Disclaimer: This site is *not* affiliated with AIPAC, Ahmed Chalabi, K Street, ClearChannel, or Urban Moving Systems of Weehawken, NJ. In case you were curious. Full disclosure: I have a "long Apple position" and therefore I have an Apple bias.
The war on drugs continues to form a major pillar of state violence in America. I am glad Massachusetts is suspending cannabis prohibition less than two hours from now! But it is bittersweet.
I think of all the families ripped apart by sanctimonious, thuggish government agents, attorneys and judges because they believe, or at least pretend, that modes of consciousness tilted by chemicals are more of a danger than rupturing the social fabric with their program that was intended as a racist spear from the very beginning.
I think of all their coverups and lies, their sealed transcripts, their paid informants, their aircraft shell companies, hapless peripheral people socked with 20+ year sentences. The kids raised in rough streets, parents stripped by the State, school to prison pipeline, CCA prison profits.
I think of all the people addicted to heroin and crack cocaine transported by CIA-aligned networks since Dulles & OSS helped Chennault's Flying Tigers protect Chiang Kai-Shek's geopolitical interests. Heroin is still cheap as hell in this region, and banks are always able to smoothly continue money flows without netting any criminal charges.
I think of Gary Webb and the San Jose Mercury News, which protected him and then folded under "fake news" accusations from agency-friendly organs like the Washington Post, driving him ultimately to suicide, for daring to expose Iran-Contra. (In 2012 when we exposed the DRE program was drugging people in Minneapolis, of course only the "fake news" outlets would touch the story for weeks.)
And tonight I think of Philando Castile, now slandered in death by sleazy attorneys who blame what else, The Marijuanas, for somehow inciting Falcon Heights PD to kill him.
And I think of the slimy DoJ coverup specialists, who will paper over all of this for the benefit of the law enforcement and intelligence "communities" [sic], as they have for almost a century. They will never find the money, they will never hit the big guys. They are there to make sure that addiction is converted into cash, dropped into Wall Street. And not a damn thing more. They are all hiding, sniveling cowards, they cannot face real questions because they have no answers. The takedown of this bitter monster must continue.
If secret federal aviation is the Big Lebowski, Bristow is the rug that really ties the room together.
It's been thrilling to watch one of my favorite topics, aviation in covert operations, hit the bigtime over the last few news cycles.A few tweets about suspicious plane hovering over Baltimore 'disturbances' registered to a ghostly "NG Research" at a Bristow, Virginia PO Box cued the story. The FBI conceding to Washington Post that it was their flight set the stage for this. These stories have quietly been leaching out for years. As far back as 2003 (or 2006 in WIRED) references to small aircraft doing domestic surveillance have been popping up. After the Boston Marathon bombing, a small aircraft was traced to the same Bristow VA cluster. Today the story hit turbo with a big AP story, FBI behind mysterious surveillance aircraft over US cities, but there are lots more to find because the AP didn't really go outside of Bristow. You'll find plenty of N Numbers to snoop on below - and cool new tracking techniques too!! Quote of the year?
The FBI asked the AP not to disclose the names of the fake companies it uncovered, saying that would saddle taxpayers with the expense of creating new cover companies to shield the government's involvement, and could endanger the planes and integrity of the surveillance missions. The AP declined the FBI's request because the companies' names — as well as common addresses linked to the Justice Department — are listed on public documents and in government databases.
In my own scoping in the last week or so it appears that these shell company registration were mostly set up around 2010 or 2011, making this an Obama operation through and through. I apologize for not tipping yall more quickly to this impending development but I have been too busy!
This story shows that secret airlines are becoming an obsolete method for the [deep] state, because with the Internet and planespotters it becomes possible to observe and end-run around the secrecy of the networks, as the last big wave of awareness around secret detainee flights in the Bush years really revealed (though mostly in Eurasia, not North America). (2007 Cryptome Story and Category:Alleged CIA pilots - SourceWatch)
.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.
Years ago I asked a staff research person at the Minnesota Department of Transportation if there was something weird about how FAA registration works, if it is designed to hide ownership, and he assured me it had been that way since the FAA had been set up - and went on to tell me that when he was much younger, in the late 1980s he had traced a disappeared pilot to Texas, then found that someone had pulled the flight plans from the FAA file. This shadowy story was literally the first thing I heard from a government employee when I went asking, confirming my long-running theory that everyone has some kind of story that touches on the corrupt secret government or deep state.
Naturally the FBI/DOJ also has its own similar shells. Due to incredible laziness the feds registered tons of them with the same name pattern at the same locale in Bristow VA. Here, have some original art I made on May 25, well before the Star Tribune and Associated Press picked up this story!
Several independent parties put these pieces together and triggered the massive news snowball today. Probably the first to catch a large section of it was john wiseman (@lemonodor), who figured out good methods for tracing the transmitters and radio traffic. My friend Sam Richards (@MinneapoliSam) was the first as far as I know to put together the larger data set about the Bristow VA node, after getting a tip about a sketchy spy flight over Minneapolis, although Wiseman verifiably came up with a whole bunch of the shells in early May. Wiseman explains his narrative in new post: Tracking FBI aerial surveillance (with images, tweets) · jjwiseman · Storify
Below is a listing of 100 aircraft registered to shell companies that do not exist. The US Department of Justice can claim plausible deniability for owning and operating these aircraft however that is a flimsy defense. At the time of posting, a number of these aircraft may be airborne over American cities, equipped with surveillance, stingray, or other hardware. FOIAs are being drafted and will be submitted so it is only a matter of time before a brighter light is shined upon these secretive operations.
For examples of the flight patterns conducted by many of these aircraft within the last few days, check:
Here's an article by the ACLU highlighting why these operations are of concern https://www.aclu.org/blog/ohio-aerial-surveillance-system-moving-forward... "ARGUS, the high-flying drone technology capable of capturing super-high-definition video of a 15-square mile area and automatically tracking all moving vehicles and people within that area. I pointed out that this makes possible our nightmare scenario for drones: wide-area mass surveillance and location tracking of entire cities and towns."
Now the FBI is an onerous position where they have to turn over, de-register or re-register all of these planes, somehow reconciling rebuilding the secrecy of the fleet exposed above with the FAA's registration system, and the hordes of planespotters out there now reinforced by tons of interested activists cued into the national scope of this operation. Good luck Feds!
SOURCE: View image: image5. This plane has been flagged as using the JENA code which seems to be the usual code until probably around now. Images scaled down, resize to see more. N959JT is of course registered in Bristow VA. Bonus points awarded for pink toenails in spotting this secret aircraft machinery which seems to resemble the gear spotted on the recent Minneapolis plane.
I live in Phoenix and my coworker was telling me she's been noticing this plane circling around their neighborhood the past 12 days. They started tracking the planes on Flightradar24 and she sent me these screenshots of some of their flight paths: http://postimg.org/image/tpdhpd789/http://postimg.org/image/o2h4rw4pl/http://postimg.org/image/uuc58hj2x/ She even had a pilot friend go down to the airport that they've been flying out of and do some snooping. He found took this photo of the camera equipment mounted to the bottom of the plane: http://postimg.org/image/hm861sw61/ She said that it's always the same 3 tail fin numbers which take turns doing the same flight path. They start at daybreak and only stop late in the night.
Update: Here's another pic my coworker got of one of the planes parked at the Deer Valley Airport in Phoenix. You can see the camera equipment on the side: http://postimg.org/image/oj5bwlcjn/
She also said over the past couple days all the tail fin numbers changed on Flightradar24 and they are now all showing up as some variation of "JENA". Screenshot: http://postimg.org/image/n3ahqjgql/
Finally it is worth noting it has been difficult but not impossible to get credit to independent journalists for blowing up this story. I appreciate Bob Collins at Minnesota Public Radio's Newscut for engaging on Twitter when we pressed him on the issue of crediting the story, and including references to Sam's original medium.com story, while the Star Tribune and AP did not credit Sam at all. (Although the Strib has been communicative recently and I have some hope they will circle back within a few days).
Additionally I suspect "CHAPPARRAL AIR GROUP" may be another front, they got a craft from the DEA: N540DB. seeHelicopter Flying Above Claycord on Thursday Afternoon —claycord CLAYCORD.com: "A google search of the tail ID can help you confirm this also, where you will find no shortage of photographs of this specific aircraft operating out of Concord and San Jose. Note that the federal government recently (2011) transferred registration of 15 Federal law enforcement helicopters out of the names of the Department of Justice, DEA, to an entity in Texas called the Chaparral Air Group."
Before the story broke we had a bunch of diggings, now it's time to share! MORE RELATED RAW DATA:
NOTE there are some false positives and general "NOISE" in here, please proceed with discernment!!!
In broader context, the Obama administration has continuted to expand the use of intelligence tracking, including fusion centers and electronic intelligence, to keep rebellious groups under control, as addressed here
On April 29, a Cessna 206H registered to National Aircraft Leasing Corporation circled overhead for hours at about 3,500 feet, flying repetitively over western Baltimore. On the nights of April 30, May 1 and May 2, another aircraft, a Cessna Model 182T registered to a company named NG Research in Bristow, Virginia, flew over the same areas at a similar low altitude.
Also on May 1 and May 2, an unidentified Cessna Citation V jet made similar nighttime flights, orbiting Baltimore at the relatively low altitudes (for a jet aircraft) of 6,400 and 9,400 feet, based on records from Flightradar24.
Kind of vague hit comes up for the google search on National Aircraft Leasing Corporation
Edit 3: After looking through the list of aircraft registered in Bristow, VA for a town of 15,000 there are 64 aircraft registered including one owned by the Department of Justice. All within the past decade most within the past 3 years. Most of them are owned by companies with 3 letters then what they do RKT Productions, PSL Surveying, KQM Aviation, LCB Leasing, NBY productions etc. They also all are operation 182t Cessna’s. All of the companies only have a PO Box in Bristow. Looks like an FBI airport.
The one tail number that the initial Washington Post article linked to is N39MY, which is a Cessna 182T registered to NG Research, PO Box 722 in Bristow, VA. That company's web presence is close to zero, basically below the noise floor.
If you google [po box bristow va] you find FAA records for a bunch of other oddly named companies that all have similarly close-to-zero web presence and addresses that are PO Boxes in Bristow: FVX Research, NBR Aviation, NBY Productions, OBR Leasing, OTV Leasing, PSL Surveys, PXW Services. They all seem to like Cessna 182Ts.
If you Google the tail numbers of aircraft registered to those companies, you start to find forum and mailing list posts (often at sites that tilt toward paranoid/conspiracy/right wing, but not always) with people discussing these specific tail numbers and linking them to the FBI. Some of the supposed evidence includes details of radio communications that people have heard, e.g. talking about "being on station" or using callsigns that start with JENNA, JENA or ROSS, which are supposedly used by the FBI. Other posts claim that DOJ/FBI surveillance aircraft often squawk 4414 or 4415 on their transponders.
I monitor aircraft in Los Angeles using an RTL-SDR dongle. I keep a database of almost every transponder ping I receive. You can see some more info, analysis and examples of stuff I've seen (U-2, AF1, AF2, EXEC-1F, E-6 "Doomsday" planes) at
I decided to check my database for planes that have squawked 4414/4415 or used one of the suspicious callsigns: I found 8 aircraft in the past 2 months, several of which exhibit suspicious behavior: Flying for hours at a time without going anywhere in particular (I don't have position information for them, but I know they're in the air and not leaving the LA area), flying almost every day for months at a time, squawking 4414 or 4415, and one that used a JENNA callsign. 2 of them are registered to companies with PO Boxes in Bristow, VA. Another is registered to AEROGRAPHICS INC. 10678 AVIATION LN, MANASSAS VIRGINIA, which googling shows has also been linked to the FBI/DOJ. Several others are registered to WORLDWIDE AIRCRAFT LEASING CORP and NATIONAL AIRCRAFT LEASING CORP in Delaware, similar to other suspected FBI front companies (e.g. Northwest Aircraft Leasing Corp. in Newark, Delaware).
(I call what I'm doing "persistent sousveillance": using historical sensor data to retroactively identify and track new subjects, it's just that my subjects are the government. One of the surprising things I've found is that all you need to do is look: the weird stuff jumps out right away, e.g. Cessnas registered to fake-sounding companies that loiter overhead for hours every day.)
It's a lot of circumstantial evidence, but at this point it doesn't seem far-fetched that I'm monitoring aircraft involved in persistent FBI aerial surveillance.
Edit: One other thing worth mentioning is that I was surprised at how many local news stories I turned up while googling these planes & companies that fit the template of "Citizens complain about mystery Cessna flying low, circling over their neighborhood".)
The FAA manages this program and NBAA no longer has any policy or administrative control over the FAA ASDI Block program. However, if you have general questions or concerns about the FAA process, contact NBAA's Operations Service Group firstname.lastname@example.org (202) 783-9250.
The FAA’s primary electronic mailbox for all aircraft blocking and unblocking requests and for related inquiries directed to the ASDI blocking program isASDIBlock@faa.gov.
102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JUNCTION, VA 24529-3110461AJ 18282225 RKT PR
ODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA 20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS PO BOX 502BRISTOW,VA 20136-0502912EX 18282231
OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632
N-Number Serial Number Name Address102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JU
NCTION, VA 24529-3110461AJ 18282225 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS
similarly there are some hits here. for entire listing in LOUDOUN county
PO BOX 502BRISTOW, VA 20136-0502912EX 18282231 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-063
Possible tech or similar
PERSISTENT REAL-TIME INTELLIGENCE OVER A WIDE AREA -- DAY & NIGHT
Here's another new piece of hard evidence showing how billionaire sex abusers get their own special treatment in America. One of the most dire problems facing the United States is the double-standard justice system.
If you're a greasy billionaire like Jeffrey Epstein, federal prosecutors (who ultimately report to your chums) will eventually bend over backwards to let you get away with running an international sex abuse ring, and even protect your co-conspirators from prosecution.
Epstein pled guilty to limited charges and was forced to spend at least a few hours a day in a Florida jail for several months (he could wander during the day), and then on "house arrest" to cruise around to his various international pads. The deal specifically protects his unnamed co-conspirators from prosecution.
For apparently the first time on the open interwebs, here is the full text of Epstein's non-prosecution agreement, republished on HongPong.com with permission of alt journalist Wayne Madsen at WayneMadsenReport.com:
An additional issue that Wayne cites in his paywalled article is that the timeline here casts shadows on both the Clinton and the Bush families, since both noxious dynasties had roles overseeing the federal prosecutors and accepting this chummy deal published above at different points in the timeline.
Freaky financier Jeffrey Epstein wants to keep negotiations for his shady nonprosecution deal with the feds under wraps.
In papers filed in Florida federal court, Epstein, 61, has asked for a protective order keeping all correspondence about his controversial deal with the feds under seal.
The feds agreed not to pursue charges against Epstein and four alleged co-conspirators in dozens of cases involving under-aged girls if he pleaded guilty to a single state felony case back in 2007 — but the deal was kept hidden from the victims at Epstein’s request, court papers say.
The billionaire perv pal of Prince Andrew pleaded guilty to soliciting sex from a minor in mid-2008. Four of Epstein’s alleged victims are challenging the nonprosecution agreement in court.
In a ruling Thursday, Judge Kenneth Marra said, “Public policy favors judicial records being open to the public,” and that Epstein has to submit additional filings “setting forth the extraordinary circumstances or particularized needs necessitating a seal in this case.” Dareh Gregorian
#OpDeathEaters & a history of political blackmail: I would like to call attention to the project spearheaded by Anonymous type cats called #OpDeathEaters (a reference to Voldemort's buddies in Harry Potter), which is a pretty quick-moving research project to expose multiple levels and nodes of what they describe as the global paedosadist network.
They are trying to get away from the term 'pedophile' which is actually preferred by child sex abusers because 'phile' means love, when in fact it's really child abuse. It started around November 2014.
An important dimension stressed by some of the articles below is that the power and depth of the pedosadist and child abuse networks has grown so deep that it has overrun the ability of honest elements of law enforcement to deal with, so to some extent Internet activists are trying to expose the networks and render difficult investigations into open-and-shut cases if possible, with the hopes of obtaining justice for victims and their families as well as preventing future abuse.
Intelligence Rabbit Hole Begins: Additionally Epstein's close confidante for many years, Ghislaine Maxwell (L), has also been tagged as a major player in the abuse ring. Adding an intelligence twist to the matter, Ghislaine's late father Robert Maxwell ( R ) is pretty widely known to have supported the Israeli Mossad secret intelligence service. With Epstein's island home apparently stuffed with hidden cameras, this suggests he was generating sexual blackmail material which could certainly prove handy to manipulate political figures.
This leads to a bunch of speculation such as JEFFREY EPSTEIN, MOSSAD AND 9 11 etc etc, with Florida airfields that were used by Mohammed Atta perhaps intersecting with this sordid tale prior to 2001. [I am not claiming that I support such a line of inquiry as the evidence isn't really there yet, but there are some overlapping data points]
That particular rabbit hole would take a long time to sort out, but shady rich people, aviation and weird covert ops certainly are a Florida tradition. The only thing missing is yet another Gulfstream owned by CIA shell company packed with cocaine or heroin.
A little over 51 years ago Albert Thomas, chair of congressional subcommittee for defense appropriations, winked at Lyndon Baines Johnson aboard Air Force One immediately after Pres. Kennedy was murdered in Dallas. [Thomas' underling Jack Valenti went on to run MPAA for many years.] Thomas went on to hand out billions for the Vietnam War.
51 years later the American public is still as infantilized by the national security state as ever. Tons of documents around the assassination are still classified for decades, setting the pattern for managing perceptions of 'deep state events' clearly intersecting with intelligence players like Iran-Contra & 9/11.
The surest sign that Watergate majordomo Howard Hunt's deathbed confession recording is accurate is how thoroughly mainstream media ignored it, while instead promoting discredited plagiarist shills like Gerald Posner. Hunt said that LBJ was at the "head of a long line of people waiting for some change in the executive branch" and had "an almost maniacal urge to become president," with Rolling Stone, Coast to Coast and the alt media among the very few to take this seriously.
Hunt said CIA's Cord Meyer led the task for LBJ, embittered because Cord's wife had been one of JFK's mistresses. He also ID'd David Atlee Phillips, "in Miami and elsewhere" referencing JM/WAVE CIA station, Watergate alumnus Frank Sturgis, "Operation 40" mercenary David Morales, all players within the nucleus related of intelligence operations diligently identified by researchers since 1963. "In short it was a very mobile experience" said the Watergate chieftain, "I was a benchwarmer on it."
Kennedy was no saint, but Dallas was a display intended to traumatize the American public into accepting that a brutal machine behind the scenes would now more openly, literally, call the shots, and as our country continues to spin along an ugly trajectory, achieving some kind of tangible political freedom from these forces of intelligence intrigue and social control has never been more necessary.
A tiny peek into a huge deal: the potential fracas between assorted would-be American military cyberwar commandoes and international (and domestic!) computer activists. This lower-level report (Unclassified//For Official Use Only) (U//FOUO) perhaps is more interesting for its "metadata" rather than thoroughly censored content. Below I also included some other domestic military operations documents below to draw a wider context than just this "cyberwar" stuff, as Ferguson has prompted Gov. Nixon in Missouri to activate the state militia, it's good to read up on what federal legal doctrine for "civil disturbances" is.
Such recipients: In order, it says it is from "DIRECTOR FBI" to:
DNI WASHINGTON DC - Director of National Intelligence. (Clapper at the time)
HQ AFOSI Andrews AFB Maryland - Air Force Office of Special Investigations. Tip, if you have some message for them, use their unencrypted contact form to let them know about fraud or etc. What could possibly go wrong? > http://www.osi.af.mil/main/contactus.asp
HQ NORAD USNORTHCOM INTEL PETERSON AFB - US Northern Command located near Colorado Springs was created as Dept of Homeland Security's military counterpart for "Homeland Defense", an elastic concept extending Pentagon involvement with "critical infrastructure," namely the machinery of major corporations. They also revised "GARDEN PLOT" into CONPLAN 3502 Civil Disturbance Operations," relevant in a Ferguson type context under federal mobilization. (see 2010 story) They were also written into Superman's plot.
JOINT STAFF Washington DC - J2 - Director for Intelligence (J2) on the Joint Chiefs of Staff (now this guy)
NGA HQ Bethesda Maryland. The National Geospatial Intelligence Agency, like DIA, is up to a lot of things off the radar. They have domestic satellite spying (GEO INT) responsibilities at National Special Security Events which require a special domestic military intel privacy waiver. http://www.stratcom.mil/functional_components/ . Big spenders.
NSA FT GEORGE G MEADE Maryland - National Security Agency at the oddly spelled out Ft Meade. I wonder how many land in this inbox - and how many times "George G" is stored in their databases.
US SECRET SERVICE WASHINGTON DC
USCYBERCOM FT GEORGE G MEADE Maryland - Cyber Command in ur router, sniffin ur packets
WHITE HOUSE SITUATION ROOM WASHINGTON DC.
BT . … I am fairly sure this is a closing list tag like </UL>
Serial IIR 4 213 4003 12, "WARNING (U): This is an information report, not finally evaluated intelligence. It is being shared for informational purposes but has not been fully evaluated, integrated with other information, interpreted or analyzed. Receiving agencies are requested not to take action based on this raw reporting without prior coordination with the FBI. Unless a conviction in a criminal proceeding occurs, a presumption of innocence exists for any person being reported on in this IIR." Declassification date appears 20370607, as this hot stuff needs to lay low for a couple more decades.
What is an IIR? It is pretty low level stuff for the FBI. For a bit of info see FBI Intelligence Information Report Handbook | Electronic Frontier Foundation. That document interestingly, at the very end includes a statutory info pipeline from Grand Jury operations to various feds. Patriot Act Section 203(a)(1)( C )(i)(V) certainly makes for an industrious star chamber circuit, but they don't want grand jury info going out in IIRs without asking the HQ attorney.
This document was obtained by Smiley Hill via FOIA. Please follow https://twitter.com/smilyus for more smileable FOIAs on a regular basis.
The use of the military - and these contractors in the game now - to police corporate systems labeled as Critical Infrastructure is significant. After all, Missouri Gov Nixon just activated the state militia because of Ferguson.
“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”
As for the legal ramifications of domestic military operations and targeting electronic activists with tools like STRATCOM / CYBERCOM retain for battling Al Qaeda servers or whatever, most people say "But, Posse Comitatus!" In reality a vast area of domestic military operations has been expanded and operated by JAGs. See : www.loc.gov/rr/frd/Military_Law/pdf/operational-law-handbook_2012.pdf
This Domestic Operational Law Cyber Realm has a Handbook, People!
PI highlighted a bunch of good 2011 stuff, since we are talking Ferguson anyway, it's worth noting again:
G. The Department of Defense Civil Disturbance Plans
Formerly, DoD’s Civil Disturbance Operations (CDO) plan was known as “GARDEN PLOT.” Since the creation of the Department of Homeland Security and USNORTHCOM however, DoD has delegated to geographic combatant commanders responsibility for developing CDO Contingency Plans (CONPLANs). These geographic commanders’ CONPLANs provide guidance and direction for planning, coordinating, and executing military operations during domestic civil disturbances.
1. Civil Disturbance Operations Mission
Broadly stated, the CDO mission assists civil authorities in restoring law and order in the United States and its territories.58 This mission statement, while not duplicating the language in the Insurrection Act allowing for the use of federal forces to “suppress” insurrection, provides wide latitude to the President to use federal forces to assist civil law enforcement in “restoring” law and order.
The restoration of law and order must be distinguished from the preservation of law and order. CDO mission statements do not allow the joint civil disturbance task force commander to undertake preservation missions. It is generally agreed that missions to restore law and order include dispersing unauthorized assemblages, patrolling disturbed areas, maintaining essential transportation and communications systems, setting up roadblocks, and cordoning off areas. Care should be taken before a military commander accepts missions that are routine maintenance of civil order.
2. Combatant Commanders’ CONPLANs
The CONPLANs provide the basis for all preparation, deployment, employment, and redeployment of Department of Defense component forces, including National Guard forces called to active federal service, for use in domestic civil disturbance operations, in support of civil authorities as directed by the President. The concept of a civil disturbance operation is multi-phased: Phase 0, Shape; Phase I, Anticipate; Phase II, Respond (deployment can occur in either Phase I or Phase II); Phase III, Operate; Phase IV, Stabilize; and Phase V, Transition (redeployment). Prior to deployment, military forces maintain five preparedness postures, called Civil Disturbance Conditions (CIDCONS) in order to alert and react to potential civil disturbance operations. Changes in the CIDCON level are directed by the JDOMS.
3. The Standing Rules for the Use of Force for U.S. Forces
Civil disturbance operations are conducted in accordance with Appendix L of the Standing Rules of Engagement/Standing Rules for the Use of Force for U.S. Forces (SRUF). Guidance on how and when forces can use force in a CDO mission are detailed in that annex. Although the CJCSI is classified, Annex L is not and can be shared with our mission partners.
a. Custody and Detention
All apprehensions should be made by the civil police force unless they are not available or require assistance. Military forces have the authority to detain rioters, looters, or other civilians committing criminal offenses. Civilians taken into custody should be transferred to civilian law enforcement authorities as soon as possible.
All members of the force must remember that state and federal criminal law and procedure govern apprehension. Apprehension is justified only on the basis of probable cause to believe that an offense has been committed and that the person to be apprehended committed the offense. Soldiers should not question detainees beyond basic pedigree such as name and address. If formal questioning of an offender is necessary, civilian police should conduct the interview. If civilian police are not available, CID agents or military police may conduct interviews only if the interview is essential to the civil disturbance mission. Actions taken by Soldiers that do not conform to criminal law constitutional standards could jeopardize future prosecution and subject Soldiers and their Commanders to criminal and/or civil liability.
b. Search and Seizure
CDO CONPLANs anticipate that military forces will generally not be involved in searches unless there is “an immediate danger of violence, destruction of evidence, or escape of violent persons unless the search is conducted without delay.” In all other cases, local authorities should conduct searches. When required to perform searches, federal armed forces may conduct warrantless searches under the same constitutional parameters imposed upon law enforcement officials. Joint Civil Disturbance Task Force forces conducting a warrantless search will fully document the reasons for the search as soon as is reasonably convenient.69 Generally these searches are limited to the following incidents.
(1) Stop and Frisk
If there is a reasonable suspicion based upon articulable facts that a person has committed, is committing, or is about to commit a crime, that person may be temporarily stopped and questioned about his activities. The stop must be limited in duration to that which is reasonably necessary to investigate the suspicion. If there is a reasonable suspicion based on articulable facts that a person is armed or is carrying instruments of violence and that the individual presents an immediate risk of harm, members of the armed force may conduct a “frisk” (an external “patdown” of the clothing) for weapons. Any weapons found during a frisk may be removed from the individual and seized.
(2) Search Incident to Lawful Apprehension
A person lawfully detained may be searched for weapons or destructible evidence. A search for weapons or destructible evidence may also be conducted in the area where the detained person could reach with a sudden movement to obtain a weapon or destroy evidence.
(3) Exigent circumstances
Military forces assisting law enforcement may make a search without a warrant when they have reason to believe (probable cause) that weapons, objects related to criminal activity, or persons believed to have committed an offense, are in the place to be searched; and they have reason to believe that the delay necessary to obtain a search warrant would result in removal of the weapons or destruction of the objects related to criminal activity. For example, Joint Civil Disturbance Task Force forces may stop and search an automobile without a warrant when there is reason to believe that the automobile contains weapons or instruments of violence and/or contains an individual reasonably believed to have committed violence.
Military forces in a civil disturbance operation may make an immediate entry into a building when there is reason to believe that entry is necessary to prevent injury to persons, serious damage to property, loss of evidence, to protect public safety, or to render aid to someone who is in danger.
(5) Hot pursuit
Military forces pursuing a person who they have reason to believe has just committed a serious crime, may enter a vehicle or building believed to be entered by the suspect and search the building or vehicle for the person or any weapons that might be used to further his escape.
(6) Plain View
During the course of otherwise lawful activity, military forces may seize any unlawful weapons or objects related to criminal activity which they observe in plain view. When conducting warrantless searches that require a probable cause determination, military forces can obtain advice from a judge advocate; however, the probable cause determination must be made personally by the individual desiring to conduct the search.
If a search warrant is required, local civil authorities should obtain judicially issued search warrants. If local civilian authorities are not available, judge advocates need to be prepared to provide advice on probable cause to military authorities before they approach a local judge or magistrate for a search warrant.
When feasible, all searches conducted by military personnel will be conducted by two personnel with the actual search performed by someone of the same sex.76 A hand receipt or some similar document should be prepared when items of personal property are seized from an individual.
c. Confinement Facilities
The Joint Civil Disturbance Task Force should not operate a detention facility. Any person apprehended should be turned over to the police for detention. Military correctional facilities cannot be used to detain civilians. If available civilian detention facilities cannot accommodate the number of detained persons who are awaiting arraignment, the Joint Civil Disturbance Task Force commander must seek the approval of the SCRAG and Combatant Commander to set up a temporary detention facility.
Should the Task Force be required to operate a detention facility, the detention facility standards and operations should conform, to the maximum extent possible, to current DoD confinement facility operations and will be under the professional supervision and control of Military Police personnel. The establishment and operation of military detention facilities is a temporary expedient and is authorized only until such time as the custody of detained persons can be transferred to civil authorities.
d. Riot Control Agents
Normally, for CDO the deployment and use of riot control agents is allowed as a matter of U.S. policy. However, initial approval authority for its deployment and use may be retained at a level higher than the Joint Civil Disturbance Task Force Commander and may require a specific request.
This is not the same as a state-level activation, but it is the doctrine that is crafted at the federal level these days so I think it's pretty relevant to Ferguson.
Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]
Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.
Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.
The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.
SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.
U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.
"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."
At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.
Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.
The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.
Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.
Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.
Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.
A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.
The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.
While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]
So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?
Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.
Anyway let's have ourselves some fresh court documents:
One axiom of the Interwebs research world is that the CIA is Wall Street and Wall Street is the CIA. This reflects many key dynamics, a personal favorite example is laundering of drug money through Wall Street for the benefit of CIA proxies in the "war on drugs".
NEW YORK--(BUSINESS WIRE)-- Kohlberg Kravis Roberts & Co. L.P. today announced the appointment of retired four-star General and former Director of the CIA David Petraeus as Chairman of the newly created KKR Global Institute.
Henry Kravis, Co-Founder and Co-CEO of KKR, stated: "I have long known and respected General Petraeus and, on behalf of everyone at KKR, I welcome him to the firm. As the world changes and we expand how and where we invest, we are always looking to sharpen the ‘KKR edge.' With the addition of General Petraeus, we are building on the work we have done to understand the investment implications of public policy, macro-economic, regulatory and technology trends globally. We are pleased to bring all of this expertise together under one umbrella, the KKR Global Institute, to deliver the best of KKR's insights for our investors."
Over the past several years, macro-economic and geopolitical considerations, including the heightened role of central banks following the financial crisis, new regulation and major changes in public policy, have led to KKR's increased engagement on these areas and on environmental, social and governance issues. At the same time, KKR is a global firm investing in new and emerging markets that have new risks and opportunities. The KKR Global Institute will be the nexus of KKR's focus on the investment implications of these issues. It will also further build on the firm's efforts to help KKR's portfolio companies expand globally, and it will periodically serve as an outlet for publishing the firm's thought leadership products, including views from portfolio managers and industry experts.
As Chairman of the KKR Global Institute, General Petraeus will work with a team at KKR and in tandem with Ken Mehlman, Global Head of Public Affairs, and Henry McVey, Global Head of Macro & Asset Allocation. In addition to his role as Chairman of the KKR Global Institute, General Petraeus will also support KKR's investment teams in the diligence process, especially when the Firm is considering investments in new geographies.
"KKR is one of the best investment firms in the world," General Petraeus observed. "I am very pleased to join such a great team. I have watched KKR evolve as it adapted to the post-financial crisis world and became a go-to partner for companies worldwide. I look forward to supporting the investment teams in their pursuit of the best opportunities for clients and also being a part of a new initiative to provide additional insights to KKR's clients and companies."
[Yes it is the former Republican Party Chairman Ken Mehlman, CFR member & notable component of log cabin style GOP.]
However, political scandal month has just started. Another former high-ranking government official is already preparing his lesson plans for his college course at the City University of New York. Former CIA director David Petraeus, brought down by an affair with Army reserve officer Paula Broadwell, will be teaching courses that favor the building of the Keystone XL pipeline and the benefits of gas fracking and "clean coal."
Petraeus's Wall Street employer, Kohlberg, Kravis, Roberts (KKR) has significant financial stakes in all three energy projects. So, when Petraeus ignited a firestorm of protest at CUNY by accepting a $150,000 salary for teaching a single three-hour course a week, he changed his mind and said he would teach the course for a mere $1. Obviously, KKR's deep-pocketed pals at TransCanada are picking up the difference.
On Wednesday, Petraeus will give his first paid speech since resigning as CIA director in November. It’ll be at Duke University and is titled, “America and the World: A Conversation with Gen. David Petraeus.” Petraeus is working with six veterans’ support groups, and is chairman of the newly created KKR Global Institute for Kohlberg Kravis Roberts. He also is teaching this fall at the University of Southern Californiam, and beginning Monday at the City University of New York.
It's a pretty woolly political scene right now & wanted to slam up some docs leading different directions on this. At least the damn narrative is moving along.
More or less we're looking at the merging of criminal investigations with direct military signals intelligence (SIGINT) technology run by the same contractors that recently ran these technocratic social control 'kinetic' programs for the Pentagon in assorted occupied lands around the Middle East etc.
Naturally the war on drugs first brought this war home - special bonus points for the Viktor Bout angle of the DEA SOD/DICE projects story from Reuters earlier...
For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.
The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.
The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987. ......
Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.
The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.
The program was started in 2007, according to the slides, and has been carried out in great secrecy.
“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.
The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.
Oh the war on drugs, will your terrible travesties never end... Nice work exposing this program by all involved!! A spectacular catch for sure.
Meanwhile we also have yet to deal with the terrible secret Special Operations Division which as this slide makes clear, subverts the entire concept of criminal defense and discovery. Therefore probably all drug cases should be thrown out, eh?
(Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.
Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.
The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
"I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.
"It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."
THE SPECIAL OPERATIONS DIVISION
The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.
Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential.
"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
.....SOD'S BIG SUCCESSES
The unit also played a major role in a 2008 DEA sting in Thailand against Russian arms dealer Viktor Bout; he was sentenced in 2011 to 25 years in prison on charges of conspiring to sell weapons to the Colombian rebel group FARC. The SOD also recently coordinated Project Synergy, a crackdown against manufacturers, wholesalers and retailers of synthetic designer drugs that spanned 35 states and resulted in 227 arrests.
Since its inception, the SOD's mandate has expanded to include narco-terrorism, organized crime and gangs. A DEA spokesman declined to comment on the unit's annual budget. A recent LinkedIn posting on the personal page of a senior SOD official estimated it to be $125 million.
Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE.
The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said.
About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
"We use it to connect the dots," the official said. ...
OK so let's get to PROTON, CRISSCROSS, CLEARWATER and Lexis-Nexis. I think this covers a lot of new ground. Hard to say if the DOJ side of the story ties in, but the Lexis-Nexis level is pretty clearly documented already but not well known outside of research circles. Also some of this gets to the SCS - Special Collection Service - which I think would have been part of Snowden's tour of duty in CIA.
Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals.
I suggest American guerillas seek non-Internet modes of communication. If you think Rex Sherwood was pulled over for not using a turn signal, you are wrong.
I was "read on" the PROTON/CRISSCROSS program in late 2006 and was a frequent user of this system for over a year. As part of my duties, I employed PROTON/CRISSCROSS in HUMINT exploitation role. In the Intelligence Community, PROTON/CRISSCROSS is referred to as PROTON. Unless otherwise specified, the same is true in this report.
PROTON is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling. PROTON is the program name as well as the name of the technology. It has been described as "SAP-like", and I suspect that PROTON was once a DEA special program. PROTON is well known in HUMINT and DOJ clandestine law enforcement. It remains the primary, if not fundamental, tool of HUMINT and DOJ law enforcement operations, both of which have considerable overlap in phenomenology and methodology. PROTON carries the FISA caveat because Top Secret FISA collection is contained in PROTON's massive database.
Through my professional associations within the Intelligence Community, I became aware of a Department of Justice (DOJ) system called CLEARWATER. CLEARWATER is similar to PROTON but at the SECRET/NOFORN level of classification and exclusively a DOJ program, where PROTON is CIA, DOJ and DOD. Most DOJ Special Agents and analysts do not have Top Secret clearance. Every informant is run through CLEARWATER, every witness gets vetted through the system.
PROTON and CLEARWATER are not just analytic tools, they provide actionable intelligence and both programs are used everyday for target discovery and development. CLEARWATER practically leads FBI and DEA investigations. PROTON is used throughout HUMINT for asset validation, recruitment, background checks on sources, etc. The FBI and DEA as both law enforcement and intelligence community members have resources of both sides and domestic law enforcement by these agencies is more of a HUMINT operation of the type seen in Afghanistan. Find, Fix, Arrest. PROTON and CLEARWATER work so well that Special Agents and Case Officers can't wait to get data into the system and see how it networks together.
Top Secret and FISA mean NSA sensitive sources and foreign collection. NSA resources are unneeded in America---CALEA and the DOJ have that covered for you under Title III, the Patriot Act and opinion from the federal kangaroo judiciary.
FISA is not only used against terrorists and spies but also private and quasi-government organizations . The most impressive network I ever laid eyes upon was the PROTON derived communications network of the Netherlands and Swiss SWIFT. Allot of target discovery there. It's how you find a needle in a haystack. The U.S. hosts one of three SWIFT secure messaging centers. Well, the NSA and CIA have insured SWIFT is allot less secure. SWIFT is a major communications target and the NSA is deep in that This is a modern take on "follow the money." If Americans are wondering how the IRS found their secret bank accounts..well, here 'ya go.
When I read the description of Drug Enforcement Administrations (DEA) DEA Internet Connectivity Environment (DICE) system: the billions of records, partnership with CIA, NSA and DOD, the need to cover sources at the expense of a fair trail--- it struck me that what was described sounded more like PROTON and/or CLEARWATER.
As I read further, DICE was sounding more like a legitimate DEA program that was being used to provide cover for PROTON and/or CLEARWATER---either intentionally or sacrificially. The early descriptions of DICE present it as an information sharing and collaboration tool through the Internet. The recent public descriptions of DICE are awkward and contrived when compared to past information.
DICE is being used to cover PROTON and/or CLEARWATER.
Properly, CRISSCROSS is the database of telecommunications selectors. Selectors are, in NSA terms, that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI---really any telecommunications "number" or "address" a person would have as a means to contact another, are contained in CRISSCROSS.
PROTON is the operating software written in JAVA for cross-platform usability and runs on JWICS for connectivity to CRISSCROSS.
PROTON contains the tools for network analysis and would be familiar to anyone who has experience in undergraduate social network analysis, statistics and data visualization.
CRISSCROSS has an interesting and murky history. As it was explained to me by a PROTON Program Officer, CRISSCROSS was originally a very secret DEA program to provide a repository for DEA collected selectors. It was, by every account, an excellent resource. With the post-911 reorganization of the Intelligence Community, everyone was required to share their resources for the "War of Terror." CRISSCROSS was very successful and well-received and ultimately exceeded DEA capabilities to manage. The CIA took over as executive agent---but CRISSCROSS is shared by the DOD and DOJ in a co-ownership manner.
It's uncertain if PROTON received Special Collection Service (SCS) data when it was a solely DEA activity, but PROTON presently receives SCS collection amounting to about 1 one terabyte monthly, and that's just selectors, not content. PROTON also receives data from Computer Network Exploitation (CNE), by the now famous Tailored Access Office (TAO). Included as well is an enormous repository of Title III data from CALEA enabled domestic collection, FISA and an enormous amount of purchased data from various communications providers like Intellius.
PROTON does not contain content, only selectors for targeting. Consider that in the context of one (1) terabyte of just selectors per month (just from the SCS) for over 10 years. I have no idea how much the TAO provides, however the two biggest contributors to PROTON are the SCS and TAO.
An analyst or law enforcement officer can "run" a selector in PROTON and visualize the social network of correspondents associated with that selector in a visual format. The user can select and display most frequent numbers called or have called, duration of call, and other functions familiar to social network analysis. An analyst may choose to look at the network in terms of who called who: persons of importance typically have allot of people calling them so we can build a network based on that to determine centricity. We can build a network based on call duration, frequency, date---pick a variable. Sometimes it's useful to look at the outliers which may be hang-arounds to some drug trafficking organization. We can task NSA or DOJ for collection on these hang-arounds and begin network deconstruction from the ground up.
These calling networks include family, friends and other non-target persons. Non-target persons, like family members, are very useful in developing the target and as leverage. Non-target communications provide intelligence from things spoken between people in confidence who may not be aware of the targets activities or associations, like the location of a fugitive who has ceased using his known selectors, but communicates with his mother through her known selectors.
Another very useful feature is the Bankswitch function, which allows network discovery by the calling pattern, not necessarily by a selector. Often, groups of U.S. government interest will use a cellphone, then dispose of them , preventing further intelligence collection from that group of cellphones. Bankswitch allows the analyst to quickly rediscover the calling network that has switched phones. Humans typically have some constant behavior in who and how they make their calls and persons. Groups and enterprises not having supplicated to the U.S. government avarice will have a whole additional set of behaviors in who and how they call.
This is highly useful for calling networks that dispose and rotate telephones regularly. A fresh cellphone provides enough of a lead to discover the calling pattern of the whole network based on historical calling records. Both the DEA and FBI have found this useful in their activities in Columbia, Mexico and the United States.
I know for certain PROTON contains communications selectors on American Citizens (AMCITS) since I ran a query on a number using only a Maryland area code and a partial prefix. PROTON returned a huge list of "masked" domestic numbers. An NSA masked number is always domestic and reveals only the area code and prefix with the rest of the number obscured. A PROTON user can email the NSA with a request to unmask the number---it's in the database, but a user has to present some justification for a number to be unmasked. Voice cuts are available through a similar process.
PROTON is really well thought out. Not only does it provide a wealth of network investigative tools, it also allows for the easy introduction of data. Let's say you're a DEA Special Agent surveilling local boat captains as part of OPERATION PANAMA EXPRESS (PANEX) in Barranquilla Columbia---a major Port of Origin for drugs to the U.S. and someone gives you a business card. Just run the number and see if it hits. The Special Agent" can take that card and mail it to the PROTON Program Office (PPO). Scans, cell pictures of the information are also acceptable to ingest.
An FBI Case Officer attending a UAV conference in Las Vegas can take all the "grey literature" and hand that to the PROTON office as well. The numbers find their way into the database The PROTON office will also ingest entire phone books---still popular in some parts of Europe and Asia. They use a method similar to Google books to automatically turn pages and scan data from them.
Anything that contains a selector can go into PROTON. Part of the PROTON program is the resource that provides software engineering to order unordered data and otherwise make raw data ingestible. PROTON users can add and edit PROTON data as well. If a user discovers the identity of a previously unidentified selector, one can edit that record or leave notes for other users.
With PROTON, you can see who's talking to whom in a telecommunications relationship context. How you hit that network is up to you.
Network deconstruction techniques vary throughout the 'Community. Domestically, the DOJ prefers the highly publicized raid with the media providing the entertainment backdrop. The DEA prefers covertness. The DOD prefers a Predator strike. Yes, those drone attacks are network deconstruction techniques and target selection is often facilitated, if not provided, by PROTON.
As stated earlier, CLEARWATER is a SECRET/NOFORN version of PROTON. The DEA red herring called DICE reportedly contained NSA collection which rules-out CLEARWATER (a S//NF system) and highlights PROTON (a TS//SI system) as the source of DICE intelligence.
I'm providing information on both since the government is no longer under constitutional restraint and is illegitimate. Parallel Construction. You fuckers. A cornerstone of American law and western culture sacrificed for the security of the Elites.
With the CALEA requirements, TITLE III collection is very simple affair involving a court order and the Cisco routers which, through CALEA legislation, are engineered for surveillance. Cisco is a very enthusiastic partner to the Intelligence Community---one of those sensitive relationships managed through the NSA Special Source Operations office. The NSA finesses such relationships---with the DOJ, you get a thug in a nice suit and the quiet menace of federal law enforcement. If you think the DOJ is a law enforcement agency, you're stupid. Internal security is DOJ Job #1. As we have seen, the DOJ is maintaining internal security by both legal and extralegal means with the full support of the federal judiciary and the lukewarm animus of the U.S. Congress.
Federal judges and congress persons are largely immune to DOJ surveillance. You are not. The "new" counter-insurgency operations by the government concentrate on a Reasonable Suspicion by persons and groups---not on Probable Cause.
CLEARWATER contains selectors from any number of sources: TITLE III, purchased data from telecommunications data brokers, National Security Letters, subpoenas, technical operations by FBI TACOPS, search warrant, informant production, arrests, detentions. If the DOJ has searched you, arrested you or let you go, count on that data being in CLEARWATER. Did you give the Special Agent your telephone number?
Arresting someone to search them without needing consent or court order is not an unheard of means to get a Person of Interests selectors into CLEARWATER. Something laying openly on your desk? A cell-phone snap and email to the program office. How about those utility bills you throw away without shredding? If you're a Person of Interest, somebody is walking away with your trash.
There is a a real motivation by DOJ Special Agents to get telecommunications selectors into PROTON or CLEARWATER to build the networks for analysis and deconstruction.
CLEARWATER has all the features of PROTON and at least one other---mapping. An FBI Case Officer operating domestically can query say, Lahore Pakistan, and place on a map, those locations in the U.S. where those calls originated or terminate---a choropleth map with colored density clusters, all in a spatial context. With that, the DOJ knows where to focus it's domestic security efforts. A DEA Special Agent can run a selector seized in an amphetamine investigation and, within a few minutes, have the calling network and visualize the correspondents locations on a map. That's how DOJ led task forces show up in your neighborhood.
Watching a OWS protester enter a number into their cell phone is perfectly legal without consent or a warrant and once I get that number, we'll look at that calling network, find the node that is you, and walk that back to that moment we shared under the chestnut tree.
If you're visiting the USA from abroad, you may have your wallet and pocket litter photocopied at secondary screening. Then an email to the National Counterrorism Center (NCTC) Terrorist Identities Datamart Environment (TIDE) office, and from there, a Forward to the PROTON office.
PROTON, CLEARWATER and LEXIS-NEXIS all provide data export into Analyst Notebook file format (and PDF for ease of sharing).
All members of the Intelligence Community have access to LEXIS-NEXIS. LEXIS-NEXIS contains biographic information on most Americans having a driver or occupational license. Your state sells the contents of its drivers license database to companies like LEXIS-NEXIS for a profit. They can do this since that information is considered in the public domain---driving is a privilege and if you don't want to be in database then don't get a drivers license. LEXIS-NEXIS contains other highly personal and granular information depending on which state is providing information. Florida provides pretty much everything it can to LEXIS-NEXIS. Automobile information, luxury water craft, occupational licenses---if you submit information to a state agency, it can end up in LEXIS-NEXIS. All domestic law enforcement has access to LEXIS-NEXIS, its a fundamental investigative tool. IRS, DOJ, Treasury, Local PD, Sheriffs Office all have a LEXIS-NEXIS access or the means to pull data from them.
Law Enforcement Officers can have their data removed from LEXIS-NEXIS. An LAPD and NYPD "spokesperson" informed me that this is the case. Imagine your a citizen in New York and you get surveilled by one of the numerous surveillance technicians the NYPD has fielded since 9-11 , a quick look-up via mobile device or WiFi and they know who you are now.
So, a Special Agent or analyst simply runs the selectors in PROTON and CLEARWATER, then runs those names or other biographic/vital information again in LEXIS-NEXIS, all that data related to the TARGET is exported in Analyst Notebook format, those files are imported into the Analyst Notebook application and...viola!...a relatively complete social network and biographics of the TARGET. That could be you of course.
By Supreme Court decision and other judicial misadventures, LEXIS-NEXIS contains public information and you do not have an expectation of privacy. There is no need for Probable Cause or Reasonable Suspicion because this data is, by judicial opinion, public. Something to think about next time you're at the DMV. Citizens are queried regularly in LEXIS-NEXIS. CLEARWATER and PROTON provides network association and the selectors. A subpoena, NSL or search warrant to the telecommunications provider of that selector gives us names and locations. LEXIS-NEXIS provides Pattern of Life, geolocation and personalia. I was able to see my past three residential addresses, past telephone numbers and identifying information about my previous automobile. LEXIS-NEXIS is coupled to Automatic License Plate Recognition Systems (ALPRS) as well. Who you are, where you were and where you are.
The DOJ and Intelligence Community access LEXIS-NEXIS through a VPN and a proxy (government). A DOD proxy is registered to the Virginia Contracting Office, but it's a non-logging proxy so, good luck in your discovery. LEXIS-NEXIS has no idea of the individual accessing it's database and, according to the spokesperson, does not maintain logs of government clients. A subpoena cannot discover what is not there.
Around 2008, LEXIS-NEXIS purchased Choicepoint to start their new product line. I recall some representative, at a promotional meeting, extolling the virtues of Choicepoint---all the data in a easy to use format. A user of Choicepoint could run a query and not only get biographics and addresses but have that information located on a map or satellite image (by Pinpoint, Inc. or a Google map server). The Choicepoint representative giving the presentation said no Social Security Numbers or drivers license pictures would be included in the database in order to protect the rights of the citizen. Such conceits are good ethics in Washington, D.C.
That said, CLEARWATER and PROTON are not omnipotent. Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated. Of the many systems used by NSA and DOJ, CLEARWATER, PROTON and LEXIS-NEXIS are the most significant from a "boots on the ground" investigative prospective.
There is real concern that PROTON may be to widely known for such a program and efforts are being made to walk it back into a compartment.
Location: Hanover, MD, US
Job Order: J0311-0630 - Permanent Full Time
Title: SIGINT Analyst
Category: Consulting / Business / Functional
City: Hanover, Maryland, United States
Job Description: SIGINT Analyst
CGI Federal is seeking a SIGINT Analyst to work in our Hanover, MD office.
Applicants will work as a member of a government-contractor team whose primary focus will be providing support to deployed analysts and software developers.
In this capacity, uses an in-depth knowledge of general communications procedures, traffic analysis and reporting formats and vehicles to produce time-sensitive and event-oriented reports
Provide support to force protection, indications and warning and situational awareness; provides target continuity and mentorship to a junior and rotating workforce; conducts research to answer RFIs and produces working aids to support new tool development.
Must be willing to receive and conduct training on new systems, databases, processes and procedures.
Analyst will be supporting deployed US military troops and must understand the military decision making process and miliary doctrine.
Minimum of five (5) years experience with the military or government agency using the collection management cycle, intelligence cycle, targeting cycle, and the SIGINT intelligence fusion process from tactical to national level required.
Experience with Falconview, Analyst Notebook, Arc View, Arc-GIS, Arc-Editor, AIM, Pathfinder, SEAS, STARLIGHT, GCCS and other current analyst tools.
Active TS/SCI security clearance w/ polygraph required.
Experience with NSANET, RTRG tool suite, Global Reach, Proton/Criss Cross, Broom Stick, CW II, Banyan. Geo Bootcamp and knowledge of ArcGIS a plus.
Preferred experience includes analysis in OIF/OEF, NSA, INSCOM, or ACE At CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 71,000 professionals located in more than 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com.
This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.
We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.
No unsolicited agency referrals please.
WE ARE AN EQUAL OPPORTUNITY EMPLOYER.
- Analytical Thinking
- Signal Intelligence (SIGINT)
Official description: CHARLOTTE, N.C. – Soldiers of the North Carolina National Guard train for Rapid Reaction Force duty at the Catawba River Pump Station here today. The training scenario tests the Soldiers ability to use nonlethal force to disperse a crowd of aggressors from a water plant. This training prepares the Soldiers to support state and local first responders and county emergency management agencies. The RRF is a quick reaction team that, on order, is deployable anywhere in North Carolina within 24 to 36 hours of a critical event. In times of crisis, the RRF may be ordered by the President of the United States or the Governor of North Carolina in order to augment Federal or State Authorities in response to actions such as a known terrorist attack, civil unrest or a natural and/or man-made disaster. (U.S. Army National Guard photo by Sgt. 1s Class Robert Jordan / released)
Ugh, the Syria scenario is really dispiriting but I think much of the western political leadership may finally be backing down from another round of interventionism - let's hope! Here are a bunch of new notes - take em all with a grain of salt, and may they hopefully shed a bit of light on matters.
No matter how it turns out, it will be really hard to get the Middle East moving into a politically independent foundation, respectful of human rights and devoid of massacres and social 'sloshing' as mistrust escalates on all sides, with various specialists in destruction jumping in to make matters worse at every turn.
The Britam Defense Leak involving a Syria chemical weapons plan is denied, but perhaps one of those things like a Project Northwoods about the Syrian Chemical Weapons scenario: (Northwoods was an infamous JFK-era doc from the Joint Chiefs suggesting a fake attack involving Cubans and hijacked planes.)
An article on 29 January reported allegations on the internet that the US Government had backed a plot to launch a chemicals weapons attack in Syria and blame it on the Assad regime.
The reports made reference to an email said to have been from David Goulding, the Business Development Director of Britam Defence, to company founder, Philip Doughty. The email had been published on the internet after Britam’s computer system was illegally hacked in Singapore. It referred to a proposal that Britam would deliver chemical weapons to Syria for enormous financial reward and suggested that the directors were willing to consider the illegal proposal.
We now accept that email was fabricated and acknowledge there is no truth in any suggestion that Britam or its directors were willing to consider taking part in such a plot, which may have led to an atrocity.
We apologise to each of them and have agreed to pay substantial damages.
A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline.
The attack is on britam defence (http://www.britamdefence.com/) and has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom).
The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.
Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.
A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.
More possible chemical weapons false flags from previous months: video "Chemical Weapons False Flag against Syria Update http://youtu.be/DbMdll58lis posted on August 3rd 2012.
Also worth noting this! Iraq uncovers al-Qaeda 'chemical weapons plot' BBC News June, 1 2013, and this RT report on the Turkish authorities discovery of Sarin in a Jabhat al Nusra safehouse http://youtu.be/vet0PV-XPlw in May 2013.
Reported by RT in May and firmly in the memory hole right now: 2 kilograms of sarin captured with rebels in Turkey?! WTF
Published on May 31, 2013RussiaToday: Suspected Syrian militants have reportedly been detained in Turkey with a cylinder of highly poisonous sarin gas found in their possession. Those arrested are believed to be members of the Al-Qaeda linked Al-Nusra Front. Earlier this month, UN investigators voiced suspicion the nerve agent was being used by opposition fighters. RT's Middle East correspondent Paula Slier reports.
Obviously RT has a Russian perspective here but indeed as we will see this is not the only clue floating around about Al-Nusra & chemical weapons.
DC alternative journalist Wayne Madsen is not always correct but this particular narrative just smells really damn likely right now. R2P is "responsibility to protect" interventionist faction of Beltway, the newest iteration of "cruise missile liberals" more-or-less. Go get em Wayne:
September 1-2, 2013 -- Special Weekend Report. Washington, DC (WMR) Obama caved under last-minute pressure from Dempsey
WMR's White House sources report that on the evening of Friday, August 29, President Obama was on track to launch a sustained 72-hour cruise missile and drone attack on pre-selected air defense and other strategic military targets in Syria.
Obama had been convinced by his national security adviser Susan Rice, UN ambassador Samantha Power, and deputy national security adviser Ben Rhodes, all "Responsibility to Protect" advocates, that he could trump congressional approval for his attack by claiming that humanitarian operations do not require approval under the War Powers Resolution or Article I, Section 8 of the U.S. Constitution.
Many of Washington's insiders went to bed Friday night firmly convinced that Obama would give the final order to attack Syria sometime during the early Saturday morning hours of August 30. However, the Chairman of the Joint Chiefs of Staff, General Martin Dempsey, made a hurried trip to the White House during the early morning hours of Saturday to make one last final plea to hold off on any attack.
WMR has learned from White House sources that Dempsey told Obama that the president's plan would not work. "If you do this, the plan will fail and you'll get in deeper. And without congressional approval, you'll be screwed," Dempsey told Obama.
Dempsey's warning about Congress had merit. Already, 210 House members signed a letter to Obama warning him not to attack Syria without congressional authorization. In addition, a head count showed that some Democrats would join Republicans in voting for impeachment if a bill were introduced.
Dempsey's argument prevailed and Obama decided to hold off on any attack until Congress reconvenes after Labor Day. Obama decided he would seek a congressional vote to authorize a military strike on Syria. However, in overriding Rice, Power, Rhodes, and Secretary of State John Kerry, who all favored a military strike, Dempsey incurred the wrath of the R2P faction that dominates the National Security Council. State Department sources began spreading the word that Obama would still attack Syria without congressional approval. The Pentagon, on the other hand, pointed out that none of the National Security Council "heavies," Rice, Power, or Rhodes had any military experience and that Kerry was channeling the wishes of his good friend Senator John McCain, who has consistently supported Al Qaeda-led rebels in Syria and Libya.
Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that "smoking gun" proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal "Iran-contra"-like scandal. The proof is said to be highly "impeachable."
The developing scandal involves Turkish, Qatari, Lebanese, and Croatian firms and front operations; Qatar Airways Cargo; ousted officials of the Mohamed Morsi government of Egypt; small Turkish and Jordanian air service companies contracted by the CIA; Saudi intelligence chief Prince Bandar bin Sultan Al Saud; the September 11, 2012 attack on the CIA annex in Benghazi; and "black" carve-out contracts with the U.S. Air Force.
Obama's, Brennan's, and then-CIA director David Petraeus's knowledge of the operation was so intimate, Petraeus visited GOP presidential nominee Mitt Romney in October of last year to plead with him not to bring up the covert operation in the third presidential debate. Romney acceded to Petraeus's request.
Fluoride for the Win: Frankly at this point in the demented charade, the possible Sodium Fluoride - aka fluoridated water precious bodily fluids casus belli - angle is now my favorite. Naturalnews is not always dead on either, but it's too damn appropriate I say.
I am borrowing another excerpt from Madsen which includes a possible connection between major CIA pointman on the Caucasus and indeed Islamic fundamentalist network logistical support over the years (interesting in the pre-2001 interval eh) . Graham Fuller keeps popping up as a major figure in all of this, perhaps he will turn out to be something like the Oliver North of 9-11 itself - not to mention the sponsor of the Boston bombers' uncle Ruslan. Once the angles with Fuller surfaced, did anyone notice how fast mainstream press attention drained away from their backgrounds??!!!
The murky world of the CIA's past and current support for radical Islamist groups on three continents has emerged in newly-released documents from the CIA that show that Graham Fuller, the agency's one-time top interlocutor with the Saudis, Afghan mujaheddin, and Muslim Brotherhood, was a right-hand man to three CIA directors.
Fuller, a business partner of Ruslan Tsarni (Tsarnaev), the uncle of the accused Boston Marathon bombers, served as a close adviser to CIA directors William Casey, William Webster, and Robert Gates, according to recently declassified internal CIA memoranda. Since retiring from the CIA, Fuller has been engaged in supporting the Chechen Islamist guerrilla groups fighting Russia as well as the Republic of Georgia, which has become a base for anti-Russian and anti-Syrian military activities, which includes, the transport of chemical weapons to Syrian rebels from the Pentagon-operated Richard G. Lugar Center for Public Health Research in Tbilisi, which, although a biological weapons research laboratory, also warehouses chemical agents, according to U.S. intelligence sources familiar with the facility. The Tbilisi facility was the major source of chemical agents used by Syrian rebels to attack civilians outside of Damascus in a "false flag" terrorist operation coordinated by the CIA and Mossad.
Throughout the 1980s, Fuller was front and center at many of the acts of violence in the Middle East and South Asia, from Lebanon and Syria to Iran, Iraq, Afghanistan, and South Yemen. One CIA memo describes how Fuller was also heavily involved in the early part of the CIA's stirring political activities in the Balkans during the collapse of Communism in eastern Europe. A May 22, 1985, memo from George Kolt, the CIA's National Intelligence Officer for Europe, invited Fuller to a June 11, 1985, dinner at CIA Headquarters at which the former U.S. ambassador to Bulgaria, Robert Barry, discussed at the Confidential level "The Strategic Importance of the Balkans for the United States." [......]
I'm leaving the rest of the story off for now out of respect for an indie journo making a run at this ... and moments after plugging this in, Wayne's site is having Varnish caching issues. It's all got to be cross checked - someone could be feeding him knowingly bad info for their own purposes certainly - I think we have a substantial amount of paydirt on our hands here.
This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.
Mission drift into the US continues as the Pentagon contemplates dealing with "domestic extremists" under the rubric of Defense Support of Civil Authorities (DSCA) - one aspect of which is the US Northern Command's "USNORTHCOM CONPLAN 3501".
CONPLAN 3501, This generic emergency plan is relatively easy to obtain (most of the text), but it is the "friendly" hand of the DOD compared to the more mysterious and riot-control-oriented "USNORTHCOM CONPLAN 3502" entitled "Civil Disturbance Operations" (CDO). This surfaced in researching the role of Northcom at the 2008 Republican National Convention, which was a very 3502 CDO style operation with National Guard controlling space on Kellogg Blvd. CONPLAN 3502 is the post-2002 version of GARDEN PLOT, the 1960s-1990s template plan for domestic military deployments, like for example in the LA Riots.
Here is the new front-piece document. Also bonus weird stuff about the ever popular integration of North America.
An interesting Snippet:
Loosely-networked or individually motivated violent extremists will continue to exhort followers and encourage violent extremism in the homeland.
o HVEs will operate alone or organize in small groups and will be largely autonomous in their operations; they will have access to web-based resources to assist them in their operational planning.
o Military members and facilities will remain prominent targets of terrorists, and particularly by HVEs.
ł DoD will be called upon to provide significant resources and capabilities during a catastrophic event in the homeland.
o The National Response Framework will remain the primary instrument for applying Federal capabilities during disaster response.
Rapid and actionable intelligence on terrorist threats
DoD will maintain and enhance the Joint Intelligence Task Force for Combating Terrorism (JITF-CT) as its key node for sharing intelligence with interagency partners on terroristthreats. DoD will improve and refine intelligence and information-sharing relationships thathave developed since 9/11 and as a result of the Fort Hood shootings.
DoD maintains a robust array of foreign intelligence capabilities, and sharing relevant counterterrorism-related information with the Federal Bureau of Investigations (FBI) and otherkey parties is vital to the prevention of potential terrorist threats to the homeland. JITF-CT willremain the focal point for DoD’s outreach and sharing of intelligence and information with theFBI, the Office of the Director of National Intelligence (ODNI), and the NationalCounterterrorism Center (NCTC). Additionally, DoD will expand its participation within thevarious FBI Joint Terrorism Task Forces (JTTFs),9as well as other similar entities to maximize“top-down” and “bottom-up” sharing of key pieces of intelligence and information, consistentwith applicable law and policy.
And of course, Unity of Effort and the ever popular Council of Governors:
Promote Federal-State Unity of Effort
Unity of effort between the Federal Government and States must be one of DoD’s guiding principles in the homeland, since unifying DoD’s efforts with those of its external partners improves collaboration and shortens response times for meeting life-saving needs during emergencies. Unity of effort also means greater national preparedness at less overall cost, while preserving both Federal and State constitutional requirements and responsibilities. DoD and its Federal partners must continue to strengthen unity of effort with States to define common goals regarding capabilities, structures, and processes for responses to disaster and emergencies in the homeland.The Council of Governors – established by Executive Order in 2010 – will be an essential forum for enhanced, senior-level dialogue among Federal and State civilian and military officials for this purpose.
[.....] DoD will regard dual-status commanders as the usual and customary command and control arrangement in cases where Federal military and State National Guard forces are employed simultaneously in support of civil authorities within the United States.
DoD will continue to refine processes for dual-status commanders and their associated command structures. By leveraging the use of such commanders, DoD will improve Federal-State communication, economy of force, and force employment for planned events and no-notice or imminent incidents.Historic examples of the employment of dual status commanders includenational special security events such as the Democratic and Republican national conventions andresponses to disasters like Hurricane Sandy and wildfires in the western United States...
Vague talk of militarized domestic databases always good:
Since Federal and State military components have varying requirements for relevant information and level of detail, development of a COP solution need not specify systems, hardware, or software. Instead, it must be based on common data from authoritative military or civilian databases that flow to various systems in a common format.....
The DCE/DCO structure is reconfirmed to be key to domestic military operations:
DoD will use the planning capacity of Defense Coordinating Elements (DCEs)to expand planning cooperation at the regional level so that Departmental capabilities are considered in FEMA-led regional planning efforts. DoD will also build an integrated organizational architecture for its liaison and coordinating officers at various headquarters.
The ten FEMA regional offices are key nodes for integrating Federal planswith State and local plans, and DCEs within these regional offices are essential for operational and tactical unity of effort in an adaptive environment. This regional planning relationship bridges the gap between State-level planning conducted at a National Guard’s Joint Force Headquarters (JFHQ)-State and DoD and DHS national-level planning. The JFHQs in each of the 54 States and Territoriesprovide vital ties to State emergency officials and the National Guard Bureau. This enduring synergy positions the JFHQ as the key State-level organization for integrating the emergency plans of local DoD installations with State plans and FEMA regional plans.
DoD will deepen and facilitate rigorous Federal, regional, and State-level planning, training, and exercises through coordination and liaison arrangements that support civil authorities at all levels. These arrangements include DoD liaison officers at DHS and FEMA, Defense Coordinating Officers (DCOs), and Emergency Preparedness Liaison Officers from each Service.....
WASHINGTON, April 1, 2013 – The Defense Department incorporated hard lessons learned when it codified its new homeland defense and civil support strategy, said Todd M. Rosenblum, DOD’s top homeland defense official.
In an interview with American Forces Press Service and the Pentagon Channel, Rosenblum, the acting assistant secretary of defense for homeland defense and Americas’ security affairs, said the new strategy is a recognition that the operating environment has changed.
“We face new threats, we have new vulnerabilities, we have new dependencies, most importantly we have a new way to do business,” Rosenblum said during a Pentagon interview. “We have to capture that and make sure the department is prepared and directed toward being more effective and efficient as we can be.”
The Defense Department is charged with defending the homeland from attack. U.S. Northern Command is further charged with working with state and local entities and other federal agencies to provide support in times of natural or man-made disasters. In the first instance, DOD has the lead. In the second, another federal agency -- such as the Federal Emergency Management Agency -- has the lead.
The strategy, released in February, looks at the lessons learned from past experiences -- from Hurricane Katrina through Hurricane Sandy.
They also looked at changes including the growth of communications networks, dependence on private-sector capabilities and “the rising expectations from the president and from the secretary, and certainly from the American people, that we will be prepared to provide support to civil authorities within a 24- to 48-hour window,” Rosenblum said.
This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.
“So we are postured to provide assistance as fast and rapidly as possible,” Rosenblum said.
The vast difference between the response to Katrina in 2005 and to Sandy in 2012 shows the effectiveness of the new strategy, he said.
“We were more efficient, timely and effective in our support to Hurricane Sandy,” Rosenblum said. “This is because we did integrated planning within DOD, with our federal partners, and with our state partners. We recognized the need to not wait to be called upon, but to pre-position our support capabilities knowing there’s going to be audibles and ad hoc requests.”
Planning is at the heart of the strategy, he said. Integrated planning -- with state and local officials, with other federal agencies and with non-governmental entities -- has increased visibility and prominence. The National Guard -- an organization that bridges state and federal efforts -- continues to play a crucial role. But, Rosenblum noted, the strategy recognizes that response to disasters requires an all-of-government approach.
Cyberattacks, he said, also could produce the type of man-made disaster that would require DOD assistance. The homeland defense mission codifies requirements to provide cyberdefense, he added.
“The threats to networks and critical infrastructure increase when we are engaged in operations overseas,” he said. “The physical effects of cyberattacks can impact our military operation capabilities and response capabilities.”
The fiscal environment impacts this -- and all other -- strategies.
“The sequester is real and effecting DOD through readiness, training,” Rosenblum said. “It is difficult for the department to plan and budget intelligently, when we don’t have budget certainty.”
Officials devised the strategy when the department had already committed to $487 billion in reductions over 10 years.
“Sequester has changed the calculus tremendously,” Rosenblum said. “But this strategy is not about buying new capabilities: It’s about our planning, our processes and our integration.”
DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities
The Department of Defense announced today the release of the Strategy for Homeland Defense and Defense Support of Civil Authorities. This policyestablishes DoD’s priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president’s National Security Strategy and the 2012 Defense Strategic Guidance. It links with other DoD and national strategic documents related to missile defense, space, cyberspace, counterterrorism, and the Western Hemisphere. The strategy identifies two priority missions for the department in the homeland: defend U.S. territory from direct attack by state and non-state actors; and provide assistance to domestic civil authorities in the event of natural or manmade disasters, potentially in response to a very significant or catastrophic event.
The strategy emphasizes cost-effective policy mechanisms and innovative approaches to defend the homeland against direct attacks and to provide timely responses to routine and catastrophic events on U.S. territory. It stresses the continuation of DoD capabilities to defend against conventional and emerging threats in the air and maritime domains, while expanding cooperation with federal, state, and local partners to defeat asymmetric threats – including, for example, homegrown violent extremists who may seek to use improvised explosive devices. Additionally, it addresses DoD preparations for responding to man-made and natural disasters.
“The Department of Defense’s contributions to the defense of our nation have evolved over the past decade and account for new threats and challenges. Lessons learned from events like Hurricanes Katrina and Sandy and collaboration with our interagency partners and State Governors have framed our current approach to DoD civil support activities,” said Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Todd Rosenblum. “This strategy emphasizes strengthening our partnerships with federal agencies like the Departments of Homeland Security and Justice, with state and local governments, with the private sector, and with our Canadian and Mexican neighbors – not only for more comprehensive approaches to complex security challenges in the homeland, but also to create efficiencies through collaboration and joint action,”
Acting Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs [Acting?]
Todd M. Rosenblum is the Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs. In this position, he advises the Under Secretary of Defense for Policy on the homeland defense activities of the Department and regional security matters for the countries of the Western Hemisphere. He is also responsible for advising the Secretary of Defense on all matters pertaining to defense support to civil and law enforcement authorities in the homeland. Mr. Rosenblum has nearly 25 years of political, policy, and legislative experience in national security affairs.
Prior to his appointment at the Department of Defense in May 2011, Mr. Rosenblum was the Deputy Under Secretary of Intelligence for Plans, Policy, and Performance Management, Department of Homeland Security, from February 2009 to May 2011. He directed strategic and policy planning for the Department’s intelligence program, oversaw budget development and resource allocation priorities for the synchronization of intelligence programs and priorities, provided stewardship and direction for the Information Sharing Enterprise, and ensured that the intelligence program was aligned with national, departmental, and intelligence strategy and requirements.
Mr. Rosenblum was a Professional Staff Member on the Senate Intelligence Committee from March 2005 to November 2008, leading Committee oversight of Department of Defense human intelligence collection programs and Intelligence Community-wide intelligence collection programs and operations in the Middle East. Concurrently and prior to joining the Committee, he served as the Military Legislative Assistant and National Security Advisor to Senator Evan Bayh from January 2001 to November 2008, where he acted as senior counsel and represented the Senator on defense issues and foreign policy, national security legislative actions, and public affairs. He was a member of the Senior Personnel Staff, National Security Cluster, on the Obama Presidential Transition Team from November 2008 to February 2009.
Mr. Rosenblum held several management and advisory positions at the Department of State and the U.S. Arms Control and Disarmament Agency from August 1994 to January 2001. From April 1999 to January 2001, he was the Executive Assistant/Chief of Staff to the Assistant Secretary of State for Nonproliferation where he provided executive management and policy liaison on the full range of nonproliferation issues. He was the Senior Foreign Affairs Advisor for Northeast Asia at the U.S. Arms Control and Disarmament Agency from August 1994 to April 1999, where he represented the Agency in numerous nonproliferation negotiations and regional security dialogues.
From January 1993 to August 1994, he was the Deputy Political-Military Advisor for the Bureau of Near Eastern Affairs, U.S. Department of State. Mr. Rosenblum chaired an interagency export control working group, providing departmental recommendations on proposed arms sales to the region, and was responsible for ensuring consistency between national policy and regional security assistance activities. He was an Intelligence Officer in the Central Intelligence Agency’s Office of Near Eastern Affairs, Directorate of Intelligence, from September 1988 to January 1993.
Mr. Rosenblum has received numerous individual and group awards from the Department of State, the U.S. Arms Control and Disarmament Agency, and the Central Intelligence Agency. He received his Masters in International Affairs in 1988 from the School of International and Public Affairs, Columbia University, and his Bachelor of Arts in 1986 from Columbian College, The George Washington University.
Anyway that should give everyone a little more to work with, given the heightened domestic military operations surrounding the Boston aftermath, it is important to get a sense of where the Pentagon sees itself going in these reactions and ongoing operations -- what happens next is another question.
A great move would be publishing the entire text of USNORTHCOM CONPLAN 3502 Civil Disturbance Operations on the Internets immediately!