Data Mining

NSA Boundless Informant explicated - for moar efficient flat databases of all yr phone records

Just had to crosspost this relatively down-to-earth explanation of how all the cell phone data is hoarded in the NSA mass data mining system. What this lacks in documentation it makes up for with relative plausibility & general lack of fancifulness.
SOURCE: Cryptome.org : http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm

25 November 2013

NSA BOUNDLESS INFORMANT Explicated


Date: Mon, 25 Nov 2013 15:37:33 -0800 (PST)
From: xxxxx[at]efn.org
To: cryptome[at]earthlink.net
Subject: A very interesting forum post on electrospaces

This was written from a person who purports to actually use the Boundless Informant tool. The email address is fake of course, but it sounds both knowledgeable and credible.

If the source is genuine, it provides considerable insight into the use and capabilities of the tool. It seems to do a lot more than we've seen so far, including the ability to see individual call detail records.

It also gives us clues to how mobile interception is accomplished.

http://electrospaces.blogspot.com/2013/11/screenshots-from-boundlessinformant-
can.html

http://www.blogger.com/comment.g?blogID=4559002410879446409&postID=
2273467319728111778&isPopup=true

---------------------------

Anonymous jbond@MI5.mil.gov.uk said...

I'm seeing a great deal of confusion out there about NSA databases and how reports are generated from their architecture. Here is how it works:

Let's begin with rows and columns making up a matrix, variously called a table, array, grid, flatfile database, or spreadsheet. In the database world, rows are called records, columns are called fields, and the individual boxes specified by row and column coordinates -- which hold the actual data -- are called cells.

For cell phone metadata, each call generates one record. NSA currently collects 13 fields for that call, such as To, From, IMEI, IMSI, Time, Location, CountryOrigin, Packet etc etc, primarily from small Boeing DRTBOXs placed on or near cell towers.

Because metadata from a single call can be intercepted multiple times along its path, generating duplicative records, NSA runs an ingest filtering tool to reduce redundancy, which is possible but not trivial because metadata acquisitions may not be entirely identical (eg timing). After this refinement, one call = one metadata record = one row x 13 columns in the BOUNDLESS INFORMANT's matrix.

Cell phone metadata is structured, unlike content (he said she said). However, as collected from various provider SIGADs, it is not cleanly or consistently structured -- see the messy example at wikipedia IMSI. So another refinement is needed: NSA programmers write many small extractors to get the metadata out of its various native protocols into the uniformly formatted taut database fields that it wants.

After all this, for a hundred calls, a metadata database such as BOUNDLESS INFORMANT consists of 100 records and 13 fields so 100 x 13 = 1300 cells. A counting field (all 1's) and consecutive serial numbers (indexing field) for each record may be added to facilitate report generation and linkage to other databases, see below.

-1- The first point of confusion is between BOUNDLESS INFORMANT as a flatfile database (we've never seen a single row, column or cell of it) and the one-page summary reports that can be generated using BOUNDLESS INFORMANT as the driving database (eg, the Norway slide).

These BOUNDLESS INFORMANT reports give the number of records (rows) in the table after various filters have been applied (eg country, 1EF = one end foreign, specified month, DNR type, intercept technology used, legal authority cited FISA vs FAA vs EO 12333).

BOUNDLESS INFORMANT does NOT report the number of cells nor gigabytes of storage taken up. It easily could, but it doesn't. Instead, it reports the main object of interest: the number of calls, after some filtering scheme has been applied.

-2- The second point of confusion arises over database viewing options. Myself, I like scrolling down row after row, page after page, plain black text in 8 pt courier font, lots of records per screen, thin lines separating cells, no html tables. A lot of people don't.

So a cottage industry has evolved around generating pretty monitor displays, web pages, and ppts from databases; these typically display one record per screen. All database views are equivalent: given a presentation, you can recover the database; given the database, you can make the pretty user interface.

Views are dressed up injecting the data fields into a fixed but fancy template (eg dept of motor vehicles putting your picture field into an antique wood frame and your name field into drop-shadow text). Nothing but a warmed-over version of spewing out form letters by mail-merging an address database into a letter template.

We've not seen *any* view of BOUNDLESS INFORMANT records to date, only summary reports it has generated. You cannot recover the underlying database from a few summary reports, only information about the number of records and a few of the 13 fields.

November 25, 2013 at 2:34 PM

Anonymous jbond@MI5.mil.gov.uk said...

-3- The third point of confusion: a given database like BOUNDLESS INFORMANT is capable of self-generating many summary reports about itself. Summary reports can have views too -- injections into templates. We've seen 3 of them for BOUNDLESS INFORMANT, Aggregate, DNI and DNR.

Databases can be sorted, according to the values in any column. For example, if NSA sorted by IMSI, that would pull together all the call records made from a particular cell phone with that id. Using the counting field, allowing the activity of each phone to be tallied. Or they could sort to pull up the least active phones-- to identify the user who tosses her 'burner' phones in the trash after one use.

Databases can be restricted. If NSA wanted to count the number of distinct cell phone calls during a given month that originated in Norway and terminated abroad (1EF one end foreign), it can restrict the records to the relevant time and location fields, masking out the others. They could compress each cell phone to a single line and count rows to get summary data on the number of phones doing 1EF. That summary data could be injected into a template for a BOUNDLESS INFORMANT slide.

Databases can be queried (tasked) to pull out only those records satisfying some string of selector logic. For example, you could submit a FOIA request to NSA in the form of a query that consisted of your selectors and a database like BOUNDLESS INFORMANT to see what call metadata they have on you in storage.

Here you would be wise to request simple output (rows of plain text with column values separated by commas,CSV format), to keep file size down. Then you could make your own mail-merge templates and spew out colorful BOUNDLESS INFORMANT graphs and reports about yourself, or just use the default templates provided by Excel.

November 25, 2013 at 2:36 PM

Anonymous jbond@MI5.gov.uk said...

-4- Next up on confusion, relational databases. NSA maintains hundreds of separate flatfile databases that might however share a field or two in common, for example someone texting, google searching, or shopping as well as making phone calls with with a given phone, the number or IMSI being the common field.

Those other activities involve different fields from those already in BOUNDLESS INFORMANT, such as your login to eBay or search term text instead of email subject line.

It could all be put into BOUNDLESS INFORMANT by expanding the number of fields. However this doesn't scale very well : it results in the voice call fields being massively blank for an IMSI making lots of google searches, creating a huge sparse table that is very slow to process, wasting analysts time (called high latency by NSA).

Instead, BOUNDLESS INFORMANT will just link to all the other databases which share a field. And those in turn could link to other simple databases sharing some other field that BOUNDLESS INFORMANT might lack. And so on -- it's how all the little constituent databases can be seamlessly integrated..

A query now calls through to this whole federation of linked databases, which can reside geographically anywhere on the Five Eyes network (though NSA is moving to one stop shopping from their Bluffdale cloud to improve security and reduce latency).

The primary provider of relational database software of this complexity is Oracle. However you can do about all of it free and friendly with open source MySQL. The Q is for querying -- what NSA calls tasking -- sending off some long-winded boolean logic string of field selector values and constituent databases that does the filtering you want.

The result of the query is a new little database, usually temporary, that you can use to generate fancy views and summary reports. The databases being updated continuously and storage retention varying, the same query tomorrow will give a slightly different outcome.

Your all-about-me FOIA request could be formulated in MySQL (first need to know names of linked databases) and surprisingly, the query string would be recognized and fulfilled by Oracle or whatever big relational database NSA ended up using/developing, it's that standardized.

If you're online or call a lot, that could still be a big file given 12 agencies keeping tabs, notably NSA, Homeland Security, and FBI's DITU. But if you wrote the query right, it would only take a small data center in the garage to host the response.

November 25, 2013 at 2:37 PM

Local cell phone spying KingFish stonewall: Minnesota law enforcement at BCA & Hennepin County refuse to disclose SIGINT cell phone snooping capabilities from NSA contractor Harris

kingfish.jpg

It's been dawning on Americans this year that their everyday electronic devices are used by law enforcement for investigations. However the lawmen and the county attorneys are withholding the policy information about the Harris Corporation Kingfish system which is a device that can alter the electronic behavior in a cell phone, also known as a CDMA Interrogator or cell phone interceptor.

The MN Bureau of Criminal Apprehension (BCA) has declined to share any policy information about Kingfish. I have also heard that Hennepin County Sheriffs Office and their legal counsel are putting up rather high barriers to disclosing anything at all about Kingfish. The whole case is weirdly parallel to the 1978 Rockford Files episode House on Willis Avenue, which ended with this unprecedented title card:

rockford-files-willis-ave.pngWe still have "no legal right" to know about who in Minnesota is building dossiers and how. The main question: what is Hennepin County and the BCA hiding in their versions of the House on Willis Avenue?

At the Hennepin County level in the 2010 they earlier promised to come up with sensible and clear policies about if and when law enforcement uses these devices to interfere with cell phones. Now they are claiming that stuff is non-public data - which of course precludes informed public debate at the Legislature in 2014 about electronic law enforcement interference in technical devices.

Several people including Rich Neumeister are looking into this nasty Signals Intelligence (SIGINT) mess. Follow @RichNeumeister - he is helpful answering about the details on this via Twitter.

In a shocking surprise Harris Corporation is a major contractor with the National Security Agency and KingFish is part of the domestic-grade apparatus for local but still unchecked NSA-style electronic snooping. The NSA didn't seem like a big deal when KingFish was approved, but now everyone has finally started noticing the tremendous power of unchecked electronic data collection. It's a much Hotter Potato than in 2012!

See: Sept 2009: Harris Corporation and National Security Agency Announce Certification of First Tactical Radio with Type-1 Suite B Information Security

July 2012: Harris Corporation Receives National Security Agency Certification for Soldier Radio Waveform in Falcon III AN/PRC-117G Multiband Manpack Radio

April 2007: National Security Agency Certifies Harris Corporation's SecNet 54 Top-Secret Capable Secure Wireless LAN Product

September 2004: Harris Corporation Receives NSA Certification for Programmable Cryptographic Module

Wikispaces notes: PIRT - Harris Corporation etc. More Harris links at end.

rockford3.pngAnother angle here: Hundreds of thousands of dollars have gone into KingFish in Minnesota and they are not willing to share the expense information. Ars Technica reports the boxes cost $25K so where the hell is the rest of the money? Meet the machines that steal your phone’s data | Ars Technica:

The Kingfish is a surveillance transceiver that allows authorities to track and mine information from mobile phones over a targeted area. The device does not appear to enable interception of communications; instead, it can covertly gather unique identity codes and show connections between phones and numbers being dialed. It is smaller than the Stingray, black and gray in color, and can be controlled wirelessly by a conventional notebook PC using Bluetooth. You can even conceal it in a discreet-looking briefcase, according to marketing brochures.

First used: Trademark records show that a registration for the Kingfish was filed in August 2001. Its “first use anywhere” is listed in records as December 2003.

Cost: $25,349.

Agencies: Government agencies have spent about $13 million on Kingfish technology since 2006, sometimes as part of what is described in procurement documents as a “vehicular package” deal that includes a Stingray. The US Marshals Service; Secret Service; Bureau of Alcohol, Tobacco, Firearms, and Explosives; Army; Air Force; state cops in Florida; county cops in Maricopa, Arizona; and Special Operations Command have all purchased a Kingfish in recent years.

[…]The code of silence shrouding the above tools, however, is highly contentious. Their use by law enforcement agencies is in a legal gray zone, particularly because interference with communications signals is supposed to be prohibited under the federal Communications Act. In May, an Arizona court ruled that the FBI's use of a Stingray was lawful in a case involving conspiracy, wire fraud, and identity theft. But according to the American Civil Liberties Union (ACLU), when seeking authorization for the use of the Stingray tool, the feds have sometimes unlawfully withheld information from judges about the full scope of its capabilities. This means that judges across the country are potentially authorizing the use of the technology without even knowing what it actually does. [But in MN who needs judges?? LOL]

That's not all. There is another significant issue raised by the Harris spy devices: security. According to Christopher Soghoian, chief technologist at the ACLU, similar covert surveillance technology is being manufactured by a host of companies in other countries like China and Russia. He believes the US government’s “state secrecy” on the subject is putting Americans at risk.

"Our government is sitting on a security flaw that impacts every phone in the country," Soghoian says. "If we don't talk about Stingray-style tools and the flaws that they exploit, we can't defend ourselves against foreign governments and criminals using this equipment, too."

rockford-files.png

Soghoian makes an excellent point - the vulnerabilities exploited by KingFish are in some ways a major public safety threat, and the security establishment is accruing power by hiding the flaws as usual instead of forcing society to deal with the overall crappiness of today's telecom technology.

"Security by obscurity" is the dominant principle of political accountability here, and of course it is doomed to fail. Responsible disclosure of the flaws exploited by KingFish and their granular legal circumstances are what we need, not moar domestic SIGINT fog and mystification.

All of these cell phone attack avenues should be known because similar tech to KingFish would be more widely available soon. The disruption under the federal Communications Act is also relevant.

Some time back I pointed out the problems with MN statutes about these kind of cell interceptor technology at a Senate committee and former Sen. Mee Moua suggested that if I wanted to go fishing for KingFish I might need to find some alternate way. At least these days more people care about this stuff!! [It should be recalled Moua - a Hmong war refugee - was hounded by law enforcement at the tail end of her service. See MPR clip below]

/////

Earlier: March 3 2010: Sheriff Stanek landing Fed cash for KingFish military cellphone tracker in Hennepin County; National Guard intelligence analysts fuse to metro police departments; Lobby for warrantless wiretaps in St. Paul | Twin Cities Indymedia -- March 15 2010: Surprise bill for interstate fusion center data sharing pops up Tuesday; Specs found for Harris StingRay & KingFish cellphone tracking devices | Twin Cities Indymedia

via Rich Neumeister: Open Secrets: An indefensible and odious practice with (Foia-Data Practice) data requests (Oct 15th)

////

Office of the Commissioner

445 Minnesota Street - Suite 1000 - Saint Paul, Minnesota 55101

Phone: 651.201.7160 - Fax: 651.297.5728 - TTY: 651.282.6555

Website: dps.mn.gov

October 3, 2013

Rich Neumeister VIA Electronic Mail

Re: Cell Phone Tracking Data Request

Dear Mr. Neumeister:

Thank you for your data request. You ask "to inspect and review all government data about the cell phone location tool known as the (Kingfish) including, but not limited to, such items as protocols, procedures, legal thresholds, Attorney opinions, evaluations, correspondence, and results of use."

The BCA does possess cellular exploitation equipment; however, we cannot provide details about the equipment because it would compromise ongoing and future criminal investigations including AMBER Alerts, kidnapping cases, fugitive searches and homicides.

In addition, any disclosure regarding the manufacturer, model, capabilities, functionality or other specifics about the equipment could be used by criminals and fugitives to defeat the technology and render the system useless.

As a result, any data regarding this equipment is confidential or protected non-public under Statutes 13.82 Subd. 25 and 13.37 Subd. l (a).

Portions of the data are also trade secret data not subject to dissemination. The contracting company has taken efforts to protect the data from disclosure. As you are aware, a corporation supplying trade secret data to a government entity may claim portions are trade secret. The contractor in this case has appropriately made such a claim as it relates to portions of the data, pursuant to Minn. Statute 13.37 Subd. 1(b).

Again, thank you for your data request. Should you care to discuss it further please contact me.

Sincerely,

E. Joseph Newton

General Counsel

/////

Lol "any disclosure regarding the manufacturer, model, capabilities, functionality or other specifics about the equipment could be used by criminals and fugitives to defeat the technology" - so they are counting on ignorance to succeed in controlling society. A perfectly sound way to invest public Debt-Dollars, counting on perpetual confusion over some metal box's legal & technical specifications. Perhaps this kind of clever spending theory contributed to the federal government shut down - it's not like millions haven't vanished on deficient & wasteful Homeland Security gear :-/

Well then let us take a look at MN Statutes 13.82 Subdivision 25. 13.82, 2013 Minnesota Statutes

"Subd. 25.Deliberative processes. Data that reflect deliberative processes or investigative techniques of law enforcement agencies are confidential data on individuals or protected nonpublic data; provided that information, reports, or memoranda that have been adopted as the final opinion or justification for a decision of a law enforcement agency are public data."

Justification for a decision of a law enforcement agency are public data and that would really seem to include the legal memos about the process for when to fire up Kingfish to poke at cell phones.

here is the 13.37 Subdivision 1 a: 13.37, 2013 Minnesota Statutes

Subdivision 1.Definitions. As used in this section, the following terms have the meanings given them.

(a) "Security information" means government data the disclosure of which the responsible authority determines would be likely to substantially jeopardize the security of information, possessions, individuals or property against theft, tampering, improper use, attempted escape, illegal disclosure, trespass, or physical injury. "Security information" includes crime prevention block maps and lists of volunteers who participate in community crime prevention programs and their home and mailing addresses, telephone numbers, e-mail or other digital addresses, Internet communication services accounts information or similar accounts information, and global positioning system locations.

/////

It seems like this is worded to mean that the "information" would be subjected to "theft, tampering, improper use, attempted escape, illegal disclosure, trespass, or physical injury". "Defeat the technology" is not on that list, and indeed the question of who the technology has been used on remains decidedly open.

Here is Rich's list of questions which is a good starting point: What's behind the secrecy wall of Hennepin Co Sheriff and BCA?

Some of the few questions I am trying to get answered are as follows: In what situations are the cellular exploitation devices used?

Are the BCA/Hennepin Co Sheriff invading people's privacy and liberty at a low legal threshold or no threshold rather than get a search warrant?

Who oversees and approves the use of the equipment? Where is the accountability?

How many innocent people have been within sights of the Kingfish or similar device, the data collected and those subjects of the surveillance who may not even know about it,? How many arrests have happened with the use of this device?

Kip Carver, an official in the Hennepin County Sheriff's office stated to the county's commissioners three years ago that the cellular exploitation device may be used hundreds of times a year.

How frequently are the cellular exploitation devices used and the number of subjects?

Depending if the cops are using a low threshold or none at all in using this device are they doing so to avoid an appearance before a judge where a search warrant (top standard to protect our privacy & liberty) needs to be issued and where questions can be asked?

What is the role of the prosecutors in situations when this equipment is used?

In my data request I asked for the legal thresholds that the agencies must go by in order to use the Kingfish? What is so secret about that?

At this time, the attitude that both agencies have taken with my data requests give the Minnesota Legislature and most important the public no idea how this tool has been used, is being used, how an individual or individuals get chosen to be pursued, and who is accountable.

As some people may currently know I have been working to possibly update our state laws so that the rule of law applies to whats happening now in 2013 not in 1988-1989 when 626A had its last major update.

Even though the Department of Public Safety and the Hennepin County Sheriff do not want to tell me or the public their protocols, policies, procedures of accountability, legal thresholds, and other appropriate public data I will still push on and I hope others will. I am not interested to live in a state where law enforcement rules and not the people.

/////

Story from Feb 9 2010 Star Tribune. You Can LOL about how Kip Carver claims that the device would only track cell phone numbers obtained through a search warrant: via Sheriff Stanek landing Fed cash for KingFish military cellphone tracker in Hennepin County; National Guard intelligence analysts fuse to metro police departments; Lobby for warrantless wiretaps in St. Paul | Twin Cities Indymedia | Movement Media for Minneapolis-St. Paul

The Minnesota Bureau of Criminal Apprehension in St. Paul has a KingFish device and makes it available to local agencies, said Jill Oliveira, a BCA spokeswoman. Only a few people know how to use it because the training is expensive, she said.

Stanek couldn't be reached for comment Tuesday. Kip Carver, a Sheriff's Office inspector who heads the investigations bureau, told commissioners that the device would track only cell phone numbers obtained through a search warrant, and couldn't be used without a court order.

The KingFish can't eavesdrop on phone conversations, Carver said. Instead, it locates cell phones that might be in the possession of an abduction victim, he said, or a robber making a getaway.

"I truly believe [we] would be very busy using that," Carver said. Asked how many times a year the device might be used, he said it could be in the hundreds.

Commissioner Jan Callison agreed to table the request to get more information, but added she was not as troubled by the device as some of her colleagues. "It seems to me that there are certainly ways to make sure this technology is deployed legally. ... It's really the sort of law enforcement that we want," she said.

/////

rockford-files2.pngHere is something handy, a contract surely similar to the ones being currently hoarded by BCA and Hennepin County Sheriffs Office, a 2012 Harris Government Communications Systems Division June 25 2012 from the city of Tempe Arizona: Harris Corporation Wireless Surveillance Products Standard Terms and Conditions of Sale | Public Intelligence - 11 pages.

Harris Corporation’s “StingRay” Used by FBI for Warrantless Mobile Phone Tracking

Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products Price List. Thanks to PublicIntelligence.net as always for stacking the key infos nicely!

/////

December 2008: Harris Corporation Receives National Security Agency Certification for Type 1 Ethernet Module for SecNet 54

June 2013: Harris Corporation Receives NSA Type 1 Certification for Cryptographic Component of Anti-Scintillation/Anti-Jam Modem

July 2011: Harris Corporation's Small Secure Data Link Receives National Security Agency Certification - aka drone radios

January 2008: Harris Corporation Receives National Security Agency Certification for Falcon III Multiband Manpack Radio

Photo source: Ars Technica: Meet the machines that steal your phone’s data | Ars Technica

/////

Sen Mee Moua hounded by law enforcement: Mee Moua leaves state Senate, legacy | Minnesota Public Radio News - Laura Yuen June 29 2010

Yet Moua made waves with some law-enforcement officials this year when she proposed legislation that would ban police departments from sharing secret files on gang members and activities. Moua said she had concerns about racial profiling, especially of young African-Americans who she says could be entered into the database simply for being photographed with a known gang member. The proposal came after a series of scandals involving the now-defunct Metro Gang Strike Force.

"So she saw abuse in law enforcement, and I think that's why she wrote the bills she did," Limmer said. "Was it an overreach? Hmm. Some people might say so, but you could understand where she was coming from."

Some law-enforcement officials, though, painted Moua as a gang sympathizer. And Ramsey County Sheriff Bob Fletcher said at the time that Moua was overreacting to isolated problems with the strike force.

"I think that overreaction has caused her to introduce reckless legislation that will jeopardize the safety of citizens, officers and case prosecutions," Fletcher said.

Moua said she was taken aback by the reaction from law enforcement.

"They wanted to make this about cops vs. dangerous criminals," she said. "But the actuality is it's about cops vs. people in the community who haven't done anything [wrong] and who were being profiled in these databases."

Chaska Police Chief Scott Knight said Moua has been known to question police practices -- which may have irked some law enforcement officials.

"While sometimes some of my peers had some frustrations, I thought she was very healthy for the global approach to law enforcement, and the balance with community and citizens' rights and fairness," Knight said.

/////

To paraphrase Rockford Files Jim says: "You can stomp someone into the ground using computer technology as a club"… Evil CEO guy: "To my knowledge none of this is illegal." Jim: "It should be!" The House on Willis Avenue is easily the most applicable episode to this scenario, with its combination of unregulated electronic spying and shady local government operations:

See also: Rockford files data surveillance didactic ending — Critical Commons

/////

Finally I would add there are several candidates for Pirate Party in Minneapolis in November - if you want to send the signal that these issues matter, consider voting for them. The two parties are almost certainly not going to help you and the other minor parties are all over the map.

Occupy Boulder Flood Relief gets rolling as oil oozes around Colorado; Japanese typhoon could create complex Fukushima super-meltdown; Sunday LinkDump

boulder-climate.jpg

The good news is that people are organizing for flood relief in Colorado along the proven lines of previous efforts at Occupy Sandy. URLZ: #boulderflood relief :: Boulder Flood Relief - Get help & get involved

First meeting 28 mins video: Boulder Flood Relief - Orientation Meeting - YouTube

Donations on wepay at $2k currently: Boulder Flood Relief:

Boulder Flood Relief provides immediate assistance to those affected by the Boulder flood of September 13, 2013. We are currently providing physical labor such as cleanup help for those affected by the flood. More volunteers are joining by the hour and we will be able to fill more needs as new skill sets present themselves. If you have any need please link, call, or email here:

boulderfloodrelief.org

720-943-4482

BoulderFloodRelief@gmail.com

100% of donations from this page support these relief efforts. They go toward cleanup equipment, administrative costs, and other immediate needs. Funds may also go toward providing material goods and food for affected Boulder county residents.

We work in relationship with Four Mile Fire Relief, which is a local, relief-oriented 501(c)(3) non-profit. They provide financial oversight and make your donation tax deductible.

If you can donate food or material goods please contact YMCA Boulder, as we are not accepting physical donations at this time.

YMCA Boulder 303-442-2778

2850 Mapleton Avenue, Boulder CO

If you are in need of assistance please go to boulderfloodrelief.org and fill out an assistance form. We will contact you asap. Thank you, from your friends and neighbors at Boulder Flood Relief.

/////

Another long and productive day with Boulder Flood Relief. In under 72 hours we've:

- Built a volunteer database of over 500 individuals.

- Started work sites with over 30 volunteers on the ground helping homeowners.

- Sent canvassers to affected neighborhoods to assess needs.

- Built information systems that will allow the organization to scale and be transparent to itself (using a combination of open source and cloud based software).

- Began building a peer to peer marketplace of goods and services so folks can self-organize to relieve and recover.

Not bad for three days. If you're in Boulder we invite you to get involved in whatever way you can. Go to our website (www.boulderfloodrelief.org) and register as a volunteer and/or share your needs.

There is much work to be done, and we are the ones to do it.

#boulderflood #boulderfloodrelief

Facebizzle: Occupy Boulder Flood Relief. Small tumblr: Occupy Boulder Flood Relief. Twitter: #BoulderFlood Relief (BoulderRelief) on Twitter

Some app for help: SparkRelief.org | Community Driven Disaster Relief

spark-relief.png

Reddit help info index: 9/13/2013 - Colorado Flooding Resources : Colorado

Large and detailed Google Docs info on Boulder CO support resources: A snippet:

Logistics

Headquarters/Hub/Incident Command Post:

[location to be announced tomorrow]

[9/13 location: 1:30 pm @ Innisfree Coffee, 1203 13th St., Boulder, 80302]


Remote Supplies Location:

[to be determined]

Vital Numbers:

Cel.ly Loop: text @floodrelief to 23559

The Internet

Common Hashtags:

#BoulderFlood, #COwx, #WaldoFlood, #COflood #LongmontFlood #LyonsFlood, #Ftcollinsflood, #CCCF, #JeffCoFlood, #ColoradoFlood, #larimerflood

Related Searches:

#Boulder, Boulder flash flooding,


Google Community:

https://plus.google.com/communities/110401760903189735343 for sharing information documents inter-organizationaly


Twitter Accounts:

@ArvadaPolice

@BoulderCounty [Boulder Local Government]

@BoulderOEM [Boulder Office of Emergency Management]

@COEmergency

@femaregion8

@jeffcosheriffco [Emergency info for Jefferson County]

@LarimerSheriff

@NWSBoulder [National Weather Service, Boulder]

@OccupyRelief [part of @OccupySandy]

@Occuweather

@RedCrossDenver

@bowandarchery

Alerts and Closures

For Road Closures: @ColoradoDOT, BoulderOEM Road Closure Update

For Current Emergency Information/Emergency Status: http://boulderoem.org/emergency-status

For National Weather Service Alerts: http://www.crh.noaa.gov/bou/

For CU University Campus Alerts: http://alerts.colorado.edu/

For Greeley city updates: http://greeleygov.com/PIO/Lists/News%20Releases/DispForm.aspx?ID=1802&Source=http%3A%2F%2Fgreeleygov.com%2FPIO%2FMedia.aspx

General Links

National Weather Service Hydrograph:

http://water.weather.gov/ahps2/hydrograph.php?wfo=bou&gage=bocc2

http://streamstatsags.cr.usgs.gov/ThreatenedGages/ThreatenedGages_seq.html

Colorado Division of Water Resources -- Boulder Creek Gage Height West of Broadway:

http://www.dwr.state.co.us/SurfaceWater/data/detail_graph.aspx?ID=BOCOBOCO&MTYPE=GAGE_HT

Google Boulder News Aggregator

http://goo.gl/news/58WN

Cleanup Guide:

http://www.floodsafety.com/media/pdfs/cleanup/Cleanup_after_flood.pdf

Maps

Boulder Flood Hazard Mapping

http://gisweb.ci.boulder.co.us/agswebsites/pds/floodmap/

For Google Maps (shelters, animal shelters, road closures, evac zones): https://m

apsengine.google.com/map/viewer?mid=zYYdhADI7PvQ.kzJSidMtEIqY

Xcel Power Outage Map: http://www.xcelenergy.com/portal/site/xe-en/menuitem.471846b0c2475abf262a71986b108a0c/?vgnextoid=02b6719a0b3cd210VgnVCM100000b40b98aaRCRD&vgnextchannel=e97c6113f220f210VgnVCM100000b40b98aaRCRD&appInstanceName=xe


Community Map with Instagram photo layers:

https://boulderflood2013.communityos.org/cms/node/1

Current EvacuationsFor Evacuation Center Info:, http://boulderoem.org/emergency-status

//////

From the Occupy Sandy days, relief network theory info: Home - FLO Solutions for Disaster Relief

//////

The OOZE: It's almost like drilling and fracking willy-nilly could set the stage for complex or compound environmental disasters. Colorado Floods Causing Fracking Spills?: Natural and Human-made Disasters Portend Future of Toxic Catastrophe | Earth First! Newswire

Is there a media blackout on the fracking flood disaster in Colorado? From an email:

I see you’ve noticed the underwater wells in Weld County, Colorado. Amazing; we’ve emailed the Denver TV stations, other media, and state and local politicians. We’ve sent pictures that our members have taken. It’s like the media and politicians have been TOLD not to say anything about it. There has been no mention of the gas wells on the Denver newscasts either last night or this evening although all stations have had extensive and extended flood coverage. You can see underwater wells in the background of some of the newscast videos, and yet the reporters say absolutely nothing.

Here’s a picture one of our members took yesterday in Weld County, Colorado. We’ve got tons more on our website. Check it out. The tanks are tipping and, in some cases, have fallen over. They have to be leaking toxins into the flood waters. There have to be hundreds if not thousands of underwater well pads in Weld County as a result of the flooding.

Please publicize this in Texas since our media people and politicians have gone silent!

https://www.facebook.com/EastBoulderCountyUnited

East Boulder County United

Lafayette, Colorado

WeldCountyFloatingTank-e1379213713195.jpg

Colorado Floods Causing Fracking Spills?: Natural and Human-made Disasters Portend Future of Toxic Catastrophe | Earth First! Newswire

National Geographic, Sept 14 2013: Amid Drought, Explaining Colorado’s Extreme Floods as the drought weakens absorption capacity of the land.

Navajo flooding in AZ: Dine' Resources and Information Center » Navajo Nation Operation Storm Surge – Volunteers Needed

▶ Raw video: Extreme flooding in Weld County - YouTube

//////

Impending Japanese DoomSphere: With the release of a new Ghost in the Shell series, ARISE [ see http://www.ghostintheshellarise.com/anime/ghost-in-the-shell-arise/borde... ] it is time once again to ponder how the land of the Rising Sun will get into a post-apocalyptic state required of the finest anime.

Fukushima could get flooded once again by Typhoon Man-yi, but perhaps they will have a lucky break. Typhoon hits Japan - fears for Fukushima plant - World - NZ Herald News. Tracking map URL next 12 hours are the Big Deal: http://www.wunderground.com/hurricane/western-pacific/2013/Tropical-Stor...

Commentary from Michael C Ruppert:

If you are psychologically and emotionally able...

First watch the aerial footage of the flooding around Boulder and Lyons, Colorado (below). Watch all of it, no matter how difficult that might be.

Then read this quote from this posting about Man-yi:

"Man-yi might also inundate Fukushima, where utility crews are struggling to contain highly radioactive water leaking from and flowing under the crippled Fukushima No. 1 nuclear plant and into the Pacific Ocean at an estimated rate of 300 tons a day".

Now understand that the earth at Fukshima has already been horribly compromised by flooding -- for two and a half years straight. The reactor buildings are unstable and ready to fall. The unwelded storage tanks are already failing, and the spent fuel pools are teetering above ground with their ever-present threat of an open-air, uncontrolled fission reaction.

Now add rainfall like what has just hit Boulder... Instead of many huge sections of roadway, bridges and buildings falling away into the torrent, picture the reactor buildings, the fuel pools and all the stored super-radioactive water being washed away, either into the sea, or being scattered and dispersed for hundreds, maybe thousands of miles by 50-60-70 mph winds.

And the hardest thing of all to imagine is the fuel pools collapsing in the middle of a tropical storm or typhoon, triggering an open-air reaction in the middle of all that wind.

Forget all of these other times the cliche "The Perfect Storm" has been used before. […..] When highly complex civilizations fail, they fail spectacularly. The cascade of problems becomes its own Fukushima tsunami. […..]

[CO Flood Post] Words are absolutely inadequate to describe this footage. I could not help continually viewing this as a metaphor, a symbolic viewing, of how difficult it will be to address the life-threatening crises that are bearing down so hard with so much infrastructure gone in so many places.

No matter where we are, this is showing us what our world is going to be resembling in the near future, whether as a result of floods, quakes, radiation, lack of maintenance, lack of resources and ultimately lack of will.

As local, immediate survival becomes a priority almost everywhere, our ability to address the larger issues causing these events collapses, evaporates and is gone with the wind.

Let your heart watch this right beside your mind. One way or another, this is the future for all of us, unless we can all unite on the same page, and at the same levels of consciousness.

AFP-JIJI: Typhoon Man-yi heads for Chubu | The Japan Times: "Man-yi might also inundate Fukushima, where utility crews are struggling to contain highly radioactive water leaking from and flowing under the crippled Fukushima No. 1 nuclear plant and into the Pacific Ocean at an estimated rate of 300 tons a day."

Petition w 1.5K signers right now: STOP FUKUSHIMA RADIATION- UN ACTION NEEDED

Terrible nuclear Olympics of 2020 scheduled: Endless Fukushima catastrophe: 2020 Olympics under contamination threat — RT Op-Edge

ENEnews tracking this like ballers: Fukushima reactor cores may have had “Melt Through to China Syndrome” and went into the earth itself — Includes over 1,500 pounds of plutonium

Tritium levels of groundwater in Fukushima now at their highest - The Japan Daily Press

Sept 13th: Interview: Fukushima melted fuel “could have burned through floor and now in earth underneath reactors”

///////

Jet Stream climate change: It's not just the CO2 coefficient, it's shifting wind patterns. For animated archives: Animation of Archived Jet Stream Analyses for North America

///////

Nazis of popular culture: Mr Brand razzed Hugo Boss, the stylists of the Third Reich, prompting a nasty microcosm of larger 'soft fascism' to iterate anew. Well trolled good sir: Russell Brand and the GQ awards: 'It's amazing how absurd it seems' | Culture | The Guardian

///////

Now for the Misc Linkdump… First: Great Game Roundup: For Sun Sept 15th: Sibel Edmonds' Boiling Frogs Post. Lawrence Wilkerson speculates on Israeli false flag CW operation in Syria: Ex-Bush II Administration Official: Israel could have used Chemical Weapons in Syria | Global Research. Conspiracy lulz: Activist Post: Syria's "Rebels" Threaten UN - Will Use US Weapons.

Five Ways a Wider Syrian War Could Go Nuclear | Common Dreams

SWIFT NSA infiltrations: NSA Successfully Figured Out How to Tap Into VISA’s ‘Complex Transaction Network’ | The Dissenter // Internet snooping: Backdoor dealings | The Economist

Petraeus protests going viral: Protests of David Petraeus's lectures to continue, say CUNY students | World news | theguardian.com

Tech punditry and the attention economy: pretty clutch stuff here, the art of self interested trolling and TED talks. Tech Cyber-Critics

Neat poem:

Shine, Republic by Robinson Jeffers

The quality of these trees, green height; of the sky, shining, of

water, a clear flow; of the rock, hardness

And reticence: each is noble in its quality. The love of freedom

has been the quality of Western man.

There is a stubborn torch that flames from Marathon to Concord,

its dangerous beauty binding three ages

Into one time; the waves of barbarism and civilization have

eclipsed but have never quenched it.

For the Greeks the love of beauty, for Rome of ruling; for the

present age the passionate love of discovery;

But in one noble passion we are one; and Washington, Luther,

Tacitus, Aeschylus, one kind of man.

And you, America, that passion made you. You were not born

to prosperity, you were born to love freedom.

You did not say 'en masse,' you said 'independence.' But we

cannot have all the luxuries and freedom also.

Freedom is poor and laborious; that torch is not safe but hungry,

and often requires blood for its fuel.

You will tame it against it burn too clearly, you will hood it

like a kept hawk, you will perch it on the wrist of Caesar.

But keep the tradition, conserve the forms, the observances, keep

the spot sore. Be great, carve deep your heel-marks.

The states of the next age will no doubt remember you, and edge

their love of freedom with contempt of luxury.

Robinson Jeffers

//////

Classwar lulz: Watch Barney Frank Leave Wall Street Defenders Speechless

Spacelulz: Searching for the ruins of alien civilisations – Paul Gilster – Aeon

///////

Lol the Waste Confidence Directorate:

This is email sent Friday Sept 13, 2013 by the NRC Nuclear Regulatory Commission

Hello,

Three important Federal Register notices were published today.

· The NRC’s proposed Waste Confidence rule for public comment: https://federalregister.gov/a/2013-21708

· The NRC’s Notice of Availability for the Waste Confidence draft generic environmental impact statement (DGEIS): https://federalregister.gov/a/2013-21715

· The Environmental Protection Agency’s Notice of Availability of the Waste Confidence DGEIS: https://federalregister.gov/a/2013-22363

The publication of these notices starts the 75-day public comment period on the Waste DGEIS (http://pbadupws.nrc.gov/docs/ML1322/ML13224A106.pdf) and proposed rule. The public comment period ends on Wednesday, November 27, 2013. Comments received after November 27, 2013, will be considered as practicable. However, the NRC can only guarantee consideration of comments received on or before November 27, 2013.

In addition to presenting oral comments at any of our twelve public meetings, there are many ways to submit written comments on the DGEIS and proposed rule. The NRC gives all comments equal weight, no matter who submits them or how they are submitted. You can submit written comments through any of the methods below.

E-mail comments to Rulemaking.Comments@nrc.gov, citing Docket ID No. NRC–2012–0246

Submit comments online at www.regulations.gov using Docket ID No. NRC–2012–0246

(Direct link to comment submission: http://www.regulations.gov/#!submitComment;D=NRC-2012-0246-0361)

Mail comments to Secretary

U.S. Nuclear Regulatory Commission

Washington, DC 20555-0001

ATTN: Rulemakings and Adjudications Staff

Fax comments to Secretary

U.S. Nuclear Regulatory Commission

301-415-1101, citing Docket ID No. NRC–2012–0246

Hand-deliver comments to 11555 Rockville Pike, Rockville, Maryland 20852, between 7:30 a.m. and 4:15 p.m. (Eastern Time) on Federal workdays; telephone 301-415-1677.

If you have any questions about the information in this e-mail please contact Sarah Lopas at (301) 287-0675 or Sarah.Lopas@nrc.gov. For additional details on our 12 public meetings and how to register to attend these meetings, please go to our Waste Confidence Public Involvement webpage: http://www.nrc.gov/waste/spent-fuel-storage/wcd/pub-involve.html.

Thank you,

Staff of the Nuclear Regulatory Commission

Waste Confidence Directorate

////////

Financial collapse still impending: With Currency Wars guy Jim Rickards: [KR497] Keiser Report: Deja Fraud | Max Keiser // Portuguese Return to Farming to Counter Unemployment, Austerity - Bloomberg

Neil Young at Tar Sands: 'Fort McMurray is a wasteland': Neil Young slams oil patch, Keystone plans - The Globe and Mail. Alberta politicians as the new Southern Man!

Sad reefs and CO2 bubbles make carbonic acid: Pacific Ocean takes perilous turn | Sea Change: Ocean acidification | The Seattle Times // International Scientists Warn Climate Deniers Are Enabling Earth's Suicide // Image of the Day: Satellite view of record heat wave in China, 5-12 August 2013 // Shitloads of Methane as reptilian alien "They Live" conspiracy bears fruit: Arctic News: Methane reaches 2571 ppb

Some theory: The Absurdity of Authenticity – Nature Bats Last

Fed Chair Baseball: Summers over | Felix Salmon

Cool and clever energy tech may help make new storage systems using basically air and water: Technology - LightSail Energy

Coconut Revolution: ▶ Coconut Revolution - "The world's first successful eco-revolution." - HQ - Full - YouTube

Why not? “Chemtrails Are Happening All Over The World” According to Former British Columbia Premier | Collective-Evolution

Leaving it there for now...

New data mining revelations, DEA drawn in quickly; Privacy & Surveillance DICE, PROTON, CRISSCROSS & CLEARWATER partial master programs? Lexis-Nexis on private side

It's a pretty woolly political scene right now & wanted to slam up some docs leading different directions on this. At least the damn narrative is moving along.

More or less we're looking at the merging of criminal investigations with direct military signals intelligence (SIGINT) technology run by the same contractors that recently ran these technocratic social control 'kinetic' programs for the Pentagon in assorted occupied lands around the Middle East etc.

Naturally the war on drugs first brought this war home - special bonus points for the Viktor Bout angle of the DEA SOD/DICE projects story from Reuters earlier...

Latest: Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987. ......

Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

The program was started in 2007, according to the slides, and has been carried out in great secrecy.

“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

Oh the war on drugs, will your terrible travesties never end... Nice work exposing this program by all involved!! A spectacular catch for sure.

////

Meanwhile we also have yet to deal with the terrible secret Special Operations Division which as this slide makes clear, subverts the entire concept of criminal defense and discovery. Therefore probably all drug cases should be thrown out, eh?

SOD-DEA-coverup.jpeg

Rules of SOD Photo Source - REUTERS

Exclusive: U.S. directs agents to cover up program used to investigate Americans | Reuters via Cryptogon.com: U.S. COMMUNICATIONS INTELLIGENCE SECRETLY SHARED WITH LAW ENFORCEMENT FOR USE AGAINST AMERICANS IN CRIMINAL INVESTIGATIONS

By John Shiffman and Kristina Cooke

WASHINGTON | Mon Aug 5, 2013 3:25pm EDT

(Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.

"I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

"It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

THE SPECIAL OPERATIONS DIVISION

The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.

Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential.

"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."

.....SOD'S BIG SUCCESSES

The unit also played a major role in a 2008 DEA sting in Thailand against Russian arms dealer Viktor Bout; he was sentenced in 2011 to 25 years in prison on charges of conspiring to sell weapons to the Colombian rebel group FARC. The SOD also recently coordinated Project Synergy, a crackdown against manufacturers, wholesalers and retailers of synthetic designer drugs that spanned 35 states and resulted in 227 arrests.

Since its inception, the SOD's mandate has expanded to include narco-terrorism, organized crime and gangs. A DEA spokesman declined to comment on the unit's annual budget. A recent LinkedIn posting on the personal page of a senior SOD official estimated it to be $125 million.

Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE.

The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said.

About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.

"We use it to connect the dots," the official said. ...

//////

OK so let's get to PROTON, CRISSCROSS, CLEARWATER and Lexis-Nexis. I think this covers a lot of new ground. Hard to say if the DOJ side of the story ties in, but the Lexis-Nexis level is pretty clearly documented already but not well known outside of research circles. Also some of this gets to the SCS - Special Collection Service - which I think would have been part of Snowden's tour of duty in CIA.

SOURCE: http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

18 August 2013

PROTON, CLEARWATER and Lexis-Nexis

A Proton/Crisscross job ad below.


A sends:

PROTON, CLEARWATER and LEXIS-NEXIS

Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals.

I suggest American guerillas seek non-Internet modes of communication. If you think Rex Sherwood was pulled over for not using a turn signal, you are wrong.

I was "read on" the PROTON/CRISSCROSS program in late 2006 and was a frequent user of this system for over a year. As part of my duties, I employed PROTON/CRISSCROSS in HUMINT exploitation role. In the Intelligence Community, PROTON/CRISSCROSS is referred to as PROTON. Unless otherwise specified, the same is true in this report.

PROTON is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling. PROTON is the program name as well as the name of the technology. It has been described as "SAP-like", and I suspect that PROTON was once a DEA special program. PROTON is well known in HUMINT and DOJ clandestine law enforcement. It remains the primary, if not fundamental, tool of HUMINT and DOJ law enforcement operations, both of which have considerable overlap in phenomenology and methodology. PROTON carries the FISA caveat because Top Secret FISA collection is contained in PROTON's massive database.

Through my professional associations within the Intelligence Community, I became aware of a Department of Justice (DOJ) system called CLEARWATER. CLEARWATER is similar to PROTON but at the SECRET/NOFORN level of classification and exclusively a DOJ program, where PROTON is CIA, DOJ and DOD. Most DOJ Special Agents and analysts do not have Top Secret clearance. Every informant is run through CLEARWATER, every witness gets vetted through the system.

PROTON and CLEARWATER are not just analytic tools, they provide actionable intelligence and both programs are used everyday for target discovery and development. CLEARWATER practically leads FBI and DEA investigations. PROTON is used throughout HUMINT for asset validation, recruitment, background checks on sources, etc. The FBI and DEA as both law enforcement and intelligence community members have resources of both sides and domestic law enforcement by these agencies is more of a HUMINT operation of the type seen in Afghanistan. Find, Fix, Arrest. PROTON and CLEARWATER work so well that Special Agents and Case Officers can't wait to get data into the system and see how it networks together.

Top Secret and FISA mean NSA sensitive sources and foreign collection. NSA resources are unneeded in America---CALEA and the DOJ have that covered for you under Title III, the Patriot Act and opinion from the federal kangaroo judiciary.

FISA is not only used against terrorists and spies but also private and quasi-government organizations . The most impressive network I ever laid eyes upon was the PROTON derived communications network of the Netherlands and Swiss SWIFT. Allot of target discovery there. It's how you find a needle in a haystack. The U.S. hosts one of three SWIFT secure messaging centers. Well, the NSA and CIA have insured SWIFT is allot less secure. SWIFT is a major communications target and the NSA is deep in that This is a modern take on "follow the money." If Americans are wondering how the IRS found their secret bank accounts..well, here 'ya go.

When I read the description of Drug Enforcement Administrations (DEA) DEA Internet Connectivity Environment (DICE) system: the billions of records, partnership with CIA, NSA and DOD, the need to cover sources at the expense of a fair trail--- it struck me that what was described sounded more like PROTON and/or CLEARWATER.

As I read further, DICE was sounding more like a legitimate DEA program that was being used to provide cover for PROTON and/or CLEARWATER---either intentionally or sacrificially. The early descriptions of DICE present it as an information sharing and collaboration tool through the Internet. The recent public descriptions of DICE are awkward and contrived when compared to past information.

DICE is being used to cover PROTON and/or CLEARWATER.

Properly, CRISSCROSS is the database of telecommunications selectors. Selectors are, in NSA terms, that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI---really any telecommunications "number" or "address" a person would have as a means to contact another, are contained in CRISSCROSS.

PROTON is the operating software written in JAVA for cross-platform usability and runs on JWICS for connectivity to CRISSCROSS.

PROTON contains the tools for network analysis and would be familiar to anyone who has experience in undergraduate social network analysis, statistics and data visualization.

CRISSCROSS has an interesting and murky history. As it was explained to me by a PROTON Program Officer, CRISSCROSS was originally a very secret DEA program to provide a repository for DEA collected selectors. It was, by every account, an excellent resource. With the post-911 reorganization of the Intelligence Community, everyone was required to share their resources for the "War of Terror." CRISSCROSS was very successful and well-received and ultimately exceeded DEA capabilities to manage. The CIA took over as executive agent---but CRISSCROSS is shared by the DOD and DOJ in a co-ownership manner.

It's uncertain if PROTON received Special Collection Service (SCS) data when it was a solely DEA activity, but PROTON presently receives SCS collection amounting to about 1 one terabyte monthly, and that's just selectors, not content. PROTON also receives data from Computer Network Exploitation (CNE), by the now famous Tailored Access Office (TAO). Included as well is an enormous repository of Title III data from CALEA enabled domestic collection, FISA and an enormous amount of purchased data from various communications providers like Intellius.

PROTON does not contain content, only selectors for targeting. Consider that in the context of one (1) terabyte of just selectors per month (just from the SCS) for over 10 years. I have no idea how much the TAO provides, however the two biggest contributors to PROTON are the SCS and TAO.

An analyst or law enforcement officer can "run" a selector in PROTON and visualize the social network of correspondents associated with that selector in a visual format. The user can select and display most frequent numbers called or have called, duration of call, and other functions familiar to social network analysis. An analyst may choose to look at the network in terms of who called who: persons of importance typically have allot of people calling them so we can build a network based on that to determine centricity. We can build a network based on call duration, frequency, date---pick a variable. Sometimes it's useful to look at the outliers which may be hang-arounds to some drug trafficking organization. We can task NSA or DOJ for collection on these hang-arounds and begin network deconstruction from the ground up.

These calling networks include family, friends and other non-target persons. Non-target persons, like family members, are very useful in developing the target and as leverage. Non-target communications provide intelligence from things spoken between people in confidence who may not be aware of the targets activities or associations, like the location of a fugitive who has ceased using his known selectors, but communicates with his mother through her known selectors.

Another very useful feature is the Bankswitch function, which allows network discovery by the calling pattern, not necessarily by a selector. Often, groups of U.S. government interest will use a cellphone, then dispose of them , preventing further intelligence collection from that group of cellphones. Bankswitch allows the analyst to quickly rediscover the calling network that has switched phones. Humans typically have some constant behavior in who and how they make their calls and persons. Groups and enterprises not having supplicated to the U.S. government avarice will have a whole additional set of behaviors in who and how they call.

This is highly useful for calling networks that dispose and rotate telephones regularly. A fresh cellphone provides enough of a lead to discover the calling pattern of the whole network based on historical calling records. Both the DEA and FBI have found this useful in their activities in Columbia, Mexico and the United States.

I know for certain PROTON contains communications selectors on American Citizens (AMCITS) since I ran a query on a number using only a Maryland area code and a partial prefix. PROTON returned a huge list of "masked" domestic numbers. An NSA masked number is always domestic and reveals only the area code and prefix with the rest of the number obscured. A PROTON user can email the NSA with a request to unmask the number---it's in the database, but a user has to present some justification for a number to be unmasked. Voice cuts are available through a similar process.

PROTON is really well thought out. Not only does it provide a wealth of network investigative tools, it also allows for the easy introduction of data. Let's say you're a DEA Special Agent surveilling local boat captains as part of OPERATION PANAMA EXPRESS (PANEX) in Barranquilla Columbia---a major Port of Origin for drugs to the U.S. and someone gives you a business card. Just run the number and see if it hits. The Special Agent" can take that card and mail it to the PROTON Program Office (PPO). Scans, cell pictures of the information are also acceptable to ingest.

An FBI Case Officer attending a UAV conference in Las Vegas can take all the "grey literature" and hand that to the PROTON office as well. The numbers find their way into the database The PROTON office will also ingest entire phone books---still popular in some parts of Europe and Asia. They use a method similar to Google books to automatically turn pages and scan data from them.

Anything that contains a selector can go into PROTON. Part of the PROTON program is the resource that provides software engineering to order unordered data and otherwise make raw data ingestible. PROTON users can add and edit PROTON data as well. If a user discovers the identity of a previously unidentified selector, one can edit that record or leave notes for other users.

With PROTON, you can see who's talking to whom in a telecommunications relationship context. How you hit that network is up to you.

Network deconstruction techniques vary throughout the 'Community. Domestically, the DOJ prefers the highly publicized raid with the media providing the entertainment backdrop. The DEA prefers covertness. The DOD prefers a Predator strike. Yes, those drone attacks are network deconstruction techniques and target selection is often facilitated, if not provided, by PROTON.

As stated earlier, CLEARWATER is a SECRET/NOFORN version of PROTON. The DEA red herring called DICE reportedly contained NSA collection which rules-out CLEARWATER (a S//NF system) and highlights PROTON (a TS//SI system) as the source of DICE intelligence.

I'm providing information on both since the government is no longer under constitutional restraint and is illegitimate. Parallel Construction. You fuckers. A cornerstone of American law and western culture sacrificed for the security of the Elites.

With the CALEA requirements, TITLE III collection is very simple affair involving a court order and the Cisco routers which, through CALEA legislation, are engineered for surveillance. Cisco is a very enthusiastic partner to the Intelligence Community---one of those sensitive relationships managed through the NSA Special Source Operations office. The NSA finesses such relationships---with the DOJ, you get a thug in a nice suit and the quiet menace of federal law enforcement. If you think the DOJ is a law enforcement agency, you're stupid. Internal security is DOJ Job #1. As we have seen, the DOJ is maintaining internal security by both legal and extralegal means with the full support of the federal judiciary and the lukewarm animus of the U.S. Congress.

Federal judges and congress persons are largely immune to DOJ surveillance. You are not. The "new" counter-insurgency operations by the government concentrate on a Reasonable Suspicion by persons and groups---not on Probable Cause.

CLEARWATER contains selectors from any number of sources: TITLE III, purchased data from telecommunications data brokers, National Security Letters, subpoenas, technical operations by FBI TACOPS, search warrant, informant production, arrests, detentions. If the DOJ has searched you, arrested you or let you go, count on that data being in CLEARWATER. Did you give the Special Agent your telephone number?

Arresting someone to search them without needing consent or court order is not an unheard of means to get a Person of Interests selectors into CLEARWATER. Something laying openly on your desk? A cell-phone snap and email to the program office. How about those utility bills you throw away without shredding? If you're a Person of Interest, somebody is walking away with your trash.

There is a a real motivation by DOJ Special Agents to get telecommunications selectors into PROTON or CLEARWATER to build the networks for analysis and deconstruction.

CLEARWATER has all the features of PROTON and at least one other---mapping. An FBI Case Officer operating domestically can query say, Lahore Pakistan, and place on a map, those locations in the U.S. where those calls originated or terminate---a choropleth map with colored density clusters, all in a spatial context. With that, the DOJ knows where to focus it's domestic security efforts. A DEA Special Agent can run a selector seized in an amphetamine investigation and, within a few minutes, have the calling network and visualize the correspondents locations on a map. That's how DOJ led task forces show up in your neighborhood.

Watching a OWS protester enter a number into their cell phone is perfectly legal without consent or a warrant and once I get that number, we'll look at that calling network, find the node that is you, and walk that back to that moment we shared under the chestnut tree.

If you're visiting the USA from abroad, you may have your wallet and pocket litter photocopied at secondary screening. Then an email to the National Counterrorism Center (NCTC) Terrorist Identities Datamart Environment (TIDE) office, and from there, a Forward to the PROTON office.

PROTON, CLEARWATER and LEXIS-NEXIS all provide data export into Analyst Notebook file format (and PDF for ease of sharing).

All members of the Intelligence Community have access to LEXIS-NEXIS. LEXIS-NEXIS contains biographic information on most Americans having a driver or occupational license. Your state sells the contents of its drivers license database to companies like LEXIS-NEXIS for a profit. They can do this since that information is considered in the public domain---driving is a privilege and if you don't want to be in database then don't get a drivers license. LEXIS-NEXIS contains other highly personal and granular information depending on which state is providing information. Florida provides pretty much everything it can to LEXIS-NEXIS. Automobile information, luxury water craft, occupational licenses---if you submit information to a state agency, it can end up in LEXIS-NEXIS. All domestic law enforcement has access to LEXIS-NEXIS, its a fundamental investigative tool. IRS, DOJ, Treasury, Local PD, Sheriffs Office all have a LEXIS-NEXIS access or the means to pull data from them.

Law Enforcement Officers can have their data removed from LEXIS-NEXIS. An LAPD and NYPD "spokesperson" informed me that this is the case. Imagine your a citizen in New York and you get surveilled by one of the numerous surveillance technicians the NYPD has fielded since 9-11 , a quick look-up via mobile device or WiFi and they know who you are now.

So, a Special Agent or analyst simply runs the selectors in PROTON and CLEARWATER, then runs those names or other biographic/vital information again in LEXIS-NEXIS, all that data related to the TARGET is exported in Analyst Notebook format, those files are imported into the Analyst Notebook application and...viola!...a relatively complete social network and biographics of the TARGET. That could be you of course.

By Supreme Court decision and other judicial misadventures, LEXIS-NEXIS contains public information and you do not have an expectation of privacy. There is no need for Probable Cause or Reasonable Suspicion because this data is, by judicial opinion, public. Something to think about next time you're at the DMV. Citizens are queried regularly in LEXIS-NEXIS. CLEARWATER and PROTON provides network association and the selectors. A subpoena, NSL or search warrant to the telecommunications provider of that selector gives us names and locations. LEXIS-NEXIS provides Pattern of Life, geolocation and personalia. I was able to see my past three residential addresses, past telephone numbers and identifying information about my previous automobile. LEXIS-NEXIS is coupled to Automatic License Plate Recognition Systems (ALPRS) as well. Who you are, where you were and where you are.

The DOJ and Intelligence Community access LEXIS-NEXIS through a VPN and a proxy (government). A DOD proxy is registered to the Virginia Contracting Office, but it's a non-logging proxy so, good luck in your discovery. LEXIS-NEXIS has no idea of the individual accessing it's database and, according to the spokesperson, does not maintain logs of government clients. A subpoena cannot discover what is not there.

Around 2008, LEXIS-NEXIS purchased Choicepoint to start their new product line. I recall some representative, at a promotional meeting, extolling the virtues of Choicepoint---all the data in a easy to use format. A user of Choicepoint could run a query and not only get biographics and addresses but have that information located on a map or satellite image (by Pinpoint, Inc. or a Google map server). The Choicepoint representative giving the presentation said no Social Security Numbers or drivers license pictures would be included in the database in order to protect the rights of the citizen. Such conceits are good ethics in Washington, D.C.

That said, CLEARWATER and PROTON are not omnipotent. Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated. Of the many systems used by NSA and DOJ, CLEARWATER, PROTON and LEXIS-NEXIS are the most significant from a "boots on the ground" investigative prospective.

There is real concern that PROTON may be to widely known for such a program and efforts are being made to walk it back into a compartment.


A Proton/Crisscross job ad:
http://jobs.cgi.com/job/Hanover-SIGINT-Analyst-Job-MD-21075/1184801/

SIGINT Analyst Job

Date: Aug 14, 2013

Location: Hanover, MD, US
Job Order: J0311-0630 - Permanent Full Time
Title: SIGINT Analyst
Category: Consulting / Business / Functional
City: Hanover, Maryland, United States

Job Description: SIGINT Analyst

CGI Federal is seeking a SIGINT Analyst to work in our Hanover, MD office.

Specific Duties:

Applicants will work as a member of a government-contractor team whose primary focus will be providing support to deployed analysts and software developers.

In this capacity, uses an in-depth knowledge of general communications procedures, traffic analysis and reporting formats and vehicles to produce time-sensitive and event-oriented reports

Provide support to force protection, indications and warning and situational awareness; provides target continuity and mentorship to a junior and rotating workforce; conducts research to answer RFIs and produces working aids to support new tool development.

Must be willing to receive and conduct training on new systems, databases, processes and procedures.

Analyst will be supporting deployed US military troops and must understand the military decision making process and miliary doctrine.

Minimum of five (5) years experience with the military or government agency using the collection management cycle, intelligence cycle, targeting cycle, and the SIGINT intelligence fusion process from tactical to national level required.

Additional Requirements:

Experience with Falconview, Analyst Notebook, Arc View, Arc-GIS, Arc-Editor, AIM, Pathfinder, SEAS, STARLIGHT, GCCS and other current analyst tools.

Active TS/SCI security clearance w/ polygraph required.

Preferred:

Experience with NSANET, RTRG tool suite, Global Reach, Proton/Criss Cross, Broom Stick, CW II, Banyan. Geo Bootcamp and knowledge of ArcGIS a plus.

Preferred experience includes analysis in OIF/OEF, NSA, INSCOM, or ACE At CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 71,000 professionals located in more than 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com.

This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.

We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.

No unsolicited agency referrals please.

WE ARE AN EQUAL OPPORTUNITY EMPLOYER.

Skills

- Analytical Thinking
- Signal Intelligence (SIGINT)

Reference: 137685

//////

Check out the BOLO - be on the lookout - National Guard civil disturbance training program photos here:North Carolina National Guard Rapid Reaction Force Civil Unrest Training Photos | Public Intelligence. Obviously PROTON, DICE, CRISSCROSS, CLEARWATER style database technology would be useful in composing intelligence

Official description: CHARLOTTE, N.C. – Soldiers of the North Carolina National Guard train for Rapid Reaction Force duty at the Catawba River Pump Station here today. The training scenario tests the Soldiers ability to use nonlethal force to disperse a crowd of aggressors from a water plant. This training prepares the Soldiers to support state and local first responders and county emergency management agencies. The RRF is a quick reaction team that, on order, is deployable anywhere in North Carolina within 24 to 36 hours of a critical event. In times of crisis, the RRF may be ordered by the President of the United States or the Governor of North Carolina in order to augment Federal or State Authorities in response to actions such as a known terrorist attack, civil unrest or a natural and/or man-made disaster. (U.S. Army National Guard photo by Sgt. 1s Class Robert Jordan / released)

nc-rrf-3.jpg nc-rrf-9-1024x724.png nc-rrf-8-1024x708.png

/////

Other targetings: Russia Issues International Travel Advisory to Its Hackers | Threat Level | Wired.com

WaPo/Snowden: U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show - The Washington Post

Black Budget semi-surfaces: ‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post

Israel listed as major counterintelligence threat in Black Budget: Leaked documents reveal US sees Israel as a spying threat (Video) - The Hill's Global Affairs

WIRED on cryptology cracking in black budget: New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | Wired.com

Login Lulz for Snowden in Ars Technica Aug 29th: Sysadmin security fail: NSA finds Snowden hijacked officials’ logins | Ars Technica

.... Leaving it there for now...

Google State Network Operations: Google Eric Schmidt, Jared Cohen, State Department nexus problem - Julian Assange notes they're holding the shit-bag

Date 2011-02-09 15:05:19
From burton@stratfor.com
To secure@stratfor.com
Others MessageId: <4D529F1F.30708@stratfor.com>
InReplyTo: 2045570843-1297258457-cardhu_decombobulator_blackberry.rim.net-421530589-@bda877.bisx.prod.on.blackberry
Text
** Cohen had dinner in Cairo the night before the Google Exec was picked up by GOE State Security.....one-hour after the dinner, the Gypo exec was grabbed off the streets heading into a friends apt.

More to follow.....

----------------------------------------------------------------------------------------------

http://www.foreignpolicy.com/articles/2010/09/07/jared_cohen

State Department Innovator Goes to Google

Jared Cohen, a high-profile advocate of the State Department's forays into "21st-century statecraft," is leaving Foggy Bottom for New York. In an exclusive interview with FP, he talks about his time at State and his new project: building a "think/do tank" called Google Ideas.

via 1122191_Egypt - Google ** Suggest you read | Al Akhbar English. Jeremy Hammond's freedom died to bring you this information :[

"Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do..." as Burton at Stratfor put it... As Jeremy Hammond rots in jail for the Stratfor leak, the emails in that leak showed that Eric Schmidt's wingman Jared Cohen was involved in using Google as an avenue to boil up unrest in various countries - and not merely by making blogs indexable either. It's gotten into a far more complicated game now. I am reposting some key articles on this. Julian Assange describes Cohen as a Generation Y Kissinger figure which is a pretty good way to put it.

Let's go back to 2012 for a bit here and see how the Jared Cohen / State Department thing got shaken out of the Wikileaks-supported Stratfor leak.

//////

By: Yazan al-Saadi - StratforLeaks: Google Ideas Director Involved in ‘Regime Change’ | Al Akhbar English

Published Wednesday, March 14, 2012

Top Google execs, including the company’s CEO and one of Barack Obama’s major presidential campaign donors Eric Schmidt, informed the intelligence agency Stratfor about Google’s activities and internal communication regarding “regime change” in the Middle East, according to Stratfor emails released by WikiLeaks and obtained by Al-Akhbar. The other source cited was Google’s director for security and safety Marty Lev.

Email exchanges suggest that Google execs were suspicious that Cohen was coordinating his moves with the White House.

The briefings mainly focused on the movements of Jared Cohen, currently the director of Google Ideas, a “think/do-tank” billed as a vehicle for spreading American-style liberal democracy. Cohen was also a former member of US Secretary of State’s Policy Planning Staff and former advisor to Condoleezza Rice and Hillary Clinton.

Email exchanges, starting February 2011, suggest that Google execs were suspicious that Cohen was coordinating his moves with the White House and cut Cohen’s mission short at times for fear he was taking too many risks. Stratfor’s vice-president of counter-terrorism Fred Burton, who seemed opposed to Google’s alleged covert role in “foaming” uprisings, describes Cohen as a “loose Cannon” whose killing or kidnapping “might be the best thing to happen” to expose Google.

The Cohen Conspiracy

Stratfor’s spotlight on Cohen began on 9 February 2012 after Burton forwarded to the secure email list a Foreign Policy article discussing Cohen’s move from the State Department to Google Ideas. With this article, Burton noted that Cohen had dinner in Cairo with Wael Ghonim on January 27, 2011 just hours before the Egyptian Google Executive was famously picked up by Egypt’s State Security. (doc-id 1122191)

On the same day, Stratfor’s staff make reference to a Huffington Post article which highlighted Cohen’s role in “delaying the scheduled maintenance on Twitter so the Iranian revolution could keep going” and a Foreign Policy article that noted that Cohen “was a Rhodes scholar, spent time in Iran, [and] hung out in Iraq during the war…”. These casual discovers further perked Stratfor’s curiosity about Cohen. (doc-id 1629270)

The following day, Burton forwarded a message to the secure email list from “a very good Google source” who claimed that Cohen “[was] off to Gaza next week”. Burton added, “Cohen, a Jew, is bound to get himself whacked….Google is not clear if Cohen is operating [with a] State Dept [or] WH [White House] license, or [is] a hippie activist.”

Korena Zucha, another senior analyst on the list, queried, “Why hasn’t Google cut ties to Cohen yet? Or is Cohen’s activity being endorsed by those higher up in the [company] than your contact?”

In turn, Burton replied, “Cohen’s rabbi is Eric Schmidt and Obama lackey. My source is trying to find out if the billionaire owners are backing Cohen’s efforts for regime change.” (doc-id 1111729)

Later on, Burton forwarded information from the “Google source” of Cohen’s links in establishing Movements.org. The source added, “A site created to help online organization of groups and individuals to move democracy in stubborn nations. Funded through public-private partnerships.” Burton pointed out that the US State Department is the organization’s public sponsor.” (doc-id 1118344)

Indeed, the State Department, partnering with a number of corporations, was the main sponsor for the 2008 inaugural Alliance of Youth Movements summit in New York City that subsequently established Movements.org. Hillary Clinton endorsed the organization and presented a video message during the second summit held in Mexico City a year later.

On 11 February, Burton wrote to the secure email list that Cohen was still planning to head to Gaza. He added, “The dude is a loose can[n]on. GOOGLE is trying to stop his entry into Gaza now because the dude is like scorched earth. It’s unclear to GOOGLE if he’s driving without a license, but GOOGLE believes he’s on a specific mission of “regime change” on the part of leftist fools inside the WH who are using him for their agendas.” (doc-id 1113596)

Throughout this day, the idea proposed by Burton, and seemingly felt by his Google contacts as well, of Cohen and the White House’s involvement in the uprisings was actively discussed among the analysts, especially in regards to who would be targeted next. (doc-id 1113965)

By Monday, 14 February 2011, Burton shared intelligence with George Friedman, Stratfor’s founder, and Scott Stewart, vice-president of Stratfor’s tactical department, from his source in Google that Cohen was ordered not to go to Gaza. Burton’s Google source further stated, “Also, thinking I [the unnamed source] may be on the right track about him despite his denials [in reference to Cohen working for the White House/State Department].”

When asked to clarify his sources on Cohen, Burton claimed that they were Marty Lev, Google’s director for security and safety, and Eric Schmidt, the current CEO of Google. (doc-id 398679)

A week later, Burton forwarded an internal Google email obtained from a ‘senior Google executive’. This email was seemingly sent by Cohen to the senior Google executive to discuss Cohen’s planned trip in March.

“GOOGLE are doing things the CIA cannot do."

In it, Cohen wrote, “I wanted to follow-up and get a sense of your latest thinking on the proposed March trip to UAE, Azerbaijan, and Turkey. The purpose of this trip is to exclusively engage the Iranian community to better understand the challenges faced by Iranians as part of one of our Google Ideas groups on repressive societies. Here is what we are thinking: Drive to Azerbaijan/Iranian border and engage the Iranian communities closer to the border (this is important because we need the Azeri Iranian perspective).”

After reading Cohen’s email, Stewart remarked, “Cohen might end up having an accident if he is not careful. This is not child’s play.”

Burton responded, “GOOGLE is getting WH [White House] and State Dept. support and air cover. In reality, they are doing things the CIA cannot do. But, I agree with you. He’s going to get himself kidnapped or killed. Might be the best thing to happen to expose GOOGLE’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and GOOGLE is left holding the shit bag.” (doc-id 1121800)

On 10 March 2011, Burton forwarded another message from his ‘senior Google executive’ source detailing how Cohen was requested not to travel on his proposed trip. The source explained that Google had concerns over Cohen’s “baggage” as a “US State Dept. policy maker, his research and publications on Muslim extremists and youth movements and his presence in Egypt just as the uprising started.”The source also stated that Cohen was recommended to “take a lower profile on this specific trip and let time pass before being visible and associated with people known by their states to be active in challenging repressive societies.” (doc-id 1164190)

A subsequent message from Burton’s source on 22 March 2011 affirmed that Cohen “heeded the advice not to go to Turkey or UAE for those meetings.” (doc-id 1133861)

The final email dealing with Cohen was on 30 March 2011.
Here, Burton forwarded to the alpha (secure) email list a response by his source to Burton’s question of whether Cohen was playing any role in Libya at the time. The source stated, “Not that I’m aware of. He heeded the advice to avoid Turkey and UAE and didn’t go on that trip.” (doc-id 1160182)

Google Ideas: Politicizing Technology

Certainly, there is more than meets the eye to Cohen and his actions; even his superiors in Google seem to think so.

The belief, chiefly by Burton, that Cohen had seemingly played a role in fermenting the uprisings that toppled Zine el Abidine Ben Ali and Hosni Mubarak underplays, and at times entirely disregards, the ability and agency by local movements in Tunisia and Egypt.

Nevertheless, Google Ideas, which Cohen directs, is a new animal. According to a report by the Financial Times published last July, Google Ideas seems to bond idealistic activist sensibilities with Google’s pursuit for continued global expansion - blurring the lines between business and political action. Schmidt and Cohen dub Google Ideas as a “think/do-tank” that aims to tackle political and diplomatic matters through the use of technology.

The first public event for the think/do-tank, in partnership with the Council on Foreign Relations and the Tribeca Film Festival, was held last June in Dublin. It gathered around 80 ‘former’ extremists, including former Muslim radicals, neo-Nazis, US gang members, and others, in a “Summit Against Violent Extremism”. The announcement by Google declared that the summit’s aim is “to initiate a global conversation on how best to prevent young people from becoming radicalised and how to de-radicalise others” and that “the ideas generated at the Dublin summit will be included in a study to be published later in the year.”

One spin off was the creation of the Against Violent Extremism group, apparently a network for those who attended the Dublin Summit. Beyond merely networking, the group also advertises certain projects that are in need of funding. Notably, much of the projects pertain to the Middle East, including an “Al-Awlaki Counter-Campaign” - Anwar al-Awlaki, an American citizen of Yemeni origin, was assassinated in September of last year by the US for his alleged al-Qaeda connections.

But the Against Violent Extremism site does not seem to be presently active. The last update for projects in need of funding was made in September and the last announcement regarding the workings of the site was made in October.

More recently, Foreign Policy reported in January that the Brookings Institute, one of the oldest and most influential think-tanks in Washington, DC, named Google Ideas as “the best new think tankestablished in the last 18 months.” Such accolades arguably suggests that Google Ideas is expected to be a major player in the near future.

////

Now Julian Assange goes into this mix pointing out the weird Google ventures

http://thestringer.com.au/google-and-the-nsa-whos-holding-the-shit-bag-now

The Stringer (Australia), August 24, 2013

Google and the NSA: Who’s holding the ‘shit-bag’ now?

by Julian Assange

It has been revealed today, thanks to Edward Snowden, that Google and other US tech companies received millions of dollars from the NSA for their compliance with the PRISM mass surveillance system.

So just how close is Google to the US securitocracy? Back in 2011 I had a meeting with Eric Schmidt, the then Chairman of Google, who came out to see me with three other people while I was under house arrest. You might suppose that coming to see me was gesture that he and the other big boys at Google were secretly on our side: that they support what we at WikiLeaks are struggling for: justice, government transparency, and privacy for individuals. But that would be a false supposition. Their agenda was much more complex, and as we found out, was inextricable from that of the US State Department. The full transcript of our meeting is available online through the WikiLeaks website.

The pretext for their visit was that Schmidt was then researching a new book, a banal tome which has since come out as The New Digital Age. My less than enthusiastic review of this book was published in the New York Times in late May of this year. On the back of that book are a series of pre-publication endorsements: Henry Kissinger, Bill Clinton, Madeleine Albright, Michael Hayden (former head of the CIA and NSA) and Tony Blair. Inside the book Henry Kissinger appears once again, this time given pride of place in the acknowledgements.

Schmidt’s book is not about communicating with the public. He is worth $6.1 billion and does not need to sell books. Rather, this book is a mechanism by which Google seeks to project itself into Washington. It shows Washington that Google can be its partner, its geopolitical visionary, who will help Washington see further about America’s interests. And by tying itself to the US state, Google thereby cements its own security, at the expense of all competitors.

Two months after my meeting with Eric Schmidt, WikiLeaks had a legal reason to call Hilary Clinton and to document that we were calling her. It’s interesting that if you call the front desk of the State Department and ask for Hillary Clinton, you can actually get pretty close, and we’ve become quite good at this. Anyone who has seen Doctor Strangelove may remember the fantastic scene when Peter Sellers calls the White House from a payphone on the army base and is put on hold as his call gradually moves through the levels. Well WikiLeaks journalist Sarah Harrison, pretending to be my PA, put through our call to the State Department, and like Peter Sellers we started moving through the levels, and eventually we got up to Hillary Clinton’s senior legal advisor, who said that we would be called back.

Shortly afterwards another one of our people, WikiLeaks’ ambassador Joseph Farrell, received a call back, not from the State Department, but from Lisa Shields, the then girlfriend of Eric Schmidt, who does not formally work for the US State Department. So let’s reprise this situation: The Chairman of Google’s girlfriend was being used as a back channel for Hillary Clinton. This is illustrative. It shows that at this level of US society, as in other corporate states, it is all musical chairs.

That visit from Google while I was under house arrest was, as it turns out, an unofficial visit from the State Department. Just consider the people who accompanied Schmidt on that visit: his girlfriend Lisa Shields, Vice President for Communications at the CFR; Scott Malcolmson, former senior State Department advisor; and Jared Cohen, advisor to both Hillary Clinton and Condoleezza Rice, a kind of Generation Y Kissinger figure -- a noisy Quiet American as the author Graham Greene might have put it.

Google started out as part of Californian graduate student culture around San Francisco’s Bay Area. But as Google grew it encountered the big bad world. It encountered barriers to its expansion in the form of complex political networks and foreign regulations. So it started doing what big bad American companies do, from Coca Cola to Northrop Grumman. It started leaning heavily on the State Department for support, and by doing so it entered into the Washington DC system. A recently released statistic shows that Google now spends even more money than Lockheed Martin on paid lobbyists in Washington.

Jared Cohen was the co-writer of Eric Schmidt’s book, and his role as the bridge between Google and the State Department speaks volumes about how the US securitocracy works. Cohen used to work directly for the State Department and was a close advisor to both Condolezza Rice and Hillary Clinton. But since 2010 he has been Director of Google Ideas, its in-house ‘think/do’ tank.

Documents published last year by WikiLeaks obtained from the US intelligence contractor Stratfor, show that in 2011 Jared Cohen, then (as he is now) Director of Google Ideas, was off running secret missions to the edge of Iran in Azerbaijan. In these internal emails, Fred Burton, Stratfor’s Vice President for Intelligence and a former senior State Department official, describes Google as follows:

"Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do... [Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag."

In further internal communication, Burton subsequently clarifies his sources on Cohen’s activities as Marty Lev, Google’s director of security and safety and ... Eric Schmidt.

WikiLeaks cables also reveal that previously Cohen, when working for the State Department, was in Afghanistan trying to convince the four major Afghan mobile phone companies to move their antennas onto US military bases. In Lebanon he covertly worked to establish, on behalf of the State Department, an anti-Hezbollah Shia think tank. And in London? He was offering Bollywood film executives funds to insert anti-extremist content into Bollywood films and promising to connect them to related networks in Hollywood. That is the Director of Google Ideas. Cohen is effectively Google’s director of regime change. He is the State Department channeling Silicon Valley.

That Google was taking NSA money in exchange for handing over people’s data comes as no surprise. When Google encountered the big bad world, Google itself got big and bad.

END

///

Keyhole Google and the CIA: Another dimension of this relationship worth noting is the essentially Google/CIA joint venture known as Google Earth. It's well known to researchers but not widely: one of Google's principle products, Google Earth, started as Keyhole, turbocharged by the CIA's venture capital fund In-Q-Tel. See Oct. 2004: Google buys CIA-backed mapping startup • The Register. This is an interesting take: http://dusk.geo.orst.edu/Pickup/AAG2009/6-Cloud9_Keyhole.pdf

In-Q-Tel Announces Strategic Investment in Keyhole - 2003 I think: - original: http://www.iqt.org/press/2003/Keyhole_06-25-03.html

ARLINGTON, Va. and MOUNTAIN VIEW, Calif., June 25 /PRNewswire-FirstCall/ -

- In-Q-Tel, a private nonprofit venture funded by the Central Intelligence

Agency, today announced a strategic investment in Keyhole Corp., a pioneer of

interactive 3D earth visualization. The investment, made in February 2003,

was In-Q-Tel's first engagement with a company on behalf of the National

Imagery and Mapping Agency (NIMA).

Immediately demonstrating the value of Keyhole's technology to the

national security community, NIMA used the technology to support United States

troops in Iraq. "Within two weeks of In-Q-Tel's engagement with Keyhole, we

implemented the technology to support our mission within the Pentagon," said

Rob Zitz, Director of NIMA's InnoVision directorate. "Introducing

technologies like Keyhole is part of NIMA's effort to transform the

intelligence business, and the way we serve our customers."

Keyhole's EarthViewer 3D client application uses videogame-like 3D

graphics and access to massive databases of network-hosted earth information,

including satellite imagery and aerial photography, to produce an interactive

digital model of the earth. Keyhole's EarthSystem(TM) combines a tradition

of 3D graphics technology for flight simulators with innovative network-

streaming technology to deliver enterprise software solutions for large

business and government customers, as well as an Application Service Provider

solution for professional and consumer users. The result is a virtual flyover

experience-so compelling that multiple TV media networks recently used

EarthViewer 3D to 'fly' over Iraqi cities and landscapes in news broadcasts

using publicly available satellite images. In addition to media customers,

Keyhole solutions serve a broad range of markets including real estate,

transportation, insurance, consumer and government.

"In-Q-Tel invested in Keyhole because it offers government and commercial

users a new capability to radically enhance critical decision making. Through

its ability to stream very large geospatial datasets over the Internet and

private networks, Keyhole has created an entirely new way to interact with

earth imagery and feature data," said Gilman Louie, CEO of In-Q-Tel. "With

Keyhole's technology, individuals can see and manipulate their world in 3D,

meeting their business and operational challenges in powerful geographic

context."

"Keyhole's strategic relationship with In-Q-Tel means that the

Intelligence Community can now benefit from the massive scalability and high

performance of the Keyhole enterprise solution," said John Hanke, CEO of

Keyhole. "By capitalizing on trends in commercial markets, In-Q-Tel is

supporting an ever-higher standard of advanced technology adoption in

government. Keyhole is pleased to help set that standard for large-scale 3D

geospatial visualization."

NIMA's success with Keyhole highlights the significant overlap between

technology needs across the agencies of the Intelligence Community. "By

investing in Keyhole, In-Q-Tel is helping CIA and NIMA leverage limited

resources and gain access to a technology of high potential value to both

organizations," said Louie. Working through CIA, NIMA became a limited partner

with In-Q-Tel in the summer of 2002. In addition to an equity investment,

In-Q-Tel is partnering with Keyhole to further enhance Keyhole EarthSytem's

compatibility with a variety of government datasets through adoption of

advanced GIS data standards.

About In-Q-Tel

In-Q-Tel is a private, independent, enterprise funded by the CIA. Launched

in 1999, In-Q-Tel's mission is to identify and invest in companies developing

cutting-edge information technologies that serve United States national

security interests. Working from an evolving strategic blueprint that defines

the CIA's critical information technology needs, In-Q-Tel engages with

entrepreneurs, established companies, researchers and venture capitalists to

deliver technologies that pay out in superior intelligence capabilities for

the CIA and the larger Intelligence Community.

About Keyhole

Based in Mountain View, CA, Keyhole, Inc., is the pioneer of interactive

3D earth visualization and creator of the groundbreaking rich-mapping

EarthViewer 3D system that transforms the way users interact with geographic

information and earth imagery. Keyhole's EarthViewer 3D accelerates and

enhances decisions for business and government by enabling fast, fluid

interaction with massive network-resident databases of earth imagery and

geospatial information. Users can "fly" from space to street level seamlessly

while interactively exploring layers of information including roads, schools,

businesses, and demographics. Further information about Keyhole is available

at http://www.earthviewer.com .

About NIMA

NIMA ( http://www.nima.mil ) is a member of the National Intelligence

Community and a DoD Combat Support Agency. NIMA's mission is to provide

timely, relevant and accurate Geospatial Intelligence in support of national

security. Geospatial Intelligence is the analysis and visual representation

of security-related activities on the Earth. Headquartered in Bethesda, Md.,

NIMA operates major facilities in the northern Virginia, Washington, D.C., and

St. Louis, Mo. areas. NIMA Support Teams serve customers around the nation

and the world.

SOURCE Keyhole Corp.

////

Few more notes: In-Q-Tel Keyhole Google Earth and CIA | Laboratory of Hidden Alternatives

Going to leave this post here for now but may expand upon the idea later....

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

How to check cops checking your driver's license! Plus full texts of Anne Marie Rasmusson lawsuit settlements for cop ID checks

Yet another nasty branch on the poisonous tree of data abuse in Minnesota is bearing its digital fruit. Anne Marie Rasmusson, a former law enforcement officer, got 'checked out' by an absurdly sprawling array of Minnesota law enforcement officers illegally abusing their driver's license lookup systems. Three major legal documents from the settlements are included below, I believe for the first time on the web (I might be wrong but didn't spot anything on Google).

For the backstory of the weird law enforcement gangstalking of Rassmusson & subsequent litigation, see Nov 2 2012: Anne Marie Rasmusson's settlement haul now over $1 million - Aaron Rupar / CityPages.

From a clever data-fishing colleague, here is one proven method for promptly obtaining your own DVS data:

E-mail kim.jacobson@state.mn.us with "Hi Kim! This is a request to inspect public data under the Minnesota Government Data Practices Act using my own equipment, in electronic form. I would like to inspect all records and logs of when my driver's license and motor vehicle information on file with DVS was accessed, along with date, time, request detail and requesting agency. My driver's license number and license plates are: X. Thanks!"

100% Lulz virtually guaranteed. Not a horrible time lag either, from what I am hearing from people.

Better Know An Acronym: Mpls PD's ALPR & MnDOT's MBUF, the Parallel DataSchemes: Better get yr DVS records while they're hot: the government has a habit of clamping down on these kinds of data flows, legislative authorization be damned!

On another critical but separate mass surveillance & data control issue, IPAD | Information Policy Analysis Division, Minnesota Department of Administration is taking public comment until January 30, 2013 on the issue of the automated license plate reader system which Minneapolis has semi-extralegally shifted from public to non-public data classification. The PDF is here: www.ipad.state.mn.us/docs/mplsappalpr.pdf. One idea: let IPAD know that this tech is dangerous for data regardless of who is supposed to have access. As the burgeoning DVS omnishambles indicates, 'sensitive' data should be minimized in government, and even 'authorized' personnel actually shouldn't be trusted to operate these systems without granular and public systems of accountability.

Again it is worth pointing out that the City of Minneapolis itself argued in the PDF above that the data generated by the Minneapolis Police Department's Automated License Plate Reader (ALPR) system is dangerous and must be made non-public for the same reasons that MnDOT's Mileage Based User Fee (MBUF, aka Intellidrive) data is dangerous.

MBUF is a story I have been following for several years - it would send extremely frequent location/direction/velocity info to the government & its military-industrial contractor, Battelle, for every user in order to generate a dollar figure for taxing the vehicle - only nuking all your remaining privacy in the process. After many months, much MnDOT MBUF data was released via a Mn Data Practices Act Request, though it is difficult to work with. See Nov 30 2012: EXCLUSIVE MnDOT info cake: 2.97gb emails/docs on the Mileage Based User Fee (MBUF)- Minnesota's GPS vehicle taxing regime in the works

Previously: Jan 9 2013: MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley // MPD Homeland Security Unit at Cruz House: Minneapolis Police Department data request on Occupy Minnesota finally released; sketchy anti-Occupy fusion-style police material from Nevada // Dec 14 2012: Mordor Mayor Rybak makes moves to hide Minneapolis panopticon: Total Minneapolis Awareness Automatic License Plate Reader records form 'retroactive surveillance' empire. Ye Gods we keep catching substantial fish!

The issue of abusive operations in the MN Department of Public Safety-controlled DVS database is becoming a major issue recently, with the decidedly unlikely duo of Republican-aligned Hennepin County Sheriff Rich Stanek and indefatigable Star Tribune reporter Randy Furst both finding highly indefensible query activity on their records. Minn. driver’s license data snoopers are difficult to track | StarTribune.com:

Despite widespread misuse of driver's license records in Minnesota, determining just who is peeking into your files can prove nearly impossible.

The Minnesota Department of Public Safety, which oversees the driver's license database, refuses to tell people the names of users -- generally public employees -- who have looked up their information. Perhaps the most high-profile citizen getting stonewalled by the state is Hennepin County Sheriff Rich Stanek, who is sparring with the department over what he believes were inappropriate queries into his driver's license records.

The Driver and Vehicle Services (DVS) database, which contains addresses, photographs and driving records on nearly every Minnesotan, is protected under state and federal law. State records show that public employees frequently have misused the database by running people's names without a business purpose. That is the subject of a major lawsuit that recently ensnared police officers across Minnesota, as well as a criminal case pending against two Minneapolis employees.

Stanek learned in June that employees at 21 agencies, including his own office, had accessed his records over several years. Some of the queries came from as far away as Wells, Minn., a small town 117 miles south of Minneapolis that he has never visited. The Department of Public Safety would not provide him with the names of the users.

"I believe that some or all of these requests may have been without a legitimate government purpose," Stanek wrote in a December letter to the Department of Administration, asking for an advisory opinion on the matter. The Department of Public Safety "and DVS appear to have purposely created obstacles to deny me an opportunity to track illegitimate access."

Stanek had made two previous requests for his lookups out of curiosity, and was surprised by how many agencies had queried his name.

This time, he says, a security concern prompted his request for the lookups.

He believes the state has an obligation to show that the lookups had a legitimate purpose, even if they do not hand over the names.

Anyhow, a source provided a great deal of the Rasmusson legal paperwork obtained via the Minnesota Data Practices Act. I don't think it's around elsewhere on the Internet, so here it is. I haven't looked over too many settlements myself, so this is overall just funny stuff about a serious topic -- nothing like a government formally conceding abuse and paying out hard-collected taxpayer cash to cover for some ridiculous abuse of officially "necessary" authority.

I wonder what kind of world we'd live in if our government units were actually run by people who never screw up like this, wasting all these resources and being generally abusive. There will surely be more inquiries along these lines...

Three parts:

Rassmusson Lawsuit 1 1110 001 (44pgs) - direct download 1.8MB: rassmusson_lawsuit-1-1110_001.pdf

Rassmusson Lawsuit 1 1110 001 by Dan Feidt

Rassmusson Lawsuit 2 1109 001 (5 pgs) - direct download 205KB: rassmusson_lawsuit-2-1109_001.pdf

Rassmusson Lawsuit 2 1109 001 by Dan Feidt

Rassmusson Lawsuit 3 1102 001 (39 pgs) - Direct download 1.9MB: rassmusson_lawsuit-3-1102_001.pdf

Rassmusson Lawsuit 3 1102 001 by Dan Feidt

Leaving it there for now, but hell, something will probably turn up yet again before I even have time to deal with it!!

MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley

Dateline: Pseudo-Secret Minneapolis (aka Fridley): What WCCO called the "secret" "City of Eyes" Strategic Information Center has been located on the Google! Your Federal Stimulus Money & FY2010 Homeland Security Appropriations At Work - A Facility for Spying on Facebook Occupy Barbecues

strategic-center-mpls.png

It's nice when data releases tie together a larger system, and we've sure got that here. It's not really "secret" but it's quite shiny & new, not well-known at all, and it is certainly has been used as a site for spying on Occupy activists without criminal predicates by the Minneapolis Police Department. [emails a bit farther down]

///// UPDATE Jan 10 2013: See How to check cops checking your driver's license, Rassmusson lawsuit settlement docs /////

The Minneapolis Police Department files about Occupy Minnesota released by a data request on Monday afternoon are turning up interesting wastes of taxpayer money -- and even the so-called "secret" Strategic Information Center & Emergency Operations and Training Facility at 25 37th Ave Northeast in Fridley, north of the city line by the river & railroad tracks.

Also known as the EOTF/SIC, let's wrangle up everything we can find. Start with architects, via Wold Architects/Engineers: City of Minneapolis EOTF | Wold Architects and Engineers

Wold Architects and Engineers designed a site and facility for the City of Minneapolis Fire Department Training Campus to include a Fire Department’s Training Division; training classrooms multi-used as an Emergency Operations Center for the City’s Emergency Preparedness; a Strategic Information Sensor Monitoring Center for the Minneapolis Police Department; and vehicle storage garages for the Fire Department’s regional asset equipment.

The design exceeds the City of Minneapolis requirement for design to meet LEED Silver.

strategic-4.png

strategic-5.pngThis state-of-the-art federally funded facility allows police to determine... the location of barbecues on Facebook, including even the number of "YES" and "MAYBE" invitees.

This facility also encompasses "Shotspotter" directional microphones all over the city - I wonder if those are ever activated besides the gunshot decibel threshold "trigger" - they are in fact pretty high-fidelity microphones, it has been disclosed (May 28 2012 NYT article) but the manufacturer denies the mics are triggered by conversations.

I for one, am glad that we spent both municipal and borrowed federal tax dollars on training the Minneapolis police to believe a Facebook "YES" invite is real. The simulacrum of today's clicks has become the strategic information of tomorrow!

The old EOC center, used in the 2007 35W bridge collapse, can be seen here via MPR and clearly lacks expensive-enough videoconferencing gear.

Here is the press release from Nov 4 2010: Minneapolis opens Emergency Operations Training Facility - City of Minneapolis

Minneapolis opens Emergency Operations Training Facility

The City of Minneapolis has opened its new Emergency Operations Training Facility, which will help emergency responders and other City staff better prepare for and respond to emergencies. The multi-purpose building helps meet the training and response needs of the Minneapolis Fire Department, the Minneapolis Police Department, and the City's Emergency Management Division, along with other regional partners.

The Emergency Operations Training Facility is a multi-purpose building that includes training classrooms for Minneapolis firefighters and metro emergency managers, a strategic information center for the Minneapolis police, the main training site for the State of Minnesota Structural Collapse Team, and an emergency operations center that will be used during significant emergencies or disasters.

The new facility is built on a 12-acre site in Fridley that the City purchased in 1990, and since that time, the site has been built out as a training facility for Minneapolis Firefighters. Over the years, a fire training tower and propane burn building have been constructed, and special equipment has been purchased to help train emergency responders for incidents involving hazardous materials and collapsed structures. The construction of the new Emergency Operations Training Facility on the site is a major step toward completing this training and response site.

The Emergency Operations Training Facility is built to a LEED Silver Quality Standard for sustainability, and it includes facilities for a wide range of emergency responders from Minneapolis and the region:

Emergency Operations Center

One of the lessons learned from the City's response to the Interstate 35W Bridge collapse in 2007 was that the City's Emergency Operations Center, located in the basement of City Hall, was too small to serve as a center for large-scale emergencies. The new facility fixes that, with 2,800 more square feet of floor space. It will also be used as a back-up Emergency Operations Center for the State, Hennepin County and the City of St. Paul.

Strategic Information Center

The Strategic Information Center is a new space where the Minneapolis Police Department will analyze data to determine long-range trends that pose potential risks to the city. It can provide emergency managers with important information during a major event, incident or disaster.

State of Minnesota Structural Collapse Team

This team serves the entire state with specialized equipment and trained personnel for urban search and rescue and structural collapse incidents. This facility will include apparatus bays for storage of emergency response vehicles and specialty equipment for the Coast Guard, State, City and Metro West region of Homeland Security. In addition, this facility will house training and classroom space, staff offices, support spaces and common spaces.

Coast Guard monitoring.

The U.S. Coast Guard will also use the facility as a monitoring location for cameras placed along the Mississippi River from St. Louis to the metro area.

Published Nov. 4, 2010

Moar casual Google Mapping:

google-streetview-mpls.png

Apparently they dropped a cool $50K on the fence in early 2012. here is the bid page "To furnish all labor, materials, equipment and incidentals necessary to accomplish the complete construction of Emergency Operations Training Facility Perimeter Fence Project, located at 25 37th Ave NE, Fridley, MN." SRC: Minneapolis, City of - Projects. [A little more on the fence industrial complex below]

google-streetview-mpls2.png

Of course, once Erin Brockovich samples those weird adjacent holding pond things, I'm sure the infamous Fridley Cancer Cluster case will be solved. Perhaps Sgt. Garcia can go out and take some samples!

google-map-mpls1.png google-map-mpls2.png

I believe at least two of structures are firefighter training buildings - later pics below seem to bear this out.

eoc-marketing-swag1.pngHere is some marketing swag about the video conferencing gear. AVI-SPL Integrates Government Emergency Operation Centers. See the PDF and video too.

eoc-marketing-swag2.pngLet's check out the $330,704 in electronically-created yet borrowed-at-interest-from-private-Fed-cartel recently invested in this barbecue monitoring center. Official less-than-informative stimulus info page: Minneapolis Recovery - City of Minneapolis Minneapolis Police Strategic Information Center.

[Naturally it is funded by the electronically created debt-digits from the Department of Justice Bureau of Justice Assistance (BJA), the same endless police pork hub that brought us all those "you might be a terrorist if you pay in cash" type intel flyers for everything from hotels to hobby stores - many of those flyers were financed by Grant Number 2007-MU-BX-K002, which I included ironically on my own site's banner art. Google it for lulz!] Here's that official page:

The City of Minneapolis is not a primary recipient on this project. No Federal Report XML is submitted for this project.

Dollars Awarded

$330,704

Project Status

Fully completed

Project Description

To establish integrated crime analysis in cooperation with the St. Paul Police Department. Staff will be located in a joint Strategic Information Center (SIC).

Funding Program

MN Department of Public Safety: Byrne Justice Assistance Grant

Responsibility for Implementation

Police Department

Funding Agency

US Department of Justice [BJA/Recovery Act]

Dollars Leveraged

Data not yet available.

Dollars Leveraged Description

Data not yet available.

Dollars Requested

$330,704

Projected Jobs Created

2

Award Type

Grant

Sub-recipient Names

Minneapolis, City of

Vendor Names

No vendors have been contracted to date.

Recovery Funds Spent to Date

$330,704

Perhaps this is even the 'secret' location Tippy spycams are constructed: a while ago prankster MPD Spokester & PIO Jesse Garcia shared pics of a camera construction room & with all the other video rigs this seems a likely spot.

Anyway finally here is the email chain which prompted this line of research. There are surely other gems, we are just barely getting started. Circa page 109 of Part 1:

strategic-center-targets-barbecue.png

The public servant on some of these emails is one Minneapolis Police Department officer Steven Otteson, who has a decidedly low Internet profile.

Poking for traces of intrepid Strategic Facebooker Otteson turns up very little - even though the email is dated June 2012, he has no listed salary on this MPD salary list: My Docstoc. Crossposted the index here: 2011 Minneapolis Police Dept Gross Salary index for Web.

A news story indicated the supervisor of the Strategic Information Center is MPD Lt. Jeff Rugel at 612-673-3428. Page 112:

rugel-bbq.png

"Why are we not getting this stuff from the SIC?" Here is stuff about why they should not have to "spend time looking it up" and it should be run through the SIC... This could kind of be the crux of the whole issue here on Page 114:

sic-track-occupy

Alright, that covers some of the new data on this SIC thing vis-a-vis obsessing on Occupy events, so let's turn to the news coverage of this facility.

Carefully shaped news coverage: Mid-2012 saw a series of mainstream media items intended to shape public perceptions this center is designed to neutralize the threats from the surveilled populace. WCCO went so far as to call it a "secret location". That is some quality Fourth Estate right there.

Coverage for this "City of Eyes" facility on WCCO March 19 2012 (video) City Of Eyes: Your Camera May Help Mpls Police Fight Crime « CBS:

MINNEAPOLIS (WCCO) – Minneapolis police are the first in the country to merge two technologies to help officers fight crime.

The Minneapolis Police Department has combined shot spotter technology and a system of cameras to help catch criminals in the act.

Authorities allowed WCCO-TV’s Reg Chapman into a secret location in Minneapolis, where a strategic information center is housed.

Minneapolis Police Deputy Chief Rob Allen said the room is where police gather intelligence.

“This is the room where we try and fuse the technology we have to monitor video cameras, to monitor the sounds of possible gunshots, and it’s where we have our officers who are trained in intelligence gathering,” he said.

The system in the room is like CBS’ Thursday night show “Person of Interest,” in which cameras are used to help save people from becoming victims of crime.

“If you can anticipate where crimes might happen, you got a far better chance of preventing them from occurring,” Allen said.

According to Allen, when a gunshot goes off, a camera turns toward the source of the sound. Strategic Information Center Commander Lt. Jeff Rugel said the technology helped solve a case where a man was shot, killed and pushed out of a moving car. The sound of the gunfire activated the cameras, which gave police their first clue.

[......]City Of Eyes

The number of cameras connected to the intelligence system is growing and helping police catch more criminals. But not all the cameras are owed by the city.

“The city owns roughly 250 cameras,” Allen said. “We can access right now … an infinite number of cameras.”

According to Allen, any camera that has an IP address, is connected to the Internet, and that police have permission to use can give information to authorities.

So whenever you are in a public space, know that you’re likely on camera. Police are using portable cameras more now than ever. They can put them where they are needed and have one up and running within an hour of the order.

Invasion Of Privacy?

But what about your right to privacy? Police say they are careful not to infringe on anyone’s rights.

“Every time we installed a camera system, we went to the neighborhood and said, ‘You know, this is what we’ve thought about doing? Do you want it or not,’” Allen said.

He says police can’t look into a place where someone has the expectation of privacy. [magic filters eh?] But police still have a wide reach, which gives criminals a greater chance of getting caught on camera.

Crime patterns are currently moving and Minneapolis police hope to add more portable cameras. Police believe if criminals know they are being watched they are more likely not to commit crimes.

Star Tribune writes about this center using Facebook to watch what the state defines as "gang members" (mysteriously, shady rich Caucasian financial operatives never seem to meet this race/age/wealth-biased deviance category schema).

Of course, this week's data release shows this has bloated out to canvassing political movements without even the semblance of illegal activity... there is no "barbecue predicate" but there are of course hourly wages to be paid by Minneapolis taxpayers for monitoring the barbecue Facebook Event. Perhaps even overtime!

Gangs sometimes fire first shots online | StarTribune by Matt McKinney July 14 2012:

Facebook has become a virtual street corner where members trade threats, mourn the dead.

"It's probably no different than any other kids, right?" said Minneapolis police Lt. Jeff Rugel. "They're sharing stuff that they used to do face-to-face or over the phone. But there's criminal stuff." [.....]

Rugel runs the police department's Strategic Information Center, where officers use technology to track crime. One of the jobs in his office amounts to monitoring Facebook full-time. They understand the teen slang and filter through thousands of innocuous and inane comments to look for the few that could solve a crime or stop one before it happens. They try to draw connections out of the Facebook networks to help document the shifting alliances on the street.

Police were aware of Facebook threats between rival gangs weeks before the shooting that killed Nizzel, but the threats weren't specific. When Rugel and his staff sees something that looks like trouble -- a known gang member says he's going to hurt someone -- they pass the information along to officers on the street.

It's a poorly kept secret that the police watch Facebook, said Rugel.

"You see comments every once in a while. 'Don't put that on Facebook. You know who's looking at it,' " he said.

Despite some users' occasional concern, many of the Facebook users monitored by police flaunt their illegal behavior online, showing themselves smoking marijuana, posing with stolen merchandise, the security tags still attached, and making gang signs. [.....]

There was also some bidding information online about the estimated $50,000 fence around the facility. Emergency Operations Training Facility Perimeter Fence Project (eBidDoc #1810882) contact: David Schlueter phone: 612-673-2834 e-mail: david.schlueter@ci.minneapolis.mn.us bid date: 01/25/2012 10:00:00 AM

Try http://io.questcdn.com/questio/projects/planholder/planholder_list.html?jobPK=1810882&userPK=&modifiable=FALSE&isQCPI=TRUE

strategic-center-fence-bidding.png

//////

garcia-yatedo.pngSome other stuff: for what it's worth, this lists PIO Jesse Garcia as being based at the Strategic Information Center.Minneapolis Police Department Employees - Professional Experience,Email,Phone numbers..Everything!: Digging deeper to: Jesse Garcia III - Strategic Information Center, Minneapolis Police Department:

It was scraped off his LinkedIn - no surprise there. But no one put it together... Jesse Garcia III | LinkedIn. I think it would be great if state law were changed so that Garcia could be cross-examined by taxpayers about the flow of drug money through the Federal Reserve Bank of Minneapolis and its member banks, let's say once a month on live community access TV. Looks like he ought to be tapped into that gigaflow of data on bankster crime intel!

Strategic Information Center

Minneapolis Police Department

September 2010 – Present (2 years 5 months)

I am a supervisor in our new intel center that focuses on:

-gang intel

-crime intel

-real time officer assist

-safety camera analysis

-Emergency Operations Center readiness

jesse.garcia@ci.minneapolis.mn.us

Public Information Officer / Media Relations

Minneapolis Police Department

October 2007 – September 2010 (3 years)

More media: Vehicle data, email access among Minneapolis legislative issues | MinnPost - Karen Boros, Nov 2, 2012. Automated License Plate Reader (ALPR) including of course the "secret" camera on nearby Plymouth Ave. N. bridge is controlled from this "Strategic Information unit" according to the article - I would assume this is the same spot it's based, unless it is somehow split:

Currently, the Minneapolis Police Department uses cameras to record the license plates, time and location of vehicles. That data is now public information that can be obtained by anyone requesting the information.

“Our concern is that if it stays public data that people can use it for inappropriate purposes,” said Deputy Chief Robert Allen. The system now doesn’t allow police to inquire how it might be used. “We’re not allowed to make a judgment,” he said.

Access to the data is controlled by about a dozen people working in the department’s Strategic Information unit.

Alright this is taking more than long enough. This thing says it is 22,178 sq ft and it is on parcel 34-30-24-43-0009.

Minneapolis, City of - Projects: An estimated $1.5 million were bid on this beast for just a small chunk of the building, closed Feb 2012.

directions to site: 25 37th Ave NE Fridley, MN 55421

bids close: 02/23/2012, 10:00:00 AM

bids received by: City of Minneapolis Purchasing Department CONSTRUCTION OF THE EOTF APPARAUS BAY ADDITION 330 Second Avenue South Suite 552 Minneapolis, MN 55401

estimated value: $1,500,000.00

project completion date: 08/15/2011

pre-bid meeting information: A Pre-Bid Meeting and site tour will be held on February 15th, at 11:00 AM, Local Time in Room 128 at the Emergency Operations Training Facility located at 25 37th Ave NE, Fridley MN. All interested bidders should attend this meeting.

addenda: 1

project description: Scope of Work Includes: Complete construction of the Apparatus Bay Addition at the City of Minneapolis Emergency Operations Training Facility. This work shall include all labor, equipment, materials, installation, handling, delivery at site, necessary insurance and permits, erection and other required items for general, civil, landscaping, demolition, structural, architectural, mechanical and electrical construction and stability as shown on the plans and specifications.

additional description: This Contract contemplates the complete construction of the Emergency Operations Training Facility Apparatus Bay Addition for the Minneapolis Fire Department located at 25 37th Avenue NE., in Fridley, all in accordance with the Contract Documents. This Project has been designed to comply with the requirements of the State of Minnesota Sustainability Building Guidelines B3 (MSBG B3) Version 2.1 and also the U.S. Green Building Council’s Leadership in Energy and Design ( USGBC LEED®) Rating System. It is the intent of this Contract that the Project shall become MSBG B3 Version 2.1 Certified and LEED® SILVER level of quality building under the LEED®-NC Rating System. Work to be performed consists of the furnishing of all materials, machinery, equipment, labor, supplies, tools, transportation, and other incidentals necessary or convenient to complete the work as shown in the Contract Documents on file in the Minneapolis Finance Department, Property Services Division and with the Purchasing Agent of the City of Minneapolis.

owner: City of Minneapolis

350 South 5th Street, Room 223

Minneapolis , MN 55415

ph: 612-673-3774

contact: Chris Backes e-mail: chris.backes@ci.minneapolis.mn.us

Soliciting Agent: Soliciting agent

Minneapolis, City of

330 2nd Ave. S. Suite 552

Minneapolis, MN 55415

ph: 612-673-2834

fax: 612-673-3565

contact: David Schlueter e-mail: david.schlueter@ci.minneapolis.mn.us

It was used to host a session of the 10,000 Lakes Chapter of the International Code Council. [pdf]

The site's address is place on things like preparedness for your pet: Emergency Preparedness - City of Minneapolis && stuff about exercises (again on the sidebar) City Preparation - City of Minneapolis - the 'meh' front page: Emergency Preparedness - City of Minneapolis. Really need to improve page titles at the city. Perhaps after the election?

Awards - City of Minneapolis:

Minneapolis wins its second Tekne Award

Minneapolis Emergency Operations Training Facility

November 2011: The Minnesota High Tech Association recognized the City of Minneapolis and its Emergency Operations Training Facility with an award at the 2011 Tekne Awards, held Nov. 3 at the Minneapolis Convention Center. The Tekne Awards recognize Minnesota companies and individuals who have shown superior technology innovation and leadership.

The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.

The Minneapolis Fire Department, Police Department, and Emergency Management division opened the EOTF/SIC in August 2010 as a place where they and other emergency responders could coordinate more closely than had ever been possible before. The facility recently demonstrated its effectiveness during the response to the May 22 tornado that struck north Minneapolis.The multi-purpose building also provides training space for emergency responders.

Here it was, the first one: Minneapolis Emergency Operations Training Facility wins Tekne award - City of Minneapolis: The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.... and earlier: Oct 18, 2011: Minneapolis Emergency Operations Training Facility a finalist for Tekne award - City of Minneapolis

Mpls. Unveils New Emergency Operations Center | Crime | Downtown News - Nov 4 2010, KSTP Gail Brown: Congressman Keith Ellison secured $750,000 for the project in a 2010 appropriations bill, and he will be attending a ribbon cutting ceremony at 2:30 p.m. along with Minneapolis Mayor R.T. Rybak, City Council President Barb Johnson and other city leaders.

Ellison Secures $750,000 for Minneapolis Emergency Operations Center - Ellison.House.gov Oct 15 2009:

Washington, D.C. – Congressman Keith Ellison (D-Minneapolis) secured a $750,000 appropriation for the City of Minneapolis to build a new Emergency Operations Center in a bill approved by the House today. The funds were included in H.R. 2892, the Homeland Security Appropriations Bill for FY 2010.

Roughly the same stuff in this Council Prez Barb Johnson doc.

It's on Pinterest - see Government & Military for tons of funny stuff including everything from the avispl swag people above. And also: AV Products We Love / Minneapolis Emergency Operations Training Facility

There is a blog post about training there on the Mpls Dept of Civil Rights by Anthony Johnson - Civil Rights Urban Scholars with a helpful slideshow. Tony’s Voice: Our Day As Fire Fighters! | Minneapolis Department of Civil Rights.

strategic-center-3.png strategic-center-2.png strategic-center-1.png

I think you can see this fire training structure (or maybe a similar one) on Google Maps though I have not swung by to check out the Facility myself. Another one:

Minneapolis Emergency Services Employ projectiondesign - AVNetwork.com (undated? A couple pix included)

Fredrikstad, Norway--The City of Minneapolis has deployed 12 projectiondesign F32 DLP projectors as the main display source in the Analyst Room and F22 series projectors in the Incident Command Room of its Emergency Operations Training Facility (EOTF).

Located just outside Minneapolis, the EOTF boasts an extensive surveillance, audiovisual and network infrastructure specified and installed by systems integrator AVI-SPL.

“In a facility like this, even the slightest compromise in performance can result in tragic consequences,” said Fred Primoli, regional VP Sales for AVI-SPL. Primoli and his colleagues worked with the city for nearly two years on the concept, planning and final implementation of the EOTF, with the primary challenge being an interesting one: the creation of a state-of-the-art communications facility that may get activated no more than once in a decade.

“We needed systems that were capable of totally robust operation 24 hours per day, seven days per week – but which also were capable of performing at their best after extended periods of inactivity.

“From the outset we were delighted with the performance of the F32 projectors. The Analyst Room has three rear-projection screens, each measuring 160 inches wide by 120 inches tall, with four projectors driving each screen so that four separate windows can be shown on each one.

“The projectors have been superbly colour-matched to ensure consistency across each screen, while their excellent resolution, contrast and brightness mean they are equally at home showing video or data sources – which is important in an installation such as this where the staff need to a view a combination of both.”

Deputy Chief Robert Allen, a veteran of the Minneapolis Police Department, said: “The new display system allows us to look at a video feed and understand a situation almost instantly. Through video, we can get information to our officers much faster – especially when time is critical. We can zoom in with our cameras and really examine a situation and relay it back to our officers, allowing them to be prepared even before they get there. With this new technology, we can see something happen faster than a police offer 50 feet away.”

F22 series projectors from projectiondesign can also be found in the EOTF’s Incident Command Room that’s used for emergency training and an actual declared emergency.

“There is a large number of emergency monitoring projects in the U.S., and we are delighted that our technology has been used to display high-resolution security-camera images in so many of them," said Anders Løkke, marketing director, projectiondesign. "The Minneapolis EOTF already demonstrated its effectiveness during the tornado that swept through the area last May and, although we would prefer it if our systems never had to be used in similar situations again, the reality is that the city is better-protected now that its providers of emergency services have such easy, immediate and accurate access to security-camera imaging from so many locations.”

“The EOTF was conceived as a place where the various Departments responsible for emergency response and management in Minneapolis could co-ordinate their efforts more closely than had previous been possible,” said Primroli.

Same stuff as May 11, 2012: Minneapolis Emergency Services Goes with Projectiondesign - Fire Apparatus

On May 20 2011 CItyPages reported on Rocco Forte, former Minneapolis fire chief, departing, and Forte talked about being pleased to help finish the complex: "After the 35W bridge collapse, the Republican National Convention, and the tornado that went through South Minneapolis, it is clear that we have one of the finest emergency management teams in the country. It was also a long time goal of mine to complete the Emergency Operations Training Facility that includes an Emergency Operations Center, Strategic Information Center as well as a training facility which seats up to 250 people per day."

Reed Construction Data estimates its cost at $3,988,400 (a more accurate cost estimate is available from RSMeans Online), they say.

There are a couple autogenerated links at Facility Management Minneapolis Product From Industrial Manufacturers, Distributers, Suppliers And OEMs.

There is some PR speak about AVI-SPL getting an award. Press Release/ InfoComm, Sound & Video Contractor Honor AVI-SPL with Two PRO AV Spotlight Awards - Audio/Video Equip./Surveillance - AVI-SPL, Inc. | PRZOOM

On March 11, 2009, the overall cost of the project was pegged by House Research as $27,403,000. SRC: www.house.leg.state.mn.us/hrd/bs/86/hf0554.pdf

This bill would grant $8,000,000 in bond proceeds to the City of Minneapolis to design, construct, furnish, and equip an emergency operations center housed in the City’s current training center and to make other improvements to the training center.

According to the 2008 budget request, the overall cost of the project is $27,403,000 with the City and Hennepin County funding the non-state funded portions of the project. The Joint Emergency Operations Center (EOC) for Hennepin County and the City of Minneapolis will be located at the Minneapolis Fire Training Campus on city owned land. The City contends the current facility is inadequate and limits the effectiveness of the command structure. The City further contends that the Minneapolis Fire Training Campus is an ideal location for the EOC as it would provide a secure operations center with enough room to respond to a major incident affecting the county. Finally, the City believes this request would provide much needed training classrooms at the Minneapolis Training Facility which is the main site for training the State Structural Collapse Team.

HF 554 Status in the House for the 86th Legislature (2009 - 2010) - this is the bill number - I suspect it probably got rolled into the omnibus bill but I will leave that to a Deep Wonk to suss out. // H.F. No. 554, as introduced - 86th Legislative Session (2009-2010).

With a pretty severe shortage of funds for both state and municipal operations, is an open-ended SIC mandate to track protest activity on Facebook really the most prudent use of funds? And doesn't this operational configuration create a chilling effect on political expression in Minneapolis? The research continues....

Federal Homeland Security TSA VIPR Team & #VikingsDrone: Suspicious drone & Feds spotted at Vikings/Packers game

Things are a little strange at the Vikings/Packers Game today. A drone has been photographed hovering around the Metrodome fan plaza on the west side, and a Homeland Security / TSA "VIPR" team has been hanging around as well, indicating the federal government is shifting into "protecting" the major Spectacles at taxpayer expense.

My friend Nathan Hansen noticed the #VikingsDrone and the VIPR team, documenting & posting them on twitter @nathanmhansen. [Note: awhile back I did a 'lil client design work for Hansen.]

//// UPDATE 12:15PM Monday: According to @TCRover, a branch of the Pioneer Press, the drone was NOT operated by the government but rather some production company. The pic they say is from the crew flying it earlier: See https://twitter.com/TCRover/status/285560684245315585/photo/1 . Nonetheless we still need to deal with the impending prospect of government & contractor drones filling our airspace - and indeed this story has prompted others to discuss other sightings near government sites. //// 2:20PM update: It's annoying that they tried to tweet @ me last night but it never turned up in my timeline so I didn't find out until today. I would have much preferred to straighten it out immediately! Also, here's what's going on with drones in Oklahoma... Follow my friend @axxiom for more. ////

PHOTO sources: yfrog Fullsize - http://twitter.yfrog.com/h41hxevhj // yfrog Fullsize - http://twitter.yfrog.com/o0mkqkobj // yfrog Fullsize - http://twitter.yfrog.com/oemubbyj // VIPR Team: yfrog Fullsize - http://twitter.yfrog.com/odjd2ybj

odjd2ybj.jpeg h41hxevhj.jpeg

You can see the four rotors pretty well on these pics. It is comparable to the sports photography drone linked below as well - I figured it might just be a civilian hobbyist drone or some weird sports media project drone until the VIPR team was found by Hansen.

mkqkob.jpg mubby.jpeg

I am just delighted that the national government had to borrow more money at interest from the Federal Reserve System in order to send out these guys and their fancy flying spy robot to the Vikings/Packers game. We get the twin benefits of national debt slavery AND a surveillance state with nothing useful to do!

Our friends at WTFNews cranked out a quick post on this already: Unidentified Drone Spotted at @Packers-@VikingsFootball @NFL Game » WTF RLY REPORT

Let's Ban This Drone Operation in Minneapolis: Already Minneapolis activist Kurtis Hanna has suggested a petition to get drones banned on the city charter. (come to think of it, wouldn't it be good to get something like the White House petition site for the Mpls Charter Commission?) I will include some info below on this.

The Department of Homeland Security and the National Football League have a burgeoning relationship. Previously when I wrote up a post on the relatively new and totally off-the-radar Homeland Security Investigations division (basically their own militant version of the FBI, intended to reach BATF-level org status) they did a drill black helicopter landing on the Super Bowl field. [yes really - HSI is so new I must have been the first person to satirize its absurdities on the whole interweb!] See April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

The Super Bowl and World Series are also both declared National Special Security Events, which activates a fat block of overtime for many federal police agencies, much like the Republican & Democratic National Conventions. (However, since rioting at sports events is closer to the booze-soaked Id of the American public than more 'political' street upheavals, it doesn't meet the same heavy hand from federal & local police agencies) NSSEs generally feature Homeland Security, FEMA and the Secret Service operating at a high tempo, another thing that HSI & TSA are getting involved with as a 'filler force' if you will.

For Super Bowl NSSE info see: Super Bowl XLVI, NSSE & Big Sis - YouTube // www.secretservice.gov/press/pub0202.pdf on Bowl XXXVI // this crazy PDF: rnc08report.org/engine/uploads/1/Day-2-Breakout-2-NSSE-Carillo-Lowry-Lumley.pdf // Infowars » Indy Super Bowl: National Security State Protects Sports Fans from Prostitutes // National Special Security Events: 8. NSSE Fill-in Fact Sheet // Article Detail - Domestic Preparedness via LLIS.gov // etc

Federal VIPR teams: been popping up in all sorts of places. Here's the Wiki page. Wiki notes GAO attributes their existence to a Reaction to the shady Madrid train bombings. VIPR is trying to get at pro sports & local transportation (the Hiawatha light rail has a station close to where they were photographed) and wherever else they can normalize their presence. In this case the VIPR deployment apparently includes at least a half-dozen uniformed officers and at least one drone.

Additionally there was strange audio interference right before a commercial break in the first half, kind of like the sound a cell phone makes when its microwave signal induces noise in a speaker or electronics. However, I don't think game-day satellite transmissions go straight over-the-air from the Metrodome, as there aren't really satellite dishes around there I've noticed. Thus it seems unlikely to me that the one spotted drone would have glitched the transmission. Perhaps unrelated but also something you don't usually see. I blame Wisconsin FalseFlag types for this noise, whoever that might be :-P

SEE ALSO:

The drone does look similar to the one in this story. New use for drones: Sports photography - CBS News

Oh this is great. Perhaps the best link I've found in this. "PUT [VIPR] TEAMS TO WORK FOR YOU" VIPR teams and pipelines!! A "no cost resources for expanding and enhancing your security". Free oil goon security? Screw that: www.dleg.state.mi.us/mpsc/gas/download/2011SS-2-4-VIPR_Handout.pdf

May 2012: TSA VIPR Team Spotted at… Detroit Music Festival?? « TSA Out of Our Pants!

CNN Jan 28 2012: TSA rail, subway spot-checks raise privacy issues - CNN.com

VIDEO Blackburn Questions TSA Officials on VIPR Teams - YouTube

VIDEO TSA VIPR Teams in Greyhound Bus Station Tampa FL 02/16/2010

TSA deploys 'VIPR' teams throughout Tennessee to set up illegal security checkpoints on interstates - NaturalNews with a bunch of other links including: TSA-style full body pat-downs coming to an NFL stadium near you (Sept 2011) etc

6 USC § 1112 - Authorization of Visible Intermodal Prevention and Response teams | LII / Legal Information Institute. So they are doing this about the Hiawatha light rail officially I would guess. This would also signify that Metro Transit would have some record of the situation if "consult" in Sec.4 has occurred

(a) In general

The Secretary, acting through the Administrator of the Transportation Security Administration, may develop Visible Intermodal Prevention and Response (referred to in this section as “VIPR”) teams to augment the security of any mode of transportation at any location within the United States. In forming a VIPR team, the Secretary—

(1) may use any asset of the Department, including Federal air marshals, surface transportation security inspectors, canine detection teams, and advanced screening technology;

(2) may determine when a VIPR team shall be deployed, as well as the duration of the deployment;

(3) shall, prior to and during the deployment, consult with local security and law enforcement officials in the jurisdiction where the VIPR team is or will be deployed, to develop and agree upon the appropriate operational protocols and provide relevant information about the mission of the VIPR team, as appropriate; and

(4) shall, prior to and during the deployment, consult with all transportation entities directly affected by the deployment of a VIPR team, as appropriate, including railroad carriers, air carriers, airport owners, over-the-road bus operators and terminal owners and operators, motor carriers, public transportation agencies, owners or operators of highways, port operators and facility owners, vessel owners and operators and pipeline operators.

(b) Authorization of appropriations

There are authorized to be appropriated to the Secretary to carry out this section such sums as necessary for fiscal years 2007 through 2011.

Process for City Charter Amendment for banning these drones: Sent along by Kurt Hanna who thinks that "10,791 valid signatures of Minneapolis residents who are registered voters in order to qualify for the ballot" based on the figure of 215,806 voters voting last time. Citizen petition timeframe link. BUT: How much time do we have to gather these signatures?

Some more info: Via Minneapolis City Charter: http://library.municode.com/HTML/11490/level2/SUHITA_CH.html

(1) The methods available for amending a home rule city charter are contained in Minnesota Statutes, Section 410.12 et seq., which provides as follows:

(1) 410.12 AMENDMENTS. Subdivision 1. Proposals. The charter commission may propose amendments to such charter and SHALL DO SO upon the petition of voters equal in number to five percent of the total votes cast at the last previous state general election in the city.Proposed charter amendments must be submitted at least 12 weeks before the general election. Only registered voters are eligible to sign the petition. All petitions circulated with respect to a charter amendment shall be uniform in character and shall have attached thereto the text of the proposed amendment in full; except that in the case of a proposed amendment containing more than 1,000 words, a true and correct copy of the same may be filed with the city clerk, and the petition shall then contain a summary of not less than 50 nor more than 300 words setting forth in substance the nature of the proposed amendment. Such summary shall contain a statement of the objects and purposes of the amendment proposed and an outline of any proposed new scheme or frame work of government and shall be sufficient to inform the signers of the petition as to what change in government is sought to be accomplished by the amendment.The summary, together with a copy of the proposed amendment, shall first be submitted to the charter commission for its approval as to form and substance. The commission shall within ten days after such submission to it, return the same to the proposers of the amendment with such modifications in statement as it may deem necessary in order that the summary may fairly comply with the requirements above set forth.

Subd. 2. Petitions. The signatures to such petition need not all be appended to one paper, but to each separate petition there shall be attached an affidavit of the circulator thereof as provided by this section. A petition must contain each petitioner's signature in ink or indelible pencil and must indicate after the signature the place of residence by street and number, or their description sufficient to identify the place. There shall appear on each petition the names and addresses of five electors of the city, and on each paper the names and addresses of the same five electors, who, as a committee of the petitioners, shall be regarded as responsible for the circulation and filing of the petition. [........]

(1) Subd. 3. May be assembled as one petition. All petition papers for a proposed amendment shall be assembled and filed with the charter commission as one instrument. Within ten days after such petition is transmitted to the city council, the city clerk shall determine whether each paper of the petition is properly attested and whether the petition is signed by a sufficient number of voters. The city clerk shall declare any petition paper entirely invalid which is not attested by the circulator thereof as required in this section. Upon completing an examination of the petition, the city clerk shall certify the result of the examination to the council. If the city clerk shall certify that the petition is insufficient the city clerk shall set forth in a certificate the particulars in which it is defective and shall at once notify the committee of the petitioners of the findings. A petition may be amended at any time within ten days after the making of a certificate of insufficiency by the city clerk, by filing a supplementary petition upon additional papers signed and filed as provided in case of an original petition. The city clerk shall within five days after such amendment is filed, make examination of the amended petition, and if the certificate shall show the petition still to be insufficient, the city clerk shall file it in the city clerk's office and notify the committee of the petitioners of the findings and no further action shall be had on such insufficient petition. The finding of the insufficiency of a petition shall not prejudice the filing of a new petition for the same purpose. (Back)

(1) Subd. 4. Election. Amendments shall be submitted to the qualified voters at a general or special election and published as in the case of the original charter. The form of the ballot shall be fixed by the governing body. The statement of the question on the ballot shall be sufficient to identify the amendment clearly and to distinguish the question from every other question on the ballot at the same time. If 51 percent of the votes cast on any amendment are in favor of its adoption, copies of the amendment and certificates shall be filed, as in the case of the original charter and the amendment shall take effect in 30 days from the date of the election or at such other time as is fixed in the amendment.

An amusing side question: is this "magick" security theater? Security Theater of course works most "effectively" at materializing psychological phantoms with an audience at a Spectacle. This is the perhaps the principle Stimulus Effect intended by Homeland Security & its general orientation around 'visuals' which is not that different than Ceremonial Magick, which is [arguably] anything that generates a certain sense-impression in the mind of Observers.

metrodome-national-guard.jpeg

Another old backstory: In 2010 some people noticed they were using government photos of MN National Guard riot control gear from the deployment at the 2008 Republican National Convention under the NSSE system for recruitment propaganda on the Metrodome. RNC '08 Report: Our News: National Guard advert on Metrodome, proposed site of 2012 DNC, depicts soldiers deployed against protesters during 2008 RNC. Your tax dollas at work!

Syndicate content