influence both the left and right goalposts in the great false dichotomy, it makes the product of "centrists" far more acceptable. Everything floating around outside this parlor game is the prima materia of 'conspiracy' that the State should attack professionally, Sunstein says!

Sunstein's tidy worldview brushes over the complex role of deceptive bullshit operatives around there, laying the groundwork for stupid establishment narratives. For example, what are we to make of the ever-shady Gerald Posner, spoonfed the FBI goodies on China? Or Adam Ciralski, helping Blackwater's Erik Prince perpetrate some classic exposure-threatening graymail about U.S. covert ops. Are these merely products of rotten epistomology? [PD Scott with a solid takedown of Posner - Scott's the real deal with The War Conspiracy and more here.]

*****

Anyhow Cass Sunstein was appointed by President Obama as some kind of info czar. Interestingly he wrote a paper about how to manipulate conspiracy theorists by attempting to throw their groups off the Hegelian deep end, thus opening an opportunity for defamatory information warfare. Fascinating stuff, and it's got Alex Jones incensed!!

More links, then some snippets: Obama Information Czar Calls For Banning Free Speech, Sunstein’s Paper Provides More Evidence COLINTELPRO Still Operational, etc.

This whole thing reminds me of how the JFK conspiracy scene is managed as "A Story/B Story" wherein there are two alternate, mutually irreconcilable narratives. Dribs and drabs of facts supporting A and B (roughly, CIA/Mafia and Lone Gunman, usually) can be offered and safely paddle around on the History Channel.

Let us share a few choice links about how the CIA type control system AKA the Intelligence Power controls the World of Conspiracy. This is good stuff -- this is exactly how Mama Cass wants the world of conspiracies organized.

For The Win: Fintan Dunne called the Sunstein approach years ago!

My favorite all-in-one shotgun approach comes from Fintan Dunne of BreakForNews.com: BreakForNews.com : The CIA's Internet Fakes


The CIA Fakes is a catchphrase term to describe a group which includes:

-- Covert Operatives of the CIA, NSA and DIA; of the U.S. Corporate/Military Industrial Complex; of the intelligence services of U.K. Spain, France Holland, Germany, and Russia.
-- Political Agents working within the Democratic Party, Republican Party, Democratic Black Caucus, Green Party, and Patriot Movement.
--
Politicians in the U.S., U.K. Spain, France, Germany and Russia --who pose as 9/11 skeptics.
-- Media, including
Mainstream, Alternative Media and Internet broadcasting media who either front for, cooperate with, or are directly employed by intelligence services mentioned above.

The primary objectives of the CIA FAKES are:

-- To leverage the Fakes into position as the leadership/spokespersons
    for the 9/11 skeptics movement.
-- To splinter and divide that movement.
-- To promote lame, tame and/or booby-trapped questions about 9/11.
-- To be sufficiently over-the-top as to prevent the 9/11 issue getting
    any traction in the media or left-wing.
-- To ensure that the movement would not have a politically-active
    leadership capable of turning it into an effective political lobby campaign.

The questions about 9/11 were bound to be asked, the important
aspect for the perpetrators was and is ...by whom?

Bravo, Mr. Dunne, Bravo. You scored big on this one... A general roundup to be found @ The Next Level :: View topic - Uncovered: The Rat's Nest of 9/11 of effective gatekeepers -- and its true that his set of people, in aggregate, has the 9/11 conspiracy topic cornered and setup a certain way.
More along these lines: 9/11, 7/7 & the War on Freedom :: View topic - The Planned Demolition of Alex Jones, The COUP had foreknowledge of 9-11 (YES!), the criticism about Sibel Edmonds, Scheuer, Ray McGovern, etc: WagNews: Our Good Friends in the CIA - NOT !, (i.e "The alternative media is ridden with ex-FBI, ex-CIA, ex-NSA, ex-MI5 people who are on "our side". It's all total BS.") WagNews: Alex Jones, Hopsicker & the 9/11 CIA Fakes -Audio.

This one is suddenly salient: WagNews: Ellsberg, Sibel Edmonds & The Secret Team:

WHAT FLAVOR CONSPIRACY YOU WANT?

One big corner of that overall 9/11 picture is formed by four disparate-seeming individuals: a veteran whistleblower, an attractive novice whistleblower, a campaigning journalist and a reputed lingerie model; jigsaw peices called Ellsberg, Edmonds, Hopsicker and Keller. Ellsberg supports Edmonds, confirmed by Hopsicker --backed by eyewitness accounts from Keller. But they're all telling different flavors of the same story.

To specify which story that is, let's take a look at the popular tales of 9/11. The notorious main division is between LIHOP and MIHOP. But it's much more detailed than that. Explanations come in a full range of flavors --starting with the official story:

A. Official story:
CIA/FBI were incompetent; Bush and/or Clinton were complacent.
B. Official Lame Conspiracy:
CIA/FBI were incompetent; Bush/Cheney maybe let it happen; Israelis Knew.
C. Official LIHOP Conspiracy:
CIA/FBI were compromised; Bush/Cheney did let it happen; Israelis Helped.
D. Official LIHOP Wild Conspiracy:
CIA/FBI compromised; Bush/Cheney/Neocons let it happen; Israelis Did It.
E. Official LIHOP Tinfoil Conspiracy:
Israelis/Neocons/Bush/Cheney Did It; CIA/FBI looked the other way.
F. Official MIHOP 'Serious' Conspiracy:
Israelis/Neocons/CIA/FBI/Bush/Cheney/Military-Industrial-Complex Did It.
G. Official Loony Conspiracies:
Rothschilds and/or Rockefellers and/or CFR and/or Bildebergers did it.
Globalists who want to run everything in a World Government did it.
Jews and Jewish bankers -who already run everything- did it.
Satanists, Opus Dei or Reptilians did it.
It's a terrific variety of theories.
It plays out something like this:
  • The mainstream media push version A; hint at B; sneer at G.
  • The controlled right/intellectual media pushes version B.
  • The controlled left/intellectual media pushes version C.
  • The 'moderate' Fake internet sites push versions C and D.
  • The 'softcore' Fake internet sites push versions D and E.
  • The 'independent' Fake internet sites push version F.
  • The 'loony' Fake interent sites push variations of version G.
But every single one, from A to G are OFFICIAL versions, sanctioned and promoted by the 9/11 intelligence coverup operation and their CIA Fakes network. They have a flavor for every market.

The creation of this multiplicity of explanations is a core element of the coverup. Left to their own devices, people on the Internet might have figured out the truth themselves. But with this circus in action, there is always plenty of distraction and lots of division in opinion.

The intelligence coverup is not trying to stop 9/11 conspiracy theories on the internet. It's creating them. Then playing off supporters of the different theories against each other. That's a classic Cointelpro-style tactic.

***********More from good Ol L Fletcher Prouty on CIA / Ellsberg limited hangout type conspiracy control!
Let's get to the brand-new material from the White House info czar, it's wild!!...... Conspiracy Theories by Cass Sunstein & Adrian Vermeule:

Our main though far from exclusive focus – our running example – involves

conspiracy theories relating to terrorism, especially theories that arise from and post-date

the 9/11 attacks. These theories exist within the United States and, even more virulently,

in foreign countries, especially Muslim countries. The existence of both domestic and

foreign conspiracy theories, we suggest, is no trivial matter, posing real risks to the

government’s antiterrorism policies, whatever the latter may be. Terrorism-related

theories are thus a crucial testing ground for the significance, causes, and policy

implications of widespread conspiracy theorizing. As we shall see, an understanding of

conspiracy theories has broad implications for the spread of information and beliefs;

many erroneous judgments are a product of the same forces that produce conspiracy

theories, and if we are able to see how to counteract such theories, we will have some

clues about how to correct widespread errors more generally.

Part I explores some definitional issues and lays out some of the mechanisms that

produce conspiracy theories and theorists. We begin by discussing different

understandings of the nature of conspiracy theories and different accounts of the kinds of

errors made by those who hold them. Our primary claim is that conspiracy theories

typically stem not from irrationality or mental illness of any kind but from a “crippled

epistemology,” in the form of a sharply limited number of (relevant) informational

sources. Those who hold conspiracy theories do so because of what they read and hear. In

that sense, acceptance of such theories is not irrational from the standpoint of those who

adhere to them. There is a close connection, we suggest, between our claim on this count

and the empirical association between terrorist behavior and an absence of civil rights

and civil liberties.10 When civil rights and civil liberties are absent, people lack multiple

information sources, and they are more likely to accept conspiracy theories.

Part II discusses government responses and legal issues, in light of the discussion

in Part I. We address several dilemmas of governmental response to conspiracy theories,

such as the question whether it is better to rebut such theories, at the risk of legitimating

them, or to ignore them, at the risk of leaving them unrebutted. Conspiracy theories turn

out to be especially hard to undermine or dislodge; they have a self-sealing quality,

rendering them particularly immune to challenge. We suggest several policy responses

that can dampen the supply of conspiracy theorizing, in part by introducing diverse

viewpoints and new factual assumptions into the hard-core groups that produce such

theories. Our principal claim here involves the potential value of cognitive infiltration of

extremist groups, designed to introduce informational diversity into such groups and to

expose indefensible conspiracy theories as such.

Tell me this, Sunstein: how does all that drug money get through the Federal Reserve System? Everyone has been so eager to confront that 'conspiracy theory,' haven't they?

Blah blah blah... let's get to the good stuff: [Below the fold - favorite chunks of much of the crazy essay]

New TSA leak PDF; False Flag ops for Detroit Christmas bombing; Kurt Haskell on Indian "they won't admit exists" on Detroit flight; Obama executive order promotes INTERPOL to diplomatic immunity & "inviolable archives" but why?? Europeans v Bankers?

An interesting confluence of events as Obama suddenly grants INTERPOL diplomatic immunity of sorts, while an apparent airport false flag operation or at least 'shady biz as usual' unravels pretty quickly. Good times in the shadow state for 2010.

We found some snippets on the case from two noted journalists in the shadowsphere, UK's Christopher Story & DC's Wayne Madsen. All too frequently Mr Madsen and Mr Story do not seem to report believable things, however in this case they are first on the scenes with some concrete bits to consider, and obviously in the Detroit bombing case as well as the INTERPOL thing a lot of stuff cannot be easily accounted for....

There's certainly a dead silence around the allegations from these guys more often than not, striking at times.

DETROIT UNDYBOMB SITUATION LIKELY FAKED -- WITNESS TO SHADY BIZ, INDIA AND CIA ETC ETC

Flight 253 passenger: Sharp-dressed man aided terror suspect Umar Farouk Abdul Mutallab onto plane without passport (MLive.com exclusive) | Detroit News - - MLive.com

Hat tip to Sheena Harrison for unraveling another bit of the establishment narrative!

More: Haskell Family Blog: Lori's Liberal Realm: Latest Story--By Kurt Haskell & Infowars: False Flag Event in Detroit a Pretext to Invade Yemen

Commenter says he was aboard NWA Flight 253, saw suspected terrorist board the plane | Detroit News - - MLive.com

   "I was on this flight today and am thankful to be alive. My wife and I were returning from an African safari and had this connecting flight through Amsterdam. I sat in row 27, which was 7 rows behind the terrorist. I got to see the whole thing take place and it was very scary. Thanks to a few quick acting people I am still alive today.

   For those of you talking about airline security in this thread, I was next to the terrorist when he checked in at the Amsterdam airport early on Christmas. My wife and I were playing cards directly in front of the check in counter. This is what I saw (and I relayed this to the FBI when we were held in customs):

   An Indian man in a nicely dressed suit around age 50 approached the check in counter with the terrorist and said "This man needs to get on this flight and he has no passport." The two of them were an odd pair as the terrorist is a short, black man that looked like he was very poor and looks around age 17(Although I think he is 23 he doesn't look it). It did not cross my mind that they were terrorists, only that the two looked weird together. The ticket taker said "you can't board without a passport". The Indian man then replied, "He is from Sudan, we do this all the time". I can only take from this to mean that it is difficult to get passports from Sudan and this was some sort of sympathy ploy. The ticket taker then said "You will have to talk to my manager", and sent the two down a hallway. I never saw the Indian man again as he wasn't on the flight. It was also weird that the terrorist never said a word in this exchange. Anyway, somehow, the terrorist still made it onto the plane. I am not sure if it was a bribe or just sympathy from the security manager.

   FBI also arrested a different Indian man while we were held in customs after a bomb sniffing dog detected a bomb in his carry on bag and he was searched after we landed. This was later confirmed while we were in customs when an FBI agent said to us "You are being moved to another area because this area is not safe. Read between the lines. Some of you saw what just happened."(The arrest of the other Indian man). I am not sure why this hasn't made it into any news story, but I stood about 15-20 feet away from the other Indian man when he was cuffed and arrested after his search.

Flight 253 passenger Kurt Haskell: 'I was visited by the FBI' | Detroit News - - MLive.com

For the last five days I have been reporting my story of the so called "sharp dressed man." For those of you who haven't read my account, it involves a sharp dressed "Indian man" attempting to talk a ticket agent into letting a supposed "Sudanese refugee" (The terrorist) onto flight 253 without a passport. I have never had any idea how it played out except to note that the so called "Sudanese reefugee" later boarded my flight and attempted to blow it up and kill me. At no time did my story involve, or even find important whether the terrorist actually had a passport. The importance of my story was and always will be, the attempt with an accomplice (apparently succesful) of a terrorist with all sorts of prior terrorist warning signs to skirt the normal passport boarding procedures in Amsterdam. By the way, Amsterdam security did come out the other day and admit that the terrorist did not have to "Go through normal passport checking procedures".

   Amsterdam security, please define to the American public "Normal passport boarding procedures".

   You see the FBI would have the American public believe that what was important was whether the terrorist in fact had a passport.

   Seriously think about this people. You have a suicide bomber who had recently been to Yemen to but a bomb, whose father had reported him as a terrorist, who supposedly was on some kind of U.S. terror watchlist, and most likely knew the U.S. was aware of these red flags. Yet, he didn't go through "Normal passport checking procedures." What does that mean? Maybe that he flashed a passport to some sort of sympathetic security manager in a backroom to avoid a closer look at the terrorist's "red flags"? What is important is that the terrorist avoided using normal passport checking procedures (apparently successfully) in order to avoid a closer look into his red flags. Who cares if he had a passport. The important thing is that he didn't want to show it and somehow avoided a closer inspection and "normal passport checking procedures." Each passport comes with a bar code on it that can be scanned to provide a wealth of information about the individual. I would bet that the passport checking procedures for the terrorist did not include a bar code scan of his passport (which could have revealed damning information about the terrorist).

   Please note that there is a very easy way to verify the veracity of my prior "sharp dressed man" account. Dutch police have admitted that they have reviewed the video of the "sharp dressed man" that I referenced. Note that it has not been released anywhere, You see, if my eye witness account is false, it could easily be proven by releasing the video. However, the proof of my eyewitness account would also be verified if I am telling the truth and I am. There is a reason we have only heard of the video and not seen it. dutch authorities, "RELEASE THE VIDEO!" This is the most important video in 8 years and may be all of two minutes long. Show the entire video and "DO NOT EDIT IT"! The American public deserves its own chance to attempt to identify the "sharp dressed man". I have no doubt that if the video indicated that my account was wrong, that the video would have already swept over the entire world wide web.

   Instead of the video, we get a statment that the video has been viewed and that the terrorist had a passport. Each of these statements made by the FBI is a self serving play on semantics and each misses the importance of my prior "sharp dressed man" account. The importance being that the man "Tried to board the plane with an accomplice and without a passort". The other significance is that only the airport security video can verify my eyewitness account and that it is not being released.

   Who has the agenda here and who doesn't? Think about that for a minute.

Below the Interpol part, more about possible false flag setup via CIA/Mossad/India's RAW agency from Wayne Madsen.

EX-SECRET SERVICE OFFICERS CONTROL TSA MANAGEMENT, THE GANG O PREZ DETAIL DUDES

I heard the TSA top managers were basically the Secret Service guys from the last three administrations - specifically the cool cats from the presidential security detail within SS. What a great idea.... The Secret Service keeps a low profile but really it's now a big slice of the Department of Homeland Security power structure.


OBAMA EXECUTIVE ORDER 13524 == INTERPOL COMING FOR THE BANKERS HAHAHA?!?!!!????

   AMENDING EXECUTIVE ORDER 12425 DESIGNATING INTERPOL
AS A PUBLIC INTERNATIONAL ORGANIZATION ENTITLED TO
  ENJOY CERTAIN PRIVILEGES, EXEMPTIONS, AND IMMUNITIES

   By the authority vested in me as President by the Constitution and the laws of the United States of America, including section 1 of the International Organizations Immunities Act (22 U.S.C. 288), and in order to extend the appropriate privileges, exemptions, and immunities to the International Criminal Police Organization (INTERPOL), it is hereby ordered that Executive Order 12425 of June 16, 1983, as amended, is further amended by deleting from the first sentence the words "except those provided by Section 2(c), Section 3, Section 4, Section 5, and Section 6 of that Act" and the semicolon that immediately precedes them.

The funny one is angry bloggers who suspect the World Court via INTERPOL is coming after America for Bush-era war crimes of awesomeness: Hot Air » Did Obama exempt Interpol from same legal constraints as American law-enforcement? More: ThreatsWatch.Org: PrincipalAnalysis: Wither Sovereignty. YouTube - Alex Jones Xmas video alert. More: Interpol Under Siege by Uninformed Bloggers | UN Dispatch. Why make Interpol immune from American law? Handy: Analysis Of The Obama Interpol Order « Dprogram.net. Hm? Not News: Obama EO Removes Restrictions on INTERPOL | NewsBusters. LiveLeak.com - Obama issues executive order exempting INTERPOL from the restraints of the Constitution and American law while operating in the U.S.

The interesting version of INTERPOL is @ worldreports.org by UK writer/publisher Christopher Story. Read this one for a good time: News - OFFICIAL: MONEY SABOTEURS = ECONOMIC TERRORISTS.

The worries about Obama appears to be a diversion because INTERPOL is actually joining with the DOJ to crush the criminal banker syndicate, according to Mr Story, who tells of a giant lien upon the US Treasury has been activated by European and Chinese governments -- and mysterious planeloads of foreign agents arrived in December. Story's been talking about this for a while, making Obama's executive order a striking confirmation 'something is happening here.'

Mr Story 2009 finale, take it for what you will:

POLICY CHANGE AT THE U.S. DEPARTMENT OF JUSTICE:

ALL U.S. FINANCIAL SUBVERSIVES NOW TREATED AS ECONOMIC TERRORISTS

We can now reveal, on the basis of impeccable authority divulged to us on 26th December 2009 from ‘inside the US structures’, that the US Department of Justice within the Executive Branch has implemented a fundamental POLICY CHANGE and has determined, within the past three weeks or less, and against the background of the calamity surrounding the Lien in the immense sum of $47 trillion activated on about 6th December and imposed by the sovereign Lien Holders – the Chinese parties and the British Monarchical Power – as follows:

• ALL individuals and entities within the United States' jurisdiction that have participated in the stealing, diversion and conversion of funds belonging to others, INCLUDING past and present officials. both elected and appointed, within the US Government and its structures, WILL BE INVESTIGATED AND PROSECUTED FOR ECONOMIC TERRORISM perpetrated against the United States and the American people (and the Rest of the World). Specifically:

• ANYONE, whether officials in, or formerly in Government, whether CEOs of financial institutions or lower-ranking bankers, partners in ‘involved’ US law firms, intermediaries and US intelligence operatives and others who have been engaged in obstructing the Settlements process by ANY MEANS WHATSOEVER AND AT ANY TIME IN THE PAST, and who have, by their actions or by their inactions, contributed to the DELAY, are now being treated as ECONOMIC TERRORISTS.

........ • This POLICY CHANGE is a direct consequence of the situation arising from the implementation of the Lien and the drastic enforcement measures being taken inside the United States by the massed international cadres and ‘men in suits’ referenced in recent reports and below.

• President Obama’s Executive Order Amending Executive Order 12425 dated 16th December and publicised by the Office of the Press Secretary, at the White House, on 17th December, to ‘extend the appropriate privileges, exemptions, and immunities to the International Criminal Police Organization (INTERPOL)’ is associated with this POLICY CHANGE at the Justice Department.

CONTINUED RECKLESSLY CRIMINAL FINANCE INTENTIONS

Hence, the criminal engineers behind this scandalous state of affairs have been frenetically trying to cobble together various alternative money trading mechanisms, together with their ‘necessary’ associated covers which are intended to provide false legitimacy – in the expectation that at least one of these will ‘come good’ and won’t be aborted and/or ‘shot down’ by nasty observers such as ourselves who are on the lookout for the next wave of financial corruption.

The reality of these successive ongoing attempts to construct clandestine transnational trading operations behind variegated covers is evidence of the continuing criminal intentions of those concerned, and of the fact that US Law Enforcement has hitherto disgracefully and weakly allowed these organised criminal financial scams to proliferate, discrediting itself in the process.

In this connection, the representatives of foreign creditor countries and their specialist staffers, intelligence personnel, bankers, IT specialists and enforcement personnel, assisted by the eighth planeload of heavily armed INTERPOL officers, are concerned explicitly with requiring performance under the terms of the Writ of Enforcement and the Lien held by the Chinese parties and the British Monarchical Power in the sum of $47 trillion, exercised against the US Treasury and de facto the Federal Reserve on or about 6th December 2009.

OTHER RECENT DEVELOPMENTS: BACK IN WASHINGTON, D.C.

Back in Washington, President Obama’s widely cited Executive Order Amending Executive Order 12425 which extended ‘the appropriate privileges, exemptions and immunities to the International Criminal Police Organization (INTERPOL)’ promulgated on 17th December 2009, revealed the stark reality that the Chinese and British Monarchical Power Lien Holders were continuing to force the pace – in collaboration here with President Obama who has at times appeared to be out of his depth and has shown some evidence of flip-flopping between the international community, and the harsh pressures placed on him by the arrogant appointees who have continued to defy the Lien Holders (and the President), such as Leon Panetta, the Director of Central Intelligence.

• However that phase is now almost certainly at an end, given not least the very open promulgation of this Executive Order by the White House Press Office.

Promulgation of this Executive Order triggered the predictable knee-jerk responses from those who have not understood what is going on, and who have failed to take on board that the Lien Holders and their servants take precedence over the highest office-holders in the United States, including the President, all of whom, with their predecessors, have been, and remain engaged in criminal conduct which the World Court has condemned. The perception that this represents a setback for the United States is nonsense in the prevailing circumstances – which entail the greatest crisis that the Republic has ever faced, despite it being successfully hidden from the people with the assistance of the co-conspiring so-called ‘mainstream’ press.

‘BRUTAL HORIZONTALISATIONS’ REPORTED FROM EUROPE AND THE UNITED STATES

Various anecdotal reports were received after we posted on 17th December, indicating that heavy operations to procure the necessary resolution were continuing. On 21st December 2009, we had established that an unspecified number of people (whether bankers, trustees, intermediaries or operatives, was not stated) had been ‘taken out’ over the weekend of 19th-20th December on both sides of the Atlantic and, in the words of informants, ‘brutally horizontalised’.

‘FOREIGN SUITS’ CONDUCTING AUDITS INSIDE THE FED

On 18th December it was reported to us that a female accountant based in Dallas who had been working as a consultant for the Federal Reserve Board conducting internal audits, was called back from Texas to Washington, DC, where she was bluntly informed that there was no longer any need for her services, and that no funds were available any longer to pay her for consultancy work.

By way of explanation, Federal Reserve officials told her that there were ‘suits in town’ who were ‘doing the books’ (8).

This was a reference to the audit that has been going on since the massive force of international enforcement, audit and related personnel descended on Washington aboard the seven aircraft on 2nd December. The consultant was also openly informed by Federal Reserve officials, to her face, that ‘Geithner is history’ – which is consistent with the fact that Geithner, as we have reported, is under a form of house arrest and has had a monitor attached to him given his resistance to his obligations under the World Court Writ of Enforcement and the requirements of the Lien Holders.

UNREPORTED INTERPOL SHOWDOWN AT REAGAN NATIONAL AIRPORT

On 22nd December, given the snowstorm, Reagan National Airport serving Washington DC, was widely described as ‘a mess’. But in the late afternoon of 21st December, a certain woman walked to catch a flight that had been rescheduled – only to discover that, along with hundreds of others, she was prevented from proceeding through security.

On the contrary, FBI personnel, Homeland Security operatives and ‘top cops in suits who looked foreign’, with dogs, had stopped the lines going through security for several hours. This situation continued from about 4:30 pm to 7:00pm.

The lady reporting this situation noticed that it was the ‘top cops in suits who were operationally in charge’, and that they were looking for someone. The person concerned eventually made her long delayed flight back home for Christmas, but has repeatedly queried why these events were not being reported, and have still not been reported (9) .

Well that is a fascinating tale and a lot more to it.

CRYPTOME: YET ANOTHER LEAKED TSA DOC (AN ADMINISTRATIVE APPEAL)

Who doesn't enjoy a leaked TSA PDF? This one features the intrepid efforts of Stanley J Miller, Appellant vs Department of Homeland Security in the Nether World Of Obscure Administrative Law Judges... Miller wins a dramatic appeal about [CENSORED] and [REDACTED] which was all a [GO AWAY]. This just broke over the holiday!

Cryptome: TSA Sensitive Security Information Unredacted 2

More: For fired air marshal, Christmas attack was terribly familiar - OC Watchdog : The Orange County Register

Last year: Email Goof Exposes Whistleblower Problems at FAMS

MORE ON DETROIT: MADSEN BITS ON DETROIT BOMBING, ICTS & CIA/MOSSAD/RAW JUST FOR FUN
--below teh fold--

NZ Cellphone racket! LOL This article officially censored in New Zealand: Revealed: Vodafone's secret deal with 2degrees

In a stunning surprise, apparently the New Zealand mobile phone system is a complete racket, wherein grumpy ministers set the pay rate and thereby influence the balance of corporate power. Or something.

In any case, New Zealand's version of the Man officially censored this article about the stupid hustle upon which people's cellphone billing rests. It's interesting because it just shows how arbitrary determinations are used to control the market, particularly telecommunications.

Plus, this sort of censorship is exactly the thing that is lame about British Commonwealth nations and law. The truth should be an absolute defence against libel or in this case arbitrary censorship.

The rights of the Press is inscribed on the First Amendment around here partly because the Brits love to BS about stuff like this! Everyone knows it's a hustle, but they get extra powers to gag people. Saudi prince type guys abuse British press law all the damn time and get away with it.

They need to erase this article because there is no free market cell phone system in New Zealand. Boooo hoooo....

WIKILEAKS! Censored story from the National Business Review of New Zealand on Vodafone interconnection deal, 5 Aug 2009
"This is the text to a National Business Review (nbr.co.nz) article written by Chris Keall, detailing a secret interconnection deal ordered by former Labour Minister of Communications, David Cunliffe, between Vodafone New Zealand and mobile operator 2 Degrees.
The file contains information that directly affects public policy (telecommunications regulation). However, the regulator, the New Zealand Commerce Commission, has used its powers under section 100 of the Commerce Act to suppress the story, and have ordered New Zealand media not to publish any details of the deal. NBR was forced to take down the story as a result of this state censorship.
The New Zealand public that needs to know how telecommunications industry regulation is done."

Revealed: Vodafone’s secret deal with 2degrees
Wednesday August 5 2009 - 03:02pm

In November 2008, in the dying days of the last Labour government, communications and IT minister was determined to clear the path for 2degrees’ launch.

A source says that at the climax of discussions, a fed up Mr Cunliffe gave Vodafone just more hour to reach a mobile termination rate agreement with 2degrees - or face a fresh investigation on the issue from the Commerce Commission (mobile termination rates - MTR - are what one telco pays another when a call terminates - is received - on another’s network).

The two mobile operators duly stitched up an MTR agreement, which has remained confidential ever since - to the infuriation of Vodafone, which has maintained that 2degrees has complaining loudly about MTR, while in reality knowing it was in line for sweetheart rates.

The source says that at the time, “2degrees thought the deal was the best thing since sliced bread”. Yet, to Cunliffe’s dismay, the new carrier failed to launch by the end of the year. And when National came to power, 2degrees saw the chance to push its MTR luck further.

The Commerce Commission - which under the new government is investigating MTR a third time, regardless of Mr Cunliffe’s promise (again, to Vodafone’s chagrin) - has told NBR it has no issue with the deal being made public.

However, 2degrees said no dice. “We respect the confidentiality of our agreements,” said head of corporate communications Bryony Hilless.
Terms revealed

Now, NBR has obtained the terms of the secret MTR deal.

There are three key elements.

One, Vodafone gives 2degrees a “new entrant” discount of around 33%.
For mobile-to-mobile calls, Vodafone charges other telcos 15 cents a minute, but 2degrees will only have to pay 10.75 cents per minute.
For txt, Vodafone’s MTR is 9.13 cents per message. 2degrees is charged 6.25 cents.

The second element is asymmetry: 2degrees will pay 10.75 cents a minute. But when as call terminates on Vodafone’s network, it will pay 2degrees the full whack: 15 cents. The same applies to txt, with Vodafone paying 146% of 2degrees’ rate.

The third is that MTR is charged by the second, from the first second - which, says one source, makes it pretty rich that 2degrees charges by the minute.

Vodafone wants the Commerce Commission - which has so far based its MTR sums on Vodafone’s headline rate - to take its 2degrees deal into account when weighing whether market termination rates are competitive.

The commission recently recommended that MTR be reduced to 7.2 cents per minute immediately for voice calls, and 3.8 cents per txt, with a series of further cuts through to 2015. A review and consultation process is now underway, with communications minister Steven Joyce likely to make a decision on the matter in the New Year.
Many independent observers, including Tuanz, representing 500 corporate customers, have strongly backed the commission’s call for voice MTR of 7.5 cents or below.
For its part, Telecom has challenged all carriers to agree to a voice MTR of 7 cents a minute - though by 2015, rather than immediately as the commission is angling.

Syndicate content