Disclaimer: This site is *not* affiliated with AIPAC, Ahmed Chalabi, K Street, ClearChannel, or Urban Moving Systems of Weehawken, NJ. In case you were curious. Full disclosure: I have a "long Apple position" and therefore I have an Apple bias.
If secret federal aviation is the Big Lebowski, Bristow is the rug that really ties the room together.
It's been thrilling to watch one of my favorite topics, aviation in covert operations, hit the bigtime over the last few news cycles.A few tweets about suspicious plane hovering over Baltimore 'disturbances' registered to a ghostly "NG Research" at a Bristow, Virginia PO Box cued the story. The FBI conceding to Washington Post that it was their flight set the stage for this. These stories have quietly been leaching out for years. As far back as 2003 (or 2006 in WIRED) references to small aircraft doing domestic surveillance have been popping up. After the Boston Marathon bombing, a small aircraft was traced to the same Bristow VA cluster. Today the story hit turbo with a big AP story, FBI behind mysterious surveillance aircraft over US cities, but there are lots more to find because the AP didn't really go outside of Bristow. You'll find plenty of N Numbers to snoop on below - and cool new tracking techniques too!! Quote of the year?
The FBI asked the AP not to disclose the names of the fake companies it uncovered, saying that would saddle taxpayers with the expense of creating new cover companies to shield the government's involvement, and could endanger the planes and integrity of the surveillance missions. The AP declined the FBI's request because the companies' names — as well as common addresses linked to the Justice Department — are listed on public documents and in government databases.
In my own scoping in the last week or so it appears that these shell company registration were mostly set up around 2010 or 2011, making this an Obama operation through and through. I apologize for not tipping yall more quickly to this impending development but I have been too busy!
This story shows that secret airlines are becoming an obsolete method for the [deep] state, because with the Internet and planespotters it becomes possible to observe and end-run around the secrecy of the networks, as the last big wave of awareness around secret detainee flights in the Bush years really revealed (though mostly in Eurasia, not North America). (2007 Cryptome Story and Category:Alleged CIA pilots - SourceWatch)
.......As the C.I.A. tries to veil such air operations, aviation regulations pose a major obstacle. Planes must have visible tail numbers, and their ownership can be easily checked by entering the number into the Federal Aviation Administration's online registry. So, rather than purchase aircraft outright, the C.I.A. uses shell companies whose names appear unremarkable in casual checks of F.A.A. registrations.
Years ago I asked a staff research person at the Minnesota Department of Transportation if there was something weird about how FAA registration works, if it is designed to hide ownership, and he assured me it had been that way since the FAA had been set up - and went on to tell me that when he was much younger, in the late 1980s he had traced a disappeared pilot to Texas, then found that someone had pulled the flight plans from the FAA file. This shadowy story was literally the first thing I heard from a government employee when I went asking, confirming my long-running theory that everyone has some kind of story that touches on the corrupt secret government or deep state.
Naturally the FBI/DOJ also has its own similar shells. Due to incredible laziness the feds registered tons of them with the same name pattern at the same locale in Bristow VA. Here, have some original art I made on May 25, well before the Star Tribune and Associated Press picked up this story!
Several independent parties put these pieces together and triggered the massive news snowball today. Probably the first to catch a large section of it was john wiseman (@lemonodor), who figured out good methods for tracing the transmitters and radio traffic. My friend Sam Richards (@MinneapoliSam) was the first as far as I know to put together the larger data set about the Bristow VA node, after getting a tip about a sketchy spy flight over Minneapolis, although Wiseman verifiably came up with a whole bunch of the shells in early May. Wiseman explains his narrative in new post: Tracking FBI aerial surveillance (with images, tweets) · jjwiseman · Storify
Below is a listing of 100 aircraft registered to shell companies that do not exist. The US Department of Justice can claim plausible deniability for owning and operating these aircraft however that is a flimsy defense. At the time of posting, a number of these aircraft may be airborne over American cities, equipped with surveillance, stingray, or other hardware. FOIAs are being drafted and will be submitted so it is only a matter of time before a brighter light is shined upon these secretive operations.
For examples of the flight patterns conducted by many of these aircraft within the last few days, check:
Here's an article by the ACLU highlighting why these operations are of concern https://www.aclu.org/blog/ohio-aerial-surveillance-system-moving-forward... "ARGUS, the high-flying drone technology capable of capturing super-high-definition video of a 15-square mile area and automatically tracking all moving vehicles and people within that area. I pointed out that this makes possible our nightmare scenario for drones: wide-area mass surveillance and location tracking of entire cities and towns."
Now the FBI is an onerous position where they have to turn over, de-register or re-register all of these planes, somehow reconciling rebuilding the secrecy of the fleet exposed above with the FAA's registration system, and the hordes of planespotters out there now reinforced by tons of interested activists cued into the national scope of this operation. Good luck Feds!
SOURCE: View image: image5. This plane has been flagged as using the JENA code which seems to be the usual code until probably around now. Images scaled down, resize to see more. N959JT is of course registered in Bristow VA. Bonus points awarded for pink toenails in spotting this secret aircraft machinery which seems to resemble the gear spotted on the recent Minneapolis plane.
I live in Phoenix and my coworker was telling me she's been noticing this plane circling around their neighborhood the past 12 days. They started tracking the planes on Flightradar24 and she sent me these screenshots of some of their flight paths: http://postimg.org/image/tpdhpd789/http://postimg.org/image/o2h4rw4pl/http://postimg.org/image/uuc58hj2x/ She even had a pilot friend go down to the airport that they've been flying out of and do some snooping. He found took this photo of the camera equipment mounted to the bottom of the plane: http://postimg.org/image/hm861sw61/ She said that it's always the same 3 tail fin numbers which take turns doing the same flight path. They start at daybreak and only stop late in the night.
Update: Here's another pic my coworker got of one of the planes parked at the Deer Valley Airport in Phoenix. You can see the camera equipment on the side: http://postimg.org/image/oj5bwlcjn/
She also said over the past couple days all the tail fin numbers changed on Flightradar24 and they are now all showing up as some variation of "JENA". Screenshot: http://postimg.org/image/n3ahqjgql/
Finally it is worth noting it has been difficult but not impossible to get credit to independent journalists for blowing up this story. I appreciate Bob Collins at Minnesota Public Radio's Newscut for engaging on Twitter when we pressed him on the issue of crediting the story, and including references to Sam's original medium.com story, while the Star Tribune and AP did not credit Sam at all. (Although the Strib has been communicative recently and I have some hope they will circle back within a few days).
Additionally I suspect "CHAPPARRAL AIR GROUP" may be another front, they got a craft from the DEA: N540DB. seeHelicopter Flying Above Claycord on Thursday Afternoon —claycord CLAYCORD.com: "A google search of the tail ID can help you confirm this also, where you will find no shortage of photographs of this specific aircraft operating out of Concord and San Jose. Note that the federal government recently (2011) transferred registration of 15 Federal law enforcement helicopters out of the names of the Department of Justice, DEA, to an entity in Texas called the Chaparral Air Group."
Before the story broke we had a bunch of diggings, now it's time to share! MORE RELATED RAW DATA:
NOTE there are some false positives and general "NOISE" in here, please proceed with discernment!!!
In broader context, the Obama administration has continuted to expand the use of intelligence tracking, including fusion centers and electronic intelligence, to keep rebellious groups under control, as addressed here
On April 29, a Cessna 206H registered to National Aircraft Leasing Corporation circled overhead for hours at about 3,500 feet, flying repetitively over western Baltimore. On the nights of April 30, May 1 and May 2, another aircraft, a Cessna Model 182T registered to a company named NG Research in Bristow, Virginia, flew over the same areas at a similar low altitude.
Also on May 1 and May 2, an unidentified Cessna Citation V jet made similar nighttime flights, orbiting Baltimore at the relatively low altitudes (for a jet aircraft) of 6,400 and 9,400 feet, based on records from Flightradar24.
Kind of vague hit comes up for the google search on National Aircraft Leasing Corporation
Edit 3: After looking through the list of aircraft registered in Bristow, VA for a town of 15,000 there are 64 aircraft registered including one owned by the Department of Justice. All within the past decade most within the past 3 years. Most of them are owned by companies with 3 letters then what they do RKT Productions, PSL Surveying, KQM Aviation, LCB Leasing, NBY productions etc. They also all are operation 182t Cessna’s. All of the companies only have a PO Box in Bristow. Looks like an FBI airport.
The one tail number that the initial Washington Post article linked to is N39MY, which is a Cessna 182T registered to NG Research, PO Box 722 in Bristow, VA. That company's web presence is close to zero, basically below the noise floor.
If you google [po box bristow va] you find FAA records for a bunch of other oddly named companies that all have similarly close-to-zero web presence and addresses that are PO Boxes in Bristow: FVX Research, NBR Aviation, NBY Productions, OBR Leasing, OTV Leasing, PSL Surveys, PXW Services. They all seem to like Cessna 182Ts.
If you Google the tail numbers of aircraft registered to those companies, you start to find forum and mailing list posts (often at sites that tilt toward paranoid/conspiracy/right wing, but not always) with people discussing these specific tail numbers and linking them to the FBI. Some of the supposed evidence includes details of radio communications that people have heard, e.g. talking about "being on station" or using callsigns that start with JENNA, JENA or ROSS, which are supposedly used by the FBI. Other posts claim that DOJ/FBI surveillance aircraft often squawk 4414 or 4415 on their transponders.
I monitor aircraft in Los Angeles using an RTL-SDR dongle. I keep a database of almost every transponder ping I receive. You can see some more info, analysis and examples of stuff I've seen (U-2, AF1, AF2, EXEC-1F, E-6 "Doomsday" planes) at
I decided to check my database for planes that have squawked 4414/4415 or used one of the suspicious callsigns: I found 8 aircraft in the past 2 months, several of which exhibit suspicious behavior: Flying for hours at a time without going anywhere in particular (I don't have position information for them, but I know they're in the air and not leaving the LA area), flying almost every day for months at a time, squawking 4414 or 4415, and one that used a JENNA callsign. 2 of them are registered to companies with PO Boxes in Bristow, VA. Another is registered to AEROGRAPHICS INC. 10678 AVIATION LN, MANASSAS VIRGINIA, which googling shows has also been linked to the FBI/DOJ. Several others are registered to WORLDWIDE AIRCRAFT LEASING CORP and NATIONAL AIRCRAFT LEASING CORP in Delaware, similar to other suspected FBI front companies (e.g. Northwest Aircraft Leasing Corp. in Newark, Delaware).
(I call what I'm doing "persistent sousveillance": using historical sensor data to retroactively identify and track new subjects, it's just that my subjects are the government. One of the surprising things I've found is that all you need to do is look: the weird stuff jumps out right away, e.g. Cessnas registered to fake-sounding companies that loiter overhead for hours every day.)
It's a lot of circumstantial evidence, but at this point it doesn't seem far-fetched that I'm monitoring aircraft involved in persistent FBI aerial surveillance.
Edit: One other thing worth mentioning is that I was surprised at how many local news stories I turned up while googling these planes & companies that fit the template of "Citizens complain about mystery Cessna flying low, circling over their neighborhood".)
The FAA manages this program and NBAA no longer has any policy or administrative control over the FAA ASDI Block program. However, if you have general questions or concerns about the FAA process, contact NBAA's Operations Service Group firstname.lastname@example.org (202) 783-9250.
The FAA’s primary electronic mailbox for all aircraft blocking and unblocking requests and for related inquiries directed to the ASDI blocking program isASDIBlock@faa.gov.
102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JUNCTION, VA 24529-3110461AJ 18282225 RKT PR
ODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA 20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS PO BOX 502BRISTOW,VA 20136-0502912EX 18282231
OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632
N-Number Serial Number Name Address102BR 18282264 OTV LEASING PO BOX 636BRISTOW, VA 20136-06361176R 18281688 CARTER JOHN B 190 CAMPUS BLVD # 320WINCHESTER, VA 22601-287214205 18281889 ANESTHESIA AVIATION LLC 206 ROSEMEADE PLACELEESBURG, VA 20175142LJ 18282272 OBR LEASING PO BOX 725BRISTOW, VA 20136-07251725L 18282019 MEYER FRANK 3025 NATHANIELS GRNWILLIAMSBURG, VA 23185-7505182EM 18282233 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802223EM 18282252 KQM AVIATION PO BOX 721BRISTOW, VA 20136-07212451Z 18280949 MASCIOLA MICHAEL J 8138 QUINN TERVIENNA, VA 22180-7467267RH 18282208 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802274BB 18282270 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726290RM 18282215 NG RESEARCH PO BOX 655BRISTOW, VA 20136-0655302MP 18282273 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721311SB 18282246 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752318SJ 18282251 OBR LEASING PO BOX 725BRISTOW, VA20136-0725319KS 18282243 FVX RESEARCH PO BOX 554BRISTOW, VA 20136-0554323LP 18282244 RKT PRODUCTIONS PO BOX 926BRISTOW, VA 20136-092633HA 18282279 HORIZON AIRCRAFT SALES & LEASING INC 2801 AIRPORT DRCHESAPEAKE, VA 23323-6411361DB 18282245 LCB LEASING PO BOX 726BRISTOW, VA 20136-0726404KR 18282203 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725411CP 18282232 KQM AVIATION PO BOX 721BRISTOW, VA 20136-072141DL 18281142 LDAIR INC 7198 HOLLYBERRY RDROANOKE, VA 24018-5510428MT 18282234 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656444VB 18281034 YOUNG REGINALD S 1218 HITE DRBUFFALO JU
NCTION, VA 24529-3110461AJ 18282225 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615467TS 18282239 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07565101U 18282156 SYCOLIN ENTERPRISES LLC 18930 LOUDOUN ORCHARD RDLEESBURG, VA 20175-68575141Y 18281077 COMMONWEALTH OF VIRGINIA 2600 WASHINGTON AVE FL 3NEWPORT NEWS, VA 23607-4317514NY 18282271 NBR AVIATION PO BOX 752BRISTOW, VA 20136-0752520EP 18282274 PXW SERVICES PO BOX 802BRISTOW, VA 20136-08025273F 18282193 PSC LEASING LLC 9500 INNOVATION DRMANASSAS, VA 20110-2210527KM 18282260 NG RESEARCH PO BOX 655BRISTOW, VA 20136-06555340X 18281207 AGVEST LLC 1210 HILLMAN HWY NEABINGDON, VA 24210-4137539MY 18282238 NG RESEARCH PO BOX 722BRISTOW, VA 20136-0722562CB 18282207 KQM AVIATION PO BOX 721BRISTOW, VA 20136-0721576DS 18282229 LCB LEASING PO BOX 726BRISTOW, VA 20136-072660430 18281839 COUNTY OF HENRICO VIRGINIA PO BOX 90775HENRICO, VA 23273-0775657TP 18282253 PXW SERVICES PO BOX 802BRISTOW, VA 20136-0802731CL 18282256 NBY PRODUCTIONS PO BOX 656BRISTOW, VA 20136-0656747GK 18282029 EASTERN STEARMAN INC TRUSTEE 42061 BALD HILL RDLEESBURG, VA 20176-6020806TH 18282266 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-0632811AH 18282240 OTV LEASING PO BOX 831BRISTOW, VA20136-0831824HA 18281824 VAJ COMPANY LLC 3850 FIELDCREST DRRINER, VA 24149-2590879WM 18282216 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-07569036B 18282258 HELSLEY WILLIAM W 10350 BELLA LNMC GAHEYSVILLE, VA 22840-2435906TM 18282269 RKT PRODUCTIONS PO BOX 615BRISTOW, VA 20136-0615910LF 18282284 NBY PRODUCTIONS
similarly there are some hits here. for entire listing in LOUDOUN county
PO BOX 502BRISTOW, VA 20136-0502912EX 18282231 OBR LEASING PO BOX 725BRISTOW, VA 20136-0725916WR 18282262 PSL SURVEYS PO BOX 756BRISTOW, VA 20136-0756981MR 18282212 NBY PRODUCTIONS PO BOX 502BRISTOW, VA 20136-0502984JS 18282218 FVX RESEARCH PO BOX 632BRISTOW, VA 20136-063
Possible tech or similar
PERSISTENT REAL-TIME INTELLIGENCE OVER A WIDE AREA -- DAY & NIGHT
A tiny peek into a huge deal: the potential fracas between assorted would-be American military cyberwar commandoes and international (and domestic!) computer activists. This lower-level report (Unclassified//For Official Use Only) (U//FOUO) perhaps is more interesting for its "metadata" rather than thoroughly censored content. Below I also included some other domestic military operations documents below to draw a wider context than just this "cyberwar" stuff, as Ferguson has prompted Gov. Nixon in Missouri to activate the state militia, it's good to read up on what federal legal doctrine for "civil disturbances" is.
Such recipients: In order, it says it is from "DIRECTOR FBI" to:
DNI WASHINGTON DC - Director of National Intelligence. (Clapper at the time)
HQ AFOSI Andrews AFB Maryland - Air Force Office of Special Investigations. Tip, if you have some message for them, use their unencrypted contact form to let them know about fraud or etc. What could possibly go wrong? > http://www.osi.af.mil/main/contactus.asp
HQ NORAD USNORTHCOM INTEL PETERSON AFB - US Northern Command located near Colorado Springs was created as Dept of Homeland Security's military counterpart for "Homeland Defense", an elastic concept extending Pentagon involvement with "critical infrastructure," namely the machinery of major corporations. They also revised "GARDEN PLOT" into CONPLAN 3502 Civil Disturbance Operations," relevant in a Ferguson type context under federal mobilization. (see 2010 story) They were also written into Superman's plot.
JOINT STAFF Washington DC - J2 - Director for Intelligence (J2) on the Joint Chiefs of Staff (now this guy)
NGA HQ Bethesda Maryland. The National Geospatial Intelligence Agency, like DIA, is up to a lot of things off the radar. They have domestic satellite spying (GEO INT) responsibilities at National Special Security Events which require a special domestic military intel privacy waiver. http://www.stratcom.mil/functional_components/ . Big spenders.
NSA FT GEORGE G MEADE Maryland - National Security Agency at the oddly spelled out Ft Meade. I wonder how many land in this inbox - and how many times "George G" is stored in their databases.
US SECRET SERVICE WASHINGTON DC
USCYBERCOM FT GEORGE G MEADE Maryland - Cyber Command in ur router, sniffin ur packets
WHITE HOUSE SITUATION ROOM WASHINGTON DC.
BT . … I am fairly sure this is a closing list tag like </UL>
Serial IIR 4 213 4003 12, "WARNING (U): This is an information report, not finally evaluated intelligence. It is being shared for informational purposes but has not been fully evaluated, integrated with other information, interpreted or analyzed. Receiving agencies are requested not to take action based on this raw reporting without prior coordination with the FBI. Unless a conviction in a criminal proceeding occurs, a presumption of innocence exists for any person being reported on in this IIR." Declassification date appears 20370607, as this hot stuff needs to lay low for a couple more decades.
What is an IIR? It is pretty low level stuff for the FBI. For a bit of info see FBI Intelligence Information Report Handbook | Electronic Frontier Foundation. That document interestingly, at the very end includes a statutory info pipeline from Grand Jury operations to various feds. Patriot Act Section 203(a)(1)( C )(i)(V) certainly makes for an industrious star chamber circuit, but they don't want grand jury info going out in IIRs without asking the HQ attorney.
This document was obtained by Smiley Hill via FOIA. Please follow https://twitter.com/smilyus for more smileable FOIAs on a regular basis.
The use of the military - and these contractors in the game now - to police corporate systems labeled as Critical Infrastructure is significant. After all, Missouri Gov Nixon just activated the state militia because of Ferguson.
“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”
As for the legal ramifications of domestic military operations and targeting electronic activists with tools like STRATCOM / CYBERCOM retain for battling Al Qaeda servers or whatever, most people say "But, Posse Comitatus!" In reality a vast area of domestic military operations has been expanded and operated by JAGs. See : www.loc.gov/rr/frd/Military_Law/pdf/operational-law-handbook_2012.pdf
This Domestic Operational Law Cyber Realm has a Handbook, People!
PI highlighted a bunch of good 2011 stuff, since we are talking Ferguson anyway, it's worth noting again:
G. The Department of Defense Civil Disturbance Plans
Formerly, DoD’s Civil Disturbance Operations (CDO) plan was known as “GARDEN PLOT.” Since the creation of the Department of Homeland Security and USNORTHCOM however, DoD has delegated to geographic combatant commanders responsibility for developing CDO Contingency Plans (CONPLANs). These geographic commanders’ CONPLANs provide guidance and direction for planning, coordinating, and executing military operations during domestic civil disturbances.
1. Civil Disturbance Operations Mission
Broadly stated, the CDO mission assists civil authorities in restoring law and order in the United States and its territories.58 This mission statement, while not duplicating the language in the Insurrection Act allowing for the use of federal forces to “suppress” insurrection, provides wide latitude to the President to use federal forces to assist civil law enforcement in “restoring” law and order.
The restoration of law and order must be distinguished from the preservation of law and order. CDO mission statements do not allow the joint civil disturbance task force commander to undertake preservation missions. It is generally agreed that missions to restore law and order include dispersing unauthorized assemblages, patrolling disturbed areas, maintaining essential transportation and communications systems, setting up roadblocks, and cordoning off areas. Care should be taken before a military commander accepts missions that are routine maintenance of civil order.
2. Combatant Commanders’ CONPLANs
The CONPLANs provide the basis for all preparation, deployment, employment, and redeployment of Department of Defense component forces, including National Guard forces called to active federal service, for use in domestic civil disturbance operations, in support of civil authorities as directed by the President. The concept of a civil disturbance operation is multi-phased: Phase 0, Shape; Phase I, Anticipate; Phase II, Respond (deployment can occur in either Phase I or Phase II); Phase III, Operate; Phase IV, Stabilize; and Phase V, Transition (redeployment). Prior to deployment, military forces maintain five preparedness postures, called Civil Disturbance Conditions (CIDCONS) in order to alert and react to potential civil disturbance operations. Changes in the CIDCON level are directed by the JDOMS.
3. The Standing Rules for the Use of Force for U.S. Forces
Civil disturbance operations are conducted in accordance with Appendix L of the Standing Rules of Engagement/Standing Rules for the Use of Force for U.S. Forces (SRUF). Guidance on how and when forces can use force in a CDO mission are detailed in that annex. Although the CJCSI is classified, Annex L is not and can be shared with our mission partners.
a. Custody and Detention
All apprehensions should be made by the civil police force unless they are not available or require assistance. Military forces have the authority to detain rioters, looters, or other civilians committing criminal offenses. Civilians taken into custody should be transferred to civilian law enforcement authorities as soon as possible.
All members of the force must remember that state and federal criminal law and procedure govern apprehension. Apprehension is justified only on the basis of probable cause to believe that an offense has been committed and that the person to be apprehended committed the offense. Soldiers should not question detainees beyond basic pedigree such as name and address. If formal questioning of an offender is necessary, civilian police should conduct the interview. If civilian police are not available, CID agents or military police may conduct interviews only if the interview is essential to the civil disturbance mission. Actions taken by Soldiers that do not conform to criminal law constitutional standards could jeopardize future prosecution and subject Soldiers and their Commanders to criminal and/or civil liability.
b. Search and Seizure
CDO CONPLANs anticipate that military forces will generally not be involved in searches unless there is “an immediate danger of violence, destruction of evidence, or escape of violent persons unless the search is conducted without delay.” In all other cases, local authorities should conduct searches. When required to perform searches, federal armed forces may conduct warrantless searches under the same constitutional parameters imposed upon law enforcement officials. Joint Civil Disturbance Task Force forces conducting a warrantless search will fully document the reasons for the search as soon as is reasonably convenient.69 Generally these searches are limited to the following incidents.
(1) Stop and Frisk
If there is a reasonable suspicion based upon articulable facts that a person has committed, is committing, or is about to commit a crime, that person may be temporarily stopped and questioned about his activities. The stop must be limited in duration to that which is reasonably necessary to investigate the suspicion. If there is a reasonable suspicion based on articulable facts that a person is armed or is carrying instruments of violence and that the individual presents an immediate risk of harm, members of the armed force may conduct a “frisk” (an external “patdown” of the clothing) for weapons. Any weapons found during a frisk may be removed from the individual and seized.
(2) Search Incident to Lawful Apprehension
A person lawfully detained may be searched for weapons or destructible evidence. A search for weapons or destructible evidence may also be conducted in the area where the detained person could reach with a sudden movement to obtain a weapon or destroy evidence.
(3) Exigent circumstances
Military forces assisting law enforcement may make a search without a warrant when they have reason to believe (probable cause) that weapons, objects related to criminal activity, or persons believed to have committed an offense, are in the place to be searched; and they have reason to believe that the delay necessary to obtain a search warrant would result in removal of the weapons or destruction of the objects related to criminal activity. For example, Joint Civil Disturbance Task Force forces may stop and search an automobile without a warrant when there is reason to believe that the automobile contains weapons or instruments of violence and/or contains an individual reasonably believed to have committed violence.
Military forces in a civil disturbance operation may make an immediate entry into a building when there is reason to believe that entry is necessary to prevent injury to persons, serious damage to property, loss of evidence, to protect public safety, or to render aid to someone who is in danger.
(5) Hot pursuit
Military forces pursuing a person who they have reason to believe has just committed a serious crime, may enter a vehicle or building believed to be entered by the suspect and search the building or vehicle for the person or any weapons that might be used to further his escape.
(6) Plain View
During the course of otherwise lawful activity, military forces may seize any unlawful weapons or objects related to criminal activity which they observe in plain view. When conducting warrantless searches that require a probable cause determination, military forces can obtain advice from a judge advocate; however, the probable cause determination must be made personally by the individual desiring to conduct the search.
If a search warrant is required, local civil authorities should obtain judicially issued search warrants. If local civilian authorities are not available, judge advocates need to be prepared to provide advice on probable cause to military authorities before they approach a local judge or magistrate for a search warrant.
When feasible, all searches conducted by military personnel will be conducted by two personnel with the actual search performed by someone of the same sex.76 A hand receipt or some similar document should be prepared when items of personal property are seized from an individual.
c. Confinement Facilities
The Joint Civil Disturbance Task Force should not operate a detention facility. Any person apprehended should be turned over to the police for detention. Military correctional facilities cannot be used to detain civilians. If available civilian detention facilities cannot accommodate the number of detained persons who are awaiting arraignment, the Joint Civil Disturbance Task Force commander must seek the approval of the SCRAG and Combatant Commander to set up a temporary detention facility.
Should the Task Force be required to operate a detention facility, the detention facility standards and operations should conform, to the maximum extent possible, to current DoD confinement facility operations and will be under the professional supervision and control of Military Police personnel. The establishment and operation of military detention facilities is a temporary expedient and is authorized only until such time as the custody of detained persons can be transferred to civil authorities.
d. Riot Control Agents
Normally, for CDO the deployment and use of riot control agents is allowed as a matter of U.S. policy. However, initial approval authority for its deployment and use may be retained at a level higher than the Joint Civil Disturbance Task Force Commander and may require a specific request.
This is not the same as a state-level activation, but it is the doctrine that is crafted at the federal level these days so I think it's pretty relevant to Ferguson.
Just had to crosspost this relatively down-to-earth explanation of how all the cell phone data is hoarded in the NSA mass data mining system. What this lacks in documentation it makes up for with relative plausibility & general lack of fancifulness.
SOURCE: Cryptome.org : http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm
25 November 2013
NSA BOUNDLESS INFORMANT Explicated
Date: Mon, 25 Nov 2013 15:37:33 -0800 (PST)
Subject: A very interesting forum post on electrospaces
This was written from a person who purports to actually use the Boundless
Informant tool. The email address is fake of course, but it sounds both
knowledgeable and credible.
If the source is genuine, it provides considerable insight into the use and
capabilities of the tool. It seems to do a lot more than we've seen so far,
including the ability to see individual call detail records.
It also gives us clues to how mobile interception is accomplished.
I'm seeing a great deal of confusion out there about NSA databases and how
reports are generated from their architecture. Here is how it works:
Let's begin with rows and columns making up a matrix, variously called a
table, array, grid, flatfile database, or spreadsheet. In the database world,
rows are called records, columns are called fields, and the individual boxes
specified by row and column coordinates -- which hold the actual data --
are called cells.
For cell phone metadata, each call generates one record. NSA currently collects
13 fields for that call, such as To, From, IMEI, IMSI, Time, Location,
CountryOrigin, Packet etc etc, primarily from small Boeing DRTBOXs placed
on or near cell towers.
Because metadata from a single call can be intercepted multiple times along
its path, generating duplicative records, NSA runs an ingest filtering tool
to reduce redundancy, which is possible but not trivial because metadata
acquisitions may not be entirely identical (eg timing). After this refinement,
one call = one metadata record = one row x 13 columns in the BOUNDLESS
Cell phone metadata is structured, unlike content (he said she said). However,
as collected from various provider SIGADs, it is not cleanly or consistently
structured -- see the messy example at wikipedia IMSI. So another refinement
is needed: NSA programmers write many small extractors to get the metadata
out of its various native protocols into the uniformly formatted taut database
fields that it wants.
After all this, for a hundred calls, a metadata database such as BOUNDLESS
INFORMANT consists of 100 records and 13 fields so 100 x 13 = 1300 cells.
A counting field (all 1's) and consecutive serial numbers (indexing field)
for each record may be added to facilitate report generation and linkage
to other databases, see below.
-1- The first point of confusion is between BOUNDLESS INFORMANT as a flatfile
database (we've never seen a single row, column or cell of it) and the one-page
summary reports that can be generated using BOUNDLESS INFORMANT as the driving
database (eg, the Norway slide).
These BOUNDLESS INFORMANT reports give the number of records (rows) in the
table after various filters have been applied (eg country, 1EF = one end
foreign, specified month, DNR type, intercept technology used, legal authority
cited FISA vs FAA vs EO 12333).
BOUNDLESS INFORMANT does NOT report the number of cells nor gigabytes of
storage taken up. It easily could, but it doesn't. Instead, it reports the
main object of interest: the number of calls, after some filtering scheme
has been applied.
-2- The second point of confusion arises over database viewing options. Myself,
I like scrolling down row after row, page after page, plain black text in
8 pt courier font, lots of records per screen, thin lines separating cells,
no html tables. A lot of people don't.
So a cottage industry has evolved around generating pretty monitor displays,
web pages, and ppts from databases; these typically display one record per
screen. All database views are equivalent: given a presentation, you can
recover the database; given the database, you can make the pretty user interface.
Views are dressed up injecting the data fields into a fixed but fancy template
(eg dept of motor vehicles putting your picture field into an antique wood
frame and your name field into drop-shadow text). Nothing but a warmed-over
version of spewing out form letters by mail-merging an address database into
a letter template.
We've not seen *any* view of BOUNDLESS INFORMANT records to date, only summary
reports it has generated. You cannot recover the underlying database from
a few summary reports, only information about the number of records and a
few of the 13 fields.
-3- The third point of confusion: a given database like BOUNDLESS INFORMANT
is capable of self-generating many summary reports about itself. Summary
reports can have views too -- injections into templates. We've seen 3 of
them for BOUNDLESS INFORMANT, Aggregate, DNI and DNR.
Databases can be sorted, according to the values in any column. For example,
if NSA sorted by IMSI, that would pull together all the call records made
from a particular cell phone with that id. Using the counting field, allowing
the activity of each phone to be tallied. Or they could sort to pull up the
least active phones-- to identify the user who tosses her 'burner' phones
in the trash after one use.
Databases can be restricted. If NSA wanted to count the number of distinct
cell phone calls during a given month that originated in Norway and terminated
abroad (1EF one end foreign), it can restrict the records to the relevant
time and location fields, masking out the others. They could compress each
cell phone to a single line and count rows to get summary data on the number
of phones doing 1EF. That summary data could be injected into a template
for a BOUNDLESS INFORMANT slide.
Databases can be queried (tasked) to pull out only those records satisfying
some string of selector logic. For example, you could submit a FOIA request
to NSA in the form of a query that consisted of your selectors and a database
like BOUNDLESS INFORMANT to see what call metadata they have on you in storage.
Here you would be wise to request simple output (rows of plain text with
column values separated by commas,CSV format), to keep file size down. Then
you could make your own mail-merge templates and spew out colorful BOUNDLESS
INFORMANT graphs and reports about yourself, or just use the default templates
provided by Excel.
-4- Next up on confusion, relational databases. NSA maintains hundreds of
separate flatfile databases that might however share a field or two in common,
for example someone texting, google searching, or shopping as well as making
phone calls with with a given phone, the number or IMSI being the common
Those other activities involve different fields from those already in BOUNDLESS
INFORMANT, such as your login to eBay or search term text instead of email
It could all be put into BOUNDLESS INFORMANT by expanding the number of fields.
However this doesn't scale very well : it results in the voice call fields
being massively blank for an IMSI making lots of google searches, creating
a huge sparse table that is very slow to process, wasting analysts time (called
high latency by NSA).
Instead, BOUNDLESS INFORMANT will just link to all the other databases which
share a field. And those in turn could link to other simple databases sharing
some other field that BOUNDLESS INFORMANT might lack. And so on -- it's how
all the little constituent databases can be seamlessly integrated..
A query now calls through to this whole federation of linked databases, which
can reside geographically anywhere on the Five Eyes network (though NSA is
moving to one stop shopping from their Bluffdale cloud to improve security
and reduce latency).
The primary provider of relational database software of this complexity is
Oracle. However you can do about all of it free and friendly with open source
MySQL. The Q is for querying -- what NSA calls tasking -- sending off some
long-winded boolean logic string of field selector values and constituent
databases that does the filtering you want.
The result of the query is a new little database, usually temporary, that
you can use to generate fancy views and summary reports. The databases being
updated continuously and storage retention varying, the same query tomorrow
will give a slightly different outcome.
Your all-about-me FOIA request could be formulated in MySQL (first need to
know names of linked databases) and surprisingly, the query string would
be recognized and fulfilled by Oracle or whatever big relational database
NSA ended up using/developing, it's that standardized.
If you're online or call a lot, that could still be a big file given 12 agencies
keeping tabs, notably NSA, Homeland Security, and FBI's DITU. But if you
wrote the query right, it would only take a small data center in the garage
to host the response.
Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]
Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.
Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.
The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.
SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.
U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.
"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."
At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.
Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.
The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.
Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.
Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.
Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.
A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.
The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.
While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]
So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?
Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.
Anyway let's have ourselves some fresh court documents:
A quick update on a number of different fronts developing around 21st century Cointelpro operations. This material includes the important bureaucratic fault line of authorizing "otherwise" illegal government operations, an important topic of research... Granted, Season 3 of the X-Files is playing over my shoulder, a product of a more skeptical decade. Yeah, the truth is out there - and at least here we get tiny, but real, slivers of crucial folds in the origami.
The FBI file and the Minnesota State Auditor files aren't really smoking guns, but they clearly show us interesting & almost totally unknown new levels of the modern 21st century COINTELPRO system. Four apparently new documents about the obscure and rather deliberately shadowy world around the insertion of informants into political organizations, information with implications for any political movement that might get "spammed" by fake realities generated by people working as informant handlers, or also in the state level documents, outstate drug buys, interesting examples of cash, firearms and drugs floating around. The "upper" FBI reality described here certainly has implications for the "lower" state-level drug operations, paid informant & prosecution world - thus they make an interesting contrast for one post!
From two different sources, parts of the FBI's Unclassified / For Official Use Only (FOUO) Domestic Investigations and Operations Guide [DIOG] apparently revised September 5 2007, and from the other set of requests, Minnesota State Auditor Rebecca Otto's office checks in on the processes of outstate drug task forces engaged in asset forfeiture, drug buys, firearms stuff. When various audited processes turn out to be fails, some corrective actions are recommended. I'm also throwing in a motion for discovery on certain types of informants that could be promising - the next step down this line.
The topic of the FBI file is certain to make almost any careerist in the world of "that Law thing" squirm because it is a form of documentation showing the entire edifice is one MC Escher-style mobius strip of fake morality, crimes truly authorized on paper -- heavily censored paper, but this is indeed clearly one such paper without any doubt.
Other parts of a similar DIOG file, with the same front page, was published by the ACLU in 2011(included below), but I think we got some new pages here. It's usually hard to find the precise chunks or "twists of the mobius strip of officially sanctioned crime" but fortunately I think we all got at least a few entirely fresh pages via a lucky FOIA. (I'm not totally certain the FBI drop is truly partly-new, but I haven't found key matching pages elsewhere. Plz let me know if you do!)
Group readings of this file [with a toast for every LOL] should be a mandatory drinking game / CLE for every single bar association and law review, because they show that the entire conceit is one big clusterfail, and I would dare any lawyer to make a coherent argument to the contrary.
This new relatively short FBI FOIA, I'm suspecting right now, hit some new paydirt because there are certain subtypes of FBI informants that are described with certain keywords, which could include people violating confidences, including within the media, clergy, doctors, lawyers etc. It opens up a line of inquiry that one Utah attorney Jesse Trentadue, has apparently stumbled into in his long-rolling FOIA lawsuit spurred by the suspicious murder of his brother in a federal prison (see KennethTrentadue.com for more).
At least we get some look at the terrain of specially labeled, high level FBI informants, the Gerald Fords of the world if you will [aka the Warren Commission snitch]. I can't think of another source that quite nails the different categories of FBI informants like the motion posted below, filed in the lawsuit which already has produced this (not to mention hard proof the CIA have at least some formal records of something related to the Oklahoma City Bombing still censored from our reach).
On the Minnesota side, these drug task force audits are in fact publicly requestable records but not released on the interweb by default (part of the reason that very very few people are aware of the state auditor Otto's overall respectable role in the scheme of things).
Let's dive in - look for your favorite weird angle including FBI-controlled front businesses, "otherwise" illegal acts, and creating synthetic detours in authentic First Amendment Expression! Show to your favorite law-and-order acquaintances for some high-quality cognitive dissonance! :-D
Cited as relevant see page 17 as marked, 23 as paginated PDF - AG Use of FBI confidential human sources authorization - includes Media Snitches (violating media confidentiality). The new Trentadue motion demands quantities, not names!
Among the other small angles to consider here, the role of Executive Order 12333 from Ronald Reagan indeed turns out to be crucial in understanding the formal institutionalization of the FBI as a bureaucracy which can operate illegally, in the realm of intelligence. It was pointed out in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider that EO12333 was an important greenlight of sorts, as it led the way for "legalizing the illegal systems" of the "Iran-Contra" world particularly those involving drug and weapons trafficking through private shell companies (and EO12333 does talk a lot about front companies operated for intel functions).
Also I am adding part of a post from Bob McCarty about this case and this particular request, which shows a pretty good avenue into further inquiry. We could expect at least a few more interesting crumbs out of this line of research - certainly, stuff worth looking at. [A whole series of McCarty posts on Oklahoma City and the Trentadue inquiry I haven't even looked at!]
In his motion, Trentadue described the program as one used by the bureau “to recruit and/or place informants on the staffs of members of the United States Congress and perhaps even federal judges, in the national media, within other federal agencies as well as the White House, on defense teams in high-profile federal and/or state criminal prosecutions, inside state and local law enforcement agencies, and even among the clergy of organized religions.”
Trentadue’s interest in the program stems from questions that have surfaced during his ongoing investigation into the death of Kenneth Trentadue, his brother who died in 1995 under suspicious circumstances while in custody at the U.S. Bureau of Prisons Federal Transfer Center in Oklahoma City, months after theOklahoma City Bombing.
With his latest legal maneuver, Trentadue hopes to convince Judge Clark Waddoups to compel the FBI to provide all documentation outlining what he describes in the motion as an“unlawful and unconstitutional domestic spying program.”
The maneuver comes almost four weeks after the FBI answered a federal court complaint Trentadue filed under the Freedom of Information Act to obtain copies of the manual the FBI uses to recruit and place“sensitive informants.” Citing national security concerns as the basis for their response, FBI officials answered that complaint by saying they “can neither confirm nor deny the allegations [of the Complaint] regarding its confidential informant program.”
Shown below, Trentadue’s definition of a “sensitive informant” is, perhaps, the most interesting aspect of his motion:
“…the term ‘Sensitive Informant’ is defined as anyone acting, directly or indirectly and with or without any compensation, on behalf of the FBI as a member of, person associated with or otherwise a participant in or observer of the activity or activities of an entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization AND who does not disclose or reveal to such entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization his or her FBI affiliation.
“A Sensitive Informant is, in other words, some one who is acting, directly or indirectly, on behalf of the FBI as an undisclosed participant in or observer of the activity or activities of an entity, organization, group, governmental agency or unit, association of organizations or individuals, public official, member of Congress, judge, cleric and/or religious or political organization.
“The term ‘Sensitive Informant’ likewise includes what the FBI’s current terminology refers to as a ‘Confidential Human Source’ including any and all sub-categories of Confidential Human Sources such as, but not limited to, what the FBI refers to as a ‘Privileged Confidential Human Source,’ who is someone reporting confidential information to the FBI in violation of a privilege such as an attorney reporting his client’s confidential communications, a physician reporting upon his patient’s medical or mental condition, a cleric informing on a member of his or her church or other religious organization, etc.
In his motion, Trentadue requested the judge order FBI officials to answer 11 critical questions about the scope of their “Sensitive Informant Program” prior to a yet-to-be-scheduled hearing during which, according to Trentadue, FBI officials have said they will file a motion for summary judgment to prevent him access to the information he seeks.
Looking only for numbers of Sensitive Informants and not for specific names from the FBI, Trentadue’s questions target the time frame, “since January 1, 1995.” In short, he wants to know whether or not the agency has had Sensitive Informants inside a variety of government and non-governmental organizations.
Among the government organizations mentioned in his queries were the state and federal court systems, the U.S. House of Representatives and U.S. Senate, federal agencies other than the FBI, federal prosecutors’ offices, and law enforcement agencies at the municipal, county and state levels.
Curiously, he also asked whether the FBI has had a Sensitive Informant(s) who was a cleric or member of the clergy in any religious organization.
Though I doubt the FBI will answer Trentadue’s questions, I’m convinced the attorney will continue fighting until he learns the whole truth about his brother’s death and, perhaps, about the Oklahoma City Bombing, too.
Hopefully not a problem to copy the post as this is a relatively important issue. Anyway I will leave it there for the moment as the hour is late. Informants and protected illegal operations -- truly the can of worms is enormous. The FBI's informant systems across many elite sectors remains to be sniffed out further - and the curious goings-on of obscure rural Minnesota drug task forces also suggests more research is needed.
The other problems with informants, the political spam and the psychological wreckage they leave in their wake -- along with indeed the damage to their own psyches -- will hopefully get further attention, as we have a few other key facts bubbling up. Good luck to everyone on finding more info - regardless of political orientation it's really important to nail down as much of this stuff as possible, before you get spammed by yet another informant!!
"What you have to understand, John, is that sometimes there are forces and events too big, too powerful, with so much at stake for other people or institutions, that you cannot do anything about them, no matter how evil or wrong they are and no matter how dedicated or sincere you are or how much evidence you have. This is simply one of the hard facts of life you have to face."
- Former CIA director and Cercle member William Colby giving advice to his friend senator John DeCamp, urging to quit his investigations into the Franklin child abuse affair and to write a book about his experiences (The Franklin Coverup, 2nd edition, foreword). via archived Institute for the Study of Globalization and Covert politics project - https://wikispooks.com/ISGP/
[TRIGGER WARNING - Your world is controlled by many abusive psychopaths - details/links below. Aside from blockquoting Icke, Madsen & other stories, this post does not reach into many details of the abuse. Some of these links & the 1993 video "Conspiracy of Silence" contain very disturbing material including direct documentation of abuse]
A creepy theme, usually derided by debunker types as 'conspiracy theory' material, has been the frequent overlap between child abuse networks and vertically hierarchical, often sexually-codified, social structures & institutions, particularly those with some degree of control over vulnerable people. However these patterns are typically 'latent' & suppressed in media awareness until the dam bursts. Whether or not this horror encompasses interdimensional entities, blackmailed Nazi operatives or other exotically creepy ideas, the sheer evil of it all can send one's imagination hunting for weird connections. After all, one principal reason this never surfaced until now is because of the cognitive dissonance that tends to deflect our attention from such unthinkable cruelty.
Whether it's the revelation of vast abuse in the United Kingdom, Catholic hierarchies or Penn State, perpetrators & handlers of human trafficking & abuse are often well-protected & truth rarely spills out.
VIDEO: Member of Parliament Tom Watson asks Prime Minister Cameron about protected pedophile activity within the highest ranks of British government at House of Commons Question Time. (source)
Across the United Kingdom, hundreds of new leads & investigations have opened up with broadening awareness that a major BBC pop music presenter and producer, Jimmy Savile, helped mastermind a vast network of child abuse across much of the United Kingdom for decades, implicating major figures in the British Broadcasting Corporation, Parliament, the Prime Ministerial and Royal Family levels of UK society in undeniable horrors.
For years the BBC's hierarchy looked the other way as Savile used his venues to not just abuse children [including it's widely said now, even dead children] directly, but also arrange for their trafficking on behalf of many other powerful figures.
A former BBC director, Mark Thompson, is now 'incoming president and chief executive' of the New York Times, forcing NYT Publisher Arthur Sulzburger Jr to back up their man, since he is obviously under the shadow of the BBC pedo coverup situation.
It's no surprise Savile was able to gather many honorifics thanks to the Royal Family and even made a member of the Knights of Malta (Sovereign Military Order of Malta - a major sketchy European aristocratic network). (additionally, with recent work from people identifying with Anonymous in exposing child porn networks, d0xing abusers, as well as criticism of the sexist, misogynist & creepy issues plaguing such groups as Reddit & "jailbait" subreddits, the 'skeptic humanist' community etc, it seems like these broader topics are finally getting the attention & reactions they need.)
It's important to realize that pedophiles and particularly creepy 'fixers', such as for example, that John Mark Kerr creeper, who bizarrely claimed to have killed Jon Benet Ramsey several years ago, are just outer tentacles, who clearly are 'charmed' with protection from law enforcement entanglements. [In Minneapolis, the longtime Park Police chief was yet another pedo in a key power position]
Icke was right?! Of all people, noted "interdimensional reptilian conspiracy" exponent David Icke gains a certain validation for having documented both Savile's depredations and others, prevailing in exposing ugly truths despite the famously libel-locked down British publishing world. His 5500 word exegesis on this subject is posted below.
I think this statement is well-substantiated - many examples are out there: Icke: "Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control."
A former Tory Minister last night made incendiary claims that one of Margaret Thatcher’s closest aides was implicated in one of the most harrowing child abuse scandals of recent times.
Rod Richards, a former Conservative MP and ex-leader of the Welsh Tories, made the shocking allegation that he had seen evidence linking Sir Peter Morrison to the North Wales children’s homes case, in which up to 650 children in 40 homes were sexually, physically and emotionally abused over 20 years.
Mr Richards also linked a second leading Tory grandee – now dead – to the scandals at homes including Bryn Estyn and Bryn Alyn Hall, both near Wrexham.
He said official documents had identified the pair as frequent, unexplained visitors to the care homes.
Mr Richards – who helped establish the inquiry that unearthed the scale of the abuse – said bluntly: ‘What I do know is that Morrison was a paedophile. And the reason I know that is because of the North Wales child abuse scandal.’
He added that William Hague, who was Welsh Secretary at the time of the inquiry, ‘should have seen the evidence about Morrison’.
Morrison was Lady Thatcher’s parliamentary private secretary and deputy chairman of the Conservative Party.
"From East Belfast's Kincora Boys' Home, via Leicestershire, Staffordshire and London, to the children's homes of Clwyd, we have witnessed 25 years of cover-up. Cover-up, not to protect the innocent but to protect the regularly named elements of the British establishment who surface whenever widespread evidence of child abuse is exposed. From the public schools right through to the Catholic and Anglican churches, child abuse has been allowed a special place of sanctuary... Social workers, police, security services, local and national political figures remain the common factors in the fall-out from the [child abuse] inquiries... In case after case the cycle is described - a child is 'taken into care', then abused in a home, handed on to an outside pedophile ring and out on to the rent-boy/prostitution circuit beyond, if they live that long... Journalists find themselves battling first with authority, then with the libel laws, to publish the truth about a vast web of abuse."
- June 6, 1996, The Guardian, 'True scandal of the child abusers'. These lines were written by the author of the article and are not quotes.
....and so here we are in 2012, 18 years after that Guardian story was posted, previous layers breaking through to the surface anew. The 1990s saw parts of this general elite network [or layer] surface and recede again into obscurity. John DeCamp, a former CIA employee and Nebraska state representative, helped expose a major node of protected child abuse and trafficking in the American heartland.
This could almost be seen as an intra-CIA war or conflict as The Minders was a CIA-linked group that participated in child trafficking as well. Here is the long-suppressed 1993 documentary Conspiracy of Silence. The central figure in Nebraska, the late GOP rising star, Lawrence "Larry" King, bears some resemblance to Jimmy Sevile as another 'doorman to the cesspit' of protected elite child abuse.
Arguably, much of this ugliness, from Jim Jones to the recently deceased Rev. Sun Myung Moon to the CIA-influenced "evangelical" movement (Campus Crusade for Christ was set up as a counterpart to Mario Savio's Free Speech Movement by the CIA) all tie together ritualized group mind control and the inte-generational abuse of minors.
It could roughly add up to the distillation of MK-ULTRA & Nazi-derived research into a mind control template which could be applied across many religious & cultural gradients in Western societies. In the Scandinavian side, the Girl with the Dragon Tattoo series illustrated via fiction Nordic fascist intergenerational abuse families.
Whether or not you find plausible the notion of "entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general", the rest of the piece is an ugly read on a lot of very solid foundations.
Something of massive significance has happened in Britain in the last two weeks which might have been lost on most of the rest of the world. It concerns the revelations about serial child abuse over decades by a man considered by many to be a British ‘icon’ and ‘national treasure’.
Savile’s connections to the political and royal elite are undeniable.
His name is Jimmy Savile and the reason the significance of what is happening may have passed most people by outside the UK is that Savile was a major figure in these islands, but little known beyond them. What, and who, he was involved with, however, is global in nature and has the potential to expose both the staggering scale of child sexual abuse and many of the mega-famous names for whom it is a way of life.
Savile was one of the first in the entertainment field known as ‘disc jockeys’ who emerged with the 1960s music and cultural explosion known as the ‘Swinging Sixties’. I remember him well as a kid appearing on television shows, still in black and white then, and in fact you could hardly miss him. Once seen, never forgotten. He would always appear with dyed hair, mostly blond, and highly colourful and eccentric clothing accompanied by multiple rings and other jewellery. Savile was what they called a ‘one-off’, a ‘character’ and people either loved him or deeply loathed him and thought he was seriously weird. There was little of the half-way about Jimmy Savile.
He began as a disc jockey in dance halls and later managed several of them before he launched a career in the media via the legendary Radio Luxemburg in 1958 and eventually moved to the BBC which was to be his prime public platform for decades. He was a first and last presenter of the ground-breaking music chart show Top of the Pops, which ran from 1964 to 2006, but his biggest claim to fame was the BBC show Jim’ll Fix It which he presented from 1975 to 1994.
This is particularly relevant to current events because it was a programme in which children wrote in to describe what they would most like to do or who they would most like to meet. The programme then ‘fixed it’ for the children chosen to take part. The ‘fix’ could be anything from going up in a hot air balloon to meeting their favourite pop star.
Savile was also famous for his charity work, which included running many marathons. He was also a volunteer porter at the Leeds General Infirmary; a volunteer and fundraiser at Stoke Mandeville Hospital with its world-famous spinal injuries unit; and he was involved with the Broadmoor high-security psychiatric hospital where many famous killers have spent their days. Savile is reported to have had his own room at both Stoke Mandeville and Broadmoor and, it was revealed this week, he was given his own set of keys that allowed him access to many areas within Broadmoor.
His public face was of a jolly and eccentric character who was famous for his trademark expensive cigar and constantly repeated catch phrases such as ‘how’s about that, then?’, ‘now then, now then, now then’, ‘goodness gracious’, ‘as it ‘appens’ and ‘guys and gals’. But away from the screen Savile lived a very different life and operated in very different circles to the ‘man of the people’ image that he so cultivated and it is now clear that much of his charity work was designed to give him access to children and below-age teenagers.
Savile was given a hero’s funeral when he died in 2011 at the age of 84, but a recent television documentary – not by the BBC – has revealed his decades of sexual abuse of underage girls with more revelations coming out by the day. Iceberg and tip come to mind.
Saville was a regular visitor to the royal households, and was close to Prince Philip and Prince Charles.
I was first told about the real Jimmy Savile in the late 1990s in conversations with people who had serious insider knowledge about the British royal family and they said that Savile had been a close friend of Prince Philip until they had fallen out after a ‘big row’.
When I questioned why someone like Savile would be so close to the royal family I was told about his paedophilia and necrophilia (sex with dead bodies) and, of course, his famous voluntary work at hospitals would have given him potential access to the mortuaries.
Savile himself would boast about his connections to the royals and it was publicly acknowledged that he was a regular visitor to Buckingham Palace, Kensington Palace (where Princess Diana lived after her marriage ended with Prince Charles), and Highgrove (the country estate of Prince Charles).
Savile told Esquire: ‘The thing about me is I get things done and I work deep cover. I’ve known the Royal Family for a million years.’
According to the UK Daily Mail at the time of Savile’s death in 2011, he ‘was used as an intermediary in an attempt to resolve the differences between the Prince and Princess of Wales shortly before their split’. Savile said that he was invited to regular meetings with the royal family because ‘I have a natural good fun way of going on and we have a laugh.’
Would one of the world’s most powerful families invite an aging disc jockey into their inner sanctum so often just because he gave them ‘a good laugh’? Or is there likely to be a far more plausible reason for their strange closeness?
I have been writing since the 1990s and a book called The Biggest Secret about the royal family’s connection to Satanism and paedophilia and about paedophile Satanists like British Prime Minister Edward Heath and President ‘Father’ George Bush – just as I have told those who would listen about Jimmy Savile. But all I have had for my trouble from mainstream society is ridicule and dismissal.
Their minds are too closed and too programmed to make the leap into the world as it really is.
Now, in the wake of the public confirmation about Savile, it is time that they did. How many more children need to suffer before humanity grows up and faces the reality and sheer undiluted evil of the force that controls them?
Jimmy Savile and the royal family shared a love of Scotland and the sporting events known as the Highland Games. Savile was the Honorary Chieftain of the Lochaber Highland Games which he attended for 30 years. He had a secluded cottage at nearby Glencoe where Prince Charles was a visitor. Savile said after a visit by Charles in 1999: ‘I’ve had a few nosh-ups with the royals and I thought it was time I returned the hospitality.’
Charles sent a Christmas card to Savile in which he wrote: ‘Jimmy, with affectionate greetings from Charles. Give my love to your ladies in Scotland.’ The reference to the ‘ladies’ was meant for the women that Savile had arranged to serve the Prince during a visit to the Glencoe cottage.
Savile said that he had first been introduced to the royal family in 1966 by (known paedophile) Lord Louis Mountbatten, the uncle and mentor of Prince Charles. Mountbatten was Commandant General of the Royal Marines and arranged for the disc jockey to become the first civilian to be awarded the Marines’ Green Beret. It was one of a many ‘honourees’ that Savile would be awarded in the years that followed. Savile said:
Coming from Lord Louis, who was the favourite uncle of Prince Philip, that was quite something. So obviously I hooked up with the Prince – what was good enough for Lord Louis was good enough for him.
But what was ‘what’? Mountbatten was killed when a bomb exploded on his boat in Ireland in 1979 – a murder officially blamed on the Provisional IRA. New Zealand writer and researcher Greg Hallett writes in his book, Hitler was a British Agent:
Lord Louis Mountbatten was a pedophile, adulterer and homosexual incestuous lover for 10 years … the former King Edward VIII … was truly troubled by the revelations he too had betrayed the Canadians to the German Army, resulting in the open slaughter of those 4,000 men …
… the British monarchy arranged for MI-5 to blow up his boat (1979), happily covering their trail; by fitting up four IRA men … the tactic of blowing up one of your own leaders to cover up any incriminating evidence … was a face saving device to distract from even more damaging intelligence about the British monarchy working for the Germans, against peace, and for a prolonged war.
This is a young Prince Charles with his ‘mentor’ Lord Mountbatten, and father Prince Philip. Greg Hallett names both Mountbatten and Philip as paedophiles. Of course, you don’t just take one person’s word for that, but my own sources which have proved to be so accurate about Savile and others told me the same nearly 15 years ago with the addition that they were both Satanists. This is no surprise given that the British royal family, like all the royal bloodlines of Europe and further afield, are founded on Satanism and the manipulation of occult knowledge for deeply malevolent ends in league with the ‘dark suit’ expressions of the bloodlines in politics, banking, corporations and media.
But Jimmy Savile’s connections were certainly not confined to the royal family. They fanned out into the realms of politics and the rich and famous across the spectrum of human society. In short, he was not only a paedophile himself, but a supplier of children for some of the most famous paedophiles and Satanists on the planet.
The victims of his abuse that are now speaking out in the wake of the television documentary exposing his secret life are only part of a gigantic cesspit of paedophilia, Satanism, drug-running and murder in which he was involved.
I describe him as a ‘doorway to the cesspit’ because if you get past him and his fake persona you enter the sick and depraved world of the global bloodline elite. Savile was a ‘fixer’ – he described himself as such, though not in terms of what he was really fixing. As he told Esquire: ‘The thing about me is I get things done and I work deep cover.’ His most famous TV programme, Jim’ll Fix It, could not have been more appropriately named.
British police have said they are currently following 320 lines of inquiry into Savile’s abuse over decades all over the country, but if they are genuine and tenacious in their investigations and really want to know the truth they can multiply that by a very large number and still not be close to the totality.
If they do really want to uncover the truth they will have to be knocking on the door of Buckingham Palace eventually. If they don’t, it’s a cover up given the Windsors’ close relationship with Savile.
The current public revelations about Savile are being confined largely to the abuse of underage girls, but the truth about the way he supplied girls and boys for people like Prime Minister Edward Heath and so many others must also come out because the barricade is being held at the moment with only his own paedophilia and a few sleazy showbiz people. This is only one aspect of the scandal and his work as a supplier of children for the ‘elite’ is still being hidden in the mainstream media to protect the biggest names. This firewall has to be breached.
Guy Marsden today.
One of Savile’s nephews, Guy Marsden, now 59, has said publicly this week that he and his friends were taken to parties by his uncle in the late 1960s to ‘act as intermediaries for adults and younger children’. He said that the parties were attended by ‘household names’ in showbusiness, but only men – never women.
Marsden, then 13, and some friends from Leeds in the north of England, ran away to London for ‘an adventure’, he said. They were approached by men at Euston railway station and invited to a grubby flat. Then about four days later Savile turned up at the flat by coincidence because Marsden soon learned that his famous uncle mixed with ‘fellow child molesters’. He said he thought he would be in trouble for running away and not telling his parents where he was, but instead his uncle Jimmy just took him and his friends to a ‘much better place’ – the house of a ‘famous pop impresario’ which had a big indoor swimming pool and was one venue for Savile’s ‘paedophile parties’.
Marsden said that little boys and girls would disappear into bedrooms with the famous attendees and it was ‘perfectly obvious’ what was happening. ‘You heard sounds and moans and groans coming from the bedroom and knew what was going on.’ Marsden added:
At night you would get about 15 or 20 people turning up. There would be music and tables full of food, we couldn’t believe it. There was everything we needed and we just hung around.
At first we automatically assumed the children lived there, but we soon realised they didn’t. They would be brought there, sometimes by Uncle Jimmy, and would stay for six or seven hours until 3 or 4am. They were just little kids, boys and girls.
Interestingly, Marsden said that Savile sometimes arrived with a man dressed as a priest and he believed that children being abused may have come from an orphanage or children’s home. They almost certainly did – it fits the modus operandi of the paedophile rings to the letter. What better way to supply your children than have control of children’s homes?
Several of Savile’s victims who have come forward in recent times say they were abused by him at the Duncroft boarding school for ‘intelligent, emotionally disturbed girls’ in Surrey and wherever children and young people are gathered together in a boarding situation needs to be watched like a hawk. These establishments are the predators’ hunting grounds with often their own people appointed to the staff.
Savile at the infamous Haut de la Garenne children’s home in Jersey, Channel Islands.
This is Savile with the children at the infamous Haut de la Garenne children’s home on the island of Jersey in the Channel Islands. Jersey is the fiefdom of mega-rich and mega-crooked networks that combine criminal business, banking and drug operations with paedophilia and Satanism. The island of Jersey, off the French coast,, is only nine miles by five with a population of 90,000 and yet has 55 banks, more than 33,000 registered companies and hundreds of billions of dollars on deposit. It is a money laundering operation of global proportions and attracts the super wealthy with low tax rates.
Haut de la Garenne, or ‘Forest Heights’, was a ‘children’s home’ (detention centre) from 1867 to 1986 and it is clear that it played the role of providing children for sexual and violent abuse by the Jersey Mafia in all its forms – as well as the rich and famous of mainland Britain, including members of the Royal Family.
Jersey has an almost self-contained government of its own, but the Queen remains at the top of its power structure and wherever the ‘Crown’ holds sway, so does Satanism and child abuse.
The infamous Satanist, Edward Paisnel, who was dubbed ‘The Beast of Jersey’ after being jailed for 30 years for the rape of boys and girls, used to play Father Christmas at Haut de la Garenne during the 1960s. You get the picture.
A high-profile police investigation began in 2008 into historic long-term abuse at the home and, unfortunately for those involved, a decent, honest copper was in control of the investigation. This was Lenny Harper, a States of Jersey police detective who led a three-year child abuse inquiry that genuinely tried to expose what happened.
Genuine police officers and detectives who sought the truth in the Marc Dutroux child abuse and murder scandal in Belgium in the 1990s found that refusing to cover up the facts is not a good career move for law enforcement personnel if the truth is leading to rich, famous and powerful people and their networks. So it proved again with the Jersey investigation.
Both sets of genuine investigators were removed from these cases and any credible ‘investigation’ went with them. Lenny Harper, like his counterpart in the Belgian inquiry, was accused of ‘misconduct’ as a blatant excuse to get rid of him – the allegations were later proved false. Harper’s boss, Jersey police chief Graham Power, was also outrageously suspended and neutralised as part of this.
More than a hundred people came forward claiming to have been sexually and violently abused at the Jersey home and Lenny Harper has confirmed that Jimmy Savile’s name came up early in his investigation but with not enough evidence to charge him at the time. Savile denied any knowledge of ever being at the home, but a picture emerged of him at the home to show that he was lying.
Highly significantly, the name of Edward Heath, the British Prime Minister between 1970 and 1974, has also emerged in relation to abuse at Haut de la Garenne and to Jimmy Savile. I named Heath as a serial child abuser and killer and practicing Satanist in The Biggest Secret seven years before he died in 2005.
A local newspaper reporter, or an excuse for one, contacted Heath when the book was published in 1998 and read him the passage. He replied with the usual ‘Icke is crazy’ response and did nothing else. The reporter, a Charlotte Hofton, condemned me for attacking a ‘nice old man’.
I had spoken to many people who said they had been abused by Heath and witnessed his sexual abuses and satanic child murders, while I was told about Savile by those who knew from having access to the ‘inside’. I was therefore confident enough, with direct contract with the abused themselves, to name Heath in the book and defend any libel action. But that never came because what I said was true.
Those who survived Heath’s abuse were the minority. He loved to torture children and then kill them, often by cutting their throats. This was the man who ran Britain for his masters for four years as prime minister and signed us into the fascism that is the European Union.
Heath was famous as an ocean-going sailor in his yacht Morning Cloud which he used to sail to Jersey and visit the children’s home, Haut La Garenne. According to some sources it was Jimmy Savile who supplied children for Heath that would be abused at sea and probably never return.
Savile had many close and intimate contacts in British politics and he boasted that he spent Christmas with Prime Minister Margaret Thatcher and her husband Dennis every year for a decade. Thatcher replaced Heath as leader of the Conservative Party and many of her government ministers were paedophiles.
Edward Heath and Lord Mountbatten, who first introduced Savile to the royal family, have also been connected by some researchers to the Kincora Boys Home in Belfast, Northern Ireland, the centre of another paedophile ring scandal that broke in 1980. It was clear that the authorities knew what was going on for years before that, but did nothing.
Kincora was a home for working class boys, the very type of kids which Mountbatten was said to be most keen to abuse. Kincora children would also be taken to castles and other homes of the rich and aristocratic families, some of whom were connected to the Irish branch of the Hellfire Club. This is the Satanic network established in the 18th century by British politician and Chancellor of the Exchequer, Francis Dashwood, 15th Baron le Despencer, and his close friend, American hero, Benjamin Franklin.
Three members of staff at Kincora were jailed, including William McGrath, a friend and associate of Northern Ireland’s most famous politician, Ian Paisley, but none of the elite clientele were ever investigated, let alone named and charged. The official inquiry (anything but) decided there was no wider ring operating from the home when that was clearly absurd.
The same happened when a paedophile ring was exposed at children’s homes in North Wales in the 1990s, including the Bryn Alyn home in Wrexham. Policemen, social workers and prominent public figures were named during public sessions of the North Wales Child Abuse Tribunal by those abused, but its chairman, Sir Ronald Waterhouse QC, threatened the media with High Court proceedings if the names were published.
First Waterhouse said that this ban applied only to people who were alive and who did not have previous convictions for child abuse. Then he banned the naming of a man who had died 16 years before and another with two convictions of abusing children in North Wales homes. All together now…
Lord McAlpine – denies involvement.
The UK Guardian went so far as describing one of those named as ‘A man who bears the same surname as a prominent Conservative supporter’. The report added that two witnesses had told the tribunal of a rich and powerful man who belonged to the alleged ring.
The now defunct Scallywag magazine named Lord McAlpine, a treasurer of the Conservative Party, and also Derek Laud, a leading ‘mover and shaker’ in Conservative administrations. Both were close friends of long-time Conservative Prime Minister Margaret Thatcher, a close friend of Jimmy Savile. McAlpine and Laud denied the allegations. I am not saying that Margaret Thatcher knew about Savile’s background, only that his friendship with her reveals his connections into the Conservative Party at the highest levels.
Scallywag also alleged that MI5 took foreign diplomats to the North Wales homes and secretly filmed them abusing and torturing boys to use the tapes for blackmail. This is a classic Intelligence modus operandi with regard to child abuse by the famous and influential – especially politicians that they want to control..
Paedophiles and Satanists pervade the world of politics, royalty, banking, corporations and media and it is just as rife in the UK Labour and Liberal Democrat parties as it is in the Conservatives – and among the Democrat and Republican elite in the United States.
War criminal and long-time Prime Minister Tony Blair represented the paedophile-infested Labour Party (see website link after this article) and at his private school, Fettes in Edinburgh, Scotland, he was a close friend of its chaplain, the Very Reverend Dr Ronald Selby Wright, who was known as a persistent paedophile. Edinburgh is a major centre for elite paedophilia and secret societies. Wright was a Church of Scotland Moderator and Chaplain to the Queen and the Fettes historian Robert Philip once said that the young Blair looked up to Dr Wright as a `spiritual mentor’. Philip said: `When Mr Blair was having trouble with the establishment, he confided in Ronald. I think a lot of seeds for his religious faith were sown there.’
And what else?
Tony Blair is reported to have blocked the exposure of famous names during Operation Ore – Operation Avalanche.
Tony Blair is reported to have blocked the exposure of famous names in law, business and politics, including some in his own cabinet, during the police investigation into paedophile Internet activity known as Operation Ore, which came out of the FBI investigation in the United States called Operation Avalanche. Neither convicted any of the big fish – as usual.
The figures in Operation Ore were enormous: 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned; 140 children removed from suspected dangerous situations. But still no major names in the paedophile-infested elite levels of society. Operation Avalanche in the US produced 35,000 Internet records, but only 100 charges.
Blair was leader of the Labour Party at the time of the mass killing of children by known paedophile Thomas Hamilton who walked into Dunblane Primary School in Scotland in 1996 and shot dead 16 children and a teacher before killing himself. Hamilton, like Savile, was a procurer of children for ‘pillars’ of the Establishment.
Scottish judge Lord Cullen was appointed to head the official inquiry into Dunblane and he ordered that significant documents relating to the case should be locked away from public view for a hundred years. He said that this was to protect the victims and families when anyone with a brain could see that it was to protect the Establishment.
Cullen also led the five-judge tribunal which heard the appeal against conviction of the (innocent) Lockerbie bomber Abdelbaset Ali al-Megrahi and decided that he was guilty. It was revealed that Lord Cullen is a member of an elite Freemasonic group based at Edinburgh University known as TheSpeculative Society.
Lord Burton, a former Grand Master of Scottish Freemasonry, told a British Sunday newspaper that Cullen’s ‘inquiry’ was a cover up that suppressed crucial information and he linked Cullen to what he called the ‘Super Mason’ Speculative Society. He said that he had been bullied and threatened by other members of the House of Lords when he tried to raise his concerns about a Dunblane cover-up. ‘There’s no escaping the fact that there’s something sinister about the whole affair’, he said.
Thomas Hamilton wandered around Queen Victoria School, Dunblane’s only private boarding school – just like Savile did in girls’ homes and hospitals – and these people are given so much protection and free rein because they are the sources of children for the paedophiles that run government and law enforcement.
Paedophilia is a fundamental ‘cement’ that holds the networks of manipulation together across all political persuasions and allows those in the shadows to blackmail politicians into introducing legislation that advances the agenda of human control.
Jimmy Savile’s involvement with politicians goes back to the 1960s and he has been a ‘friend’ of so many who have dictated the direction of national and even world affairs, including the long-time Labour Prime Minister, Harold Wilson, who I have exposed in my books as a Rothschild front man and manipulator fully aware of the Orwellian world that he was helping to create. Savile was also associated with paedophile Liberal Party leader Jeremy Thorpe and the London gangland villains, the Kray twins, who are also reported to have provided children for the famous.
The network is just so vast – and global.
Jimmy Savile was also closely associated with convicted pop music paedophiles, Jonathan King and Gary Glitter (who he publicly defended after Glitter’s conviction) and he was into far more than child molestation. Satanists get their biggest ‘high’ from having sex with dead bodies and some paedophiles get their ‘high’ from sex with mentally and physically disabled children. Savile’s charity work gave him access to both.
He was a volunteer porter at Leeds General Infirmary and had his own room at Stoke Mandeville Hospital, with its world-renowned spinal injuries unit, and the Broadmoor psychiatric hospital. Allegations of abuse have come from all three and it is said to have happened with the knowledge of staff. Some children were told by staff to act as if they were asleep when Savile came round to avoid his sexual abuse. Hospitals have mortuaries and Savile’s fellow BBC radio presenter Paul Burnett said without knowing the significance: ‘He did a lot of work as a porter in the [Leeds] hospital that he collected money for. He would go there at night and work as a porter.’ Yes, and what else?
None of this wider background is appearing in the mainstream media. The story is being sold as a famous paedophile being exposed, but of most importance to the big picture here is that Savile was a procurer of children for those in positions of national and international power.
Savile died extremely rich and no one seems to be asking where all that came from. Okay, he would have earned well enough in his prime with television, advertising and personal appearances, but he has done none of that with any serious earning capacity for a long time.
Yet he still owned a Â£160,000 Rolls Royce and had five other cars including a Bentley Turbo and Mercedes 500 SL. He also reported to have owned at least eight homes and left millions in his will on top of that. Where did all the money come from into old age to keep that scale of lifestyle going?
The answer is that child procurement for elite paedophiles is a very lucrative business and also ensures you protection from the law so long as you keep the secrets because if you go down so do your clients. This is why Savile could boast that he was untouchable. He told television presenter Louis Theroux: ‘I can get anything. There’s nothing I can’t get, and there’s nothing I can’t do.’
Those who stay quiet are protected. Those who threaten to speak out are soon dead. The latter was not going to happen to Savile who knew how the game worked and played it for his personal benefit.
Savile was so good at what he did – ‘working deep cover’ – that he was made a member of the Knights of Malta, an elite secret society that I have long exposed in my books, and awarded a papal knighthood by Pope John Paul II in a show of thanks and admiration from the biggest paedophile racket on Earth, the Roman Catholic Church. He was also awarded a knighthood by his friend the Queen and the Establishment in general.
Paedophile and Satanic rings are just that – rings, networks. They include people in all walks of life from politics, law enforcement, judiciary, banking, corporations and media, and they watch each other’s’ backs because their own backs depend upon it.
This happens the world over and most certainly in the United States, as I have widely exposed, and involves a mass of prominent people including US presidents like Father George Bush and major manipulators like Henry Kissinger.
Children’s homes and government mind control programmes are the major source of children for the American ‘elite’. High on the list is Boys Town, Nebraska, which is also known as ‘Father Flanagan’s Boys’ Home’ after its founder, Roman Catholic priest Father Edward J. Flanagan. He established Boys Town in 1921 for the ‘care, treatment, and education of at-risk children’.
If you read the book, The Franklin Cover Up, by former Nebraska state senator, John W DeCamp, you might wonder when the children are most ‘at risk’ – before they go to Boys Town or after. The story almost got out at one point during the Reagan and Bush administrations, but was quickly covered up after this was published in 1989.
So the question is why? Why is paedophilia so all-pervading in these elite levels of human society? The answer is that entities operating beyond human sight which mentally and emotionally possess these people feed off human energy in general, but the energy they want more than anything is that of children before puberty.
The hormonal changes that happen at puberty are only holographic expressions of deeper energetic changes and the entities want that energy before those change takes place. When the paedophile is having sex with the child the possessing entities are using the paedophile as a conduit to draw off the child’s life-force.
The bloodline-possessed are genetically and energetically stimulated to desire sex with children and when they get what they want the entities get what they want – the child’s energy. This requires an endless supply of children to constantly repeat this process and this is where the Jimmy Saviles and Thomas Hamiltons come in.
I see that I have written 5,500 words in this article and yet I could have written 30,000 and still not told the whole story of how Satanism and paedophilia are the foundation and connecting tissue of the global network of human suppression.
People find it so hard to go there, or to accept what appears to be so fantastic, but if the Savile story continues to be pursued tenaciously, and with an open mind, it can open a doorway to expose the darkest of dark.
Dragging a big post together here because it's a loose thing, happening in real time, with some old logs illustrating new predicaments from New Zealand to Texas. All of this post material is out in the open, not SpySquirrel material, but drifting by quick. Everything here seems pretty tenuous but might be useful to have for review. If nothing else there is kind of an old school global hacker madness tone tying this all together, hard to tell what is truthful & hype :-/ Mostly just raises a bunch of questions for further inquiry.
Wired is covering the Kim Dotcom case - one of the world's (literally) biggest cloud hosting provider CEOs taken down by the New Zealand government and FBI; the case is collapsing in court and it's been admitted that their NSA spy sigint equivalent GCSB was illegally spying on him - even the Prime Minister had to apologize. Suggested to search Topsy.com for "GCSB Surveillance" "GCSB Scandal" etc.
The problem with riding out a political controversy is that it makes it very hard to draw a line underneath it.
High profile resignations eventually allowed the Government to draw a line under the ACC mess.
Compare that to the problems Mr Dotcom is causing, which are numerous and largely unresolved. John Banks' involvement is still creating fallout, with the Prime Minister again having to back his coalition partner. This is despite revelations in a letter from Banks' lawyer that the Act leader - who repeatedly stated he had nothing to hide - was concerned about what journalists and Opposition MPs might do with his statements to the police - see: Key still backs Banks, despite letter.
Of course the actual statements are still to be revealed - another political grenade waiting to go off, even as related issues keep John Key occupied. David Shearer's claim that there was a video of the PM discussing Kim Dotcom in February clearly wasn't a knockout blow and as Patrick Gower reports, Shearer's Labour colleagues weren't exactly enthusiastic in support - see: Has Shearer's GCSB claim backfired?.
In the (un)parliamentary melee that erupted as John Key sought to correct a previous statement to the House there were no real blows landed, just some brawling that was difficult to referee - see: Jane Clifton's Smith on a hot tin roof with points-ordering. As Corin Dann points out, however, that is probably enough for the opposition at the moment: 'The fact is that the Government is now having to fight a number of fires on different fronts. It's starting to look a little rattled' - see: No 'gotcha' moment for Key.
The nature of the GCSB may also be preventing Key from dealing with the politics of the issue says Patrick Smellie: 'If lawyers are unwilling to be open about the truth, spy agencies are both obliged and pathologically inclined to withhold information. He simply can't defend himself. In the process, however, his position is eroded' - see: Trust easily lost in age of new media. However, heads may be beginning to roll at the spy agency, albeit slowly, as it appears Hugh Wolfensohn - a key player in signing off on the illegal spying of Dotcom is on 'gardening leave' - see Patrick Gower's Senior spy faces sack over Dotcom debacle.
There will undoubtedly be some gardening leave on offer soon at the Ministry of Social Development. The seriousness and scale of the problem has been underlined by the head of the Government's IT programmes being ordered to do an urgent stocktake of all public computer systems in use by government departments: - see Claire Trevett's Scramble to safeguard IT systems.
Despite denials that the Minister, her office and her department had nothing to do with the outing of Ira Bailey, suspicion remains. Not least because the Minister has a track record: 'Ms Bennett has done a similar thing in the past, releasing the weekly benefit details of a solo mother who challenged a National Party policy. Green Party co-leader Metiria Turei wants a forensic investigation of the computers in Ms Bennett's office' - see: Bennett accused of breaching privacy again. There is clear evidence that Bailey's identity was known in the Beehive. Holly Ford, a member of Ms Bennett's staff, checked out Bailey's LinkedIn profile just before it was leaked to the Herald's Claire Trevett - see: Chris Keall's LinkedIn trail leads to Bennett's office - Ng.
The independent journalist at the centre of it all wasn't impressed with his source being forced into public view, but Keith Ng will be happy with the public response to his work - over $5,500 in donations so far to support his work - see: Blogger raises donations for breaking Winz story.
KimDotcom tweets a news clip on this thing unfolding & more here. Roughly speaking @endarken says... well if i can paraphrase, between the industrial surveillance on Dotcom, the new State Dept cables and others, chunks of the overall surveillance grid are getting exposed in operations from New Zealand to the US. In New Zealand right now the Dotcom surveillance issue is really cooking!
Other things from down under & thereabouts surfacing, including the industrial-strength US-backed spying campaign against MegaUpload proprietor Kim Dotcom, a combination of stuff including Australian diplomatic cables -- cables also showing PM Gillard being noticed as friendly new Leader material for Australia with a thumbs-up from US intelligence.
False Flagging Mossad website attack: Let's get to this purported IRC log @endarken highlights from many months back, which purports to show two hacker-handlers bragging about creating Anonymous false flag operations. The first idea is that "omg" tries to have "rooster" get "zeekill" to jam the Mossad's public website enough to cause a news story -- then they joke about their previous #op false flags and jeopardizing Texas journalist Barrett Brown's life by starting the #opCartel fight between Anonymous & the Zetas Mexican drug trafficking cartel. (google that one)
This could be another spoof writing (packs rather a lot of info, srsly) but it's getting a lot of renewed interest now, if the hit counter's any indication: http://pastebin.com/KtLfurP1
<rooster> Tell me what you told him.
<omg> <omg> just get zeekill to use his BR roots to hit mossad's IP for 20 hours and i'll make sure you and zeekill are free to stroll along with no more interference from "external" parties
<omg> <omg> or if you want just 8 hours
<omg> <omg> enough to have reporters verify Mossad's tango down
<omg> i'll make sure Interpol doesn't get a red notice on him
<omg> his little panda security stunt and with #antisec hacking the site is what will get his ass hauled by SUPO to Spain
<omg> this is what i call leverage
<omg> <omg> do you know it wasn't Sabu's idea to tell Anarchaos to deliver the emails?
<rooster> yes, i know abou that.
<omg> that was my work, along with other stupid Anonymous false operations such as
<omg> #opcartel, #opglobalbackout
<rooster> Yes, that's fine. i know
<rooster> about all of that.
<rooster> i want to know
<rooster> not only, why did you do it.
<rooster> why are you now
<rooster> telling people.
<omg> <omg> i'm one of those horned rimmed guys sitting behind a desk in DC dreaming of ways to manipulate Anonymous for UK's and USA's purpose :)
<rooster> if this is true.
<rooster> give me contact information.
<omg> Anonymous never had leadership that's why it was so easy in the last 6 months
<omg> tell your handlier in NYC
<omg> he'll know
<omg> FBI plays by the books
<rooster> alright. i'll be in touch then.
<omg> however guys like me in counter intelligence don't
<rooster> you'd be surprised.
<omg> oh i know
<omg> don't worry :) i have friends in JTTF
<omg> i assume your magneto's handlier?
<omg> if so call up Philip Selton in DC he's a good friend of my
<omg> tell him 'B' is up to his old tricks
<rooster> i'll look into that. that's what i needed in the first place.
<rooster> im working on something of my own, it's a bit in your department, but i need to talk to someone official about it.
<omg> trying to mitigate the Strafor email damage unfortunally
<omg> did you see the assesment?
<rooster> no i did not.
<omg> ask CT in NYC
<omg> they have it
<omg> Senate Intelligence Committee will have a briefing on it next week
<rooster> oh, i don't go to that. i have someone who gives me things i request.
<omg> prob above your clearance level
<omg> anyways you know about their little group's HTP right?
<rooster> not really. but i'm interested.
<rooster> what can you tell me?
<omg> apparently in an attempt to SE, one of their guy's zeekill ran a SYN+ACK ddos against mossad.gov.il
<rooster> oh, the mossad ddos.
<rooster> done with brazil roots, right?
<omg> from what i gather it's prob CDN servers
<omg> with the bandwidth that was pumped to the site
<omg> the site is on a tier 1 backbone provider with about 1gbs of total speed
<omg> their little gang has some serious bandwidth
<rooster> i guess so. would have to be a good amount to take out something on t1
<omg> haha much faster from what i guess Mossad has
<omg> think it's on a OC-24
<rooster> well, most public sites are on small servers isolated from anything important
<omg> onto a STM-64 uplink
<omg> dunno but what that anonyroot idiot hit CIA's site was pretty high too. The uplink pipe for DC's link was a OC-24
<omg> guys in DS&T had to rotate the public ip three times
<rooster> these guys are persistent fuckers, aren't they?
<omg> well it depends
<omg> most are idiots
<omg> their Anonymous-OS already has a sudoder backdoor
<omg> i think the offical dl count is close to 34K now
<rooster> that was well known
<rooster> and obvious
<omg> about their HTP group from what's read from previous intel reports. It was a splinter group that formed after the HB Gary hack
<omg> they previously use the irc skidr.us
<omg> and apparently the group rotates irc servers monthly
<rooster> i'll be right back.
<omg> figured i should give it a try and try to use their crazy members to try and mitigate the next wikileaks release
<omg> one of them did a quick demo yestoday and was able to bring down Mossad's site
<omg> btw you know Israel already caught that 0xOmar kid right?
<omg> it's embarrassing to see Israel able to catch a hacker weeks after an intrusion, while we don't have CERN teams cyber readiness level to react quickly enough to large scale attacks
<rooster> back, sorry i have two other people relaying information to me.
<rooster> reading, sec.
<rooster> hes the israeli, right?
<rooster> the saudi?
<omg> they caught him in SA
<rooster> yea, the saudi.
<omg> tracked him through credit card purchases
<rooster> yes, i remember when he pastebinned some ccs
<omg> it takes about 2 weeks min to just get a search warrent your whitecollar depts + SS with the DOJ for a simple id theft
<rooster> Yes, i know.
<rooster> fraud isn't just a slap on the wrist.
<omg> and it's a constant battle
<omg> with DOJ versus state level id theft charges
<omg> though it's good to know cybercrime is monitering hardchats
<rooster> yeah, there are eyes on a lot of different places right now
<omg> that's good, though i'm prob the only guy in my agency trying to figure how to not mess things up with current investigations :)
<rooster> if you can disclose, who are you with?
<omg> sorry i cannot
<rooster> just, personal curiosity.
<omg> just contact SSA Selton
<omg> he'll understand
<omg> but i'm not with you guy's at the Bureau
<omg> in fact because of the sealed DOJ docket's, I didn't even know about Xavier Monsegur being a CI
<rooster> Should have, it was actually leaked a while back.
<rooster> also i'm with the bureau, i have to state that if you return this back to anyone.
<omg> i had track down one of your contractors Backtrace to confirm it two months ago in Jan
<rooster> i have a position similar to you.
<rooster> just so that's clear.
<rooster> i don't want break any laws while doing my job.
<omg> i just don't want to mess up any existing investigations
<omg> i thought everything is need to know. Regardless everyone has TS clearance, but certain things such as knowing who is an CI is a need to know
<omg> at the Bureau
<rooster> again, i'm not with the bureau, i do what you do.
<rooster> and it is all need to know
<rooster> but if you look closely
<rooster> you can find out a lot on your own
<omg> <rooster> also i'm with the bureau, i have to state that if you return this back to anyone.
<rooster> hah. wow.
<rooster> that is a typo.
<rooster> meant to say not. i apologize.
<omg> i'm with DS
<omg> of the DOS
<rooster> ive interacted with the bureau
<omg> i'm the guy responsible for mitigating damage caused by Jeremy Hammond sending the Strafor emails to Wikileaks
<rooster> hammon, sounds familiar.
<rooster> what does he run
<rooster> he runs something, i think.
<omg> Anarchaos aka crediblethreat aka Hack This Site founder
<omg> btw did you ever use the nick moop?
<rooster> there are a few people
<rooster> that use that nick
<omg> my suggestion work with Jennifer Emick with Backtrace
<rooster> i've not worked with backtrace directly, but i've chatted to hubris before.
<omg> i've been helping Hubris aka david with some "special projects" such as injecting fake Anonymous operations such as #opcartel
<rooster> i understand about injecting fake ops, like a honeypot
<rooster> but opcartel
<rooster> was too far
<rooster> lives could have been at risk
<omg> not really, only Barret Brown's
<omg> the goal of #opcartel was to get CISEN into iranserv
<omg> and understand the leadership structure resulted in the recent Interpol South American arrests
<omg> and anonworld
<rooster> ah, so you're planting fake ops, to infiltrate.
<omg> #opglobalbackout was a response by that anonyroot's idiot ddos of CIA.gov
<omg> so the NSA could argue for stronger monitering + domestic intelligence
<omg> inject stories such as: http://pastebin.com/pVmAZqWY
<rooster> so is that new internet monitoring bill related at all to OpDarknet?
<rooster> i dont tink
<omg> no it's because of the constant threat of China
<rooster> there is any validity
<rooster> in that pastebin
<omg> + guys like pr0f_srs's dump of the SCADA system
<rooster> i understand SCADA system dumps.
<rooster> how does china play into that?
<omg> and a simple ddos to CIA.gov is enough to invoke the "terrorism" arguement
<rooster> anything is enough to invoke the terrorism card
<rooster> it's so vague, it can be thrown around until it sticks.
<omg> when you have critical US infracture such as a Water Pump Facility, or your Intelligence Agency being under attack?
<rooster> why do you think the reason for monitoring the occupy movement, and various protesters was under a counter-terrorism effort?
<omg> how do you think Counter-Intelligence feels?
<rooster> i think they would feel like they need to step it up.
<rooster> and that's where you come in, correct?
<omg> been doing the injections and manipulation of Anonymous' agenda at the sidelines to push for stronger FBI + NSA prescence
<omg> not everyone in DSS agrees with me
<omg> but when the head of the FBI + NSA is making these arguements to the National Security Council
<omg> ^-- Director
<omg> i've said i've did a good job in the last 5 months :)
<rooster> opcartel, an globalblackout were well recognized, i guess that means you're right
<omg> i'm not involved with Intelligence gathering of Occupy
<omg> it's the boys that are with DHS
<omg> then again they over-react to everything
<rooster> nor am i, but i've a few contacts of mine are.
<omg> shit like Anonymous hackers fucking up train lines?
<omg> yea... DHS your idiots
End of log. This log could be fake or partially fake but it draws a classic picture.
[Side note - the planted story they mention - http://pastebin.com/pVmAZqWY - is a rather silly "message for Anonymous from Mossad" which I remember thinking of as really silly...(BY: A GUEST ON FEB 12TH, 2012 | SYNTAX: NONE | SIZE: 12.71 KB | HITS: 12,109 | EXPIRES: NEVER) ]
Speculating but DSS could be Defense Security Service - http://www.dss.mil/ - which has a purview of defending the Defense Industrial Base generally & that could involve efforts to catch hackers eh? It is a military agency with responsibility for aspects of guarding private contractor installations, so they would seem to have an Interface or 2 to domestic political monitoring. DSS definitely scans websites a lot & shows up in logs but has virtually no public or alt-researcher profile at all. What kinds of programs have they been up to in this exciting era? etc. [Also could be State Diplomatic Security Service but I doubt it - or the odd DOJ Domestic Security Section but that dissolved in 2009 into (this is not a TV show probably): Criminal Division: the Human Rights and Special Prosecutions Section.
Any place run from Quantico AND bonus Fort Meade DISCO Summary from their site:
The Defense Security Service (DSS) is an agency of the Department of Defense(DoD) located in Quantico, Virginia with field offices throughout the United States. The Under Secretary of Defense for Intelligence provides authority, direction and control over DSS. DSS provides the military services, Defense Agencies, 24 federal agencies and approximately 13,300 cleared contractor facilities with security support services.
DSS contributes to national security by serving as an interface between the government and cleared industry. DSS administers and implements the defense portion of the National Industrial Security Program pursuant to Executive Order 12829. Approximately 356 Industrial Security Representatives provide oversight and assistance to cleared contractor facilities and assist management and Facility Security Officers in ensuring the protection of U.S. and foreign classified information. DSS also facilitates classified shipments between the United States and foreign countries and implements foreign ownership, control and influence countermeasures.
The Center for Development of Security Excellence (CDSE) is located in Linthicum, Md., and provides security education and training to DoD security professionals through formal classroom and distributed learning methodologies (i.e., computer-based, web-based and tele-training).
The Defense IndustrialSecurity Clearance Office (DISCO), located in Fort Meade, Md., processes requests for industrial personnel security investigations and provides eligibility or clearance determinations for cleared industry personnel under the NISP.
OMG's comment on DHS - Homeland Security, collecting info on Occupy could have been related to the Critical Infrastructure stuff similar to DSS activities (as well as Federal Protective Service which has been the main FOIA released docs so far).
The Pastebin he references as a lol fake OMG - it's this crazy absurd Mossad threat missive that got tons of views at the time: http://pastebin.com/pVmAZqWY
//// Below the fold - more logs - coverage on the DOJ's system of illegal operations and signaling to cartels, and other loosely related elements ////
Troublesome assumptions about security culture arrangements for closed Occupy Homes national gathering sessions starting tomorrow at the Neighborhoods Organizing for Change MN (NOC Office) around noon put participants at risk. I feel everyone involved means well, but a bunch of particularly 'toxic' situations have materialized. Since these developments reflect larger trends, they need to be fixed if possible, and certainly discussed. [See August 4th story on conflict around meeting closure at NOC Office 911 Broadway Ave on Tuesday] At issue: the desire of the organizers of the Occupy Homes national convening to close the gathering.
The Occupy Homes MN last Saturday, which ran around four hours, reached a vote of 22 in favor of the closure of sessions at the national Occupy Homes convening, 18 against, and 8 standasides. 22/18/8 fails to reach a 2/3rds level of consensus (even ignoring standasides, only 55%). Unfortunately a kind of reverse fait accompli has evidently been imposed on the consensus-based group -- the inability to prevent the meeting closure decision from having been taken earlier by the two delegates means that now the group is [purportedly] imposed upon with a 55% decision. [I have not been able to get comment about when this closure happened exactly]
//// UPDATE Aug 7th: Getting complaints not for attribution from one of the people that arranged the lockout. They say they had a vote of 23, not 22, to proceed with the session lockout. Two initial reports said 22, but even if it is 23, that fails to meet 2/3rds consensus. Let's show exactly how this works, using 23 as the affirmative number lacking 66% consensus. The third chart & data set shows the consensus actually required.
If this doesn't make it obvious there's no 66% support, I don't know what will - no matter whether you factor in the stand-asides.END UPDATE ////
@TshirtToby sent along the following writeup of the Saturday meeting. Thanks Toby - follow him!
/// This is a report about the Occupy Homes MN meeting held on Saturday April 4th.
Once other business was able to be taken care of, the meeting moved on to the contentious issue over the openness of the upcoming conference. The people involved with organizing the conference admitted that they made mistakes and move forward from here.
It was proposed that the conference should be open to everyone. Arguments for and against were made. For openness arguments were made for transparency, spirit of the Occupy movement, worries over the groups involved and their influence. Against, it was brought up with the people outside of Minnesota organizing it on a conference call and it didn't pass a vote among them; didn't want media/informants/undercover government agents at meeting; Talking about sensitive tactics and people personal homes and financials. A vote was taken and it didn't pass.
It had been agreed that it 6 "Participants" and 5 "Observers" to the various panels. This was decided fairly quickly and somewhat sloppily due to time crunch and tensions. This meeting had the second highest tensions I have ever felt during an Occupy meeting.
In my opinion the meeting went as well as it could considering the lack of time to solve an emotional debate. The problem I see is that some of the people invited to this meeting are not from Occupy affiliated groups. These groups don't abide by Occupy traditions of openness and transparency. This could hurt Occupy Homes reputation.
It is my hope that this group will be able to recover from this incident and continue to do its good work. ///
Veteran activists in Minneapolis know full well after many incidents in recent years (see 2008 Republican National Convention, 2009 Grand Jury & beyond), any large gathering can easily be surveilled, yet security culture assertions by those who have promulgated the plan to lock the sessions are simply faulty. It is totally implausible that closing the meeting sessions will spare it the effects of informants or government operatives. This is extremely dangerous -- the faith that security culture can 'work' with this many people around -- and needs to be set aside immediately.
[Protip: In the future, the dangerous power of delegation has to be carefully bounded for nonhierarchical groups, such as instructing delegates under no circumstances may they agree to close meetings to their members. You'd think it was an assumption of everyone, but unfortunately it's not.]
The Movement Resource Group, (Movementresourcegroup.org started by Ben Cohen of Ben & Jerrys, and others) provided a large grant to support this Occupy Homes gathering, grant info attached below. Simply put, if MRG provides more grants sponsoring closed "Occupy" meetings, the critical network topology of openness upon which the entire idea depends will be killed off, sprayed into oblivion by the Roundup of good intentions expressed through grants.
Additionally, as Anthony Newby discussed on the video taken last Wednesday, members from several of the groups flying in to Minneapolis have had their airfare paid by Service Employees International Union (SEIU), although Newby said he wasn't sure if it was the local or national organization.
Alongside the partially closed Occupy Homes series of events, a second specific effort is taking place, and one source said that this affair is at least partially put on by Minnesotans for a Fair Economy (MFE), an organization set up for electoral purposes by the Fight for a Fair Economy network.
At our Saturday, July 28, 2012 joint general assembly, Occupy Bernal/SF ACCE/Occupy Noe agreed to generate support for Wells Fargo Bank (WFB) foreclosure fighter Steve Boudreaux of Atlanta, GA.
He is in foreclosure, and fighting, with the support of his community, to keep his home.
Two of us are attending the first convening of thenew National Home Defenders League in Minneapolis, MN on August 7-8, 2012. Our fellow organizations from around the country are all fighting foreclosures. Let’s show them that our organizations believe in solidarity. Hopefully, after that national meeting, we will have a nationwide organization capable or fighting the banks county-wide.
One source stated that members of at least five of the groups involved in the Occupy Homes summit are also attending the MFE-supported event. It seems likely, though unconfirmed, that the MFE-supported event is the National Home Defenders League convening.
Several of the staffers involved with Home Defenders League [HDL] (also those in MN involved with MFE & SEIU in recent years) share a pretty common background: they were ACORN network staffers & relatively tight-knit. More recently, within the last few weeks, HDL has been staffing up, and HDL opened at the same address as ACCE (Alliance of Californians for Community Empowerment), which itself opened less than two weeks after California's ACORN chapter dissolved, at that same address, with much of the same ACORN staff.
HDL was announced as early as 2010 as a descendant org of ACCE:
/// October 8, 2010 Friday - Home Edition - HOUSING; Freeze sought on U.S. home seizures;
As questions mount about how banks have handled foreclosures, consumer and civil rights groups call for a national moratorium. By Alejandro Lazo and E. Scott Reckard
SECTION: BUSINESS; Business Desk; Part B; Pg. 1
Two advocacy groups -- the Los Angeles-based Alliance of Californians for Community Empowerment and the Greenlining Institute of Berkeley -- this week called for a foreclosure moratorium. The L.A. group said it was forming a separate organization, the Home Defenders League, to help homeowners fight foreclosures. Both groups called on Atty. Gen. Jerry Brown to support a moratorium. ///
This summer has seen an expanded relaunch of HDL in different states. June 6 2012 NY Daily News:
/// About a dozen New York Communities for Change volunteers canvassed Jamaica recently, talking to homeowners facing foreclosure and looking for abandoned homes that have become neighborhood eyesores. Members of the Queens chapter of the grassroots advocacy group knocked on about 300 doors on Saturday to mark the launch of the Home Defenders League. ///
It's really no problem for representatives of HDL-friendly & ACORN network related chapter organizations to join an Occupy Homes meeting like they will tomorrow. With large parts of the gathering put off limits to general participation (there aren't open 'political' events, only socially-oriented gatherings), that presents a major issue with power flows and openness in an ostensibly "Occupy" related gathering.
When many of those orgs are also apparently having a parallel unadvertised gathering supported by an electoral organization [though I do not have further evidence on paper of the arrangement], that looks like two networks tangled in one situation. It's much better in the long run for all of us to openly work on untangling this issue.
Having known quite a few staff working in the milieu of paid political organizations including ACORN, MFE & SEIU, by and large these are good people who have good intentions. Occupy has always supported unions, but is wary of co-option by managerial union leadership.
Many of the homeowners involved in these campaigns are gritty, very well-intentioned union members. This doesn't mean they necessarily support this kind of organizing - with quite a few I've talked to, this sort of thing strikes them as a bad move.
The troubling thing is that quite frequently, people in the paid milieu don't realize their tactical approaches are harmful to the very forces they're trying to bolster. The gradients of structural politics, grants, co-option, working in cooperation and trying to build bridges to turn large projects into movements are certainly not pretty, and makes people uneasy.
This is why the open nature of Occupy as a network has been such a sturdy foundation - it works not as a closed door cabal but rather an open network. Security culture, properly applied, involved small temporary affinity groups working on individual projects, far away from any venues with dozens of people. No more ambitious OPSEC (operational security) approach is really plausible. The closing of information and lines of contact damages the ability of the networks to maintain a 'common operating picture' and the broad, heterogeneous 'weak tie networks' needed to keep projects thriving over the long run.
Occupy Homes MN has most effectively functioned not as one organization, but as another network performing direct actions, in which activists who primarily identify with other organizations kept the projects alive.
The overall principle of openness, not informationally constricted, leaky boxes of withheld information & pseudo 'security culture', is essentially what brings these types of movements oxygen, preventing rot, political ossification, and hierarchical decision-making.
One individual reported to be an attendee at this week's meeting, Jonathan Matthew Smucker, advocated Occupy embracing "Co-Optation". I think this line of analysis runs pretty deeply with the people pushing in this direction.
It's worthy of debate, but debate in open meetings, whether this approach sacrifices goals of more radical, deeper social change for much smaller tactical victories, working with electorally oriented organizations. Without open meetings, the pros & cons of this approach will never get worked out properly.
/// ..... But angst about an over-generalized sense of co-option may be an even bigger problem. We cannot build a large-scale social movement capable of achieving big changes without the involvement of long-standing broad-based institutions. OWS should actively and strategically forge relationships with many of these institutions, while preserving the role of OWS as an "outsider" force.
.........The worst thing we could do right now is make Occupy Wall Street into a small "radicals only" space. We cannot build a large-scale social movement capable of achieving big changes without the involvement of long-standing large membership institutions, including labor unions, national advocacy organizations, community organizations, and faith communities. Radicals never have and never will have sufficient numbers to go it alone. We have to muster the courage and smarts to be able to help forge and maintain alliances that we can influence but cannot fully control. That's the nature of a broad populist alignment.
Social movement theorists have a term for the sort of co-option that Occupy Wall Street should prize: infrastructure co-option. Nascent movements become mass movements not by building their own infrastructure entirely from scratch or recruiting new volunteers one at a time, but by "co-opting" existing institutions and social infrastructure into the service of the movement and its goals. The Civil Rights movement went big when existing institutions—especially black churches and schools—came to identify strongly as part of the movement. Organizers provided opportunities for members of those pre-existing institutions to make this new identification actionable and visible. This was cultivated to such an extent that, eventually, to be a member of certain institutions implied active involvement in the Civil Rights movement. When this happens with enough institutions, the movement gets a huge boost in capacity. And capacity means power.
Over the past few months many organizations and constituencies have been watching Occupy Wall Street, trying to figure out whether and how to relate to it. These organizations—including faith communities, the NAACP, MoveOn.org, labor unions, community organizations, and many other groups—understand how they and their members are affected by the crises that Occupy Wall Street has named and confronted. Some of them are already engaging in important ways, explicitly as part of—or in support of—Occupy Wall Street. And many more have long been engaged in work that clearly aligns with the movement's core values—and probably even deserve some credit for helping to lay the long-term organizing groundwork that helped create OWS.
But there are still significant barriers standing in the way of broader constituencies conceptualizing themselves as part of a 99% movement and getting actively involved. The first and most obvious barrier is that many groups haven't really been asked to get involved. During the first couple months of OWS, if a group wanted to get involved, it was typically a matter of them taking the initiative to approach us and ask what kind of support they might provide. Usually the answer was some variety of "Come down to Zuccotti Park" or "Stand up against Bloomberg for our right to occupy the park." Often the groups that wanted to support OWS simply showed up. While this kind of involvement made perfect sense when we held the park, it's clear that we now have to come up with other ways for more people and groups to take action as part of the 99% movement.
This is a critical transition for Occupy Wall Street and the 99% movement. Remember that Occupy Wall Street kicked off with a well timed call-to-action, a ripe target, some planning, and a lot of crazy luck. As a result, OWS has understandably had more of a culture of mobilizing than of organizing. It's been a little like a group of folks who don't know anything about farming who arrive at a farm at harvest time. There's delicious food everywhere, and all they have to do is pick, pluck, and gather it. And eat it! "Wow," one of them exclaims, "farming is awesome! Why would we waste our time cultivating the soil? This food is delicious! I want to eat it all the time! This is working very well. We should just keep doing this — all the time!"
Occupy Wall Street has been something of a harvest moment. It pulled thousands of people out of the woodwork who'd been waiting for something just like this to come along, and who were in a place where we could carve out time from our lives to engage it. But movements need hundreds of thousands if not millions of active participants to become mass movements. It's difficult if not impossible to activate those kinds of numbers by just taking public action with the hope that other like-minded individuals will decide to join you. We need more on-ramps and more ways to be involved — for folks who might not yet feel comfortable camping out at a public park.
.....And this is why it is now critical that we meet with folks who are movers and shakers in other social networks and institutions. That's how the 99% movement can grow at the rate we all know it needs to; byactivating whole swaths of society at a time.....
.....All of the above gets so much more complicated in an election year. Occupy Wall Street is an outsider force. It should remain an outsider force this year. If it were to endorse candidates or a particular political party, it would immediately lose all of its value and leverage. Our job is to push from the outside.
But that's not at all to say that we shouldn't have a strategy for engaging with the energy and media attention of the election season. We should. And how we do it will seriously affect our ability to continue to grow this movement, to be seen as relevant, to cultivate alliances, and to leverage power to effect real change......
.......Once someone starts running on your rhetoric, you then have more leverage over them. You are better positioned to expose them if they're just giving lip service to your ideas without any intention of delivering. And for all the horrendous limits of the two-party system, still a slate of candidates who get elected pledging to take on the big banks gives us a lot more to work with—as an outsider social movement—than a slate of candidates elected on a pledge to cut social spending. And more importantly, it keeps the momentum on our side.
Another important question has to do with how we engage allies who do endorse candidates. Many labor unions, for example, are likely at some point to endorse President Obama's reelection bid. Some already have. And some will surely endorse specific state and local candidates. We're an outsider force. We should never endorse candidates. But is it possible to ally around specific actions with organizations that also endorse candidates?
It has to be. We join up with others where we can, and we depart where we depart. If we call for an end to corporate personhood, for example, we should welcome as many co-endorsers as possible, including organizations that endorse politicians — and even politicians themselves. Welcoming politicians' endorsements of our goals doesn't mean endorsing those politicians. This is an important detail, and it requires a precise threading of the needle. As an outside force, we have to take all politicians to task, regardless of party. But the details of how we do this matter. We need to pressure politicians and candidates, and the best way to do this is to ask them hard questions and provide pressure that pulls them in our direction (or put them on the defensive). If we ask good questions that resonate with the people who hear them, then we're doing our job well. If, on the other hand, we make general statements like, "It doesn't matter who you vote for, they're all the same," then we're being needlessly belligerent to our allies and potential allies (without even putting politicians on the defensive). An organization focused primarily on reproductive rights, for example, will understandably be very concerned about whether Barack Obama or Mitt Romney occupies the White House. We can take candidates from both parties to task on an array of other issues without spurning their reasons for deciding to endorse a candidate. ........
........Someone who had felt constrained within her institution before the shake-up may now see and seize openings to move the institution in a bolder direction. And this is more likely to happen if organizers from Occupy Wall Street—the visible catalyst of the earthquake—approach longstanding institutions to strategize together about how they might engage with this moment.
An earthquake moment is a time to invite people to engage. It's not a moment to keep people in boxes, or to draw rigid lines. It's a moment to hammer Wall Street, the big banks, and the political system that has been fixed to serve only the very wealthy and powerful. Our task now is to activate as many people as possible into action. And this has to include people we wouldn't necessarily choose to have as our best friends. ///
Unfortunately at the sessions Smucker is participating in in Minneapolis this week, such an open debate is not an option because of restricted access. The big question: Does that mean that the position and debate frames adopted as "Occupy approved" will shift in a less radical, more institutionalized direction?
Located from deeper areas of the internet, Home Defenders League PR structure in a press release:
/// EVENT: CONFERENCE CALL BRIEFING - THE HOME DEFENDERS LEAGUE;
LOCATION: None given -- May 31, 2012 As seen in text
SECTION: GENERAL NEWS EVENTS - LENGTH: 98 words
SUBJECT: The Home Defenders League holds a conference call briefing, beginning at noon, with an overview of the Home Defenders League campaign, a "new alliance of homeowners and renters across the country who are joining together to make their voices heard in the 2012 election and beyond."
CONTACT: Moria Herbst, 646-452-5637, 917-743-6350, email@example.com [Note: Media should RSVP to Moira Herbst at firstname.lastname@example.org or 646-452-5637. Call-in, 800-434-1335; password, 995583#. A Q&A follows the news conference. Information on the launch of the alliance is embargoed until 9 a.m. May 31.] ///
Located near Wall Street at 15 Maiden Lane, Suite 1600, New York, NY, Berlin Rosen is interesting, reminiscent of other liberal communications consultancies. See http://www.berlinrosen.com/section/our-team/ for some familiar names.
In conclusion, I hope that broad networks can evolve, especially on all housing issues including fraud, homelessness, financialization, fractional reserve, and foreclosures, but that will not work out when narrow networks with bowtie chokepoints, rather than broad, open and loose networks evolve.
DISCLAIMER: I have performed videography services for MFE in the last year, contributed to videos & trained supporters in mobile video software (ustream/bambuser). Also, Movement Resource Group or one of its founders, Ben Cohen, (not sure which) provided funding for GlobalRevolution.tv (which I am a member) to supply Occupy and related movements with media gear, via GlobalRev's fiscal sponsor . We need to have good spirited disclosure of paid political organizing, in the long run this is essential. As so many people are well-intentioned, to avoid conflicts and jumbles, clear, plain information is the best goal we should share.
Worth throwing up there as an example of how to keep perspective when they try to throw the book at you. Things like this crystallize the hypocrisy of conspiracy charges, cyber-fear-blather, terrorism and of course the laundering of drug money through the banking system. Till the walls tumble, Jeremy...
23 July 2012 - Statement from Jeremy Hammond, alleged Anonymous hacker -
Thanks for everybody coming out in support! It is so good to know folks on the street got my back. Special thanks to those who have been sending books and letters, and to my amazing lawyers.
I remember maybe a few months before I was locked up I went to a few noise demonstrations a the federal jail MCC Chicago in support of all those locked up there. Prisoners moved in front of the windows, turned the lights on and off, and dropped playing cards through the cracks in the windows. I had no idea I would soon be in that same jail facing multiple trumped up computer hacking “conspiracies.”
Now at New York MCC, the other day I was playing chess when another prisoner excitedly cam e up as was like, “Yo, there are like 50 people outside the window and they are carrying banners with your name!” Sure enough, there you all were with lights, banners, and bucket drums just below our 11th floor window. Though you may not have been able to here us or see us, over one hundred of us in this unit saw you all and wanted to know who those people were, what they were about, rejuvenated knowing people on the outside got there back.
As prisoners in this police state – over 2.5 million of us – we are silenced, marginalized, exploited, forgotten, and dehumanized. First we are judged and sentenced by the “justice” system, then treated as second class citizens by mainstream society. But even the warden of MCC New York has in surprising honesty admitted that “the only difference between us officers here and you prisoners is we just haven’t been caught.”
The call us robbers and fraudsters when the big banks get billion dollar bailouts and kick us out of our homes.
They call us gun runners and drug dealers when pharmaceutical corporations and defense contractors profit from trafficking armaments and drugs on a far greater scale.
They call us “terrorists” when NATO and the US military murder millions of innocents around the world and employ drones and torture tactics.
And they call us cyber criminals when they themselves develop viruses to spy on and wage war against infrastructure and populations in other countries.
Yes, I am one of several dozen around the world accused of Anonymous-affiliated computer hacking charges.
One of many here at MCCC New York facing trumped up “conspiracy” charges based on the cooperation of government informants who will say anything and sell out anyone to save themselves.
And this jail is one of several thousand other jails, prisons, and immigrant detention centers – lockups which one day will be reduced to rubble and grass will grow between the cracks of the concrete.
So don’t let fear of imprisonment deter you from speaking up and fighting back. Silencing our movement is exactly what they hope to accomplish with these targeted, politically motivated prosecutions. They can try to stop a few of us but they can never stop us all.
Memorable scenes in "J. Edgar," the unsung biopic of FBI über-cryptocrat J. Edgar Hoover directed by Clint Eastwood, highlighted Leo DiCaprio's Hoover essentially blackmailing politicians like Robert F. Kennedy & Franklin D. Roosevelt over the decades with potentially embarrassing recordings and snippets. He reminisces with his partner-for-life Colson how well it goes every time.
Now there's an entire corporate contractor sector, nicknamed the Eagle Alliance, which has taken over many core National Security Agency functions, and each one of them are in a position to pull Hoover-like shenanigans to control the political system. This system of leverage & blackmail was described in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider" as the "Control Files."
"That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide."
He added that if a dictator ever took over, the NSA "could enable [him] to impose total tyranny, and there would be no way to fight back."
At the time, the agency had the ability to listen to only what people said over the telephone or wrote in an occasional telegram; they had no access to private letters. But today, with people expressing their innermost thoughts in e-mail messages, exposing their medical and financial records to the Internet, and chatting constantly on cellphones, the agency virtually has the ability to get inside a person’s mind…
"I don’t want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."
Let's hop on down the rabbit hole. The National Security Agency and its beleaguered whistleblowers are back with the Internet's Lawyers Guild - aka the Electronic Frontier Foundation, who have saved the day on countless occasions. Now they are kicking it up a notch with a lawsuit against the 'state secret' everyone knows about -- corporate contractors copying everyone's private domestic communications.
In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.
I’m going to provide a one paragraph summary, just to make sure that the implications of this are clear to everyone:
The U.S. Government has, almost certainly, established a database and tracking system for something like eight million Americans who have been designated as threats to national security. The system is called MAIN CORE and it is being run under the auspices of highly classified Continuity of Government (COG) operations. MAIN CORE uses a variety of intelligence sources as inputs, including your email, web activity, telephone and private financial information. In the event of a major national security crisis, it is alleged that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”
Below are some excerpts from The Last Roundup. I have provided explicit pointers to the related materials on Cryptogon:
According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.”[See:AT&T Invents Programming Language for Mass Surveillance]
He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.
Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program
EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed
San Francisco - Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation's (EFF's) lawsuit against the government's illegal mass surveillance program, Jewel v. NSA.
In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the "secret room" at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.
"For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people," said EFF Legal Director Cindy Cohn. "Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We're extremely pleased that more whistleblowers have come forward to help end this massive spying program."
The three former NSA employees with declarations in EFF's brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.
Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.
"The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret," said EFF Senior Staff Attorney Lee Tien. "Yet the government keeps making the same 'state secrets' claims again and again. It's time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance."
In Jewel v. NSA, EFF is suing the NSA and other government agencies on behalf of AT&T customers to stop the illegal unconstitutional and ongoing dragnet surveillance of their communications and communications records.
Filed in 2008, Jewel v. NSA is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it. Evidence in the case includes undisputed documents provided by former AT&T telecommunications technician Mark Klein showing AT&T has routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA. That same evidence is central Hepting v. AT&T, a class-action lawsuit filed by EFF in 2006 to stop the telecom giant’s participation in the illegal surveillance program.
In addition to suing the government agencies involved in the domestic dragnet, Jewel v. NSAalso targets the individuals responsible for creating authorizing and implementing the illegal program including former President George W. Bush, former Vice President Dick Cheney, Cheney’s former chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales, and other individuals who ordered or participated in the warrantless domestic surveillance.
The Obama administration moved to dismiss Jewel in 2009, claiming that litigation over the wiretapping program would require the government to disclose privileged “state secrets” and that it was immune from suit. The court instead ruled that the case should be dismissed on standing grounds.Fortunately, in December of 2011, the 9th U.S. Circuit Court of Appeals ruled that Jewel could proceed in district court.
There aren't that many journalists who regularly cover the National Security Agency, and it's pretty obvious this beat is a shortcut to catching major gangstalking from a whole passel of shadeballs. What better way to see who SAIC will send if you piss them off & expose their enormously profitable contracting rackets & fraud?
James Bamford first wrote The Puzzle Palace, the first book on the NSA which established a great deal for the public about how it operated. His much more recent book The Shadow Factory described a number of major developments since then, including the backbone tapping system which is a major part of Jewel v. NSA.
In a 30-page motion that prosecutors filed on Monday, they argued that the First Amendment did not give Mr. Risen the right to avoid testifying about his confidential sources in a criminal proceeding. The Justice Department argued that Mr. Risen was a witness and should be compelled to provide information to a jury “like any other citizen,” contending that there was no basis to conclude “that the reporter is being harassed in order to disrupt his relationship with confidential news sources.”
DC alternative journalist Wayne Madsen, while derided by many in the mainstream & liberal networks as a conspiracy theorist etc (and I wouldn't be surprised if certain factions try to use him to plant early disinfo & poison the well in obscure stories - as often happens with journalists on weird beats) overall Wayne has kept coming up with the goods on the NSA, clearly with a number of inside and veteran sources. Code names in this case STELLAR WIND and PINWALE first entered the public arena via Madsen's site WayneMadsenReport.com.
Madsen has covered the travails of William Binney, Thomas Drake & J. Kirk Wiebe, in particular Drake over the years. Drake's case in particular involves the interests of sketchy Israel-linked contractors in penetrating Americans' private communications using backdoors such as the Narus Verint wiretapping boxes placed on Internet backbone sites, which first surfaced because of whistleblower Mark Klein, who had installed the fiber optic splitter running domestic backbone signals en masse into the 'secret room'.
Anyway much of this is available over In-Q-Tel I mean CIA I mean Google, but the stuff on WayneMadsenReport.com is not. I asked Wayne a while ago and he basically asks for a day or two (or several) for people to refrain from reposting his material outside the paywall. I ask that you support independent journalism - I am reposting these now for general public interest because the situation has finally 'broken out' a little more.
APRIL 2012: Let's start on the late side with a April 2012 backgrounder that finally establishes a great deal of the crusade to crush Thomas Drake. It gets to, what else, Israeli contractors and extreme corruption. Plus it has tons of nice NSA program code words.
The SARC is where companies linked to Israel helped set up NSA's controversial and top secret warrantless eavesdropping program code-named Stellar Wind. SARC's chief of staff, J. Kirk Wiebe, and the center's co-founded, Bill Binney, realized that a private company with links to Israel, Technology Development Corporation (TDC), a two-man operation with an Annapolis Junction post office box run by two brothers, Randall and Paul Jacobson of Clarksville, Maryland, was running the Stellar Wind operation using software and equipment provided by two Israeli firms, Narus, later bought by Boeing, and Verint, owned by Comverse Technology, formerly Comverse Infosys. Both companies were formed by ex-Unit 8200 personnel. Unit 8200 is the Israeli counterpart of NSA. The NSA program manager for Stellar Wind was Ben Gunn, a U.S. naturalized Scotsman who once worked for Britain's NSA equivalent, the Goverfnment Communications Headquarters (GCHQ) in Cheltenham, UK.
Rather than investigate the Jacobsons, Gunn and their Israeli interlocutors, FBI agents raided the homes of Wiebe and Binney and confiscated their computer equipment as part of the failed Justice Department investigation of former NSA official Thomas Drake, the whistle blower who exposed massive contract fraud and illegal surveillance by NSA.
Paul Jacobson had his security access pulled by NSA in 1992 and he later changed his name to "Jimmy Carter" and "Alfred Olympus von Ronsdorf." Randall Jacobson continued working for NSA and when Science Applications International Corporation (SAIC) was brought in to run the nascent Stellar Wind program, taking over from TDC, Randall Jacobson tipped Binney off to the illegal nature of the eavesdropping program, which included installing wiretapping rooms in some 20 telecommunications company switches around the United States, including the one exposed by former AT&T technician Mark Klein that was installed at the AT&T switch in downtown San Francisco.
Binney told Bamford that the NSA's advanced eavesdropping and data mining high-data analytical software may have been originally passed to Israel by a pro-Israeli technical director in NSA's Operations Directorate. The original software helped Narus and Comverse/Verint to improve on the work already performed by NSA and more advanced systems were then sold back to the NSA. The major compromise of NSA technology to the Israelis should have been made known to Binney, who was then the chairman of the NSA's Technology Advisory Panel, which monitored the signals intelligence capabilities of foreign nations. Rather than pass on to NSA the intelligence "take" of Unit 8200 using the NSA technology, Binney told Bamford that he believed that the Israeli government simply passed on the technology to Israeli start-up companies that used the NSA-developed know-how to spy on foreign countries, including the United States, and sell the technology back to countries like the United States.
The Israeli penetration of NSA was brought to WMR's attention by NSA personnel in June 2005. One of the firms mentioned as being involved in the compromise to Israel was CACI, part of an alliance of NSA contractors called the "Eagle Alliance." WMR reported: "CACI, called 'Colonels and Captains, Inc.' by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations."
What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel.
Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods.
In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.
[On June 5, 2005, WMR followed-up its story of Israeli spying at NSA: "Veterans of the RCA-NSA-Israeli joint SIGINT program code named DINDI report that Israeli engineer spies used the carve out contract with NSA, through RCA, to gain access to NSA and U.S. Navy secrets. In an RCA facility in Mount Laurel, NJ, the Israeli engineers had their own secured lab, and for three years that DINDI ran, they were walking out with their briefcases loaded with equipment, including scopes. When RCA engineers finally gained access to their lab, they found the prints laid out for the Trident missile system. RCA had an ongoing contract top develop the Trident communications suite at the time of the security leak. The Israeli engineers on DINDI claimed they were from the Israeli Air Force but months later, an RCA engineer was in New York and he ran into the same Israelis, but they were wearing Israeli Navy uniforms. One ex-RCA engineer commented about the DINDI Israeli spies: 'They were all a nice bunch of guys, even when they had their hands in your pockets.'] One RCA contractor for NSA later told WMR that the RCA program manager for DINDI, a Jewish engineer who he only named as "Irv," permitted the Israelis to rummage through NSA and RCA classified information.
With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual 'Fort Knox' of intelligence treasures and secrets.
Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person [then-NSA director Michael Hayden] hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, 'She's highly qualified to work in intelligence!'
According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or 'WINTEL' environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to 'provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA.' This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.
The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: 'Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program.' The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.
The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:
A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:
GALE-LITE (the primary owner of which is DIA)
SIGDASYS FILE II, III, and KL
In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include
VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED
WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP
ZENTOOLS, ZIGZAG, and ZIRCON
Hayden was later "rewarded" for his actions at NSA by being named the first deputy director for the Directorate of National Intelligence (DNI) and, later, director of the Central Intelligence Agency. After retiring, Hayden began working for former Department of Homeland Security Secretary Michael Chertoff, who has also been alleged to have close contacts with Israeli intelligence, at Chertoff Associates.
A journalist who previously covered the Justice Department for a major wire service told WMR that FBI agents and Justice Department prosecutors are dissuaded from investigating spies for Israel since it is known to be a "career killer" at both agencies. Moreover, Justice prosecutors have two sets of guidelines when it comes to prosecuting spies. One set calls for maximum treatment, including major criminal charges and heavy prison sentences and fines, for American spies who are charged with spying for Russia, China, Cuba, or Iran, and the lightest charges and penalties for those charged with spying for Israel, especially if they are Jewish.
There is much more to the Obama administration's indictment on April 15 of former NSA senior executive Thomas Drake by the US Attorney for Maryland, Rod Rosenstein, a Bush holdover who has brought similar politically-motivated criminal charges against other NSA personnel. Drake is charged with ten criminal counts, including leaking classified information to a newspaper. WMR can confirm the paper is The Wall Street Journal and the reporter at the Journal who received Drake's information is Siobhan Gorman, who was also subject to electronic surveillance by the NSA and FBI while she was with the Journal and previously, The Baltimore Sun. Other charges brought against Drake, who continued to work for the NSA as a contractor after stepping down as an NSA executive, include obstruction of justice and making false statements to a federal law enforcement official.
Since leaving his executive position with the NSA, Drake has served as President and Chief Operating Officer of National Technologies Associates, Inc. of Alexandria, Virginia. The firm has revenues of $50 million and employs 600 people. Before NSA, Drake was an information technology and management consultant with Coastal Research & Technology, Inc. (CRTI).
While at NSA, Drake worked in the Signals Intelligence Division (SID), the group responsible for eavesdropping on foreign communications and, since the advent of warrantless domestic surveillance, domestic U.S. communications, as well.
WMR can report that as part of the Drake investigation, Gorman and the Wall Street Journal were subject to STELLAR WIND, warrantless wiretapping, as late as last year. The surveillance began when Gorman wrote a series of articles between 2006 and 2007 on NSA contracting cost overruns and mismanagement, information that was first reported by WMR in 2005.
From WMR, May 27, 2005: Up to now, little has been reported on how the Bush administration’s disastrous intelligence policies have affected the super secret National Security Agency (NSA). According to NSA insiders, the chief U.S. signals intelligence (SIGINT) collection agency has been wracked by much of the same internal feuding, senior management failures, and external political pressure that have plagued other U.S. intelligence agencies, including the CIA, FBI, Defense Intelligence Agency, National Geo-spatial Intelligence Agency, and National Reconnaissance Office.Drake's prosecution by the Obama administration represents a continuation of a "witch hunt" by NSA and its Stasi-like Security unit, the "Q Group," to plug all leaks from the signals intelligence and cyber-warfare agency even if the information provided to the media concerns criminal conduct like contract fraud, sexual misconduct, illegal surveillance of American citizens, and illegal "sneak an peek" break-ins of the homes of NSA employees and contractors by NSA Q Group personnel and FBI agents.
NSA insiders lay blame for the problems at NSA’s Fort Meade, Maryland headquarters squarely on the shoulders of agency Director Air Force General Michael V. Hayden and his small coterie of close advisers, a few of whom have no substantive intelligence background. Hayden has been NSA Director since March 1999, the longest tour for any NSA Director. Not only did the White House extend Hayden’s NSA tour, but also nominated him to be the first Deputy Director of National Intelligence, where he will serve under John Negroponte.
Hayden’s reign at NSA has been marked by the emaciation of the career civilian corps through forced retirements and resignations, outsourcing of government positions to contractors, intimidation, forced psychiatric and psychological examinations for "problem" employees, increased workloads for shift personnel with no personnel augmentation, unreasonable personal searches by security personnel, and withholding salary increases for career personnel. A number of NSA employees are suffering from stress and fatigue and that is adversely affecting their job performance.
One of the most pervasive operational problems at NSA stems from the fact that when newly trained civilian and military linguists, analysts, and other operational personnel arrive at NSA for duty and are integrated into various operational work centers, they are soon quickly transferred to Iraq. This puts an inordinate workload on the career civilian NSA personnel . . .
Career NSA personnel claim that their most senior member, Deputy Director of NSA William B. Black, Jr., shows little interest in their plight. One long-time NSAer said Black often nods off at Hayden’s staff meetings. In 2000, Black, a retired NSA employee with 38 years of service, was rehired by Hayden from Science Applications International Corporation (SAIC) to be his deputy. Hayden’s selection of Black from outside the agency was considered a slap in the faces of those line NSA officers who would have been normally considered next in line for promotion to the much-coveted post. That slight began to severely affect agency morale a little over a year before the September 11, 2001 terrorist attacks on New York and Washington.
After 911 and subsequent revelations that NSA had intercepted two Arabic language phone calls on September 10, 2001 ("Tomorrow is zero hour" and "The match is about to begin") that indicated an imminent attack by Al Qaeda but failed to translate and analyze them in a timely manner to be effective, Hayden was looking for scapegoats. According to NSA insiders, he found one in Maureen A. Baginski, the Director of NSA’s Signals Intelligence (SIGINT) Directorate. According to the NSA insiders, Baginski, a 27-year NSA veteran and Russian and Spanish linguist, was set up for a fall by Hayden and his team. In 2003, Baginski was named Executive Assistant Director of the FBI for Intelligence. According to NSA sources, it was Baginski who carried out Hayden's directives that farmed out many Fort Meade functions to other facilities. Another Hayden project, "Groundbreaker," the outsourcing of NSA functions to contractors, has also been used by Hayden’s advisers to assign blame for the 911 failures at NSA. According to NSA insiders, Groundbreaker has been a failure . . .
Another one of Hayden's projects that has been criticized by the NSA rank-and-file is "Trailblazer," the program to modernize NSA's SIGINT systems. For example, operators in U.S. electronic warfare aircraft rely on NSA to provide accurate electronic intelligence (ELINT) data in order to program their radar warning receivers and jamming pods. However, NSA data, provided from two databases known as EPL (Emitter Parameter List) and "Kilting." 70 percent of NSA's ELINT data is 30 years old. NSA management has forced field operators to use raw ELINT intercept data, culled from a database called "Wrangler," to program their ELINT systems. NSA operations and software engineers believe this function should be handled by NSA and not the "warfighters." Updated ELINT data is handled by ELINT Technical Reports or "ELTs." In 2003, the year the Iraq war started, there were 938 ELTs submitted on new emitter data. However, there were only 200 updates made to the ELINT databases.
The failure to update the ELINT databases may have had disastrous consequences in Iraq. For example, EPL and Kilting do not contain data on air traffic control radars and microwave communications links. Because current ELINT systems cannot differentiate between commercial signals and hostile target tracking emitters, U.S. forces in Iraq have launched attacks on non-threat targets in the belief they were hostile. NSA sources report that many of the cases of fratricide in Iraq has been due to faulty or old ELINT data. For example, the failure by NSA to update ELINT data and provide emitter parameter data to warfighting units led to the accidental shootdown by a Patriot missile of a British Royal Air Force Tornado fighter in March 2003 near the Iraqi-Kuwaiti border at the outset of the Iraq campaign. Two British crew members were killed. The ELINT data used by the Patriot misidentified the Tornado as an enemy missile and the U.S. Army blamed the British crew for the mistake, claiming they failed to switch on its Identification Friend or Foe (IFF) equipment. NSA insiders claim that allegation was false. They claim that "blue signals" (friendly) are not adequately included in the emitter data sent to field units by NSA and that claims by the Pentagon that the Tornado was shot down due to pilot error were false.
In other incidents, the radar warning receivers (RWRs) on U.S. F-16s flying over Iraq have either evaded or fired AMRAAM (Advanced Medium-Range, Air-to-Air) missiles on microwave communications towers because the microwave signals were identified as threat emitters from hostile aircraft. U.S. jammers are also adversely affected by the failure to update ELINT data.
In fact, many of NSA's developmental ELINT systems, with cover names like Beikao, Boomvang, Canyondust, Cape Lookout, Chartvein, Eagle Reach, Galaxydust, Harpstring, Hokusai, Irish Den, Jetavator, Monocle, Needleice, Platoonwolf, Quadrunner, Radiant Spruce II, Roman Alliance, Seadiver, Shadowboxer, Sharkbite, Shiloh, Starquake, Stouthearted,and Sunbeaver are not found in the master NSA ELINT project database, which also has a cover name: Brasscoin.
Many of NSA's other SIGINT systems are in the same conundrum. Rather than simplify and modernize NSA's SIGINT development and deployment, Trailblazer has done nothing to modernize or cut acquisition costs. In a suspicious move by NSA, the Trailblazer contract was sole-sourced to SAIC, the firm from which Hayden hired his deputy director. As with Groundbreaker, Trailblazer's contractors consist of a team led by a prime contractor. Trailblazer's team overlaps with Groundbreaker -- companies like CSC and Northrop Grumman are also found on the Trailblazer team. Booz Allen Hamilton and Boeing are also on the SAIC team. According to NSA officers, one SAIC official left the firm to work for Hayden at NSA during the time the Trailblazer bidding process was underway. The individual then returned to SAIC as a senior vice president, according to NSA sources. NSA employees, upset about the control that SAIC now has over the agency, refer to NSA as "NSAIC." . . .
At his Senate Select Intelligence Committee nomination hearing for Deputy Director of National Intelligence, Hayden confirmed that Trailblazer was over budget and behind schedule. He told the committee that Trailblazer's "cost was greater than anticipated in the tune, I would say, in hundreds of millions." Hayden confirmed the report of the joint congressional committee that probed the 911 intelligence failures that Trailblazer was several years behind schedule. NSA sources claim that Trailblazer is at least five years behind schedule and $600 million over budget.
However, the career NSA operational personnel may be getting squeezed not so much for policy and management differences but because of what they know about the lies of the Bush administration. In addition to the obvious lies about Iraqi WMDs, many personnel are well aware that what occurred on the morning of 911 was not exactly what was reported by the White House. For example, President Bush spoke of the heroic actions of the passengers and crew aboard United Flight 93 over rural Pennsylvania on the morning of 911. However, NSA personnel on duty at the NSOC that morning have a very different perspective. Before Flight 93 crashed in Pennsylvania, NSA operations personnel clearly heard on the intercom system monitoring military and civilian communications that the "fighters are engaged" with the doomed United aircraft. NSOC personnel were then quickly dismissed from the tactical area of the NSOC where the intercom system was located leaving only a few senior personnel in place. NSA personnel are well aware that Secretary of Defense Donald Rumsfeld did not "misspeak" when, addressing U.S. troops in Baghdad during Christmas last year, said, "the people who attacked the United States in New York, shot down the plane over Pennsylvania." They believe the White House concocted the "passengers-bring-down-plane" story for propaganda value.
Morale at NSA has plummeted from repeated cover-ups of serious breaches of security by senior officials. While rank-and-file employees are subjected to abusive psychological and psychiatric evaluations for disagreeing with summary intelligence reports provided to outside users or "consumers" and even for more mundane matters, others are given a pass. Ironically, one of the psychiatrists used by NSA to evaluate problem or disgruntled employees was recently found by police to be growing marijuana at his home in Crofton, Maryland.
In 2008, NSA and FBI surveillance of current and former NSA and Justice Department employees who were suspected of leaking information to the press about the NSA's super-classified STELLAR WIND warrantless digital surveillance program, called the "Terrorist Surveillance Program" by the Justice Department, was stepped up.
On March 10, 2008, Gorman wrote an article for the Journal titled, "NSA's Domestic Spying Grows As Agency Sweeps Up Data." Gorman wrote:
"According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called 'transactional' data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected."
The previous year, as WMR reported in May 12, 2009, former Justice Department prosecutor Thomas Tamm's home was invaded by a SWAT team of federal agents:
In 2007, Tamm's home in Potomac, Maryland was raided by zealous FBI agents who suspected him of leaking details of the so-called "Terrorist Surveillance Program" (TSP) to journalists. Tamm tried to inform Congress about the illegal program but was rebuffed by, among others, the ranking Democrat on the House Judiciary Committee, Representative John Conyers (D-MI).
At the time of its inception after 9/11, the TSP or as NSA and the Oval Office referred to it, "Stellar Wind," was so classified that only the Attorney General and one other person in the Justice Department knew about it. The TSP totally bypassed the Foreign Intelligence Surveillance Act (FISA) warrants that the OIPR prepared for approval by the Foreign Intelligence Surveillance Court (FISC). U.S. Judge James Robertson was so incensed about the bypassing of the FISC, he resigned from it in protest on December 20, 2005. U.S. Judge Royce Lamberth, nominated by President Ronald Reagan and who served as Presiding Judge of the FISC until 2002, was also adamantly opposed to TSP and its systematic bypassing of his court.
WMR's report continued: Tamm was also the first person within Justice who corroborated what NSA personnel were reporting about the agency conducting illegal data mining. One of those individuals was NSA employee Russell Tice, who was also subjected to an FBI investigation and government harassment.
Although the government employees who brought attention to the high-level criminality involving the TSP/Stellar Wind were and, in some cases like that of Tamm, are still being investigated, no criminal investigations were brought against the telecommunications companies that participated in the criminal conspiracy to spy on Americans illegally. In fact, Congress gave the telecommunications firms immunity from lawsuits and prosecution as a result of a deal worked out with the Bush administration. One of those senators who voted for the immunity deal is Barack Obama.
After the FBI conducted interviews of all OIPR employees in their quest for the leaker, on August 1, 2007, 12 government vehicles pulled in front of Tamm's home in Potomac, Maryland. Eighteen armed federal agents wearing body armor stormed into Tamm's home while his wife was cooking breakfast. Tamm was removed from his home by the agents who spent seven hours going through his and his family's property. The FBI agents even asked Tamm if there were any "secret rooms" in his house. They also inquired about any weapons in the house and whether he had been visited at home by reporters from The New York Times.
The agents tore through every room, awakening Tamm's son and daughter. The agents seized all the lap top computers, including those of Tamm's children, and a 10-year old lap top. Also seized were the Tamm family's Christmas card list and a calendar with doctors appointments.
After two days, Tamm was offered a deal that he could plead guilty to a felony in return for his testifying against journalists, including the New York Times' James Risen, and their sources at the NSA. Three days later Michael Isikoff of Newsweek phoned Tamm -- someone had leaked information about the FBI raid to Isikoff. Tamm's identity as a source about the TSP was revealed by Isikoff in the December 22, 2008, issue of Newsweek.
In 2008, one of WMR's sources discovered that his home had been broken into and anything that could store digital data had been stolen: laptops, digital cameras, USB thumb drives, etc. Moreover, relatives of the individual discovered that the lock to their home had been drilled out in what was an obvious "black bag" sneak and peel operation.
That same year, this editor discovered that the lock to his apartment door at Potomac Towers in Arlington, Virginia had been drilled out by a circular saw drill bit that drilled around the lock cylinder. When the apartment maintenance man was called to check the lock, he discovered the fragments of the lock pins scattered on the floor at the base of the door. He stated at the time that he had never experienced anything like it in the past.
FBI and NSA surveillance of people affiliated with NSA continued through last week, with this editor and one of his sources being tailed in 2009 in the suburban Maryland suburbs of Washington, DC and an additional tail of a source being conducted last week in Annapolis, Maryland.
The indictment of Drake in reminiscent of the case brought against former NSA signals intelligence (SIGINT) analyst Ken Ford, Jr. in 2006. In March 2006, Ford was sentenced to six years in prison in a case replete with prosecutorial and judicial misconduct by Rosenstein, Assistant US Attorney David Salem, and US Judge Peter Messitte. On April 30, 2007, WMR reported: "Ford was set up in a clumsy Justice Department, FBI, and NSA Security Division operation to punish him for his May 2003 signals intelligence (SIGINT) analysis report that concluded, based on intercepts of Iraqi communications, there was no truth to the Bush administration’s claim that there were weapons of mass destruction in Iraq. Ford’s report, with his name and that of his supervisor on it, ended up on Vice President Dick Cheney’s desk. From that time on, Ford was a marked man for the neo-con cabal operating within the White House, Justice Department, Pentagon, and US Intelligence Community senior staff."
At one point during Ford's trial, Messitte called Ford to his bench and asked him if he had spoken to this editor. Ford replied that he had not, whereupon Messitte asked, "Is Mr. Madsen in the court room?" I was not present at the time but I was later told by an informed source that Messitte was prepared to call me to the stand to be asked about the sources of my stories on the case. Such a development would have required me to invoke my First Amendment rights, as the press is the only occupation identified by name in the Bill of Rights as being protected. There was a risk of a contempt ruling and possible federal prison had I been present during Messitte's "kangaroo court" proceedings.
Ford continues to serve his six year sentence at Lewisburg federal prison in Pennsylvania. Attorney General Eric Holder was sent a letter by Ford's parents on November 18, 2009, calling for the appointment of a special prosecutor in the case against their son. To date, Holder has not responded to the letter.
The letter follows:
November 18, 2009
SENT CERTIFIED MAIL / E-MAIL / FACSIMILE
Honorable Eric H. Holder. Jr.
Attorney General of the United States
Honorable David W. Ogden
Deputy Attorney General of the United States
950 Pennsylvania Avenue, N.W.
Washington, D.C. 2053 0-0001
United States v. Kenneth Wayne Ford. Jr.
Criminal Case No(s): 04-cr-l l8JKS, 05-cr-0098PJM and 05-cr-0235PJM
Messrs. Holder and Ogden:
In the interest of justice, we, the parents of Kenneth Wayne Ford, Jr., ("hereafter Mr. Ford") request an immediate appointment of Special Counsel to investigate unwarranted prosecutorial misconduct, vehement malicious persecution and prosecution of Mr. Ford under the Espionage Act §793 (e) - Gathering, Transmitting or Losing Defense Information. On Wednesday, September 23,2009, President Obama mandated that DOJ establishes New State Secrets Policies and Procedures.1
President Obama's implementation of State Secrets and Policies encompasses matters in this case. Prosecutors knowingly and willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation throughout this case and trial. Mr. Ford was convicted under 793(e) - Espionage and 1801 - Making A False Statement On A Government Form. Mr. Ford was sentenced to 6 years in prison for Count 1 and 3 years in prison, to be served concurrently with Count 1, for Count 2. After imprisonment, Mr.
1 “It sets out clear procedures that will provide greater accountability and ensure the state secrets privilege is invoked only when necessary and in the narrowest way possible...” Attorney General Eric Holder September 23, 2009
Ford is to be on probation for 3 years. He also was ordered to pay a $200.00 assessment. Mr. Ford began serving this unjust prison sentence on May 16. 2006. He has been in prison for over 3 years and 6 months for doing absolutely nothing, except being a patriotic American and a good person.
Not only is Mr. Ford innocent, but nothing happened. This case is totally fabricated by the FBI and all involved, specifically the prosecutors and judge know it. Mr. Ford is a victim of a hate crime, a malicious prosecution and a tragic rush to jail an innocent man. See North Carolina v. Seligmann 06-cr-4332-33 (Dismissed 4/712007), Franks v. Delaware, 438 U.S. 154 (1978) and Brady v. Maryland, 373 U.S. 83 (1963). These cases demonstrate that 'false' arrest can happen to anyone - as in the matter of distinguished Harvard professor Henry Louis Gates, Jr., one of the nation's pre-eminent African-American scholars, falsely arrested in his own home.
A. Prosecutors Willfully Withheld Exculpatory Evidence From Defense
DOJ prosecutors repeatedly invoked state secret privileges, suppressed evidence as classified and deliberately withheld from Mr. Ford's defense exculpatory FBI Search Warrant Affidavits for well over 19 months. Ultimately, these search warrant affidavits were suppressed from Mr. Ford's trial. We have recently discovered that these affidavits have never been filed and are not apart of Mr. Ford's official court file.
On December 15, 2005, United States Attorney For The District of Maryland Rod J. Rosenstein and Criminal Division Assistant Attorney General Alice Fisher issued a press release in Mr. Ford's case, which stated in part, that: (Though there was conflicting evidence of what Ford intended to do with the classified information - the jury's verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information". With the admission of Rosenstein that there existed "conflicting evidence" in Mr. Ford's case and the fact that the judge removed the required elements of 'belief... and intent...' from the jury instructions, should have rendered the indictment defective. (See Exhibit A - Rosenstein Press Release dated 12/15/2005)
FBI Special Agents Michael L. Thompson and Frederick C. Marsh both submitted sworn search warrant affidavits to a federal judge alleging that a Tonya Tucker had contacted the NSA to report Ford's alleged espionage. (Ford had known Tucker for 9 weeks - from 11/13/2003 to 1/11/2004 - and decided that she definitely was not his type. He later realized Ms. Tucker is a FBI confidential informant and was placed into his life by Special Agent Michael L. Thompson.) Defense counsel subpoenaed cell phone records of Tonya Tucker from Sprint, which clearly listed the voice call details of Date, Time. Phone Number. Destination, etc. (Tucker's alleged cell phone calls were described in the Thompson affidavit and completely identified in the Marsh affidavit.
From this, we were able to subpoena thru our attorney, her cell phone records.) Sprint records affirmed that Tonya Tucker Did Not contact NSA on January 5.2004. January 9. 2004. January 10. 2004 and January 11, 2004 from her cell phone number 407-616-5683 listed on the Sprint telephone record print-out and on page 5 of 12 of FBI Special Agent Frederick C. Marsh's sworn search warrant affidavit, which he wrote was "in support of the sworn search warrant affidavit" submitted the previous day, to the same judge, by FBI Special Agent Michael L. Thompson.
With the introduction of the subpoenaed cell phone records, it is apparent the Thompson and March search warrant affidavits are perjured and fabricated. Both agents are therefore subject to penalties of perjury. Also. very importantly. the cell phone (It should be noted here that prosecutors told the jury that Ms. Tucker was a friend of Mr. Ford's and simply was a "tipster".) (See Exhibit B - FBI Affidavits and Tonya Tucker's Cell Phone Records)
Mr. Ford, as required by NSA regulations, earlier reported a threatening e-mail sent to him on Tuesday, November 25th2003 at his "AOL" address a month and a half before his arrest. The e-mail was sent by a "Dr. Takiya", who claimed to be a friend of Tonya Tucker. Based on newly discovered evidence on September 1.2009, it was confirmed that Ms. Tucker is the author of the e-mail. Ms. Tucker signed her name onto an internet guest book August 15, 2006 with the e-mail address of Msunique_2@yahoo.com, which is the same e-mail address of the treat letter sent to Kenneth Wayne Ford, Jr. on Tuesday, November 25 .2003.
The e-mail threatened Ford that his security clearances would soon be revoked. She said she knew people at NSA who had clearances just like he did. Ford reported the e-mail the very next day to NSA Head Security Officer Anne Mennis. She ignored the email, not taking it seriously at all.. Ultimately, the admission of the e-mail as exculpatory evidence to Mr. Ford was suppressed from the trial by the judge. (See Exhibit C - Threatening E-Mail / Newly Discovered Evidence).
Newly discovered evidence of a newsletter dated March 31. 2006, states that FBI Special Agent Dave Evans was the lead FBI supervisor in the case against Mr. Ford. The defendant, Mr. Ford, was never aware that FBI Special Agent Dave Evans existed. (We, his parents, discovered this newsletter on the internet in 2008.) FBI Special Agent Evan's newsletter was titled, Maryland Man Sentenced For 'Stealing Secret Documents'. However, indictments alleged that Mr. Ford was charged with 'Unauthorized Possession of National Defense Documents" - not theft of secret documents.
FBI Special Agent Evans also said that: “As it turned out, our tipster was and didn't even make the drive to the airport." Nonetheless, the prosecutors continued to prosecute and incarcerate an innocent man.
FBI Special Agent Evans also stated that: (Our agents ultimately determined ultimately ended up in." Nonetheless, prosecutors indicted and incarcerated Mr. Ford with knowledge that 6'qonflicted evi4ence" existed in this case. (See Exhibit D – FBI Special Agent Dave Evans' Newsletter dated 3/31/2006)
Certainly, the defense has a right to depose and cross-examine the FBI Special Agent who was the lead supervisor in this case. Prosecutors withheld FBI Special Agent Evans from the defense. They also withheld Special Agent Frederick C. Marsh from the defense. The Marsh affidavit was suppressed during the suppression hearing by the judge, Judge Peter J. Messitte, before the trial began on 11/29/2005. Thus, that which brought Mr. Ford into the legal system and ultimately into a federal courtroom for prosecution, was not allowed into the trial. The jury was unaware of the affidavits. (The defense did not get them until 19 months after Mr. Ford’s arrest. Please keep in mind Mr. Ford has been totally under arrest the entire time since 1/11/2004 to the present.) To date, those affidavits have never been filed. They are not listed on the docket page of the case and they are not physically in the court file. It was represented and testified to the jury by DOJ prosecutors and FBI Special Agent Michael L. Thompson that he was the lead agent and only agent assigned to the Ford Case.
B. Even If Papers Had Been Present – The Text of §793 Is Vague And Should Not Have Been Applied In This Case
First, the statutes require that a defendant transmit information relating to the national defense. There are no allegations that Mr. Ford ever transmitted, sold, stole, secreted, purloined, paid for or otherwise obtained classified information inside or outside the government - by any illegal means. Legislative history of $793 makes plain that [Congress was concerned with spying].
The government never charged Mr. Ford with spying, injury to the United States on behalf of a foreign nation or communication to any person not entitled to receive classified information. Due process requires that a criminal statute provide a person of ordinary intelligence fair notice that his contemplated conduct is forbidden. See Thomas v. Davis, 192 F.3d 445,45514n Cir. 1999). If a law is "vague or highly debatable, a defendant - actually or imputably - lacks the requisite intent to violate it." See United States v. Mallas. 7 62 F .2d 36r , 363 14'n cir.1985). criminal prosecution for the violation of an unclear duty itself violates the clear constitutional duty of the government to warn citizens whether particular conduct is legal or illegal. See U.S. v. Rosen and Weissman 05-cr-225.
A statute cannot be construed so as to delegate to prosecutors and juries the "inherently legislative task" of determining what type of possession of national defense information are so reprehensible as to be punished as crimes. See United States v. Kozminski. U.S. 93 1,949 (1988) (rejecting construction of criminal statute that would *delegate to prosecutors and juries the inherently legislative task of determining what type of coercive activities are so morally reprehensible that they should be punished as crimes").
Second, the canon of strict construction of criminal statutes and the rule of lenity ensure fair warning by resolving ambiguity in a criminal statute as to apply it only to conduct clearly covered. Lanier, 520 U.S. at 266. Third, due process bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope. Each of these three elements is based on the fact that it must have been reasonably clear the time that the defendant’s conduct was criminal.”
United States Attorney for the District of Maryland Rod Rosenstein confirmed by his own statement that: "Though there was conflicting evidence of what Ford intended to do with the classified information – the jury’s verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information.”
Therefore, one would conclude that it was apparently not 'reasonably clear' that Ford's alleged conduct was criminal. Our son was incarcerated based on “unclear conflicting evidence'. An egregious miscarriage of justice at the highest level is evident throughout this case.
Each of these three manifestations is based on the notion that it must have been "reasonably clear at the time that the defendant's conduct was criminal". Elements applied to Mr. Ford's case affirm that reasonable clarity was severely lacking. Courts have ruled that §793 (d) and (e) apply only to the transmission of tangible information. ln fact, these rulings were the basis of Special Counsel Patrick Fitzgerald's explanation as to why he did not bring charges under the Espionage Act §793 against either the government officials who leaked the name of CIA agent Valerie Plame to the press or the reporters who subsequently reported that name to millions of readers around the world.
The following exculpatory evidence, which would have exonerated our son, was suppressed from the trial and jury: 1) FBI Form 302 Statement by Tonya Tucker (FBI Confidential Informant), 2) Tonya Tucker's threatening e-mail to Mr. Ford and 3) Special Agents Thompson's and Marsh's Search Warrant Affidavits. Special Agent Marsh's affidavit clearly affirmed on January 11, 2004, page 6 of 12 that: “A review of criminal history records reflect that TUCKER has a number of arrests, including arrests for Driving while suspended, Criminal trespassing, Robbery, among others."
Courts have repeatedly ruled that the government may not excuse its presentation of false testimony by claiming that: (a) it did not know, (b) it did not understand what other agencies knew, or (c) it believed the testimony. It cannot use these excuses because they are not the law and the facts do not support them. See Mesarosh. et al v. United States, 352 U.S. I (1956); Giglio v. United States, 405 U.S. 150 (1972); and United States v. Mason, et al., 293 F.3d, 826 (5th Cir.2002). Fourth Amendment violations enumerated in the matter of Franks v. Delaware were repeated violations perpetrated on Kenneth Wayne Ford, Jr. by the United States Department of Justice (DOJ). In the matter of Franks v. Delaware, the Court held that: "Where the defendant makes a substantial preliminary showing that a false statement that a hearing be held at the defendant's request."
Federal prosecutors in Mr. Ford's case willfully applied national security standards of the suppression of evidence and discovery. DOJ prosecutors willfully enforced national security clearances upon defense counsel with full knowledge that DOJ did not obtain mandatory FISA applications and approvals.
Prosecutors ignored strict procedural requirements in accordance to the Foreign Reform Act of 2000"). Prosecutors clearly violated Title VI §603, 605 and 607. This case should never have been prosecuted. Title VI $608 provides, in part, that: "If any provision of this title (including an amendment made by this title), or the application thereof, to any person or circumstance, is held invalid, the remainder of this title (including the amendments made by this title), and the application thereof. to other persons or circumstances shall not be affected thereby.”
Kenneth Wayne Ford, Jr. is now 38 years old. He is the cream of the crop of young American citizens. He is an African-American and is highly educated. Mr. Ford graduated from DeMatha Catholic High School in Hyattsville, Maryland in 1990. He then went to the University of Miami in Coral Gables, Florida and graduated from there in 1995 with a Bachelor of Business Administration in Management and Organization degree. Mr. Ford served 4 years in the Uniformed Division of the Secret Service, where he received two cash awards in consecutive years for outstanding service. While in the Secret Service, Mr. Ford continued his education and enrolled into Strayer University. To his credit, he graduated in 2001, summa cum laude" earning a Bachelor of Science in Computer Networking degree. Later, Mr. Ford enrolled in the Masters program at Strayer University, earning in 2004, a Master of Science in Information Technology degree.
In 2001, Mr. Ford accepted employment at NSA as a Signals Intelligence Analyst. While employed at NSA, he received a cash award for outstanding service. Later, he was recognized with a large plaque - his name listed, among others, for outstanding work on a particular project. It was disclosed in the trial by a State Department officer that Mr. Ford had security clearances that less than 150 people in the entire country hold. Mr. Ford has worked extremely hard all his life, as he was not born with a silver spoon in his mouth, inherited wealth or privilege. He has spent over 23 years acquiring an education. He would never do anything to jeopardize his life or his accomplishments. After Mr. Ford's conviction, Mr. Lambert, the probation officer assigned to formalize his pre-sentencing report, commented to me (his mother) and included in his report that "Kenneth has not even had a traffic ticket."
D. Case Overview
On Sunday, January 11. 2004. FBI Special Agent Michael L. Thompson and NSA Security Officer Robert McCaslin arrived at Mr. Ford's home at approximately 5:50 p.m. and fabricated that they wanted to talk to him about his former position. Mr. Ford invited them in because he was led to believe they wanted to get his expertise on a work-related situation. About ½ hour later, their attitudes changed and Mr. Ford realized they were unjustly accusing him of espionage. Simultaneously, with these accusations, they began searching his home - 2-I/2 hours before the search warrant arrived. FBI Special Agent Frederick Marsh arrived with a search warrant and about 23 additional agents.
During the course of this ordeal, Mr. Ford was threatened by Special Agent Michael L. Thompson's unnecessary withdrawal of his gun. He was terrorized for 7-1/2hows as the agents rampaged his home. He was not allowed to leave his residence, contact his parents or answer his telephone. He was denied food and water. He was not allowed to use his own bathroom until Thompson took him away from his home -7-1/2 hours later. See Title 18, Part I, Chapter 113C - Torture - "an act committed by a person acting under the color of law specifically intended to inflict severe physical or mental pain or suffering (other than pain or suffering incidental to lawful sanctions) upon another person within his custody or physical control." (See Exhibit E -Letter by Kenneth W. Ford, Jr. Documenting Events)
E. DOJ Triple Jeopardy Indictments
The government's 1st indictment, and 2nd case number, was filed on 3/4/2005. U.S. District Court Judge Peter J. Messitte dismissed the case without prejudice on 5/162005. The 2nd indictment, and 3rd cse number, dated 5/23/2005, contained the exact charges and language as the ls indictment. The 3rd indictment, which we had no knowledge of until recently, is dated 11/28/2005. The docket indicates that there was a superseding indictment, arraignment and plea of not guilty all on the same day – 11/28/2005. It indicates Mr. Ford appeared before Judge Messitte and gave a plea of 'not guilty' to each of the two counts against him. This is untrue. Mr. Ford never appeared before Judge Messitte or any other judge on 11/28/2005. His trial started the next day, 11/29/2005. It is impossible to appear for an arraignment one day and be tried by jury the very next day.
It should be noted here that on March 30,2006, at the end of Mr. Ford's 2ndsentencing hearing, Judge Messitte dismissed the original indictment. He and Prosecutor Salem signed papers to that effect. Judge Messitte said several times during the trial, Mr. Ford was being prosecuted on the superseding indictment. (Of course, this is impossible.) Apparently, at some point, Judge Messitte and Mr. Salem realized this. Consequently, this dismissal has never been filed, is not in Mr. Ford's court file and is not on the docket. (See Exhibit F - Indictments, Docket Listings of 1//28/2005 Superseding Indictment, Arraignment and Not Guilty Plea and Transcript Page of Dismissal of Original Indictment) Also See $3434 - Presence of Defendant - (Rule) 3
Also, there appears on all three indictments: 'Aiding and Abetting (1S U.S.C. §2)'. Mr. Ford was never charged with this crime. It does not appear anywhere else in the indictment nor was it addressed in the trial to the jury. In addition to the indictments being illegal, these acts make the indictments themselves faulty.
The 1st count was cited under Federal Criminal Code 793(e) - Espionage. FBI Receipt For Property Seized / Form 597 listed all items seized from Mr. Ford's residence. Ironically, there was not one (1) document identified as 'classified papers' prosecutors falsely alleged were taken from Mr. Ford's residence.
At the trial, FBI Special Agent Bridget Bigham, Seizing Agent, testified that she was told to put a classified sticker on a Fed Ex envelope found in a suitcase which belonged to career criminal Tonya Tucker. (The envelope is listed by FBI Special Agent Bigham as #9 on the FBI Form 597.) (See Exhibit G -FBI Form 597) Special Agent 3
3 In United States v. Randall, f 71 F.3d 195,203 (4th Cir. 1999) The Supreme Court ruled that the Fifth Amendment's grand jury guarantee does not permit a defendant to be tried on charges that are not made in the indictment against him, and therefore, 'after an indictment has been returned its charges may not be broadened through amendment except by the grand jury itself. See United States v. Randall, 471 U,S. 130, 143 (1985). See United States v. Brady, 456 U.S. 152; and United States v. Young, 470 U.S. 1, 16 (1985).
Bigham testified she did not look at the papers while in Ford's home. She further testified the alleged papers seized were not photographed in Ford's home as required by procedures, but were photographed days later at an FBI facility. (See Exhibit H - Excerpt of Agent Bigham's Transcript Testimony)
DOJ prosecutors testified during the trial that it did not have any 'surveillance evidence' nor 'any eyewitness accounts' of Mr. Ford allegedly removing classified documents from NSA. Prosecutors should have dismissed all charges against Mr. Ford.
The 2nd count was Title 18 U.S.C. $ 1801 - Making A False Statement On A Government Form. Mr. Ford accepted employment with Lockheed Martin. Prosecutor David Salem had already gotten him fired from Northrop Grumman and after working for 3 weeks at Lockheed Martin, Salem was successful in getting him fired from there also. Ford truthfully provided Lockheed Martin a 1-1/2 page written account of alleged charges against him. At the trial, Judge Messitte allowed Prosecutor Salem to severely redact Ford's written statement. Salem told the judge the statement "prejudiced him". (See Exhibit I - E-Mail Dated 10129/2004 to Lockheed Martin) AUSA David I. Salem and DOJ National Security Division Trial Attorney Mariclaire D. Rourke testified that Mr. Ford backed his pick-up truck to the loading dock and loaded these papers into his truck.
In contradiction of their testimony, Mr. Ford's former NSA supervisor, Ms. Jacqueline Welch ("hereafter Jacqueline W") testified that she in fact had seen Mr. Ford on the day in question - December 19,2003 - standing in the parking lot beside his 'cream-colored 4 door sedan (car)'. Former Counsel on redirect, ascertained whether or not she knew the difference between a 'pick-up truck and a car . She affirmed that she did. Jacqueline W further testified that she never knew Mr. Ford had a pick-up truck. At that point, DOJ's over zealous prosecutors' alleged pick-up truck was referred to as a 'vehicle'. (See Exhibit J - Excerpt of Jacqueline W's Testimony)
Special Agent Michael L. Thompson admitted under oath that there were no fingerprints belonging to Mr. Ford found on any of the thousands of sheets of classified papers allegedly found in Mr. Ford's home. Once again, none of these alleged papers were listed on the FBI's official seized evidence Form 597. (See Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony)
Mr. Ford is the only American citizen in the history of the Espionage Act, to be charged, prosecuted and convicted under the statute without meeting the requirements of the statute. The United States Court of Appeals for the 4th Circuit recently upheld the requirements that in order to charge under the Espionage Act of 1917 - §793(e) one has to have the belief that what one is doing will harm the United States and/or help a foreign entity and one must have the intent to harm the United States and/or help a foreign entity. See United States v. Rosen and Weissman,557 F.2d 192 4th Cir.2009).
Judge Peter J. Messitte, during the suppression hearings, willfully discarded the requirement that the government had to prove the “belief” 'element. Judge Messitte, while charging the jury, willfully eliminated the need for the government to prove the element of "intent.”
Under the federal sentencing guidelines, espionage (Federal Criminal Codes §793(d) and (e) cannot be sentenced unless there is the element of transmittal. So, effectively, since a transmittal is a prerequisite for sentencing under §793(e), then without it, there cannot be a charge. The government never alleged Ford transmitted anything. As a matter of fact, NSA Security Officer Robert McCaslin sent a letter to Prosecutor David Salem dated 713112004 saying Ford's electronic equipment at work and at home were analyzed by NSA and were found to be clean. The letter was not allowed into the trial.
Subsequently, the "CIPA" Intelligence Authorization Act for 2001- Title VI §607 - Coordination Requirements Relating to the Prosecution of Cases Involving Classified information was totally ignored by Assistant United States Prosecutor David I. Salem and Dept. of Justice Trial Attorney Mariclaire D. Rourke.
The National Security Procedure Statute 9-90.020, provides that DOJ prosecutors had no authority to make decisions in this case. "CIPA" $607 - $1.1 of Executive Order No. 12958, provides that a Senior Official, the President of the United States, must be notified prior to prosecution. ln this case, that President was former President George W. Bush, Jr. - another statutory mandate ignored and violated in the matter of Kenneth Wayne Ford, Jr. $793(e) 'unauthorized possession' is contradictory to the National Security Act which provides that NSA employees have a life-time obligation and commitment regarding NSA classified documents.
G. Violation of Dept. of Justice Guidelines/National Security Procedures
DOJ's USAM guidelines regarding National Security Procedures §9-90.020 clearly dictates that the authority to conduct prosecutions relating to the national security lies with the Justice. USAM unequivocally states, in part that:
All prosecutions affecting, involving or relating to the national security, and the responsibility for prosecuting criminal offenses, such as conspiracy, perjury and false statements, arising out of offenses related to national security, is assigned to the Assistant Attorney General of the National Security Division or higher authority. See 28 C.F.R. S 0.61 The Counterespionage Section of the National Security Division, under the supervision of the Assistant Attorney General or higher authority, conducts, handles, and supervises prosecutions affecting, involving or relating to the national security." DOJ trial attorney Mariclaire D. Rourke and AUSA David I. Salem did not have authority to prosecute a National Security Espionage case against Kenneth Wayne Ford, Jr.
We recently reviewed Mr. Ford's court file. Although there are a few orders, from 8/2005 to 1112005, appearing in the case file that indicate the Assistant Attorney General was in compliance with that particular order, it is with great concern that we ask you to investigate this. We have no proof or certification that the Assistant Attorney General's alleged involvement with this case was authentic. As in other things involving Mr. Ford's case, we suspect this too is a fabrication.
H. DOJ Violated FISA Court Statutes
FISA Court specifically prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control).
FISA allows a federal officer, authorized by the President of the United States acting through the Attorney Gener4l to obtain from a judge appointed by the FISA Court, search warrants and approval of electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information. Mandated strict FISA Court procedures were ignored by the FBI, DOJ Prosecutors and U.S. District Court of Maryland Judge Peter J. Messitte, who is not an appointed FISA Court Judge.
Specifically, FISA requires that where the target of the search or surveillance is a "United States person" - a U.S. Citizen or permanent resident alien - the judge must find that the Executive Branch's certification that a significant purpose of the search or surveillance is to obtain foreign intelligence information is not "clearly erroneous". See 50 U.S.C. §1805 and 1824. Also see Brady v. Maryland, 373 U.S. 33 (1963); Strickler v. Greene, 119 S.T. 1936 (1999).
The elements of violations are: (1) the evidence must be favorable to the accused, either because it exculpates the defendant or because it impeaches the government; (2) the evidence must have been suppressed by the government, either willfully or inadvertently; and (3) prejudice must have been ensued. See Franks v. Delaware, 438 U.S. 154 (1978); See Brady v. Maryland, 373 U.S. 83 (1963); See USA v. Rosen & Weissman 05cr-225 (E.D.Va.)
We are not elected or high level corporate officials. We are "grass roots" people who are honest and hard working. President Obama stated at the 2009 NAACP 100th Anniversary celebration, that: "America is a place where, if you work hard, you can achieve success." A grave injustice has been done to a good American citizen (Kenneth Wayne Ford, Jr.). American citizens rely upon the United States Department of Justice to follow the rule of law.
In good faith, the initiation of a formal procedural investigation and the appointment of a Special prosecutor on behalf of our son, Kenneth Wayne Ford, Jr., is warranted and specifically should include an investigation of prosecutorial misconduct, violations of national security procedures, violations of FISA Court procedures, violations of issues in applying states secrets rules and the willful suppression of exculpatory affidavits and other exculpatory evidence in this case.
We are available at any time that is convenient to you to discuss this case. The elements in this letter by no means cover all the infractions against Mr. Ford. There were just too many illegal things done to put in a letter.
We seek an immediate vacation of Mr. Ford's conviction, full restoration of his revoked clearances and an immediate apology from the Department of Justice (DOJ).
Kenneth W. Ford, Sr.
Gloria D. Ford
l) Exhibit A - Rosenstein Press Release dated December 15, 2005
2) Exhibit B - Affidavits by SA Michael L. Thompson & SA Frederick C. Marsh and Tonya Tucker's Subpoenaed Cell Phone Records
3) Exhibit C - Tonya Tucker's threatening e-mail to Mr. Ford/Newly Discovered Evidence
4) Exhibit D - FBI Special Agent Dave Evans' Newsletter dated 3/31/2006
5) Exhibit E - Letter from Kenneth Wayne Ford, Jr. / Document of Events
6) Exhibit F - DOJ's Double Jeopardy Indictments; Docket of 11/28/2005
Indictment; Transcript Page of Dismissal of Original Indictment
7) Exhibit G - FBI Form 597 (Seized Items) w/ Computerized Listing Of Items
8) Exhibit H - Excerpt of Agent Bridget Bigham's Testimony
9) Exhibit I - E-Mail dated 10/29/2004 from Kenneth W. Ford, Jr. to Lockheed Martin
l0) Exhibit J - Excerpt of NSA Jacqueline Welch's Testimony
1l) Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony
President Obama, who prides himself as a constitutional scholar, having taught constitutional law at the University of Chicago, is about to become the subject of a major constitutional case in the indictment of Thomas Drake. Drake was not only exposing high level contract fraud involving two NSA directors -- Generals Michael Hayden and Keith Alexander -- but also allegedly involved a constitutionally-protected entity -- the press -- in making details of the fraud known to the American taxpaying public. Not since Watergate have the American people been subject to runaway surveillance by the NSA and FBI.
Obama, who supported retroactive immunity from prosecution for telecommunications companies that swept up the digital communications of all American after proclaiming he was against it, will be the person on trial in the Drake case. And Obama may very well end up like Richard Nixon if the government does not impose restrictions on the public's right to know through imposition of the draconian Classified Information Procedures Act and the State Secrets Privilege.
As one NSA insider tersely put it: "I truly believe that NSA has some illegally wiretapped information (big-time dirt) on Mr. Obama, and NSA has been using it (via blackmail) against him ever since he flip-flopped on the vote for retroactive immunity for the telecommunication firms that insisted they did nothing illegal when they joined in with the Bush administration in comprehensive, 'sea to shining sea' warrantless wiretapping of all domestic U.S. communications."
WMR's intelligence sources report that the National Security Agency's "Q Group," the directorate responsible for overall security for NSA, is actively investigating and harassing NSA employees who have reported on senior officials at the sprawling intelligence agency, which now includes the new U.S. Cyber Command, of engaging in adulterous trysts with subordinates and possessing improper sexual material, including child pornography.
WMR has previously reported on the improper activities of the Q Group, which has become a virtual uncontrolled FBI within the NSA. Q continues to protect NSA senior officials who engage in and promote a culture of sexual exploitation of junior employees at the intelligence agency. Q Group has also misused NSA psychologists and psychiatrists to deem anyone who charges senior officials of the agency with sexual misconduct or harassment unfit to hold a security clearance for reasons of mental impairment.
On August 28, 2009, WMR reported: "NSA Security, headed up by Kemp Ensor III, and NSA medical worked in tandem to deny security access to employees determined to be mentally unfit to have access to classified information at NSA.
However, due to the attrition of highly-qualified personnel, the security-medical duo is now prescribing Prozac and Zoloft for NSA employees who refuse to fall into line. NSA is abuzz with the new requirement for employees to take what they call "happy pills."
The sexual harassment scene has also reportedly changed at Fort Meade. In the past, sexual harassment at NSA involved older male managers preying on young female employees. That has now changed in what has become an environment of 'do ask and do tell.' WMR has been informed that there is an increase in complaints about sexual harassment from new young male hires about being forced into 'kinky rendezvouses' with older male managers."
Q Group has also gone outside of its legal authority to harass the families and friends of former agency employees who have brought charges against NSA for sexual harassment and misconduct. WMR has learned of NSA personnel illegally masquerading as phone company technicians who entered the property of the family of one such ex-employee. In another case, Q Group personnel poisoned two pet dogs of the family of an ex-employee under NSA surveillance. Q Group personnel have also been used to harass the ex-spouses of senior NSA officials involved in child custody cases. WMR has also been informed that Q Group has harassed NSA employees who have married the ex-wives of NSA senior officials who have ongoing legal battles with their ex-husbands.
Q Group is able to conduct its harassment of civilians in the Fort Meade area with a "wink and a nod" from local law enforcement and other officials. NSA senior managers have dipped into NSA's substantial slush fund to lavish money on community service projects and programs in cash-strapped local municipalities and counties. The concept of the "friendly NSA that provides funds and jobs" has bought loyalty and silence from local and state of Maryland officials. In addition, WMR has learned that NSA has placed agents within the congressional offices of local members of Congress in order to interdict and retaliate against NSA whistleblower congressional complaints. The NSA "embeds," who work in concert with NSA's Office of Legislative Affairs, are found within the offices of Maryland Senators Barbara Mikulski and Ben Cardin, and Maryland Representatives C.A. "Dutch" Ruppersberger, Steny Hoyer, Elijah Cummings, Chris Van Hollen, and Paul Sarbanes, and is currently inserting an agent into the office of freshman Representative Andy Harris.
As discovered in a January 2005, Q Group Personnel Security organizational chart obtained by WMR, Q2 contains an office of counter-intelligence, which WMR has reported has been involved in illegal surveillance of individuals far beyond the NSA infrastructure.
On July 3, 2009, WMR reported: "The Obama administration, rather than lessen the pressure on the NSA personnel, has turned up the heat and is resorting to even more draconian methods to ensure silence. The word from inside NSA is that a state of fear exists and the mission of the agency, to conduct surveillance of foreign communications to provide threat indications and warnings to U.S. troops and policy makers and protect sensitive U.S. government communications from unauthorized eavesdropping is suffering as a result." Our latest information is that the Obama administration is increasing pressure on NSA personnel to deter leaks.
Obama's Justice Department is now actively retroactively pursuing U.S. intelligence community leakers from the time of the Bush administration. Former CIA officer Jeffrey Sterling has been arrested and indicted for revealing information to New York Times reporter James Risen concerning Iran's nuclear program. Former NSA official Thomas Drake has been indicted by the Obama administration for leaking details on NSA contract fraud to reporter Siobhan Gorman of The Wall Street Journal and formerly of theBaltimore Sun. Former State Department analyst Stephen Kim has been charged with leaking top secret information on North Korean nuclear testing to Fox News.
WMR has learned from informed sources that the indictments of Sterling and Drake are just the beginning of the Obama administration's policy to crack down on leaks. With the tenth anniversary of the 9/11 attack coming up this year, the U.S. Intelligence Community, working closely with Mossad, have made plans to stop any new revelations that would point to high-level U.S. and Israeli government involvement in the 9/11 attacks. The Wikileaks affair was partly concocted to draw out and identify as many potential leakers as possible, including US Army Private Bradley Manning, now imprisoned at Quantico, Virginia on suspicions that he leaked classified documents to Wikileaks.
WMR has learned from an NSA source that this editor continues to remain a top priority for NSA electronic surveillance, including phone tapping and e-mail interception. NSA is also monitoring all those who are in communications with this editor via electronic means. WMR has previously reported on this web site's sources and contacts being major targets for NSA surveillance. Just as the latest report of NSA surveillance was received, this editor experienced a second-degree burn with blistering on the right neck and shoulder, usually where my cell phone is placed during conversations. The latest warning about NSA eavesdropping was received on January 8. The burn, that began as what can be described as a bad sunburn, began on the evening of January 6. The contour of the burn mark is oddly similar to the two equal halves of my flip-top telephone, with a white stripe in the middle where the hinge is located.
Second degree burns on right shoulder and neck after latest warning of full-scale NSA surveillance.
WMR's foreign intelligence sources also report that there is an ongoing project by Israeli agents-of-influence in the United States to determine the sources of information on the 9/11 attacks. This project involves in-depth probes by the Israeli agents of retired Pentagon and FBI personnel believed to possess information about the U.S. and Israeli governments' involvement in the attacks. WMR can report that radio show host Alex Jones's information and funding sources are of particular interest to the Israeli cell.
In the trial of former National Security Agency (NSA) executive Thomas Drake, federal prosecutors have convinced an agreeable federal judge, Richard D. Bennett, to place under court seal previously-released trial documents because they have been deemed "For Official Use Only" or FOUO. Drake is accused of leaking classified materials to the media and is only the fourth person in U.S. history to be charged with violating the 1917 Espionage Act.
FOUO is not a national security classification and it never has been one, although there were attempts by the Reagan, George H W Bush, and George W. Bush administrations to create a "restricted" or "sensitive but unclassified" (SBU) national security classification immediately below the current lowest national security classification, which is Confidential. Expansion of national security classification categories beyond the current three -- Top Secret, Secret, and Confidential, in addition to Sensitive Compartmented Information (SCI) special access categories -- but these have been unsuccessful. George W. Bush's creation of a Controlled Unclassified Information (CUI) category was rescinded by Executive Order 13556 on November 4, 2010.
Although President Obama rescinded Bush's CUI presidential memorandum, federal prosecutors are trying to argue that CUI continues to exist as a national security classification under the guise of FOUO. The argument demonstrates a complete lack of understanding of the classification scheme used by NSA. However, in past trials, notable that of NSA analyst Kenneth Ford, Jr., jailed after a political show trial waged by DOJ neocons in league with a "shopped" federal judge. In the Ford case, the NSA wanted to cover up the cooking of signals intelligence from Iraq in order to justify the attack on and occupation of Iraq
However, NSA and Justice Department prosecutors are continuing to insist that FOUO is a security classification in the trial of Drake, however, NSA and DOJ decided to go after Drake because the documents he stands accused of passing to The Baltimore Sunpoints to massive misuse of taxpayer's money and contract fraud under the NSA directorships of retired General Michael Hayden and current director General Keith Alexander. Alexander is also the commander of the U.S. Cyber Command. The fraud committed by Hayden, Alexander, and senior NSA officials amounted to hundreds of millions of dollars in wasteful expenditures. In some cases, the waste on certain contractor-supplied intelligence systems were life threatening, as far as troops on the ground were concerned. The fraudulent contract expenditures were part of NSA's massive TRAILBLAZER and GROUNDBREAKER outsourced modernization and restructuring programs.
On March 18, in response to a request from federal prosecutors, Bennett sealed two documents that were previously available on the court's own website. The documents sealed describe the classified contents of several documents seized at Drake's home, however, the documents appear to be unclassified working papers that the government, after the fact, is trying to argue are classified at the levels of Secret and Top Secret.
Drake's federal public defenders have argued in one of the sealed documents that the government's argument that the documents found in Drake's home in flawed due to the fact that the documents could not be construed as classified at Secret or Top Secret merely because they contain the words "FOUO" and "COMINT." COMINT is communications intelligence and by itself does not mean that the document is classified at "Handle Via COMINT Channels Only," a special handling caveat for SCI special access categories. In fact, the National Cryptologic Museum, which is adjacent to NSA headquarters and open to the public, freely uses "COMINT" in its displays. In addition, the commercial International Spy Museum in downtown Washington, DC has held public seminars on issues dealing with, among other tradecraft, "COMINT."
From the sealed DOJ letter arguing that the documents found in Drake's home are classified, it is clear that NSA, which has played fast and loose with the truth in previous trials and administrative actions against its whistleblowing employees, has tried to re-classify previous unclassified "working papers" as being Secret and Top Secret to bolster its case against Drake.
WMR has previously obtained NSA contractor documents that were deemed by the contractor and NSA, itself, as unclassified and the Drake documents appear to fall within the same category. The unclassified documents that were re-classified as Top Secret and Secret have titles such as "Trial and Testing," "Collections Sites," "Volume is Our Friend," "What a Success," "Regular Meetings," "Shoestring Budget," "BAG," "Buy vs. Make," "TT Notes," "Terrorism Threat," "Note Card 1", "Note Card 2," and more intriguing, "9/11 Commission." WMR previously reported that NSA's security directorate, the "Q Group," has engaged in massive surveillance of employees and journalists, including this editor, to plug any leaks on NSA information on the 9/11 attacks. Bennett, in his ruling on March 18, agreed to NSA's and lead federal prosecutor William Welch II's request that previously unclassified court filings be placed under seal.
While NSA and DOJ seek to convict Drake for having unclassified For Official use Only documents in which the terms "FOUO" and "COMINT" appear, WMR has obtained a similar Unclassified For Official Use Only (FOUO) document written by Computer Sciences Corporation (CSC), one of the major contractors for the fraud-ridden GROUNDBREAKER program. In the document, from which WMR is providing excerpts, there are clearly many more NSA-unique systems and terms described.
Cover terms for classified NSA systems such as HIGHCASTLE, LOOKINGGLASS, MILENIUM, FAST TRACK, ROTUNDPIPER, and BRASSCOIN are listed, along with "SIGINT" or "Signals Intelligence," an NSA mission term comparable to the "COMINT" acronym found in the working papers confiscated from Drake's home.
The CSC document, maintained by CSC contractors and sub-contractors in their cars, briefcases, and homes, were never indicted by the Justice Department on grounds they violated national security. On the other hand, many at NSA feel that companies like CSC, SAIC, Northrop Grumman, Lockheed Martin, and others, should have been indicted for the massive contract fraud carried out under the watches of Hayden and Alexander.
In post-9/11 America, the whistleblowers to fraud, waste, and abuse stand accused of being criminals while the criminals rake in billions of dollars in taxpayers' money and are lauded as critical components of the "intelligence team."
NSA's GROUNDBREAKER and TRAILBLAZER contractors were eager to compile as many NSA systems and sub-systems as possible to cash in on the billions of dollars they could make from the NSA outsourcing work. The database that contained all the NSA systems, projects, and components ripe for outsourcing work was code-named JACKPOT. For CSC, SAIC, and certain NSA officials who spun through the revolving door after retirement and landed high-paying jobs with the contractors, it certainly was a JACKPOT and one that NSA, Q Group, the FBI, Department of Justice, and the White House earnestly want to cover-up in the trial of Thomas Drake.
During Drake's trial, which begins next month in Baltimore, FBI agents are expected to use code words to describe different aspects of the case. One code-word that will most definitely not be heard is JACKPOT, the database of NSA contracts in which contractors and NSA retirees enriched themselves -- criminality that is only met with chirping crickets from the so-called "crime fighting" Department of Justice and FBI.
CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.
WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."
NSA and selling the nation's prized secrets to contractors
June 1, 2005
On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.
CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.
In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.
But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.
NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.
CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.
Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.
When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.
According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.
What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.
With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.
Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"
According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.
The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.
The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:
A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:
GALE-LITE (the primary owner of which is DIA)
SIGDASYS FILE II, III, and KL
In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include
On June 15, U.S. federal judge Richard B. Bennett sharply rebuked federal prosecutors for pursuing a four-year Espionage Act violation investigation and case against former National Security Agency (NSA) official Thomas Drake. At Drake's sentencing hearing in Baltimore, Bennett called the four-year long case against Drake and the prosecutors' ultimate dropping of multiple espionage charges to a single misdemeanor count of unauthorized use of a government computer "unconscionable."
Drake had been charged with providing classified information to the Baltimore Sun in 2006 and 2007. He was specifically charged with violation of sub-paragraphs (d) and (e) of the Espionage Act, which covers "transmittal" of classified information to unauthorized parties. Charges under the 1917 Espionage Act have rarely been brought by the Justice Department. The law was used against American Israel Public Affairs Committee (AIPAC) officials Steve Rosen and Kenneth Weissman for receiving highly-classified information, including Sensitive Compartmented Information (SCI), from a Pentagon official. Charges against Rosen and Weissman were dropped by Eric Holder's Justice Department on May 1, 2009.
However, the "classified material" cited by prosecutors was not originally classified and it pertained to NSA officials, particuarly then-NSA director General Michael Hayden, defrauding the government for well over a billion dollars. Hayden and his advisers awarded a failed program called Project TRAILBLAZER to a group of contractors led by Science Applications International Corporation (SAIC).
The prosecutors, acting as virtual criminal racket protection agents for Hayden and his advisers, decided to retroactively classify the unclassified whistleblowing information in order to justify the Espionage Act charges against Drake. Hayden's pet project also assisted in the program to conduct warrantless wiretapping of communications of U.S. citizens, a super-classified operation known by the code name STELLAR WIND.
Drake avoided prison and Bennett ruled against federal prosecutor's wish to have a $50,000 fine imposed on Drake. In sentencing Drake to 240 hours of community service, Bennett said "There has been financial devastation wrought upon this defendant that far exceeds any fine that can be imposed by me. And I’m not going to add to that in any way.”
Drake was represented by two federal public defenders, James Wyda and Deborah Boardman. Drake's case began to fall party after it was featured on CBS "60 Minutes." Retired NSA officials, interviewed on camera, defended Drake and his whistleblowing actions. After the bad publicity for NSA and Eric Holder's Justice Department, the espionage charges against Drake were dropped.
Five years earlier, in another federal court room in Greenbelt, Maryland, and in a case even more egregious than the one involving Drake, federal judge Peter J. Messitte sentenced former NSA "Iraqi shop" signals intelligence analyst Ken Ford Jr., to six years in prison and no fine as a result of his politically-motivated conviction for allegedly removing two boxes of classified materials from NSA during broad daylight without detection. In fact, the documents were planted in Ford's Waldorf, Maryland home in retaliation for his signals intelligence analysis report casting doubt on the White House contention that Iraq possessed weapons of mass destruction. That report, which contained Ford's name as the preparer, eventually ended up on the desk of Vice President Dick Cheney. As a result, Ford became a target of the neo-con cell operating from within Cheney's office and the White House Iraq Group (WHIG), the same cabal that compromised Valerie Plame Wilson's covert identity and mission.
The team of Assistant U.S. Attorney David Salem; federal public defenders John Chamble, Andrea Callaman, and Susan Bauer; and even the private lawyer eventually retained by Ford, conspired to ensure that Messitte was successfully "judge shopped" as the trial attorney, that at least one dubious pro-NSA jury member was selected for the trial jury, and that Ford would receive anything but a fair trial. Unlike Drake, Ford served in a lower-level analyst position. However, Ford, an African-American who previously served as a uniformed U.S. Secret Service officer at the White House, was on a fast-track for an executive position at NSA.
"60 Minutes" never covered the Ford case, even though it was as, if not more, outrageous as the case brought against Drake. The Washington Post, rather than assign one of its national security correspondents to the case, handed it to a Metro desk reporter, who parroted in his articles what was given to him by the prosecution team.
Prosecutors never cited any classified document that was said to be in Ford's possession at the time of his arrest. Prosecutors relied on the testimony of a confidential informant named Tonya Tucker, who had several other aliases and a long criminal record, who said she saw a document labeled "classified" in Ford's home. Of course, "classified" is not a national security label or designator for any documents. Salem also charged that Ford was planning on meeting a foreign agent at Dulles International Airport to transmit documents. However, Salem could not identify the foreign country involved, a flight number, a rendezvous point, or any details of what amounted to a "pre-crime" allegation. In fact, Salem made up the entire Dulles story as a way to ensure a guilty verdict, especially considering that the jury was never shown any of the alleged classified documents that were said to be in Ford's possession. In the Drake case, the jury was shown copies of "retroactively" classified documents, which were originally unclassified.
Ford is now out of prison and serving three-years of restricted travel probation in Maryland. He maintains his innocence and intends to appeal his case. However, Ford's attempt to enlist the assistance of the parties who came to the defense of Drake have been unsuccessful. There is another problem with the Ford case. The Ford case files, including those maintained by the PACER system and the federal public defenders office in Washington, DC, have all disappeared. Even Ford's original birth certificate in the District of Columbia Vital Records Office has disappeared. The only information available on the Ford case from the Justice Department are the press releases issued on the case.
The federal public defenders office in Washington is clearly nervous about the double standard applied to Ford and Drake. Moreover, the supervisor of Ford's tainted public defenders in 2004 was Wyda, the same public defender who successfully argued Drake's case.
Former Justice Department prosecutor Thomas Tamm, under a long investigation for revealing the nature of NSA's warrantless wiretapping program to The New York Times, eventually saw his investigation by the FBI suspended. However, WMR has learned that the STELLAR WIND program was routinely violated by NSA employees. Hayden, who came up with the program and sold it to then-CIA director George Tenet and Vice President Cheney, essentially canceled the provisions of U.S. Signals Intelligence Directive 18 (USSID) 18, which governed the application of the 1978 Foreign Intelligence Surveillance Act (FISA) at NSA. NSA was prohibited from eavesdropping on "U.S. persons" without a court order from the Foreign Intelligence Surveillance Court (FISC). Under Hayden's tenure, some NSA analysts were conducting e-mail surveillance of their current and former girl friends, prompting Hayden to cover his tracks by implementing a procedure that saw database security officers, including those with oversight over the PINWALE e-mail interception database, conducting after-the-fact audit trail analysis for internal abuse of the new NSA powers.
Ken Ford, Jr. [center], reunited with his father and mother after six years of imprisonment on trumped up neo-con political charges stemming from the search for phony Iraqi WMDs.
Ford's case, which involved pressure from the Bush-Cheney White House, has also met with indifference from the Obama White House and the Congressional Black Caucus. Groups like the Government Accountability Project (GAP), which assisted with Drake's defense, did not raise a finger in the Ford case.
During his incarceration at Lewisburg federal penitentiary in Pennsylvania, Ford received rank-and-file support from some current and former NSA employees. However, unlike Drake, not one high-level NSA official, current or retired, came to Ford's defense, even though his innocence was as provable as that of Drake. It is, indeed, a "tale of two cases," one with a relatively happy outcome, the other singed with racism.
WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.
When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.
There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.
At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.
The following press release was issued on May 12, 2005:
"Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . .
OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."
Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.
Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZER contract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.
Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.
One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."
Among the spin-offs of TRAILBLAZER was the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.
Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.
Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."
As WMR has reported in past articles, the National Security Agency (NSA) has maintained a series of "mug shots" of journalists it suspects have sources inside the NSA. Often, NSA personnel throught to have been speaking to journalists are called into NSA's "Q" security group and questioned on whether they have spoken to various journalists. Along with the names of the journalists, are photographs, described by NSA insiders, as "mug shots," likely culled from the Internet.
WMR previously reported on NSA's "rogue gallery" of journalists. From WMR, July 3, 2009: "Since the revelation of the NSA journalist monitoring database, which later added communications intercepts of journalist phone calls, emails, and faxes to its database, NSA Security has, according to information received by WMR, conducted physical surveillance of journalists it deems to be threats to the operations of the agency. The top targeted journalists, who make up a virtual 'rogues' gallery' at NSA Security, complete with photographs and other personal information, are: former Baltimore Sun and current Wall Street Journal reporter Siobhan Gorman, Washington Times reporter Bill Gertz, former Baltimore Sun and current New York Times reporter Scott Shane, Baltimore Sun reporter Phil McGowan, author James Bamford, New York Times reporters James Risen and Eric Lichtblau, and this editor, Wayne Madsen."
WMR has now learned from NSA sources that NSA and FBI counter-intelligence branches are maintaining "mug shots" of journalists. Two to three pages of journalists, along with their photographs, are known to be in the possession of FBI counter-intelligence agent Laura Pino and NSA counter-intelligence officer Ethan Andreas. Each page has two rows of photographs across with four photographs and names of journalists on each row -- a total of eight photographs and names per page. The number of journalists on the pages, therefore, could be between 16 and 24.
Three names are known to be on the pages maintained by the FBI and NSA, according to our sources: Siobhan Gorman, James Bamford, and this editor, Wayne Madsen. Gorman was believed to have been the journalist former NSA official Tom Drake was in contact with before he was criminally charges under various counts, including the the Espionage Act. Drake was a witness to high-level contract fraud and corruption within the NSA. WMR submitted a Freedom of Information Act request to NSA two years ago requesting information on the editor's photograph being used as a security warning device. After being granted expedited processing by NSA as news media for purposes of the FOIA request, NSA reversed course, denying us media status and then stonewalled responding to the request. [Related story today in WMR].
WMR has learned and has personally experienced the unprecedented assault by the Obama administration, aided and abetted by its intelligence and internal security infrastructure, on the First Amendment right of freedom of the press.
The Obama administration has indicted a total of six U.S. government employees with violating the arcane 1917 Espionage Act for allegedly communicating classified information to the press. The Obama administration, according to multi-agency U.S. government sources , has authorized the eavesdropping of journalists' e-mails, text messages, and phone calls to determine to whom they are in contact within the government, particularly in the Departments of State, Defense, Justice, the CIA, the U.S. Congress' intelligence oversight committees, and the National Security Agency (NSA). The NSA and FBI are also monitoring what websites are visited by government employees, including this one.
The six people charged under the Espionage Act with providing classified information to journalists (the "Obama Six") are:
John Kiriakou, former CIA, allegedly passed information on waterboarding torture tactics and the identity of a CIA torturer to someone identified by the government as "Journalist A." The chief government prosecutor is U.S. Attorney for Northern Illinois Patrick Fitzgerald, who WMR has identified as a cover-up prosecutor for the CIA ever since the days he suppressed critical intelligence in the trial of the "Blind Sheik," Omar Abdel Rahman, convicted for plotting the 1993 World Trade Center bombing and later, when he failed to bring Espionage Act charges against Dick Cheney chief of staff I. Lewis "Scooter" Libby in the Valerie Plame Wilson leak case. Fitzgerald also prosecuted former Illinois Governor Rod Blagojevich to protect the CIA's one-time agent, Barack Obama, Jr., from scandal arising from Obama's political and social activities in Chicago.
Jeffrey Sterling, former CIA, charged with providing The New York Times' James Risen with classified information on Iran's nuclear program.
Army Private First Class Bradley Manning, charged with providing over a quarter million State Department classified and unclassified cables from the SIPRnet communication system to WikiLeaks.
Thomas Drake, former NSA official, charged with providing classified information to journalists, including former Baltimore Sun reporter Siobhan Gorman. The charges against Drake were later reduced.
Stephen Kim, former State Department contractor, charged with leaking classified information about North Korea to Fox News' James Rosen.
Shamai Leibowitz, former FBI Hebrew translator, convicted of leaking classified FBI wiretaps to a blogger on Israeli intelligence activities in the United States directed at stirring up war fever against Iran. As yet, Leibowitz has been the only person convicted under the Espionage Act for leaking information to the media. The government fast-tracked the Leibowitz trial in order to supress coverage of Israel's massive intelligence operations in the United States.
WMR knows of six other ex-employees of NSA and the State Department who continue to face criminal probes by the Obama administration for leaking information to the press.
Government employees face constant monitoring of their government emails, as well as their personal e-mail accounts for any contact with the press. The FBI, NSA, and other agencies are also monitoring the web sites visited by government employees. At the State Department, lists of web sites visited by employees are maintained by the Diplomatic Security Service (DSS). DSS also maintains lists of charities to which State Department employees donate money.
WMR learned of one case where the U.S. Navy blocked access to the web for an employee who visited WayneMadsenReport.com from a government computer. The employee was required to explain to the system security administrator why WMR was visited and cautioned that WMR is on a "banned" list for Navy employees. At NSA, employees have been ordered not to disseminate any articles from WMR on the agency's internal e-mail system or they will face disciplinary action and possible loss of security access and their jobs.
There are also increasing reports that journalists' e-mails are being monitored or completely blocked by the U.S. government agencies and cooperating Internet Service Providers (ISPs). WMR has recently experienced such a denial-of-service by America On-Line (AOL).
The increased harassment of journalist sources by the Obama administration comes at the same time that Reporters Without Borders has dropped the United States on the World Press Freedom Index to 47 from 20 on the press freedom ranking list. At 47, the United States is tied with Romania and Argentina and ranks below the Union of Comoros in the Indian Ocean; increasingly fascist-oriented Hungary; Papua New Guinea, which has experienced a military coup; Mali; Tanzania; Botswana; Suriname; Niger; and Cape Verde. In 2002, during the second year of the Bush administration, the United States was ranked at 17.
William Welch II was the chief of the Justice Department’s Public Integrity Section. While the title of his former office -- public integrity -- implies that Welch is dedicated to fighting corruption in the government, in President Obama's and Attorney General Eric Holder's Orwellian world of "Newspeak," Welch is the chief inquisitor of government whistle blowers and journalists who have communicated with them.
After committing ethical and legal violations in his investigation of the late Alaska Senator Ted Stevens, acts that resulted in criminal charges being dropped against Stevens and a criminal contempt of court investigation being opened against Welch, along with a Justice Department ethics probe, Welch continues to investigate national security whistle blowers. Welch has become a de facto special prosecutor, a modern day Juan de Torquemada, responsible for pursuing government "leakers" and journalists. Welch's targets have included National Security Agency fraud whistle blower Thomas Drake. He also has his sights set on former CIA officer Jeffrey Sterling and James Risen, the New York Times national security correspondent who Welch believes communicated with Sterling. Risen and the Times are fighting a subpoena for Risen to answer Welch's questions before a grand jury. Previously quashed by U.S. Judge for the U.S. District Court for Eastern Virginia Leonie Brinkema, the subpoena has been appealed by Welch and Holder to the U.S. Court of Appeals for the Fourth Circuit in Richmond, Virginia.
Welch and his team were also publicly berated by U.S. Judge Richard Bennett for faulty evidence against Drake who was being doggedly pursued by Welch for allegedly communicating with aBaltimoreSun reporter about billions of dollars in contract fraud committed at NSA, where Drake served in a senior executive position. Drake and veteran NSA colleagues found themselves being raided at gunpoint by FBI agents under Welch's supervision. Welch's case against Drake collapsed and in a plea agreement, all Welch could get from Drake's defense team was a guilty plea for a minor charge of misusing a government computer. Bennett rejected Welch's argument that Drake be given a $50,000 fine. Bennett said Welch put Drake through “four years of hell."
Bennett also criticized Welch for taking so long in bringing charges against Drake. Welch's case against Drake was conducted in anything but a speedy fashion. Welch's tactics included keeping potentially exculpatory evidence from Drake's defense team for months after the indictment was handed down. For over six months, Welch's team failed to produce evidence that one of the allegedly classified documents Drake was charged with improperly retaining was declassified two months after the indictment was issued.
Welch waited ten months to turn over evidence that another document that formed the basis of an Espionage Act charge against Drake had been - in the words of Drake's criminal defense team - “. . . published as 'unclassified' and had never been deemed 'classified' until after it was recovered from Mr. Drake's home.” The re-classification of previously de-classified documents is one of the tricks employed by the Holder Justice Department in pursuing leak investigations. Welch also informed Drake's criminal defense team that potentially exculpatory evidence relating to Drake's years-long cooperation with a Department of Defense Inspector General (DoD IG) investigation had somehow been "destroyed."
Welch has had a history with "destroyed" evidence. On December 1, 1996, Welch, who was then an assistant U.S. Attorney in Massachusetts and 33 years old, was stopped by the police on Route 10 in Southampton. Welch was arrested for driving under the influence of alcohol by a police officer after Welch failed four field sobriety tests. A special prosecutor was named in the case against Welch. According to the Union-News of Springfield, the prosecutor, Robert C. Bray, discovered that the police cruiser's video recorder failed to operate properly and the video tape could not be used as evidence against Welch. It also helped that Welch's father was Superior Court of Massachusetts judge William H. Welch. The senior Welch, who died in 2007, had been considered for four federal judgeships but was never nominated.
According to the Union-News, Southampton Police Lt. David Silvernail said that the video camera, which was purchased in November 1996 with federal grant money, 'went on when overhead cruiser lights were activated and was not supposed to go off until an officer shut it off.' Apparently, the camera had been shutting itself off after three minutes, but miraculously for Welch the problem was not discovered until Welch's arrest. 'The camera was sent back to its manufacturer to be fixed after the problem was found,' Silvernail
told the newspaper. The criminal case against Welch was dropped. The tape was later reused by Southampton police officers and the Welch arrest segment was erased.
William Welch blows every case to which he is assigned. Perhaps he should blow into a plastic bag.
The story of William Welch is not an isolated one among Justice Department prosecutors. In Welch's case, someone who was so drunk he could not pass four sobriety tests on a Massachusetts highway is now entrusted by the Obama administration with the power to investigate those who challenge incompetence and wrongdoing in the U.S. intelligence community.
END WAYNEMADSENREPORT.COM ITEMS >>>>
Whew.... All right. Now go read the Puzzle Palace and the Shadow Factory and everything you can find on Cryptome.org and PublicIntelligence.net about the NSA & Cryptography. GET [hash] CRACKIN!