martial law

EXCLUSIVE: Such Critical Infrastructures: FBI feeds Anonymous IRC channels to CIA, Pentagon intel, NSA, NORTHCOM in 2012 Intel memo

An FBI "IIR" intelligence report, dated April 12 2012 entitled "Identification of Internet Relay Chat (IRC) Channels Used by Anonymous Members, as of 12 April 2012" surfaces a dicey realm between US military & intelligence and electronic activists. The full report is at scribd.com/doc/246922867/FBI-FOIA-IRC-Chat-Channels-used-by-Anonymous // (Mobile) /// UPDATE: Upvote this post on Reddit & Thanks to YAN for amplifying!

FBI FOIA IRC Chat Channels used by Anonymous by Smiley Hill

A tiny peek into a huge deal: the potential fracas between assorted would-be American military cyberwar commandoes and international (and domestic!) computer activists. This lower-level report (Unclassified//For Official Use Only) (U//FOUO) perhaps is more interesting for its "metadata" rather than thoroughly censored content. Below I also included some other domestic military operations documents below to draw a wider context than just this "cyberwar" stuff, as Ferguson has prompted Gov. Nixon in Missouri to activate the state militia, it's good to read up on what federal legal doctrine for "civil disturbances" is.

fbi-iir1.png
fbi-iir2.png
fbi-iir3.png

Such recipients: In order, it says it is from "DIRECTOR FBI" to:

All FBI field offices

INFO AFOSI DET 331 Andrews AFB Maryland, Headquarters Air Force Office of Special Investigations (also cited in this case http://www.dod.mil/pubs/foi/homeland_defense/intelligence/EFF_vs_DOD_Bates_997_1096.pdf )

CDR USSTRATCOM Offutt AFB Nebraska, Strategic Command commander

CDR USTRANSCOM Scott AFB Illinois, United States Transportation Command commander

CDR1STIO Ft Belvoir Virginia, First Information Operations Command commander - https://www.1stiocmd.army.mil/ (wat? "CDR1STIO" pops in a bunch of other FOIA'd IIRs as well if you googlize it)

CIA WASHINGTON DC - always down for a good time

DEPT OF HOMELAND SECURITY WASHINGTON DC - yes, this hot info wasn't stovepiped away from rivals

DEPT OF JUSTICE WASHINGTON DC - fetching banhammer

DEPT OF STATE WASHINGTON DC

DIA WASHINGTON DC - Defense Intelligence Agency which is huge and low profile - http://www.dia.mil/

DIRNAVCRIMINVSERV - Probably HEADQUARTERS. NAVAL CRIMINAL INVESTIGATIVE SERVICE.

DNI WASHINGTON DC - Director of National Intelligence. (Clapper at the time)

HQ AFOSI Andrews AFB Maryland - Air Force Office of Special Investigations. Tip, if you have some message for them, use their unencrypted contact form to let them know about fraud or etc. What could possibly go wrong? > http://www.osi.af.mil/main/contactus.asp

HQ NORAD USNORTHCOM INTEL PETERSON AFB - US Northern Command located near Colorado Springs was created as Dept of Homeland Security's military counterpart for "Homeland Defense", an elastic concept extending Pentagon involvement with "critical infrastructure," namely the machinery of major corporations. They also revised "GARDEN PLOT" into CONPLAN 3502 Civil Disturbance Operations," relevant in a Ferguson type context under federal mobilization. (see 2010 story) They were also written into Superman's plot.

JOINT STAFF Washington DC - J2 - Director for Intelligence (J2) on the Joint Chiefs of Staff (now this guy)

JWAC DAHLGREN Virginia - Joint Warfare Analysis Center a "premier science and engineering institution" under Strategic Command (USSTRATCOM), which also hosts Cyber Command. see http://www.stratcom.mil/functional_components/

NGA HQ Bethesda Maryland. The National Geospatial Intelligence Agency, like DIA, is up to a lot of things off the radar. They have domestic satellite spying (GEO INT) responsibilities at National Special Security Events which require a special domestic military intel privacy waiver. http://www.stratcom.mil/functional_components/ . Big spenders.

NSA FT GEORGE G MEADE Maryland - National Security Agency at the oddly spelled out Ft Meade. I wonder how many land in this inbox - and how many times "George G" is stored in their databases.

US SECRET SERVICE WASHINGTON DC

USCYBERCOM FT GEORGE G MEADE Maryland - Cyber Command in ur router, sniffin ur packets

WHITE HOUSE SITUATION ROOM WASHINGTON DC.

BT . … I am fairly sure this is a closing list tag like </UL>

////

Serial IIR 4 213 4003 12, "WARNING (U): This is an information report, not finally evaluated intelligence. It is being shared for informational purposes but has not been fully evaluated, integrated with other information, interpreted or analyzed. Receiving agencies are requested not to take action based on this raw reporting without prior coordination with the FBI. Unless a conviction in a criminal proceeding occurs, a presumption of innocence exists for any person being reported on in this IIR." Declassification date appears 20370607, as this hot stuff needs to lay low for a couple more decades.

What is an IIR? It is pretty low level stuff for the FBI. For a bit of info see FBI Intelligence Information Report Handbook | Electronic Frontier Foundation. That document interestingly, at the very end includes a statutory info pipeline from Grand Jury operations to various feds. Patriot Act Section 203(a)(1)( C )(i)(V) certainly makes for an industrious star chamber circuit, but they don't want grand jury info going out in IIRs without asking the HQ attorney.

This document was obtained by Smiley Hill via FOIA. Please follow https://twitter.com/smilyus for more smileable FOIAs on a regular basis.

////

The use of the military - and these contractors in the game now - to police corporate systems labeled as Critical Infrastructure is significant. After all, Missouri Gov Nixon just activated the state militia because of Ferguson.

ferguson-crop2.png ferguson-crop1.png

In the recent FBI writeup freeking out about Ferguson protesters, I took the "critical infrastructure" references to allude to authorizing military activity around corporate electronic assets that might get poked at by angry activists.

“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”

fergusoncrop.png

////

Background on Executive Order 13636:

See NSA's cybersecurity program to protect critical infrastructure revealed - Military & Aerospace Electronics

Feb 2013: Executive Order -- Improving Critical Infrastructure Cybersecurity | The White House

CRS analysis on Executive Order: http://fas.org/sgp/crs/misc/R42984.pdf

Feb 2013: Pentagon will require security standards for critical infrastructure networks - Nextgov.com

This is actually a word? Cyberinfrastructure - Wikipedia, the free encyclopedia

Nov 2012: Cyber Order Puts DHS In Charge Of Oversight, Sets Deadlines « Breaking Defense - Defense industry news, analysis and commentary

USA TODAY: Feb 2013: Cybersecurity executive order fosters information sharing for greater good

As for the legal ramifications of domestic military operations and targeting electronic activists with tools like STRATCOM / CYBERCOM retain for battling Al Qaeda servers or whatever, most people say "But, Posse Comitatus!" In reality a vast area of domestic military operations has been expanded and operated by JAGs. See : www.loc.gov/rr/frd/Military_Law/pdf/operational-law-handbook_2012.pdf

This Domestic Operational Law Cyber Realm has a Handbook, People!

DomesticOperationalLaw2011.png

The domestic version of this JAG manual is extremely recommended reading for everyone. See Domestic Operational Law Handbook for Judge Advocates 2011 | Public Intelligence.

Also the newer 248 page Domestic Operational Law Handbook for Judge Advocates 2013 | Public Intelligence is available. You will definitely know moar about WTF is up with weird meshes of civilian/military authority in the US by skimming over this.

PI highlighted a bunch of good 2011 stuff, since we are talking Ferguson anyway, it's worth noting again:

G. The Department of Defense Civil Disturbance Plans

Formerly, DoD’s Civil Disturbance Operations (CDO) plan was known as “GARDEN PLOT.” Since the creation of the Department of Homeland Security and USNORTHCOM however, DoD has delegated to geographic combatant commanders responsibility for developing CDO Contingency Plans (CONPLANs). These geographic commanders’ CONPLANs provide guidance and direction for planning, coordinating, and executing military operations during domestic civil disturbances.

1. Civil Disturbance Operations Mission

Broadly stated, the CDO mission assists civil authorities in restoring law and order in the United States and its territories.58 This mission statement, while not duplicating the language in the Insurrection Act allowing for the use of federal forces to “suppress” insurrection, provides wide latitude to the President to use federal forces to assist civil law enforcement in “restoring” law and order.

The restoration of law and order must be distinguished from the preservation of law and order. CDO mission statements do not allow the joint civil disturbance task force commander to undertake preservation missions. It is generally agreed that missions to restore law and order include dispersing unauthorized assemblages, patrolling disturbed areas, maintaining essential transportation and communications systems, setting up roadblocks, and cordoning off areas. Care should be taken before a military commander accepts missions that are routine maintenance of civil order.

2. Combatant Commanders’ CONPLANs

The CONPLANs provide the basis for all preparation, deployment, employment, and redeployment of Department of Defense component forces, including National Guard forces called to active federal service, for use in domestic civil disturbance operations, in support of civil authorities as directed by the President. The concept of a civil disturbance operation is multi-phased: Phase 0, Shape; Phase I, Anticipate; Phase II, Respond (deployment can occur in either Phase I or Phase II); Phase III, Operate; Phase IV, Stabilize; and Phase V, Transition (redeployment). Prior to deployment, military forces maintain five preparedness postures, called Civil Disturbance Conditions (CIDCONS) in order to alert and react to potential civil disturbance operations. Changes in the CIDCON level are directed by the JDOMS.

3. The Standing Rules for the Use of Force for U.S. Forces

Civil disturbance operations are conducted in accordance with Appendix L of the Standing Rules of Engagement/Standing Rules for the Use of Force for U.S. Forces (SRUF). Guidance on how and when forces can use force in a CDO mission are detailed in that annex. Although the CJCSI is classified, Annex L is not and can be shared with our mission partners.

a. Custody and Detention

All apprehensions should be made by the civil police force unless they are not available or require assistance. Military forces have the authority to detain rioters, looters, or other civilians committing criminal offenses. Civilians taken into custody should be transferred to civilian law enforcement authorities as soon as possible.

All members of the force must remember that state and federal criminal law and procedure govern apprehension. Apprehension is justified only on the basis of probable cause to believe that an offense has been committed and that the person to be apprehended committed the offense. Soldiers should not question detainees beyond basic pedigree such as name and address. If formal questioning of an offender is necessary, civilian police should conduct the interview. If civilian police are not available, CID agents or military police may conduct interviews only if the interview is essential to the civil disturbance mission. Actions taken by Soldiers that do not conform to criminal law constitutional standards could jeopardize future prosecution and subject Soldiers and their Commanders to criminal and/or civil liability.

b. Search and Seizure

CDO CONPLANs anticipate that military forces will generally not be involved in searches unless there is “an immediate danger of violence, destruction of evidence, or escape of violent persons unless the search is conducted without delay.” In all other cases, local authorities should conduct searches. When required to perform searches, federal armed forces may conduct warrantless searches under the same constitutional parameters imposed upon law enforcement officials. Joint Civil Disturbance Task Force forces conducting a warrantless search will fully document the reasons for the search as soon as is reasonably convenient.69 Generally these searches are limited to the following incidents.

(1) Stop and Frisk

If there is a reasonable suspicion based upon articulable facts that a person has committed, is committing, or is about to commit a crime, that person may be temporarily stopped and questioned about his activities. The stop must be limited in duration to that which is reasonably necessary to investigate the suspicion. If there is a reasonable suspicion based on articulable facts that a person is armed or is carrying instruments of violence and that the individual presents an immediate risk of harm, members of the armed force may conduct a “frisk” (an external “patdown” of the clothing) for weapons. Any weapons found during a frisk may be removed from the individual and seized.

(2) Search Incident to Lawful Apprehension

A person lawfully detained may be searched for weapons or destructible evidence. A search for weapons or destructible evidence may also be conducted in the area where the detained person could reach with a sudden movement to obtain a weapon or destroy evidence.

(3) Exigent circumstances

Military forces assisting law enforcement may make a search without a warrant when they have reason to believe (probable cause) that weapons, objects related to criminal activity, or persons believed to have committed an offense, are in the place to be searched; and they have reason to believe that the delay necessary to obtain a search warrant would result in removal of the weapons or destruction of the objects related to criminal activity. For example, Joint Civil Disturbance Task Force forces may stop and search an automobile without a warrant when there is reason to believe that the automobile contains weapons or instruments of violence and/or contains an individual reasonably believed to have committed violence.

(4) Emergency

Military forces in a civil disturbance operation may make an immediate entry into a building when there is reason to believe that entry is necessary to prevent injury to persons, serious damage to property, loss of evidence, to protect public safety, or to render aid to someone who is in danger.

(5) Hot pursuit

Military forces pursuing a person who they have reason to believe has just committed a serious crime, may enter a vehicle or building believed to be entered by the suspect and search the building or vehicle for the person or any weapons that might be used to further his escape.

(6) Plain View

During the course of otherwise lawful activity, military forces may seize any unlawful weapons or objects related to criminal activity which they observe in plain view. When conducting warrantless searches that require a probable cause determination, military forces can obtain advice from a judge advocate; however, the probable cause determination must be made personally by the individual desiring to conduct the search.

If a search warrant is required, local civil authorities should obtain judicially issued search warrants. If local civilian authorities are not available, judge advocates need to be prepared to provide advice on probable cause to military authorities before they approach a local judge or magistrate for a search warrant.

When feasible, all searches conducted by military personnel will be conducted by two personnel with the actual search performed by someone of the same sex.76 A hand receipt or some similar document should be prepared when items of personal property are seized from an individual.

c. Confinement Facilities

The Joint Civil Disturbance Task Force should not operate a detention facility. Any person apprehended should be turned over to the police for detention. Military correctional facilities cannot be used to detain civilians. If available civilian detention facilities cannot accommodate the number of detained persons who are awaiting arraignment, the Joint Civil Disturbance Task Force commander must seek the approval of the SCRAG and Combatant Commander to set up a temporary detention facility.

Should the Task Force be required to operate a detention facility, the detention facility standards and operations should conform, to the maximum extent possible, to current DoD confinement facility operations and will be under the professional supervision and control of Military Police personnel. The establishment and operation of military detention facilities is a temporary expedient and is authorized only until such time as the custody of detained persons can be transferred to civil authorities.

d. Riot Control Agents

Normally, for CDO the deployment and use of riot control agents is allowed as a matter of U.S. policy. However, initial approval authority for its deployment and use may be retained at a level higher than the Joint Civil Disturbance Task Force Commander and may require a specific request.

This is not the same as a state-level activation, but it is the doctrine that is crafted at the federal level these days so I think it's pretty relevant to Ferguson.

timthumb.png

The federal government hasn't taken kindly to people that expose these types of relationships. Barrett Brown's sentencing just got delayed again - but at least the Barrett Brown Review of Arts and Letters and Jail is awesome. For more info FreeBarrettBrown.org.

2013: Boston, paper gold, Obama signs Stock Act reversal, Homeland Security and food stamps

UPDATE 4.19.2013: MOAR about domestic military operations policy shifts w doc & video: http://www.hongpong.com/archives/2013/04/19/pentagon-domestic-operations-switches-pull-push-24-48hr-timelines-defense-suppor

20130415_whosbuying.jpg

Hang tight folks, it looks like we are on the cusp of another 'burst of change' on a few fronts. You should probably double the watts going to your news radar for at least 10-14 days, if you possibly can. And all those cheesy "financial systems" are getting Extra Discontinuous as they usually do when Collapse starts happening in various segments. I decided to cork out a very rough post on these topics, Your Mileage May Vary thx::

While the Boston situation loaded with symbolism like international flags & the JFK library fire attracts most attention, the reality is that bombings at events are pretty rare and unlikely to happen; once it does the media loops the same traumatizing video clips for web hits. The editorial style: giving viewers agog consciousness that spells ratings. I saw Good Morning America a few mornings ago, it was a massive blitz of domestic violence and a patina of Victoria's Secret models.

With that spectacle set aside for a moment, other trends hitting key points this week include a shady new Stock Act law being signed by Obama and dramatic corrections in several markets including particularly gold. Gotta give some space to the Hill, this is ridiculous:

President Obama quietly signed legislation Monday that rolled back a provision of the STOCK Act that required high-ranking federal employees to disclose their financial information online.

The White House announced Monday that the president had signed S. 716, which repealed a requirement of the Stop Trading on Congressional Knowledge (STOCK) Act requiring the disclosure, which had previously been delayed several times by Congress.

That provision, added to the bipartisan bill aimed at halting insider trading by members of Congress, would have required roughly 28,000 senior government officials to post their financial information online, and had come under harsh criticism from federal government employee unions.
Both chambers of Congress quickly — and near silently — approved the repeal legislation at the end of last week by unanimous consent, just before heading home to their districts.

The STOCK Act was signed by the president a little over one year ago in a highly visible signing ceremony, where he said the legislation would tackle the "deficit of trust" that exists between Washington and the rest of the nation.

The new law scraps a provision that had been hotly contested by federal employees, as well as found to be problematic and even dangerous for high-ranking government workers. Congress twice had passed legislation to delay its implementation. Under that provision, high-ranking government workers would have been required to post their financial information on a publicly available online database.

//////

PAPER GOLD BIG MOVES: The gold market is a peculiar misunderstood beast - it's like a bunch of stuff in vaults with IOU's attached to numbered bars. The IOUs underwrite the financial products like Exchange Traded Fund GLD "gold" - it is operated in reference to the underlying gold's supposed value, but it's not actually a contract providing recourse to the gold.

I flagged for some people a few days ago that the COMEX or commodities exchange gold market, as well as JP Morgan, has had large declines in physical gold reserves in the warehouses recently.

See just recently: 30% of CNT Silver Inventories Withdrawn from COMEX Vaults in 2 Days! | SilverDoctors.com // Why Is JPMorgan's Gold Vault, The Largest In The World, Located Next To The New York Fed's? | Zero Hedge // Especially: Comex Gold Inventories Collapse By Largest Amount Ever On Record

Now today a whopping 122 tons of 'paper gold' got flipped around & tons of margin hikes are getting called on gold traders in different markets around the world, forcing people to keep dumping gold in bursts.

Gold Crush Started With 400 Ton Friday Forced Sale On COMEX | Zero Hedge - tactical deals of the Mega short sale to break through the 'important' price of $1540. Aha... Via Ross Norman of Sharps Pixley,

"Futures trading is performed on a margined basis.. One fund in particular, based in Stamford Connecticut, was identified as the previous shorter of gold and has a history of being caught on the wrong side of the law on a few occasions. As baddies go - they fit the bill nicely.

......The value of the 400 tonnes of gold sold is approximately $20 billion but because it is margined, this short bet would require them to stump up just $1b. The modest short selling in Jan 2013 had prompted little response from the longs - raising questions about their real commitment. By forcing the market lower the Fund sought to prompt a cascade or avalanche of additional selling, proving the lie ; predictably some newswires were premature in announcing the death of the gold bull run doing, in effect, the dirty work of the shorters in driving the market lower still."

These charts are nuts. In recent years, gold drops coincided with bubbles in the S&P type prices, that then crashed. What Happened The Last Time We Saw Gold Drop Like This? | Zero Hedge see 2008 and 2011. Gold Drops Most In 30 Years | Zero Hedge

In recent weeks due to Japan's new hyper-loose monetary policy, crazy things have been happening around the Yen's value. (Australia is spiking moar than anything else it seems) Europe also has a new wave of trust destabilizing the banking system with various deals being attempted in Cyprus & Greece.

(see Which Country's Gold Will Be Sold Next? | Zero Hedge). Also the creditor fascist complex has angled to get at the Greek government's remaining stash of gold so that they can be sacrificed on the altar of the billionaires once and for all.

See also, All Eyes On The Gold Rout, Most Oversold In 14 Years | Zero Hedge . Gold Plummets By Most In 30 Years, Stocks Have Biggest Drop Of 2013 | Zero Hedge - this cuts across a lot of sectors. The CFTC needs to be looked at as well, as some of this material indicates.

The DJIA has been flying high above all of this, though even the corporate news points out that this whole phase of asset value inflation is at least partially due to the Fed's loose monetary policy. Housing prices are "up" they say, what could possibly go wrong?

//////

It's pretty sick meanwhile that an incredibly high level of food stamps are the formal basis for America's food security, at around 23,000,000 households and rising. When Obama entered office this was less than 15,000,000 households -- and the benefits per household are slowly being cut along with much of the social safety net programs both in Minnesota and nationwide. US Households On Foodstamps Hit Record High | Zero Hedge. USDA data.

FoodstampHousholds.jpg

This is a consequence of bailing out banks with trillions of dollars, collateralizing the American people and introducing tons of sovereign credit risk into the US Dollar, the Euro & beyond. It has altered the "biopolitics" of the US to the point that this many people cannot handle generating economic activity in this system to keep themselves alive - and clearly the amount parceled out is declining fast.

//////

CSA's [relatively cheap & nutritious food share subscriptions] and local barter-based currencies are among the more resilient network ideas that ought to get looked at right now. I think there is a pretty severe risk to the stability of the whole country (let alone world) when food stamp debit card systems keep that many millions of families from starving. If nothing else there needs to be fallback systems from the US Dollar & conventional banking system may abruptly halt or radically shift in value or stability. This is something people need to start getting their heads around - so that if the debit cards stop working, different ones operating on some other basis (ie local currencies) can be handed out & millions aren't put in such imminent danger. (see DepressionScrip.com for 1930s substitute local credit instruments - key!)

The food stamp debit cards are usually administered by big banks - giving them yet another lever of functions to 'terrorize' elected officials and bureaucrats into further handing over all the nation's "commons" through fraud & socially constructed economic schemes. The banks have probably the biggest, quickest "kill switch" on social stability. A trivial switch for them to hit compared to most!!

//////

Bitcoin had a big run-up for several days and now has retreated somewhere into the $50-100 range - for a good time keep an eye on Bitcoin Charts. Still, it seems like there's more than enough demand to keep it above $40. However the Bitcoin economy suffers from overly concentrated exchanges.

The biggest exchange, MtGox, has such a large market share - and can't keep up once really huge, shady order floods come in, that the whole Bitcoin economy tends to get "goxxed" and bog down, panic selling and various cats stepping in to buy all the way down.

I am doing a lot of research on Bitcoin right now including the various exchanges (LIST) - in the long run, Bitcoin and other alternative cryptocurrencies share certain features like peer-to-peer encryption/hashing based universal linear transaction registers called "blockchains", and ways of verifying those blockchains with CPU or GPU intensive cryptographic calculations to award more 'coins' and slowly expand the money supply while shoring up trust in the global account ledger.

A new website as well as local Facebook & Twitter accts are getting rolling :) Brand new: follow http://twitter.com/bitcoinmn and http://facebook.com/bitcoinmn for Minnesota Bitcoin goodies!

Bitcoin OTC order book is a chat network approach to decentralized exchange design with trust ranking (like eBay rankings in a way).

Good news for people interesting in making exchanges or intercambios in the form of Ripple, in the early stages an open source project with VC backing to build multi-currency exchanges and trust networks among peers. (chart) Some open source software is available on GitHub for Ripple and its "XRP" intermediary currency, which could then be a proxy to regular fiats or Bitcoin etc.

See also: wow Six reasons why Chinese people will drive the next bull market in bitcoin – Quartz

Mining Bitcoins takes power, but is it an “environmental disaster?” | Ars Technica - wattage will improve - and compared to the phenomenal amount of energy blown on fractional reserve banking derived parasitic functions, Bitcoin is nothing! Also: “Taming the bubble”: investors bet on Bitcoin via derivatives markets | Ars Technica

Paul Krugman Goes on the Attack: Calls Bitcoin “Antisocial” // The Antisocial Network of Bitcoins - NYTimes.com by Krugman! "We have huge economic problems, but green pieces of paper are doing fine — and we should let them alone." LOL that food stamp chart is definitely not keeping the great Keynesian up at night.

/////

A moment for weird Boston links: What did Peter Griffin know about Boston and when did he know it? Watch! Family Guy boston bombing - YouTube Yeah this petition is picking up steam - Petition | Demand that Seth MacFarlane make a public accounting for his foreknowledge of the Boston Bombing | Change.org

This is a popular item now: Boston to Deploy Mass-Casualty Tablet Device During Marathon

Excellent videography: Boston.com viral video page - Boston.com. Also: Israel honors war dead with somber Memorial Day - News - Boston.com

Oh also in that viral video above you can see the military incongruously popping up within about 1 minute 44 secs in Boston as Cryptogon and other news have noted. You'll want to check out TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com about USNORTHCOM CONPLAN 3502 if you haven't already.

/////

SEE previously Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

Homeland Security's New $3.9 Billion Headquarters - Businessweek. Money quote:

In February, one of the DHS’s more persistent naysayers, U.S. Representative John Mica, a Florida Republican, boasted about how he and his fellow party members had curtailed the project. He said he would also like to dismantle much of the DHS.

He’d better act swiftly. If the White House ever gets all the DHS’s divisions on one campus, nobody will want to move them again.

Homeland Security bloat and the great Unemployed: Word went around that ICE was serving a federal warrant pertaining to Boston. ICE is a unit of Department Homeland Security which spawned the little known HSI, or Homeland Security Investigations, division, a new kind of (literal) black helicopter FBI-style agency

The dip in metals and the odd security situation brought Cryptogon.com to recall a post from late 2012 from HomelandSecurityUs.com, the Northeast Intelligence Network site edited by Doug Hagmann & his son. They are pretty conservative and have a fair bit of alarming material about Homeland Security. See Flashback: Warning: "Watch The Metals, When They Dip. It Will Be A Good Indication That Things Are About To Happen."

I'm not even going to get into the stuff coming up about the bomb sniffing dogs and weird "training exercise" angles right now because this other stuff seems more pertinent right now. People that have been at this a long time frequently bump into "exercises" that happen to overlap with 'live events', the argument being many times that exercises created the opportunity for staged events at many previous key points -- though of course governments do run a *lot* of exercises with all their security bloatware anyway.

This is the late 2012 Hagmann interview with a purported Homeland Security "insider" which stated that a dip in precious metals, after the fiscal cliff sets the stage, would presage further economic chaos and an escalation of repression against the American people, along with a major collapse in standard of living. DHS Insider Report: Coming This Spring: "Life for the Average American is Going to Change Significantly". It is kind of "classic stuff" for those of us that keep an eye on these things. The earlier predictions of source "Rosebud" didn't really pan out much in 2012, as these things often don't. But timelines are hard to nail down even for "deep weird" sources with good faith. Take a little while to glance over this, even if it's not your usual fare.

"Rosebud": Stop thinking about a normal situation. The country is divided, which is exactly where Obama wants us to be. We are as ideologically divided as we were during the Civil War and that rift is growing every day. Add in a crisis – and economic crisis – where ATM and EBT cards will stop working. Where bank accounts will contain nothing but air. They are anticipating a revolution and a civil war rolled into one (emphasis added by this author).

We all saw what happened with the Feds & Occupy camps. The American Occupy-style organizing eased off as the US economy was in a kind of stasis during 2012, but if things tense up in 2013 we are looking at a different political situation. In Europe things have been moving at a much different tempo, along with a great deal of confusion, snaky liberal operations, and a rising neofascist & quasi-fascist network is taking root in many nations.

See also The Terrifying Reality of Long-Term Unemployment - Matthew O'Brien - The Atlantic

On a decidedly anti-alarmist tack, Bruce Schneier: The Boston Marathon Bombing: Keep Calm and Carry On - Bruce Schneier - The Atlantic

See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com

///////

MOAR LINX: A bunch of stuff sitting around you may find interesting.

Just weird - part of a scifi based GE marketing campaign: 'The Matrix' is back (in your hospital) | Technically Incorrect - CNET News

Is Facebook's Secretbook Secure? CRYPTOME Colin Powell & Malcolm McDowell at Bohemian Grove 2013-0347.pdf // Hacktivists as Gadflies - Socrates to Jeremy Hammond // DoD Communications Systems Breach in 9/11 Trials

A little grumpycat may be worth reading - Guest Post: Are Individuals The Property Of The Collective? | Zero Hedge amirite Minneapolis?!

In Control at Layer 2: a Tectonic Shift in Network Security| Whitepapers | TechRepublic - hacking optic networks.

Wells Fargo 401(k) Loans Jump 28% as Older Workers Borrow - Bloomberg

CNBC! USD/Bitcoin - MTGOXUSD - Stock Quotes

The Real Story Behind Facebook Moderation and Your Petty Reports | The Internet Offends Me

DARKWEBSEARCH: Shodan: The scariest search engine on the Internet - Apr. 8, 2013

Australian FiberFail with a last mile of copper, you idiots: FTTN a huge “mistake”, says ex-BT CTO | Delimiter

Peak Recovery? | Zero Hedge

11 Economic Crashes That Are Happening RIGHT NOW

Wordpress Mess going on: This plugin should help: WordPress › Limit Login Attempts « WordPress Plugins

////

Anyway this is just a few trends happening now... I feel like the overall tone of this post is pretty conservative, as a lot of the research is coming out of places with that editorial slant. Nonetheless these are sources of information and lines of analysis that anyone is welcome to look at and come to their own conclusions.

I think that we urgently need to get real and start considering lots of alternate solutions, hopefully to avoid more authoritarian and crisis driven, panicky policies, like those fostered in the climate of the Fear of Terrorism which they are going to tediously lay on with a trowel for weeks, alongside major economic instability.

Batten All the Hatches.

Infiltrating Hollywood: The Rise and Fall of The Spook Who Sat By the Door

I remember seeing Spook years ago on a rough videotape with horrible audio at the Soap Factory - shortly thereafter it was possible to obtain the DVD, based on a negative long-hidden in some film vault under a false name.

spook1.png

Spook is one of those incredible movies - a 1973 narrative of a black CIA agent turned domestic revolutionary. The FBI bullied United Artists into dropping the film -- based on an earlier book by Greenlee, which covers the global guerrilla strategies more deeply -- and the actors got blacklisted. Why would the FBI have a problem with a film where black gangs organize to demand autonomy, attack the police & seize military hardware?

Another key element, well done for such a low budget guerrilla project: the portrayal of the US military as a domestic civil repression force -- at least roughly similar to GARDEN PLOT National Guard style deployments seen more frequently back in those days. (GARDEN PLOT has been replaced with USNORTHCOM CONPLAN 3502 "Civil Disturbance Operations" as research here has documented)

spook3.png

There are plenty of funny moments in this film as well - the sense of humor strikes like a Cobra.

spook2.png

TRAILER:

FULL MOVIE! YAY - The Spook Who Sat by the Door by Director & producer Ivan Dixon, written & produced by Sam Greenlee, 102 mins.

I found this followup documentary via the film Hidden Colors' FB. Need to see this!! Infiltrating Hollywood: The Rise and Fall of the Spook Who Sat by the Door | Award Winning, Independent Documentary

Ostrow-Inside-Poster.png

Infiltrating Hollywood: The Rise and Fall of the Spook Who Sat by the Door is an award winning independent documentary on the controversial and FBI repressed 1973 black film The Spook Who Sat By the Door. The Spook Who Sat by The Door is widely hailed as a cult classic and one of the most important underground black productions of the era. The film was selected for preservation by the National Film Registry in 2012.

Through interviews, with author Sam Greenlee, Berlie Dixon, widow of director Ivan Dixon, Academy Award winning editor Michael Kahn, Melvin Van Peebles several actors from the film, investors, academics, Todd Boyd, Ed Guerrero, and Eric Pierson; archival footage and production documents, Infiltrating Hollywood tells the story of The Spook Who Sat by the Door from its inception as a novel to its release and repression.

San Diego Black Film Festival: Best Film, Sacramento International Film Festival: Best Film, Cine-Soul, Athens International Film Festival: Honorable Mention, Martha’s Vineyard African American Film Festival: Finalist HBO Documentary Competition, Saatchi and Saatchi Producer’s Award, International Black Film Festival of Nashville: Best Documentary, Hollywood Black Film Festival: Honorable Mention.

The Rise and Fall of The Spook Who Sat By The Door :Infiltrating Hollywood -Trailer for Infiltrating Hollywood: The Rise and Fall of the Spook Who Sat by the Door, a documentary on the making of the cult film classic. A Film by Christine Acham and Clifford Ward.

// Pt 1 interview //

"The Spook Who Sat By the Door" filmmaker, writer and community activist SAM GREENLEE Answer questions from callers and talks about his LEGENDARY MOVIE. He speaks on the struggle and obstacles when trying to releasing the controversial movie, why they were banned from shooting in Chicago, the reason he and Jesse Jackson dislike each other and more!!!!

// pt 1 of 4 "Project Brotherhood Power Hour" Shot by Lyle Muse

// Pt 2 Spook interview/

///

Sam Greenlee on black filmmaking today (posted in 2008):

///

Anyway these items are just excellent. Thanks Mr Greenlee & the actors who got blacklisted as punishment, good careers crushed including lead Lawrence Cook or "Dan Freeman". And screw Hollywood for papering over how they let the government suppress a film without any accountability.

Federal Homeland Security TSA VIPR Team & #VikingsDrone: Suspicious drone & Feds spotted at Vikings/Packers game

Things are a little strange at the Vikings/Packers Game today. A drone has been photographed hovering around the Metrodome fan plaza on the west side, and a Homeland Security / TSA "VIPR" team has been hanging around as well, indicating the federal government is shifting into "protecting" the major Spectacles at taxpayer expense.

My friend Nathan Hansen noticed the #VikingsDrone and the VIPR team, documenting & posting them on twitter @nathanmhansen. [Note: awhile back I did a 'lil client design work for Hansen.]

//// UPDATE 12:15PM Monday: According to @TCRover, a branch of the Pioneer Press, the drone was NOT operated by the government but rather some production company. The pic they say is from the crew flying it earlier: See https://twitter.com/TCRover/status/285560684245315585/photo/1 . Nonetheless we still need to deal with the impending prospect of government & contractor drones filling our airspace - and indeed this story has prompted others to discuss other sightings near government sites. //// 2:20PM update: It's annoying that they tried to tweet @ me last night but it never turned up in my timeline so I didn't find out until today. I would have much preferred to straighten it out immediately! Also, here's what's going on with drones in Oklahoma... Follow my friend @axxiom for more. ////

PHOTO sources: yfrog Fullsize - http://twitter.yfrog.com/h41hxevhj // yfrog Fullsize - http://twitter.yfrog.com/o0mkqkobj // yfrog Fullsize - http://twitter.yfrog.com/oemubbyj // VIPR Team: yfrog Fullsize - http://twitter.yfrog.com/odjd2ybj

odjd2ybj.jpeg h41hxevhj.jpeg

You can see the four rotors pretty well on these pics. It is comparable to the sports photography drone linked below as well - I figured it might just be a civilian hobbyist drone or some weird sports media project drone until the VIPR team was found by Hansen.

mkqkob.jpg mubby.jpeg

I am just delighted that the national government had to borrow more money at interest from the Federal Reserve System in order to send out these guys and their fancy flying spy robot to the Vikings/Packers game. We get the twin benefits of national debt slavery AND a surveillance state with nothing useful to do!

Our friends at WTFNews cranked out a quick post on this already: Unidentified Drone Spotted at @Packers-@VikingsFootball @NFL Game » WTF RLY REPORT

Let's Ban This Drone Operation in Minneapolis: Already Minneapolis activist Kurtis Hanna has suggested a petition to get drones banned on the city charter. (come to think of it, wouldn't it be good to get something like the White House petition site for the Mpls Charter Commission?) I will include some info below on this.

The Department of Homeland Security and the National Football League have a burgeoning relationship. Previously when I wrote up a post on the relatively new and totally off-the-radar Homeland Security Investigations division (basically their own militant version of the FBI, intended to reach BATF-level org status) they did a drill black helicopter landing on the Super Bowl field. [yes really - HSI is so new I must have been the first person to satirize its absurdities on the whole interweb!] See April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

The Super Bowl and World Series are also both declared National Special Security Events, which activates a fat block of overtime for many federal police agencies, much like the Republican & Democratic National Conventions. (However, since rioting at sports events is closer to the booze-soaked Id of the American public than more 'political' street upheavals, it doesn't meet the same heavy hand from federal & local police agencies) NSSEs generally feature Homeland Security, FEMA and the Secret Service operating at a high tempo, another thing that HSI & TSA are getting involved with as a 'filler force' if you will.

For Super Bowl NSSE info see: Super Bowl XLVI, NSSE & Big Sis - YouTube // www.secretservice.gov/press/pub0202.pdf on Bowl XXXVI // this crazy PDF: rnc08report.org/engine/uploads/1/Day-2-Breakout-2-NSSE-Carillo-Lowry-Lumley.pdf // Infowars » Indy Super Bowl: National Security State Protects Sports Fans from Prostitutes // National Special Security Events: 8. NSSE Fill-in Fact Sheet // Article Detail - Domestic Preparedness via LLIS.gov // etc

Federal VIPR teams: been popping up in all sorts of places. Here's the Wiki page. Wiki notes GAO attributes their existence to a Reaction to the shady Madrid train bombings. VIPR is trying to get at pro sports & local transportation (the Hiawatha light rail has a station close to where they were photographed) and wherever else they can normalize their presence. In this case the VIPR deployment apparently includes at least a half-dozen uniformed officers and at least one drone.

Additionally there was strange audio interference right before a commercial break in the first half, kind of like the sound a cell phone makes when its microwave signal induces noise in a speaker or electronics. However, I don't think game-day satellite transmissions go straight over-the-air from the Metrodome, as there aren't really satellite dishes around there I've noticed. Thus it seems unlikely to me that the one spotted drone would have glitched the transmission. Perhaps unrelated but also something you don't usually see. I blame Wisconsin FalseFlag types for this noise, whoever that might be :-P

SEE ALSO:

The drone does look similar to the one in this story. New use for drones: Sports photography - CBS News

Oh this is great. Perhaps the best link I've found in this. "PUT [VIPR] TEAMS TO WORK FOR YOU" VIPR teams and pipelines!! A "no cost resources for expanding and enhancing your security". Free oil goon security? Screw that: www.dleg.state.mi.us/mpsc/gas/download/2011SS-2-4-VIPR_Handout.pdf

May 2012: TSA VIPR Team Spotted at… Detroit Music Festival?? « TSA Out of Our Pants!

CNN Jan 28 2012: TSA rail, subway spot-checks raise privacy issues - CNN.com

VIDEO Blackburn Questions TSA Officials on VIPR Teams - YouTube

VIDEO TSA VIPR Teams in Greyhound Bus Station Tampa FL 02/16/2010

TSA deploys 'VIPR' teams throughout Tennessee to set up illegal security checkpoints on interstates - NaturalNews with a bunch of other links including: TSA-style full body pat-downs coming to an NFL stadium near you (Sept 2011) etc

6 USC § 1112 - Authorization of Visible Intermodal Prevention and Response teams | LII / Legal Information Institute. So they are doing this about the Hiawatha light rail officially I would guess. This would also signify that Metro Transit would have some record of the situation if "consult" in Sec.4 has occurred

(a) In general

The Secretary, acting through the Administrator of the Transportation Security Administration, may develop Visible Intermodal Prevention and Response (referred to in this section as “VIPR”) teams to augment the security of any mode of transportation at any location within the United States. In forming a VIPR team, the Secretary—

(1) may use any asset of the Department, including Federal air marshals, surface transportation security inspectors, canine detection teams, and advanced screening technology;

(2) may determine when a VIPR team shall be deployed, as well as the duration of the deployment;

(3) shall, prior to and during the deployment, consult with local security and law enforcement officials in the jurisdiction where the VIPR team is or will be deployed, to develop and agree upon the appropriate operational protocols and provide relevant information about the mission of the VIPR team, as appropriate; and

(4) shall, prior to and during the deployment, consult with all transportation entities directly affected by the deployment of a VIPR team, as appropriate, including railroad carriers, air carriers, airport owners, over-the-road bus operators and terminal owners and operators, motor carriers, public transportation agencies, owners or operators of highways, port operators and facility owners, vessel owners and operators and pipeline operators.

(b) Authorization of appropriations

There are authorized to be appropriated to the Secretary to carry out this section such sums as necessary for fiscal years 2007 through 2011.

Process for City Charter Amendment for banning these drones: Sent along by Kurt Hanna who thinks that "10,791 valid signatures of Minneapolis residents who are registered voters in order to qualify for the ballot" based on the figure of 215,806 voters voting last time. Citizen petition timeframe link. BUT: How much time do we have to gather these signatures?

Some more info: Via Minneapolis City Charter: http://library.municode.com/HTML/11490/level2/SUHITA_CH.html

(1) The methods available for amending a home rule city charter are contained in Minnesota Statutes, Section 410.12 et seq., which provides as follows:

(1) 410.12 AMENDMENTS. Subdivision 1. Proposals. The charter commission may propose amendments to such charter and SHALL DO SO upon the petition of voters equal in number to five percent of the total votes cast at the last previous state general election in the city.Proposed charter amendments must be submitted at least 12 weeks before the general election. Only registered voters are eligible to sign the petition. All petitions circulated with respect to a charter amendment shall be uniform in character and shall have attached thereto the text of the proposed amendment in full; except that in the case of a proposed amendment containing more than 1,000 words, a true and correct copy of the same may be filed with the city clerk, and the petition shall then contain a summary of not less than 50 nor more than 300 words setting forth in substance the nature of the proposed amendment. Such summary shall contain a statement of the objects and purposes of the amendment proposed and an outline of any proposed new scheme or frame work of government and shall be sufficient to inform the signers of the petition as to what change in government is sought to be accomplished by the amendment.The summary, together with a copy of the proposed amendment, shall first be submitted to the charter commission for its approval as to form and substance. The commission shall within ten days after such submission to it, return the same to the proposers of the amendment with such modifications in statement as it may deem necessary in order that the summary may fairly comply with the requirements above set forth.

Subd. 2. Petitions. The signatures to such petition need not all be appended to one paper, but to each separate petition there shall be attached an affidavit of the circulator thereof as provided by this section. A petition must contain each petitioner's signature in ink or indelible pencil and must indicate after the signature the place of residence by street and number, or their description sufficient to identify the place. There shall appear on each petition the names and addresses of five electors of the city, and on each paper the names and addresses of the same five electors, who, as a committee of the petitioners, shall be regarded as responsible for the circulation and filing of the petition. [........]

(1) Subd. 3. May be assembled as one petition. All petition papers for a proposed amendment shall be assembled and filed with the charter commission as one instrument. Within ten days after such petition is transmitted to the city council, the city clerk shall determine whether each paper of the petition is properly attested and whether the petition is signed by a sufficient number of voters. The city clerk shall declare any petition paper entirely invalid which is not attested by the circulator thereof as required in this section. Upon completing an examination of the petition, the city clerk shall certify the result of the examination to the council. If the city clerk shall certify that the petition is insufficient the city clerk shall set forth in a certificate the particulars in which it is defective and shall at once notify the committee of the petitioners of the findings. A petition may be amended at any time within ten days after the making of a certificate of insufficiency by the city clerk, by filing a supplementary petition upon additional papers signed and filed as provided in case of an original petition. The city clerk shall within five days after such amendment is filed, make examination of the amended petition, and if the certificate shall show the petition still to be insufficient, the city clerk shall file it in the city clerk's office and notify the committee of the petitioners of the findings and no further action shall be had on such insufficient petition. The finding of the insufficiency of a petition shall not prejudice the filing of a new petition for the same purpose. (Back)

(1) Subd. 4. Election. Amendments shall be submitted to the qualified voters at a general or special election and published as in the case of the original charter. The form of the ballot shall be fixed by the governing body. The statement of the question on the ballot shall be sufficient to identify the amendment clearly and to distinguish the question from every other question on the ballot at the same time. If 51 percent of the votes cast on any amendment are in favor of its adoption, copies of the amendment and certificates shall be filed, as in the case of the original charter and the amendment shall take effect in 30 days from the date of the election or at such other time as is fixed in the amendment.

An amusing side question: is this "magick" security theater? Security Theater of course works most "effectively" at materializing psychological phantoms with an audience at a Spectacle. This is the perhaps the principle Stimulus Effect intended by Homeland Security & its general orientation around 'visuals' which is not that different than Ceremonial Magick, which is [arguably] anything that generates a certain sense-impression in the mind of Observers.

metrodome-national-guard.jpeg

Another old backstory: In 2010 some people noticed they were using government photos of MN National Guard riot control gear from the deployment at the 2008 Republican National Convention under the NSSE system for recruitment propaganda on the Metrodome. RNC '08 Report: Our News: National Guard advert on Metrodome, proposed site of 2012 DNC, depicts soldiers deployed against protesters during 2008 RNC. Your tax dollas at work!

TRAILBLAZERs unite! Q2 & Turnkey Dictatorship, the Great Game of All the Internets & Jewel vs NSA: warrantless wiretapping lawsuit moves forward with William Binney, Thomas Drake & J. Kirk Wiebe

NSA-restructure-workstations-windows.png
TRAILBLAZER related NSA workstation privatization schema in FOUO document --- SOURCE WayneMadsenReport.com - http://www.waynemadsenreport.com/downloads/20110322_2/download - March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial (reposted/mirrored below)

Memorable scenes in "J. Edgar," the unsung biopic of FBI über-cryptocrat J. Edgar Hoover directed by Clint Eastwood, highlighted Leo DiCaprio's Hoover essentially blackmailing politicians like Robert F. Kennedy & Franklin D. Roosevelt over the decades with potentially embarrassing recordings and snippets. He reminisces with his partner-for-life Colson how well it goes every time.

Now there's an entire corporate contractor sector, nicknamed the Eagle Alliance, which has taken over many core National Security Agency functions, and each one of them are in a position to pull Hoover-like shenanigans to control the political system. This system of leverage & blackmail was described in Al Martin's The Conspirators: Secrets of an Iran-Contra Insider" as the "Control Files."

NSA-Spying-Logo.pngJames Bamford’s NSA, the agency that could be Big Brother: [old link busted, google it :P ]

"That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide."

He added that if a dictator ever took over, the NSA "could enable [him] to impose total tyranny, and there would be no way to fight back."

At the time, the agency had the ability to listen to only what people said over the telephone or wrote in an occasional telegram; they had no access to private letters. But today, with people expressing their innermost thoughts in e-mail messages, exposing their medical and financial records to the Internet, and chatting constantly on cellphones, the agency virtually has the ability to get inside a person’s mind…

"I don’t want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."

Let's hop on down the rabbit hole. The National Security Agency and its beleaguered whistleblowers are back with the Internet's Lawyers Guild - aka the Electronic Frontier Foundation, who have saved the day on countless occasions. Now they are kicking it up a notch with a lawsuit against the 'state secret' everyone knows about -- corporate contractors copying everyone's private domestic communications.

The effort to cover up these programs - MAIN CORE, PINWALE and STELLAR WIND are thought by many to be major original code names for this. Corruption in outsourced programs such as TRAILBLAZER - which the feds went gonzo against Thomas Drake to cover up, form the texture of this story, along with the final total panopticon system which Frank Church feared. [ see earlier Hongpong.com: The late great Robert Nichols, a $250 billion Treasury Note, the Octopus Wiki (all your Iran-Contra/PROMIS style tiebacks) and Main Core, to boot // LinkBatch for August 19th 2010: In-Q-Tel CIA front funded Google Earth; Insane Clown Posse; Microdrones; Fructose tumors; Hamid Gul // Dec 2008: "The World's Largest Hedge Fund is a Fraud" but no one cared: More misc madness for Monday:

'Stellar Wind' revealed by Tamm: The grand illegal wiretapping plan was called Stellar Wind, Newsweek reveals. Good stuff. So: Stellar Wind was the sniffer, MAIN CORE is/was the master repository and/or query system into other databases, the Google or PROMIS tap to the various pockets of data... Datas fed by stuff like Stellar Wind.

See also May 2008: cryptogon.com » The Last Roundup: MAIN CORE: (& subsequent refs)

In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.

Russell Tice, Former NSA SIGINT Officer

I’m going to provide a one paragraph summary, just to make sure that the implications of this are clear to everyone:

The U.S. Government has, almost certainly, established a database and tracking system for something like eight million Americans who have been designated as threats to national security. The system is called MAIN CORE and it is being run under the auspices of highly classified Continuity of Government (COG) operations. MAIN CORE uses a variety of intelligence sources as inputs, including your email, web activity, telephone and private financial information. In the event of a major national security crisis, it is alleged that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”

The Last Roundup, by Christopher Ketcham, appeared in the May/June 2008 issue of Radar Magazine. (mirror 1, mirror 2.)

Below are some excerpts from The Last Roundup. I have provided explicit pointers to the related materials on Cryptogon:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [See:AT&T Invents Programming Language for Mass Surveillance]

He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Electronic Frontier Foundation: Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program | Electronic Frontier Foundation

July 2, 2012

Three NSA Whistleblowers Back EFF's Lawsuit Over Government's Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco - Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation's (EFF's) lawsuit against the government's illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the "secret room" at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

"For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people," said EFF Legal Director Cindy Cohn. "Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We're extremely pleased that more whistleblowers have come forward to help end this massive spying program."

The three former NSA employees with declarations in EFF's brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

"The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret," said EFF Senior Staff Attorney Lee Tien. "Yet the government keeps making the same 'state secrets' claims again and again. It's time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance."

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
   Legal Director
   Electronic Frontier Foundation
   cindy@eff.org

Lee Tien
   Senior Staff Attorney
   Electronic Frontier Foundation
   tien@eff.org

/////////////////////

Jewel v. NSA | Electronic Frontier Foundation

In Jewel v. NSA, EFF is suing the NSA and other government agencies on behalf of AT&T customers to stop the illegal unconstitutional and ongoing dragnet surveillance of their communications and communications records.

Filed in 2008, Jewel v. NSA is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it. Evidence in the case includes undisputed documents provided by former AT&T telecommunications technician Mark Klein showing AT&T has routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA. That same evidence is central Hepting v. AT&T, a class-action lawsuit filed by EFF in 2006 to stop the telecom giant’s participation in the illegal surveillance program.

In addition to suing the government agencies involved in the domestic dragnet, Jewel v. NSAalso targets the individuals responsible for creating authorizing and implementing the illegal program including former President George W. Bush, former Vice President Dick Cheney, Cheney’s former chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales, and other individuals who ordered or participated in the warrantless domestic surveillance.

The Obama administration moved to dismiss Jewel in 2009, claiming that litigation over the wiretapping program would require the government to disclose privileged “state secrets” and that it was immune from suit. The court instead ruled that the case should be dismissed on standing grounds.  Fortunately, in December of 2011, the 9th U.S. Circuit Court of Appeals ruled that Jewel could proceed in district court.

/////////////////////

There aren't that many journalists who regularly cover the National Security Agency, and it's pretty obvious this beat is a shortcut to catching major gangstalking from a whole passel of shadeballs. What better way to see who SAIC will send if you piss them off & expose their enormously profitable contracting rackets & fraud?

James Bamford first wrote The Puzzle Palace, the first book on the NSA which established a great deal for the public about how it operated. His much more recent book The Shadow Factory described a number of major developments since then, including the backbone tapping system which is a major part of Jewel v. NSA.

SEE James Bamford April 2012 WIRED article: Shady Companies With Ties to Israel Wiretap the U.S. for the NSA // March 2012: The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

James Risen with the New York Times is another -- perhaps adjacent to Julian Assange, with a subpoena commanding him he is now in the crosshairs of perpetual federal investigations into the leaking of the warrantless wiretap program that finally abrogated the Fourth Amendment once and for all. NYT May 2011:

In a 30-page motion that prosecutors filed on Monday, they argued that the First Amendment did not give Mr. Risen the right to avoid testifying about his confidential sources in a criminal proceeding. The Justice Department argued that Mr. Risen was a witness and should be compelled to provide information to a jury “like any other citizen,” contending that there was no basis to conclude “that the reporter is being harassed in order to disrupt his relationship with confidential news sources.”  

DC alternative journalist Wayne Madsen, while derided by many in the mainstream & liberal networks as a conspiracy theorist etc (and I wouldn't be surprised if certain factions try to use him to plant early disinfo & poison the well in obscure stories - as often happens with journalists on weird beats) overall Wayne has kept coming up with the goods on the NSA, clearly with a number of inside and veteran sources. Code names in this case STELLAR WIND and PINWALE first entered the public arena via Madsen's site WayneMadsenReport.com.

Madsen has covered the travails of William Binney, Thomas Drake & J. Kirk Wiebe, in particular Drake over the years. Drake's case in particular involves the interests of sketchy Israel-linked contractors in penetrating Americans' private communications using backdoors such as the Narus Verint wiretapping boxes placed on Internet backbone sites, which first surfaced because of whistleblower Mark Klein, who had installed the fiber optic splitter running domestic backbone signals en masse into the 'secret room'.

Anyway much of this is available over In-Q-Tel I mean CIA I mean Google, but the stuff on WayneMadsenReport.com is not. I asked Wayne a while ago and he basically asks for a day or two (or several) for people to refrain from reposting his material outside the paywall. I ask that you support independent journalism - I am reposting these now for general public interest because the situation has finally 'broken out' a little more.

/////////////////

WAYNEMADSENREPORT.COM ITEMS:

APRIL 2012: Let's start on the late side with a April 2012 backgrounder that finally establishes a great deal of the crusade to crush Thomas Drake. It gets to, what else, Israeli contractors and extreme corruption. Plus it has tons of nice NSA program code words.

April 5-6, 2012 -- The background to the Israeli penetration of NSA - Wayne Madsen Report

In June 2005, WMR's first report at itgs inception dealt with Israeli intelligence penetration of the National Security Agency. Our friend and colleague Jim Bamford has written about further details of this penetration in an April 3 article in Wired titled "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA." In the article, Bamford describes the penetration of NSA's ultra-secret surveillance technology research and development "skunk works," the Signals Intelligence Automation Research Center (SARC), located at NSA's headquarters on the third floor of Operations Building 2B, a few doors down from the center where NSA monitored sensitive government communications in Russia.



The SARC is where companies linked to Israel helped set up NSA's controversial and top secret warrantless eavesdropping program code-named Stellar Wind. SARC's chief of staff, J. Kirk Wiebe, and the center's co-founded, Bill Binney, realized that a private company with links to Israel, Technology Development Corporation (TDC), a two-man operation with an Annapolis Junction post office box run by two brothers, Randall and Paul Jacobson of Clarksville, Maryland, was running the Stellar Wind operation using software and equipment provided by two Israeli firms, Narus, later bought by Boeing, and Verint, owned by Comverse Technology, formerly Comverse Infosys. Both companies were formed by ex-Unit 8200 personnel. Unit 8200 is the Israeli counterpart of NSA. The NSA program manager for Stellar Wind was Ben Gunn, a U.S. naturalized Scotsman who once worked for Britain's NSA equivalent, the Goverfnment Communications Headquarters (GCHQ) in Cheltenham, UK.

Rather than investigate the Jacobsons, Gunn and their Israeli interlocutors, FBI agents raided the homes of Wiebe and Binney and confiscated their computer equipment as part of the failed Justice Department investigation of former NSA official Thomas Drake, the whistle blower who exposed massive contract fraud and illegal surveillance by NSA.


Paul Jacobson had his security access pulled by NSA in 1992 and he later changed his name to "Jimmy Carter" and "Alfred Olympus von Ronsdorf." Randall Jacobson continued working for NSA and when Science Applications International Corporation (SAIC) was brought in to run the nascent Stellar Wind program, taking over from TDC, Randall Jacobson tipped Binney off to the illegal nature of the eavesdropping program, which included installing wiretapping rooms in some 20 telecommunications company switches around the United States, including the one exposed by former AT&T technician Mark Klein that was installed at the AT&T switch in downtown San Francisco.

Binney told Bamford that the NSA's advanced eavesdropping and data mining high-data analytical software may have been originally passed to Israel by a pro-Israeli technical director in NSA's Operations Directorate. The original software helped Narus and Comverse/Verint to improve on the work already performed by NSA and more advanced systems were then sold back to the NSA. The major compromise of NSA technology to the Israelis should have been made known to Binney, who was then the chairman of the NSA's Technology Advisory Panel, which monitored the signals intelligence capabilities of foreign nations. Rather than pass on to NSA the intelligence "take" of Unit 8200 using the NSA technology, Binney told Bamford that he believed that the Israeli government simply passed on the technology to Israeli start-up companies that used the NSA-developed know-how to spy on foreign countries, including the United States, and sell the technology back to countries like the United States.

The Israeli penetration of NSA was brought to WMR's attention by NSA personnel in June 2005. One of the firms mentioned as being involved in the compromise to Israel was CACI, part of an alliance of NSA contractors called the "Eagle Alliance." WMR reported: "CACI, called 'Colonels and Captains, Inc.' by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations."

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel.

Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods.

In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

[On June 5, 2005, WMR followed-up its story of Israeli spying at NSA: "Veterans of the RCA-NSA-Israeli joint SIGINT program code named DINDI report that Israeli engineer spies used the carve out contract with NSA, through RCA, to gain access to NSA and U.S. Navy secrets. In an RCA facility in Mount Laurel, NJ, the Israeli engineers had their own secured lab, and for three years that DINDI ran, they were walking out with their briefcases loaded with equipment, including scopes. When RCA engineers finally gained access to their lab, they found the prints laid out for the Trident missile system. RCA had an ongoing contract top develop the Trident communications suite at the time of the security leak. The Israeli engineers on DINDI claimed they were from the Israeli Air Force but months later, an RCA engineer was in New York and he ran into the same Israelis, but they were wearing Israeli Navy uniforms. One ex-RCA engineer commented about the DINDI Israeli spies: 'They were all a nice bunch of guys, even when they had their hands in your pockets.'] One RCA contractor for NSA later told WMR that the RCA program manager for DINDI, a Jewish engineer who he only named as "Irv," permitted the Israelis to rummage through NSA and RCA classified information.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual 'Fort Knox' of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person [then-NSA director Michael Hayden] hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, 'She's highly qualified to work in intelligence!'

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or 'WINTEL' environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to 'provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA.' This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: 'Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program.' The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

Hayden was later "rewarded" for his actions at NSA by being named the first deputy director for the Directorate of National Intelligence (DNI) and, later, director of the Central Intelligence Agency. After retiring, Hayden began working for former Department of Homeland Security Secretary Michael Chertoff, who has also been alleged to have close contacts with Israeli intelligence, at Chertoff Associates.

A journalist who previously covered the Justice Department for a major wire service told WMR that FBI agents and Justice Department prosecutors are dissuaded from investigating spies for Israel since it is known to be a "career killer" at both agencies. Moreover, Justice prosecutors have two sets of guidelines when it comes to prosecuting spies. One set calls for maximum treatment, including major criminal charges and heavy prison sentences and fines, for American spies who are charged with spying for Russia, China, Cuba, or Iran, and the lightest charges and penalties for those charged with spying for Israel, especially if they are Jewish.

//////////

Now back to the earlier material.

APRIL 2010: April 16-18, 2010 -- SPECIAL REPORT. The hidden hands behind the Thomas Drake indictment - Wayne Madsen Report

There is much more to the Obama administration's indictment on April 15 of former NSA senior executive Thomas Drake by the US Attorney for Maryland, Rod Rosenstein, a Bush holdover who has brought similar politically-motivated criminal charges against other NSA personnel. Drake is charged with ten criminal counts, including leaking classified information to a newspaper. WMR can confirm the paper is The Wall Street Journal and the reporter at the Journal who received Drake's information is Siobhan Gorman, who was also subject to electronic surveillance by the NSA and FBI while she was with the Journal and previously, The Baltimore Sun. Other charges brought against Drake, who continued to work for the NSA as a contractor after stepping down as an NSA executive, include obstruction of justice and making false statements to a federal law enforcement official.

Since leaving his executive position with the NSA, Drake has served as President and Chief Operating Officer of National Technologies Associates, Inc. of Alexandria, Virginia. The firm has revenues of $50 million and employs 600 people. Before NSA, Drake was an information technology and management consultant with Coastal Research & Technology, Inc. (CRTI).

While at NSA, Drake worked in the Signals Intelligence Division (SID), the group responsible for eavesdropping on foreign communications and, since the advent of warrantless domestic surveillance, domestic U.S. communications, as well.

WMR can report that as part of the Drake investigation, Gorman and the Wall Street Journal were subject to STELLAR WIND, warrantless wiretapping, as late as last year. The surveillance began when Gorman wrote a series of articles between 2006 and 2007 on NSA contracting cost overruns and mismanagement, information that was first reported by WMR in 2005.

From WMR, May 27, 2005: Up to now, little has been reported on how the Bush administration’s disastrous intelligence policies have affected the super secret National Security Agency (NSA). According to NSA insiders, the chief U.S. signals intelligence (SIGINT) collection agency has been wracked by much of the same internal feuding, senior management failures, and external political pressure that have plagued other U.S. intelligence agencies, including the CIA, FBI, Defense Intelligence Agency, National Geo-spatial Intelligence Agency, and National Reconnaissance Office.Drake's prosecution by the Obama administration represents a continuation of a "witch hunt" by NSA and its Stasi-like Security unit, the "Q Group," to plug all leaks from the signals intelligence and cyber-warfare agency even if the information provided to the media concerns criminal conduct like contract fraud, sexual misconduct, illegal surveillance of American citizens, and illegal "sneak an peek" break-ins of the homes of NSA employees and contractors by NSA Q Group personnel and FBI agents.

NSA insiders lay blame for the problems at NSA’s Fort Meade, Maryland headquarters squarely on the shoulders of agency Director Air Force General Michael V. Hayden and his small coterie of close advisers, a few of whom have no substantive intelligence background. Hayden has been NSA Director since March 1999, the longest tour for any NSA Director. Not only did the White House extend Hayden’s NSA tour, but also nominated him to be the first Deputy Director of National Intelligence, where he will serve under John Negroponte.

Hayden’s reign at NSA has been marked by the emaciation of the career civilian corps through forced retirements and resignations, outsourcing of government positions to contractors, intimidation, forced psychiatric and psychological examinations for "problem" employees, increased workloads for shift personnel with no personnel augmentation, unreasonable personal searches by security personnel, and withholding salary increases for career personnel. A number of NSA employees are suffering from stress and fatigue and that is adversely affecting their job performance.

One of the most pervasive operational problems at NSA stems from the fact that when newly trained civilian and military linguists, analysts, and other operational personnel arrive at NSA for duty and are integrated into various operational work centers, they are soon quickly transferred to Iraq. This puts an inordinate workload on the career civilian NSA personnel . . .

Career NSA personnel claim that their most senior member, Deputy Director of NSA William B. Black, Jr., shows little interest in their plight. One long-time NSAer said Black often nods off at Hayden’s staff meetings. In 2000, Black, a retired NSA employee with 38 years of service, was rehired by Hayden from Science Applications International Corporation (SAIC) to be his deputy. Hayden’s selection of Black from outside the agency was considered a slap in the faces of those line NSA officers who would have been normally considered next in line for promotion to the much-coveted post. That slight began to severely affect agency morale a little over a year before the September 11, 2001 terrorist attacks on New York and Washington.

After 911 and subsequent revelations that NSA had intercepted two Arabic language phone calls on September 10, 2001 ("Tomorrow is zero hour" and "The match is about to begin") that indicated an imminent attack by Al Qaeda but failed to translate and analyze them in a timely manner to be effective, Hayden was looking for scapegoats. According to NSA insiders, he found one in Maureen A. Baginski, the Director of NSA’s Signals Intelligence (SIGINT) Directorate. According to the NSA insiders, Baginski, a 27-year NSA veteran and Russian and Spanish linguist, was set up for a fall by Hayden and his team. In 2003, Baginski was named Executive Assistant Director of the FBI for Intelligence. According to NSA sources, it was Baginski who carried out Hayden's directives that farmed out many Fort Meade functions to other facilities. Another Hayden project, "Groundbreaker," the outsourcing of NSA functions to contractors, has also been used by Hayden’s advisers to assign blame for the 911 failures at NSA. According to NSA insiders, Groundbreaker has been a failure . . .

Another one of Hayden's projects that has been criticized by the NSA rank-and-file is "Trailblazer," the program to modernize NSA's SIGINT systems. For example, operators in U.S. electronic warfare aircraft rely on NSA to provide accurate electronic intelligence (ELINT) data in order to program their radar warning receivers and jamming pods. However, NSA data, provided from two databases known as EPL (Emitter Parameter List) and "Kilting." 70 percent of NSA's ELINT data is 30 years old. NSA management has forced field operators to use raw ELINT intercept data, culled from a database called "Wrangler," to program their ELINT systems. NSA operations and software engineers believe this function should be handled by NSA and not the "warfighters." Updated ELINT data is handled by ELINT Technical Reports or "ELTs." In 2003, the year the Iraq war started, there were 938 ELTs submitted on new emitter data. However, there were only 200 updates made to the ELINT databases.

The failure to update the ELINT databases may have had disastrous consequences in Iraq. For example, EPL and Kilting do not contain data on air traffic control radars and microwave communications links. Because current ELINT systems cannot differentiate between commercial signals and hostile target tracking emitters, U.S. forces in Iraq have launched attacks on non-threat targets in the belief they were hostile. NSA sources report that many of the cases of fratricide in Iraq has been due to faulty or old ELINT data. For example, the failure by NSA to update ELINT data and provide emitter parameter data to warfighting units led to the accidental shootdown by a Patriot missile of a British Royal Air Force Tornado fighter in March 2003 near the Iraqi-Kuwaiti border at the outset of the Iraq campaign. Two British crew members were killed. The ELINT data used by the Patriot misidentified the Tornado as an enemy missile and the U.S. Army blamed the British crew for the mistake, claiming they failed to switch on its Identification Friend or Foe (IFF) equipment. NSA insiders claim that allegation was false. They claim that "blue signals" (friendly) are not adequately included in the emitter data sent to field units by NSA and that claims by the Pentagon that the Tornado was shot down due to pilot error were false.

In other incidents, the radar warning receivers (RWRs) on U.S. F-16s flying over Iraq have either evaded or fired AMRAAM (Advanced Medium-Range, Air-to-Air) missiles on microwave communications towers because the microwave signals were identified as threat emitters from hostile aircraft. U.S. jammers are also adversely affected by the failure to update ELINT data.

In fact, many of NSA's developmental ELINT systems, with cover names like Beikao, Boomvang, Canyondust, Cape Lookout, Chartvein, Eagle Reach, Galaxydust, Harpstring, Hokusai, Irish Den, Jetavator, Monocle, Needleice, Platoonwolf, Quadrunner, Radiant Spruce II, Roman Alliance, Seadiver, Shadowboxer, Sharkbite, Shiloh, Starquake, Stouthearted,and Sunbeaver are not found in the master NSA ELINT project database, which also has a cover name: Brasscoin.

Many of NSA's other SIGINT systems are in the same conundrum. Rather than simplify and modernize NSA's SIGINT development and deployment, Trailblazer has done nothing to modernize or cut acquisition costs. In a suspicious move by NSA, the Trailblazer contract was sole-sourced to SAIC, the firm from which Hayden hired his deputy director. As with Groundbreaker, Trailblazer's contractors consist of a team led by a prime contractor. Trailblazer's team overlaps with Groundbreaker -- companies like CSC and Northrop Grumman are also found on the Trailblazer team. Booz Allen Hamilton and Boeing are also on the SAIC team. According to NSA officers, one SAIC official left the firm to work for Hayden at NSA during the time the Trailblazer bidding process was underway. The individual then returned to SAIC as a senior vice president, according to NSA sources. NSA employees, upset about the control that SAIC now has over the agency, refer to NSA as "NSAIC." . . .

At his Senate Select Intelligence Committee nomination hearing for Deputy Director of National Intelligence, Hayden confirmed that Trailblazer was over budget and behind schedule. He told the committee that Trailblazer's "cost was greater than anticipated in the tune, I would say, in hundreds of millions." Hayden confirmed the report of the joint congressional committee that probed the 911 intelligence failures that Trailblazer was several years behind schedule. NSA sources claim that Trailblazer is at least five years behind schedule and $600 million over budget.

However, the career NSA operational personnel may be getting squeezed not so much for policy and management differences but because of what they know about the lies of the Bush administration. In addition to the obvious lies about Iraqi WMDs, many personnel are well aware that what occurred on the morning of 911 was not exactly what was reported by the White House. For example, President Bush spoke of the heroic actions of the passengers and crew aboard United Flight 93 over rural Pennsylvania on the morning of 911. However, NSA personnel on duty at the NSOC that morning have a very different perspective. Before Flight 93 crashed in Pennsylvania, NSA operations personnel clearly heard on the intercom system monitoring military and civilian communications that the "fighters are engaged" with the doomed United aircraft. NSOC personnel were then quickly dismissed from the tactical area of the NSOC where the intercom system was located leaving only a few senior personnel in place. NSA personnel are well aware that Secretary of Defense Donald Rumsfeld did not "misspeak" when, addressing U.S. troops in Baghdad during Christmas last year, said, "the people who attacked the United States in New York, shot down the plane over Pennsylvania." They believe the White House concocted the "passengers-bring-down-plane" story for propaganda value.

Morale at NSA has plummeted from repeated cover-ups of serious breaches of security by senior officials. While rank-and-file employees are subjected to abusive psychological and psychiatric evaluations for disagreeing with summary intelligence reports provided to outside users or "consumers" and even for more mundane matters, others are given a pass. Ironically, one of the psychiatrists used by NSA to evaluate problem or disgruntled employees was recently found by police to be growing marijuana at his home in Crofton, Maryland.

In 2008, NSA and FBI surveillance of current and former NSA and Justice Department employees who were suspected of leaking information to the press about the NSA's super-classified STELLAR WIND warrantless digital surveillance program, called the "Terrorist Surveillance Program" by the Justice Department, was stepped up.

On March 10, 2008, Gorman wrote an article for the Journal titled, "NSA's Domestic Spying Grows As Agency Sweeps Up Data." Gorman wrote:

"According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called 'transactional' data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected."

The previous year, as WMR reported in May 12, 2009, former Justice Department prosecutor Thomas Tamm's home was invaded by a SWAT team of federal agents:

In 2007, Tamm's home in Potomac, Maryland was raided by zealous FBI agents who suspected him of leaking details of the so-called "Terrorist Surveillance Program" (TSP) to journalists. Tamm tried to inform Congress about the illegal program but was rebuffed by, among others, the ranking Democrat on the House Judiciary Committee, Representative John Conyers (D-MI).

At the time of its inception after 9/11, the TSP or as NSA and the Oval Office referred to it, "Stellar Wind," was so classified that only the Attorney General and one other person in the Justice Department knew about it. The TSP totally bypassed the Foreign Intelligence Surveillance Act (FISA) warrants that the OIPR prepared for approval by the Foreign Intelligence Surveillance Court (FISC). U.S. Judge James Robertson was so incensed about the bypassing of the FISC, he resigned from it in protest on December 20, 2005. U.S. Judge Royce Lamberth, nominated by President Ronald Reagan and who served as Presiding Judge of the FISC until 2002, was also adamantly opposed to TSP and its systematic bypassing of his court.

WMR's report continued: Tamm was also the first person within Justice who corroborated what NSA personnel were reporting about the agency conducting illegal data mining. One of those individuals was NSA employee Russell Tice, who was also subjected to an FBI investigation and government harassment.

Although the government employees who brought attention to the high-level criminality involving the TSP/Stellar Wind were and, in some cases like that of Tamm, are still being investigated, no criminal investigations were brought against the telecommunications companies that participated in the criminal conspiracy to spy on Americans illegally. In fact, Congress gave the telecommunications firms immunity from lawsuits and prosecution as a result of a deal worked out with the Bush administration. One of those senators who voted for the immunity deal is Barack Obama.

After the FBI conducted interviews of all OIPR employees in their quest for the leaker, on August 1, 2007, 12 government vehicles pulled in front of Tamm's home in Potomac, Maryland. Eighteen armed federal agents wearing body armor stormed into Tamm's home while his wife was cooking breakfast. Tamm was removed from his home by the agents who spent seven hours going through his and his family's property. The FBI agents even asked Tamm if there were any "secret rooms" in his house. They also inquired about any weapons in the house and whether he had been visited at home by reporters from The New York Times.

The agents tore through every room, awakening Tamm's son and daughter. The agents seized all the lap top computers, including those of Tamm's children, and a 10-year old lap top. Also seized were the Tamm family's Christmas card list and a calendar with doctors appointments.

After two days, Tamm was offered a deal that he could plead guilty to a felony in return for his testifying against journalists, including the New York Times' James Risen, and their sources at the NSA. Three days later Michael Isikoff of Newsweek phoned Tamm -- someone had leaked information about the FBI raid to Isikoff. Tamm's identity as a source about the TSP was revealed by Isikoff in the December 22, 2008, issue of Newsweek.

In 2008, one of WMR's sources discovered that his home had been broken into and anything that could store digital data had been stolen: laptops, digital cameras, USB thumb drives, etc. Moreover, relatives of the individual discovered that the lock to their home had been drilled out in what was an obvious "black bag" sneak and peel operation.

That same year, this editor discovered that the lock to his apartment door at Potomac Towers in Arlington, Virginia had been drilled out by a circular saw drill bit that drilled around the lock cylinder. When the apartment maintenance man was called to check the lock, he discovered the fragments of the lock pins scattered on the floor at the base of the door. He stated at the time that he had never experienced anything like it in the past.

FBI and NSA surveillance of people affiliated with NSA continued through last week, with this editor and one of his sources being tailed in 2009 in the suburban Maryland suburbs of Washington, DC and an additional tail of a source being conducted last week in Annapolis, Maryland.

The indictment of Drake in reminiscent of the case brought against former NSA signals intelligence (SIGINT) analyst Ken Ford, Jr. in 2006. In March 2006, Ford was sentenced to six years in prison in a case replete with prosecutorial and judicial misconduct by Rosenstein, Assistant US Attorney David Salem, and US Judge Peter Messitte. On April 30, 2007, WMR reported: "Ford was set up in a clumsy Justice Department, FBI, and NSA Security Division operation to punish him for his May 2003 signals intelligence (SIGINT) analysis report that concluded, based on intercepts of Iraqi communications, there was no truth to the Bush administration’s claim that there were weapons of mass destruction in Iraq. Ford’s report, with his name and that of his supervisor on it, ended up on Vice President Dick Cheney’s desk. From that time on, Ford was a marked man for the neo-con cabal operating within the White House, Justice Department, Pentagon, and US Intelligence Community senior staff."

At one point during Ford's trial, Messitte called Ford to his bench and asked him if he had spoken to this editor. Ford replied that he had not, whereupon Messitte asked, "Is Mr. Madsen in the court room?" I was not present at the time but I was later told by an informed source that Messitte was prepared to call me to the stand to be asked about the sources of my stories on the case. Such a development would have required me to invoke my First Amendment rights, as the press is the only occupation identified by name in the Bill of Rights as being protected. There was a risk of a contempt ruling and possible federal prison had I been present during Messitte's "kangaroo court" proceedings.

Ford continues to serve his six year sentence at Lewisburg federal prison in Pennsylvania. Attorney General Eric Holder was sent a letter by Ford's parents on November 18, 2009, calling for the appointment of a special prosecutor in the case against their son. To date, Holder has not responded to the letter.

The letter follows:

November 18, 2009

SENT CERTIFIED MAIL / E-MAIL / FACSIMILE

RETURN RECEIPT

Honorable Eric H. Holder. Jr.

Attorney General of the United States

Honorable David W. Ogden

Deputy Attorney General of the United States

950 Pennsylvania Avenue, N.W.

Washington, D.C. 2053 0-0001

United States v. Kenneth Wayne Ford. Jr.

Criminal Case No(s): 04-cr-l l8JKS, 05-cr-0098PJM and 05-cr-0235PJM

Messrs. Holder and Ogden:

In the interest of justice, we, the parents of Kenneth Wayne Ford, Jr., ("hereafter Mr. Ford") request an immediate appointment of Special Counsel to investigate unwarranted prosecutorial misconduct, vehement malicious persecution and prosecution of Mr. Ford under the Espionage Act §793 (e) - Gathering, Transmitting or Losing Defense Information. On Wednesday, September 23,2009, President Obama mandated that DOJ establishes New State Secrets Policies and Procedures.1

President Obama's implementation of State Secrets and Policies encompasses matters in this case. Prosecutors knowingly and willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation throughout this case and trial. Mr. Ford was convicted under 793(e) - Espionage and 1801 - Making A False Statement On A Government Form. Mr. Ford was sentenced to 6 years in prison for Count 1 and 3 years in prison, to be served concurrently with Count 1, for Count 2. After imprisonment, Mr.

---------

1 “It sets out clear procedures that will provide greater accountability and ensure the state secrets privilege is invoked only when necessary and in the narrowest way possible...” Attorney General Eric Holder September 23, 2009

Ford is to be on probation for 3 years. He also was ordered to pay a $200.00 assessment. Mr. Ford began serving this unjust prison sentence on May 16. 2006. He has been in prison for over 3 years and 6 months for doing absolutely nothing, except being a patriotic American and a good person.

Not only is Mr. Ford innocent, but nothing happened. This case is totally fabricated by the FBI and all involved, specifically the prosecutors and judge know it. Mr. Ford is a victim of a hate crime, a malicious prosecution and a tragic rush to jail an innocent man. See North Carolina v. Seligmann 06-cr-4332-33 (Dismissed 4/712007), Franks v. Delaware, 438 U.S. 154 (1978) and Brady v. Maryland, 373 U.S. 83 (1963). These cases demonstrate that 'false' arrest can happen to anyone - as in the matter of distinguished Harvard professor Henry Louis Gates, Jr., one of the nation's pre-eminent African-American scholars, falsely arrested in his own home.

A. Prosecutors Willfully Withheld Exculpatory Evidence From Defense

DOJ prosecutors repeatedly invoked state secret privileges, suppressed evidence as classified and deliberately withheld from Mr. Ford's defense exculpatory FBI Search Warrant Affidavits for well over 19 months. Ultimately, these search warrant affidavits were suppressed from Mr. Ford's trial. We have recently discovered that these affidavits have never been filed and are not apart of Mr. Ford's official court file.

On December 15, 2005, United States Attorney For The District of Maryland Rod J. Rosenstein and Criminal Division Assistant Attorney General Alice Fisher issued a press release in Mr. Ford's case, which stated in part, that: (Though there was conflicting evidence of what Ford intended to do with the classified information - the jury's verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information". With the admission of Rosenstein that there existed "conflicting evidence" in Mr. Ford's case and the fact that the judge removed the required elements of 'belief... and intent...' from the jury instructions, should have rendered the indictment defective. (See Exhibit A - Rosenstein Press Release dated 12/15/2005)

FBI Special Agents Michael L. Thompson and Frederick C. Marsh both submitted sworn search warrant affidavits to a federal judge alleging that a Tonya Tucker had contacted the NSA to report Ford's alleged espionage. (Ford had known Tucker for 9 weeks - from 11/13/2003 to 1/11/2004 - and decided that she definitely was not his type. He later realized Ms. Tucker is a FBI confidential informant and was placed into his life by Special Agent Michael L. Thompson.) Defense counsel subpoenaed cell phone records of Tonya Tucker from Sprint, which clearly listed the voice call details of Date, Time. Phone Number. Destination, etc. (Tucker's alleged cell phone calls were described in the Thompson affidavit and completely identified in the Marsh affidavit.

From this, we were able to subpoena thru our attorney, her cell phone records.) Sprint records affirmed that Tonya Tucker Did Not contact NSA on January 5.2004. January 9. 2004. January 10. 2004 and January 11, 2004 from her cell phone number 407-616-5683 listed on the Sprint telephone record print-out and on page 5 of 12 of FBI Special Agent Frederick C. Marsh's sworn search warrant affidavit, which he wrote was "in support of the sworn search warrant affidavit" submitted the previous day, to the same judge, by FBI Special Agent Michael L. Thompson.

With the introduction of the subpoenaed cell phone records, it is apparent the Thompson and March search warrant affidavits are perjured and fabricated. Both agents are therefore subject to penalties of perjury. Also. very importantly. the cell phone (It should be noted here that prosecutors told the jury that Ms. Tucker was a friend of Mr. Ford's and simply was a "tipster".) (See Exhibit B - FBI Affidavits and Tonya Tucker's Cell Phone Records)

Mr. Ford, as required by NSA regulations, earlier reported a threatening e-mail sent to him on Tuesday, November 25th2003 at his "AOL" address a month and a half before his arrest. The e-mail was sent by a "Dr. Takiya", who claimed to be a friend of Tonya Tucker. Based on newly discovered evidence on September 1.2009, it was confirmed that Ms. Tucker is the author of the e-mail. Ms. Tucker signed her name onto an internet guest book August 15, 2006 with the e-mail address of Msunique_2@yahoo.com, which is the same e-mail address of the treat letter sent to Kenneth Wayne Ford, Jr. on Tuesday, November 25 .2003.

The e-mail threatened Ford that his security clearances would soon be revoked. She said she knew people at NSA who had clearances just like he did. Ford reported the e-mail the very next day to NSA Head Security Officer Anne Mennis. She ignored the email, not taking it seriously at all.. Ultimately, the admission of the e-mail as exculpatory evidence to Mr. Ford was suppressed from the trial by the judge. (See Exhibit C - Threatening E-Mail / Newly Discovered Evidence).

Newly discovered evidence of a newsletter dated March 31. 2006, states that FBI Special Agent Dave Evans was the lead FBI supervisor in the case against Mr. Ford. The defendant, Mr. Ford, was never aware that FBI Special Agent Dave Evans existed. (We, his parents, discovered this newsletter on the internet in 2008.) FBI Special Agent Evan's newsletter was titled, Maryland Man Sentenced For 'Stealing Secret Documents'. However, indictments alleged that Mr. Ford was charged with 'Unauthorized Possession of National Defense Documents" - not theft of secret documents.

FBI Special Agent Evans also said that: “As it turned out, our tipster was and didn't even make the drive to the airport." Nonetheless, the prosecutors continued to prosecute and incarcerate an innocent man.

FBI Special Agent Evans also stated that: (Our agents ultimately determined ultimately ended up in." Nonetheless, prosecutors indicted and incarcerated Mr. Ford with knowledge that 6'qonflicted evi4ence" existed in this case. (See Exhibit D – FBI Special Agent Dave Evans' Newsletter dated 3/31/2006)

Certainly, the defense has a right to depose and cross-examine the FBI Special Agent who was the lead supervisor in this case. Prosecutors withheld FBI Special Agent Evans from the defense. They also withheld Special Agent Frederick C. Marsh from the defense. The Marsh affidavit was suppressed during the suppression hearing by the judge, Judge Peter J. Messitte, before the trial began on 11/29/2005. Thus, that which brought Mr. Ford into the legal system and ultimately into a federal courtroom for prosecution, was not allowed into the trial. The jury was unaware of the affidavits. (The defense did not get them until 19 months after Mr. Ford’s arrest. Please keep in mind Mr. Ford has been totally under arrest the entire time since 1/11/2004 to the present.) To date, those affidavits have never been filed. They are not listed on the docket page of the case and they are not physically in the court file. It was represented and testified to the jury by DOJ prosecutors and FBI Special Agent Michael L. Thompson that he was the lead agent and only agent assigned to the Ford Case.

B. Even If Papers Had Been Present – The Text of §793 Is Vague And Should Not Have Been Applied In This Case

First, the statutes require that a defendant transmit information relating to the national defense. There are no allegations that Mr. Ford ever transmitted, sold, stole, secreted, purloined, paid for or otherwise obtained classified information inside or outside the government - by any illegal means. Legislative history of $793 makes plain that [Congress was concerned with spying].

The government never charged Mr. Ford with spying, injury to the United States on behalf of a foreign nation or communication to any person not entitled to receive classified information. Due process requires that a criminal statute provide a person of ordinary intelligence fair notice that his contemplated conduct is forbidden. See Thomas v. Davis, 192 F.3d 445,45514n Cir. 1999). If a law is "vague or highly debatable, a defendant - actually or imputably - lacks the requisite intent to violate it." See United States v. Mallas. 7 62 F .2d 36r , 363 14'n cir.1985). criminal prosecution for the violation of an unclear duty itself violates the clear constitutional duty of the government to warn citizens whether particular conduct is legal or illegal. See U.S. v. Rosen and Weissman 05-cr-225.

A statute cannot be construed so as to delegate to prosecutors and juries the "inherently legislative task" of determining what type of possession of national defense information are so reprehensible as to be punished as crimes. See United States v. Kozminski. U.S. 93 1,949 (1988) (rejecting construction of criminal statute that would *delegate to prosecutors and juries the inherently legislative task of determining what type of coercive activities are so morally reprehensible that they should be punished as crimes").

Second, the canon of strict construction of criminal statutes and the rule of lenity ensure fair warning by resolving ambiguity in a criminal statute as to apply it only to conduct clearly covered. Lanier, 520 U.S. at 266. Third, due process bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope. Each of these three elements is based on the fact that it must have been reasonably clear the time that the defendant’s conduct was criminal.”

United States Attorney for the District of Maryland Rod Rosenstein confirmed by his own statement that: "Though there was conflicting evidence of what Ford intended to do with the classified information – the jury’s verdict demonstrates that it was satisfied that Ford had unauthorized possession of the information.”

Therefore, one would conclude that it was apparently not 'reasonably clear' that Ford's alleged conduct was criminal. Our son was incarcerated based on “unclear conflicting evidence'. An egregious miscarriage of justice at the highest level is evident throughout this case.

Each of these three manifestations is based on the notion that it must have been "reasonably clear at the time that the defendant's conduct was criminal". Elements applied to Mr. Ford's case affirm that reasonable clarity was severely lacking. Courts have ruled that §793 (d) and (e) apply only to the transmission of tangible information. ln fact, these rulings were the basis of Special Counsel Patrick Fitzgerald's explanation as to why he did not bring charges under the Espionage Act §793 against either the government officials who leaked the name of CIA agent Valerie Plame to the press or the reporters who subsequently reported that name to millions of readers around the world.

The following exculpatory evidence, which would have exonerated our son, was suppressed from the trial and jury: 1) FBI Form 302 Statement by Tonya Tucker (FBI Confidential Informant), 2) Tonya Tucker's threatening e-mail to Mr. Ford and 3) Special Agents Thompson's and Marsh's Search Warrant Affidavits. Special Agent Marsh's affidavit clearly affirmed on January 11, 2004, page 6 of 12 that: “A review of criminal history records reflect that TUCKER has a number of arrests, including arrests for Driving while suspended, Criminal trespassing, Robbery, among others."

Courts have repeatedly ruled that the government may not excuse its presentation of false testimony by claiming that: (a) it did not know, (b) it did not understand what other agencies knew, or (c) it believed the testimony. It cannot use these excuses because they are not the law and the facts do not support them. See Mesarosh. et al v. United States, 352 U.S. I (1956); Giglio v. United States, 405 U.S. 150 (1972); and United States v. Mason, et al., 293 F.3d, 826 (5th Cir.2002). Fourth Amendment violations enumerated in the matter of Franks v. Delaware were repeated violations perpetrated on Kenneth Wayne Ford, Jr. by the United States Department of Justice (DOJ). In the matter of Franks v. Delaware, the Court held that: "Where the defendant makes a substantial preliminary showing that a false statement that a hearing be held at the defendant's request."

Federal prosecutors in Mr. Ford's case willfully applied national security standards of the suppression of evidence and discovery. DOJ prosecutors willfully enforced national security clearances upon defense counsel with full knowledge that DOJ did not obtain mandatory FISA applications and approvals.

Prosecutors ignored strict procedural requirements in accordance to the Foreign Reform Act of 2000"). Prosecutors clearly violated Title VI §603, 605 and 607. This case should never have been prosecuted. Title VI $608 provides, in part, that: "If any provision of this title (including an amendment made by this title), or the application thereof, to any person or circumstance, is held invalid, the remainder of this title (including the amendments made by this title), and the application thereof. to other persons or circumstances shall not be affected thereby.”

C. Background

Kenneth Wayne Ford, Jr. is now 38 years old. He is the cream of the crop of young American citizens. He is an African-American and is highly educated. Mr. Ford graduated from DeMatha Catholic High School in Hyattsville, Maryland in 1990. He then went to the University of Miami in Coral Gables, Florida and graduated from there in 1995 with a Bachelor of Business Administration in Management and Organization degree. Mr. Ford served 4 years in the Uniformed Division of the Secret Service, where he received two cash awards in consecutive years for outstanding service. While in the Secret Service, Mr. Ford continued his education and enrolled into Strayer University. To his credit, he graduated in 2001, summa cum laude" earning a Bachelor of Science in Computer Networking degree. Later, Mr. Ford enrolled in the Masters program at Strayer University, earning in 2004, a Master of Science in Information Technology degree.

In 2001, Mr. Ford accepted employment at NSA as a Signals Intelligence Analyst. While employed at NSA, he received a cash award for outstanding service. Later, he was recognized with a large plaque - his name listed, among others, for outstanding work on a particular project. It was disclosed in the trial by a State Department officer that Mr. Ford had security clearances that less than 150 people in the entire country hold. Mr. Ford has worked extremely hard all his life, as he was not born with a silver spoon in his mouth, inherited wealth or privilege. He has spent over 23 years acquiring an education. He would never do anything to jeopardize his life or his accomplishments. After Mr. Ford's conviction, Mr. Lambert, the probation officer assigned to formalize his pre-sentencing report, commented to me (his mother) and included in his report that "Kenneth has not even had a traffic ticket."

D. Case Overview

On Sunday, January 11. 2004. FBI Special Agent Michael L. Thompson and NSA Security Officer Robert McCaslin arrived at Mr. Ford's home at approximately 5:50 p.m. and fabricated that they wanted to talk to him about his former position. Mr. Ford invited them in because he was led to believe they wanted to get his expertise on a work-related situation. About ½ hour later, their attitudes changed and Mr. Ford realized they were unjustly accusing him of espionage. Simultaneously, with these accusations, they began searching his home - 2-I/2 hours before the search warrant arrived. FBI Special Agent Frederick Marsh arrived with a search warrant and about 23 additional agents.

During the course of this ordeal, Mr. Ford was threatened by Special Agent Michael L. Thompson's unnecessary withdrawal of his gun. He was terrorized for 7-1/2hows as the agents rampaged his home. He was not allowed to leave his residence, contact his parents or answer his telephone. He was denied food and water. He was not allowed to use his own bathroom until Thompson took him away from his home -7-1/2 hours later. See Title 18, Part I, Chapter 113C - Torture - "an act committed by a person acting under the color of law specifically intended to inflict severe physical or mental pain or suffering (other than pain or suffering incidental to lawful sanctions) upon another person within his custody or physical control." (See Exhibit E -Letter by Kenneth W. Ford, Jr. Documenting Events)

E. DOJ Triple Jeopardy Indictments

The government's 1st indictment, and 2nd case number, was filed on 3/4/2005. U.S. District Court Judge Peter J. Messitte dismissed the case without prejudice on 5/162005. The 2nd indictment, and 3rd cse number, dated 5/23/2005, contained the exact charges and language as the ls indictment. The 3rd indictment, which we had no knowledge of until recently, is dated 11/28/2005. The docket indicates that there was a superseding indictment, arraignment and plea of not guilty all on the same day – 11/28/2005. It indicates Mr. Ford appeared before Judge Messitte and gave a plea of 'not guilty' to each of the two counts against him. This is untrue. Mr. Ford never appeared before Judge Messitte or any other judge on 11/28/2005. His trial started the next day, 11/29/2005. It is impossible to appear for an arraignment one day and be tried by jury the very next day.

It should be noted here that on March 30,2006, at the end of Mr. Ford's 2ndsentencing hearing, Judge Messitte dismissed the original indictment. He and Prosecutor Salem signed papers to that effect. Judge Messitte said several times during the trial, Mr. Ford was being prosecuted on the superseding indictment. (Of course, this is impossible.) Apparently, at some point, Judge Messitte and Mr. Salem realized this. Consequently, this dismissal has never been filed, is not in Mr. Ford's court file and is not on the docket. (See Exhibit F - Indictments, Docket Listings of 1//28/2005 Superseding Indictment, Arraignment and Not Guilty Plea and Transcript Page of Dismissal of Original Indictment) Also See $3434 - Presence of Defendant - (Rule) 3

Also, there appears on all three indictments: 'Aiding and Abetting (1S U.S.C. §2)'. Mr. Ford was never charged with this crime. It does not appear anywhere else in the indictment nor was it addressed in the trial to the jury. In addition to the indictments being illegal, these acts make the indictments themselves faulty.

The 1st count was cited under Federal Criminal Code 793(e) - Espionage. FBI Receipt For Property Seized / Form 597 listed all items seized from Mr. Ford's residence. Ironically, there was not one (1) document identified as 'classified papers' prosecutors falsely alleged were taken from Mr. Ford's residence.

At the trial, FBI Special Agent Bridget Bigham, Seizing Agent, testified that she was told to put a classified sticker on a Fed Ex envelope found in a suitcase which belonged to career criminal Tonya Tucker. (The envelope is listed by FBI Special Agent Bigham as #9 on the FBI Form 597.) (See Exhibit G -FBI Form 597) Special Agent 3

-------------

3 In United States v. Randall, f 71 F.3d 195,203 (4th Cir. 1999) The Supreme Court ruled that the Fifth Amendment's grand jury guarantee does not permit a defendant to be tried on charges that are not made in the indictment against him, and therefore, 'after an indictment has been returned its charges may not be broadened through amendment except by the grand jury itself. See United States v. Randall, 471 U,S. 130, 143 (1985). See United States v. Brady, 456 U.S. 152; and United States v. Young, 470 U.S. 1, 16 (1985).

Bigham testified she did not look at the papers while in Ford's home. She further testified the alleged papers seized were not photographed in Ford's home as required by procedures, but were photographed days later at an FBI facility. (See Exhibit H - Excerpt of Agent Bigham's Transcript Testimony)

DOJ prosecutors testified during the trial that it did not have any 'surveillance evidence' nor 'any eyewitness accounts' of Mr. Ford allegedly removing classified documents from NSA. Prosecutors should have dismissed all charges against Mr. Ford.

The 2nd count was Title 18 U.S.C. $ 1801 - Making A False Statement On A Government Form. Mr. Ford accepted employment with Lockheed Martin. Prosecutor David Salem had already gotten him fired from Northrop Grumman and after working for 3 weeks at Lockheed Martin, Salem was successful in getting him fired from there also. Ford truthfully provided Lockheed Martin a 1-1/2 page written account of alleged charges against him. At the trial, Judge Messitte allowed Prosecutor Salem to severely redact Ford's written statement. Salem told the judge the statement "prejudiced him". (See Exhibit I - E-Mail Dated 10129/2004 to Lockheed Martin) AUSA David I. Salem and DOJ National Security Division Trial Attorney Mariclaire D. Rourke testified that Mr. Ford backed his pick-up truck to the loading dock and loaded these papers into his truck.

In contradiction of their testimony, Mr. Ford's former NSA supervisor, Ms. Jacqueline Welch ("hereafter Jacqueline W") testified that she in fact had seen Mr. Ford on the day in question - December 19,2003 - standing in the parking lot beside his 'cream-colored 4 door sedan (car)'. Former Counsel on redirect, ascertained whether or not she knew the difference between a 'pick-up truck and a car . She affirmed that she did. Jacqueline W further testified that she never knew Mr. Ford had a pick-up truck. At that point, DOJ's over zealous prosecutors' alleged pick-up truck was referred to as a 'vehicle'. (See Exhibit J - Excerpt of Jacqueline W's Testimony)

Special Agent Michael L. Thompson admitted under oath that there were no fingerprints belonging to Mr. Ford found on any of the thousands of sheets of classified papers allegedly found in Mr. Ford's home. Once again, none of these alleged papers were listed on the FBI's official seized evidence Form 597. (See Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony)

F. Argument

Mr. Ford is the only American citizen in the history of the Espionage Act, to be charged, prosecuted and convicted under the statute without meeting the requirements of the statute. The United States Court of Appeals for the 4th Circuit recently upheld the requirements that in order to charge under the Espionage Act of 1917 - §793(e) one has to have the belief that what one is doing will harm the United States and/or help a foreign entity and one must have the intent to harm the United States and/or help a foreign entity. See United States v. Rosen and Weissman,557 F.2d 192 4th Cir.2009).

Judge Peter J. Messitte, during the suppression hearings, willfully discarded the requirement that the government had to prove the “belief” 'element. Judge Messitte, while charging the jury, willfully eliminated the need for the government to prove the element of "intent.”

Under the federal sentencing guidelines, espionage (Federal Criminal Codes §793(d) and (e) cannot be sentenced unless there is the element of transmittal. So, effectively, since a transmittal is a prerequisite for sentencing under §793(e), then without it, there cannot be a charge. The government never alleged Ford transmitted anything. As a matter of fact, NSA Security Officer Robert McCaslin sent a letter to Prosecutor David Salem dated 713112004 saying Ford's electronic equipment at work and at home were analyzed by NSA and were found to be clean. The letter was not allowed into the trial.

Subsequently, the "CIPA" Intelligence Authorization Act for 2001- Title VI §607 - Coordination Requirements Relating to the Prosecution of Cases Involving Classified information was totally ignored by Assistant United States Prosecutor David I. Salem and Dept. of Justice Trial Attorney Mariclaire D. Rourke.

The National Security Procedure Statute 9-90.020, provides that DOJ prosecutors had no authority to make decisions in this case. "CIPA" $607 - $1.1 of Executive Order No. 12958, provides that a Senior Official, the President of the United States, must be notified prior to prosecution. ln this case, that President was former President George W. Bush, Jr. - another statutory mandate ignored and violated in the matter of Kenneth Wayne Ford, Jr. $793(e) 'unauthorized possession' is contradictory to the National Security Act which provides that NSA employees have a life-time obligation and commitment regarding NSA classified documents.

G. Violation of Dept. of Justice Guidelines/National Security Procedures

DOJ's USAM guidelines regarding National Security Procedures §9-90.020 clearly dictates that the authority to conduct prosecutions relating to the national security lies with the Justice. USAM unequivocally states, in part that:

All prosecutions affecting, involving or relating to the national security, and the responsibility for prosecuting criminal offenses, such as conspiracy, perjury and false statements, arising out of offenses related to national security, is assigned to the Assistant Attorney General of the National Security Division or higher authority. See 28 C.F.R. S 0.61 The Counterespionage Section of the National Security Division, under the supervision of the Assistant Attorney General or higher authority, conducts, handles, and supervises prosecutions affecting, involving or relating to the national security." DOJ trial attorney Mariclaire D. Rourke and AUSA David I. Salem did not have authority to prosecute a National Security Espionage case against Kenneth Wayne Ford, Jr.

We recently reviewed Mr. Ford's court file. Although there are a few orders, from 8/2005 to 1112005, appearing in the case file that indicate the Assistant Attorney General was in compliance with that particular order, it is with great concern that we ask you to investigate this. We have no proof or certification that the Assistant Attorney General's alleged involvement with this case was authentic. As in other things involving Mr. Ford's case, we suspect this too is a fabrication.

H. DOJ Violated FISA Court Statutes

FISA Court specifically prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control).

FISA allows a federal officer, authorized by the President of the United States acting through the Attorney Gener4l to obtain from a judge appointed by the FISA Court, search warrants and approval of electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information. Mandated strict FISA Court procedures were ignored by the FBI, DOJ Prosecutors and U.S. District Court of Maryland Judge Peter J. Messitte, who is not an appointed FISA Court Judge.

Specifically, FISA requires that where the target of the search or surveillance is a "United States person" - a U.S. Citizen or permanent resident alien - the judge must find that the Executive Branch's certification that a significant purpose of the search or surveillance is to obtain foreign intelligence information is not "clearly erroneous". See 50 U.S.C. §1805 and 1824. Also see Brady v. Maryland, 373 U.S. 33 (1963); Strickler v. Greene, 119 S.T. 1936 (1999).

The elements of violations are: (1) the evidence must be favorable to the accused, either because it exculpates the defendant or because it impeaches the government; (2) the evidence must have been suppressed by the government, either willfully or inadvertently; and (3) prejudice must have been ensued. See Franks v. Delaware, 438 U.S. 154 (1978); See Brady v. Maryland, 373 U.S. 83 (1963); See USA v. Rosen & Weissman 05cr-225 (E.D.Va.)

We are not elected or high level corporate officials. We are "grass roots" people who are honest and hard working. President Obama stated at the 2009 NAACP 100th Anniversary celebration, that: "America is a place where, if you work hard, you can achieve success." A grave injustice has been done to a good American citizen (Kenneth Wayne Ford, Jr.). American citizens rely upon the United States Department of Justice to follow the rule of law.

In good faith, the initiation of a formal procedural investigation and the appointment of a Special prosecutor on behalf of our son, Kenneth Wayne Ford, Jr., is warranted and specifically should include an investigation of prosecutorial misconduct, violations of national security procedures, violations of FISA Court procedures, violations of issues in applying states secrets rules and the willful suppression of exculpatory affidavits and other exculpatory evidence in this case.

We are available at any time that is convenient to you to discuss this case. The elements in this letter by no means cover all the infractions against Mr. Ford. There were just too many illegal things done to put in a letter.

We seek an immediate vacation of Mr. Ford's conviction, full restoration of his revoked clearances and an immediate apology from the Department of Justice (DOJ).

Thank vou.

Sincerely,

Kenneth W. Ford, Sr.

Gloria D. Ford

EXHIBITS

l) Exhibit A - Rosenstein Press Release dated December 15, 2005

2) Exhibit B - Affidavits by SA Michael L. Thompson & SA Frederick C. Marsh and Tonya Tucker's Subpoenaed Cell Phone Records

3) Exhibit C - Tonya Tucker's threatening e-mail to Mr. Ford/Newly Discovered Evidence

4) Exhibit D - FBI Special Agent Dave Evans' Newsletter dated 3/31/2006

5) Exhibit E - Letter from Kenneth Wayne Ford, Jr. / Document of Events

6) Exhibit F - DOJ's Double Jeopardy Indictments; Docket of 11/28/2005

Indictment; Transcript Page of Dismissal of Original Indictment

7) Exhibit G - FBI Form 597 (Seized Items) w/ Computerized Listing Of Items

8) Exhibit H - Excerpt of Agent Bridget Bigham's Testimony

9) Exhibit I - E-Mail dated 10/29/2004 from Kenneth W. Ford, Jr. to Lockheed Martin

l0) Exhibit J - Excerpt of NSA Jacqueline Welch's Testimony

1l) Exhibit K - Excerpt of FBI Special Agent Michael L. Thompson's Testimony
      

President Obama, who prides himself as a constitutional scholar, having taught constitutional law at the University of Chicago, is about to become the subject of a major constitutional case in the indictment of Thomas Drake. Drake was not only exposing high level contract fraud involving two NSA directors -- Generals Michael Hayden and Keith Alexander -- but also allegedly involved a constitutionally-protected entity -- the press -- in making details of the fraud known to the American taxpaying public. Not since Watergate have the American people been subject to runaway surveillance by the NSA and FBI.

Obama, who supported retroactive immunity from prosecution for telecommunications companies that swept up the digital communications of all American after proclaiming he was against it, will be the person on trial in the Drake case. And Obama may very well end up like Richard Nixon if the government does not impose restrictions on the public's right to know through imposition of the draconian Classified Information Procedures Act and the State Secrets Privilege.

As one NSA insider tersely put it: "I truly believe that NSA has some illegally wiretapped information (big-time dirt) on Mr. Obama, and NSA has been using it (via blackmail) against him ever since he flip-flopped on the vote for retroactive immunity for the telecommunication firms that insisted they did nothing illegal when they joined in with the Bush administration in comprehensive, 'sea to shining sea' warrantless wiretapping of all domestic U.S. communications."

//////////

JANUARY 2011: January 10, 2011 -- NSA "Q Group" protecting sex scandals while plugging potential leaks - Wayne Madsen Report

WMR's intelligence sources report that the National Security Agency's "Q Group," the directorate responsible for overall security for NSA, is actively investigating and harassing NSA employees who have reported on senior officials at the sprawling intelligence agency, which now includes the new U.S. Cyber Command, of engaging in adulterous trysts with subordinates and possessing improper sexual material, including child pornography.

WMR has previously reported on the improper activities of the Q Group, which has become a virtual uncontrolled FBI within the NSA. Q continues to protect NSA senior officials who engage in and promote a culture of sexual exploitation of junior employees at the intelligence agency. Q Group has also misused NSA psychologists and psychiatrists to deem anyone who charges senior officials of the agency with sexual misconduct or harassment unfit to hold a security clearance for reasons of mental impairment.

On August 28, 2009, WMR reported: "NSA Security, headed up by Kemp Ensor III, and NSA medical worked in tandem to deny security access to employees determined to be mentally unfit to have access to classified information at NSA.

However, due to the attrition of highly-qualified personnel, the security-medical duo is now prescribing Prozac and Zoloft for NSA employees who refuse to fall into line. NSA is abuzz with the new requirement for employees to take what they call "happy pills."

The sexual harassment scene has also reportedly changed at Fort Meade. In the past, sexual harassment at NSA involved older male managers preying on young female employees. That has now changed in what has become an environment of 'do ask and do tell.' WMR has been informed that there is an increase in complaints about sexual harassment from new young male hires about being forced into 'kinky rendezvouses' with older male managers."

Q Group has also gone outside of its legal authority to harass the families and friends of former agency employees who have brought charges against NSA for sexual harassment and misconduct. WMR has learned of NSA personnel illegally masquerading as phone company technicians who entered the property of the family of one such ex-employee. In another case, Q Group personnel poisoned two pet dogs of the family of an ex-employee under NSA surveillance. Q Group personnel have also been used to harass the ex-spouses of senior NSA officials involved in child custody cases. WMR has also been informed that Q Group has harassed NSA employees who have married the ex-wives of NSA senior officials who have ongoing legal battles with their ex-husbands.

Q Group is able to conduct its harassment of civilians in the Fort Meade area with a "wink and a nod" from local law enforcement and other officials. NSA senior managers have dipped into NSA's substantial slush fund to lavish money on community service projects and programs in cash-strapped local municipalities and counties. The concept of the "friendly NSA that provides funds and jobs" has bought loyalty and silence from local and state of Maryland officials. In addition, WMR has learned that NSA has placed agents within the congressional offices of local members of Congress in order to interdict and retaliate against NSA whistleblower congressional complaints. The NSA "embeds," who work in concert with NSA's Office of Legislative Affairs, are found within the offices of Maryland Senators Barbara Mikulski and Ben Cardin, and Maryland Representatives C.A. "Dutch" Ruppersberger, Steny Hoyer, Elijah Cummings, Chris Van Hollen, and Paul Sarbanes, and is currently inserting an agent into the office of freshman Representative Andy Harris.

As discovered in a January 2005, Q Group Personnel Security organizational chart obtained by WMR, Q2 contains an office of counter-intelligence, which WMR has reported has been involved in illegal surveillance of individuals far beyond the NSA infrastructure.

Q2.jpeg

On July 3, 2009, WMR reported: "The Obama administration, rather than lessen the pressure on the NSA personnel, has turned up the heat and is resorting to even more draconian methods to ensure silence. The word from inside NSA is that a state of fear exists and the mission of the agency, to conduct surveillance of foreign communications to provide threat indications and warnings to U.S. troops and policy makers and protect sensitive U.S. government communications from unauthorized eavesdropping is suffering as a result." Our latest information is that the Obama administration is increasing pressure on NSA personnel to deter leaks.

Obama's Justice Department is now actively retroactively pursuing U.S. intelligence community leakers from the time of the Bush administration. Former CIA officer Jeffrey Sterling has been arrested and indicted for revealing information to New York Times reporter James Risen concerning Iran's nuclear program. Former NSA official Thomas Drake has been indicted by the Obama administration for leaking details on NSA contract fraud to reporter Siobhan Gorman of The Wall Street Journal and formerly of theBaltimore Sun. Former State Department analyst Stephen Kim has been charged with leaking top secret information on North Korean nuclear testing to Fox News.

WMR has learned from informed sources that the indictments of Sterling and Drake are just the beginning of the Obama administration's policy to crack down on leaks. With the tenth anniversary of the 9/11 attack coming up this year, the U.S. Intelligence Community, working closely with Mossad, have made plans to stop any new revelations that would point to high-level U.S. and Israeli government involvement in the 9/11 attacks. The Wikileaks affair was partly concocted to draw out and identify as many potential leakers as possible, including US Army Private Bradley Manning, now imprisoned at Quantico, Virginia on suspicions that he leaked classified documents to Wikileaks.

WMR has learned from an NSA source that this editor continues to remain a top priority for NSA electronic surveillance, including phone tapping and e-mail interception. NSA is also monitoring all those who are in communications with this editor via electronic means. WMR has previously reported on this web site's sources and contacts being major targets for NSA surveillance. Just as the latest report of NSA surveillance was received, this editor experienced a second-degree burn with blistering on the right neck and shoulder, usually where my cell phone is placed during conversations. The latest warning about NSA eavesdropping was received on January 8. The burn, that began as what can be described as a bad sunburn, began on the evening of January 6. The contour of the burn mark is oddly similar to the two equal halves of my flip-top telephone, with a white stripe in the middle where the hinge is located.


SDC10481.jpeg

Second degree burns on right shoulder and neck after latest warning of full-scale NSA surveillance.

WMR's foreign intelligence sources also report that there is an ongoing project by Israeli agents-of-influence in the United States to determine the sources of information on the 9/11 attacks. This project involves in-depth probes by the Israeli agents of retired Pentagon and FBI personnel believed to possess information about the U.S. and Israeli governments' involvement in the attacks. WMR can report that radio show host Alex Jones's information and funding sources are of particular interest to the Israeli cell.

///////////////////////

MARCH 2011: March 22-23, 2011 -- SPECIAL REPORT. NSA, DOJ, and courts conspire to cover-up NSA fraud, waste, abuse, and criminal conspiracy at trial - Wayne Madsen Report

In the trial of former National Security Agency (NSA) executive Thomas Drake, federal prosecutors have convinced an agreeable federal judge, Richard D. Bennett, to place under court seal previously-released trial documents because they have been deemed "For Official Use Only" or FOUO. Drake is accused of leaking classified materials to the media and is only the fourth person in U.S. history to be charged with violating the 1917 Espionage Act.

FOUO is not a national security classification and it never has been one, although there were attempts by the Reagan, George H W Bush, and George W. Bush administrations to create a "restricted" or "sensitive but unclassified" (SBU) national security classification immediately below the current lowest national security classification, which is Confidential. Expansion of national security classification categories beyond the current three -- Top Secret, Secret, and Confidential, in addition to Sensitive Compartmented Information (SCI) special access categories -- but these have been unsuccessful. George W. Bush's creation of a Controlled Unclassified Information (CUI) category was rescinded by Executive Order 13556 on November 4, 2010.

Although President Obama rescinded Bush's CUI presidential memorandum, federal prosecutors are trying to argue that CUI continues to exist as a national security classification under the guise of FOUO. The argument demonstrates a complete lack of understanding of the classification scheme used by NSA. However, in past trials, notable that of NSA analyst Kenneth Ford, Jr., jailed after a political show trial waged by DOJ neocons in league with a "shopped" federal judge. In the Ford case, the NSA wanted to cover up the cooking of signals intelligence from Iraq in order to justify the attack on and occupation of Iraq

However, NSA and Justice Department prosecutors are continuing to insist that FOUO is a security classification in the trial of Drake, however, NSA and DOJ decided to go after Drake because the documents he stands accused of passing to The Baltimore Sunpoints to massive misuse of taxpayer's money and contract fraud under the NSA directorships of retired General Michael Hayden and current director General Keith Alexander. Alexander is also the commander of the U.S. Cyber Command. The fraud committed by Hayden, Alexander, and senior NSA officials amounted to hundreds of millions of dollars in wasteful expenditures. In some cases, the waste on certain contractor-supplied intelligence systems were life threatening, as far as troops on the ground were concerned. The fraudulent contract expenditures were part of NSA's massive TRAILBLAZER and GROUNDBREAKER outsourced modernization and restructuring programs.

On March 18, in response to a request from federal prosecutors, Bennett sealed two documents that were previously available on the court's own website. The documents sealed describe the classified contents of several documents seized at Drake's home, however, the documents appear to be unclassified working papers that the government, after the fact, is trying to argue are classified at the levels of Secret and Top Secret.

Drake's federal public defenders have argued in one of the sealed documents that the government's argument that the documents found in Drake's home in flawed due to the fact that the documents could not be construed as classified at Secret or Top Secret merely because they contain the words "FOUO" and "COMINT." COMINT is communications intelligence and by itself does not mean that the document is classified at "Handle Via COMINT Channels Only," a special handling caveat for SCI special access categories. In fact, the National Cryptologic Museum, which is adjacent to NSA headquarters and open to the public, freely uses "COMINT" in its displays. In addition, the commercial International Spy Museum in downtown Washington, DC has held public seminars on issues dealing with, among other tradecraft, "COMINT."

From the sealed DOJ letter arguing that the documents found in Drake's home are classified, it is clear that NSA, which has played fast and loose with the truth in previous trials and administrative actions against its whistleblowing employees, has tried to re-classify previous unclassified "working papers" as being Secret and Top Secret to bolster its case against Drake.

WMR has previously obtained NSA contractor documents that were deemed by the contractor and NSA, itself, as unclassified and the Drake documents appear to fall within the same category. The unclassified documents that were re-classified as Top Secret and Secret have titles such as "Trial and Testing," "Collections Sites," "Volume is Our Friend," "What a Success," "Regular Meetings," "Shoestring Budget," "BAG," "Buy vs. Make," "TT Notes," "Terrorism Threat," "Note Card 1", "Note Card 2," and more intriguing, "9/11 Commission." WMR previously reported that NSA's security directorate, the "Q Group," has engaged in massive surveillance of employees and journalists, including this editor, to plug any leaks on NSA information on the 9/11 attacks. Bennett, in his ruling on March 18, agreed to NSA's and lead federal prosecutor William Welch II's request that previously unclassified court filings be placed under seal.

While NSA and DOJ seek to convict Drake for having unclassified For Official use Only documents in which the terms "FOUO" and "COMINT" appear, WMR has obtained a similar Unclassified For Official Use Only (FOUO) document written by Computer Sciences Corporation (CSC), one of the major contractors for the fraud-ridden GROUNDBREAKER program. In the document, from which WMR is providing excerpts, there are clearly many more NSA-unique systems and terms described.

Cover terms for classified NSA systems such as HIGHCASTLE, LOOKINGGLASS, MILENIUM, FAST TRACK, ROTUNDPIPER, and BRASSCOIN are listed, along with "SIGINT" or "Signals Intelligence," an NSA mission term comparable to the "COMINT" acronym found in the working papers confiscated from Drake's home.

The CSC document, maintained by CSC contractors and sub-contractors in their cars, briefcases, and homes, were never indicted by the Justice Department on grounds they violated national security. On the other hand, many at NSA feel that companies like CSC, SAIC, Northrop Grumman, Lockheed Martin, and others, should have been indicted for the massive contract fraud carried out under the watches of Hayden and Alexander.

In post-9/11 America, the whistleblowers to fraud, waste, and abuse stand accused of being criminals while the criminals rake in billions of dollars in taxpayers' money and are lauded as critical components of the "intelligence team."

NSA's GROUNDBREAKER and TRAILBLAZER contractors were eager to compile as many NSA systems and sub-systems as possible to cash in on the billions of dollars they could make from the NSA outsourcing work. The database that contained all the NSA systems, projects, and components ripe for outsourcing work was code-named JACKPOT. For CSC, SAIC, and certain NSA officials who spun through the revolving door after retirement and landed high-paying jobs with the contractors, it certainly was a JACKPOT and one that NSA, Q Group, the FBI, Department of Justice, and the White House earnestly want to cover-up in the trial of Thomas Drake.

During Drake's trial, which begins next month in Baltimore, FBI agents are expected to use code words to describe different aspects of the case. One code-word that will most definitely not be heard is JACKPOT, the database of NSA contracts in which contractors and NSA retirees enriched themselves -- criminality that is only met with chirping crickets from the so-called "crime fighting" Department of Justice and FBI.

//////////////

NOTE: Here is the resealed files mirrored on hongpong.com, bitchez: SUPPRESSED: DrakeNSA1-suppressed.pdf // DrakeNSA2-SUPPRESSED.pdf // UNCLASSIFIED FOUO NSA DOC:  UNCLASSIFIEDNSAdoc.pdf .

Walter from the Big Lebowski has a word for you Fed jokers that think they can control society through secrecy & bullying:

22881085.jpeg

/////////////

MAY 2011: May 24, 2011 -- 60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years - Wayne Madsen Report

CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.

WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."

NSA and selling the nation's prized secrets to contractors

June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.


But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA
SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

/////////////

SEPTEMBER 2011: September 26-27, 2011 -- A tale of two cases - Wayne Madsen Report

On June 15, U.S. federal judge Richard B. Bennett sharply rebuked federal prosecutors for pursuing a four-year Espionage Act violation investigation and case against former National Security Agency (NSA) official Thomas Drake. At Drake's sentencing hearing in Baltimore, Bennett called the four-year long case against Drake and the prosecutors' ultimate dropping of multiple espionage charges to a single misdemeanor count of unauthorized use of a government computer "unconscionable."

Drake had been charged with providing classified information to the Baltimore Sun in 2006 and 2007. He was specifically charged with violation of sub-paragraphs (d) and (e) of the Espionage Act, which covers "transmittal" of classified information to unauthorized parties. Charges under the 1917 Espionage Act have rarely been brought by the Justice Department. The law was used against American Israel Public Affairs Committee (AIPAC) officials Steve Rosen and Kenneth Weissman for receiving highly-classified information, including Sensitive Compartmented Information (SCI), from a Pentagon official. Charges against Rosen and Weissman were dropped by Eric Holder's Justice Department on May 1, 2009.

However, the "classified material" cited by prosecutors was not originally classified and it pertained to NSA officials, particuarly then-NSA director General Michael Hayden, defrauding the government for well over a billion dollars. Hayden and his advisers awarded a failed program called Project TRAILBLAZER to a group of contractors led by Science Applications International Corporation (SAIC).

The prosecutors, acting as virtual criminal racket protection agents for Hayden and his advisers, decided to retroactively classify the unclassified whistleblowing information in order to justify the Espionage Act charges against Drake. Hayden's pet project also assisted in the program to conduct warrantless wiretapping of communications of U.S. citizens, a super-classified operation known by the code name STELLAR WIND.

Drake avoided prison and Bennett ruled against federal prosecutor's wish to have a $50,000 fine imposed on Drake. In sentencing Drake to 240 hours of community service, Bennett said "There has been financial devastation wrought upon this defendant that far exceeds any fine that can be imposed by me. And I’m not going to add to that in any way.”



Drake was represented by two federal public defenders, James Wyda and Deborah Boardman. Drake's case began to fall party after it was featured on CBS "60 Minutes." Retired NSA officials, interviewed on camera, defended Drake and his whistleblowing actions. After the bad publicity for NSA and Eric Holder's Justice Department, the espionage charges against Drake were dropped.

Five years earlier, in another federal court room in Greenbelt, Maryland, and in a case even more egregious than the one involving Drake, federal judge Peter J. Messitte sentenced former NSA "Iraqi shop" signals intelligence analyst Ken Ford Jr., to six years in prison and no fine as a result of his politically-motivated conviction for allegedly removing two boxes of classified materials from NSA during broad daylight without detection. In fact, the documents were planted in Ford's Waldorf, Maryland home in retaliation for his signals intelligence analysis report casting doubt on the White House contention that Iraq possessed weapons of mass destruction. That report, which contained Ford's name as the preparer, eventually ended up on the desk of Vice President Dick Cheney. As a result, Ford became a target of the neo-con cell operating from within Cheney's office and the White House Iraq Group (WHIG), the same cabal that compromised Valerie Plame Wilson's covert identity and mission.

The team of Assistant U.S. Attorney David Salem; federal public defenders John Chamble, Andrea Callaman, and Susan Bauer; and even the private lawyer eventually retained by Ford, conspired to ensure that Messitte was successfully "judge shopped" as the trial attorney, that at least one dubious pro-NSA jury member was selected for the trial jury, and that Ford would receive anything but a fair trial. Unlike Drake, Ford served in a lower-level analyst position. However, Ford, an African-American who previously served as a uniformed U.S. Secret Service officer at the White House, was on a fast-track for an executive position at NSA.

"60 Minutes" never covered the Ford case, even though it was as, if not more, outrageous as the case brought against Drake. The Washington Post, rather than assign one of its national security correspondents to the case, handed it to a Metro desk reporter, who parroted in his articles what was given to him by the prosecution team.

Prosecutors never cited any classified document that was said to be in Ford's possession at the time of his arrest. Prosecutors relied on the testimony of a confidential informant named Tonya Tucker, who had several other aliases and a long criminal record, who said she saw a document labeled "classified" in Ford's home. Of course, "classified" is not a national security label or designator for any documents. Salem also charged that Ford was planning on meeting a foreign agent at Dulles International Airport to transmit documents. However, Salem could not identify the foreign country involved, a flight number, a rendezvous point, or any details of what amounted to a "pre-crime" allegation. In fact, Salem made up the entire Dulles story as a way to ensure a guilty verdict, especially considering that the jury was never shown any of the alleged classified documents that were said to be in Ford's possession. In the Drake case, the jury was shown copies of "retroactively" classified documents, which were originally unclassified.

Ford is now out of prison and serving three-years of restricted travel probation in Maryland. He maintains his innocence and intends to appeal his case. However, Ford's attempt to enlist the assistance of the parties who came to the defense of Drake have been unsuccessful. There is another problem with the Ford case. The Ford case files, including those maintained by the PACER system and the federal public defenders office in Washington, DC, have all disappeared. Even Ford's original birth certificate in the District of Columbia Vital Records Office has disappeared. The only information available on the Ford case from the Justice Department are the press releases issued on the case.

The federal public defenders office in Washington is clearly nervous about the double standard applied to Ford and Drake. Moreover, the supervisor of Ford's tainted public defenders in 2004 was Wyda, the same public defender who successfully argued Drake's case.

Former Justice Department prosecutor Thomas Tamm, under a long investigation for revealing the nature of NSA's warrantless wiretapping program to The New York Times, eventually saw his investigation by the FBI suspended. However, WMR has learned that the STELLAR WIND program was routinely violated by NSA employees. Hayden, who came up with the program and sold it to then-CIA director George Tenet and Vice President Cheney, essentially canceled the provisions of U.S. Signals Intelligence Directive 18 (USSID) 18, which governed the application of the 1978 Foreign Intelligence Surveillance Act (FISA) at NSA. NSA was prohibited from eavesdropping on "U.S. persons" without a court order from the Foreign Intelligence Surveillance Court (FISC). Under Hayden's tenure, some NSA analysts were conducting e-mail surveillance of their current and former girl friends, prompting Hayden to cover his tracks by implementing a procedure that saw database security officers, including those with oversight over the PINWALE e-mail interception database, conducting after-the-fact audit trail analysis for internal abuse of the new NSA powers.
fordfamily1.jpeg


Ken Ford, Jr. [center], reunited with his father and mother after six years of imprisonment on trumped up neo-con political charges stemming from the search for phony Iraqi WMDs.

Ford's case, which involved pressure from the Bush-Cheney White House, has also met with indifference from the Obama White House and the Congressional Black Caucus. Groups like the Government Accountability Project (GAP), which assisted with Drake's defense, did not raise a finger in the Ford case.

During his incarceration at Lewisburg federal penitentiary in Pennsylvania, Ford received rank-and-file support from some current and former NSA employees. However, unlike Drake, not one high-level NSA official, current or retired, came to Ford's defense, even though his innocence was as provable as that of Drake. It is, indeed, a "tale of two cases," one with a relatively happy outcome, the other singed with racism.


/////////////

JANUARY 2012: January 18-19, 2012 -- More high-level fraud at NSA uncovered - Wayne Madsen Report

WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.

When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.

There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.

At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.

The following press release was issued on May 12, 2005:

"Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . .

OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."



Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.

Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZER contract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.

Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.

One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."

Among the spin-offs of TRAILBLAZER was the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.

Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.

Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."

/////////////

JANUARY 2012: January 18-19, 2012 -- FBI/NSA continue maintaining "mug shots" of journalists - Wayne Madsen Report

As WMR has reported in past articles, the National Security Agency (NSA) has maintained a series of "mug shots" of journalists it suspects have sources inside the NSA. Often, NSA personnel throught to have been speaking to journalists are called into NSA's "Q" security group and questioned on whether they have spoken to various journalists. Along with the names of the journalists, are photographs, described by NSA insiders, as "mug shots," likely culled from the Internet.

WMR previously reported on NSA's "rogue gallery" of journalists. From WMR, July 3, 2009: "Since the revelation of the NSA journalist monitoring database, which later added communications intercepts of journalist phone calls, emails, and faxes to its database, NSA Security has, according to information received by WMR, conducted physical surveillance of journalists it deems to be threats to the operations of the agency. The top targeted journalists, who make up a virtual 'rogues' gallery' at NSA Security, complete with photographs and other personal information, are: former Baltimore Sun and current Wall Street Journal reporter Siobhan Gorman, Washington Times reporter Bill Gertz, former Baltimore Sun and current New York Times reporter Scott Shane, Baltimore Sun reporter Phil McGowan, author James Bamford, New York Times reporters James Risen and Eric Lichtblau, and this editor, Wayne Madsen."

WMR has now learned from NSA sources that NSA and FBI counter-intelligence branches are maintaining "mug shots" of journalists. Two to three pages of journalists, along with their photographs, are known to be in the possession of FBI counter-intelligence agent Laura Pino and NSA counter-intelligence officer Ethan Andreas. Each page has two rows of photographs across with four photographs and names of journalists on each row -- a total of eight photographs and names per page. The number of journalists on the pages, therefore, could be between 16 and 24.

Three names are known to be on the pages maintained by the FBI and NSA, according to our sources: Siobhan Gorman, James Bamford, and this editor, Wayne Madsen. Gorman was believed to have been the journalist former NSA official Tom Drake was in contact with before he was criminally charges under various counts, including the the Espionage Act. Drake was a witness to high-level contract fraud and corruption within the NSA. WMR submitted a Freedom of Information Act request to NSA two years ago requesting information on the editor's photograph being used as a security warning device. After being granted expedited processing by NSA as news media for purposes of the FOIA request, NSA reversed course, denying us media status and then stonewalled responding to the request. [Related story today in WMR].


/////////////

JANUARY 2012: January 26-27, 2012 -- Obama administration assaults press freedom like no predecessor - Wayne Madsen Report

WMR has learned and has personally experienced the unprecedented assault by the Obama administration, aided and abetted by its intelligence and internal security infrastructure, on the First Amendment right of freedom of the press.

The Obama administration has indicted a total of six U.S. government employees with violating the arcane 1917 Espionage Act for allegedly communicating classified information to the press. The Obama administration, according to multi-agency U.S. government sources , has authorized the eavesdropping of journalists' e-mails, text messages, and phone calls to determine to whom they are in contact within the government, particularly in the Departments of State, Defense, Justice, the CIA, the U.S. Congress' intelligence oversight committees, and the National Security Agency (NSA). The NSA and FBI are also monitoring what websites are visited by government employees, including this one.

The six people charged under the Espionage Act with providing classified information to journalists (the "Obama Six") are:

  • John Kiriakou, former CIA, allegedly passed information on waterboarding torture tactics and the identity of a CIA torturer to someone identified by the government as "Journalist A." The chief government prosecutor is U.S. Attorney for Northern Illinois Patrick Fitzgerald, who WMR has identified as a cover-up prosecutor for the CIA ever since the days he suppressed critical intelligence in the trial of the "Blind Sheik," Omar Abdel Rahman, convicted for plotting the 1993 World Trade Center bombing and later, when he failed to bring Espionage Act charges against Dick Cheney chief of staff I. Lewis "Scooter" Libby in the Valerie Plame Wilson leak case. Fitzgerald also prosecuted former Illinois Governor Rod Blagojevich to protect the CIA's one-time agent, Barack Obama, Jr., from scandal arising from Obama's political and social activities in Chicago.
  • Jeffrey Sterling, former CIA, charged with providing The New York Times' James Risen with classified information on Iran's nuclear program.
  • Army Private First Class Bradley Manning, charged with providing over a quarter million State Department classified and unclassified cables from the SIPRnet communication system to WikiLeaks.
  • Thomas Drake, former NSA official, charged with providing classified information to journalists, including former Baltimore Sun reporter Siobhan Gorman. The charges against Drake were later reduced.
  • Stephen Kim, former State Department contractor, charged with leaking classified information about North Korea to Fox News' James Rosen.
  • Shamai Leibowitz, former FBI Hebrew translator, convicted of leaking classified FBI wiretaps to a blogger on Israeli intelligence activities in the United States directed at stirring up war fever against Iran. As yet, Leibowitz has been the only person convicted under the Espionage Act for leaking information to the media. The government fast-tracked the Leibowitz trial in order to supress coverage of Israel's massive intelligence operations in the United States.

WMR knows of six other ex-employees of NSA and the State Department who continue to face criminal probes by the Obama administration for leaking information to the press.

Government employees face constant monitoring of their government emails, as well as their personal e-mail accounts for any contact with the press. The FBI, NSA, and other agencies are also monitoring the web sites visited by government employees. At the State Department, lists of web sites visited by employees are maintained by the Diplomatic Security Service (DSS). DSS also maintains lists of charities to which State Department employees donate money.


WMR learned of one case where the U.S. Navy blocked access to the web for an employee who visited WayneMadsenReport.com from a government computer. The employee was required to explain to the system security administrator why WMR was visited and cautioned that WMR is on a "banned" list for Navy employees. At NSA, employees have been ordered not to disseminate any articles from WMR on the agency's internal e-mail system or they will face disciplinary action and possible loss of security access and their jobs.

There are also increasing reports that journalists' e-mails are being monitored or completely blocked by the U.S. government agencies and cooperating Internet Service Providers (ISPs). WMR has recently experienced such a denial-of-service by America On-Line (AOL).

The increased harassment of journalist sources by the Obama administration comes at the same time that Reporters Without Borders has dropped the United States on the World Press Freedom Index to 47 from 20 on the press freedom ranking list. At 47, the United States is tied with Romania and Argentina and ranks below the Union of Comoros in the Indian Ocean; increasingly fascist-oriented Hungary; Papua New Guinea, which has experienced a military coup; Mali; Tanzania; Botswana; Suriname; Niger; and Cape Verde. In 2002, during the second year of the Bush administration, the United States was ranked at 17.

///////////////

MARCH 2012: March 7-8, 2012 -- Justice Dept. prosecutor targeting whistle blowers and journalists has his own criminal history - Wayne Madsen Report

William Welch II was the chief of the Justice Department’s Public Integrity Section. While the title of his former office -- public integrity -- implies that Welch is dedicated to fighting corruption in the government, in President Obama's and Attorney General Eric Holder's Orwellian world of "Newspeak," Welch is the chief inquisitor of government whistle blowers and journalists who have communicated with them.

After committing ethical and legal violations in his investigation of the late Alaska Senator Ted Stevens, acts that resulted in criminal charges being dropped against Stevens and a criminal contempt of court investigation being opened against Welch, along with a Justice Department ethics probe, Welch continues to investigate national security whistle blowers. Welch has become a de facto special prosecutor, a modern day Juan de Torquemada, responsible for pursuing government "leakers" and journalists. Welch's targets have included National Security Agency fraud whistle blower Thomas Drake. He also has his sights set on former CIA officer Jeffrey Sterling and James Risen, the New York Times national security correspondent who Welch believes communicated with Sterling. Risen and the Times are fighting a subpoena for Risen to answer Welch's questions before a grand jury. Previously quashed by U.S. Judge for the U.S. District Court for Eastern Virginia Leonie Brinkema, the subpoena has been appealed by Welch and Holder to the U.S. Court of Appeals for the Fourth Circuit in Richmond, Virginia.

Welch and his team were also publicly berated by U.S. Judge Richard Bennett for faulty evidence against Drake who was being doggedly pursued by Welch for allegedly communicating with aBaltimore Sun reporter about billions of dollars in contract fraud committed at NSA, where Drake served in a senior executive position. Drake and veteran NSA colleagues found themselves being raided at gunpoint by FBI agents under Welch's supervision. Welch's case against Drake collapsed and in a plea agreement, all Welch could get from Drake's defense team was a guilty plea for a minor charge of misusing a government computer. Bennett rejected Welch's argument that Drake be given a $50,000 fine. Bennett said Welch put Drake through “four years of hell."

Bennett also criticized Welch for taking so long in bringing charges against Drake. Welch's case against Drake was conducted in anything but a speedy fashion. Welch's tactics included keeping potentially exculpatory evidence from Drake's defense team for months after the indictment was handed down. For over six months, Welch's team failed to produce evidence that one of the allegedly classified documents Drake was charged with improperly retaining was declassified two months after the indictment was issued.

Welch waited ten months to turn over evidence that another document that formed the basis of an Espionage Act charge against Drake had been - in the words of Drake's criminal defense team - “. . . published as 'unclassified' and had never been deemed 'classified' until after it was recovered from Mr. Drake's home.” The re-classification of previously de-classified documents is one of the tricks employed by the Holder Justice Department in pursuing leak investigations. Welch also informed Drake's criminal defense team that potentially exculpatory evidence relating to Drake's years-long cooperation with a Department of Defense Inspector General (DoD IG) investigation had somehow been "destroyed."

Welch has had a history with "destroyed" evidence. On December 1, 1996, Welch, who was then an assistant U.S. Attorney in Massachusetts and 33 years old, was stopped by the police on Route 10 in Southampton. Welch was arrested for driving under the influence of alcohol by a police officer after Welch failed four field sobriety tests. A special prosecutor was named in the case against Welch. According to the Union-News of Springfield, the prosecutor, Robert C. Bray, discovered that the police cruiser's video recorder failed to operate properly and the video tape could not be used as evidence against Welch. It also helped that Welch's father was Superior Court of Massachusetts judge William H. Welch. The senior Welch, who died in 2007, had been considered for four federal judgeships but was never nominated.

According to the Union-News, Southampton Police Lt. David Silvernail said that the video camera, which was purchased in November 1996 with federal grant money, 'went on when overhead cruiser lights were activated and was not supposed to go off until an officer shut it off.' Apparently, the camera had been shutting itself off after three minutes, but miraculously for Welch the problem was not discovered until Welch's arrest. 'The camera was sent back to its manufacturer to be fixed after the problem was found,' Silvernail
told the newspaper. The criminal case against Welch was dropped. The tape was later reused by Southampton police officers and the Welch arrest segment was erased.


williamwelch.jpeg


William Welch blows every case to which he is assigned. Perhaps he should blow into a plastic bag.


The story of William Welch is not an isolated one among Justice Department prosecutors. In Welch's case, someone who was so drunk he could not pass four sobriety tests on a Massachusetts highway is now entrusted by the Obama administration with the power to investigate those who challenge incompetence and wrongdoing in the U.S. intelligence community.

//////////////////////

END WAYNEMADSENREPORT.COM ITEMS >>>>

Whew.... All right. Now go read the Puzzle Palace and the Shadow Factory and everything you can find on Cryptome.org and PublicIntelligence.net about the NSA & Cryptography. GET [hash] CRACKIN!

Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys

Now with moar National Intellectual Property Rights Coordination Center ... Security unit targets ‘worst’ in world crime - John Lantigua, Palm Beach Post, Nov 26 2011

HSI is a new directorate within the Immigration and Customs Enforcement service. Formed in September, its agents are responsible for investigating large-scale international crime, such as narcotics or arms smuggling, human trafficking, money laundering and any form of terrorism. They also defend against the illegal appropriation and exporting of technology that is crucial to U.S. security.

"In other words we're looking for illegal activity that is crossing the border into the country or crossing the border out of the country," Pino says.

The HSI Special Response Team serves warrants and apprehends international criminals considered too dangerous for other law enforcement to go up against.

"A lot of these criminal organizations are very well-armed, very well-funded and some of them may come from military backgrounds in their home countries," Pino says.

While its name is new, the response team can be traced to the 1980s, before the Department of Homeland Security existed.

"It started here in Miami, in the old cocaine cowboy days," HSI Special Agent in Charge Mike Shea says. "This is the oldest and best tactical entry team in the country. High-risk entry is the core mission."

HSI consists of more than 10,000 employees, including 6,700 special agents, who are assigned to more than 200 U.S. cities and 47 countries .

A relatively monstrous SWAT style truck leads us to a whole new blob of police state developments, busy hands with little to do and a lot of hardware to do it. It's yet another plateau of mad new security bureaucracy, something in this case I was loosely aware of tectonic plates moving, but a little digging revealed quite a nasty new nucleus. Let's plow in and see what was beta-tested through the willingness of politicians to throw money at repressing immigrants. The results begin with big, black scary trucks. And the biggest intelligence group inside the Department of Homeland Security (DHS), and more. Surprise!

Via CopBlock.org's Facebook page:

Homeland Security SRT riot truck

What in the hell is the Special Response Team, why do they have eight of these things? etc. What turns up is an entirely new nasty agency gestating with Immigration & Customs Enforcement, from the burbling mass of confused federal police... a new team emerges. With exciting competitions and lurid ways of guarding the Super Bowl from Terrorist Attack - a National Special Security Event. The wikipedia page outlines the bizarre weave of this particular bureaucratic nucleus. And the List of special response units on the ol Wiki shows a spreading motif -- but this Homeland Security super-swat is perhaps the swattiest of all.

HSI SRT Training to jump off shiny new helicopters to save the Super Bowl in Miami - yayyyy!!
(this is why your schools/bridges are crumbling, America, the purposeless authoritarian spectacle at its finest ;)

This recently reorganized, months-old ICE Homeland Security Investigations (formerly known as ICE Office of Investigations) should really be on the radar of anyone because this year they are apparently 'filling in the gaps for the Secret Service' at NSSEs like G20, NATO summits and the Republican and Democratic national conventions. (unfortunately the Secret Service is now a part of DHS, not Treasury.) The Federal Protective Service, which likes to take photos around the Twin Cities (see my 2010 Fort Snelling Undercover Fail video, classic times) is now part of some weird directorate but briefly passed through ICE after being removed from the General Services Administration.

The HSI Special Response Teams are seemingly the top layer of a lot of things, from the war on terror / war on drugs motif, to the Super Bowl, to whatever the hell they are planning to do to immigrants on the I-5 near LA, which was where this pic was taken according to Copblock. ICE has a large number of staff on the Joint Terrorism Task Forces that do statistic-generating police state busywork around the country, and interestingly this HSI group is now officially becoming publicly distinguished from the rest of ICE -- and the theory of course is HSI would be spun out of ICE to become a freestanding 'directorate', a more modern and insane paramilitary FBI or whatever.

I wonder if the Secure Communities biometric collection program which was forced upon all counties in Minnesota, regardless of state & local wishes, would feed citizens' data into HSI.... just like the monstrous truck above, now moving more into the "non immigrant" category of freeform federal police activity. Perhaps they shall do some serious black ops against occupier groups angling to get to the conventions? Nevar!

Wikipedia:

The Special Agents of HSI use their broad legal authority to investigate and combat a range of issues that threaten the national security of the United Statessuch as strategic crimes, human rights violations, human smuggling, art theft,human trafficking, drug smuggling, arms trafficking and other types of smuggling(including weapons of mass destruction), immigration crimes, gang investigations; financial crimes including money laundering, bulk cash smuggling, financial fraud, and trade based money laundering; terrorism, computer crimes including the international trafficking of child pornography over the Internet, intellectual property rights crimes (trafficking of counterfeit trademark protected merchandise), cultural property crimes (theft and smuggling of antiquities and art), and import/export enforcement issues. HSI special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.[8] HSI special agents also provide security details for VIPs, witness protection, and support the U.S. Secret Service's mission during overtaxed times such as special-security events and protecting candidates running for U.S. president.

HSI was formerly known as the ICE Office of Investigations (OI). HSI Special Agents have legal authority to enforce the U.S. Immigration and Nationality Act (Title 8), U.S. Customs Laws (Title 19), along with Titles 5, 6, 12, 18 (Federal Criminal Code and Rules), 21 (drugs), 22, 26, 28, 31 (exclusive jurisdiction over Money and Finance investigations), 46, 49, and 50 (War and National Defense) statutes; giving them the broadest federal law enforcement jurisdiction of any agency. HSI has more than 8,500 Special Agents, making it the second largest federal law enforcement and criminal investigative agency within the United States government next to the FBI.

The change of names from ICE OI to HSI was announced in June 2010. Part of the reasoning behind the name change was to better describe the general activities of the agency, and to avoid the uninformed stigma that this agency only investigates immigration-related issues (ex. OI/HSI special agents duties were often mistaken by the public, other LE agencies and the media to mirror ERO agents/officers). HSI does have a public relations problem. Its the second largest investigatory agency, but the general public has never heard of it. ICE held it close to the belt and until recently, didn't publicly make the distinction as TSA does with Federal Air Marshals and CBP does with Border Patrol. In 2012, ICE and HSI have mandated a public distinction be made between both organizations. Most often news reports bury HSI's efforts as "immigrations agents" or as ICE efforts, and frequently Department of Justice and US Attorney's Office press releases of HSI-led investigations get spun up to sound like DOJ or FBI investigations that received assistance from local partners and ICE.

The name change to HSI better reflects that it is the U.S. Department of Homeland Security's primary investigative body, and as a result, its thought that someday it will be pulled out from under the ICE umbrella and stand independent under the DHS. An obscure fact is the original planned name before settling on ICE was the Bureau of Investigations and Criminal Enforcement, but the brothers at the FBI didn't approve and made their complaints heard.

Intelligence

Intelligence is a subcomponent of Homeland Security Investigations (HSI). The Office of Intelligence uses its Intelligence Research Specialists for the collection, analysis, and dissemination of strategic and tactical intelligence data for use by the operational elements of ICE and DHS. Consequently, the Office of Intelligence works closely with the Central Intelligence Agency, IRS the Federal Bureau of Investigation and U.S. Customs and Border Protection.

International Affairs

IA is a subcomponent of Homeland Security Investigations (HSI). The Office of International Affairs, with agents in over 60 locations around the world, represents DHS’ broadest footprint beyond US borders. ICE Attaché offices work with foreign counterparts to identify and combat transnational criminal organizations before they threaten the United States. IA also facilitates domestic HSI investigations.

Oh good, the CIA and FBI together at last... (and let's not forget the ICE/DHS network of detention facilities: Detention Facilities official front page- what is the HSI role for something like that applied to - somehow - non-immigrants?)

Official Site: http://www.ice.gov/about/offices/homeland-security-investigations/

The ICE Homeland Security Investigations (HSI) directorate is a critical asset in the ICE mission, responsible for investigating a wide range of domestic and international activities arising from the illegal movement of people and goods into, within and out of the United States.

HSI investigates immigration crime, human rights violations and human smuggling, smuggling of narcotics, weapons and other types of contraband, financial crimes, cybercrime and export enforcement issues. ICE special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.

In addition to ICE criminal investigations, HSI oversees the agency's international affairs operations and intelligence functions. HSI consists of more than 10,000 employees, consisting of 6,700 special agents, who are assigned to more than 200 cities throughout the U.S. and 47 countries around the world.

Report suspicious activity. Complete our tip form.....

HSI conducts criminal investigations against terrorist and other criminal organizations who threaten national security. HSI combats worldwide criminal enterprises who seek to exploit America's legitimate trade, travel and financial systems and enforces America's customs and immigration laws at and beyond our nation's borders.

HSI comprises six key divisions:

-Domestic Operations

-Intelligence

-International Affairs

-Investigative Programs

-Mission Support

-National Intellectual Property Rights (IPR) Coordination Center

The official page for the HSI Special Agent in Charge Field Offices of which there are 26:

Homeland Security Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the United States. The SAC offices are responsible for the administration and management of all investigative and enforcement activities within the geographic boundaries of the office. The SACs develop, coordinate, and implement enforcement strategies to ensure conformance with national policies and procedures and to support national intelligence programs. SACs coordinate law enforcement activities with the highest level of Federal, state, and local governments, as well as intelligence organizations and international law enforcement entities. In addition, SACs supervise all administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program is developed.

To efficiently manage their designated geographic regions, SAC offices maintain various subordinate field offices throughout their areas of responsibility, which support the enforcement mission. These subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge (ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing enforcement activities within the geographic boundaries of the office.

SAC Minneapolis/St. Paul

2901 Metro Drive, Suite 100

Bloomington, MN 55425

Main (952) 853-2940

Fax (612) 313-9045

If you search for 2901 Metro Drive Suite 100 that is the same office for other immigration, ICE & Homeland Security sub-offices.

These guys also have the completely insane National Intellectual Property Rights Coordination Center, a hearty reminder that the kafkaesque nature of what they call "intellectual property" combined with bureaucratic bloatware budget and an aggressively fascist private industry-friendly design, can truly combine to make one of the most awful, yet admittedly bold, authoritarian government logos of all time. Our Partner Agencies — National Intellectual Property Rights Coordination Center

intel-property-rights-center.png

It's almost enough to make you believe that swat teams could control all the memes they want, and even maybe the copy and paste commands too!

These are like a new branch of goons yet to be accounted for: HSI-Intel.

The ICE Homeland Security Investigations Intelligence Office (HSI-Intel) is a robust intelligence force that supports the enforcement needs of ICE’s executive leadership and operational field units.

Cutting edge technology, complex intelligence gathering tools, multifaceted investigative techniques and a high level of professionalism have enabled HSI-Intel to set the standard for federal law enforcement/intelligence agencies.

HSI-Intel also serves as home to the National Incident Response Unit (NIRU). This unit ensures that ICE is prepared to respond to national emergencies or critical events, including natural disasters, disease pandemics and terrorist attacks. NIRU plans for ICE’s continuity of operations before, during and after catastrophic incidents. During these incidents, NIRU serves as the agency’s central communications “nerve center,” coordinating the sharing of information between ICE components and other federal, state and local agencies. .....

HSI-Intel collects, analyzes and shares strategic and tactical data for use by DHS and ICE leadership and operational units. It also supports federal, state, local, tribal and international law enforcement partners.

HSI-Intel’s analysis and targeting information plays a vital role in supporting investigations related to illegal immigration, terrorism, weapons proliferation, war crimes, financial crimes, trade fraud, drug smuggling, human smuggling and trafficking, child sex tourism and other criminal activities.

I am sure they will figure out how all that drug money gets through the Federal Reserve Bank computer systems one of these days.

Organizationally parallel to ICE and the gestating HSI within it is the National Protection and Programs Directorate - Wikipedia. Has the Federal Protective Service now. A hodgepodge. Not the Center of the Action like HSI!

Oh true story... the KGB is now... wait for it... Federal Protective Service (Russia) - Wikipedia. Федеральная служба охраны, ФСО,

As far as I can tell, the following picture is not some satirical fan-boy art piece come to life. And those fonts.... christ! It looks like you can clearly see the 'investigations' part on there.

photo.jpeg

What about the Office of Investigations Special Response Team? Looks like we've found #8 and #10 so far. Both manilla and black color schemas.

Alright lets move this along & get these links out there.I found #9 for the Los Angeles set in Flickr user DFP2746 (plz forgive remixing a part of the images, you intellectual property fusion center types) Source: Homeland Security MRAP / DHS/ICE Special Response Team | Flickr - DFP2746

ice-investigation-srt-9.png

dhs-ice-srt.png

This is getting to be like Pokemon... my SRT trucks. Let me show you them...

First get the swag on eBay: specialresponseteam.JPG HOMELAND SECURITY ICE SRT SPECIAL RESPONSE PATCH | eBay

Press release from 2005 Katrina madness is nice: Department of Homeland Security Special Response Team Deploys to New Orleans Equipped with Zensah Tactical Gear

A– ICE Special Response Team (S.R.T.), an elite tactical unit attached to the Department of Homeland Security, deployed to New Orleans equipped with Zensah (http://www.zensah.com/tactical.html) tactical gear. By wearing Zensah™ moisture wicking tactical clothing, ICE special response team members receive a first line of defense against hazardous conditions found in the Gulf Coast areas affected by Hurricane Katrina.

ICE special response team members are in the affected areas to save lives, to protect lives, and to provide security to the recovery effort. ICE’s primary objectives are to support authorities in securing New Orleans and other affected communities and to provide security to federal rescue and recovery efforts.

....The ICE Special Response Team is an elite tactical team for the office of investigations under the Department of Homeland Security in Miami, Florida. Duties and responsibilities include search and arrests warrants, maritime interdiction, customs and immigration enforcement. For more information pleas visit http://www.ice.gov

Similar: Over 700 ICE Law Enforcement Personnel Were Sent to the Gulf Coast

MOAR GUNS: Tactical-Life.com » THE U.S. ICE MEN: The ICE Special Responders cometh bringing high-speed efficiency and low-drag force as required! "ICE also maintains five additional certified SRT units that are managed by ICE Detention and Operations." ... not sure if they mean 5 or 6 SRTs total. "the U.S. Customs Service evolved into a very progressive and highly successful interdiction and investigative agency. Due to the number of high-risk enforcement actions being executed on a regular basis, the U.S. Customs Service decided to establish a tactical unit called the WETT (Warrant Entry Tactical Team). In time, the U.S. Customs Service changed the name of its tactical team to the Special Response Team."

They're Hiring. Supervisory Border Patrol Agent (Special Response Team) - Homeland Security, Customs and Border Protection Job Posting

Buy training: Special Response Team Training 1: Overview & Objectives | Homeland Security Network USA newest backbone information source for First Responders

Gunfire a regular occurrence for ICE employees | California Watch. This has the following govt-produced pic, look how big that damn truck is. We can't see the apparent city-like (SAC?) insignia on the side or which number it has. It was at this Fort Benning GA training they blather about.

Another benefit of filling up society with needless paramilitary organizations is random accidental gunfire. Nice. "Roughly 80 ICE-involved shootings were unintentional and often involved agents dropping, cleaning or reaching for their guns, records show. The guns, in many cases, discharged in offices, government vehicles or during target practice. "

Special response teams prep for high risk situations at Ft. Benning - Nov 2011 press release ICE.gov

ice-special-training-ft-benning.png

City of Buffalo NY budget mentions a Major Award for it.

The confusing story of Homeland Security whistleblower Julia Davis ties into this I think. ie. see: Medal of Honor Held By The DHS PAGE 2

[ OKC Tangent. One other note -- In the Oklahoma City case I think Terry Nichols tried to tip off these Homeland Security types to a stash of explosives he'd obtained from FBI-friendly weapons dealer and Contra player Roger Moore. I don't have that info on hand here but it's around (notes on that ). It failed because some mafia guy snitched to the FBI -- the FBI has a pretty careful info cage around Nichols because of the informant-saturated nature of OKC he likes to talk about. This went down in like 2005. (Source of FBI Delay on Terry Nichols Explosives etc) So the idea is if the DOJ/FBI had a specific scheme such as OKC you could get around them through HSI. There's more to all of this, don't have the notes here, but there have been developments in recent weeks, search 'Jesse Trentadue'.. ]

201204120404.jpg

Check the ICE photos for some mad stuff. including saving the world from counterfeit NBA swag.

Conclusions? In any case it's good to know who the 'filler goons' are for NSSE campaigns of state-sponsored violence and insanity, of which 3.5 are scheduled for Chicago/Camp David, RNC & DNC this year, (along with the all important national sporting events), and ICE's new spawn HSI and the HSI SRT giant trucks will soon be a fixture at high profile gigs. There were weird Border Patrol Swat types at the 2009 G20 - See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed - BORTAC is that team. And who knows what they might do with good ol' FEMA.

What to expect: HSI's avid effort to become a domestic Swiss army knife of police activity between IRS, CIA and FBI; another layer on the Joint Terrorism Task Force cake and a free-wheeling institution in its own right, combined with a few new flashy PR initiatives (a high profile bust of a little fish or 2 perhaps, etc) in order to carry out the planned 'branding' of HSI.

Perhaps we can just shut it down and use the borrowed debt 'money' we save to be less permanently indebted to the banker police state... borrowed money to build out echelons of mass suppression is always a grim spectacle. Imagine what we could have done with the wasted resources instead. Now we know which new goonsquad will get the biometrics data from Secure Communities.

And of course, who better to 'manage' the war on drugs than the organizational descendant of the 'cocaine cowboys' and the 1980s task forces which helped pass through planeload after planeload of cocaine? That era's keywords, Barry Seal, aviation fronts like Vortex, Southern Air Transport, Evergreen, Polar Air Cross and Air America (some still thriving), operations like AMADEUS, PEGASUS and WATCHTOWER, the quasi-privatized intelligence operations authorized under proclamations like Executive Order 12333 to facilitate the drugs-for-weapons smuggling... those were a few critical points of that era.

What awaits us next? How will HSI deal with the vast scale of financial corruption? What will they do? Who are they going to point the weapons at, and where are the trucks going? Chicago, Charlotte & Tampa... but first, LA, of course. For the immigrants.

After London riots: Internets attention turns to Pentagon's CONPLAN 3502 - domestic military riot control & martial law style enforcement grabs attention all over Internets! Hope yet for NSSE & secret military planning awareness :)

Earlier :) Nov 20 2010: TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com

Moar Recently: Reacting to London riots - A Little Truth about America's situation Emerged! Marc Ambinder (marcambinder) on Twitter

Screen shot 2011-08-15 at 4.22.16 AM.png

A few lateral notes about the military's secret plans for civil unrest in America...

(a helicopter went overhead right as I typed that :-D -- pretty sure it was medical tho :)Screen shot 2011-08-15 at 4.24.41 AM.png

Here's an interesting twist in the last few days — quite an awesome one! In response to the London riots, the Atlantic's Marc Ambinder tweeted about how the US military would apply USNORTHCOM CONPLAN 3501 & 3502 to suppress any insurrection in the United States. It drew a flurry of tweets including Michelle Norris from NPR -- all curious about this CONPLAN situation.

Atlantic's John Hudson did a followup post expanding on the CONPLAN 3501 & 3502 military contingency plans The U.S. Military's Plan for London-Like Riots - Global - The Atlantic Wire. As always, it's nice to get indirectly referred to as a "conspiracy theorist" adjacent to the very documentation that ya dug up and posted to internets -- not sourced of course :-D

From there further writings appeared including Russia Today , the UK Daily Mail & a piece on Infowars by Kurt Nimmo. Memorable passage:)

More information can be found here. IndyMedia provided extrensive coverage, not that the New York Times or the Washington Post noticed. The establishment press was uniformly silent.

Indeed WaPo & NYT aren't too concerned but at least I got someone's attention. Also a nice writeup from FederalJack / TheIntelHub crew: Martial Law: Corporate Media Hints At Military Plans To Take On The American People During Domestic Civil Unrest

These posts in turn got re-posted all over the Internets, from NWO/martial law to prepper and other activist fora. Interesting threads or mere stubs, the word's getting around about this major element of the military's overall plan - as well as the basis for the 2012 NSSEs including G8/NATO in Chicago and the 2012 RNC & DNC.

This all spawned from the 2008 Republican National Convention & its shady NORTHCOM dimension. I wrote the story back in November laying out all the new details on the CONPLAN situation which I found on a US Army Corps of Engineers webserver. At the time it got picked up by a few forums, some excellent sites including cryptome.org, but it didn't really hit a wide audience. Perhaps that was good, since the US Army Corps left the files up all through December.

As for the disappearing files I noticed in all this since November. They only finally locked down that USACE file server after that ghastly spike in news about the Mass Die-Offs around January 2011 went down. People on forums suggested that the National Level Exercise 2011 New Madrid Seismic Zone earthquake test operation could be linked to the die-offs (as in a worsening fault line would give off toxic gas killing birds in Missouri &etc). Then the files disappeared from public access at those URLS....

Obviously the other major trend has been increasing unrest around the world as food prices spiral and the debt slavery/austerity budget agenda absorbs all political power. Entire nations' sovereign debt problems are now destabilizing, as the US has remained relatively quiet in most respects.

With the increasing systemic instability – and the political class' abject failure to regulate and de-escalate the enormous financial criminal systems and the assorted chaos in areas like real estate & the war on drugs, high-frequency trading, fraudulent securitization – the expectation of bigger backstops has been increasing... so it's important everyone finds out!

How much longer till the National Guard is called out?In such circumstances it's far better for everyone caught in the middle to have a general handle on the CONPLAN type background information. I really hoped that sharing the info would serve as an advance warning – a Paul Revere kind of message.

Now many many more people know about CONPLAN 3502. Makes me happy :) Just for kicks I am posting a huge list. Most of it's crossposts, but there are a few lively forum threads and really all of these sites appear to be "keeping tabs" in their own unique ways. Even if I would not agree with all of their content (even maniacs like the Klan noticed the story :-[ ), I hope all these people can respect I helped finally alert them to the keystone chunks of the most alarming layers in the scheme. Even people with detestable political views deserve to know about this kind of secret planning for military control!

That's some Real America going on right there.... that's how we roll :-D

************

Also briefly - something about CONPLAN 5029 for North Korea Collapse / Emergency US coordination with China leaked out??? CONPLAN 5029 cedes controt to U.S. and China in N.Korean emergency : North Korea : Home - from a collectively owned Korean newspaper?? Interesting peeps at the Hankyoreh .

Also interesting from 2006 - CONPLAN 8022 - Daily Times - Leading News Resource of Pakistan - ‘US had designs on Iran before Iraq invasion’

Running a quick google search for "CONPLAN" filtered to the last week or so (Aug 15 to Aug 8) turns up dozens of posts & crossposts.

America’s response to London riots — RT <- Russia Today!

With civil unrest spreading into the western world, the US is readying what to do should mass riots break out state-side.

What exactly is the official plan of action should the government need to step in and squash demonstrators? Send the military after minorities.

Marc Ambinder, a White House correspondent at The National Journal, writes that the armed forces have plans should widespread riots infiltrate America.

“If what happened in London ever happened in the US, the military has plans – CONPLAN 3501 and 3502 – to suppress the insurrection,” writes Ambinder. The instructions contained with the CONPLAN guidelines are believed to be initiatives that the US can enact during times of domestic disturbances.

According to GlobalSecurity.org, CONPLAN 3502 is what the military can put into play if state and local authorities are subjected to mass rioting. They say that the instructions in CONPLAN 3502 outline that "Tasks performed by military forces may include joint patrolling with law enforcement officers; securing key buildings, memorials, intersections and bridges; and acting as a quick reaction force."

LONDON RIOTS: How US would deal with UK riots - send in the Army | Mail Online <- the Daily Mail used the image from the presentation I posted in November :-D

How The U.S. will deal With U.K. Style Riots « slow33

American Preppers Network • View topic - "CONPLAN 3501 AND 3502"

Is CONPLAN 3501 and 3502 part of demand destruction? - Yahoo! Answers

How long before we see CONPLAN installed in the US? - Yahoo! Answers

WHAT THE HECK IS CONPLAN 3501 and 3502????" - SodaHead

U.S. Plan for London Like Riots - Use of Military - CONPLAN 2502 | WHAT REALLY HAPPENED

CONPLAN 3501 and 3502 -US Plans In Case of Mass Social Unrest/Riots - Anonymous has sort-of noticed oh good

Screen shot 2011-08-15 at 4.37.16 AM.png America’s response to London riots - Inteltoday RT repost

IS THE UNCONSTITUTIONALITY AND HORROR OF MARTIAL LAW COMING..NO WAY..HIAL MARY..! - TCUnation - commentary "SATAN IS A LIAR...!"

U.S. Plan for London Like Riots – Use of Military – CONPLAN 2502 | Dprogram.net

Sherrie Questioning All: U.S. Plan for London Like Riots - Use of Military - CONPLAN 2502

America’s response to London riots « Evil of indifference

Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | The Line in the Sand

A link to USARNORTH conplan 3501: martial law in case of "emergency" in order to so called " defend - 12160

Martial Law in America – Conplan 3502 Exposed – NORTHCOM FEMA RNC G20 Civil Disturbance | law- article directory

CONPLAN « Full Metal Cynic < - Angry monkey :)

New World Order – One world government - The U.S. Military’s Plan for London-Like Riots

Martial Law in America: No Longer Just a Possibility!( Videos)

U.S. Plan for London Like Riots - Use of Military - CONPLAN 2502 : Truth is Contagious

The U.S. Military’s Plan for London-Like Riots | War On You: Breaking Alternative News

The U.S. Military’s Plan for London-Like Riots | people for freedom

The U.S. Military’s Plan for London-Like Riots | Set You Free News

Big Education Ape: The U.S. Military's Plan for London-Like Riots - Global - The Atlantic Wire

The New World Order Update: Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots

Posted earlier in May with my video -- SO AWESOME. I AM Buddy, The BUDDHA From Mississippi ™: Martial Law in America - Conplan 3502 Exposed - NORTHCOM FEMA RNC G20 Civil Disturbance <- these guys had a truly head-turning piece of political art -- oh Man What a LOL :-D via here. Complete w mean Blackwater black helicopter

Martial Law in America - Conplan 3502 Exposed-1.jpg

Project Wake-Up Call: CONPLAN 3501/3502 < - zesty site :)

The U.S. Military’s Plan for London-Like Riots | Truth Is Scary <- JFK / crop circles / pyramids - notes on the multiverse

Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | PEOPLEUNLIKEUS

America’s response to London riots | Before It's News

The U.S. Military's Plan for London-Like Riots, page 1 - AboveTopSecret forum

The U.S. Military’s Plan for London-Like Riots |

The U.S. Military’s Plan for London-Like Riots « CRISISBOOM - mm silver

The U.S. Military's Plan for London-Like Riots | Pacific Rim Trading International - related to above? drupalized :)

PowerSwitch :: View topic - The U.S. Military's Plan for London-Like Riots UK peakers

Watrcher Meetup zodiac peeps? • View topic - The Mili tary's Plan for Ri ots

The U.S. Military’s Plan for London-Like Riots | RevolutionRadio.org

US Martial Law Plans | Before It's News

U.S. MARTIAL LAW PLANS IN THE WAKE OF U.K. RIOTS « EPHEMERIS 360° – IMPERIAL TWILIGHT

The U.S. Military's Plan for London-Like Riots (The Unhived Mind III) My favorite response presented by the official voice of TheUnhivedMind (the definitive forum for the deets vs weird Knights of Malta / Vatican intrigues!) [alt link]

Here you go folks they're telling you they're ready to bring in Martial Law in the U.S. very quickly once the riots are kicked off by The Worshipful Company of Fuellers and The Worshipful Company of Security Professionals over there through the Central Intelligence Agency, British Secret Intelligence Service and the Senior Executive Service. In the U.S. its not the police preparing the U.K. style riots, its the MILITARY, smell the coffee folks. All under The Pentagon controlled by the Fuellers.

This pertains to the interesting British Livery Company system of control for the City of London which goes back centuries before MI-5 and MI-6.

infinite unknown: The US Military’s Plan for London-Like Riots: "It almost appears they want us to revolt so they can impose martial law. The injustice I see everywhere makes it difficult for me to remember this is America. All our civil rights are gone. Habeas Corpus, a right of man for well over 800 years is gone."

How U.S. would deal with UK-style riots - qwstnevrythg.com

The U.S. Military’s Plan for London-Like Riots « The Daily Attack - what is this site??

The U.S. Military's Plan for London-Like Riots - USA Hitman Forum - auto linked: The Army's Bold Plan to Turn Soldiers Into Telepaths :-D

The U.S./Canadian Military's Plan for London-Like Riots - the Canadian NORTHCOM dimension catches notice!

NewAmericaNow: The U.S. Military's Plan for London-Like Riots

The U.S. Military's Plan for London-Like Riots | Con Games

Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | FirinneMedia.Com

The U.S. Military's Plan for London-Like Riots - Lunatic outpost chatty thread

U.S. Plan for London like Riots - Malaysia forum thoughtful LOLcat response heh

worship2_dees-jpg.jpegMartial Law: Corporate Media Hints At Military Plans To Take On The American People During Domestic Civil Unrest | Truth Frequency News - you have got to dig that clip art they threw in :-D the sp00ky eyes :-D

Martial Law: Corporate Media Hints At Military Plans - Survivalist Forum - they are interested! Quite interested!

The U.S. Military’s Plan for London-Like Riots | Old-Thinker News

ALIPAC Forums-viewtopic-The U.S. Military’s Plan for London-Like Riots

**Urgent** Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots - The Apricity Forum: Cultural & Ethnic European Preservation <- um that is a pretty sketchy sounding forum :(

The Kick Them All Out Project - Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots

operation Garden plot « The Burning Platform

America’s response to London riots | End the Lie - Independent News

The U.S. Military’s Plan for London-Like Riots - 12160

mOole - Развлекательный блого-новостной портал - the Russians are advised of the CONPLAN! They posted my image :)

Revealed: How U.S. would deal with UK-style riots... by sending the Army to areas with 'large numbers of minority groups' -- Puppet Masters -- Sott.net

MARTIAL LAW « EPHEMERIS 360° – IMPERIAL TWILIGHT

The Oil Age | Peak Oil | LATOC • The U.S. Military's Plan for London-Like Riots : Breaking News

US Military Plans for London-Like Riots - UNSKKKK Forum - Oh great the klan X-(

Hackinc2000.com » The U.S. Military’s Plan for London-Like Riots

readin & fightin • The U.S. Military's Plan for London-Like Riots

CriticalUnity.org | Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots

Action is my duty, Reward is not my concern - The U.S. Military's Plan for London-Like Riots (The Atlantic)

Media Reveals Military Martial Law Plans To Deal With American Civic Unrest - alexanderhiggins blog

Command Structure - crossposts emerge!

Lucianne.com News Forum - Thread - frickin Lucianne Goldberg's forum!

Will New Madrid Earthquake Happen Soon? - Topix

The American white people are more concerned about mistreating the Black once-slave of America than America is concerned with any nation on earth that is attacking her out-lying posts.(The U.S. Military’s Plan for London-Like Riots) – This weblog is for sounding DIVINE TRUTH in the ears of the dead! - I think this is a Nation of Islam blog.

Revealed: How U.S. would deal with UK-style riots… by sending the Army to areas with ‘large numbers of minority groups’ | - fonky site with crop circles & weirdNews

The U.S. Military’s Plan for London-Like Riots | Brian Brown's Official Website

RBN radio : Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | Republic Broadcasting Network

Operation Garden Plot, Insurrection and CONPLAN 3502 – Hayden’s Note on Katrina Attached - Truth is Treason:

It is my belief that Operation Garden Plot and Noble Eagle-like activation was witnessed in New Orleans during Hurricane Katrina. I was a police officer there at the time and it fulfilled the plan to a T. Joint patrols with civil authorities, checkpoints for major arteries in and out of the city, soldiers and Humvees stationed at major intersections and bridges, assistance in imposing an unlawful curfew against all citizens, gun confiscation, and even business checks. These “patrols” involved the use of thermal image cameras mounted on the Humvees, looking for warm bodies moving through the darkness and debris, riding with various SWAT teams and responding to gun fights, looting and even conducting traffic stops and simple drug enforcement.

Conplan 3502 Exposed - SECRET US PLANS FOR DOMESTIC MILITARY CRACKDOWN

Secret Plans for Domestic Military Crackdown Published by Mistake - earlier thread - really funny from threepercenters

http://www.noonehastodietomorrow.com/agenda/policestate/2973-2973

Finally one other thing Civilian Law Enforcement – Military Cooperation (CLEMCC) - the International Association of Chiefs of Police is a nasty little trade association run from and funded by the heart of the military industrial complex in Virginia - they appear constantly as a major Pusher in matters like this. My friend Kaye at Axxiom for Liberty is constantly bumping into IACP stuff.

******

also: http://www.benzinga.com/11/08/1853121/operation-garden-plot-insurrection...

weird mirror / mill? http://dailyme.com/story/2011081100004236/operation-garden-plot-insurrec...

also creepy stuff like this seems to be remixing it all together - a spewky tale of foreign troops and FEMA camp roundups. Military Insider Reveals Martial Law Plans ► Martial Law and FEMA Camps ► Part 1 - YouTube "because American soldiers are not going to take Americans to concentration camps".... hmmm. also *ALERT* FEMA NLE 2011 The Destruction of America Explained - YouTube etc.

Anyway we will leave it there for now -- as for Martial Law -- I warned you guys OK?!

August LinkDump! London Calling; Darcus Howe for Prime Minister! UK Anarchy as more EconomyFail sets in; United States of America is being EXTRACTED sez Ratigan/Howard Beale

205901_10150250928286179_693771178_7993251_1450282_n.jpg

Riots are about power, and they are about catharsis..... No one expected this. The so-called leaders who have taken three solid days to return from their foreign holidays to a country in flames did not anticipate this. The people running Britain had absolutely no clue how desperate things had become. They thought that after thirty years of soaring inequality, in the middle of a recession, they could take away the last little things that gave people hope, the benefits, the jobs, the possibility of higher education, the support structures, and nothing would happen. They were wrong. And now my city is burning, and it will continue to burn until we stop the blanket condemnations and blind conjecture and try to understand just what has brought viral civil unrest to Britain. Let me give you a hint: it ain’t Twitter.

-- Penny Red: Panic on the streets of London.

If nothing else, the paternalistic spin machine of social control which forms the kernel of the BBC is revealed perfectly here. Obviously Darcus Howe is perhaps the only person who deserves to be prime minister of the United Kingdom. If nothing else listening to this stunningly offensive & privileged BBC host disrespect an "old West Indian Negro" frames the whole damn scenario going on. Howe appeared earlier on a video about the 1981 anti-Thatcher/police riots.

251548_158541857556974_158533737557786_298295_1638281_n.jpg

The waves of riots sweeping England are probably subsiding for now, but the ground has definitely shifted. This is what happens when you keep making the rich richer and the poor poorer. No amount of riot police, surveillance, social control or even drugging can fully contain what happens (sorry Huxley). You can't stack sand vertically. It always crumbles chaotically to a certain maximum slope. Societies always destabilize beyond certain inequality levels, and "catharsis events" and moments of insurrection are major moments for the sand grains to topple.

Politics - or rather the political industry - has nothing to offer these young Britons. Isn't the "apolitical" "selfish" message of the riots a message that politics isn't even worth owning or capturing, that the Tory HQ is really unworthy of even bothering with?

And the many reactions tell as much as the riot, don't they? Being angry, or excited, or casting "condemnation" or whatever about this is like condemning the weather, it's like demanding the tide go back out.

It's unfortunate that brinkmanship in the form of riots and related stuff damages local communities; it's unfortunate the nominally "pro-business" Republicans destroyed America's AAA credit rating. Both events are pointless on the surface, sure, but they happen these days because no one is "delivering the goods" in our declining Western-dominated political/economic systems. (More links below, as unrest emits from the West's DoomBanking vortices, spreading East)

Recommended music: Bob Marley - Burnin and Lootin // Documentary style: Bob Marley Burnin And Looting Tonight (LOLsome spoof pics here looted from Looters vs Photoshop!)

Rioting-in-Brixton-002.jpg

The Tory classes and the Daily Mail types are JPMorgue furious and totally don't care that bankers do far more damage in an invisible fashion all the time. Taking offense from these petulant scum, hurrrrmph:

jp-morgan.jpg

1919 Bloody Friday: A classic moment in suppressing the people, back in Glascow. They Read the Riot Act here all right.

00 Glasgow.jpg

While the entire global economy, especially the tottering EU currency regime & assorted government bonds destabilize, everyone with a nice job is basically on vacation across Europe. Thus *all of them* have to decide to Fly Back Early from Tuscany -- or in London Tory Mayor Boris Johnson's (below) case, Canada.

article-2024644-0D5E40DE00000578-995_468x305.jpg

Initial London riots / UK riots - Google Maps - nifty crowdsourced map:

Screen shot 2011-08-10 at 2.56.24 AM.png

Screen shot 2011-08-10 at 2.54.05 AM.png

This probably indicates what it's all about....

uk-riot-mooning.jpg

Ah the Evening Standard... when they were young they could actually find jobs. Londoners: Rioting through the ages - Al Jazeera

xlarge_riot_redo.jpg

Some high-grade Classic Tut-Tuttery & Off With Their Heads below...

Bread-and-Circuses.jpg

Meanwhile in America the steady collapse of living standards has brought food stamp distribution to an all time high -- the essential "bread" part of the "bread & circuses" social control system.

LiquorStoreEBT.jpg

/////////////////////////

London Calling Link Dump! I don't really agree or disagree with any of these links. I'll put in the decidedly racist DailyMail rhetoric and the insurrectionary anarchists, you can sort it out. Consider them shards of a confused clusterfail. My friend put it best that the City of London wasn't going to get any trouble... Sounds true.

Probably my favorite piece: Penny Red: Panic on the streets of London:

Already, the internet is teeming with racist vitriol and wild speculation. The truth is that very few people know why this is happening. They don’t know, because they were not watching these communities. Nobody has been watching Tottenham since the television cameras drifted away after the Broadwater Farm riots of 1985. Most of the people who will be writing, speaking and pontificating about the disorder this weekend have absolutely no idea what it is like to grow up in a community where there are no jobs, no space to live or move, and the police are on the streets stopping-and-searching you as you come home from school. The people who do will be waking up this week in the sure and certain knowledge that after decades of being ignored and marginalised and harassed by the police, after months of seeing any conceivable hope of a better future confiscated, they are finally on the news. In one NBC report, a young man in Tottenham was asked if rioting really achieved anything:

"Yes," said the young man. "You wouldn't be talking to me now if we didn't riot, would you?"

"Two months ago we marched to Scotland Yard, more than 2,000 of us, all blacks, and it was peaceful and calm and you know what? Not a word in the press. Last night a bit of rioting and looting and look around you."

Eavesdropping from among the onlookers, I looked around. A dozen TV crews and newspaper reporters interviewing the young men everywhere ‘’’

VIDEOS:290765_10150741959800037_787175036_20189783_5616914_o.jpg Hell of a scene: London Riots - Police Overrun in Woolwich (8th Aug 2011)‬‏ - YouTube - LRAD at the end after police run away.

Tottenham riots - the truth‬‏ - YouTube // Car explodes in Thamesmead. ‏ - YouTube < wow // London Street Battles: Video of mad clashes, riots out of control - YouTube // London Ruins: Aerial video of riot 'warzone' cleanup, homes destroyed - YouTube

Roundup via Associated Press // Good pix: London riots 2011: 'BlackBerry Messenger hasn't been shut down, unbelievable!' | Mail

368733394.jpg

pbump.net | Sign at Subway shop in Manchester--- due to imminent collapse of society - Subway is CLOSING!

Socialism and/or barbarism: An open letter to those who condemn looting (Part one)

Sales Of Police Batons On Amazon.uk Are Up Over 41,000% As Riots Continue

Total BankerFail collapse going on continent-wide: Bill Black: European Central Bank Throws "Peripheral" Countries to the Wolves - YouTube

The Maddow Blog - Anarchy in the U.K. Moar anarchyNews at Freedom Press.

The wheelchair-bound guy who got beat up by UK cops some months ago is furious & pushing for moar resistance: Jody McIntyre's Bars For Change - Episode 1 - WHO POLICES THE POLICE. His twitter lol and analysis: From Brixton to Tottenham, inequality lies at the heart of the riots -- New Internationalist

Infosheet security culture: Don't Panic - Don't Talk - UK Indymedia!

London Riots: Shop-owners defend their businesses in east London - guardian.co.uk

‪London Riot Video 2011: City Crumbles Before Residents' Eyes; Violence Spreads Across U.K.‬‏ - YouTube

Why here, why now? « LRB blog - Tariq Ali

Riots against Repression sweep UK « The Freetot-riot3.jpg & related Ian Bone | Anarchist in the UK

London Riots: Government Prepares Troops - Martial Law Imminent. - 9th August 2011 - YouTube

There is a context to London's riots that can't be ignored | Nina Power | Comment is free | guardian.co.uk

London riots: Guerrilla warfare erupts as no one knows where mob will strike next - Telegraph

Nice historical backdrop with Darcus: Black Youth Rise Up: Summer of 1981‬‏ - YouTube

AlexJones blob: BlackBerry Website Hacked as Company Pledges to Help Cops Find Brit Rioters // Rioters and Vigilantes Divide Along Racial Lines // The Rioting Underclass: Product of a Diseased Culture // Police to Use Plastic Bullets on Rampaging Youth in Britain // UK Riots: Government Prepares Troops, Martial Law - Infowars //Plundering Arsonists Looters Are Criminals Not Revolutionaries // Specialreport.

185250_158570707554089_158533737557786_298457_2178923_n.jpgBBC News - UK riots: Trouble erupts in English cities // BBC News - Live: UK riots //

protectukprotesters | Protect the UK Protesters // Racial and Class Revolts (“riots”) in Britain :: racismreview.com // A fitwatcher’s view of the riots « Fitwatch

DNow! Over 1,000 Arrested in UK as Anger Over Inequality, Racism Boils Over Into "Insurrection" (Video) | Truthout

Compass Special Statement: Anatomy of a riot | Compass // Income inequalities within London boroughs | Poverty Indicators | London's Poverty Report

London Rioting Prompts Fears Over Soccer Matches and the Olympics - NYTimes.com

Quasi-related: V For Vendetta Domino Scene‬‏ - YouTube

Drugs, gangs and police corruption in Stoke Newington: An Interview with an ex gang-member on Stokey's underworld

Britain’s Riots: A Society In Denial Of The Burning Issues - Globalresearch.CA // London Riots: A Symptom of the ‘Burning’ & ‘Looting’ of UK Public Services | The Dissenter

Manchester riots: '2,000' thugs rampage through city centre - mirror.co.uk // Gloucester suffers night of violence as rioting spreads - Telegraph // Riots: the underclass lashes out - Telegraph // London and UK riots day three aftermath: live coverage | UK news | guardian.co.uk // Riots Spread in London and Beyond - NYTimes.com

Ruppert getting around on RT: RT Video Interview with Michael C. Ruppert : Violence spreads beyond London - he makes reference to GARDEN PLOT and a sense of authoritarian beta testing going on here.... this is wise to consider when we look at G8/G20 type madnesses. (verging on Conspiracybits, moar below!)

281236_158603460884147_158533737557786_298480_5368173_n.jpgFinest Elitist Tory TutTut: UK riots 2011: Liberal dogma has spawned a generation of brutalised youths | Mail: "Rampage: We are told that youths roaming the streets are doing so because they are angry at unemployment, but a quick look at an apprenticeship website yields 2,228 vacancies in London" etc. None of these guys recognize the much more vast damage spawned by banks etc: Fight back David Cameron, most Britons are on your side // The long retreat of order // British society could learn a lot from the Turks of Dalston

Liberal confusions: The year we realised our democratically elected leaders can no longer protect us // These riots show the cost of consumption // Our streets are aflame. Now black Britain will be allowed its say

INDIA: Clashes erupt in Indian capital during anti-graft protest

CHILE: Student protests turn violent in Chile - Al Jazeera

Earlier: government-theft.jpg a different kind of looting: British government begins stealing its peoples’ bank deposits ahead of the global financial collapse

Conspiracybits: I don't particularly like the tone of aangirfan (in fact no small bits are rather offensive) but it's got some interesting links. There's always a weird conspiracy in the UK but I don't really think these are bankerPatsies set loose. Another theory: CanSpeccy: English Immigrant Underclass Riots: Who Benefits -- dissent suppression --

Points out MI5/MI6 drugOps etc: Want to Cover Up an Extra-Judicial Murder? Start a Riot! | Philip Brennan

On a different tack is Wayne Madsen with a kind-of typical explanation: August 10-11, 2011 -- English riots said to be "well-coordinated" - Wayne Madsen Report

WMR's British intelligence sources report that the rioting sweeping London and other British cities, including Liverpool, Birmingham, and Manchester appears to be "well-coordinated." WMR has learned that some rioters with sophisticated radio communications systems are very organised, in some cases as in Clapham, south London, and in Birmingham, there is no police presence. Rioters are resorting to the same use of social networking services, such as Facebook and Twitter, that was seen in George Soros-financed "themed revolutions" in eastern Europe, North Africa, and the Middle East.

The rioting broke out when police shot and killed an unarmed black youth named Mark Duggan. Soon, riots broke out in Tottenham, Edmonton, Brixton, and other London neighborhoods. Intelligence on such rioting was not passed to senior British government officials, many of whom were on holiday for the month of August. The word from a senior British intelligence source is "Her Majesty's Government has been completely blind-sided."281579_218622024856045_100001247474659_695364_4736392_n.jpg

Police are being accused of withholding intelligence on the rioting now spreading throughout England and of allowing the rioters to get out of control by standing down. WMR has been informed that NSA's British counterpart, the Government Communications Headquarters (GCHQ) in Cheltenham, has been ordered to conduct widespread surveillance of riot leaders and police. British intelligence wants to know if there has been any collusion between the rioters and the police in an effort to stage a retaliatory operation for the exposure of police involvement in the wiretapping operations of Rupert Murdoch's News International papers in London, including the News of the World and The Sun.

London's top police officials resigned after it was determined that police were sharing wiretap and other personal data with Murdoch's reporters and editors.

Some senior British government officials have even suggested the rioting spreading through London may be part of a coup attempt.

In addition, the last four days has seen one of the worst financial meltdowns on the London financial markets.

KEY? On a more down-to-earth level of analysis please consider from John Robb's Global Guerrillas blog:

London riots. Lots of the activity going on in London is based on open source warfare precepts. Much more going on here than a simple riot or looting. It's a learning lab. Communicating via BlackBerry instant-message technology that the police have struggled to monitor, as well as by social networking sites like Facebook and Twitter, they repeatedly signaled fresh target areas to those caught up in the mayhem. They coupled their grasp of digital technology with the ability to race through London’s clogged traffic on bicycles and mopeds, creating what amounted to flying squads that switched from one scene to another in the London districts of Hackney, Lewisham, Clapham, Peckham, Croydon, Woolwich and Enfield, among others — and even, late on Monday night, at least minor outbreaks in the mainly upscale neighborhood of Notting Hill and parts of Camden.

This dynamic is similar to that seen up close at 2009 G20 in Pittsburgh - quick moving squads vs much slower, truck & gas burdened police squads suffering intelligence failures. Major OODA loop dynamics in play that need to be studied carefully by all!

/////////////////////

Meanwhile in America: Feds coverup for police violence: U.S. asks judge to keep Jordan Miles grand jury proceedings secret - Pittsburgh Tribune-Review

Democracy Died First in Wisconsin – Long Live the Oligarchs | Common Dreams - Alright Hartmann I'll give you this one.

Ratigan: "I have been coming on TV for 3 years doing this and the fact of the matter is that there is a refusal on both the Republican and Democratic side of the aisle to acknowledge the mathematical problem, which is that the United States of America is being EXTRACTED - it's being extracted through banking, it's being extracted through trade, and it's being extracted through taxation and there's not a single politician that is willing to step forward and deal with this."

Total Howard Beale LOL: Dylan Ratigan rages against ‘bought’ Congress on MSNBC. ALSO Which Way Wednesday - Let's Try Dylan's Way! | ZeroHedge

I swear not a joke? To Infini-Tea And Beyond: 'Tea Party In Space' Aims To Stop NASA's 'Socialism' | TPM

The Bin Laden Seal Team Six thing looking sketchy, this Army guy claims to have the answers: Colonel6's Blog

EducationForYootsFail: U.S. charges for-profit college with huge fraud - MSNBC

281413_10150236752687294_641607293_7111863_286229_n.jpgFedFail: RTR-Post S&P Downgrade, Chicagoans Take to Streets, Demand Arrest of Bankers. RELATED: US Government Monitoring Facebook for Federal Reserve Protests‬‏.

NATOFAIL: "Blanket of Darkness" over Tripoli. NATO Targets Electricity Generation. Launches Psychological Attacks

lol win: best of craigslist: Manhood Camping

Photography != crime: Stand Your Ground‬‏ - YouTube

Apparently "Hackers Wanted" enticed poor Manning? Clue here: Manning-Lamo Chat Logs Revealed | Wired.com. See Chirpstory - Adrian Lamo, Bradley Manning & the 'Hackers Wanted' Documentary

Today's news summary: Sibel Edmonds' Boiling Frogs Post // also the 9-11 Moussaoui coverup

Bee fail: Death of the Bees. Genetically Modified Crops and the Decline of Bee Colonies in North America

Trust neither? Ron Paul: I Trust the Markets Much More than the Rating Agencies - 08/09/11 ‏ - YouTube

Can you hear neo-Wobblies now? Verizon reports cases of sabotage, warns of delays in customer service - The Boston Globe

Wisconsin, a near-victory for Dems. Next time: general strike! What's next for Wisconsin after the recall | Countdown // Insurgent Notes | More on Madison

COOP GPL:205973_153553288057106_100002073081857_308900_3733271_n.jpg Here's a good one: IS4C is an open source co-op point of sale app developed for the Wedge originally - here's the intro.

LOLFail: Hacker Plot to 'Kill Facebook' Is All a Terrible Misunderstanding // RE: OpFaceBook - Pastebin.com (post) (video) etc.

Police Can't Ask Your Mobile Phone Where You Are In Order To Arrest You - Forbes

Pharmafail: the mysterious microscope-looking thing in the new Hongpong banner is a Rife telescope which can spot viruses: Suppressed Health Technology. Use frequencies to cook out cancer cells? Impossible!! BAN IT!

SecurityFail: DHS Funds Real-time Spy Cams on SF Buses - Infowars // Beachball-like observation UAV developed | Homeland Security News Wire. Only $1400 parts so DIY potential here. // Cyber Military Blather Strategy Paper (PDF). // NYPD's Social Media Unit Will Track Criminals On Facebook, Twitter // Raising Up an Orwellian Generation | AxXiom for Liberty // Timeline of FDA raids on raw milk farmers, dietary supplement makers and natural medicine practitioners // DHS & FBI Merge Data Creating Database of Secret Watch Lists

DEAfail: The DEA's Terrorist Hunters: Overreaching Their Authority? - TIME // US Government Informant Helped Sinaloa Narcos Stay Out of Jail | the narcosphere / Thai court revises Bout"s extradition: Voice of Russia

Bachmann madness Avidorian style: Minneapolis Comics

Delicious: Fluoride Can Damage Your Bones // Foodfail? "Green" Eggs and Ham? The Myth of Sustainable Meat and the Danger of the Local. Oakland Contemplates a “Bill of Rights” for Urban Farmers | Harvest 2011 // Twin Cities community gardens: A study in variety | Twin Cities Daily Planet

FREAK! Glymes: The Next Big Group Of Chemicals That Everyone Is Going To Freak Out About | Fast Company

Little inspirations: Hullabaloo

//////////

Spat among whistleblowers: A rather sketchy digression between Robert MacLean (formerly a TSA air marshal) and Julia Davis (formerly a Homeland Security apparatchik). Davis wrote a really negative piece on MacLean and he's ticked. I don't think it's appropriate for Davis to put this kind of stuff out there without bothering to do an interview with MacLean. Both sides have points to make but I would not like to see Davis on Whistleblower patrol. POGO supports Robert MacLean: Homeland Security Whistleblower.

Overall I think Davis needs to loosen up & MacLean needs to chill. Problem?

Related-ish: Fmr. Classification Czar: Sanction Those Who Improperly Classify Information | The Dissenter

//////////

International affairs:284880_10150261387016681_696031680_7943846_6574141_n.jpg Syria ‘heading to point of no return’ - Arab News

Man even North Korea's freaking out: South Korea returns fire on North in disputed waters | The Guardian

OpenLeaks Announces A Test Launch, Invites 3,000 Hackers To Attack It - Forbes (lol site is down)

Bigger Solar Flares Could Cause Year-Long Blackouts, Nuclear Crisis - IBT

Interesting stuff on blog: Alternatív oktatás

//////////

More on EconomicFail: Central Bankers Worldwide Race to Save Growth in 72 Hours of Policymaking | COLLAPSENET (FULL)

The Price Of A Big Mac Is Now $17.19 In Zurich // Must Read: UBS' Andy Lees On Why The US Economy Is, All Else Equal, Doomed // Russ Certo: "The Fed Just Basically Announced Recession" // Bondi Whistleblower | INTERNAL RELEASE: From Andrew Bennett Spark, Assistant Attorney General, Tampa Economic Crimes // On Perpetual ZIRP // Faber on Fed Decision, Treasury Market, Gold //

Interventions now totalfail: this is a VERY important idear: Latest SNB Intervention Half Life - One Hour 15 Minutes | ZeroHedgeSNB 8.10.jpg

The trend is unmissable - every single intervention (that of the Fed included) has progressively little impact as these desperate measures, traditionally reserved for life or death situations, and which are supposed to bring the element of surprise with them, are now not only not surprising, but demanded every single day, and if absent, cause asset sell offs. Pretty soon the battlefield will be central planners vs HFTs, with the money printers issuing money at first on a monthly, then weekly, daily, hourly, then lastly millisecond-ly, and ultimately constant basis, at which point it will truly be too late to buy gold.

Pardon Me, Madame, Do You Have A Moment For Fancy Man Rights? | The Onion

Guest Post: Macro Commentary - The Cost of Fiat Money and Gold | ZeroHedge

Pessimism Hits Record: 73% Of Americans, All Time High, Think US Is Headed In Wrong Direction | ZeroHedge

FractalWeirds: Fractal TBT.jpg Fractal Algo Strikes Again, This Time Impacts Popular Bond Bear ETF TBT | ZeroHedge

Special Notice: Obama To Vacation On Martha's Vineyard Following A Job Well Done | ZeroHedge

Great News: Just 10% More Quote Churn And The Broken Market "Resets" | ZeroHedge

Quote Stuffing Surges As If On Demand As Market Touches Intraday Lows | ZeroHedge

DOW(N): 521 | ZeroHedge

Weekly Outflows From Domestic Equity Mutual Funds Surge To $13 Billion, Nearly Surpass Post-Flash Crash Record // Moynihan Says His Entire Net Worth Is In BAC Stock | ZeroHedge

2008 Redux and naturally Hacker Triggers Halt on Hong Kong Exchange - Bloomberg // LET IT DIE: Rushkoff on the economy | ARTHUR MAGAZINE //

New York Times: What the Hell is Obama Doing? | AlterNet

YES Psychedelic Millionaires with INFINITY CASH! MOAR!

MEDIAROOTS – industrial collapse notes

////////////////////////

Here's what the Banksters think every time they go to bed...

"We always get away with it, at the City of London, the Federal Reserve, the ECB & Beyond. Hey Rabble: Problem?"

283185_153489954730106_100002073081857_308799_6585824_n.jpg

Michigan's power to zap townships - the end of Real Property? The Emergency Financial Manager law and the Northwest Ordinance of 1787

I found this writeup on the new Midwest 'financial martial law' system interesting enough to share. The crazy rationale for the horrible law in Michigan is that dissolved townships won't be burdened with debt? But what of the system of townships and property created in the Northwest Ordinance? What is the Northwest Ordinance? I though this argument by one Amy Washburn was worth sharing...The Michigan emergency financial manager (EFM) law and real property - what we're not yet being told by the media

See also YouTube - Rachel Maddow: Michigan's Dystopian (Corporate Republican) Future And Naomi Klein's Shock Doctrine and more recently YouTube - Maddow on Emergency Manager Takeover of Benton Harbor, Michigan. The emergency financial manager law is a huge scam to accelerate the typical eminent domain for rich people schemes - in their pilot case, stealing Benton Harbor's big park and putting stupid rich people homes and a golf course there. Because it's an emergency!!

*********

Friday Evening: It's time to expose teh secret ops live on radio! Friday November 19th on AxXiom for Liberty LIVE-CONPLAN Secret Ops exposed!

 

Hey everyone, the big story is finally getting released. This should clarify a lot of confusing dimensions to what's really been going on. And a huge relief to deal with - after months of work!

It's a messy one - but really important. Tune into RuleOfLawRadio.com tonite, Fri Nov 19th  -- if I have ever done ya a favor - or even written something which amused you - please return it by helping to spread this story to anyone, anyone affected by the Gulf disaster, concerns about martial law, natural disasters, FEMA, Northcom, Homeland Security, the G20, RNC, DNC2012 (!) etc. More-or-less I tripped over the core of the damn thing so here's what the real deal is.

The story will be here on HongPong.com, TC.Indymedia.org, and ExceptionMag.com. Or tune into AM stations around the Heartland, where they ought to hear about it....

******

Friday November 19th on AxXiom for Liberty LIVE-CONPLAN Secret Ops exposed!

One of the best independent researchers I know will be unveiling for the first time the results of some very interesting research.

Dan Feidt is the go to guy when it comes to Fusion CentersThe Military Industrial Complex, anything intel, info ops or top secret government documents.   He is also a boots on the ground activist and citizen reporter  and can tell you just how to deal with surly legislators, corrupt officials and the government spies that think that every gathering of citizens is an angry mob on the verge of an uprising.

He has been working on this story since April and has been driving me crazy with hints of what it is all about.  I have just now gotten a sneak peek of the information and will just say that it was worth the wait!

You won’t want to miss this show!

In brief, Dan has found “new military documents really maps out the latest revisions of how the system works when the 'military hits American streets'. It's about FEMA, Northcom, how they plan out domestic emergencies and crackdowns like the RNC/G20 - hard proof of new revisions to secret military plans they've run since the '68 conventions & Kent State.”

On Friday Nov 19th Dan will post the links for these eye-opening documents that we ask you to hit them quick, download and share because once this story is out those docs will be gone!  

 

The evidence will be posted shortly before the show at 5:30 pm at these locations.

 www.tc.indymedia.org

www.hongpong.com

 www.exceptionmag.com

"A foolish faith in authority is the worst enemy of truth." 
-- Albert Einstein, letter to a friend, 1901

AxXiom for Liberty http://axiomamuse.wordpress.com/

RadioFreeOklahoma.wordpress.com
www.RadioFreeOklahoma.net Wednesdays 8-10 CT

Syndicate content