War on Terror

Return of the Eschatological Scheme: In Islamic State / ISIS geopolitical void, former Egyptian Jihadi Chief Sheikh Nabeel Naiem cites "Clean Break" strategy as overall US/Israeli game plan for Middle East

NabilNaeemAbulFattah3.png

"This is the Fourth-Generation Warfare, agents instead of soldiers…"

Lending unexpected credence to a hunch, a jihadi legend, Sheikh Nabeel Naiem, claimed on Lebanese television that the "Islamic State" (ISIS/ISIL) situation was congruent with a "Clean Break" document attributed to Cheney, neoconservatives associated with Netanyahu, & the Project for a New American Century (PNAC) crowd.

NabilNaeemAbulFattah1.png

The overall plan to "balkanize" the Middle East goes back before World War I & in British plans to try to get Greater Turks to rebel against Imperial Russia - today, the US, Israel, Saudi Arabia, Turkey, Qatar, Iran & others play dangerous games in supporting different militant movements. As in 1996, when the Clean Break plan was published, the Netanyahu crowd calls the shots in Tel Aviv. (That was the year he first took office)

NabilNaeemAbulFattah2.png

The jihadi veteran (who led Egyptian Islamic Jihad from 1988 to 1992, jailed by Mubarak from 1991 until the regime collapse in 2011) helps point out the ISIS overall scheme. He explains how Saudi intelligence configured his financing for terror camps & Afghanistan operations in the 1980s, giving his incredulous jihadi veteran high-level manager perspective to how ISIS started at well-funded camps in Jordan with US (CIA) support. "It wasn't a loose charity" back in his day!

NabilNaeemAbulFattah5.png

He concludes overall that the plan is to get Sunnis & Shiites fighting each other under the general rubric of a Clean Break-like super-beef among Middle Eastern peoples, therefore a plan must be put up to get people to think clearly and avoid space cadet takfiri thinking, offering alternatives. The whole video is worth watching:

See previously: Jordanian prince discerns suppressed American/Israeli extremist plan to shatter Arab nationalism into statelets: Re-Ottomanization & Oded Yinon revisited | HongPong.com [April 2007]. On March 17 2003 I wrote a post on everything2.com about 'A Clean Break: A New Strategy for Securing the Realm' which I think still holds up quite well today including the emphasis on consequences for Syria. I also interviewed Prof. Rashid Khalidi that year touching on 're-ottomanization' & the Clean Break approach - excerpted below. It is weird to peg something like this so long ago and have it continue to roll along 11 years later...

It's hard to judge this guy's credibility - purportedly a high-level coordinator between intelligence agencies and Islamist field rebels, living with Zawahiri & playing a key role assassinating Anwar Sadat.

I have not seen any video illustrating the conflict at this level & over the 40 minutes -- the host tries to draw him to more practical concerns and he later brings it back to explain how Clean Break style tactics are the intent of the West at this time. We can sense this is a priority he wants attention put to. Also he has some laughs about oblivious western journalists reporting individual contributions, missing larger developments completely:

NabilNaeemAbulFattah4.png

Unfortunately there are many other illustrative videos & materials caught behind the language barrier, fortunately this got translated. I couldn't sort out the orientation of the parent YouTube channel but it seems anti-Salafist.

The full transcript provided by SyriaNews.cc is posted after the Clean Break & Yinon Plan. The TV network is also interesting:  Wiki: "Al Mayadeen (Arabic: الميادين‎; English: Public Squares) is a pan-Arabist satellite television channel launched on 11 June 2012 in Lebanon." According to Wiki the program director is a former head of Al Jazeera Beirut & Iran divisions, and most of the staff are former AJ people, Some see it as more aligned with Iran. Kurt Nimmo did a decent writeup on this in PrisonPlanet as well.

Be sure to also read a 2013 interview with him: Egyptian jihadist leader: Bin Laden blew himself up to avoid capture | GulfNews.com:

Sitting in a poor apartment beside the archaic Roman Catholic Patriarch in Al Zaher, one of the oldest neighbourhoods in Cairo, Abdul Fattah recalls his history as a leader of Egypt’s Al Jihad organisation, which assassinated the late president Anwar Sadat in 1981, waged a terrorist war in the 1990s and helped give birth to Al Qaida. He was once “the right arm” of Ayman Al Zawahiri, the former Al Jihad leader who now heads Al Qaida. “I am the one who sent Mohammad Atta to Afghanistan,” Abdul Fattah says proudly of the lead pilot of the September 11, 2001, attacks.

Abdul Fattah was released from prison in March 2011, just weeks after the fall of Hosni Mubarak, who had kept him locked up for 20 years. Al Jihad abandoned violence in Egypt years ago. “We were exhausted,” he says, and at 57, he looks it. The former jihadist concedes that Egypt is headed toward Western-style democracy: “It’s the only available option.”

//////

The Clean Break document written in June 1996 was only one in a track of strategic thinking in Israel associated with Vladimir Jabotinsky's Revisionist Zionist movement which led to the Likud Party & Ariel Sharon's movement to expand West Bank, Gaza & Sinai settlements. Another similar proposal, the "Yinon Plan", was publicized in 1982 by sometimes controversial Holocaust survivor, lecturer & writer Israel Shahak. The Yinon Plan touches on conflict in Libya & Sudan -- areas now in upheaval, part of a broader destabilization triggered by NATO's intervention taking out Khaddafi.


A full copy of Clean Break & the June 2013 Globalresearch.ca version of the Yinon plan by Michel Chossudovksy are attached below.

////////

A Clean Break: A New Strategy for Securing the Realm - Everything2.com - By HongPong - Published Mon Mar 17 2003

"...A report about how Israel could transcend the problems with the Palestinians by changing the "balance of power" in the Middle East, and by replacing Saddam. The hawks saw their big chance after 9/11, but they feared that it would be hard to sell a eschatological scheme to stomp out Islamic terrorism by recreating the Arab world. So they found Saddam guilty of a crime he could commit later: helping Osama unleash hell on us." --Maureen Dowd, Bush Ex Machina, NY Times, Mar. 2, 2003.1
"They could not have known that four years later that the working paper they prepared, including plans for Israel to help restore the Hashemite throne in Iraq, would shed light on the current policies of the only superpower in the world." --Akiva Eldar, Perles of Wisdom for the Feithful, Ha'aretz, Oct. 1, 2002.2

This increasingly interesting document was developed like much democratic government policy today, within the machinations of various think tanks. The 'study' was written for Israel's incoming Netanyahu administration in 1996, by a group of 'prominent opinion makers' for the Israeli-American Institute for Advanced Strategic and Political Studies.

What is surely most important about the document is its authorship. The group leader was Richard Perle, a Jewish neoconservative who hand-delivered the report to Netanyahu himself. Today Perle, nicknamed 'The Prince of Darkness,' sits as the chairman of the Defense Policy Board in the Pentagon. He is a director of the increasingly conservative Jerusalem Post and an architect of foreign policy at the American Enterprise Institute. Perle, certainly, is one of the key government advocates of today's war against Iraq. Other authors have become very important in the Bush circle of advisors as well. Douglas Feith is now Undersecretary of Policy at the Pentagon, a top Rumsfeld adviser. Feith is regarded as a strong believer in Jewish settlement of Judea and Samaria (the West Bank), and a longtime opponent of Arab-Israeli peace agreements in general.3, 4, 5 David Wurmser is now the director of Middle East studies at the powerful American Enterprise Institute. 6 Meyrav Wurmser now heads up the Center for Middle East Policy at the Hudson Institute. Robert Loewenberg also participated in the study in his position as president of the Institute for Advanced Strategic and Political Studies.

These are powerful people in and around the government today. They unquestionably have the president's ear on matters of Middle East policy. Bush's recent Mideast policy speech at the American Enterprise Institute confirmed this.7, 8

The study was written in June 1996, and many political factors have changed around Israel since then. Much of the study involves Syrian 'aggression' and 'challenge' in Lebanon. This situation is different now that Israel has left Lebanon, but the basic hostile arguments towards local regimes remain. Clearly, this document contains advanced strategy about inter-Arab relations, which are conspicuously lacking from the Bush presidency's proclamations towards Iraq and other Middle Eastern issues. The study asserts an understanding of Arab political behavior, and an Israeli right to act with pre-emption to alter the threat from Arab states, regardless of consequences to the United States and the world at large. I am suspicious of the contrast between the Machiavellian strategizing here and the broad generalities about 'democracy' and such waved around by the Bush Administration today.

The basic thrust of the study claims that Israel can 'transcend' its conflict with the Palestinians and Arab world by taking control of its 'strategic environment.' This involves destabilizing various regimes supporting 'terror' and 'challenging' Syria. Overthrowing Saddam Hussein is a "an important Israeli strategic objective in its own right - as a means of foiling Syria's regional ambitions."

It goes on to outline different ideas towards the goal of a "proud, wealthy, solid, and strong" Israel which will escape the conflict, apparently by rearranging the Arab power structure around Israel, finally rendering the Arabs quiescent to Israeli strategic goals. Perle et al. make unusual arguments over 'claim to the land,' in an argument which today is usually invoked to justify the Jewish settlement of the West Bank and Gaza Strip. The settlements are obliquely referred to, as the authors refute the general Oslo principle of 'land for peace,' which usually is taken to mean returning the occupied territories to Arab control.

The study supports a hegemonic view of the military occupation in south Lebanon, let alone the West Bank and Gaza. Relations with the Palestinians are important here, but the references to 'Palestinian controlled areas' or 'Palestinian areas' doesn't reinforce the notion of the West Bank or Gaza as one territorial unit, as the United Nations has demanded. I think this document expresses a normalized view, widespread in 1996 Israel, that the Occupation had been 'solved' and economic growth via settlement expansion was a natural part of the Zionist project. There has been very little public evidence from Perle and his neocon associates to contradict this acceptance of Israeli settlement policy. In the study's remarks on a new spirit for the Zionist project, it is difficult to see that the settlement issue is at all divided from Israeli national interest in any way whatsoever. Ariel Sharon, the undisputed master of settlement construction, finds refuge in this presidency for many reasons.

This document raises some questions.

  • If, in 1996, these neoconservatives believed in Israel "transcending" its conflict, prior to the outbreak of the second Intifada, what do they believe now?
  • As part of the top dozen or so civilian military overseers in the most powerful military in history, what sort of position are they in to make this happen?
  • What impact would a strategy like this have on places like Iran and in particular Syria? What will these men advise be done against 'terrorist' Hezbollah? How will Iran and Syria respond?
  • What understanding of the nation-state are they looking at? Fundamentally, what are these strategists wishing for? Peace?
  • What is the order of things that this document calls for?
In all, it is a fine example of the grand strategic junction we are now finding between Likud interests and Republican interests. Or "Israeli and American interests," as Perle's Jerusalem Post recently put it. Moral "clarity" and the application of military force, oodles of it. I've tried to make some entertaining and enlightening pipelinks which help lead to other information. It's coo like dat.

A Clean Break:
A New Strategy for Securing the Realm


Following is a report prepared by The Institute for Advanced Strategic and Political Studies' "Study Group on a New Israeli Strategy Toward 2000." The main substantive ideas in this paper emerge from a discussion in which prominent opinion makers, including Richard Perle, James Colbert, Charles Fairbanks, Jr., Douglas Feith, Robert Loewenberg, David Wurmser, and Meyrav Wurmser participated. The report, entitled "A Clean Break: A New Strategy for Securing the Realm," is the framework for a series of follow-up reports on strategy.

Israel has a large problem. Labor Zionism, which for 70 years has dominated the Zionist movement, has generated a stalled and shackled economy. Efforts to salvage Israel's socialist institutions-which include pursuing supranational over national sovereignty and pursuing a peace process that embraces the slogan, "New Middle East"--undermine the legitimacy of the nation and lead Israel into strategic paralysis and the previous government's "peace process." That peace process obscured the evidence of eroding national critical mass- including a palpable sense of national exhaustion-and forfeited strategic initiative. The loss of national critical mass was illustrated best by Israel's efforts to draw in the United States to sell unpopular policies domestically, to agree to negotiate sovereignty over its capital, and to respond with resignation to a spate of terror so intense and tragic that it deterred Israelis from engaging in normal daily functions, such as commuting to work in buses.

Benjamin Netanyahu's government comes in with a new set of ideas. While there are those who will counsel continuity, Israel has the opportunity to make a clean break; it can forge a peace process and strategy based on an entirely new intellectual foundation, one that restores strategic initiative and provides the nation the room to engage every possible energy on rebuilding Zionism, the starting point of which must be economic reform. To secure the nation's streets and borders in the immediate future, Israel can:

This report is written with key passages of a possible speech marked TEXT, that highlight the clean break which the new government has an opportunity to make. The body of the report is the commentary explaining the purpose and laying out the strategic context of the passages.

A New Approach to Peace

Early adoption of a bold, new perspective on peace and security is imperative for the new prime minister. While the previous government, and many abroad, may emphasize "land for peace"- which placed Israel in the position of cultural, economic, political, diplomatic, and military retreat - the new government can promote Western values and traditions. Such an approach, which will be well received in the United States, includes "peace for peace," "peace through strength" and self reliance: the balance of power.

A new strategy to seize the initiative can be introduced:

TEXT:

We have for four years pursued peace based on a New Middle East. We in Israel cannot play innocents abroad in a world that is not innocent. Peace depends on the character and behavior of our foes. We live in a dangerous neighborhood, with fragile states and bitter rivalries. Displaying moral ambivalence between the effort to build a Jewish state and the desire to annihilate it by trading "land for peace" will not secure "peace now." Our claim to the land -to which we have clung for hope for 2000 years--is legitimate and noble. It is not within our own power, no matter how much we concede, to make peace unilaterally. Only the unconditional acceptance by Arabs of our rights, especially in their territorial dimension, "peace for peace," is a solid basis for the future.

Israel's quest for peace emerges from, and does not replace, the pursuit of its ideals. The Jewish people's hunger for human rights - burned into their identity by a 2000-year old dream to live free in their own land - informs the concept of peace and reflects continuity of values with Western and Jewish tradition. Israel can now embrace negotiations, but as means, not ends, to pursue those ideals and demonstrate national steadfastness. It can challenge police states; enforce compliance of agreements; and insist on minimal standards of accountability.

Securing the Northern Border

Syria challenges Israel on Lebanese soil. An effective approach, and one with which American can sympathize, would be if Israel seized the strategic initiative along its northern borders by engaging Hizballah, Syria, and Iran, as the principal agents of aggression in Lebanon, including by:

Israel also can take this opportunity to remind the world of the nature of the Syrian regime. Syria repeatedly breaks its word. It violated numerous agreements with the Turks, and has betrayed the United States by continuing to occupy Lebanon in violation of the Taef agreement in 1989. Instead, Syria staged a sham election, installed a quisling regime, and forced Lebanon to sign a "Brotherhood Agreement" in 1991, that terminated Lebanese sovereignty. And Syria has begun colonizing Lebanon with hundreds of thousands of Syrians, while killing tens of thousands of its own citizens at a time, as it did in only three days in 1983 in Hama.

Under Syrian tutelage, the Lebanese drug trade, for which local Syrian military officers receive protection payments, flourishes. Syria's regime supports the terrorist groups operationally and financially in Lebanon and on its soil. Indeed, the Syrian-controlled Bekaa Valley in Lebanon has become for terror what the Silicon Valley has become for computers. The Bekaa Valley has become one of the main distribution sources, if not production points, of the "supernote" - counterfeit US currency so well done that it is impossible to detect.

Text:

Negotiations with repressive regimes like Syria's require cautious realism. One cannot sensibly assume the other side's good faith. It is dangerous for Israel to deal naively with a regime murderous of its own people, openly aggressive toward its neighbors, criminally involved with international drug traffickers and counterfeiters, and supportive of the most deadly terrorist organizations.

Given the nature of the regime in Damascus, it is both natural and moral that Israel abandon the slogan "comprehensive peace" and move to contain Syria, drawing attention to its weapons of mass destruction program, and rejecting "land for peace" deals on the Golan Heights.

Moving to a Traditional Balance of Power Strategy

TEXT:
We must distinguish soberly and clearly friend from foe. We must make sure that our friends across the Middle East never doubt the solidity or value of our friendship.

Israel can shape its strategic environment, in cooperation with Turkey and Jordan, by weakening, containing, and even rolling back Syria. This effort can focus on removing Saddam Hussein from power in Iraq - an important Israeli strategic objective in its own right - as a means of foiling Syria's regional ambitions. Jordan has challenged Syria's regional ambitions recently by suggesting the restoration of the Hashemites in Iraq. This has triggered a Jordanian-Syrian rivalry to which Asad has responded by stepping up efforts to destabilize the Hashemite Kingdom, including using infiltrations. Syria recently signaled that it and Iran might prefer a weak, but barely surviving Saddam, if only to undermine and humiliate Jordan in its efforts to remove Saddam.

But Syria enters this conflict with potential weaknesses: Damascus is too preoccupied with dealing with the threatened new regional equation to permit distractions of the Lebanese flank. And Damascus fears that the 'natural axis' with Israel on one side, central Iraq and Turkey on the other, and Jordan, in the center would squeeze and detach Syria from the Saudi Peninsula. For Syria, this could be the prelude to a redrawing of the map of the Middle East which would threaten Syria's territorial integrity.

Since Iraq's future could affect the strategic balance in the Middle East profoundly, it would be understandable that Israel has an interest in supporting the Hashemites in their efforts to redefine Iraq, including such measures as: visiting Jordan as the first official state visit, even before a visit to the United States, of the new Netanyahu government; supporting King Hussein by providing him with some tangible security measures to protect his regime against Syrian subversion; encouraging - through influence in the U.S. business community - investment in Jordan to structurally shift Jordan's economy away from dependence on Iraq; and diverting Syria's attention by using Lebanese opposition elements to destabilize Syrian control of Lebanon.

Most important, it is understandable that Israel has an interest supporting diplomatically, militarily and operationally Turkey's and Jordan's actions against Syria, such as securing tribal alliances with Arab tribes that cross into Syrian territory and are hostile to the Syrian ruling elite.

King Hussein may have ideas for Israel in bringing its Lebanon problem under control. The predominantly Shia population of southern Lebanon has been tied for centuries to the Shia leadership in Najf, Iraq rather than Iran. Were the Hashemites to control Iraq, they could use their influence over Najf to help Israel wean the south Lebanese Shia away from Hizballah, Iran, and Syria. Shia retain strong ties to the Hashemites: the Shia venerate foremost the Prophet's family, the direct descendants of which - and in whose veins the blood of the Prophet flows - is King Hussein.

Changing the Nature of Relations with the Palestinians

Israel has a chance to forge a new relationship between itself and the Palestinians. First and foremost, Israel's efforts to secure its streets may require hot pursuit into Palestinian-controlled areas, a justifiable practice with which Americans can sympathize.

A key element of peace is compliance with agreements already signed. Therefore, Israel has the right to insist on compliance, including closing Orient House and disbanding Jibril Rujoub's operatives in Jerusalem. Moreover, Israel and the United States can establish a Joint Compliance Monitoring Committee to study periodically whether the PLO meets minimum standards of compliance, authority and responsibility, human rights, and judicial and fiduciary accountability.

TEXT:

We believe that the Palestinian Authority must be held to the same minimal standards of accountability as other recipients of U.S. foreign aid. A firm peace cannot tolerate repression and injustice. A regime that cannot fulfill the most rudimentary obligations to its own people cannot be counted upon to fulfill its obligations to its neighbors.

Israel has no obligations under the Oslo agreements if the PLO does not fulfill its obligations. If the PLO cannot comply with these minimal standards, then it can be neither a hope for the future nor a proper interlocutor for present. To prepare for this, Israel may want to cultivate alternatives to Arafat's base of power. Jordan has ideas on this.

To emphasize the point that Israel regards the actions of the PLO problematic, but not the Arab people, Israel might want to consider making a special effort to reward friends and advance human rights among Arabs. Many Arabs are willing to work with Israel; identifying and helping them are important. Israel may also find that many of her neighbors, such as Jordan, have problems with Arafat and may want to cooperate. Israel may also want to better integrate its own Arabs.

Forging A New U.S.-Israeli Relationship

In recent years, Israel invited active U.S. intervention in Israel's domestic and foreign policy for two reasons: to overcome domestic opposition to "land for peace" concessions the Israeli public could not digest, and to lure Arabs - through money, forgiveness of past sins, and access to U.S. weapons - to negotiate. This strategy, which required funneling American money to repressive and aggressive regimes, was risky, expensive, and very costly for both the U.S. and Israel, and placed the United States in roles it should neither have nor want.

Israel can make a clean break from the past and establish a new vision for the U.S.-Israeli partnership based on self-reliance, maturity and mutuality - not one focused narrowly on territorial disputes. Israel's new strategy - based on a shared philosophy of peace through strength - reflects continuity with Western values by stressing that Israel is self-reliant, does not need U.S. troops in any capacity to defend it, including on the Golan Heights, and can manage its own affairs. Such self-reliance will grant Israel greater freedom of action and remove a significant lever of pressure used against it in the past.

To reinforce this point, the Prime Minister can use his forthcoming visit to announce that Israel is now mature enough to cut itself free immediately from at least U.S. economic aid and loan guarantees at least, which prevent economic reform. (Military aid is separated for the moment until adequate arrangements can be made to ensure that Israel will not encounter supply problems in the means to defend itself). As outlined in another Institute report, Israel can become self-reliant only by, in a bold stroke rather than in increments, liberalizing its economy, cutting taxes, relegislating a free-processing zone, and selling-off public lands and enterprises - moves which will electrify and find support from a broad bipartisan spectrum of key pro-Israeli Congressional leaders, including Speaker of the House, Newt Gingrich.

Israel can under these conditions better cooperate with the U.S. to counter real threats to the region and the West's security. Mr. Netanyahu can highlight his desire to cooperate more closely with the United States on anti-missile defense in order to remove the threat of blackmail which even a weak and distant army can pose to either state. Not only would such cooperation on missile defense counter a tangible physical threat to Israel's survival, but it would broaden Israel's base of support among many in the United States Congress who may know little about Israel, but care very much about missile defense. Such broad support could be helpful in the effort to move the U.S. embassy in Israel to Jerusalem.

To anticipate U.S. reactions and plan ways to manage and constrain those reactions, Prime Minister Netanyahu can formulate the policies and stress themes he favors in language familiar to the Americans by tapping into themes of American administrations during the Cold War which apply well to Israel. If Israel wants to test certain propositions that require a benign American reaction, then the best time to do so is before November, 1996.

Conclusions: Transcending the Arab-Israeli Conflict

TEXT: Israel will not only contain its foes; it will transcend them.

Notable Arab intellectuals have written extensively on their perception of Israel's floundering and loss of national identity. This perception has invited attack, blocked Israel from achieving true peace, and offered hope for those who would destroy Israel. The previous strategy, therefore, was leading the Middle East toward another Arab-Israeli war. Israel's new agenda can signal a clean break by abandoning a policy which assumed exhaustion and allowed strategic retreat by reestablishing the principle of preemption, rather than retaliation alone and by ceasing to absorb blows to the nation without response.

Israel's new strategic agenda can shape the regional environment in ways that grant Israel the room to refocus its energies back to where they are most needed: to rejuvenate its national idea, which can only come through replacing Israel's socialist foundations with a more sound footing; and to overcome its "exhaustion," which threatens the survival of the nation.

Ultimately, Israel can do more than simply manage the Arab-Israeli conflict though war. No amount of weapons or victories will grant Israel the peace it seeks. When Israel is on a sound economic footing, and is free, powerful, and healthy internally, it will no longer simply manage the Arab-Israeli conflict; it will transcend it. As a senior Iraqi opposition leader said recently: "Israel must rejuvenate and revitalize its moral and intellectual leadership. It is an important -- if not the most important--element in the history of the Middle East." Israel - proud, wealthy, solid, and strong - would be the basis of a truly new and peaceful Middle East.

Participants in the Study Group on "A New Israeli Strategy Toward 2000:"

Richard Perle, American Enterprise Institute, Study Group Leader

James Colbert, Jewish Institute for National Security Affairs
Charles Fairbanks, Jr., Johns Hopkins University/SAIS
Douglas Feith, Feith and Zell Associates
Robert Loewenberg, President, Institute for Advanced Strategic and Political Studies
Jonathan Torop, The Washington Institute for Near East Policy
David Wurmser, Institute for Advanced Strategic and Political Studies
Meyrav Wurmser, Johns Hopkins University


Source: http://www.israeleconomy.org/strat1.htm
Footnotes:
1 http://www.nytimes.com/2003/03/02/opinion/02DOWD.html
2 http://www.zmag.org/meastwatch/gendzier-oil2.htm
2 http://www.guardian.co.uk/elsewhere/journalist/story/0,7792,785394,00.html
3 http://middleeastinfo.org/article701.html
4 http://www.freeman.org/m_online/jan97/center.htm
5 http://www.aaiusa.org/wwatch/051301.htm
6 http://www.weeklystandard.com/Content/Public/Articles/000/000/000/393rwy...
7 http://www.forward.com/issues/2003/03.03.07/news1.html
8Bush Channels Neoconservative Vision, http://www.alternet.org/story.html?StoryID=15275
9 Democracy Under Threat, http://www.zmag.org/content/print_article.cfm?itemID=2932§ionID=22
Perle's social network, as rendered by mystery technology: http://www.namebase.org/cgi-bin/nb06/04857?_PERLE_RICHARD_N

////////

Back in college I took every opportunity to get Clean Break info on the record since it was so unusual. My interview with Rashid Khalidi in the Mac Weekly 2003: From the Internet Archives: My 2003 Interview with Rashid Khalidi on Middle East politics, Iraq, Palestine, Neo-Cons & beyond | HongPong.com. [Part of this interview was actually cited & footnoted by James Bamford in 2004's "A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies." ]

DF: Noam Chomsky used the phrase ‘re-Ottomanization’ to describe the neoconservative strategy towards the Middle East, which would involve breaking down the strong states into pieces, giving them regional warlords, with Israel as the hegemonic power. Do you believe there’s merit in that viewpoint?

RK: I think that’s what some of them want to do. I’m not sure that has anything to do with US policy. That’s their fantasy. That’s really what the Clean Break strategy, if you read it very carefully, amounts to. And they’ve argued this in other places. It’s not just one document you have to go on. But to what extent that is more than the wet dreams of a bunch of neoconservatives who love Israel—love a certain muscled, hegemonic Israel—is very arguable.

I wonder about the extent to which that has any influence on US policy. I think that the idea that you crush all the strong states in the Arab world and create a situation of total instability is not something that most American policymakers accept. So, you know, maybe some of them are trying to edge crabwise towards that end, but I don’t think in the larger scheme of things it has a whole lot of influence on US policy.
  
DF: A Frontline interview with Richard Perle was published with the documentary “Truth, War and Consequences.” He talked about the Pentagon’s Office of Special Plans, which reviewed intelligence on Iraq prior to the war. Perle said the office was staffed by David Wurmser, another author of the Clean Break document. Perle says that the office “began to find links that nobody else had previously understood or recorded in a useful way.” Were the neo-cons turning their ideology into intelligence data, and putting that into the government?

RK: I can give you a short answer to that which is yes. Insofar as at least two of the key arguments that they adduced, the one having to do the connection between the Iraqi regime and al-Qaeda, and the one having to do with unconventional weapons programs in Iraq, it is clear that the links or the things they had claimed to have found were non-existent. The wish was fathered to the reality. What they wanted was what they found.

It was not just the Office of Special Plans, or whatever. There are a lot of institutions in Washington that were devoted to putting this view forward. Among them, other parts of the bureaucracy, and the vice president’s national security staff.

The vice president’s chief of staff Lewis Libby is a very important member of the neo-con group. He and the vice president have created the most powerful national security staff that anybody has ever had in the office of the vice president. I’ve read published assessments, which say that this is actually more influential than Condi Rice’s staff, the real NSC. This is another center of these views.

And then there are the think-tanks—I would use the word ‘think’ in quotes—like the American Enterprise Institute, the Heritage Foundation, the Hoover Institution and so on, all of which are devoted to spreading similar ideas. Basically any fantasy that Chalabi's people brought in, “we have a defector who says,” was turned into gold by these folks.

We now know this stuff, with a few exceptions, to be completely and utterly false, just manufactured disinformation designed to direct the United States in a certain direction. Whether the neo-cons knew this or not is another question, but I believe Chalabi’s people knew it. I would be surprised if some of them didn’t know it.

////////

“Greater Israel”: The Zionist Plan for the Middle East | Global Research (June 2014)

“Greater Israel”: The Zionist Plan for the Middle East

The Infamous "Oded Yinon Plan". Introduction by Michel Chossudovsky

By Israel Shahak - Global Research, June 13, 2014
Association of Arab-American University Graduates, Inc. 3 March 2013
Settlements israeli flag

This article was published on Global Research April 29, 2013.

Global Research Editor’s Note

The following document pertaining to the formation of “Greater Israel” constitutes the cornerstone of powerful Zionist factions within the current Netanyahu government, the Likud party, as well as within the Israeli military and intelligence establishment.

According to the founding father of Zionism Theodore Herzl, “the area of the Jewish State stretches: “From the Brook of Egypt to the Euphrates.” According to Rabbi Fischmann, “The Promised Land extends from the River of Egypt up to the Euphrates, it includes parts of Syria and Lebanon.”

When viewed in the current context, the war on Iraq, the 2006 war on Lebanon, the 2011 war on Libya, the ongoing war on Syria, not to mention the process of regime change in Egypt, must be understood in relation to the Zionist Plan for the Middle East. The latter consists in weakening and eventually fracturing neighboring Arab states as part of an Israeli expansionist project.

“Greater Israel” consists in an area extending from the Nile Valley to the Euphrates.

The Zionist project supports the Jewish settlement movement. More broadly it involves a policy of excluding Palestinians from Palestine leading to the eventual annexation of both the West Bank and Gaza to the State of Israel.

Greater Israel would create a number of proxy States. It would include parts of Lebanon, Jordan, Syria, the Sinai, as well as parts of Iraq and Saudi Arabia. (See map).

According to Mahdi Darius Nazemroaya in a 2011 Global Research article, The Yinon Plan was a continuation of Britain’s colonial design in the Middle East:

“[The Yinon plan] is an Israeli strategic plan to ensure Israeli regional superiority. It insists and stipulates that Israel must reconfigure its geo-political environment through the balkanization of the surrounding Arab states into smaller and weaker states.

Israeli strategists viewed Iraq as their biggest strategic challenge from an Arab state. This is why Iraq was outlined as the centerpiece to the balkanization of the Middle East and the Arab World. In Iraq, on the basis of the concepts of the Yinon Plan, Israeli strategists have called for the division of Iraq into a Kurdish state and two Arab states, one for Shiite Muslims and the other for Sunni Muslims. The first step towards establishing this was a war between Iraq and Iran, which the Yinon Plan discusses.

The Atlantic, in 2008, and the U.S. military’s Armed Forces Journal, in 2006, both published widely circulated maps that closely followed the outline of the Yinon Plan. Aside from a divided Iraq, which the Biden Plan also calls for, the Yinon Plan calls for a divided Lebanon, Egypt, and Syria. The partitioning of Iran, Turkey, Somalia, and Pakistan also all fall into line with these views. The Yinon Plan also calls for dissolution in North Africa and forecasts it as starting from Egypt and then spilling over into Sudan, Libya, and the rest of the region.

File:Greater israel.jpg

Greater Israel” requires the breaking up of the existing Arab states into small states.

“The plan operates on two essential premises. To survive, Israel must 1) become an imperial regional power, and 2) must effect the division of the whole area into small states by the dissolution of all existing Arab states. Small here will depend on the ethnic or sectarian composition of each state. Consequently, the Zionist hope is that sectarian-based states become Israel’s satellites and, ironically, its source of moral legitimation… This is not a new idea, nor does it surface for the first time in Zionist strategic thinking. Indeed, fragmenting all Arab states into smaller units has been a recurrent theme.” (Yinon Plan, see below)

Viewed in this context, the war on Syria is part of the process of Israeli territorial expansion. Israeli intelligence working hand in glove with the US, Turkey and NATO is directly supportive of the Al Qaeda terrorist mercenaries inside Syria.

The Zionist Project also requires the destabilization of Egypt, the creation of factional divisions within Egypt as instrumented by the “Arab Spring” leading to the formation of a sectarian based State dominated by the Muslim Brotherhood.

Michel Chossudovsky, Global Research, April 29, 2013


The Zionist Plan for the Middle East

Translated and edited by

Israel Shahak

The Israel of Theodore Herzl (1904) and of Rabbi Fischmann (1947)

In his Complete Diaries, Vol. II. p. 711, Theodore Herzl, the founder of Zionism, says that the area of the Jewish State stretches: “From the Brook of Egypt to the Euphrates.”

Rabbi Fischmann, member of the Jewish Agency for Palestine, declared in his testimony to the U.N. Special Committee of Enquiry on 9 July 1947: “The Promised Land extends from the River of Egypt up to the Euphrates, it includes parts of Syria and Lebanon.”

from

Oded Yinon’s

“A Strategy for Israel in the Nineteen Eighties”

Published by the

Association of Arab-American University Graduates, Inc.

Belmont, Massachusetts, 1982

Special Document No. 1 (ISBN 0-937694-56-8)

Table of Contents

Publisher’s Note1

The Association of Arab-American University Graduates finds it compelling to inaugurate its new publication series, Special Documents, with Oded Yinon’s article which appeared in Kivunim (Directions), the journal of the Department of Information of the World Zionist Organization. Oded Yinon is an Israeli journalist and was formerly attached to the Foreign Ministry of Israel. To our knowledge, this document is the most explicit, detailed and unambiguous statement to date of the Zionist strategy in the Middle East. Furthermore, it stands as an accurate representation of the “vision” for the entire Middle East of the presently ruling Zionist regime of Begin, Sharon and Eitan. Its importance, hence, lies not in its historical value but in the nightmare which it presents.

2

The plan operates on two essential premises. To survive, Israel must 1) become an imperial regional power, and 2) must effect the division of the whole area into small states by the dissolution of all existing Arab states. Small here will depend on the ethnic or sectarian composition of each state. Consequently, the Zionist hope is that sectarian-based states become Israel’s satellites and, ironically, its source of moral legitimation.

3

This is not a new idea, nor does it surface for the first time in Zionist strategic thinking. Indeed, fragmenting all Arab states into smaller units has been a recurrent theme. This theme has been documented on a very modest scale in the AAUG publication, Israel’s Sacred Terrorism (1980), by Livia Rokach. Based on the memoirs of Moshe Sharett, former Prime Minister of Israel, Rokach’s study documents, in convincing detail, the Zionist plan as it applies to Lebanon and as it was prepared in the mid-fifties.

4

The first massive Israeli invasion of Lebanon in 1978 bore this plan out to the minutest detail. The second and more barbaric and encompassing Israeli invasion of Lebanon on June 6, 1982, aims to effect certain parts of this plan which hopes to see not only Lebanon, but Syria and Jordan as well, in fragments. This ought to make mockery of Israeli public claims regarding their desire for a strong and independent Lebanese central government. More accurately, they want a Lebanese central government that sanctions their regional imperialist designs by signing a peace treaty with them. They also seek acquiescence in their designs by the Syrian, Iraqi, Jordanian and other Arab governments as well as by the Palestinian people. What they want and what they are planning for is not an Arab world, but a world of Arab fragments that is ready to succumb to Israeli hegemony. Hence, Oded Yinon in his essay, “A Strategy for Israel in the 1980′s,” talks about “far-reaching opportunities for the first time since 1967″ that are created by the “very stormy situation [that] surrounds Israel.”

5

The Zionist policy of displacing the Palestinians from Palestine is very much an active policy, but is pursued more forcefully in times of conflict, such as in the 1947-1948 war and in the 1967 war. An appendix entitled ”Israel Talks of a New Exodus” is included in this publication to demonstrate past Zionist dispersals of Palestinians from their homeland and to show, besides the main Zionist document we present, other Zionist planning for the de-Palestinization of Palestine.

6

It is clear from the Kivunim document, published in February, 1982, that the “far-reaching opportunities” of which Zionist strategists have been thinking are the same “opportunities” of which they are trying to convince the world and which they claim were generated by their June, 1982 invasion. It is also clear that the Palestinians were never the sole target of Zionist plans, but the priority target since their viable and independent presence as a people negates the essence of the Zionist state. Every Arab state, however, especially those with cohesive and clear nationalist directions, is a real target sooner or later.

7

Contrasted with the detailed and unambiguous Zionist strategy elucidated in this document, Arab and Palestinian strategy, unfortunately, suffers from ambiguity and incoherence. There is no indication that Arab strategists have internalized the Zionist plan in its full ramifications. Instead, they react with incredulity and shock whenever a new stage of it unfolds. This is apparent in Arab reaction, albeit muted, to the Israeli siege of Beirut. The sad fact is that as long as the Zionist strategy for the Middle East is not taken seriously Arab reaction to any future siege of other Arab capitals will be the same.

Khalil Nakhleh

July 23, 1982

Foreward

by Israel Shahak

1

The following essay represents, in my opinion, the accurate and detailed plan of the present Zionist regime (of Sharon and Eitan) for the Middle East which is based on the division of the whole area into small states, and the dissolution of all the existing Arab states. I will comment on the military aspect of this plan in a concluding note. Here I want to draw the attention of the readers to several important points:

2

1. The idea that all the Arab states should be broken down, by Israel, into small units, occurs again and again in Israeli strategic thinking. For example, Ze’ev Schiff, the military correspondent of Ha’aretz (and probably the most knowledgeable in Israel, on this topic) writes about the “best” that can happen for Israeli interests in Iraq: “The dissolution of Iraq into a Shi’ite state, a Sunni state and the separation of the Kurdish part” (Ha’aretz 6/2/1982). Actually, this aspect of the plan is very old.

3

2. The strong connection with Neo-Conservative thought in the USA is very prominent, especially in the author’s notes. But, while lip service is paid to the idea of the “defense of the West” from Soviet power, the real aim of the author, and of the present Israeli establishment is clear: To make an Imperial Israel into a world power. In other words, the aim of Sharon is to deceive the Americans after he has deceived all the rest.

4

3. It is obvious that much of the relevant data, both in the notes and in the text, is garbled or omitted, such as the financial help of the U.S. to Israel. Much of it is pure fantasy. But, the plan is not to be regarded as not influential, or as not capable of realization for a short time. The plan follows faithfully the geopolitical ideas current in Germany of 1890-1933, which were swallowed whole by Hitler and the Nazi movement, and determined their aims for East Europe. Those aims, especially the division of the existing states, were carried out in 1939-1941, and only an alliance on the global scale prevented their consolidation for a period of time.

5

The notes by the author follow the text. To avoid confusion, I did not add any notes of my own, but have put the substance of them into this foreward and the conclusion at the end. I have, however, emphasized some portions of the text.

Israel Shahak

June 13, 1982


A Strategy for Israel in the Nineteen Eighties

by Oded Yinon

This essay originally appeared in Hebrew in KIVUNIM (Directions), A Journal for Judaism and Zionism; Issue No, 14–Winter, 5742, February 1982, Editor: Yoram Beck. Editorial Committee: Eli Eyal, Yoram Beck, Amnon Hadari, Yohanan Manor, Elieser Schweid. Published by the Department of Publicity/The World Zionist Organization, Jerusalem.

1

At the outset of the nineteen eighties the State of Israel is in need of a new perspective as to its place, its aims and national targets, at home and abroad. This need has become even more vital due to a number of central processes which the country, the region and the world are undergoing. We are living today in the early stages of a new epoch in human history which is not at all similar to its predecessor, and its characteristics are totally different from what we have hitherto known. That is why we need an understanding of the central processes which typify this historical epoch on the one hand, and on the other hand we need a world outlook and an operational strategy in accordance with the new conditions. The existence, prosperity and steadfastness of the Jewish state will depend upon its ability to adopt a new framework for its domestic and foreign affairs.

2

This epoch is characterized by several traits which we can already diagnose, and which symbolize a genuine revolution in our present lifestyle. The dominant process is the breakdown of the rationalist, humanist outlook as the major cornerstone supporting the life and achievements of Western civilization since the Renaissance. The political, social and economic views which have emanated from this foundation have been based on several “truths” which are presently disappearing–for example, the view that man as an individual is the center of the universe and everything exists in order to fulfill his basic material needs. This position is being invalidated in the present when it has become clear that the amount of resources in the cosmos does not meet Man’s requirements, his economic needs or his demographic constraints. In a world in which there are four billion human beings and economic and energy resources which do not grow proportionally to meet the needs of mankind, it is unrealistic to expect to fulfill the main requirement of Western Society, 1 i.e., the wish and aspiration for boundless consumption. The view that ethics plays no part in determining the direction Man takes, but rather his material needs do–that view is becoming prevalent today as we see a world in which nearly all values are disappearing. We are losing the ability to assess the simplest things, especially when they concern the simple question of what is Good and what is Evil.

3

The vision of man’s limitless aspirations and abilities shrinks in the face of the sad facts of life, when we witness the break-up of world order around us. The view which promises liberty and freedom to mankind seems absurd in light of the sad fact that three fourths of the human race lives under totalitarian regimes. The views concerning equality and social justice have been transformed by socialism and especially by Communism into a laughing stock. There is no argument as to the truth of these two ideas, but it is clear that they have not been put into practice properly and the majority of mankind has lost the liberty, the freedom and the opportunity for equality and justice. In this nuclear world in which we are (still) living in relative peace for thirty years, the concept of peace and coexistence among nations has no meaning when a superpower like the USSR holds a military and political doctrine of the sort it has: that not only is a nuclear war possible and necessary in order to achieve the ends of Marxism, but that it is possible to survive after it, not to speak of the fact that one can be victorious in it.2

4

The essential concepts of human society, especially those of the West, are undergoing a change due to political, military and economic transformations. Thus, the nuclear and conventional might of the USSR has transformed the epoch that has just ended into the last respite before the great saga that will demolish a large part of our world in a multi-dimensional global war, in comparison with which the past world wars will have been mere child’s play. The power of nuclear as well as of conventional weapons, their quantity, their precision and quality will turn most of our world upside down within a few years, and we must align ourselves so as to face that in Israel. That is, then, the main threat to our existence and that of the Western world. 3 The war over resources in the world, the Arab monopoly on oil, and the need of the West to import most of its raw materials from the Third World, are transforming the world we know, given that one of the major aims of the USSR is to defeat the West by gaining control over the gigantic resources in the Persian Gulf and in the southern part of Africa, in which the majority of world minerals are located. We can imagine the dimensions of the global confrontation which will face us in the future.

5

The Gorshkov doctrine calls for Soviet control of the oceans and mineral rich areas of the Third World. That together with the present Soviet nuclear doctrine which holds that it is possible to manage, win and survive a nuclear war, in the course of which the West’s military might well be destroyed and its inhabitants made slaves in the service of Marxism-Leninism, is the main danger to world peace and to our own existence. Since 1967, the Soviets have transformed Clausewitz’ dictum into “War is the continuation of policy in nuclear means,” and made it the motto which guides all their policies. Already today they are busy carrying out their aims in our region and throughout the world, and the need to face them becomes the major element in our country’s security policy and of course that of the rest of the Free World. That is our major foreign challenge.4

6

The Arab Moslem world, therefore, is not the major strategic problem which we shall face in the Eighties, despite the fact that it carries the main threat against Israel, due to its growing military might. This world, with its ethnic minorities, its factions and internal crises, which is astonishingly self-destructive, as we can see in Lebanon, in non-Arab Iran and now also in Syria, is unable to deal successfully with its fundamental problems and does not therefore constitute a real threat against the State of Israel in the long run, but only in the short run where its immediate military power has great import. In the long run, this world will be unable to exist within its present framework in the areas around us without having to go through genuine revolutionary changes. The Moslem Arab World is built like a temporary house of cards put together by foreigners (France and Britain in the Nineteen Twenties), without the wishes and desires of the inhabitants having been taken into account. It was arbitrarily divided into 19 states, all made of combinations of minorites and ethnic groups which are hostile to one another, so that every Arab Moslem state nowadays faces ethnic social destruction from within, and in some a civil war is already raging. 5 Most of the Arabs, 118 million out of 170 million, live in Africa, mostly in Egypt (45 million today).

7

Apart from Egypt, all the Maghreb states are made up of a mixture of Arabs and non-Arab Berbers. In Algeria there is already a civil war raging in the Kabile mountains between the two nations in the country. Morocco and Algeria are at war with each other over Spanish Sahara, in addition to the internal struggle in each of them. Militant Islam endangers the integrity of Tunisia and Qaddafi organizes wars which are destructive from the Arab point of view, from a country which is sparsely populated and which cannot become a powerful nation. That is why he has been attempting unifications in the past with states that are more genuine, like Egypt and Syria. Sudan, the most torn apart state in the Arab Moslem world today is built upon four groups hostile to each other, an Arab Moslem Sunni minority which rules over a majority of non-Arab Africans, Pagans, and Christians. In Egypt there is a Sunni Moslem majority facing a large minority of Christians which is dominant in upper Egypt: some 7 million of them, so that even Sadat, in his speech on May 8, expressed the fear that they will want a state of their own, something like a “second” Christian Lebanon in Egypt.

8

All the Arab States east of Israel are torn apart, broken up and riddled with inner conflict even more than those of the Maghreb. Syria is fundamentally no different from Lebanon except in the strong military regime which rules it. But the real civil war taking place nowadays between the Sunni majority and the Shi’ite Alawi ruling minority (a mere 12% of the population) testifies to the severity of the domestic trouble.

9

Iraq is, once again, no different in essence from its neighbors, although its majority is Shi’ite and the ruling minority Sunni. Sixty-five percent of the population has no say in politics, in which an elite of 20 percent holds the power. In addition there is a large Kurdish minority in the north, and if it weren’t for the strength of the ruling regime, the army and the oil revenues, Iraq’s future state would be no different than that of Lebanon in the past or of Syria today. The seeds of inner conflict and civil war are apparent today already, especially after the rise of Khomeini to power in Iran, a leader whom the Shi’ites in Iraq view as their natural leader.

10

All the Gulf principalities and Saudi Arabia are built upon a delicate house of sand in which there is only oil. In Kuwait, the Kuwaitis constitute only a quarter of the population. In Bahrain, the Shi’ites are the majority but are deprived of power. In the UAE, Shi’ites are once again the majority but the Sunnis are in power. The same is true of Oman and North Yemen. Even in the Marxist South Yemen there is a sizable Shi’ite minority. In Saudi Arabia half the population is foreign, Egyptian and Yemenite, but a Saudi minority holds power.

11

Jordan is in reality Palestinian, ruled by a Trans-Jordanian Bedouin minority, but most of the army and certainly the bureaucracy is now Palestinian. As a matter of fact Amman is as Palestinian as Nablus. All of these countries have powerful armies, relatively speaking. But there is a problem there too. The Syrian army today is mostly Sunni with an Alawi officer corps, the Iraqi army Shi’ite with Sunni commanders. This has great significance in the long run, and that is why it will not be possible to retain the loyalty of the army for a long time except where it comes to the only common denominator: The hostility towards Israel, and today even that is insufficient.

12

Alongside the Arabs, split as they are, the other Moslem states share a similar predicament. Half of Iran’s population is comprised of a Persian speaking group and the other half of an ethnically Turkish group. Turkey’s population comprises a Turkish Sunni Moslem majority, some 50%, and two large minorities, 12 million Shi’ite Alawis and 6 million Sunni Kurds. In Afghanistan there are 5 million

Shi’ites who constitute one third of the population. In Sunni Pakistan there are 15 million Shi’ites who endanger the existence of that state.

13

This national ethnic minority picture extending from Morocco to India and from Somalia to Turkey points to the absence of stability and a rapid degeneration in the entire region. When this picture is added to the economic one, we see how the entire region is built like a house of cards, unable to withstand its severe problems.

14

In this giant and fractured world there are a few wealthy groups and a huge mass of poor people. Most of the Arabs have an average yearly income of 300 dollars. That is the situation in Egypt, in most of the Maghreb countries except for Libya, and in Iraq. Lebanon is torn apart and its economy is falling to pieces. It is a state in which there is no centralized power, but only 5 de facto sovereign authorities (Christian in the north, supported by the Syrians and under the rule of the Franjieh clan, in the East an area of direct Syrian conquest, in the center a Phalangist controlled Christian enclave, in the south and up to the Litani river a mostly Palestinian region controlled by the PLO and Major Haddad’s state of Christians and half a million Shi’ites). Syria is in an even graver situation and even the assistance she will obtain in the future after the unification with Libya will not be sufficient for dealing with the basic problems of existence and the maintenance of a large army. Egypt is in the worst situation: Millions are on the verge of hunger, half the labor force is unemployed, and housing is scarce in this most densely populated area of the world. Except for the army, there is not a single department operating efficiently and the state is in a permanent state of bankruptcy and depends entirely on American foreign assistance granted since the peace.6

15

In the Gulf states, Saudi Arabia, Libya and Egypt there is the largest accumulation of money and oil in the world, but those enjoying it are tiny elites who lack a wide base of support and self-confidence, something that no army can guarantee. 7 The Saudi army with all its equipment cannot defend the regime from real dangers at home or abroad, and what took place in Mecca in 1980 is only an example. A sad and very stormy situation surrounds Israel and creates challenges for it, problems, risks but also far-reaching opportunities for the first time since 1967. Chances are that opportunities missed at that time will become achievable in the Eighties to an extent and along dimensions which we cannot even imagine today.

16

The “peace” policy and the return of territories, through a dependence upon the US, precludes the realization of the new option created for us. Since 1967, all the governments of Israel have tied our national aims down to narrow political needs, on the one hand, and on the other to destructive opinions at home which neutralized our capacities both at home and abroad. Failing to take steps towards the Arab population in the new territories, acquired in the course of a war forced upon us, is the major strategic error committed by Israel on the morning after the Six Day War. We could have saved ourselves all the bitter and dangerous conflict since then if we had given Jordan to the Palestinians who live west of the Jordan river. By doing that we would have neutralized the Palestinian problem which we nowadays face, and to which we have found solutions that are really no solutions at all, such as territorial compromise or autonomy which amount, in fact, to the same thing. 8 Today, we suddenly face immense opportunities for transforming the situation thoroughly and this we must do in the coming decade, otherwise we shall not survive as a state.

17

In the course of the Nineteen Eighties, the State of Israel will have to go through far-reaching changes in its political and economic regime domestically, along with radical changes in its foreign policy, in order to stand up to the global and regional challenges of this new epoch. The loss of the Suez Canal oil fields, of the immense potential of the oil, gas and other natural resources in the Sinai peninsula which is geomorphologically identical to the rich oil-producing countries in the region, will result in an energy drain in the near future and will destroy our domestic economy: one quarter of our present GNP as well as one third of the budget is used for the purchase of oil. 9 The search for raw materials in the Negev and on the coast will not, in the near future, serve to alter that state of affairs.

18

(Regaining) the Sinai peninsula with its present and potential resources is therefore a political priority which is obstructed by the Camp David and the peace agreements. The fault for that lies of course with the present Israeli government and the governments which paved the road to the policy of territorial compromise, the Alignment governments since 1967. The Egyptians will not need to keep the peace treaty after the return of the Sinai, and they will do all they can to return to the fold of the Arab world and to the USSR in order to gain support and military assistance. American aid is guaranteed only for a short while, for the terms of the peace and the weakening of the U.S. both at home and abroad will bring about a reduction in aid. Without oil and the income from it, with the present enormous expenditure, we will not be able to get through 1982 under the present conditions and we will have to act in order to return the situation to the status quo which existed in Sinai prior to Sadat’s visit and the mistaken peace agreement signed with him in March 1979. 10

19

Israel has two major routes through which to realize this purpose, one direct and the other indirect. The direct option is the less realistic one because of the nature of the regime and government in Israel as well as the wisdom of Sadat who obtained our withdrawal from Sinai, which was, next to the war of 1973, his major achievement since he took power. Israel will not unilaterally break the treaty, neither today, nor in 1982, unless it is very hard pressed economically and politically and Egypt provides Israel with the excuse to take the Sinai back into our hands for the fourth time in our short history. What is left therefore, is the indirect option. The economic situation in Egypt, the nature of the regime and its pan-

Arab policy, will bring about a situation after April 1982 in which Israel will be forced to act directly or indirectly in order to regain control over Sinai as a strategic, economic and energy reserve for the long run. Egypt does not constitute a military strategic problem due to its internal conflicts and it could be driven back to the post 1967 war situation in no more than one day. 11

20

The myth of Egypt as the strong leader of the Arab World was demolished back in 1956 and definitely did not survive 1967, but our policy, as in the return of the Sinai, served to turn the myth into “fact.” In reality, however, Egypt’s power in proportion both to Israel alone and to the rest of the Arab World has gone down about 50 percent since 1967. Egypt is no longer the leading political power in the Arab World and is economically on the verge of a crisis. Without foreign assistance the crisis will come tomorrow. 12 In the short run, due to the return of the Sinai, Egypt will gain several advantages at our expense, but only in the short run until 1982, and that will not change the balance of power to its benefit, and will possibly bring about its downfall. Egypt, in its present domestic political picture, is already a corpse, all the more so if we take into account the growing Moslem-Christian rift. Breaking Egypt down territorially into distinct geographical regions is the political aim of Israel in the Nineteen Eighties on its Western front.

21

Egypt is divided and torn apart into many foci of authority. If Egypt falls apart, countries like Libya, Sudan or even the more distant states will not continue to exist in their present form and will join the downfall and dissolution of Egypt. The vision of a Christian Coptic State in Upper Egypt alongside a number of weak states with very localized power and without a centralized government as to date, is the key to a historical development which was only set back by the peace agreement but which seems inevitable in the long run. 13

22

The Western front, which on the surface appears more problematic, is in fact less complicated than the Eastern front, in which most of the events that make the headlines have been taking place recently. Lebanon’s total dissolution into five provinces serves as a precendent for the entire Arab world including Egypt, Syria, Iraq and the Arabian peninsula and is already following that track. The dissolution of Syria and Iraq later on into ethnically or religiously unqiue areas such as in Lebanon, is Israel’s primary target on the Eastern front in the long run, while the dissolution of the military power of those states serves as the primary short term target. Syria will fall apart, in accordance with its ethnic and religious structure, into several states such as in present day Lebanon, so that there will be a Shi’ite Alawi state along its coast, a Sunni state in the Aleppo area, another Sunni state in Damascus hostile to its northern neighbor, and the Druzes who will set up a state, maybe even in our Golan, and certainly in the Hauran and in northern Jordan. This state of affairs will be the guarantee for peace and security in the area in the long run, and that aim is already within our reach today. 14

23

Iraq, rich in oil on the one hand and internally torn on the other, is guaranteed as a candidate for Israel’s targets. Its dissolution is even more important for us than that of Syria. Iraq is stronger than Syria. In the short run it is Iraqi power which constitutes the greatest threat to Israel. An Iraqi-Iranian war will tear Iraq apart and cause its downfall at home even before it is able to organize a struggle on a wide front against us. Every kind of inter-Arab confrontation will assist us in the short run and will shorten the way to the more important aim of breaking up Iraq into denominations as in Syria and in Lebanon. In Iraq, a division into provinces along ethnic/religious lines as in Syria during Ottoman times is possible. So, three (or more) states will exist around the three major cities: Basra, Baghdad and Mosul, and Shi’ite areas in the south will separate from the Sunni and Kurdish north. It is possible that the present Iranian-Iraqi confrontation will deepen this polarization. 15

24

The entire Arabian peninsula is a natural candidate for dissolution due to internal and external pressures, and the matter is inevitable especially in Saudi Arabia. Regardless of whether its economic might based on oil remains intact or whether it is diminished in the long run, the internal rifts and breakdowns are a clear and natural development in light of the present political structure. 16

25

Jordan constitutes an immediate strategic target in the short run but not in the long run, for it does not constitute a real threat in the long run after its dissolution, the termination of the lengthy rule of King Hussein and the transfer of power to the Palestinians in the short run.

26

There is no chance that Jordan will continue to exist in its present structure for a long time, and Israel’s policy, both in war and in peace, ought to be directed at the liquidation of Jordan under the present regime and the transfer of power to the Palestinian majority. Changing the regime east of the river will also cause the termination of the problem of the territories densely populated with Arabs west of the Jordan. Whether in war or under conditions of peace, emigration from the territories and economic demographic freeze in them, are the guarantees for the coming change on both banks of the river, and we ought to be active in order to accelerate this process in the nearest future. The autonomy plan ought also to be rejected, as well as any compromise or division of the territories for, given the plans of the PLO and those of the Israeli Arabs themselves, the Shefa’amr plan of September 1980, it is not possible to go on living in this country in the present situation without separating the two nations, the Arabs to Jordan and the Jews to the areas west of the river. Genuine coexistence and peace will reign over the land only when the Arabs understand that without Jewish rule between the Jordan and the sea they will have neither existence nor security. A nation of their own and security will be theirs only in Jordan. 17

27

Within Israel the distinction between the areas of ’67 and the territories beyond them, those of ’48, has always been meaningless for Arabs and nowadays no longer has any significance for us. The problem should be seen in its entirety without any divisions as of ’67. It should be clear, under any future political situation or military constellation, that the solution of the problem of the indigenous Arabs will come only when they recognize the existence of Israel in secure borders up to the Jordan river and beyond it, as our existential need in this difficult epoch, the nuclear epoch which we shall soon enter. It is no longer possible to live with three fourths of the Jewish population on the dense shoreline which is so dangerous in a nuclear epoch.

28

Dispersal of the population is therefore a domestic strategic aim of the highest order; otherwise, we shall cease to exist within any borders. Judea, Samaria and the Galilee are our sole guarantee for national existence, and if we do not become the majority in the mountain areas, we shall not rule in the country and we shall be like the Crusaders, who lost this country which was not theirs anyhow, and in which they were foreigners to begin with. Rebalancing the country demographically, strategically and economically is the highest and most central aim today. Taking hold of the mountain watershed from Beersheba to the Upper Galilee is the national aim generated by the major strategic consideration which is settling the mountainous part of the country that is empty of Jews today. l8

29

Realizing our aims on the Eastern front depends first on the realization of this internal strategic objective. The transformation of the political and economic structure, so as to enable the realization of these strategic aims, is the key to achieving the entire change. We need to change from a centralized economy in which the government is extensively involved, to an open and free market as well as to switch from depending upon the U.S. taxpayer to developing, with our own hands, of a genuine productive economic infrastructure. If we are not able to make this change freely and voluntarily, we shall be forced into it by world developments, especially in the areas of economics, energy, and politics, and by our own growing isolation. l9

30

From a military and strategic point of view, the West led by the U.S. is unable to withstand the global pressures of the USSR throughout the world, and Israel must therefore stand alone in the Eighties, without any foreign assistance, military or economic, and this is within our capacities today, with no compromises. 20 Rapid changes in the world will also bring about a change in the condition of world Jewry to which Israel will become not only a last resort but the only existential option. We cannot assume that U.S. Jews, and the communities of Europe and Latin America will continue to exist in the present form in the future. 21

31

Our existence in this country itself is certain, and there is no force that could remove us from here either forcefully or by treachery (Sadat’s method). Despite the difficulties of the mistaken “peace” policy and the problem of the Israeli Arabs and those of the territories, we can effectively deal with these problems in the foreseeable future.

Conclusion

1

Three important points have to be clarified in order to be able to understand the significant possibilities of realization of this Zionist plan for the Middle East, and also why it had to be published.

2

The Military Background of The Plan

The military conditions of this plan have not been mentioned above, but on the many occasions where something very like it is being “explained” in closed meetings to members of the Israeli Establishment, this point is clarified. It is assumed that the Israeli military forces, in all their branches, are insufficient for the actual work of occupation of such wide territories as discussed above. In fact, even in times of intense Palestinian “unrest” on the West Bank, the forces of the Israeli Army are stretched out too much. The answer to that is the method of ruling by means of “Haddad forces” or of “Village Associations” (also known as “Village Leagues”): local forces under “leaders” completely dissociated from the population, not having even any feudal or party structure (such as the Phalangists have, for example). The “states” proposed by Yinon are “Haddadland” and “Village Associations,” and their armed forces will be, no doubt, quite similar. In addition, Israeli military superiority in such a situation will be much greater than it is even now, so that any movement of revolt will be “punished” either by mass humiliation as in the West Bank and Gaza Strip, or by bombardment and obliteration of cities, as in Lebanon now (June 1982), or by both. In order to ensure this, the plan, as explained orally, calls for the establishment of Israeli garrisons in focal places between the mini states, equipped with the necessary mobile destructive forces. In fact, we have seen something like this in Haddadland and we will almost certainly soon see the first example of this system functioning either in South Lebanon or in all Lebanon.

3

It is obvious that the above military assumptions, and the whole plan too, depend also on the Arabs continuing to be even more divided than they are now, and on the lack of any truly progressive mass movement among them. It may be that those two conditions will be removed only when the plan will be well advanced, with consequences which can not be foreseen.

4

Why it is necessary to publish this in Israel?

The reason for publication is the dual nature of the Israeli-Jewish society: A very great measure of freedom and democracy, specially for Jews, combined with expansionism and racist discrimination. In such a situation the Israeli-Jewish elite (for the masses follow the TV and Begin’s speeches) has to be persuaded. The first steps in the process of persuasion are oral, as indicated above, but a time comes in which it becomes inconvenient. Written material must be produced for the benefit of the more stupid “persuaders” and “explainers” (for example medium-rank officers, who are, usually, remarkably stupid). They then “learn it,” more or less, and preach to others. It should be remarked that Israel, and even the Yishuv from the Twenties, has always functioned in this way. I myself well remember how (before I was “in opposition”) the necessity of war with was explained to me and others a year before the 1956 war, and the necessity of conquering “the rest of Western Palestine when we will have the opportunity” was explained in the years 1965-67.

5

Why is it assumed that there is no special risk from the outside in the publication of such plans?

Such risks can come from two sources, so long as the principled opposition inside Israel is very weak (a situation which may change as a consequence of the war on Lebanon) : The Arab World, including the Palestinians, and the United States. The Arab World has shown itself so far quite incapable of a detailed and rational analysis of Israeli-Jewish society, and the Palestinians have been, on the average, no better than the rest. In such a situation, even those who are shouting about the dangers of Israeli expansionism (which are real enough) are doing this not because of factual and detailed knowledge, but because of belief in myth. A good example is the very persistent belief in the non-existent writing on the wall of the Knesset of the Biblical verse about the Nile and the Euphrates. Another example is the persistent, and completely false declarations, which were made by some of the most important Arab leaders, that the two blue stripes of the Israeli flag symbolize the Nile and the Euphrates, while in fact they are taken from the stripes of the Jewish praying shawl (Talit). The Israeli specialists assume that, on the whole, the Arabs will pay no attention to their serious discussions of the future, and the Lebanon war has proved them right. So why should they not continue with their old methods of persuading other Israelis?

6

In the United States a very similar situation exists, at least until now. The more or less serious commentators take their information about Israel, and much of their opinions about it, from two sources. The first is from articles in the “liberal” American press, written almost totally by Jewish admirers of Israel who, even if they are critical of some aspects of the Israeli state, practice loyally what Stalin used to call “the constructive criticism.” (In fact those among them who claim also to be “Anti-Stalinist” are in reality more Stalinist than Stalin, with Israel being their god which has not yet failed). In the framework of such critical worship it must be assumed that Israel has always “good intentions” and only “makes mistakes,” and therefore such a plan would not be a matter for discussion–exactly as the Biblical genocides committed by Jews are not mentioned. The other source of information, The Jerusalem Post, has similar policies. So long, therefore, as the situation exists in which Israel is really a “closed society” to the rest of the world, because the world wants to close its eyes, the publication and even the beginning of the realization of such a plan is realistic and feasible.

Israel Shahak

June 17, 1982 Jerusalem

About the Translator

Israel Shahak is a professor of organic chemistly at Hebrew University in Jerusalem and the chairman of the Israeli League for Human and Civil Rights. He published The Shahak Papers, collections of key articles from the Hebrew press, and is the author of numerous articles and books, among them Non-Jew in the Jewish State. His latest book is Israel’s Global Role: Weapons for Repression, published by the AAUG in 1982. Israel Shahak: (1933-2001)

Notes

1. American Universities Field Staff. Report No.33, 1979. According to this research, the population of the world will be 6 billion in the year 2000. Today’s world population can be broken down as follows: China, 958 million; India, 635 million; USSR, 261 million; U.S., 218 million Indonesia, 140 million; Brazil and Japan, 110 million each. According to the figures of the U.N. Population Fund for 1980, there will be, in 2000, 50 cities with a population of over 5 million each. The population ofthp;Third World will then be 80% of the world population. According to Justin Blackwelder, U.S. Census Office chief, the world population will not reach 6 billion because of hunger.

2. Soviet nuclear policy has been well summarized by two American Sovietologists: Joseph D. Douglas and Amoretta M. Hoeber, Soviet Strategy for Nuclear War, (Stanford, Ca., Hoover Inst. Press, 1979). In the Soviet Union tens and hundreds of articles and books are published each year which detail the Soviet doctrine for nuclear war and there is a great deal of documentation translated into English and published by the U.S. Air Force,including USAF: Marxism-Leninism on War and the Army: The Soviet View, Moscow, 1972; USAF: The Armed Forces of the Soviet State. Moscow, 1975, by Marshal A. Grechko. The basic Soviet approach to the matter is presented in the book by Marshal Sokolovski published in 1962 in Moscow: Marshal V. D. Sokolovski, Military Strategy, Soviet Doctrine and Concepts(New York, Praeger, 1963).

3. A picture of Soviet intentions in various areas of the world can be drawn from the book by Douglas and Hoeber, ibid. For additional material see: Michael Morgan, “USSR’s Minerals as Strategic Weapon in the Future,” Defense and Foreign Affairs, Washington, D.C., Dec. 1979.

4. Admiral of the Fleet Sergei Gorshkov, Sea Power and the State, London, 1979. Morgan, loc. cit. General George S. Brown (USAF) C-JCS, Statement to the Congress on the Defense Posture of the United States For Fiscal Year 1979, p. 103; National Security Council, Review of Non-Fuel Mineral Policy, (Washington, D.C. 1979,); Drew Middleton, The New York Times, (9/15/79); Time, 9/21/80.

5. Elie Kedourie, “The End of the Ottoman Empire,” Journal of Contemporary History, Vol. 3, No.4, 1968.

6. Al-Thawra, Syria 12/20/79, Al-Ahram,12/30/79, Al Ba’ath, Syria, 5/6/79. 55% of the Arabs are 20 years old and younger, 70% of the Arabs live in Africa, 55% of the Arabs under 15 are unemployed, 33% live in urban areas, Oded Yinon, “Egypt’s Population Problem,” The Jerusalem Quarterly, No. 15, Spring 1980.

7. E. Kanovsky, “Arab Haves and Have Nots,” The Jerusalem Quarterly, No.1, Fall 1976, Al Ba’ath, Syria, 5/6/79.

8. In his book, former Prime Minister Yitzhak Rabin said that the Israeli government is in fact responsible for the design of American policy in the Middle East, after June ’67, because of its own indecisiveness as to the future of the territories and the inconsistency in its positions since it established the background for Resolution 242 and certainly twelve years later for the Camp David agreements and the peace treaty with Egypt. According to Rabin, on June 19, 1967, President Johnson sent a letter to Prime Minister Eshkol in which he did not mention anything about withdrawal from the new territories but exactly on the same day the government resolved to return territories in exchange for peace. After the Arab resolutions in Khartoum (9/1/67) the government altered its position but contrary to its decision of June 19, did not notify the U.S. of the alteration and the U.S. continued to support 242 in the Security Council on the basis of its earlier understanding that Israel is prepared to return territories. At that point it was already too late to change the U.S. position and Israel’s policy. From here the way was opened to peace agreements on the basis of 242 as was later agreed upon in Camp David. See Yitzhak Rabin. Pinkas Sherut, (Ma’ariv 1979) pp. 226-227.

9. Foreign and Defense Committee Chairman Prof. Moshe Arens argued in an interview (Ma ‘ariv,10/3/80) that the Israeli government failed to prepare an economic plan before the Camp David agreements and was itself surprised by the cost of the agreements, although already during the negotiations it was possible to calculate the heavy price and the serious error involved in not having prepared the economic grounds for peace.

The former Minister of Treasury, Mr. Yigal Holwitz, stated that if it were not for the withdrawal from the oil fields, Israel would have a positive balance of payments (9/17/80). That same person said two years earlier that the government of Israel (from which he withdrew) had placed a noose around his neck. He was referring to the Camp David agreements (Ha’aretz, 11/3/78). In the course of the whole peace negotiations neither an expert nor an economics advisor was consulted, and the Prime Minister himself, who lacks knowledge and expertise in economics, in a mistaken initiative, asked the U.S. to give us a loan rather than a grant, due to his wish to maintain our respect and the respect of the U.S. towards us. See Ha’aretz1/5/79. Jerusalem Post, 9/7/79. Prof Asaf Razin, formerly a senior consultant in the Treasury, strongly criticized the conduct of the negotiations; Ha’aretz, 5/5/79. Ma’ariv, 9/7/79. As to matters concerning the oil fields and Israel’s energy crisis, see the interview with Mr. Eitan Eisenberg, a government advisor on these matters, Ma’arive Weekly, 12/12/78. The Energy Minister, who personally signed the Camp David agreements and the evacuation of Sdeh Alma, has since emphasized the seriousness of our condition from the point of view of oil supplies more than once…see Yediot Ahronot, 7/20/79. Energy Minister Modai even admitted that the government did not consult him at all on the subject of oil during the Camp David and Blair House negotiations. Ha’aretz, 8/22/79.

10. Many sources report on the growth of the armaments budget in Egypt and on intentions to give the army preference in a peace epoch budget over domestic needs for which a peace was allegedly obtained. See former Prime Minister Mamduh Salam in an interview 12/18/77, Treasury Minister Abd El Sayeh in an interview 7/25/78, and the paper Al Akhbar, 12/2/78 which clearly stressed that the military budget will receive first priority, despite the peace. This is what former Prime Minister Mustafa Khalil has stated in his cabinet’s programmatic document which was presented to Parliament, 11/25/78. See English translation, ICA, FBIS, Nov. 27. 1978, pp. D 1-10.

According to these sources, Egypt’s military budget increased by 10% between fiscal 1977 and 1978, and the process still goes on. A Saudi source divulged that the Egyptians plan to increase their militmy budget by 100% in the next two years; Ha’aretz, 2/12/79 and Jerusalem Post, 1/14/79.

11. Most of the economic estimates threw doubt on Egypt’s ability to reconstruct its economy by 1982. See Economic Intelligence Unit, 1978 Supplement, “The Arab Republic of Egypt”; E. Kanovsky, “Recent Economic Developments in the Middle East,” Occasional Papers, The Shiloah Institution, June 1977; Kanovsky, “The Egyptian Economy Since the Mid-Sixties, The Micro Sectors,” Occasional Papers, June 1978; Robert McNamara, President of World Bank, as reported in Times, London, 1/24/78.

12. See the comparison made by the researeh of the Institute for Strategic Studies in London, and research camed out in the Center for Strategic Studies of Tel Aviv University, as well as the research by the British scientist, Denis Champlin, Military Review, Nov. 1979, ISS: The Military Balance 1979-1980, CSS; Security Arrangements in Sinai…by Brig. Gen. (Res.) A Shalev, No. 3.0 CSS; The Military Balance and the Military Options after the Peace Treaty with Egypt, by Brig. Gen. (Res.) Y. Raviv, No.4, Dec. 1978, as well as many press reports including El Hawadeth, London, 3/7/80; El Watan El Arabi, Paris, 12/14/79.

13. As for religious ferment in Egypt and the relations between Copts and Moslems see the series of articles published in the Kuwaiti paper, El Qabas, 9/15/80. The English author Irene Beeson reports on the rift between Moslems and Copts, see: Irene Beeson, Guardian, London, 6/24/80, and Desmond Stewart, Middle East Internmational, London 6/6/80. For other reports see Pamela Ann Smith, Guardian, London, 12/24/79; The Christian Science Monitor 12/27/79 as well as Al Dustour, London, 10/15/79; El Kefah El Arabi, 10/15/79.

14. Arab Press Service, Beirut, 8/6-13/80. The New Republic, 8/16/80, Der Spiegel as cited by Ha’aretz, 3/21/80, and 4/30-5/5/80; The Economist, 3/22/80; Robert Fisk, Times, London, 3/26/80; Ellsworth Jones, Sunday Times, 3/30/80.

15. J.P. Peroncell Hugoz, Le Monde, Paris 4/28/80; Dr. Abbas Kelidar, Middle East Review, Summer 1979;

Conflict Studies, ISS, July 1975; Andreas Kolschitter, Der Zeit, (Ha’aretz, 9/21/79) Economist Foreign Report, 10/10/79, Afro-Asian Affairs, London, July 1979.

16. Arnold Hottinger, “The Rich Arab States in Trouble,” The New York Review of Books, 5/15/80; Arab Press Service, Beirut, 6/25-7/2/80; U.S. News and World Report, 11/5/79 as well as El Ahram, 11/9/79; El Nahar El Arabi Wal Duwali, Paris 9/7/79; El Hawadeth, 11/9/79; David Hakham, Monthly Review, IDF, Jan.-Feb. 79.

17. As for Jordan’s policies and problems see El Nahar El Arabi Wal Duwali, 4/30/79, 7/2/79; Prof. Elie Kedouri, Ma’ariv 6/8/79; Prof. Tanter, Davar 7/12/79; A. Safdi, Jerusalem Post, 5/31/79; El Watan El Arabi 11/28/79; El Qabas, 11/19/79. As for PLO positions see: The resolutions of the Fatah Fourth Congress, Damascus, August 1980. The Shefa’amr program of the Israeli Arabs was published in Ha’aretz, 9/24/80, and by Arab Press Report 6/18/80. For facts and figures on immigration of Arabs to Jordan, see Amos Ben Vered, Ha’aretz, 2/16/77; Yossef Zuriel, Ma’ariv 1/12/80. As to the PLO’s position towards Israel see Shlomo Gazit, Monthly Review; July 1980; Hani El Hasan in an interview, Al Rai Al’Am, Kuwait 4/15/80; Avi Plaskov, “The Palestinian Problem,” Survival, ISS, London Jan. Feb. 78; David Gutrnann, “The Palestinian Myth,” Commentary, Oct. 75; Bernard Lewis, “The Palestinians and the PLO,” Commentary Jan. 75; Monday Morning, Beirut, 8/18-21/80; Journal of Palestine Studies, Winter 1980.

18. Prof. Yuval Neeman, “Samaria–The Basis for Israel’s Security,” Ma’arakhot 272-273, May/June 1980; Ya’akov Hasdai, “Peace, the Way and the Right to Know,” Dvar Hashavua, 2/23/80. Aharon Yariv, “Strategic Depth–An Israeli Perspective,” Ma’arakhot 270-271, October 1979; Yitzhak Rabin, “Israel’s Defense Problems in the Eighties,” Ma’arakhot October 1979.

19. Ezra Zohar, In the Regime’s Pliers (Shikmona, 1974); Motti Heinrich, Do We have a Chance Israel, Truth Versus Legend (Reshafim, 1981).

20. Henry Kissinger, “The Lessons of the Past,” The Washington Review Vol 1, Jan. 1978; Arthur Ross, “OPEC’s Challenge to the West,” The Washington Quarterly, Winter, 1980; Walter Levy, “Oil and the Decline of the West,” Foreign Affairs, Summer 1980; Special Report–”Our Armed Forees-Ready or Not?” U.S. News and World Report 10/10/77; Stanley Hoffman, “Reflections on the Present Danger,” The New York Review of Books 3/6/80; Time 4/3/80; Leopold Lavedez “The illusions of SALT” Commentary Sept. 79; Norman Podhoretz, “The Present Danger,” Commentary March 1980; Robert Tucker, “Oil and American Power Six Years Later,” Commentary Sept. 1979; Norman Podhoretz, “The Abandonment of Israel,” Commentary July 1976; Elie Kedourie, “Misreading the Middle East,” Commentary July 1979.

21. According to figures published by Ya’akov Karoz, Yediot Ahronot, 10/17/80, the sum total of anti-Semitic incidents recorded in the world in 1979 was double the amount recorded in 1978. In Germany, France, and Britain the number of anti-Semitic incidents was many times greater in that year. In the U.S. as well there has been a sharp increase in anti-Semitic incidents which were reported in that article. For the new anti-Semitism, see L. Talmon, “The New Anti-Semitism,” The New Republic, 9/18/1976; Barbara Tuchman, “They poisoned the Wells,” Newsweek 2/3/75.

///////

Transcript of interview: Full post from ISIS: The Bombshell Interview to Impeach Obama by Arabi Souri:

The author found some difficulties in finding a proper title for this post, which is based on a TV interview with the founder of Jihadist movement in Egypt and a former top Al-Qaeda commander. Each line of the interview is a title by itself, each piece of information is more than enough to put tens of western officials and their regional stooges behind bars for long times, those who are acting as the Humanitarian Bastards crying for the suffering of the innocent they only inflicted their suffering.

Finally, I decided to post the text of the interview as it is without my usual adding in noting how the western citizens are played by their governments, so I’ll leave you with the interview conducted by pan Arab Al-Maydeen TV with Sheikh Nabeel Naiem, who was introduced by the TV presenter as: ‘the former founder of Jihad Organization & expert in Islamist groups’, enjoy:

The interview text:

- With us here in the studio Sheikh Nabeel Naim former founder of Jihad Organization & expert in Islamist groups, welcome..

Noting that you were in Afghanistan with Osama Bin Laden & Dr. Ayman Zawahri, in accommodation and also in prison with Dr. Ayman Zawahri, can we say now you retired from Al-Qaeda?

Nabeel Naiem: Not really, they are the ones who deviated, we went there to fight the Soviet invasion of Afghanistan, and there was almost a unanimous agreement among Islamic clerics that time on that (Jihad against Soviets), and after that they deviated and turned their activities against Islamic and Arabic countries, and they committed the prohibited which is killing Muslims, and at the same time after the death of Osama Bin Laden, Al-Qaeda turned into a mercenary (group)..

- You are one of the founders of Jihad in Egypt, and you were at the beginning times of Al-Qaeda so to speak, can a member of that rank distance himself from Al-Qaeda, leave the organization? Will the organization leave him? Some say it is not accepted in the ideology of the organization..

Nabeel Naiem: No, the organization deviated, they became Takfiris, they are killing Muslims.. Am I fighting Jihad (holy war) to go to hell or seeking heaven?!

What is the cause of Jihad? (whoever kills a believer intentionally – his recompense is Hell, wherein he will abide eternally, and Allah has become angry with him and has cursed him and has prepared for him a great punishment) [Quran 4:93]

- Did they call you a Kafir (non-believer) now?

Nabeel Naiem: The high ranks, like Ayman, no they did not, but the small lads they’re the ones who consider me Kafir.

- The natural question one would ask: Why wouldn’t some who consider you Kafir try to assassinate you?

Nabeel Naiem: No, I’m a legend.. I have a history those same boys are astonished with my history, and they wonder why I changed, I was the cloud above those boys..

I was a solid warrior and I fought and have a horrible history whether inside Egypt or outside it, I’m not just a lad, or someone who just joined, I was everything in the organization..

- I mean now after the Takfiri ideology (labeling people as Kuffar – non-believers) why nobody tried to liquidate you with this Takfiri ideology?

Nabeel Naiem: This is with God’s grace upon me, and then I have a history.. When they get to know my history.. none of them have achieved the history I did.

- Back to the questions I understand you’re telling me the main structure of Al-Qaeda does not exist anymore.. Are we
talking now about schism? Can we say that (Daesh) ISIS is part of Al-Qaeda?

Nabeel Naiem: No, the old commanders have left the whole organization, only Ayman is left and around him a few we call them mentally retarded or crazy, Takfiri people.. But all the founders have left, some died and the others just left..

As for ISIS, it follows the ideology of Al-Qaeda organization, which was found by Sayyed Imam Sherif and put it in his book Al Jamei Fi Talab Al-ilm Al Sharif (Bible of Seeking Honorable Learning), & it’s one of the most dangerous books circulated in the world, and it’s translated to all languages by the way, Kurdish, Urdu, Persian, Turkish.. etc.

- You say that ISIS is a branch of Al-Qaeda?

Nabeel Naiem: It adopts the ideology of Al-Qaeda. ISIS was established in 2006, we created Al-Qaeda since 1989.

- Explain to me now the position of Dr. Ayman Zawahri from ISIS and Abu Bakr Baghdadi (head of ISIS), what do they consider him?

Nabeel Naiem: He (Zawahri) asked Abu Bakr Baghdadi to pledge allegiance to him (as the Emir..) but Abu Bakr Baghdadi, since he’s basically a U.S. agent, told him: we are the people of cause, the cause of liberating Iraq, Syria and so.. You’re the one who should pledge allegiance to us, Ayman (Zawahri) refused so there was a dispute and a fight between them.

- How he is an American agent? Explain to us how?

Nabeel Naiem: It is known that the USA released him from prison and he spent 20 to 30 million US Dollars to establish these ISIS groups and the first ISIS camps were established in Jordan, and Jordan doesn’t allow camps for charity, when Jordan establish camps to train terrorist groups, it doesn’t do that out of good will and charity, these camps were supervised by the Marines, and the arming of ISIS is all American.. and how do they arrange their expenses? I was in charge of a camp for 120 men, we were spending thousands of thousands (of dollars).. food, drinks, weapons, munition, training..

- Excuse me, you’re talking about ISIS? You were in charge of an ISIS camp?

Nabeel Naiem: No, I am telling you I was once in charge of a camp of 120 men and we were spending that time thousands (of Dollars), imagine how much this ISIS is spending?! Let me tell you something.. The wounded from ISIS during (terrorist) operations, are they being treated here in Lebanon? No, neither in Syria, nor in Saudi nor in Egypt, where do they go? They go to Israel. Now as we speak there are 1,500 of ISIS & Nusra (Front) are in Tel Aviv hospitals.

- From where this information?

Nabeel Naiem: Where are their wounded? Don’t they have wounded? Where are they being treated? This is well known..

- They have field hospitals, and it’s remarkable that they have a number of doctors in their ranks, even doctors from
European countries..

Nabeel Naiem: Yes, the field doctor would only give first aid until you reach the hospital.

- You mentioned an important point about financing, I read for your a lot actually when at the beginning of Al-Qaeda when talking about Osama Bin Laden you were talking about self-financing..

Nabeel Naiem: Osama was spending by himself, but before Osama there was the International Islamic Relief Organization and the connection between us and them was Dr. Abdulla Azzam, then we had some issues with Adbulla Azzam so he cut off from us the money and expenses so we replaced him with Osama Bin Laden, and the brothers in Al-Qaeda, mainly from the GCC countries called him Emir of Arabs.

- You just mentioned that 120 members required thousands, we are talking about a structure spread worldwide, could this be understood in the context of self-financing reaching ISIS today? I’ll read what the British Independent Newspaper said, it reveals there are a number of donors from Saudi who played an essential role in establishing Jihadist groups since over 30 years, that’s why I ask you about the beginnings as you were there then.. It’s a CIA report and it’s after September 11 attacks and it suggests Al-Qaeda had relied on middlemen who collected money from Saudi & other GCC donors..

Nabeel Naiem: This is ‘crap’ what the Independent says, these are foolish people, a fool journalist who doesn’t know what to say. First of all, the donations of GCC citizens to the Jihadist groups in Afghanistan was known and done publicly and it was advertised in newspapers and on TV, what this Independent guy adding?

I’m one of the people who took more than a thousand free air tickets from the International Islamic Relief Organization

- Please explain what are you aiming at with the International Islamic Relief Org.?

Nabeel Naiem: It was paying our expenses while we were in the Afghani Jihad, bring weapons, ammunition, training, food, drinks.. all of this we were getting from the Islamic Relief Org.. they were spending..

- This is what I meant, Islamic Relief Org. is specialized in collecting Zakat (charity) and it’s in Saudi (Arabia)..

Nabeel Naiem: These are fools.. Prince Sulaiman Bin Abdul Aziz was in charge of it, it was not running loose you grab what you want and go on.. It was Saudi Intelligence and Prince Sulaiman Bin Abdul Aziz was in charge of it, it wasn’t a loose charity you fill your pockets and walk, No.

Secondly, there was a hospital called Kuwaiti Crescent Hospital, it had 250 beds, it had all kinds of operations, and it had doctors employed there, money (budget), medicine, used to spend millions, it was under Kuwaiti (Red) Crescent.

So what new this Independent is telling? USA itself was supporting Hikmatyar, Who brought Stinger missiles to the Afghani Mujahideen? The missiles which badly hurt the USSR? It was brought by the USA..

- This is the point you mentioned when talking about Al-Qaeda, USA supported Al-Qaeda because it was fighting Russia, today when we come closer to this region, who supports who in favor of who? ISIS works for who?

Nabeel Naiem: Look, there’s nothing constant in these matters, take for example after Russia was defeated (in Afghanistan) the Americans wanted to get rid of the Arab Afghanis, and in fact the Arab Afghanis were arrested, deported and some like us were jailed, so Al-Qaeda in Afghanistan was struck by September 11 attacks and after Osama Bin Laden’s death Al-Qaeda was bought by the Qatari Intelligence, and I tell you during the International Conference of Ikhwan (Muslim Brotherhood) in Istanbul, Qatar decided to create a fund to sponsor Free Egyptian Army and paid 1 billion dollar for it, and the person in charge of this fund is Ali Kurrah Zadah, Muslim Brotherhood official in Turkey, this is the finance, not like someone says 1 sheikh is donating..!

- This is one side, what’s important to know is what ISIS wants from Iraq? Is it the issue of borders? The borders strategy? Borders war? But this ideology is trans-borders it seems, how did ISIS expand from Syria into Iraq? What does it want exactly from Iraq?

Nabeel Naiem: No dear, ISIS started in Iraq, and Ibrahim Abu Bakr Baghdadi is Iraqi (national), and after that they were given camps to train in Jordan and they smuggled into Syria from Jordan and they were defeated in Syria then they moved back into Iraq once again.

As to what’s happening in Iraq, it’s bigger than ISIS, Mosul city has 4 million residents & it’s second largest province, in Iraq there’s a problem between the Arabs in Anbar and (Prime Minister) Maliki, and ‘Maliki Army’ who handed over their weapons had Shiite commanders, so nobody would argue ISIS and Shiites, those commanders handed over their weapons to Arab tribes but ISIS is in the headlines.

ISIS has something called Management of Savagery, a book titled Management of Savagery..

- We have shown some details about this book on our channel..

Nabeel Naiem: Abu Bakr Muhammad Maqdisi in this book has taken the same policy of Genghis Khan, thanks God they didn’t claim they derived their policies from prophet Muhammad, because God said: ‘There has certainly been for you in the Messenger of Allah an excellent pattern for anyone whose hope is in Allah and the Last Day and [who] remembers Allah often.’ [Quran 33:21].. So their ‘excellent pattern’ was Genghis Khan.

Genghis Khan used to enter a village and annihilates all living in it, even animals he’d slaughter it, and burn down the houses, so the next village hears that Genghis Khan is coming they flee away and this is what ISIS is doing in Iraq, and what’s the goal of ISIS? When ISIS entered Samerra they killed a thousand Sunni, and now killing Shiites, and this is the American policy.

Henry Kissinger wrote a memo in 1982 or 1984, don’t remember exactly, it’s titled The 100 Years War. When asked where this 100 years war will occur? He said in the Middle East when we ignite the war between the Sunnah and the Shiites.

So they’re working on igniting the war between the Sunna and the Shiites, just like what Abu Mussab (Zarqawi) used to blow up Sunnah mosques then blow up Shiite mosques, to start the sectarian war in the region; and this is of course an American plot, and I tell you ISIS didn’t kill a single American.

ISIS didn’t behead a single American and didn’t play football with his head, they beheaded Muslims and ate livers of Muslims and didn’t kill a single American though it’s established since 2006..

- You’re talking about ISIS’s brutality and ideology but it finds popularity among the youth.. and popularity among many sides and it practices the highest level of violence and brutality, can you explain to us what makes all these groups with all its diversities to join this organization?

Nabeel Naiem: It’s the Takfiri ideology, the problem with this Takfiri ideology it’s widely spread among the European Muslims, why?

I sat with them.. The European Muslims denounced everything they saw in Europe..

- But they also come from GCC countries and Islamic countries even..

Nabeel Naiem: I’m with you, it’s spread among the Muslims in Europe and it’s spread in Saudi because Wahhabism is the closest to Takfir than others. And when I sat with them I found out they have a single-sided Takfiri thinking, like when I spoke with Sayyed Imam in the judgment against the ruler’s assistants, where he said there’s no ruler who can rule by himself, he must have the support of the police and army thus the police & army are all also Kuffar (infidels) like him, so I asked what about who goes to the polls to elect the ruler? He replied: He’s a Kafir (infidel).

I told him: you have labeled the Army, police and the people as Kuffar (infidels), you’re a Takfiri..

The religion (Islam) is not so strict, it includes prevention excuses like ignorance, circumstances, causes.. they didn’t study all this, for them the ruler is an infidel that means all of those with him are infidels.. Bashar (Assad) is a Nusairi then all of those with him are Nusairis, although that the Syrian Army 90% of it is Sunni, because that’s the Sunni percentage of Syrians.

But they are one-sided thinking and they’re ignorant..

- Ignorant in what sense?

Nabeel Naiem: Ignorant of the religion (Islam). I was living with Ayman (Zawahri), Ayman is ignorant, he wasn’t saying anything without consulting me first..

- In spite that you mentioned that Ayman Zawahri was refusing at one stage of time to accept the Takfiris (in Al-Qaeda)..

Nabeel Naiem: Yes, we were the ones who didn’t allow them. I told him: If your brother Muhammad joins the organization we will dissolve it because your brother is Takfiri. So he agreed until we entered jail and we’re separated, his brother came in and took over the whole organization, and his brother is retarded actually, he’s Takfiri and retarded, if you talk with him you feel you’re talking with someone who is brainless..

- That’s what’s strange as I mentioned we’re talking about different segments of societies from different countries and even from different education levels, we see PHD holders, how do you call all of these ignorant?

Nabeel Naiem: Ignorance in religion is something and being a doctor is something else.. I’ll give you an example. If I’m a doctor in a clinic, and with me is a nurse, and for 30 years he will be with me, will he become a doctor after 30 years?

Will this nurse become a doctor after 30 years being a nurse?

- This is as a description, right?

Nabeel Naiem: They’re like this, they educate themselves by themselves, they’re like the nurses, they’ll never become doctors. I am specialized in Islamic Sharia, for me he’s ignorant, ignorant in the religion, he doesn’t understand the religion.

- We should explain, you’re talking about Jihad? Salafist Jihad or Takfiris? These are the segments?

Nabeel Naiem: Yes, they’re ignorant..

- All of them?

Nabeel Naiem: I argued with their top sheikh (cleric) – Salafists, Salafist Jihadist and Takfiris, these are 3 different samples, all of them are ignorant?

They’re not different they’re all ignorant, I was living with Sayyed Imam Sharif, he’s the international founder of the whole ideology spread in the region from Jakarta to Nouakchott (in Mauritania), he wrote them a book titled ‘Al Jamei Fi Talab Al-ilm Al-Sharif (Bible in Seeking Honorable Learning), this book is the manifest and ideology of all the Takfiri groups like ISIS, Nusra Front, Ansar Bet Maqdas (Jerusalem House Supporters), Salafist Jihadist, and all of those you can imagine, and nobody wrote after the book of Sayyed Imam (Sharif).

I debated with Sayyed Imam and debated with him about a lot of matters, he told me in the next edition of the book he will rectify & mention the comments I said, he didn’t, he re-issued the book as it is.

I also argued with someone a Takfiri just for sins, a sin is infidelity, like the one committing adultery doesn’t do so and he’s a believer thus he’s a Kafir (infidel), so I argued with him: the punishment for the believer who becomes a disbeliever (leaves Islam) is death, and the adulterer’s punishment is flogging, how does the punishment differ (when committing a sin only)?

The differ in ideology and thinking is long since the beginnings, after Osama Bin Laden (era) between (Ayman) Zawahri & (Abu Bakr) Maqdisi, which resulted in the schism among other organizations, but when we talk now about ISIS, if we compare them with Al-Qaeda, there’s an essential difference between them..

There’s no difference in ideology, only organizational difference..

- Then what is the future of ISIS based on?

Nabeel Naiem: As long as the youth are convinced with the Takfir ideology, ISIS will continue.

Secondly, ISIS is playing on 2 levels: Bashar Assad (Syrian president) is a Nusairi infidel & should be fought, and they use the Fatwas (religious judicial opinion) of Ibn Taymiyyah in regards with the Nusairi sect..

- Depending on feeding these thoughts will ensure its continuity, and maybe other interests..

Nabeel Naiem: And oil.. All sorts of feeding: intellectual, money, gears, munition, all of that.. As long as there are sources feeding this ideology ISIS will continue..

Bernard Lewis founder of Fourth-Generation Warfare said so, he said: we do not need trans-continent armies that would awake nationalism and they return to us as bodies like what happened in Afghanistan & Vietnam, but we should find agents inside the (targeted) country who will carry out the task of the soldiers, and we need a media tool to falsify truths for the people, and money to spend on them..

This is the Fourth-Generation Warfare, agents instead of soldiers..

- This is an alternative army, a war by proxy?

Nabeel Naiem: Yes of course.

- Between who (this war)? We are talking about armies on the ground, Al Qaeda and all what branches out of it, these armies work for the account of which battle and between who?

Nabeel Naiem: It works for the US Intelligence (CIA).

- Who it fights?

Nabeel Naiem: The regimes, they put a plan in 1998 called Clean Break (PNAC)..

- In Iraq, who is it fighting? Is it fighting Nouri Maliki (Iraqi PM)?

Nabeel Naiem: It fights both Sunnah and Shiites, when they entered Sammerra, Sheikh Ali Hatimi, head of Anbar Tribes said: ISIS entered Sammerra and killed a thousand Sunni in cold blood.. and it kills Shiites and kills Christians and kills whoever it faces, ISIS considers all people infidels and their bloods are free.

Who killed Imam Ali appropriated his blood, who slaughtered Hussein wasn’t he a Muslim and from a sect claims they’re Islamist?

All these have a shameless historic extension, the prophet PBuH called them Dogs of Hell, the prophet said: ‘if I meet them I will kill them the same killing of ‘Aad and Iram of the Pillars’, those are the ones behind these ideologies, the ideologies of Khawarij (outlaws in Islam) who the prophet warned of them, and these will continue, as for ISIS, ISIS did not kill a single American. The opposition fighting Bashar Al-Assad fiercefully for 3 years did not shoot a single bullet against Israel..

- What makes the close enemy, so to speak, in the ideology of these groups, the close enemy is these countries and its leaders, geographically speaking, this term as close enemy and far enemy exists in Al-Qaeda, you mentioned Israel which is not far geographically, what makes it far for them?

Nabeel Naiem: No, they don’t say this, they say: fighting an apostate is a more priority than fighting the original infidel, close and far that’s an old saying.. The apostate is us now..

- As per their understanding?

Nabeel Naiem: Yes, we are apostate, the Arab rulers are apostate, the Arab armies are apostate, thus fighting the apostate is a priority over fighting the original infidel, the Jew.

For instance, Issam Hattito, head of Muslim Brotherhood responsible for leading the battles against Bashar Assad, where does he reside? Is he in Beirut? Riyadh or Cairo? He’s residing in Tel Aviv.

Ahmad Jarba, does he stay in Riyadh, Cairo or Tehran? He’s moving between New York, Paris and London, his employers, who pay his expenses..

When Obama was exposed and it was learned that he’s arming ISIS and Nusra Front with American and Turkish weapons said: ‘We will stop the arming because the American weaposn were leaked to Nusra..’ Didn’t Obama say that?

Leaked?! You discovered it was leaked after 2 years war?!

Nusra Front fighters are 10,000 and ISIS fighters are another 10,000, all 20,000 fighters using American weapons, and Obama claims after 2 years he discovers his (American) weapons are leaked to them?! Are you thinking we are fools?

Muslim Brotherhood

When Obama Raised the Muslim Brotherhood (cartoon from Syrianews.cc)

This is a conspiracy against the region, and I told you Netenyahu & Dick Chenney put the Clean Break plan in the year 1998, and it’s destroying 4 countries, they start with Iraq, then Syria then Egypt then Saudi Arabia. It’s called Clean Break plan (PNAC), well known.. Using radical groups in the region.

The legal case (former Egyptian president) Mohammad Morsi is being tried for, the case of communicating (with the enemy) and contacting Ayman Zawahri was an assignment of Issam Haddad by Obama in person on 28 December 2012, he was at the White House in a meeting with the CIA, he says in his confessions when interrogated by the public prosecution in the case..

- How did you get it?

Nabeel Naiem: These public prosecution confessions are published and are available.. Obama entered (the meeting room) and gave the CIA team a paper and left, they read it and told him: it’s required by the Muslim Brotherhood to contain the radical groups in the region starting with Hamas & Al-Qaeda, so he called Ayman Zawahri through Rifa’a Tahtawi, head of presidential court, who happens to be Ayman’s cousin from Rifa’a Tahtawi’s phone.

Ayman (Zawahri) talking to Mohammad Morsi and Morsi says to him: Peace be Upon You Emir (Prince) of Believers, we need your people here in Sinai, and I will provide them with expenses, food and water and prevent security from pursuing them..

This was recorded and sent to the public prosecutor and this is what Mohammad Morsi is being tried for.

If you ask how I got to know this? I was in Channel 2 of Egyptian TV, and with me was General Gamal, 1st secretary of Egyptian Intelligence, who recorded the call and written it down and based on it the memo was written and handed to the Public Prosecutor.

The TV presenter asked him: Is it allowed for the Intelligence Services to tap the telephone of the president of the republic?

He replied: I’m not tapping the president’s phone, I was tapping Ayman’s (Zawahri) phone and found the president talking to him, telling him Peace be Upon You Emir of Believers, so I wrote down the tape, wrote a report and submitted to the head of intelligence..

She asked him: Did you inform the president? He replied: It’s not my job, I do not deal with the president (directly), I deal with the head of intelligence and that’s my limits.

She asked him: What did you write in your investigations and your own report, what did you write after you wrote down the tape (contents)?

I swear to God he told her, & I was in the same studio,: I wrote that Mr. Mohammad Morsi Ayyat president of the republic is a danger for Egypt’s National Security.

So the ignorant should know why the army stood by the side of the people on 30 June, because the president is dealing with Al-Qaeda organization, and it’s recorded, and he’s being on trial for it now, and head of intelligence wrote that the president of the republic is a danger on Egypt’s National Security.

This is the task of these groups in the region. When Obama said he supported Morsi’s campaign with 50 million (Dollars), and when (Yousuf) Qaradawi said: Obama sent us 60 million Dollars for the Syrian ‘Resistance’, God bless you Obama, and we need more..

Did Obama convert to Islam or America became a Hijabi (wore a burqa, veil)?

I ask Qaradawi: When Obama supports the Syrian opposition, is it to establish the Caliphate? And return the days of the Rashideen Caliphates? Or Obama converted to Islam or America became a Hijabi to support the Syrian opposition?

This is the work of agents (spies), exposed and debunked, and we don’t want to fool ourselves and hide our heads in the sand, the region is under a conspiracy and it’s to drag Iran to a war of attrition..

The first statement ISIS announced after the fight with Maliki it said: ‘We will head to Najaf & Karballa and destroy the sacred shrines’, they dragged the legs of Iran (into Iraq).

Iran said they’ll defend the sacred shrines, it has to, it cannot (not defend them), this is what’s required,

It’s required to clash Saudi and Iran in the 100 years war, an endless war, it exhausts Saudi resources and its monies, and it exhausts Iran resources and its monies, like what they did during the days of Saddam in Iraq (with Iran). This is what we should understand, fight and stand against..

- You mentioned Egypt, Syria and Iraq, we see in all of it similar activities, and you also mentioned Saudi, is it in a coming phase Saudi will be targeted?

Nabeel Naiem: It was meant when Muslim Brotherhood lay their ground in ruling Egypt, problems would start in Saudi in 2016 and in the whole Gulf (GCC), this is not my words, this what the head of national security in United Arab Emirates Dhahi Khalfan said, he arrested those who confessed.

From where did Dhahi Khalfan get this? They arrested cells which confessed in details: If Muslim Brotherhood settles in Egypt, they’ll start exporting problems to the Gulf (GCC) through their existing cells, and destabilize the security of the Gulf, and this is what Dhahi Khalfan, head of national security in UAE said, not what I say.

- The circumstances and factors we saw in Cairo, Damascus and Baghdad, in the countries: Syria, Egypt and Iraq, there was a security vacuum and repercussions of so called Arab Spring, what vacuum we are talking about in Saudi Arabia? Where to find the circumstances and factors that would allow these organizations to enter the (Saudi) kingdom? Opening gaps? Where?

Nabeel Naiem: Look, they have a book being circulated in London titled The Rule of Al Saud, in this book they called the Saudi family as Kuffar (infidels), and that it is unjust, and it steals the monies of the Saudis, and it’s an infidel doesn’t rule by God’s commands, and only applies Sharia law on the weak while the strong and the princess no law being applied on them, a book to educate the Saudi youths abroad to fight a war against the Saudi government, they also say: we call on the kingdom to become a constitutional monarchy, ie. the king doesn’t rule, like the British queen, and this trend is being supported by America and Britain and the people working on this are residing in London, the nest of spies, all the spies of the world reside in London..

Their goal is to divide the region in order to achieve Israel’s security.

Israel is a weak and despicable state, by the way, geopolitical, Israel is not a state, like Qatar, is Qatar a state? Qatar is only a tent and a man sitting it with his money and that’s it..

There are countries like Iran, Saudi and Egypt, in geography it exists until the end of times, and there are countries called the Satanic Shrubs, it’s just found you don’t know how, like Israel and Qatar, it can vanish in one day and you won’t find it..

So for Israel to guarantee its existence, all the surrounding entities around it should be shredded.. Kurds to take one piece, Sunnah take one piece, Maliki takes one piece.. each sect has their own piece just like Lebanon they keep fighting between each other, once they finish beating each other they drink tea then go for a second round beating each other..

- I want to get back to the factors in regards with the Saudi Kingdom, you mentioned what is planned for based on this ideology, and you know better, you have experience and you talk about examples and evidences, but how they will enter?

True there was a statement by the Saudi ministry of interior in last May claiming they dismantled a cell that follows ISIS of 62 members, as they stated, but how they’ll enter (Saudi), what are the factors they’ll be depending on to enter?

Nabeel Naiem: I’m telling you they are preparing for the revolution against the ruling family, that it’s a corrupt family, this family steals the money of the Saudis, talks about the roots of the family..

- From inside the kingdom?

Nabeel Naiem: From inside the kingdom, and there are strong Takfiri members inside the kingdom, because as you know the difference beteween Wahhabi and Takfiri ideologies is as thin as a single hair, thus there are a lot of youths who follow this (Takfiri) ideology, add to it the feeding against the kingdom and its government and against the ruling family, it’s very easy for him to blow himself up with anything..

- So it will be only based on these factors, we don’t want to disregard an important point that groups of the ISIS are from the Gulf countries, and there are reports that the (governments of GCC) are turning a blind eye away from recruiting a number of them and sending them to fight in Syria and in a number of other countries including Iraq, as per these reports, could there be recruiting to use inside the kingdom? To move inside the kingdom?

Nabeel Naiem: Yes, yes, most are Saudis & the move will be like that but they were hoping for the Muslim Brotherhood government in Egypt to settle in power, that’s why when (Saudi) king Abdallah supported the 30 June revolution (in Egypt), he did so based on the information he has of what will happen in the region

Why did he stand against the Muslim Brotherhood? Saudi was always containing the MBs, and if the MBs (Muslim Brotherhood) ever made money, it was from Saudi, and Mohammad Qotb, the father of all Takfir in the world, spent 40 years of his life in Saudi, he wrote a book called The Ignorance in the Twentieth Century, and he claims we’re living in an ignorance more than the one in the days of the prophet PBuH, and Saudi hosted him and he was teaching in the university.. What made them go against them (MBs)?

Because the Muslim Brotherhood have no religion, no nation, not safe to be with them, they’ll betray anyone.

- On the other hand, how to deal with such an organization and such an ideology?

Nabeel Naiem: The voices of the Islamic moderation very low, throaty, so to speak..

- We do not hear that loud voice who would stand against them, is it not convincing? Or need mediums?

Nabeel Naiem: No, the sapien voice doesn’t have a vim, they’re employees, they’d say let ISIS burn out with who brought it..

It doesn’t have the vim to respond, doesn’t feel the danger, secondly, Azhar in Egypt, which was leading the movement of religious enlightenment, is absented for the past 40 years, the reason for its absent for 40 years is the oil boom, and the voices of the Saudi clergy becoming higher than the Azhar clergy. Salafism was found in Egypt just to fight Azhar (Islamic University), then, the scholars duty is to respond to the ideology of ISIS, detail it and respond to it, scholars should come and say this is what ISIS is saying and the right respond is this.. and I sat with people who came from London to fight in Syria, they sat with me and thanks to God they went from Egypt back to London.

They came to ask me, and I told them, let’s assume that Bashar (Assad) died in the morning, would I be saying: Why God did you take Bashar while the war is not over yet? Who will replace Bashar?

They replied: (Ahmad) Jarba..

I said: Jarba is worth of Bashar shoes only.. They said: true. And they went back.

I told them you are going to fight in favor of America and Israel, will you be the one to rule Syria?

If you were the one who will rule Syria I will come and fight on your side, I swear by God I’ll come and fight on your side..

But are you going to rule Syria after Bashar? He said no, I told him you are being used to remove Bashar and then Jarba, Salim Idress, Issam Hattito will come, all of those are being raised in the spy nest in London, it’s not you who will rule.

- How can we differentiate between religious commitment and the national responsibility? Is there a problem in combining both?

Nabeel Naiem: Yes, yes, of course, there is a strong fault between the national responsibility and the religious commitment. I’ll tell you what the General Guide (leader) of (Muslim) Brotherhood said? He said Toz (B.S.) with Egypt. This is their vision of the national responsibility.

And when the MBs ruled Egypt.. I’ll give you one evidence for their despise to the nation (Egypt), in the last interview done by the Consular Adli Mansour, the interim president of Egypt with Mrs. Lamis Hadidi, the last question she asked him was about the background picture of the map of Egypt behind him, she asked him to tell her the story about this picture behind him..

He said: this picture was done by King Fouad a 100 years ago, we know that first was King Fouad, then King Farouq then Abdul Nasser, Sadat then Mubarak. He told her since King Fouad did this photo a 100 years ago and it’s hanged there, it was removed for 1 year only, when the Muslim Brotherhood ruled Egypt. They removed it and put in the stores..

And they were working on a plot to concede 600 square kilometers to Hamas to resolve the Palestinian cause..

There is a link between the national responsibility and the religious commitment, and this contradicts with the understanding of the Salafists clerics, and I’ll tell you the political theory of imam Ibn Taymiyyah, who people consider him the most strict imam, Ibn Taymiyyah was asked: if the nation’s interest conflicts with applying Sharia, if we apply Sharia will lose the country, what to do?

He said: Maintaining the homeland is a priority over applying Sharia, because if you lose the country, where will you apply Sharia?

I’ll give you an example to make it clearer, if someone is naked and will fall from the 10th floor, will you rescue him or get him something to wear?

Thus, to preserve the country is more important than to apply Sharia if there’s interest conflict.

- And the interest now?

Nabeel Naiem: To preserve the nation.

- And in fact this is the most absented side between the politics, we called the national responsibility and..

Nabeel Naiem: This is because of ignorance, not knowing what’s the national responsibility, there’s no conflict between national responsibility and religious commitment, it’s because those are ignorants the conflict is happening between the nation and the belief.

- This topic needs more discussing, especially in regards with the relations with regional countries, western countries, in regards with the nature of these countries, its backgrounds and its beliefs, we see relations are allowed with India and China, and when we talk about countries like Iran then the religious backgrounds are mentioned and this also might require further research if possible we can get a comment from you on it?

Nabeel Naiem: What I want to tell you, the efforts of all Islamic countries, Sunnah and Shiites, must combine, to eradicate these groups, because these groups are the claws of colonialism in the region, it’s not on religious bases, there are members of ISIS who do not pray, so in Al-Qaeda, there are members who didn’t pray a single kneeling, there must be a combination of the countries efforts to organically eliminate these groups by security and by intellect, disprove their ideology..

There must be a response to these groups and explaining its ideology is a stray ideology, contrary to the Islamic Sharia, and this is the ideology that the prophet warned from when he said about Khawarij (Outlaws in Islam):

‘Newly in the religion, ribald in their aims, they go through the religion like how an arrow goes through the bow, if I meet them I will kill them the way Iram and A’ad were killed, they’re the worse killers under the skies, blessed who they kill or who kills of them..’ and he called them: ‘the dogs of hell.’

- Thank you a lot sheikh Nabil Naiem, our guest here in the studio, founder of Jihad Organization formerly, and expert in the Islamist groups. – end of interview.

Yours truly kept saying: ‘They fool you, they keep fooling you and they enjoy fooling you, not because they’re smart, but because you’re foolable‘, so I repeat it once again.

////////

Anyway that is the Clean Break, Yinon Plan and an interview with a high-level Jihadi imprisoned for 20 years. While there is plenty more to research about the Middle East, these particular information points still seem as relevant as ever.

Also, who has been using that "Peace through strength" phrase lately? Sigh: Rand Paul: My Foreign Policy Is the Same as Reagan's Peace Through Strength.

"Capital Shield 2014": Military Defense Support of Civil Authorities exercise coincides with US Capitol incident

The US government runs a lot of exercises, which usually happens for ordinary training reasons. On the other hand, many researchers of geopolitics and covert politics note that exercises serve other geopolitical purposes -- for example demonstrating a military alliance with an ally state in front of its rivals. Some argue that exercises can be used as cover for covert operations. Hence wherever there is some dramatic event in the US, it's always interesting to see if there are any coincidental exercises.

In today's case the exercise called Capital Shield 2014 or CS 14 involves 34 agencies. Even if there isn't some cloak-n-dagger twist to this event, doesn't an active exercise sort of encourage more aggressive behavior by officials?

See previously: TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com // The Military’s Plans for Social Unrest: CONPLAN 3502, Civil Disturbance Operations and Martial Law | Public Intelligence // Defense Support of Civil authorities - Wikipedia, the free encyclopedia // http://www.defense.gov/news/homelanddefensestrategy.pdf // http://www.dtic.mil/doctrine/new_pubs/jp3_28.pdf . Defense Support of Civil Authorities is laid out in USNORTHCOM CONPLAN 3501, and the "Civil Disturbance Operations" crackdown plan is right next to it, USNORTHCOM CONPLAN 3502.

Capital Shield 2014: First Responders train in Nation's Capital | Article | The United States Army

WASHINGTON (Sept. 30, 2013) -- Emergency vehicles and first responders are once again in action in the National Capital Region and will be thru Oct. 3. They are participating in "Capital Shield 2014."

CS 14 is a joint training exercise in the NCR that is hosted by the Joint Force Headquarters - National Capital Region. It brings federal, state, local and municipal agencies together to realistically test interagency operability during a crisis impacting the District of Columbia, Virginia, and Maryland. It also trains and prepares the Department of Defense to provide defense support to civil authorities and employ appropriate force protection measures as requested.

"Because we are all regional partners it's nice to be able to pick up the Phone and KNOW the other person on the end of the line when you are in need of some help," said Fairfax County Fire and Rescue Battalion Chief Paul Ruwe. "It's a lesson learned from 9/11. We had good regional contact with the FBI Washington office, and that really helped after the attack on the Pentagon."

Ruwe is the Incident commander at the Lorton Training site, Lorton Va., and said the training site will be very busy over the next few days.

More than 38 participating agencies from DOD and Capital region response agencies will perform mock mass casualty rescues, Defense Support to civil agency technical rescues and law enforcement tactical responses. The goal of the exercise is to ensure government agencies at every level are prepared to coordinate action to protect the public in the event of an actual disaster in the National Capital Region.

FOR ADDITIONAL INFORMATION: Please visit the Capital Shield 2014 website at www.mdwhome.mdw.army.mil/capital-shield.

/////

IMG/caption: Chief Warrant Officer 4, Frank Pater, Battalion Senior CBRN Officer explains the days training events to role-playing "victims" at the Lorton Va. emergency training site, Sept. 30, 2013. The Joint Force Headquarters - National Capital Region is…exercise.png

/////

Aha our old friend Defense Support of Civil Authorities (DSCA): Capital Shield

Concept of Operation

Exercise CS14 will be comprised of multiple FTX and CPX events both linked and de-linked through a scenario which will be designed to focus on testing JFHQ-NCR/MDW subordinate units, MDW Installations, and Component Services as a JTF on OPLAN 3600 requirements of CBRN response, Tech Rescue operations, Mass Casualty treatment, stabilization, evacuation and DSCA.

Purpose

Validate JFHQ-NCR/MDW, Service Components, National Guard, JTF CAPMED, and Interagency Partners consequence management operation through a FTX and CPX focusing on Defense Support of Civil Authorities (DSCA) scenarios.

Objectives

  • Annual Validation of OPLAN 3600 Emergency Preparedness in the NCR.

  • Execute Command & Control with Subordinate Units, Subordinate Garrisons, Service Components, NG, CapMed and IA mission partners.

  • Execute interagency interoperability, coordination, and situational awareness within the NCR.

  • Validate JRC/JRSOI procedures with MDW Subordinates/Installations, Components Services/Installations.

  • Validate BSI Capabilities for MDW Subordinate Installations & Component Service Installations.

End State

JFHQ-NCR/MDW is prepared to conduct Defense Support of Civil Authorities (DSCA) and BSI operations.

In an additional angle, the best early circulated footage of the attack is from Alhurra which is a US government-sponsored news service in the Middle East. See http://talkingpointsmemo.com/livewire/video-shows-police-chase-at-u-s-ca.... As noted by ABC News, Alhurra is sponsored by the Broadcasting Board of Governors, like "Radio Free Europe" , "Voice of America" & "Radio Free Asia". http://abcnews.go.com/blogs/headlines/2013/10/what-is-alhurra-network-th...

New data mining revelations, DEA drawn in quickly; Privacy & Surveillance DICE, PROTON, CRISSCROSS & CLEARWATER partial master programs? Lexis-Nexis on private side

It's a pretty woolly political scene right now & wanted to slam up some docs leading different directions on this. At least the damn narrative is moving along.

More or less we're looking at the merging of criminal investigations with direct military signals intelligence (SIGINT) technology run by the same contractors that recently ran these technocratic social control 'kinetic' programs for the Pentagon in assorted occupied lands around the Middle East etc.

Naturally the war on drugs first brought this war home - special bonus points for the Viktor Bout angle of the DEA SOD/DICE projects story from Reuters earlier...

Latest: Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987. ......

Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

The program was started in 2007, according to the slides, and has been carried out in great secrecy.

“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

Oh the war on drugs, will your terrible travesties never end... Nice work exposing this program by all involved!! A spectacular catch for sure.

////

Meanwhile we also have yet to deal with the terrible secret Special Operations Division which as this slide makes clear, subverts the entire concept of criminal defense and discovery. Therefore probably all drug cases should be thrown out, eh?

SOD-DEA-coverup.jpeg

Rules of SOD Photo Source - REUTERS

Exclusive: U.S. directs agents to cover up program used to investigate Americans | Reuters via Cryptogon.com: U.S. COMMUNICATIONS INTELLIGENCE SECRETLY SHARED WITH LAW ENFORCEMENT FOR USE AGAINST AMERICANS IN CRIMINAL INVESTIGATIONS

By John Shiffman and Kristina Cooke

WASHINGTON | Mon Aug 5, 2013 3:25pm EDT

(Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.

"I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

"It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

THE SPECIAL OPERATIONS DIVISION

The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred.

Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential.

"Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."

.....SOD'S BIG SUCCESSES

The unit also played a major role in a 2008 DEA sting in Thailand against Russian arms dealer Viktor Bout; he was sentenced in 2011 to 25 years in prison on charges of conspiring to sell weapons to the Colombian rebel group FARC. The SOD also recently coordinated Project Synergy, a crackdown against manufacturers, wholesalers and retailers of synthetic designer drugs that spanned 35 states and resulted in 227 arrests.

Since its inception, the SOD's mandate has expanded to include narco-terrorism, organized crime and gangs. A DEA spokesman declined to comment on the unit's annual budget. A recent LinkedIn posting on the personal page of a senior SOD official estimated it to be $125 million.

Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE.

The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said.

About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.

"We use it to connect the dots," the official said. ...

//////

OK so let's get to PROTON, CRISSCROSS, CLEARWATER and Lexis-Nexis. I think this covers a lot of new ground. Hard to say if the DOJ side of the story ties in, but the Lexis-Nexis level is pretty clearly documented already but not well known outside of research circles. Also some of this gets to the SCS - Special Collection Service - which I think would have been part of Snowden's tour of duty in CIA.

SOURCE: http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

18 August 2013

PROTON, CLEARWATER and Lexis-Nexis

A Proton/Crisscross job ad below.


A sends:

PROTON, CLEARWATER and LEXIS-NEXIS

Given the use of constitutionally repulsive practices by the Department of Justice, the Internal Revenue Service and other federal agencies, this information is being made public to educate and inform so they might arm themselves against government intrusion and for attorneys as a backgrounder for future appeals.

I suggest American guerillas seek non-Internet modes of communication. If you think Rex Sherwood was pulled over for not using a turn signal, you are wrong.

I was "read on" the PROTON/CRISSCROSS program in late 2006 and was a frequent user of this system for over a year. As part of my duties, I employed PROTON/CRISSCROSS in HUMINT exploitation role. In the Intelligence Community, PROTON/CRISSCROSS is referred to as PROTON. Unless otherwise specified, the same is true in this report.

PROTON is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling. PROTON is the program name as well as the name of the technology. It has been described as "SAP-like", and I suspect that PROTON was once a DEA special program. PROTON is well known in HUMINT and DOJ clandestine law enforcement. It remains the primary, if not fundamental, tool of HUMINT and DOJ law enforcement operations, both of which have considerable overlap in phenomenology and methodology. PROTON carries the FISA caveat because Top Secret FISA collection is contained in PROTON's massive database.

Through my professional associations within the Intelligence Community, I became aware of a Department of Justice (DOJ) system called CLEARWATER. CLEARWATER is similar to PROTON but at the SECRET/NOFORN level of classification and exclusively a DOJ program, where PROTON is CIA, DOJ and DOD. Most DOJ Special Agents and analysts do not have Top Secret clearance. Every informant is run through CLEARWATER, every witness gets vetted through the system.

PROTON and CLEARWATER are not just analytic tools, they provide actionable intelligence and both programs are used everyday for target discovery and development. CLEARWATER practically leads FBI and DEA investigations. PROTON is used throughout HUMINT for asset validation, recruitment, background checks on sources, etc. The FBI and DEA as both law enforcement and intelligence community members have resources of both sides and domestic law enforcement by these agencies is more of a HUMINT operation of the type seen in Afghanistan. Find, Fix, Arrest. PROTON and CLEARWATER work so well that Special Agents and Case Officers can't wait to get data into the system and see how it networks together.

Top Secret and FISA mean NSA sensitive sources and foreign collection. NSA resources are unneeded in America---CALEA and the DOJ have that covered for you under Title III, the Patriot Act and opinion from the federal kangaroo judiciary.

FISA is not only used against terrorists and spies but also private and quasi-government organizations . The most impressive network I ever laid eyes upon was the PROTON derived communications network of the Netherlands and Swiss SWIFT. Allot of target discovery there. It's how you find a needle in a haystack. The U.S. hosts one of three SWIFT secure messaging centers. Well, the NSA and CIA have insured SWIFT is allot less secure. SWIFT is a major communications target and the NSA is deep in that This is a modern take on "follow the money." If Americans are wondering how the IRS found their secret bank accounts..well, here 'ya go.

When I read the description of Drug Enforcement Administrations (DEA) DEA Internet Connectivity Environment (DICE) system: the billions of records, partnership with CIA, NSA and DOD, the need to cover sources at the expense of a fair trail--- it struck me that what was described sounded more like PROTON and/or CLEARWATER.

As I read further, DICE was sounding more like a legitimate DEA program that was being used to provide cover for PROTON and/or CLEARWATER---either intentionally or sacrificially. The early descriptions of DICE present it as an information sharing and collaboration tool through the Internet. The recent public descriptions of DICE are awkward and contrived when compared to past information.

DICE is being used to cover PROTON and/or CLEARWATER.

Properly, CRISSCROSS is the database of telecommunications selectors. Selectors are, in NSA terms, that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI---really any telecommunications "number" or "address" a person would have as a means to contact another, are contained in CRISSCROSS.

PROTON is the operating software written in JAVA for cross-platform usability and runs on JWICS for connectivity to CRISSCROSS.

PROTON contains the tools for network analysis and would be familiar to anyone who has experience in undergraduate social network analysis, statistics and data visualization.

CRISSCROSS has an interesting and murky history. As it was explained to me by a PROTON Program Officer, CRISSCROSS was originally a very secret DEA program to provide a repository for DEA collected selectors. It was, by every account, an excellent resource. With the post-911 reorganization of the Intelligence Community, everyone was required to share their resources for the "War of Terror." CRISSCROSS was very successful and well-received and ultimately exceeded DEA capabilities to manage. The CIA took over as executive agent---but CRISSCROSS is shared by the DOD and DOJ in a co-ownership manner.

It's uncertain if PROTON received Special Collection Service (SCS) data when it was a solely DEA activity, but PROTON presently receives SCS collection amounting to about 1 one terabyte monthly, and that's just selectors, not content. PROTON also receives data from Computer Network Exploitation (CNE), by the now famous Tailored Access Office (TAO). Included as well is an enormous repository of Title III data from CALEA enabled domestic collection, FISA and an enormous amount of purchased data from various communications providers like Intellius.

PROTON does not contain content, only selectors for targeting. Consider that in the context of one (1) terabyte of just selectors per month (just from the SCS) for over 10 years. I have no idea how much the TAO provides, however the two biggest contributors to PROTON are the SCS and TAO.

An analyst or law enforcement officer can "run" a selector in PROTON and visualize the social network of correspondents associated with that selector in a visual format. The user can select and display most frequent numbers called or have called, duration of call, and other functions familiar to social network analysis. An analyst may choose to look at the network in terms of who called who: persons of importance typically have allot of people calling them so we can build a network based on that to determine centricity. We can build a network based on call duration, frequency, date---pick a variable. Sometimes it's useful to look at the outliers which may be hang-arounds to some drug trafficking organization. We can task NSA or DOJ for collection on these hang-arounds and begin network deconstruction from the ground up.

These calling networks include family, friends and other non-target persons. Non-target persons, like family members, are very useful in developing the target and as leverage. Non-target communications provide intelligence from things spoken between people in confidence who may not be aware of the targets activities or associations, like the location of a fugitive who has ceased using his known selectors, but communicates with his mother through her known selectors.

Another very useful feature is the Bankswitch function, which allows network discovery by the calling pattern, not necessarily by a selector. Often, groups of U.S. government interest will use a cellphone, then dispose of them , preventing further intelligence collection from that group of cellphones. Bankswitch allows the analyst to quickly rediscover the calling network that has switched phones. Humans typically have some constant behavior in who and how they make their calls and persons. Groups and enterprises not having supplicated to the U.S. government avarice will have a whole additional set of behaviors in who and how they call.

This is highly useful for calling networks that dispose and rotate telephones regularly. A fresh cellphone provides enough of a lead to discover the calling pattern of the whole network based on historical calling records. Both the DEA and FBI have found this useful in their activities in Columbia, Mexico and the United States.

I know for certain PROTON contains communications selectors on American Citizens (AMCITS) since I ran a query on a number using only a Maryland area code and a partial prefix. PROTON returned a huge list of "masked" domestic numbers. An NSA masked number is always domestic and reveals only the area code and prefix with the rest of the number obscured. A PROTON user can email the NSA with a request to unmask the number---it's in the database, but a user has to present some justification for a number to be unmasked. Voice cuts are available through a similar process.

PROTON is really well thought out. Not only does it provide a wealth of network investigative tools, it also allows for the easy introduction of data. Let's say you're a DEA Special Agent surveilling local boat captains as part of OPERATION PANAMA EXPRESS (PANEX) in Barranquilla Columbia---a major Port of Origin for drugs to the U.S. and someone gives you a business card. Just run the number and see if it hits. The Special Agent" can take that card and mail it to the PROTON Program Office (PPO). Scans, cell pictures of the information are also acceptable to ingest.

An FBI Case Officer attending a UAV conference in Las Vegas can take all the "grey literature" and hand that to the PROTON office as well. The numbers find their way into the database The PROTON office will also ingest entire phone books---still popular in some parts of Europe and Asia. They use a method similar to Google books to automatically turn pages and scan data from them.

Anything that contains a selector can go into PROTON. Part of the PROTON program is the resource that provides software engineering to order unordered data and otherwise make raw data ingestible. PROTON users can add and edit PROTON data as well. If a user discovers the identity of a previously unidentified selector, one can edit that record or leave notes for other users.

With PROTON, you can see who's talking to whom in a telecommunications relationship context. How you hit that network is up to you.

Network deconstruction techniques vary throughout the 'Community. Domestically, the DOJ prefers the highly publicized raid with the media providing the entertainment backdrop. The DEA prefers covertness. The DOD prefers a Predator strike. Yes, those drone attacks are network deconstruction techniques and target selection is often facilitated, if not provided, by PROTON.

As stated earlier, CLEARWATER is a SECRET/NOFORN version of PROTON. The DEA red herring called DICE reportedly contained NSA collection which rules-out CLEARWATER (a S//NF system) and highlights PROTON (a TS//SI system) as the source of DICE intelligence.

I'm providing information on both since the government is no longer under constitutional restraint and is illegitimate. Parallel Construction. You fuckers. A cornerstone of American law and western culture sacrificed for the security of the Elites.

With the CALEA requirements, TITLE III collection is very simple affair involving a court order and the Cisco routers which, through CALEA legislation, are engineered for surveillance. Cisco is a very enthusiastic partner to the Intelligence Community---one of those sensitive relationships managed through the NSA Special Source Operations office. The NSA finesses such relationships---with the DOJ, you get a thug in a nice suit and the quiet menace of federal law enforcement. If you think the DOJ is a law enforcement agency, you're stupid. Internal security is DOJ Job #1. As we have seen, the DOJ is maintaining internal security by both legal and extralegal means with the full support of the federal judiciary and the lukewarm animus of the U.S. Congress.

Federal judges and congress persons are largely immune to DOJ surveillance. You are not. The "new" counter-insurgency operations by the government concentrate on a Reasonable Suspicion by persons and groups---not on Probable Cause.

CLEARWATER contains selectors from any number of sources: TITLE III, purchased data from telecommunications data brokers, National Security Letters, subpoenas, technical operations by FBI TACOPS, search warrant, informant production, arrests, detentions. If the DOJ has searched you, arrested you or let you go, count on that data being in CLEARWATER. Did you give the Special Agent your telephone number?

Arresting someone to search them without needing consent or court order is not an unheard of means to get a Person of Interests selectors into CLEARWATER. Something laying openly on your desk? A cell-phone snap and email to the program office. How about those utility bills you throw away without shredding? If you're a Person of Interest, somebody is walking away with your trash.

There is a a real motivation by DOJ Special Agents to get telecommunications selectors into PROTON or CLEARWATER to build the networks for analysis and deconstruction.

CLEARWATER has all the features of PROTON and at least one other---mapping. An FBI Case Officer operating domestically can query say, Lahore Pakistan, and place on a map, those locations in the U.S. where those calls originated or terminate---a choropleth map with colored density clusters, all in a spatial context. With that, the DOJ knows where to focus it's domestic security efforts. A DEA Special Agent can run a selector seized in an amphetamine investigation and, within a few minutes, have the calling network and visualize the correspondents locations on a map. That's how DOJ led task forces show up in your neighborhood.

Watching a OWS protester enter a number into their cell phone is perfectly legal without consent or a warrant and once I get that number, we'll look at that calling network, find the node that is you, and walk that back to that moment we shared under the chestnut tree.

If you're visiting the USA from abroad, you may have your wallet and pocket litter photocopied at secondary screening. Then an email to the National Counterrorism Center (NCTC) Terrorist Identities Datamart Environment (TIDE) office, and from there, a Forward to the PROTON office.

PROTON, CLEARWATER and LEXIS-NEXIS all provide data export into Analyst Notebook file format (and PDF for ease of sharing).

All members of the Intelligence Community have access to LEXIS-NEXIS. LEXIS-NEXIS contains biographic information on most Americans having a driver or occupational license. Your state sells the contents of its drivers license database to companies like LEXIS-NEXIS for a profit. They can do this since that information is considered in the public domain---driving is a privilege and if you don't want to be in database then don't get a drivers license. LEXIS-NEXIS contains other highly personal and granular information depending on which state is providing information. Florida provides pretty much everything it can to LEXIS-NEXIS. Automobile information, luxury water craft, occupational licenses---if you submit information to a state agency, it can end up in LEXIS-NEXIS. All domestic law enforcement has access to LEXIS-NEXIS, its a fundamental investigative tool. IRS, DOJ, Treasury, Local PD, Sheriffs Office all have a LEXIS-NEXIS access or the means to pull data from them.

Law Enforcement Officers can have their data removed from LEXIS-NEXIS. An LAPD and NYPD "spokesperson" informed me that this is the case. Imagine your a citizen in New York and you get surveilled by one of the numerous surveillance technicians the NYPD has fielded since 9-11 , a quick look-up via mobile device or WiFi and they know who you are now.

So, a Special Agent or analyst simply runs the selectors in PROTON and CLEARWATER, then runs those names or other biographic/vital information again in LEXIS-NEXIS, all that data related to the TARGET is exported in Analyst Notebook format, those files are imported into the Analyst Notebook application and...viola!...a relatively complete social network and biographics of the TARGET. That could be you of course.

By Supreme Court decision and other judicial misadventures, LEXIS-NEXIS contains public information and you do not have an expectation of privacy. There is no need for Probable Cause or Reasonable Suspicion because this data is, by judicial opinion, public. Something to think about next time you're at the DMV. Citizens are queried regularly in LEXIS-NEXIS. CLEARWATER and PROTON provides network association and the selectors. A subpoena, NSL or search warrant to the telecommunications provider of that selector gives us names and locations. LEXIS-NEXIS provides Pattern of Life, geolocation and personalia. I was able to see my past three residential addresses, past telephone numbers and identifying information about my previous automobile. LEXIS-NEXIS is coupled to Automatic License Plate Recognition Systems (ALPRS) as well. Who you are, where you were and where you are.

The DOJ and Intelligence Community access LEXIS-NEXIS through a VPN and a proxy (government). A DOD proxy is registered to the Virginia Contracting Office, but it's a non-logging proxy so, good luck in your discovery. LEXIS-NEXIS has no idea of the individual accessing it's database and, according to the spokesperson, does not maintain logs of government clients. A subpoena cannot discover what is not there.

Around 2008, LEXIS-NEXIS purchased Choicepoint to start their new product line. I recall some representative, at a promotional meeting, extolling the virtues of Choicepoint---all the data in a easy to use format. A user of Choicepoint could run a query and not only get biographics and addresses but have that information located on a map or satellite image (by Pinpoint, Inc. or a Google map server). The Choicepoint representative giving the presentation said no Social Security Numbers or drivers license pictures would be included in the database in order to protect the rights of the citizen. Such conceits are good ethics in Washington, D.C.

That said, CLEARWATER and PROTON are not omnipotent. Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated. Of the many systems used by NSA and DOJ, CLEARWATER, PROTON and LEXIS-NEXIS are the most significant from a "boots on the ground" investigative prospective.

There is real concern that PROTON may be to widely known for such a program and efforts are being made to walk it back into a compartment.


A Proton/Crisscross job ad:
http://jobs.cgi.com/job/Hanover-SIGINT-Analyst-Job-MD-21075/1184801/

SIGINT Analyst Job

Date: Aug 14, 2013

Location: Hanover, MD, US
Job Order: J0311-0630 - Permanent Full Time
Title: SIGINT Analyst
Category: Consulting / Business / Functional
City: Hanover, Maryland, United States

Job Description: SIGINT Analyst

CGI Federal is seeking a SIGINT Analyst to work in our Hanover, MD office.

Specific Duties:

Applicants will work as a member of a government-contractor team whose primary focus will be providing support to deployed analysts and software developers.

In this capacity, uses an in-depth knowledge of general communications procedures, traffic analysis and reporting formats and vehicles to produce time-sensitive and event-oriented reports

Provide support to force protection, indications and warning and situational awareness; provides target continuity and mentorship to a junior and rotating workforce; conducts research to answer RFIs and produces working aids to support new tool development.

Must be willing to receive and conduct training on new systems, databases, processes and procedures.

Analyst will be supporting deployed US military troops and must understand the military decision making process and miliary doctrine.

Minimum of five (5) years experience with the military or government agency using the collection management cycle, intelligence cycle, targeting cycle, and the SIGINT intelligence fusion process from tactical to national level required.

Additional Requirements:

Experience with Falconview, Analyst Notebook, Arc View, Arc-GIS, Arc-Editor, AIM, Pathfinder, SEAS, STARLIGHT, GCCS and other current analyst tools.

Active TS/SCI security clearance w/ polygraph required.

Preferred:

Experience with NSANET, RTRG tool suite, Global Reach, Proton/Criss Cross, Broom Stick, CW II, Banyan. Geo Bootcamp and knowledge of ArcGIS a plus.

Preferred experience includes analysis in OIF/OEF, NSA, INSCOM, or ACE At CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 71,000 professionals located in more than 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com.

This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.

We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted.

No unsolicited agency referrals please.

WE ARE AN EQUAL OPPORTUNITY EMPLOYER.

Skills

- Analytical Thinking
- Signal Intelligence (SIGINT)

Reference: 137685

//////

Check out the BOLO - be on the lookout - National Guard civil disturbance training program photos here:North Carolina National Guard Rapid Reaction Force Civil Unrest Training Photos | Public Intelligence. Obviously PROTON, DICE, CRISSCROSS, CLEARWATER style database technology would be useful in composing intelligence

Official description: CHARLOTTE, N.C. – Soldiers of the North Carolina National Guard train for Rapid Reaction Force duty at the Catawba River Pump Station here today. The training scenario tests the Soldiers ability to use nonlethal force to disperse a crowd of aggressors from a water plant. This training prepares the Soldiers to support state and local first responders and county emergency management agencies. The RRF is a quick reaction team that, on order, is deployable anywhere in North Carolina within 24 to 36 hours of a critical event. In times of crisis, the RRF may be ordered by the President of the United States or the Governor of North Carolina in order to augment Federal or State Authorities in response to actions such as a known terrorist attack, civil unrest or a natural and/or man-made disaster. (U.S. Army National Guard photo by Sgt. 1s Class Robert Jordan / released)

nc-rrf-3.jpg nc-rrf-9-1024x724.png nc-rrf-8-1024x708.png

/////

Other targetings: Russia Issues International Travel Advisory to Its Hackers | Threat Level | Wired.com

WaPo/Snowden: U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show - The Washington Post

Black Budget semi-surfaces: ‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post

Israel listed as major counterintelligence threat in Black Budget: Leaked documents reveal US sees Israel as a spying threat (Video) - The Hill's Global Affairs

WIRED on cryptology cracking in black budget: New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | Wired.com

Login Lulz for Snowden in Ars Technica Aug 29th: Sysadmin security fail: NSA finds Snowden hijacked officials’ logins | Ars Technica

.... Leaving it there for now...

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

BREAKING: NSA whistleblower Russ Tice says Obama spied on by NSA; Colin Powell's telecoms tracked by NSA satellite tech

///// UPDATE Friday 2pm Central: Tice got squelched by shady NBC lawyers at the last second according to BoilingFrogsPost.com:

Today MSNBC aired an interview with Mr. Tice disclosing “some” of his revelations, thanks to the vigilant activists who tirelessly shared and disseminated Mr. Tice’s revelations and interview audio. Interestingly, at the last minute, MSNBC told Mr. Tice that they would NOT include his revelations on NSA’s targeting of Obama, elected officials, attorneys, judges and activists. Basically, they censored his entire testimony on these stunning allegations!
In a correspondence with Boiling Frogs Post immediately following his censored interview with MSNBC Mr. Tice stated: “When they were placing the ear-phone in my ear with less than ten minutes left till my air time, the producer in New York said that their lawyers were discussing the material, and at this time, they did not want me to mention anything about the NSA wiretaps against all the people and organizations that I mentioned. That is how it went down. I did say on the air that I know it is much worse and would like to talk about that some time.”
- See more at: http://www.boilingfrogspost.com/2013/06/21/msnbc-censors-nsa-whistleblow...

The heat is on and the squirrels are getting squirrelly!!! /////

shit-just-got-real.jpg

Been waiting to hear more material from Russ Tice, one of the earlier NSA whistleblowers. Fortunately one of our ol' underdogs BoilingFrogsPost.com & Sibel Edmonds got Tice to lay out a lot of new stuff. Tice was a major source for NSA revelations including the 2005 NY Times warrantless wiretapping story.

Named NSA targets by Tice include current Supreme Court Justice Alito, Sen. Dianne Feinstein, Hillary Clinton, Rep. Henry Waxman, then-Sen. Evan Bayh, Sen. John McCain, Sen. Jay Rockefeller, then-US Rep. Kucinich. And of course President Obama.

Here is a quick clip: via very big on FiredogLake: BREAKING: NSA Whistleblower Russ Tice Alleges NSA Wiretapped Then-Sen. Candidate Barack Obama | MyFDL

In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.” He reveals the NSA as a Deep State that targets and wiretaps US political candidates for its own purposes. We discuss the latest controversies involving the NSA, PRISM, Edward Snowden, and the spins and lies that are being floated by the US mainstream and pseudo-alternative media. Do NOT miss this revelatory interview.

Listen to the preview Here - See more at: http://www.boilingfrogspost.com/2013/06/19/podcast-show-112-nsa-whistleb...

DOWNLOAD HERE > http://www.boilingfrogspost.com/podpress_trac/web/20927/0/BF.0112.Tice_2... - you may want to skip to about 50 minutes to catch the name dropping space spying going on.

bfp_podcast_version.gif"Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."

There was a lot of specific references to space-based platforms - that is National Security Agency satellite technology - which was Tice's specialty to which he has now apparently turned The Blowtorch with excellent timing.

The story is getting out now. Bush-era whistleblower: Obama was NSA wiretap victim in 2004 | The Daily Caller. Huffpo did a quick post: Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004. Duly flagged on Cryptogon: Russ Tice on Boiling Frogs Podcast

Iran's press service flagged it: PressTV - NSA spied on Obama: Whistleblower

At the Guardian: Procedures used by NSA to target non-US persons: Exhibit A – full document | World news | guardian.co.uk && Revealed: the top secret rules that allow NSA to use US data without a warrant | World news | guardian.co.uk

Vast discretion vested in NSA analysts -- Glenn Greenwald http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

The vast amount of discretion vested in NSA analysts is also demonstrated by the training and briefings given to them by the agency. In one such briefing from an official with the NSA’s general counsel’s office – a top secret transcript of which was obtained by the Guardian, dated 2008 and then updated for 2013 – NSA analysts are told how much the new Fisa law diluted the prior standards and how much discretion they now have in deciding whose communications to intercept:

“The court gets to look at procedures for saying that there is a reasonable belief for saying that a target is outside of the United States. Once again – a major change from the targeting under Fisa. Under Fisa you had to have probable cause to believe that the target was a foreign power or agent of a foreign power. Here all you need is a reasonable belief that the target is outside of the United States …

“Now, all kinds of information can be used to this end. There’s a list in the targeting procedures: phone directories, finished foreign intelligence, NSA technical analysis of selectors, lead information. Now, you don’t have to check a box in every one of those categories. But you have to look at everything you’ve got and make a judgment. Looking at everything, do you have a reasonable belief that your target is outside the United States? So, cast your search wide. But don’t feel as though you have to have something in every category. In the end, what matters is, ‘Does all that add up to a reasonable belief that your target is outside the United States?’”

So vast is this discretion that NSA analysts even have the authority to surveil communications between their targets and their lawyers, and that information can be not just stored but also disseminated. NSA procedures do not ban such interception, but rather set forth procedures to be followed in the event that the NSA analyst believes they should be “disseminated”.

The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.

Also: FBI Admits That Obeying The Constitution Just Takes Too Much Time | Techdirt

And: Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]

Plus: Straight Outta Government: GSA Mulls Deal With Rap Genius - Nextgov.com (wat?)

And: Obama’s crackdown views leaks as aiding enemies of U.S. | McClatchy

Wowww… busy days people. It's amazing to see a suppressed narrative like the NSA domestic spying apparatus suddenly catch such traction in so many quarters!

The other heinous thing - well one other thing - is the secret TPP treaty. I'm glad reelected Rep. Alan Grayson is going to kick at it. First Congressman Allowed to Read Secret Treaty Says “This ... Hands The Sovereignty of Our Country Over to Corporate Interests” | Zero Hedge

The TPP is nicknamed “NAFTA on steroids.” Now that I’ve read it, I can see why. I can’t tell you what’s in the agreement, because the U.S. Trade Representative calls it classified. But I can tell you two things about it.

1) There is no national security purpose in keeping this text secret.

2) This agreement hands the sovereignty of our country over to corporate interests.

3) What they can’t afford to tell the American public is that [the rest of this sentence is classified].

……..

It is ironic in a way that the government thinks it's alright to have a record of every single call that an American makes, but not alright for an American citizen to know what sovereign powers the government is negotiating away.

***

Having seen what I’ve seen, I would characterize this as a gross abrogation of American sovereignty. And I would further characterize it as a punch in the face to the middle class of America. I think that’s fair to say from what I’ve seen so far. But I’m not allowed to tell you why!

Also: Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

Alright leaving this here for now. Get tuned in and look around - the truth is out there! SAIC, Booz Allen Hamilton, the grip of your sorts on all our lives is in for its createst challenge yet. The infosec praetorians are overdue for a fall in their space-age egos!

Pentagon domestic operations switches from "pull" to "push" on 24-48hr timelines: "Defense Support of Civil Authorites" expands

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

There is also a video here: http://www.pentagonchannel.mil/Video.aspx?videoid=285596

Mirrored: Domestic Pentagon ops expands Defense Support of Civil Authorities vs domestic extremists - YouTube

//// UPDATE 4.22.13: I forgot! Here is one version of USNORTHCOM CONPLAN 3501. Thanx to YAN, reddit, & Cryptogon for taking note of this post! This video from the Boston metro area shows what domestic militarization of police is all about:

Also please follow PublicIntelligence.net and Cryptome.org for more handy docs. PI in particular has been pretty well on top of this.////

Mission drift into the US continues as the Pentagon contemplates dealing with "domestic extremists" under the rubric of Defense Support of Civil Authorities (DSCA) - one aspect of which is the US Northern Command's "USNORTHCOM CONPLAN 3501".

CONPLAN 3501, This generic emergency plan is relatively easy to obtain (most of the text), but it is the "friendly" hand of the DOD compared to the more mysterious and riot-control-oriented "USNORTHCOM CONPLAN 3502" entitled "Civil Disturbance Operations" (CDO). This surfaced in researching the role of Northcom at the 2008 Republican National Convention, which was a very 3502 CDO style operation with National Guard controlling space on Kellogg Blvd. CONPLAN 3502 is the post-2002 version of GARDEN PLOT, the 1960s-1990s template plan for domestic military deployments, like for example in the LA Riots.

This extends the story from late 2010: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com and reconfirms various aspects.

/////////////

Here is the new front-piece document. Also bonus weird stuff about the ever popular integration of North America.

An interesting Snippet:

Loosely-networked or individually motivated violent extremists will continue to exhort followers and encourage violent extremism in the homeland.

o HVEs will operate alone or organize in small groups and will be largely autonomous in their operations; they will have access to web-based resources to assist them in their operational planning.

o Military members and facilities will remain prominent targets of terrorists, and particularly by HVEs.

ł DoD will be called upon to provide significant resources and capabilities during a catastrophic event in the homeland.

o The National Response Framework will remain the primary instrument for applying Federal capabilities during disaster response.

And

Rapid and actionable intelligence on terrorist threats

DoD will maintain and enhance the Joint Intelligence Task Force for Combating Terrorism (JITF-CT) as its key node for sharing intelligence with interagency partners on terrorist threats. DoD will improve and refine intelligence and information-sharing relationships that have developed since 9/11 and as a result of the Fort Hood shootings.

DoD maintains a robust array of foreign intelligence capabilities, and sharing relevant counterterrorism-related information with the Federal Bureau of Investigations (FBI) and other key parties is vital to the prevention of potential terrorist threats to the homeland. JITF-CT will remain the focal point for DoD’s outreach and sharing of intelligence and information with the FBI, the Office of the Director of National Intelligence (ODNI), and the National Counterterrorism Center (NCTC). Additionally, DoD will expand its participation within the various FBI Joint Terrorism Task Forces (JTTFs),9 as well as other similar entities to maximize “top-down” and “bottom-up” sharing of key pieces of intelligence and information, consistent with applicable law and policy.

And of course, Unity of Effort and the ever popular Council of Governors:

Promote Federal-State Unity of Effort

Unity of effort between the Federal Government and States must be one of DoD’s guiding principles in the homeland, since unifying DoD’s efforts with those of its external partners improves collaboration and shortens response times for meeting life-saving needs during emergencies. Unity of effort also means greater national preparedness at less overall cost, while preserving both Federal and State constitutional requirements and responsibilities. DoD and its Federal partners must continue to strengthen unity of effort with States to define common goals regarding capabilities, structures, and processes for responses to disaster and emergencies in the homeland. The Council of Governors – established by Executive Order in 2010 – will be an essential forum for enhanced, senior-level dialogue among Federal and State civilian and military officials for this purpose.

[.....] DoD will regard dual-status commanders as the usual and customary command and control arrangement in cases where Federal military and State National Guard forces are employed simultaneously in support of civil authorities within the United States.

DoD will continue to refine processes for dual-status commanders and their associated command structures. By leveraging the use of such commanders, DoD will improve Federal-State communication, economy of force, and force employment for planned events and no-notice or imminent incidents. Historic examples of the employment of dual status commanders include national special security events such as the Democratic and Republican national conventions and responses to disasters like Hurricane Sandy and wildfires in the western United States...

Vague talk of militarized domestic databases always good:

Since Federal and State military components have varying requirements for relevant information and level of detail, development of a COP solution need not specify systems, hardware, or software. Instead, it must be based on common data from authoritative military or civilian databases that flow to various systems in a common format.....

The DCE/DCO structure is reconfirmed to be key to domestic military operations:

DoD will use the planning capacity of Defense Coordinating Elements (DCEs) to expand planning cooperation at the regional level so that Departmental capabilities are considered in FEMA-led regional planning efforts. DoD will also build an integrated organizational architecture for its liaison and coordinating officers at various headquarters.

The ten FEMA regional offices are key nodes for integrating Federal plans with State and local plans, and DCEs within these regional offices are essential for operational and tactical unity of effort in an adaptive environment. This regional planning relationship bridges the gap between State-level planning conducted at a National Guard’s Joint Force Headquarters (JFHQ)-State and DoD and DHS national-level planning. The JFHQs in each of the 54 States and Territoriesprovide vital ties to State emergency officials and the National Guard Bureau. This enduring synergy positions the JFHQ as the key State-level organization for integrating the emergency plans of local DoD installations with State plans and FEMA regional plans.

DoD will deepen and facilitate rigorous Federal, regional, and State-level planning, training, and exercises through coordination and liaison arrangements that support civil authorities at all levels. These arrangements include DoD liaison officers at DHS and FEMA, Defense Coordinating Officers (DCOs), and Emergency Preparedness Liaison Officers from each Service.....

FULL DOCUMENT: Pentagon domestic ops Homeland Defense Strategy 2.2013

/////////////

Defense.gov News Article: Official Explains New Homeland Defense/Civil Support Strategy

By Jim Garamone - American Forces Press Service

WASHINGTON, April 1, 2013 – The Defense Department incorporated hard lessons learned when it codified its new homeland defense and civil support strategy, said Todd M. Rosenblum, DOD’s top homeland defense official.

In an interview with American Forces Press Service and the Pentagon Channel, Rosenblum, the acting assistant secretary of defense for homeland defense and Americas’ security affairs, said the new strategy is a recognition that the operating environment has changed.

“We face new threats, we have new vulnerabilities, we have new dependencies, most importantly we have a new way to do business,” Rosenblum said during a Pentagon interview. “We have to capture that and make sure the department is prepared and directed toward being more effective and efficient as we can be.”

The Defense Department is charged with defending the homeland from attack. U.S. Northern Command is further charged with working with state and local entities and other federal agencies to provide support in times of natural or man-made disasters. In the first instance, DOD has the lead. In the second, another federal agency -- such as the Federal Emergency Management Agency -- has the lead.

The strategy, released in February, looks at the lessons learned from past experiences -- from Hurricane Katrina through Hurricane Sandy.

They also looked at changes including the growth of communications networks, dependence on private-sector capabilities and “the rising expectations from the president and from the secretary, and certainly from the American people, that we will be prepared to provide support to civil authorities within a 24- to 48-hour window,” Rosenblum said.

This is an incredibly short period of time, he said, and it forces a change in the relationship between DOD and other agencies. The old paradigm was to have civil partners “pull assistance” from DOD, while now DOD will actually push assistance where it is needed.

“So we are postured to provide assistance as fast and rapidly as possible,” Rosenblum said.

The vast difference between the response to Katrina in 2005 and to Sandy in 2012 shows the effectiveness of the new strategy, he said.

“We were more efficient, timely and effective in our support to Hurricane Sandy,” Rosenblum said. “This is because we did integrated planning within DOD, with our federal partners, and with our state partners. We recognized the need to not wait to be called upon, but to pre-position our support capabilities knowing there’s going to be audibles and ad hoc requests.”

Planning is at the heart of the strategy, he said. Integrated planning -- with state and local officials, with other federal agencies and with non-governmental entities -- has increased visibility and prominence. The National Guard -- an organization that bridges state and federal efforts -- continues to play a crucial role. But, Rosenblum noted, the strategy recognizes that response to disasters requires an all-of-government approach.

Cyberattacks, he said, also could produce the type of man-made disaster that would require DOD assistance. The homeland defense mission codifies requirements to provide cyberdefense, he added.

“The threats to networks and critical infrastructure increase when we are engaged in operations overseas,” he said. “The physical effects of cyberattacks can impact our military operation capabilities and response capabilities.”

The fiscal environment impacts this -- and all other -- strategies.

“The sequester is real and effecting DOD through readiness, training,” Rosenblum said. “It is difficult for the department to plan and budget intelligently, when we don’t have budget certainty.”

Officials devised the strategy when the department had already committed to $487 billion in reductions over 10 years.

“Sequester has changed the calculus tremendously,” Rosenblum said. “But this strategy is not about buying new capabilities: It’s about our planning, our processes and our integration.”

////////////

Defense.gov News Release: DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

U.S. Department of Defense

Office of the Assistant Secretary of Defense (Public Affairs)

News Release

On the Web:

http://www.defense.gov/Releases/Release.aspx?ReleaseID=15878

Media contact: +1 (703) 697-5131/697-5132 Public contact:

http://www.defense.gov/landing/comment.aspx

or +1 (703) 571-3343

IMMEDIATE RELEASE No. 172-13

March 22, 2013

DOD Releases Strategy for Homeland Defense and Defense Support for Civil Authorities

The Department of Defense announced today the release of the Strategy for Homeland Defense and Defense Support of Civil Authorities. This policyestablishes DoD’s priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president’s National Security Strategy and the 2012 Defense Strategic Guidance. It links with other DoD and national strategic documents related to missile defense, space, cyberspace, counterterrorism, and the Western Hemisphere. The strategy identifies two priority missions for the department in the homeland: defend U.S. territory from direct attack by state and non-state actors; and provide assistance to domestic civil authorities in the event of natural or manmade disasters, potentially in response to a very significant or catastrophic event.

The strategy emphasizes cost-effective policy mechanisms and innovative approaches to defend the homeland against direct attacks and to provide timely responses to routine and catastrophic events on U.S. territory. It stresses the continuation of DoD capabilities to defend against conventional and emerging threats in the air and maritime domains, while expanding cooperation with federal, state, and local partners to defeat asymmetric threats – including, for example, homegrown violent extremists who may seek to use improvised explosive devices. Additionally, it addresses DoD preparations for responding to man-made and natural disasters.

“The Department of Defense’s contributions to the defense of our nation have evolved over the past decade and account for new threats and challenges. Lessons learned from events like Hurricanes Katrina and Sandy and collaboration with our interagency partners and State Governors have framed our current approach to DoD civil support activities,” said Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs Todd Rosenblum. “This strategy emphasizes strengthening our partnerships with federal agencies like the Departments of Homeland Security and Justice, with state and local governments, with the private sector, and with our Canadian and Mexican neighbors – not only for more comprehensive approaches to complex security challenges in the homeland, but also to create efficiencies through collaboration and joint action,”

For further information about this strategy, please access http://www.defense.gov/news/Homelanddefensestrategy.pdf

//////////

Never heard of this guy, he is the one doing the news release above. Career includes being Evan Bayh's national security staff & CIA Near East 1988-1993hires_061611094311_Rosenblum_Todd.JPG

Defense.gov Biography: Todd M. Rosenblum

Acting Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs [Acting?]

Todd M. Rosenblum is the Acting Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs. In this position, he advises the Under Secretary of Defense for Policy on the homeland defense activities of the Department and regional security matters for the countries of the Western Hemisphere. He is also responsible for advising the Secretary of Defense on all matters pertaining to defense support to civil and law enforcement authorities in the homeland. Mr. Rosenblum has nearly 25 years of political, policy, and legislative experience in national security affairs.

Prior to his appointment at the Department of Defense in May 2011, Mr. Rosenblum was the Deputy Under Secretary of Intelligence for Plans, Policy, and Performance Management, Department of Homeland Security, from February 2009 to May 2011. He directed strategic and policy planning for the Department’s intelligence program, oversaw budget development and resource allocation priorities for the synchronization of intelligence programs and priorities, provided stewardship and direction for the Information Sharing Enterprise, and ensured that the intelligence program was aligned with national, departmental, and intelligence strategy and requirements.

Mr. Rosenblum was a Professional Staff Member on the Senate Intelligence Committee from March 2005 to November 2008, leading Committee oversight of Department of Defense human intelligence collection programs and Intelligence Community-wide intelligence collection programs and operations in the Middle East. Concurrently and prior to joining the Committee, he served as the Military Legislative Assistant and National Security Advisor to Senator Evan Bayh from January 2001 to November 2008, where he acted as senior counsel and represented the Senator on defense issues and foreign policy, national security legislative actions, and public affairs. He was a member of the Senior Personnel Staff, National Security Cluster, on the Obama Presidential Transition Team from November 2008 to February 2009.   

Mr. Rosenblum held several management and advisory positions at the Department of State and the U.S. Arms Control and Disarmament Agency from August 1994 to January 2001. From April 1999 to January 2001, he was the Executive Assistant/Chief of Staff to the Assistant Secretary of State for Nonproliferation where he provided executive management and policy liaison on the full range of nonproliferation issues. He was the Senior Foreign Affairs Advisor for Northeast Asia at the U.S. Arms Control and Disarmament Agency from August 1994 to April 1999, where he represented the Agency in numerous nonproliferation negotiations and regional security dialogues.

From January 1993 to August 1994, he was the Deputy Political-Military Advisor for the Bureau of Near Eastern Affairs, U.S. Department of State. Mr. Rosenblum chaired an interagency export control working group, providing departmental recommendations on proposed arms sales to the region, and was responsible for ensuring consistency between national policy and regional security assistance activities. He was an Intelligence Officer in the Central Intelligence Agency’s Office of Near Eastern Affairs, Directorate of Intelligence, from September 1988 to January 1993.

Mr. Rosenblum has received numerous individual and group awards from the Department of State, the U.S. Arms Control and Disarmament Agency, and the Central Intelligence Agency. He received his Masters in International Affairs in 1988 from the School of International and Public Affairs, Columbia University, and his Bachelor of Arts in 1986 from Columbian College, The George Washington University.

//////////////

Anyway that should give everyone a little more to work with, given the heightened domestic military operations surrounding the Boston aftermath, it is important to get a sense of where the Pentagon sees itself going in these reactions and ongoing operations -- what happens next is another question.

A great move would be publishing the entire text of USNORTHCOM CONPLAN 3502 Civil Disturbance Operations on the Internets immediately!

2013: Boston, paper gold, Obama signs Stock Act reversal, Homeland Security and food stamps

UPDATE 4.19.2013: MOAR about domestic military operations policy shifts w doc & video: http://www.hongpong.com/archives/2013/04/19/pentagon-domestic-operations-switches-pull-push-24-48hr-timelines-defense-suppor

20130415_whosbuying.jpg

Hang tight folks, it looks like we are on the cusp of another 'burst of change' on a few fronts. You should probably double the watts going to your news radar for at least 10-14 days, if you possibly can. And all those cheesy "financial systems" are getting Extra Discontinuous as they usually do when Collapse starts happening in various segments. I decided to cork out a very rough post on these topics, Your Mileage May Vary thx::

While the Boston situation loaded with symbolism like international flags & the JFK library fire attracts most attention, the reality is that bombings at events are pretty rare and unlikely to happen; once it does the media loops the same traumatizing video clips for web hits. The editorial style: giving viewers agog consciousness that spells ratings. I saw Good Morning America a few mornings ago, it was a massive blitz of domestic violence and a patina of Victoria's Secret models.

With that spectacle set aside for a moment, other trends hitting key points this week include a shady new Stock Act law being signed by Obama and dramatic corrections in several markets including particularly gold. Gotta give some space to the Hill, this is ridiculous:

President Obama quietly signed legislation Monday that rolled back a provision of the STOCK Act that required high-ranking federal employees to disclose their financial information online.

The White House announced Monday that the president had signed S. 716, which repealed a requirement of the Stop Trading on Congressional Knowledge (STOCK) Act requiring the disclosure, which had previously been delayed several times by Congress.

That provision, added to the bipartisan bill aimed at halting insider trading by members of Congress, would have required roughly 28,000 senior government officials to post their financial information online, and had come under harsh criticism from federal government employee unions.
Both chambers of Congress quickly — and near silently — approved the repeal legislation at the end of last week by unanimous consent, just before heading home to their districts.

The STOCK Act was signed by the president a little over one year ago in a highly visible signing ceremony, where he said the legislation would tackle the "deficit of trust" that exists between Washington and the rest of the nation.

The new law scraps a provision that had been hotly contested by federal employees, as well as found to be problematic and even dangerous for high-ranking government workers. Congress twice had passed legislation to delay its implementation. Under that provision, high-ranking government workers would have been required to post their financial information on a publicly available online database.

//////

PAPER GOLD BIG MOVES: The gold market is a peculiar misunderstood beast - it's like a bunch of stuff in vaults with IOU's attached to numbered bars. The IOUs underwrite the financial products like Exchange Traded Fund GLD "gold" - it is operated in reference to the underlying gold's supposed value, but it's not actually a contract providing recourse to the gold.

I flagged for some people a few days ago that the COMEX or commodities exchange gold market, as well as JP Morgan, has had large declines in physical gold reserves in the warehouses recently.

See just recently: 30% of CNT Silver Inventories Withdrawn from COMEX Vaults in 2 Days! | SilverDoctors.com // Why Is JPMorgan's Gold Vault, The Largest In The World, Located Next To The New York Fed's? | Zero Hedge // Especially: Comex Gold Inventories Collapse By Largest Amount Ever On Record

Now today a whopping 122 tons of 'paper gold' got flipped around & tons of margin hikes are getting called on gold traders in different markets around the world, forcing people to keep dumping gold in bursts.

Gold Crush Started With 400 Ton Friday Forced Sale On COMEX | Zero Hedge - tactical deals of the Mega short sale to break through the 'important' price of $1540. Aha... Via Ross Norman of Sharps Pixley,

"Futures trading is performed on a margined basis.. One fund in particular, based in Stamford Connecticut, was identified as the previous shorter of gold and has a history of being caught on the wrong side of the law on a few occasions. As baddies go - they fit the bill nicely.

......The value of the 400 tonnes of gold sold is approximately $20 billion but because it is margined, this short bet would require them to stump up just $1b. The modest short selling in Jan 2013 had prompted little response from the longs - raising questions about their real commitment. By forcing the market lower the Fund sought to prompt a cascade or avalanche of additional selling, proving the lie ; predictably some newswires were premature in announcing the death of the gold bull run doing, in effect, the dirty work of the shorters in driving the market lower still."

These charts are nuts. In recent years, gold drops coincided with bubbles in the S&P type prices, that then crashed. What Happened The Last Time We Saw Gold Drop Like This? | Zero Hedge see 2008 and 2011. Gold Drops Most In 30 Years | Zero Hedge

In recent weeks due to Japan's new hyper-loose monetary policy, crazy things have been happening around the Yen's value. (Australia is spiking moar than anything else it seems) Europe also has a new wave of trust destabilizing the banking system with various deals being attempted in Cyprus & Greece.

(see Which Country's Gold Will Be Sold Next? | Zero Hedge). Also the creditor fascist complex has angled to get at the Greek government's remaining stash of gold so that they can be sacrificed on the altar of the billionaires once and for all.

See also, All Eyes On The Gold Rout, Most Oversold In 14 Years | Zero Hedge . Gold Plummets By Most In 30 Years, Stocks Have Biggest Drop Of 2013 | Zero Hedge - this cuts across a lot of sectors. The CFTC needs to be looked at as well, as some of this material indicates.

The DJIA has been flying high above all of this, though even the corporate news points out that this whole phase of asset value inflation is at least partially due to the Fed's loose monetary policy. Housing prices are "up" they say, what could possibly go wrong?

//////

It's pretty sick meanwhile that an incredibly high level of food stamps are the formal basis for America's food security, at around 23,000,000 households and rising. When Obama entered office this was less than 15,000,000 households -- and the benefits per household are slowly being cut along with much of the social safety net programs both in Minnesota and nationwide. US Households On Foodstamps Hit Record High | Zero Hedge. USDA data.

FoodstampHousholds.jpg

This is a consequence of bailing out banks with trillions of dollars, collateralizing the American people and introducing tons of sovereign credit risk into the US Dollar, the Euro & beyond. It has altered the "biopolitics" of the US to the point that this many people cannot handle generating economic activity in this system to keep themselves alive - and clearly the amount parceled out is declining fast.

//////

CSA's [relatively cheap & nutritious food share subscriptions] and local barter-based currencies are among the more resilient network ideas that ought to get looked at right now. I think there is a pretty severe risk to the stability of the whole country (let alone world) when food stamp debit card systems keep that many millions of families from starving. If nothing else there needs to be fallback systems from the US Dollar & conventional banking system may abruptly halt or radically shift in value or stability. This is something people need to start getting their heads around - so that if the debit cards stop working, different ones operating on some other basis (ie local currencies) can be handed out & millions aren't put in such imminent danger. (see DepressionScrip.com for 1930s substitute local credit instruments - key!)

The food stamp debit cards are usually administered by big banks - giving them yet another lever of functions to 'terrorize' elected officials and bureaucrats into further handing over all the nation's "commons" through fraud & socially constructed economic schemes. The banks have probably the biggest, quickest "kill switch" on social stability. A trivial switch for them to hit compared to most!!

//////

Bitcoin had a big run-up for several days and now has retreated somewhere into the $50-100 range - for a good time keep an eye on Bitcoin Charts. Still, it seems like there's more than enough demand to keep it above $40. However the Bitcoin economy suffers from overly concentrated exchanges.

The biggest exchange, MtGox, has such a large market share - and can't keep up once really huge, shady order floods come in, that the whole Bitcoin economy tends to get "goxxed" and bog down, panic selling and various cats stepping in to buy all the way down.

I am doing a lot of research on Bitcoin right now including the various exchanges (LIST) - in the long run, Bitcoin and other alternative cryptocurrencies share certain features like peer-to-peer encryption/hashing based universal linear transaction registers called "blockchains", and ways of verifying those blockchains with CPU or GPU intensive cryptographic calculations to award more 'coins' and slowly expand the money supply while shoring up trust in the global account ledger.

A new website as well as local Facebook & Twitter accts are getting rolling :) Brand new: follow http://twitter.com/bitcoinmn and http://facebook.com/bitcoinmn for Minnesota Bitcoin goodies!

Bitcoin OTC order book is a chat network approach to decentralized exchange design with trust ranking (like eBay rankings in a way).

Good news for people interesting in making exchanges or intercambios in the form of Ripple, in the early stages an open source project with VC backing to build multi-currency exchanges and trust networks among peers. (chart) Some open source software is available on GitHub for Ripple and its "XRP" intermediary currency, which could then be a proxy to regular fiats or Bitcoin etc.

See also: wow Six reasons why Chinese people will drive the next bull market in bitcoin – Quartz

Mining Bitcoins takes power, but is it an “environmental disaster?” | Ars Technica - wattage will improve - and compared to the phenomenal amount of energy blown on fractional reserve banking derived parasitic functions, Bitcoin is nothing! Also: “Taming the bubble”: investors bet on Bitcoin via derivatives markets | Ars Technica

Paul Krugman Goes on the Attack: Calls Bitcoin “Antisocial” // The Antisocial Network of Bitcoins - NYTimes.com by Krugman! "We have huge economic problems, but green pieces of paper are doing fine — and we should let them alone." LOL that food stamp chart is definitely not keeping the great Keynesian up at night.

/////

A moment for weird Boston links: What did Peter Griffin know about Boston and when did he know it? Watch! Family Guy boston bombing - YouTube Yeah this petition is picking up steam - Petition | Demand that Seth MacFarlane make a public accounting for his foreknowledge of the Boston Bombing | Change.org

This is a popular item now: Boston to Deploy Mass-Casualty Tablet Device During Marathon

Excellent videography: Boston.com viral video page - Boston.com. Also: Israel honors war dead with somber Memorial Day - News - Boston.com

Oh also in that viral video above you can see the military incongruously popping up within about 1 minute 44 secs in Boston as Cryptogon and other news have noted. You'll want to check out TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com about USNORTHCOM CONPLAN 3502 if you haven't already.

/////

SEE previously Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

Homeland Security's New $3.9 Billion Headquarters - Businessweek. Money quote:

In February, one of the DHS’s more persistent naysayers, U.S. Representative John Mica, a Florida Republican, boasted about how he and his fellow party members had curtailed the project. He said he would also like to dismantle much of the DHS.

He’d better act swiftly. If the White House ever gets all the DHS’s divisions on one campus, nobody will want to move them again.

Homeland Security bloat and the great Unemployed: Word went around that ICE was serving a federal warrant pertaining to Boston. ICE is a unit of Department Homeland Security which spawned the little known HSI, or Homeland Security Investigations, division, a new kind of (literal) black helicopter FBI-style agency

The dip in metals and the odd security situation brought Cryptogon.com to recall a post from late 2012 from HomelandSecurityUs.com, the Northeast Intelligence Network site edited by Doug Hagmann & his son. They are pretty conservative and have a fair bit of alarming material about Homeland Security. See Flashback: Warning: "Watch The Metals, When They Dip. It Will Be A Good Indication That Things Are About To Happen."

I'm not even going to get into the stuff coming up about the bomb sniffing dogs and weird "training exercise" angles right now because this other stuff seems more pertinent right now. People that have been at this a long time frequently bump into "exercises" that happen to overlap with 'live events', the argument being many times that exercises created the opportunity for staged events at many previous key points -- though of course governments do run a *lot* of exercises with all their security bloatware anyway.

This is the late 2012 Hagmann interview with a purported Homeland Security "insider" which stated that a dip in precious metals, after the fiscal cliff sets the stage, would presage further economic chaos and an escalation of repression against the American people, along with a major collapse in standard of living. DHS Insider Report: Coming This Spring: "Life for the Average American is Going to Change Significantly". It is kind of "classic stuff" for those of us that keep an eye on these things. The earlier predictions of source "Rosebud" didn't really pan out much in 2012, as these things often don't. But timelines are hard to nail down even for "deep weird" sources with good faith. Take a little while to glance over this, even if it's not your usual fare.

"Rosebud": Stop thinking about a normal situation. The country is divided, which is exactly where Obama wants us to be. We are as ideologically divided as we were during the Civil War and that rift is growing every day. Add in a crisis – and economic crisis – where ATM and EBT cards will stop working. Where bank accounts will contain nothing but air. They are anticipating a revolution and a civil war rolled into one (emphasis added by this author).

We all saw what happened with the Feds & Occupy camps. The American Occupy-style organizing eased off as the US economy was in a kind of stasis during 2012, but if things tense up in 2013 we are looking at a different political situation. In Europe things have been moving at a much different tempo, along with a great deal of confusion, snaky liberal operations, and a rising neofascist & quasi-fascist network is taking root in many nations.

See also The Terrifying Reality of Long-Term Unemployment - Matthew O'Brien - The Atlantic

On a decidedly anti-alarmist tack, Bruce Schneier: The Boston Marathon Bombing: Keep Calm and Carry On - Bruce Schneier - The Atlantic

See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com

///////

MOAR LINX: A bunch of stuff sitting around you may find interesting.

Just weird - part of a scifi based GE marketing campaign: 'The Matrix' is back (in your hospital) | Technically Incorrect - CNET News

Is Facebook's Secretbook Secure? CRYPTOME Colin Powell & Malcolm McDowell at Bohemian Grove 2013-0347.pdf // Hacktivists as Gadflies - Socrates to Jeremy Hammond // DoD Communications Systems Breach in 9/11 Trials

A little grumpycat may be worth reading - Guest Post: Are Individuals The Property Of The Collective? | Zero Hedge amirite Minneapolis?!

In Control at Layer 2: a Tectonic Shift in Network Security| Whitepapers | TechRepublic - hacking optic networks.

Wells Fargo 401(k) Loans Jump 28% as Older Workers Borrow - Bloomberg

CNBC! USD/Bitcoin - MTGOXUSD - Stock Quotes

The Real Story Behind Facebook Moderation and Your Petty Reports | The Internet Offends Me

DARKWEBSEARCH: Shodan: The scariest search engine on the Internet - Apr. 8, 2013

Australian FiberFail with a last mile of copper, you idiots: FTTN a huge “mistake”, says ex-BT CTO | Delimiter

Peak Recovery? | Zero Hedge

11 Economic Crashes That Are Happening RIGHT NOW

Wordpress Mess going on: This plugin should help: WordPress › Limit Login Attempts « WordPress Plugins

////

Anyway this is just a few trends happening now... I feel like the overall tone of this post is pretty conservative, as a lot of the research is coming out of places with that editorial slant. Nonetheless these are sources of information and lines of analysis that anyone is welcome to look at and come to their own conclusions.

I think that we urgently need to get real and start considering lots of alternate solutions, hopefully to avoid more authoritarian and crisis driven, panicky policies, like those fostered in the climate of the Fear of Terrorism which they are going to tediously lay on with a trowel for weeks, alongside major economic instability.

Batten All the Hatches.

The Art of Failing Gracefully: DEA & DOJ need to cover up Sinaloa cartel informant Vicente Zambada, the quid-pro-quo system, "Fast & Furious" arms distribution for Great Justice!!!

Hundreds of billions of dollars, between cash flows and valuations, depend upon the ability of American law enforcement structures avidly maintaining their illusionary belief system about laundered drug money, informants, and banking systems. All of this is normal, they say, it's normal to throw the book at tons of little fish while mysteriously failing to find any really substantial laundered drug money or criminal prosecution for lawyers and bankers involved. The name of the game is to fail gracefully at detecting and punishing drug money in the banking system, to create a PSYOP of coherency on top of countless total ironies, structured protection & utter failures.

By the same token, the US government really always tends to nudge all markets into being dominated by a few big actors, whether "legal" or "gray" or "shadow" - be they milk producers or drug traffickers. They want to minimize the number of PayPals on the market, and the number of major drug players.

At some point it apparently came to pass that formal informant deals with favored cartels would also be inked -- the Sinaloa cartel even officially promoted as the proper dominator of certain "plazas" in public relations items. Because no one really cares about war on drugs policy -- it's not like this horrible policy affects the level of gun violence in North America -- nothing ever gets done about this at the federal level.

It's beginning to finally dawn on people that the secretive Federal Reserve System wire transfer networks - casually known as Fedline & Fedwire -- must somehow be involved [noted in Oct 2010], and I have never seen a single person even bother to claim to the contrary. The banking wire transfer systems are inextricably part of the "protected" drug money laundering system which is "protected" in the same formal way as at least some of these Sinaloa crucial informant thugs. Let's see if state police can pry into the Fed. LOL!!

So anyway, we have hard proof of it in court that Jesus Vicente Zambada-Niebla's attorney was in fact an informant operated expressly to pull intel from Sinaloa into the US government.

The questions: how much the "kingpin" deserves cover from that, especially since he was moving along Fast & Furious guns to waste other cartels & assorted innocent people? How many documents showing underlying protected illegal relationships will the judge force into the public record? How much 'controlled demolition' will the public tolerate in this relatively obscure case?

This gets a nice update from Abby Martin & Andrew Kennis: Next Big DEA Scandal | Interview with Andrew Kennis - YouTube

PREVIOUSLY (about halfway down many details): ECHELON GCSB military surveillance vs New Zealand & Kim Dotcom; IRC logs on Anonymous false flag attacks viewed anew; Barrett Brown setup via #OpCartel | HongPong.com [Oct 22 2012]

All of this insane crap is directly related to the formal FBI informant illegal operations system which gets exposed in tiny nibbles, for a little more documentation on illegal ops see recently The New 21st Century COINTELPRO Mobius Strip: Undisclosed Participation, "OTHERWISE ILLEGAL ACTIVITY," Federal & State Informants, drug ops auditing in MN [Jan 31 2012]. Unfortunately the DEA's habit of giving traffickers informant status means that more nasty drugs easily find their way into Minnesota from handled/protected figures in Chicago. Thanks so much, Federal Government!

LINX: Cartel Member Says Fast And Furious Aimed To Supply Guns To Sinaloa Cartel - Business Insider (Aug 10 2012)

Mexican Official Accuses CIA Of 'Managing' Not 'Fighting' The Drug Trade - Business Insider (July 24 2012)

One batch of Zambada Court files: http://narcosphere.narconews.com/userfiles/70/Pleadings.Sinaloa.Zambada.pdf

More recent Narcosphere items - not a bad place to start: Big Media Discovers US Special Ops are Targeting Mexican Crime Organizations | the narcosphere [January 21 2013]

Fast and Furious Blurs the Line Between Cops and Crooks | the narcosphere [Bill Conroy Jan 6 2013]

Banks Are "Where the Money Is" In The Drug War | the narcosphere [Bill Conroy Dec 1 2012]

Background from Narcosphere: US Government Informant Helped Sinaloa Narcos Stay Out of Jail | the narcosphere [Bill Conroy Aug 7 2011]

US Prosecutors Fear Jailbreak Plot by Sinaloa “Cartel” Leader Zambada Niebla | the narcosphere [Bill Conroy Sept 17 2011]

US Government Accused of Seeking to Conceal Deal Cut With Sinaloa “Cartel” | the narcosphere [Bill Conroy Oct 1 2011]

Zambada Niebla Case Exposes US Drug War Quid Pro Quo | the narcosphere [Bill Conroy Dec 10 2011]

/////////////

Further background: 'El Chapo' Guzmán, Mexico's Most Powerful Drug Lord - Newsweek and The Daily Beast

Lolzy fake letter of love: Mexican Drug Cartels Thank Obama for Gun Control Push - BlackListedNews.com

Why Americans Must End America’s Self-Generating Wars | Global Research [Peter Dale Scott - Aug 30 2012]

America’s Secret Deal with the Mexican Drug Cartels | Global Research [Tom Burghardt Sept 3 2012] - MORE: Antifascist Calling...

Top enforcement agencies don't track crimes by informants [USA TODAY Oct 7 2012]

Narco News: US, Mexican Officials Brokering Deals with Drug “Cartels,” WikiLeaks Documents Show

Narco News: Funcionarios mexicanos y de EEUU negocian con "cárteles" de droga, según documentos de WikiLeaks

Mexican Special Forces Employed as Death Squads in Drug War, Email Records Released by WikiLeaks Reveal | the narcosphere

SIGNALING SYSTEM USG <-> CARTELS: http://wikileaks.org/gifiles/docs/1747720_re-fwd-re-fw-from-mx1-2-.html - FAKEDRUGWARSIGINT is the lulziest form of SIGINT, who can deny??

The whole thing is such a spectacular sham it really calls into question whether federal prosecutors, informants, drug laws and the rest of the charade should even exist in the first place. It is truly a massive stage of fakeness, and frankly none of these people deserve to have any influence over the level of drugs available in society.

Not that drugs are harmless, clearly they all have some negative qualities, but clearly this entire schema is hosed well beyond the point of no return, and can only produce more violence and chemical dependency as it drags us all into hell. There are of course countless rabbit holes involving drug trafficking links with 'deep events' like the CIA, Iran-Contra, 9/11, the Taliban & al-Qaeda etc and I'm not going to get into that much here, though plenty of Iran-Contra related background fills the history of links above. Also as linked here what is the role of NORTHCOM anyway?

MPD Tracking OccupyMN Facebook BBQs: Minneapolis "secret" Strategic Information Center / Emergency Operations and Training Facility 25 37th Ave NE in Fridley

Dateline: Pseudo-Secret Minneapolis (aka Fridley): What WCCO called the "secret" "City of Eyes" Strategic Information Center has been located on the Google! Your Federal Stimulus Money & FY2010 Homeland Security Appropriations At Work - A Facility for Spying on Facebook Occupy Barbecues

strategic-center-mpls.png

It's nice when data releases tie together a larger system, and we've sure got that here. It's not really "secret" but it's quite shiny & new, not well-known at all, and it is certainly has been used as a site for spying on Occupy activists without criminal predicates by the Minneapolis Police Department. [emails a bit farther down]

///// UPDATE Jan 10 2013: See How to check cops checking your driver's license, Rassmusson lawsuit settlement docs /////

The Minneapolis Police Department files about Occupy Minnesota released by a data request on Monday afternoon are turning up interesting wastes of taxpayer money -- and even the so-called "secret" Strategic Information Center & Emergency Operations and Training Facility at 25 37th Ave Northeast in Fridley, north of the city line by the river & railroad tracks.

Also known as the EOTF/SIC, let's wrangle up everything we can find. Start with architects, via Wold Architects/Engineers: City of Minneapolis EOTF | Wold Architects and Engineers

Wold Architects and Engineers designed a site and facility for the City of Minneapolis Fire Department Training Campus to include a Fire Department’s Training Division; training classrooms multi-used as an Emergency Operations Center for the City’s Emergency Preparedness; a Strategic Information Sensor Monitoring Center for the Minneapolis Police Department; and vehicle storage garages for the Fire Department’s regional asset equipment.

The design exceeds the City of Minneapolis requirement for design to meet LEED Silver.

strategic-4.png

strategic-5.pngThis state-of-the-art federally funded facility allows police to determine... the location of barbecues on Facebook, including even the number of "YES" and "MAYBE" invitees.

This facility also encompasses "Shotspotter" directional microphones all over the city - I wonder if those are ever activated besides the gunshot decibel threshold "trigger" - they are in fact pretty high-fidelity microphones, it has been disclosed (May 28 2012 NYT article) but the manufacturer denies the mics are triggered by conversations.

I for one, am glad that we spent both municipal and borrowed federal tax dollars on training the Minneapolis police to believe a Facebook "YES" invite is real. The simulacrum of today's clicks has become the strategic information of tomorrow!

The old EOC center, used in the 2007 35W bridge collapse, can be seen here via MPR and clearly lacks expensive-enough videoconferencing gear.

Here is the press release from Nov 4 2010: Minneapolis opens Emergency Operations Training Facility - City of Minneapolis

Minneapolis opens Emergency Operations Training Facility

The City of Minneapolis has opened its new Emergency Operations Training Facility, which will help emergency responders and other City staff better prepare for and respond to emergencies. The multi-purpose building helps meet the training and response needs of the Minneapolis Fire Department, the Minneapolis Police Department, and the City's Emergency Management Division, along with other regional partners.

The Emergency Operations Training Facility is a multi-purpose building that includes training classrooms for Minneapolis firefighters and metro emergency managers, a strategic information center for the Minneapolis police, the main training site for the State of Minnesota Structural Collapse Team, and an emergency operations center that will be used during significant emergencies or disasters.

The new facility is built on a 12-acre site in Fridley that the City purchased in 1990, and since that time, the site has been built out as a training facility for Minneapolis Firefighters. Over the years, a fire training tower and propane burn building have been constructed, and special equipment has been purchased to help train emergency responders for incidents involving hazardous materials and collapsed structures. The construction of the new Emergency Operations Training Facility on the site is a major step toward completing this training and response site.

The Emergency Operations Training Facility is built to a LEED Silver Quality Standard for sustainability, and it includes facilities for a wide range of emergency responders from Minneapolis and the region:

Emergency Operations Center

One of the lessons learned from the City's response to the Interstate 35W Bridge collapse in 2007 was that the City's Emergency Operations Center, located in the basement of City Hall, was too small to serve as a center for large-scale emergencies. The new facility fixes that, with 2,800 more square feet of floor space. It will also be used as a back-up Emergency Operations Center for the State, Hennepin County and the City of St. Paul.

Strategic Information Center

The Strategic Information Center is a new space where the Minneapolis Police Department will analyze data to determine long-range trends that pose potential risks to the city. It can provide emergency managers with important information during a major event, incident or disaster.

State of Minnesota Structural Collapse Team

This team serves the entire state with specialized equipment and trained personnel for urban search and rescue and structural collapse incidents. This facility will include apparatus bays for storage of emergency response vehicles and specialty equipment for the Coast Guard, State, City and Metro West region of Homeland Security. In addition, this facility will house training and classroom space, staff offices, support spaces and common spaces.

Coast Guard monitoring.

The U.S. Coast Guard will also use the facility as a monitoring location for cameras placed along the Mississippi River from St. Louis to the metro area.

Published Nov. 4, 2010

Moar casual Google Mapping:

google-streetview-mpls.png

Apparently they dropped a cool $50K on the fence in early 2012. here is the bid page "To furnish all labor, materials, equipment and incidentals necessary to accomplish the complete construction of Emergency Operations Training Facility Perimeter Fence Project, located at 25 37th Ave NE, Fridley, MN." SRC: Minneapolis, City of - Projects. [A little more on the fence industrial complex below]

google-streetview-mpls2.png

Of course, once Erin Brockovich samples those weird adjacent holding pond things, I'm sure the infamous Fridley Cancer Cluster case will be solved. Perhaps Sgt. Garcia can go out and take some samples!

google-map-mpls1.png google-map-mpls2.png

I believe at least two of structures are firefighter training buildings - later pics below seem to bear this out.

eoc-marketing-swag1.pngHere is some marketing swag about the video conferencing gear. AVI-SPL Integrates Government Emergency Operation Centers. See the PDF and video too.

eoc-marketing-swag2.pngLet's check out the $330,704 in electronically-created yet borrowed-at-interest-from-private-Fed-cartel recently invested in this barbecue monitoring center. Official less-than-informative stimulus info page: Minneapolis Recovery - City of Minneapolis Minneapolis Police Strategic Information Center.

[Naturally it is funded by the electronically created debt-digits from the Department of Justice Bureau of Justice Assistance (BJA), the same endless police pork hub that brought us all those "you might be a terrorist if you pay in cash" type intel flyers for everything from hotels to hobby stores - many of those flyers were financed by Grant Number 2007-MU-BX-K002, which I included ironically on my own site's banner art. Google it for lulz!] Here's that official page:

The City of Minneapolis is not a primary recipient on this project. No Federal Report XML is submitted for this project.

Dollars Awarded

$330,704

Project Status

Fully completed

Project Description

To establish integrated crime analysis in cooperation with the St. Paul Police Department. Staff will be located in a joint Strategic Information Center (SIC).

Funding Program

MN Department of Public Safety: Byrne Justice Assistance Grant

Responsibility for Implementation

Police Department

Funding Agency

US Department of Justice [BJA/Recovery Act]

Dollars Leveraged

Data not yet available.

Dollars Leveraged Description

Data not yet available.

Dollars Requested

$330,704

Projected Jobs Created

2

Award Type

Grant

Sub-recipient Names

Minneapolis, City of

Vendor Names

No vendors have been contracted to date.

Recovery Funds Spent to Date

$330,704

Perhaps this is even the 'secret' location Tippy spycams are constructed: a while ago prankster MPD Spokester & PIO Jesse Garcia shared pics of a camera construction room & with all the other video rigs this seems a likely spot.

Anyway finally here is the email chain which prompted this line of research. There are surely other gems, we are just barely getting started. Circa page 109 of Part 1:

strategic-center-targets-barbecue.png

The public servant on some of these emails is one Minneapolis Police Department officer Steven Otteson, who has a decidedly low Internet profile.

Poking for traces of intrepid Strategic Facebooker Otteson turns up very little - even though the email is dated June 2012, he has no listed salary on this MPD salary list: My Docstoc. Crossposted the index here: 2011 Minneapolis Police Dept Gross Salary index for Web.

A news story indicated the supervisor of the Strategic Information Center is MPD Lt. Jeff Rugel at 612-673-3428. Page 112:

rugel-bbq.png

"Why are we not getting this stuff from the SIC?" Here is stuff about why they should not have to "spend time looking it up" and it should be run through the SIC... This could kind of be the crux of the whole issue here on Page 114:

sic-track-occupy

Alright, that covers some of the new data on this SIC thing vis-a-vis obsessing on Occupy events, so let's turn to the news coverage of this facility.

Carefully shaped news coverage: Mid-2012 saw a series of mainstream media items intended to shape public perceptions this center is designed to neutralize the threats from the surveilled populace. WCCO went so far as to call it a "secret location". That is some quality Fourth Estate right there.

Coverage for this "City of Eyes" facility on WCCO March 19 2012 (video) City Of Eyes: Your Camera May Help Mpls Police Fight Crime « CBS:

MINNEAPOLIS (WCCO) – Minneapolis police are the first in the country to merge two technologies to help officers fight crime.

The Minneapolis Police Department has combined shot spotter technology and a system of cameras to help catch criminals in the act.

Authorities allowed WCCO-TV’s Reg Chapman into a secret location in Minneapolis, where a strategic information center is housed.

Minneapolis Police Deputy Chief Rob Allen said the room is where police gather intelligence.

“This is the room where we try and fuse the technology we have to monitor video cameras, to monitor the sounds of possible gunshots, and it’s where we have our officers who are trained in intelligence gathering,” he said.

The system in the room is like CBS’ Thursday night show “Person of Interest,” in which cameras are used to help save people from becoming victims of crime.

“If you can anticipate where crimes might happen, you got a far better chance of preventing them from occurring,” Allen said.

According to Allen, when a gunshot goes off, a camera turns toward the source of the sound. Strategic Information Center Commander Lt. Jeff Rugel said the technology helped solve a case where a man was shot, killed and pushed out of a moving car. The sound of the gunfire activated the cameras, which gave police their first clue.

[......]City Of Eyes

The number of cameras connected to the intelligence system is growing and helping police catch more criminals. But not all the cameras are owed by the city.

“The city owns roughly 250 cameras,” Allen said. “We can access right now … an infinite number of cameras.”

According to Allen, any camera that has an IP address, is connected to the Internet, and that police have permission to use can give information to authorities.

So whenever you are in a public space, know that you’re likely on camera. Police are using portable cameras more now than ever. They can put them where they are needed and have one up and running within an hour of the order.

Invasion Of Privacy?

But what about your right to privacy? Police say they are careful not to infringe on anyone’s rights.

“Every time we installed a camera system, we went to the neighborhood and said, ‘You know, this is what we’ve thought about doing? Do you want it or not,’” Allen said.

He says police can’t look into a place where someone has the expectation of privacy. [magic filters eh?] But police still have a wide reach, which gives criminals a greater chance of getting caught on camera.

Crime patterns are currently moving and Minneapolis police hope to add more portable cameras. Police believe if criminals know they are being watched they are more likely not to commit crimes.

Star Tribune writes about this center using Facebook to watch what the state defines as "gang members" (mysteriously, shady rich Caucasian financial operatives never seem to meet this race/age/wealth-biased deviance category schema).

Of course, this week's data release shows this has bloated out to canvassing political movements without even the semblance of illegal activity... there is no "barbecue predicate" but there are of course hourly wages to be paid by Minneapolis taxpayers for monitoring the barbecue Facebook Event. Perhaps even overtime!

Gangs sometimes fire first shots online | StarTribune by Matt McKinney July 14 2012:

Facebook has become a virtual street corner where members trade threats, mourn the dead.

"It's probably no different than any other kids, right?" said Minneapolis police Lt. Jeff Rugel. "They're sharing stuff that they used to do face-to-face or over the phone. But there's criminal stuff." [.....]

Rugel runs the police department's Strategic Information Center, where officers use technology to track crime. One of the jobs in his office amounts to monitoring Facebook full-time. They understand the teen slang and filter through thousands of innocuous and inane comments to look for the few that could solve a crime or stop one before it happens. They try to draw connections out of the Facebook networks to help document the shifting alliances on the street.

Police were aware of Facebook threats between rival gangs weeks before the shooting that killed Nizzel, but the threats weren't specific. When Rugel and his staff sees something that looks like trouble -- a known gang member says he's going to hurt someone -- they pass the information along to officers on the street.

It's a poorly kept secret that the police watch Facebook, said Rugel.

"You see comments every once in a while. 'Don't put that on Facebook. You know who's looking at it,' " he said.

Despite some users' occasional concern, many of the Facebook users monitored by police flaunt their illegal behavior online, showing themselves smoking marijuana, posing with stolen merchandise, the security tags still attached, and making gang signs. [.....]

There was also some bidding information online about the estimated $50,000 fence around the facility. Emergency Operations Training Facility Perimeter Fence Project (eBidDoc #1810882) contact: David Schlueter phone: 612-673-2834 e-mail: david.schlueter@ci.minneapolis.mn.us bid date: 01/25/2012 10:00:00 AM

Try http://io.questcdn.com/questio/projects/planholder/planholder_list.html?jobPK=1810882&userPK=&modifiable=FALSE&isQCPI=TRUE

strategic-center-fence-bidding.png

//////

garcia-yatedo.pngSome other stuff: for what it's worth, this lists PIO Jesse Garcia as being based at the Strategic Information Center.Minneapolis Police Department Employees - Professional Experience,Email,Phone numbers..Everything!: Digging deeper to: Jesse Garcia III - Strategic Information Center, Minneapolis Police Department:

It was scraped off his LinkedIn - no surprise there. But no one put it together... Jesse Garcia III | LinkedIn. I think it would be great if state law were changed so that Garcia could be cross-examined by taxpayers about the flow of drug money through the Federal Reserve Bank of Minneapolis and its member banks, let's say once a month on live community access TV. Looks like he ought to be tapped into that gigaflow of data on bankster crime intel!

Strategic Information Center

Minneapolis Police Department

September 2010 – Present (2 years 5 months)

I am a supervisor in our new intel center that focuses on:

-gang intel

-crime intel

-real time officer assist

-safety camera analysis

-Emergency Operations Center readiness

jesse.garcia@ci.minneapolis.mn.us

Public Information Officer / Media Relations

Minneapolis Police Department

October 2007 – September 2010 (3 years)

More media: Vehicle data, email access among Minneapolis legislative issues | MinnPost - Karen Boros, Nov 2, 2012. Automated License Plate Reader (ALPR) including of course the "secret" camera on nearby Plymouth Ave. N. bridge is controlled from this "Strategic Information unit" according to the article - I would assume this is the same spot it's based, unless it is somehow split:

Currently, the Minneapolis Police Department uses cameras to record the license plates, time and location of vehicles. That data is now public information that can be obtained by anyone requesting the information.

“Our concern is that if it stays public data that people can use it for inappropriate purposes,” said Deputy Chief Robert Allen. The system now doesn’t allow police to inquire how it might be used. “We’re not allowed to make a judgment,” he said.

Access to the data is controlled by about a dozen people working in the department’s Strategic Information unit.

Alright this is taking more than long enough. This thing says it is 22,178 sq ft and it is on parcel 34-30-24-43-0009.

Minneapolis, City of - Projects: An estimated $1.5 million were bid on this beast for just a small chunk of the building, closed Feb 2012.

directions to site: 25 37th Ave NE Fridley, MN 55421

bids close: 02/23/2012, 10:00:00 AM

bids received by: City of Minneapolis Purchasing Department CONSTRUCTION OF THE EOTF APPARAUS BAY ADDITION 330 Second Avenue South Suite 552 Minneapolis, MN 55401

estimated value: $1,500,000.00

project completion date: 08/15/2011

pre-bid meeting information: A Pre-Bid Meeting and site tour will be held on February 15th, at 11:00 AM, Local Time in Room 128 at the Emergency Operations Training Facility located at 25 37th Ave NE, Fridley MN. All interested bidders should attend this meeting.

addenda: 1

project description: Scope of Work Includes: Complete construction of the Apparatus Bay Addition at the City of Minneapolis Emergency Operations Training Facility. This work shall include all labor, equipment, materials, installation, handling, delivery at site, necessary insurance and permits, erection and other required items for general, civil, landscaping, demolition, structural, architectural, mechanical and electrical construction and stability as shown on the plans and specifications.

additional description: This Contract contemplates the complete construction of the Emergency Operations Training Facility Apparatus Bay Addition for the Minneapolis Fire Department located at 25 37th Avenue NE., in Fridley, all in accordance with the Contract Documents. This Project has been designed to comply with the requirements of the State of Minnesota Sustainability Building Guidelines B3 (MSBG B3) Version 2.1 and also the U.S. Green Building Council’s Leadership in Energy and Design ( USGBC LEED®) Rating System. It is the intent of this Contract that the Project shall become MSBG B3 Version 2.1 Certified and LEED® SILVER level of quality building under the LEED®-NC Rating System. Work to be performed consists of the furnishing of all materials, machinery, equipment, labor, supplies, tools, transportation, and other incidentals necessary or convenient to complete the work as shown in the Contract Documents on file in the Minneapolis Finance Department, Property Services Division and with the Purchasing Agent of the City of Minneapolis.

owner: City of Minneapolis

350 South 5th Street, Room 223

Minneapolis , MN 55415

ph: 612-673-3774

contact: Chris Backes e-mail: chris.backes@ci.minneapolis.mn.us

Soliciting Agent: Soliciting agent

Minneapolis, City of

330 2nd Ave. S. Suite 552

Minneapolis, MN 55415

ph: 612-673-2834

fax: 612-673-3565

contact: David Schlueter e-mail: david.schlueter@ci.minneapolis.mn.us

It was used to host a session of the 10,000 Lakes Chapter of the International Code Council. [pdf]

The site's address is place on things like preparedness for your pet: Emergency Preparedness - City of Minneapolis && stuff about exercises (again on the sidebar) City Preparation - City of Minneapolis - the 'meh' front page: Emergency Preparedness - City of Minneapolis. Really need to improve page titles at the city. Perhaps after the election?

Awards - City of Minneapolis:

Minneapolis wins its second Tekne Award

Minneapolis Emergency Operations Training Facility

November 2011: The Minnesota High Tech Association recognized the City of Minneapolis and its Emergency Operations Training Facility with an award at the 2011 Tekne Awards, held Nov. 3 at the Minneapolis Convention Center. The Tekne Awards recognize Minnesota companies and individuals who have shown superior technology innovation and leadership.

The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.

The Minneapolis Fire Department, Police Department, and Emergency Management division opened the EOTF/SIC in August 2010 as a place where they and other emergency responders could coordinate more closely than had ever been possible before. The facility recently demonstrated its effectiveness during the response to the May 22 tornado that struck north Minneapolis.The multi-purpose building also provides training space for emergency responders.

Here it was, the first one: Minneapolis Emergency Operations Training Facility wins Tekne award - City of Minneapolis: The City of Minneapolis took home the award in the “Technology Excellence in a Nonprofit Organization” category that recognized the City’s Emergency Operations Training Facility/Strategic Information Center (EOTF/SIC) for bringing technology and information together to make Minneapolis a safer place. At the facility, technology, digital data, streaming video and highly interactive interfaces come together in one highly efficient communication center for the city.... and earlier: Oct 18, 2011: Minneapolis Emergency Operations Training Facility a finalist for Tekne award - City of Minneapolis

Mpls. Unveils New Emergency Operations Center | Crime | Downtown News - Nov 4 2010, KSTP Gail Brown: Congressman Keith Ellison secured $750,000 for the project in a 2010 appropriations bill, and he will be attending a ribbon cutting ceremony at 2:30 p.m. along with Minneapolis Mayor R.T. Rybak, City Council President Barb Johnson and other city leaders.

Ellison Secures $750,000 for Minneapolis Emergency Operations Center - Ellison.House.gov Oct 15 2009:

Washington, D.C. – Congressman Keith Ellison (D-Minneapolis) secured a $750,000 appropriation for the City of Minneapolis to build a new Emergency Operations Center in a bill approved by the House today. The funds were included in H.R. 2892, the Homeland Security Appropriations Bill for FY 2010.

Roughly the same stuff in this Council Prez Barb Johnson doc.

It's on Pinterest - see Government & Military for tons of funny stuff including everything from the avispl swag people above. And also: AV Products We Love / Minneapolis Emergency Operations Training Facility

There is a blog post about training there on the Mpls Dept of Civil Rights by Anthony Johnson - Civil Rights Urban Scholars with a helpful slideshow. Tony’s Voice: Our Day As Fire Fighters! | Minneapolis Department of Civil Rights.

strategic-center-3.png strategic-center-2.png strategic-center-1.png

I think you can see this fire training structure (or maybe a similar one) on Google Maps though I have not swung by to check out the Facility myself. Another one:

Minneapolis Emergency Services Employ projectiondesign - AVNetwork.com (undated? A couple pix included)

Fredrikstad, Norway--The City of Minneapolis has deployed 12 projectiondesign F32 DLP projectors as the main display source in the Analyst Room and F22 series projectors in the Incident Command Room of its Emergency Operations Training Facility (EOTF).

Located just outside Minneapolis, the EOTF boasts an extensive surveillance, audiovisual and network infrastructure specified and installed by systems integrator AVI-SPL.

“In a facility like this, even the slightest compromise in performance can result in tragic consequences,” said Fred Primoli, regional VP Sales for AVI-SPL. Primoli and his colleagues worked with the city for nearly two years on the concept, planning and final implementation of the EOTF, with the primary challenge being an interesting one: the creation of a state-of-the-art communications facility that may get activated no more than once in a decade.

“We needed systems that were capable of totally robust operation 24 hours per day, seven days per week – but which also were capable of performing at their best after extended periods of inactivity.

“From the outset we were delighted with the performance of the F32 projectors. The Analyst Room has three rear-projection screens, each measuring 160 inches wide by 120 inches tall, with four projectors driving each screen so that four separate windows can be shown on each one.

“The projectors have been superbly colour-matched to ensure consistency across each screen, while their excellent resolution, contrast and brightness mean they are equally at home showing video or data sources – which is important in an installation such as this where the staff need to a view a combination of both.”

Deputy Chief Robert Allen, a veteran of the Minneapolis Police Department, said: “The new display system allows us to look at a video feed and understand a situation almost instantly. Through video, we can get information to our officers much faster – especially when time is critical. We can zoom in with our cameras and really examine a situation and relay it back to our officers, allowing them to be prepared even before they get there. With this new technology, we can see something happen faster than a police offer 50 feet away.”

F22 series projectors from projectiondesign can also be found in the EOTF’s Incident Command Room that’s used for emergency training and an actual declared emergency.

“There is a large number of emergency monitoring projects in the U.S., and we are delighted that our technology has been used to display high-resolution security-camera images in so many of them," said Anders Løkke, marketing director, projectiondesign. "The Minneapolis EOTF already demonstrated its effectiveness during the tornado that swept through the area last May and, although we would prefer it if our systems never had to be used in similar situations again, the reality is that the city is better-protected now that its providers of emergency services have such easy, immediate and accurate access to security-camera imaging from so many locations.”

“The EOTF was conceived as a place where the various Departments responsible for emergency response and management in Minneapolis could co-ordinate their efforts more closely than had previous been possible,” said Primroli.

Same stuff as May 11, 2012: Minneapolis Emergency Services Goes with Projectiondesign - Fire Apparatus

On May 20 2011 CItyPages reported on Rocco Forte, former Minneapolis fire chief, departing, and Forte talked about being pleased to help finish the complex: "After the 35W bridge collapse, the Republican National Convention, and the tornado that went through South Minneapolis, it is clear that we have one of the finest emergency management teams in the country. It was also a long time goal of mine to complete the Emergency Operations Training Facility that includes an Emergency Operations Center, Strategic Information Center as well as a training facility which seats up to 250 people per day."

Reed Construction Data estimates its cost at $3,988,400 (a more accurate cost estimate is available from RSMeans Online), they say.

There are a couple autogenerated links at Facility Management Minneapolis Product From Industrial Manufacturers, Distributers, Suppliers And OEMs.

There is some PR speak about AVI-SPL getting an award. Press Release/ InfoComm, Sound & Video Contractor Honor AVI-SPL with Two PRO AV Spotlight Awards - Audio/Video Equip./Surveillance - AVI-SPL, Inc. | PRZOOM

On March 11, 2009, the overall cost of the project was pegged by House Research as $27,403,000. SRC: www.house.leg.state.mn.us/hrd/bs/86/hf0554.pdf

This bill would grant $8,000,000 in bond proceeds to the City of Minneapolis to design, construct, furnish, and equip an emergency operations center housed in the City’s current training center and to make other improvements to the training center.

According to the 2008 budget request, the overall cost of the project is $27,403,000 with the City and Hennepin County funding the non-state funded portions of the project. The Joint Emergency Operations Center (EOC) for Hennepin County and the City of Minneapolis will be located at the Minneapolis Fire Training Campus on city owned land. The City contends the current facility is inadequate and limits the effectiveness of the command structure. The City further contends that the Minneapolis Fire Training Campus is an ideal location for the EOC as it would provide a secure operations center with enough room to respond to a major incident affecting the county. Finally, the City believes this request would provide much needed training classrooms at the Minneapolis Training Facility which is the main site for training the State Structural Collapse Team.

HF 554 Status in the House for the 86th Legislature (2009 - 2010) - this is the bill number - I suspect it probably got rolled into the omnibus bill but I will leave that to a Deep Wonk to suss out. // H.F. No. 554, as introduced - 86th Legislative Session (2009-2010).

With a pretty severe shortage of funds for both state and municipal operations, is an open-ended SIC mandate to track protest activity on Facebook really the most prudent use of funds? And doesn't this operational configuration create a chilling effect on political expression in Minneapolis? The research continues....

Federal Homeland Security TSA VIPR Team & #VikingsDrone: Suspicious drone & Feds spotted at Vikings/Packers game

Things are a little strange at the Vikings/Packers Game today. A drone has been photographed hovering around the Metrodome fan plaza on the west side, and a Homeland Security / TSA "VIPR" team has been hanging around as well, indicating the federal government is shifting into "protecting" the major Spectacles at taxpayer expense.

My friend Nathan Hansen noticed the #VikingsDrone and the VIPR team, documenting & posting them on twitter @nathanmhansen. [Note: awhile back I did a 'lil client design work for Hansen.]

//// UPDATE 12:15PM Monday: According to @TCRover, a branch of the Pioneer Press, the drone was NOT operated by the government but rather some production company. The pic they say is from the crew flying it earlier: See https://twitter.com/TCRover/status/285560684245315585/photo/1 . Nonetheless we still need to deal with the impending prospect of government & contractor drones filling our airspace - and indeed this story has prompted others to discuss other sightings near government sites. //// 2:20PM update: It's annoying that they tried to tweet @ me last night but it never turned up in my timeline so I didn't find out until today. I would have much preferred to straighten it out immediately! Also, here's what's going on with drones in Oklahoma... Follow my friend @axxiom for more. ////

PHOTO sources: yfrog Fullsize - http://twitter.yfrog.com/h41hxevhj // yfrog Fullsize - http://twitter.yfrog.com/o0mkqkobj // yfrog Fullsize - http://twitter.yfrog.com/oemubbyj // VIPR Team: yfrog Fullsize - http://twitter.yfrog.com/odjd2ybj

odjd2ybj.jpeg h41hxevhj.jpeg

You can see the four rotors pretty well on these pics. It is comparable to the sports photography drone linked below as well - I figured it might just be a civilian hobbyist drone or some weird sports media project drone until the VIPR team was found by Hansen.

mkqkob.jpg mubby.jpeg

I am just delighted that the national government had to borrow more money at interest from the Federal Reserve System in order to send out these guys and their fancy flying spy robot to the Vikings/Packers game. We get the twin benefits of national debt slavery AND a surveillance state with nothing useful to do!

Our friends at WTFNews cranked out a quick post on this already: Unidentified Drone Spotted at @Packers-@VikingsFootball @NFL Game » WTF RLY REPORT

Let's Ban This Drone Operation in Minneapolis: Already Minneapolis activist Kurtis Hanna has suggested a petition to get drones banned on the city charter. (come to think of it, wouldn't it be good to get something like the White House petition site for the Mpls Charter Commission?) I will include some info below on this.

The Department of Homeland Security and the National Football League have a burgeoning relationship. Previously when I wrote up a post on the relatively new and totally off-the-radar Homeland Security Investigations division (basically their own militant version of the FBI, intended to reach BATF-level org status) they did a drill black helicopter landing on the Super Bowl field. [yes really - HSI is so new I must have been the first person to satirize its absurdities on the whole interweb!] See April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

The Super Bowl and World Series are also both declared National Special Security Events, which activates a fat block of overtime for many federal police agencies, much like the Republican & Democratic National Conventions. (However, since rioting at sports events is closer to the booze-soaked Id of the American public than more 'political' street upheavals, it doesn't meet the same heavy hand from federal & local police agencies) NSSEs generally feature Homeland Security, FEMA and the Secret Service operating at a high tempo, another thing that HSI & TSA are getting involved with as a 'filler force' if you will.

For Super Bowl NSSE info see: Super Bowl XLVI, NSSE & Big Sis - YouTube // www.secretservice.gov/press/pub0202.pdf on Bowl XXXVI // this crazy PDF: rnc08report.org/engine/uploads/1/Day-2-Breakout-2-NSSE-Carillo-Lowry-Lumley.pdf // Infowars » Indy Super Bowl: National Security State Protects Sports Fans from Prostitutes // National Special Security Events: 8. NSSE Fill-in Fact Sheet // Article Detail - Domestic Preparedness via LLIS.gov // etc

Federal VIPR teams: been popping up in all sorts of places. Here's the Wiki page. Wiki notes GAO attributes their existence to a Reaction to the shady Madrid train bombings. VIPR is trying to get at pro sports & local transportation (the Hiawatha light rail has a station close to where they were photographed) and wherever else they can normalize their presence. In this case the VIPR deployment apparently includes at least a half-dozen uniformed officers and at least one drone.

Additionally there was strange audio interference right before a commercial break in the first half, kind of like the sound a cell phone makes when its microwave signal induces noise in a speaker or electronics. However, I don't think game-day satellite transmissions go straight over-the-air from the Metrodome, as there aren't really satellite dishes around there I've noticed. Thus it seems unlikely to me that the one spotted drone would have glitched the transmission. Perhaps unrelated but also something you don't usually see. I blame Wisconsin FalseFlag types for this noise, whoever that might be :-P

SEE ALSO:

The drone does look similar to the one in this story. New use for drones: Sports photography - CBS News

Oh this is great. Perhaps the best link I've found in this. "PUT [VIPR] TEAMS TO WORK FOR YOU" VIPR teams and pipelines!! A "no cost resources for expanding and enhancing your security". Free oil goon security? Screw that: www.dleg.state.mi.us/mpsc/gas/download/2011SS-2-4-VIPR_Handout.pdf

May 2012: TSA VIPR Team Spotted at… Detroit Music Festival?? « TSA Out of Our Pants!

CNN Jan 28 2012: TSA rail, subway spot-checks raise privacy issues - CNN.com

VIDEO Blackburn Questions TSA Officials on VIPR Teams - YouTube

VIDEO TSA VIPR Teams in Greyhound Bus Station Tampa FL 02/16/2010

TSA deploys 'VIPR' teams throughout Tennessee to set up illegal security checkpoints on interstates - NaturalNews with a bunch of other links including: TSA-style full body pat-downs coming to an NFL stadium near you (Sept 2011) etc

6 USC § 1112 - Authorization of Visible Intermodal Prevention and Response teams | LII / Legal Information Institute. So they are doing this about the Hiawatha light rail officially I would guess. This would also signify that Metro Transit would have some record of the situation if "consult" in Sec.4 has occurred

(a) In general

The Secretary, acting through the Administrator of the Transportation Security Administration, may develop Visible Intermodal Prevention and Response (referred to in this section as “VIPR”) teams to augment the security of any mode of transportation at any location within the United States. In forming a VIPR team, the Secretary—

(1) may use any asset of the Department, including Federal air marshals, surface transportation security inspectors, canine detection teams, and advanced screening technology;

(2) may determine when a VIPR team shall be deployed, as well as the duration of the deployment;

(3) shall, prior to and during the deployment, consult with local security and law enforcement officials in the jurisdiction where the VIPR team is or will be deployed, to develop and agree upon the appropriate operational protocols and provide relevant information about the mission of the VIPR team, as appropriate; and

(4) shall, prior to and during the deployment, consult with all transportation entities directly affected by the deployment of a VIPR team, as appropriate, including railroad carriers, air carriers, airport owners, over-the-road bus operators and terminal owners and operators, motor carriers, public transportation agencies, owners or operators of highways, port operators and facility owners, vessel owners and operators and pipeline operators.

(b) Authorization of appropriations

There are authorized to be appropriated to the Secretary to carry out this section such sums as necessary for fiscal years 2007 through 2011.

Process for City Charter Amendment for banning these drones: Sent along by Kurt Hanna who thinks that "10,791 valid signatures of Minneapolis residents who are registered voters in order to qualify for the ballot" based on the figure of 215,806 voters voting last time. Citizen petition timeframe link. BUT: How much time do we have to gather these signatures?

Some more info: Via Minneapolis City Charter: http://library.municode.com/HTML/11490/level2/SUHITA_CH.html

(1) The methods available for amending a home rule city charter are contained in Minnesota Statutes, Section 410.12 et seq., which provides as follows:

(1) 410.12 AMENDMENTS. Subdivision 1. Proposals. The charter commission may propose amendments to such charter and SHALL DO SO upon the petition of voters equal in number to five percent of the total votes cast at the last previous state general election in the city.Proposed charter amendments must be submitted at least 12 weeks before the general election. Only registered voters are eligible to sign the petition. All petitions circulated with respect to a charter amendment shall be uniform in character and shall have attached thereto the text of the proposed amendment in full; except that in the case of a proposed amendment containing more than 1,000 words, a true and correct copy of the same may be filed with the city clerk, and the petition shall then contain a summary of not less than 50 nor more than 300 words setting forth in substance the nature of the proposed amendment. Such summary shall contain a statement of the objects and purposes of the amendment proposed and an outline of any proposed new scheme or frame work of government and shall be sufficient to inform the signers of the petition as to what change in government is sought to be accomplished by the amendment.The summary, together with a copy of the proposed amendment, shall first be submitted to the charter commission for its approval as to form and substance. The commission shall within ten days after such submission to it, return the same to the proposers of the amendment with such modifications in statement as it may deem necessary in order that the summary may fairly comply with the requirements above set forth.

Subd. 2. Petitions. The signatures to such petition need not all be appended to one paper, but to each separate petition there shall be attached an affidavit of the circulator thereof as provided by this section. A petition must contain each petitioner's signature in ink or indelible pencil and must indicate after the signature the place of residence by street and number, or their description sufficient to identify the place. There shall appear on each petition the names and addresses of five electors of the city, and on each paper the names and addresses of the same five electors, who, as a committee of the petitioners, shall be regarded as responsible for the circulation and filing of the petition. [........]

(1) Subd. 3. May be assembled as one petition. All petition papers for a proposed amendment shall be assembled and filed with the charter commission as one instrument. Within ten days after such petition is transmitted to the city council, the city clerk shall determine whether each paper of the petition is properly attested and whether the petition is signed by a sufficient number of voters. The city clerk shall declare any petition paper entirely invalid which is not attested by the circulator thereof as required in this section. Upon completing an examination of the petition, the city clerk shall certify the result of the examination to the council. If the city clerk shall certify that the petition is insufficient the city clerk shall set forth in a certificate the particulars in which it is defective and shall at once notify the committee of the petitioners of the findings. A petition may be amended at any time within ten days after the making of a certificate of insufficiency by the city clerk, by filing a supplementary petition upon additional papers signed and filed as provided in case of an original petition. The city clerk shall within five days after such amendment is filed, make examination of the amended petition, and if the certificate shall show the petition still to be insufficient, the city clerk shall file it in the city clerk's office and notify the committee of the petitioners of the findings and no further action shall be had on such insufficient petition. The finding of the insufficiency of a petition shall not prejudice the filing of a new petition for the same purpose. (Back)

(1) Subd. 4. Election. Amendments shall be submitted to the qualified voters at a general or special election and published as in the case of the original charter. The form of the ballot shall be fixed by the governing body. The statement of the question on the ballot shall be sufficient to identify the amendment clearly and to distinguish the question from every other question on the ballot at the same time. If 51 percent of the votes cast on any amendment are in favor of its adoption, copies of the amendment and certificates shall be filed, as in the case of the original charter and the amendment shall take effect in 30 days from the date of the election or at such other time as is fixed in the amendment.

An amusing side question: is this "magick" security theater? Security Theater of course works most "effectively" at materializing psychological phantoms with an audience at a Spectacle. This is the perhaps the principle Stimulus Effect intended by Homeland Security & its general orientation around 'visuals' which is not that different than Ceremonial Magick, which is [arguably] anything that generates a certain sense-impression in the mind of Observers.

metrodome-national-guard.jpeg

Another old backstory: In 2010 some people noticed they were using government photos of MN National Guard riot control gear from the deployment at the 2008 Republican National Convention under the NSSE system for recruitment propaganda on the Metrodome. RNC '08 Report: Our News: National Guard advert on Metrodome, proposed site of 2012 DNC, depicts soldiers deployed against protesters during 2008 RNC. Your tax dollas at work!

Syndicate content