NewsFollowUp.com

search

Franklin Scandal Omaha

pictorial index

sitemap home
Registry / List of Activists / Protesters detained or disappeared under NDAA

Registry / List of Activists already detained or have disappeared under NDAA

U.S. hiding 27,000 kidnapped people in hell-hole ships and prisons

  below

Sign anti NDAA petition and email your senators at: Demand Progress.

Philip Marshall & children suicided?

Aaron Swartz) NaturalNews Visionary internet activist Aaron Swartz found dead; was this brilliant internet revolutionary 'taken out?'

StopNDAA

Facebook 1 million against NDAA Indefinite Detention

  = go to NFU pages 

Dissent is NOT Terrorism!

The Fascism Effect of the 'War on Terror'
Related topics:   Internet            'War on Terrorism'                Communications             Fear             Boycotts
related topics     related topics     related topics    
Registry / List of Activists detained or disappeared under NDAA     top

If you know of anyone who has disappeared under NDAA, we will record that information here.

PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  and NSA lawsuit  calls the NDAA law a “catastrophic blow to civil liberties”.
  • AlexanderHiggins  As previously pointed out, during the trial Obama’s lawyers refused to define or clarify the terms “substantially supporting”, “terrorism” or who the “associated forces” where that the NDAA allowed the United States government to indefinitely detain.  ...  Worse is during the course of trial Obama’s lawyers refused to assert to Judge Forrest that the plaintiffs, which is a collection of journalists and public advocacy activists, not be targeted for indefinite detention simply for their participating in constitutionally protected activities.  and AlexanderHiggins already detained
  • Amber Lyon Live  How the NDAA Directly Threatens Average Americans, and How You Can Take Action Now    ...   Obama lied to the public and said he would veto the NDAA’s indefinite detention clauses. Instead, he surreptitiously signed the NDAA into law on Dec. 31, 2011 while most Americans were distracted celebrating New Years Eve. Both Romney and Obama have publicly stated their support for the new law.
  • Antiwar  gg  The NDAA will prevent some whistleblowers from coming forward with information and documents vital to the public good in fear the corrupt will pressure authorities to use the NDAA to detain the whistleblower indefinitely.
  • Electronic Frontier Foundation working to protect civil and free speech
  • Big Brother and the ministry of Homeland Security
  • BusinessInsider 10/2012  NDAA Plaintiffs Say Obama Flipped Out When A Judge Blocked The Act Because He Was Already Detaining People
  • Epic  Electronic Privacy Information Center
  • Mint Press Chris Hedges speaks to Occupy activists after a march through the streets of Philadelphia, PA July, 1, 2012. (Mannie Garcia/MintPress)
  • October2011  Occupy Washington DC .... NDAA Terrorism Charges Used Against Three NATO Protesters in Chicago 
  • Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog
  • SparrowMedia  Iceland Parlamentarian Birgitta Jonsdottir, Carl J. Mayer,  Tangerine Bolen  ...
  •  
  • StopNDAA
  • USDaysofRage  Alexa O'Brien
  • WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining
  • Cnet Tech News First
  • ArabAmerican News 
  • Crooks and Liars / LawFare   Key point rebutting the contention that the indefinite detention provisions apply to United States citizens:
  • DailyKos recall the backlash when Bush created "Free Speech Zones" - those razor wire cordoned off places where one could protest, well out of sight, of any action by his administration.
  • Gothamist Video: Cops Arrest Activist For Yelling About NDAA In Grand Central  ...  where approximately 150 demonstrators formed a "flash mob" to protest President Obama's signing of the National Defense Authorization Act NDAA],  In this video, protester Lauren Digioia gets arrested around the two minute mark: Digioia, who has been involved with the Occupy Wall Street movement for some time (and was sexually assaulted in Zuccotti Park in October)  ...   activists had previously been threatened with arrest for peacefully assembling, despite the space being open to the public (as required by law)
  • AlexanderHiggins  Obama May Be In Contempt For Violating NDAA Detention Ruling  A federal judge warned the US government may be in contempt after Obama attorney’s refused to assure NDAA detention isn’t currently being used on citizens.
  • The NewAmerican On September 12 a federal district court judge made permanent an earlier order temporarily blocking enforcement of provisions of the National Defense Authorization Act (NDAA) purporting to empower the president to deploy the U.S. military to apprehend and indefinitely detain people suspected of "substantially supporting" al-Qaeda, the Taliban, or "associated forces."
  • Jurist 10/2012  This week, the US Court of Appeals for the Second Circuit will consider whether to stay US District Judge Katherine Forrest's decision in Hedges v. Obama, granting a permanent injunction on First Amendment grounds against the detention powers enumerated in Section 1021(b)(2) of the FY2012 National Defense Authorization Act
  • LawFare  NDAA FAQ: A Guide for the Perplexed    By Benjamin Wittes and Robert Chesney Monday, December 19, 2011 at 3:31 PM  The volume of sheer, unadulterated nonsense zipping around the internet about the NDAA boggles the mind.
  •  temporary restraining order (which they subsequently converted to a motion for preliminary injunction in a conference with the Court), seeking to enjoin enforcement of § 1021.
  • Aljazeera Due process under duress: Detaining citizens under NDAA
  • CBSNews Terror indictments for Chicago NATO protesters Brian Church, Jared Chase, Brent Vincent Betterly
  • CIA
  • FBI
  • FDIC
  • Forbes NDAA
  • House Armed Services Committee   and factsheet Fact Sheet: Former Attorneys General, National Security Officials Support Detention Provisions of FY13 NDAA (HASC Fact Sheet - Reagan, Bush Admin Officials Support FY13 NDAA.pdf - 328.6 KBs)
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • SunTimes  3 protesters charged with conspiracy to commit terrorism   They were charged early Saturday as dozens of dignitaries from around the globe are heading to Chicago for the NATO Summit. ....The men have been each charged with three felony counts: possession of an explosive or incendiary device, conspiracy to commit terrorism, and providing material support to terrorism, said Harrison District Police Lt. Kenneth Stoppa.  Brian Church, 20, of Ft. Lauderdale, Fla.; Jared Chase, 24, of Keene, New Hampshire; and Brent Vincent Betterly, 24, of Oakland Park, Fl.
  • Supreme Court  Criticism has also been voiced regarding section 1033 of the bill which would state that nothing in the Authorization for Use of Military Force (Public Law 107-40) or the National Defense Authorization Act for Fiscal Year 2012 (Public Law 112-81) shall be construed to deny the availability of the writ of habeas corpus in a court ordained or established by or under Article III of the Constitution for any person who is detained in the United States pursuant to the Authorization for Use of Military Force (Public Law 107-40). 7]
  • Whitehouse  Bush =Obama
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.
  • Wikipedia  The concern of millions of Americans from every band in the political spectrum is that Americans detained as “belligerents” under the terms of the NDAA will not be tried in Article III courts, but will be subject to military tribunals such as the one currently considering the case of the so-called “Gitmo Five
  • U.S. hiding 27,000 kidnapped people in hell-hole ships and prisons
    NEWS  SEPTEMBER 4, 2009  BY: DEBORAH DUPRE  Subscribe  0Email  Top News newsletter

      Humanitarian Stafford Clive Smith
    The U.S. is holding 27,000 kidnapped people in secret prisons including thirty-two 'ghost ships' according to Reprieve Founding Director, Attorney Clive Stafford Smith in an interview Wednesday by Amy Goodman of Democracy Now! (Clive Stafford Smith, Democracy Now! Amy Goodman Interview, September 2, 2009)
    Reprieve is a London based non-profit organization using law to enforce human rights 'from Guantanamo Bay to Death Row.' 
    The organization has been dedicated to helping people kidnapped, tortured and used for experimentation in America's planet battlefield 'war on terror' system.
    The U.S. is transporting people to Iraqi jails among other places, to avoid media and legal scrutiny according to Smith in the Democracy Now! interview. (below)

    Bush administration's program of kidnapping "suspects," a covert operation also known as "rendition," continues under the Obama administration.
    Most people kidnapped and tortured are people of color, innocent of terrorism. They are used for non-consensual human experimentation according to recent reports. (See AFP, Doctors had central role in CIA abuse: rights group, Spet. 1, 2009 and CIA doctors face human experimentation claims, Sept. 3, 2009)
    Human experimentation without consent has been prohibited in any setting since 1947, when the Nuremberg Code resultant of Nazi doctor prosecution.
    "Every day, the U.S. picks up 40 - 60 people considered 'suspects' from around the world and imprisons them," stated Smith.
    Non-consensual human experimentation conducted on Middle Eastern detainees has consisted of applying torture including “physical threats, mock executions, choking to the point where detainees lost consciousness and even using a stiff brush to scrub a detainees skin raw” while health officials and psychologists monitored reactions. (AFP)
    The U.S.-based group, Physicians for Human Rights (PHR) medical advisor Scott Allen states on the PHR website that "medical doctors and psychologists colluded with the CIA to keep observational records about waterboarding, which approaches unethical and unlawful human experimentation." (Press release: PHR Analysis: CIA Health Professionals’ Role in Torture Worse Than Previously Known, August 31, 2009)
    Earlier this year, Smith estimated that 60,000 people had been through the American "system." This system is now internationally known to be a U.S. sponsored kidnap-torture-experiment program.
     
    Stated on the Reprieve website is: "We investigate, we litigate and we educate, working on the frontline, providing legal support to prisoners unable to pay for it themselves. We promote the rule of law around the world, and secure each person’s right to a fair trial. And in doing so, we save lives."
    Clive Stafford Smith dedicated humanitarian
    Smith, spent 25 years working on behalf of defendants facing U.S. death penalty. As Reprieve Director, Smith oversees Reprieve’s Casework Programme plus the direct representation of prisoners in Guantánamo Bay and on death row as a Louisiana licensed attorney-at-law.
    After graduating from Columbia Law School in New York, Smith spent nine years as a lawyer with the Southern Center for Human Rights working on death penalty cases and other civil rights issues. In 1993, Smith moved to New Orleans and launched the Louisiana Crisis Assistance Center, a non-profit law office specializing in representation of poor people in death penalty cases. 
    In 1999 Smith founded Reprieve.  The following year, he was awarded an OBE for ‘humanitarian services. Since 2004, Smith has focused on achieving due process for prisoners being held by the US in Guantánamo Bay and countless secret prisons around the world established in the wake of the World Trade Center crime. He also continues his work on death penalty cases.
    Smith was made a Rowntree Visionary and Echoing Green Fellow in 2005 and previously, was a Soros Senior Fellow.
    For more information about Reprieve, contact: info@reprieve.org.uk

  • BusinessInsider Karzai May Be Kicking Obama Out Of Afghanistan Soon Glenn GreenwaldThe Guardian | Nov. 20, 2012, 7:53 AM | 994 | For several decades, the US government - in annual "human rights" reports issued by the State Department (reports mandated by the US Congress) - has formally condemned nations around the globe for the practice of indefinite detention: imprisoning people without charges or any fixed sentence. These reports, said Secretary of State Hillary Clinton in her preface to last year's report, are grounded in the principle that "respect for human rights is not a western construct or a uniquely American ideal; it is the foundation for peace and stability everywhere." That 2011 report condemned numerous nations for indefinite detention, including Libya ("abuse and lack of review in detention"), Uzbekistan ("arbitrary arrest and detention"), Syria("arbitrary arrest and detention"), and Iran ("Authorities held detainees, at times incommunicado, often for weeks or months without charge or trial"). In Afghanistan and Iraq, the US government is engaged in a fierce and protracted battle over the fundamental right to be free of indefinite detention. Specifically, the US is demanding that the governments of those two nations cease according this right to their citizens. As a Washington Post article this morning details, Afghan President Hamid Karzai is insisting that the US fulfill its commitment to turn over all prisons, including the notorious facility at Bagram, to Afghan control, but here is one major impediment emphasis added]: "Afghan and U.S. officials have also disagreed on the issue of detention without trial. Washington wants the Afghan government to continue holding certain prisoners it views as dangerous, even if there is not enough evidence to try them. "Aimal Faizi, the chief spokesman for Karzai, told reporters Monday that detention without trial is illegal in Afghanistan and that more than 50 Afghans are still being held in U.S. custody at Bagram, 35 miles northeast of Kabul, even though they have been ordered released by Afghan courts." The US has long been demanding that the Afghan government continue the American practice of indefinite detention without charges, and still presses this demand even after the top Afghan court in September ruled that such detentions violate Afghan law. Human rights workers in Afghanistan have long pointed out that America's practice of imprisoning Afghans without charges is a major source of anti-American sentiment in the country. In a 2009 interview, Jonathan Horowitz of the Open Society Institute told me: "The majority of the people who I have spoken to cite the way that the US captures and detains people as their main complaint against the US, second only to civilian casualties." This US-Afghan battle over basic due process has extended beyond detention policies. In 2009, the Obama administration's plan to assassinate certain Afghan citizens it suspected of being "drug kingpins" - with no charges, trial or any other due process - sparked intense objections from Afghan officials. Those officials tried to teach Obama officials such precepts as: "There is a constitutional problem here. A person is innocent unless proven guilty," and: "if you go off to kill or capture them, how do you prove that they are really guilty in terms of legal process?", and: " The Americans] should respect our law, our constitution and our legal codes. We have a commitment to arrest these people on our own." Read more: http://www.businessinsider.com/karzai-may-be-kicking-obama-out-of-afghanistan-soon-2012-11#ixzz2DAgdbKfb
  • Huffington Post  Republican state lawmakers in Texas submitted two bills this week seeking to counteract the federal government's controversial powers of indefinite detention and overzealous searches by the Transportation Security Administration. GOP state Rep. Lyle Larson filed a measure that would nullify controversial aspects of the 2012 National Defense Authorization Act, which has been criticized for establishing vague criteria that gives the federal government broad authority to indefinitely detain suspected terrorists without charges or a trial. HB 149 specifically calls out Section 1021 and 1022 of the NDAA, which were recently subjects of a federal lawsuit filed by plaintiffs concerned that the language within the passages could be used to indefinitely detain U.S. citizens. The bill calls the sections "inimical to the liberty, security, and well-being of the citizens of the State of Texas," and accuses them of violating numerous protections established by both the U.S. and state constitutions. The legislation states that it will reject "material support" of the measures' implementation, and goes on to claim that any person found to be exercising powers established in Sections 1021 or 1022 would risk criminal penalties. GOP state Rep. David Simpson filed a second bill, HB 80, to address alleged overreach by the TSA. The measure declares that any "intentional" touching of "the anus, breast, buttocks, or sexual organ of the other person, including touching through clothing," without probable cause would be considered a violation of the law. It would also prohibit removing a "child younger than 18 years of age from the physical custody or control of a parent or guardian of the child," and establishes broader restrictions on harassment or inconveniencing those desiring to avoid such searches. “If you walk up to somebody and grab their crotch out on the street, it will land you in jail. Blue uniforms and federal badges don’t grant some goon the power to sexually assault you, or at least they shouldn’t," Tenth Amendment Center communications director Mike Maharrey said in a statement. "A person doesn’t forfeit her or his personal dignity or Fourth Amendment protections with the purchase of an airline ticket."
  • RT Boston police accused of spying on protesters and intimidating dissidents  ...   The Boston Police Department calls them criminals, extremists and a reason to raise a red flag in regards to ensuring homeland security. Their crime, though, is simply exercising their First Amendment rights.  The American Civil Liberties Union in Massachusetts has successfully requested and obtained a trove of files from the Boston Police Department that reveals that officers of the law have for several years conducted detailed surveillance on peaceful protesters, in many cases filing extensive paperwork to discuss the inner workings of non-violent organizations and how they exercise their constitutionally-protected right to be secure in their political beliefs.   ...   The victims, the ACLU reports, include well-known activist groups such as the Greater Boston chapter of the CodePink anti-war organization and a local branch of the Veterans for Peace movement.   ...  Kate Crockford (ACLU) says that protesters were still filed in these fusion centers with reports plastered with labels such as “Criminal Act,” “Extremists,” “Civil Disturbance” and “HomeSec-Domestic.”   ...  and RT  DHS 'crap intelligence',
  • Gothamist Nov 2012  The city has settled a lawsuit brought by three Occupy Wall Street protestors who accused the NYPD of arresting them without cause, detaining them for almost 24 hours, and forcing them through a humiliating strip search. On November 17th 2011, 20-year-old Kira Moyer-Sims was buying coffee on the Lower East Side while three friends waited in a nearby car. Suddenly 30 police officers swooped in and arrested them, and later drilled them on their relationship with the movement while they were in custody. “I felt like I had been arrested for a thought crime,” Moyer-Sims said at the time. Taxpayers will now give her $15,000 to make up for it. According to the settlement, the city will pay $50,000 total to Moyer-Sims, Angela Richino, and Matthew Vrvilo. (It's unclear what happened to the fourth person arrested.) All the plaintiffs in the civil lawsuit had been charged with obstructing governmental administration—charges that were later dropped by the DA's office.
  • October2011  Three Chicago NATO Summit Activists Charged With Conspiracy to Commit Terrorism, Providing Material Support for Terrorism  Robert Lamoore (left) and Daniel Murphy (right), the two activists released Friday night (Photo by Steve Horn) Two more antiwar activists, in from out of town to protest the NATO Summit, were released from a police station on the south side of Chicago late tonight at roughly 10:00 PM, making it a grand total of six activists released so far, of the nine detained without charge by the Chicago Police Department (CPD) on Wednesday, previously covered on Antiwar.com. The other three remaining weren’t so lucky. They’ve been charged with, as Occupy Chicago has reported on its Twitter feed, ”possession of incendiary or explosive device, conspiracy to commit terrorism & providing material support for terrorism.” “Material support” of terrorism, under the National Defense Authorization Act of 2012 signed by President Barack Obama, is a crime that could call for indefinite detention without a trial, begging the question: are these legitimate political prisoners?  One Occupy activist noted, “It’s NDAA in full effect. We are doomed.” “The National Lawyers Guild deplores the charges against Occupy activists in the strongest degree,” said Sarah Gelsomino with the NLG and the People’s Law Office. “It’s outrageous for the city to apply terrorism charges when it’s the police who have been terrorizing activists and threatening their right to protest.”  There will be a bond hearing at noon today. The three activists names, according to the NLG, are Bryan Church, Jarred Chase, Brent Betterly. The lame excuse for arrest and “terrorism” charges and the subsequent police raid to begin with? The activists were making “molotov cocktails” to use in their protests, or so reported the sycophantic local press in Chicago. As Kevin Gosztola of FireDogLake explained in a previously written blog post well worth reading, “Local news reported a ‘police source’ had recovered ‘Molotov cocktails.’ There is no evidence of the existence or production of Molotov cocktails. The police did confiscate a home brew-making kit.”  more
  • Statig.am  Meet Journalist Alexa O'Brien: Targeted By #Obama Admin, #NDAA #Detention For Trying to Make Bribing #Politicians Illegal - www.PeopleOverPolitics.Org  TruthOut   Co-plaintiff Alexa O'Brien, a journalist and co-founder of the protest movement US Days of Rage, cited a Truthout FOIA request in her testimony. O'Brien said that a federal agent confidentially notified her about a document suggesting the Department of Homeland Security (DHS) planned to infiltrate US Days of Rage by linking it to the hacktivist collective Anonymous. Included in her testimony is a memo unearthed by Truthout which states: "National Cybersecurity and Communications Integration Center Bulletin. Details on 'Anonymous,' upcoming U.S. operations 17 September 2011 Occupy Wall Street, 'U.S. Day of Rage.'" O'Brien also testified that she learned from several sources, including leaked documents on WikiLeaks, that a private security firm and former US State Department officials had allegedly been asked to tie US Days of Rage to terrorist web sites.
  • RT   Third anarchist jailed for refusing to testify before secret grand jury Get short URL email story to a friend print version Published: 11 October, 2012, 20:58 TAGS: Law, USA, Court Leah Plante  A third self-described anarchist from the Pacific Northwest has been jailed by federal officials for refusing to speak before a secretive grand jury that the accused have called a politically-motivated modern-day witch-hunt. Leah-Lynn Plante, a mid-20s activist from Seattle, Washington, was ushered out of court by authorities on Wednesday after refusing for a third time to answer questions forced on her by a grand jury — a panel of prosecutors convened to determine if an indictment can be issued for a federal crime. Plante was one of a handful of people targeted in a series of raids administered by the FBI and the Joint Terrorism Task Force on July 25 of this year which the feds say were in conjunction with an investigation into acts of vandalism that occurred during May Day protests in Seattle nearly two months prior. As part of their probe, search warrants were issued at multiple residences of activists in the area, including Plante’s, demanding that dwellers provide agents with “anti-government or anarchist literature” in their homes and any flags, flag-making material, cell phones, hard drives, address books, and black clothing. “As if they had taken pointers from Orwell’s 1984, they took books, artwork and other various literature as ‘evidence’ as well as many other personal belongings even though they seemed to know that nobody there was even in Seattle on May Day,” Plante recalls in a post published this week to her Tumblr page. Only one week after the raid, Neil Fox of the National Lawyers Guild told Seattle Times that raids like this are create a “chilling effect” by going after lawful, constitutionally-allowed private possessions. “It concerns us any time there are law-enforcement raids that target political literature, First Amendment-protected materials,” Fox said. This week Plante still maintains her innocence, now she has reason to believe that the raid that has left her suffering from post-traumatic stress syndrome may have been more than an investigation into an activity, but an ideology. Plante says a Freedom of Information Act request she filed in the months after her apartment door was broken down by armed officials reveals that the grand jury investigating her was first convened in March, two months before the vandalism she is being accused of even occurred. “They are trying to investigate anarchists and persecute them for their beliefs. This is a fishing expedition. This is a witch hunt,” she says this week. On the day of her third meeting with the grand jury on Wednesday, Plante wrote on her blog that she’d almost certainly be jailed on charges of contempt for refusing once again to testify about herself but said she was willing to face the consequences for exercising her right to remain silent. “I do not look forward to what inevitably awaits me today, but I accept it,” she writes. “My convictions are unwavering and will not be shaken by their harassment. Today is October 10th, 2012 and I am ready to go to prison.” Hours later, her Tumblr was updated with a note authored by one of her supporters confirming that Plante “was thrown into prison for civil contempt” after her court date. Plante is now the third anarchist to be imprisoned in the last month for refusing to answer questions about their belief and behavior before a grand jury. Last month, Plante spoke openly about the grand jury before refusing their questioning for only her second time. “I believe that these hearings are politically motivated,” she wrote in a September 16 statement. “The government wants to use them to collect information that it can use in a campaign of repression. I refuse to have any part of it, I will never answer their questions, I will never speak.” “While I hate the very idea of prison, I am ready to face it in order to stay true to my personal beliefs. I know that they want to kidnap me and isolate me from my friends and my loved ones in an effort to coerce me to speak. It will not work. I know that if I am taken away, I will not be alone.” Katherine “KteeO” Olejnik, a fellow anarchist from the Seattle area, was taken into federal custody on September 28 for refusing to cooperate with a grand jury, a decision she said was based on humanity and her First Amendment protections. “I cannot and will not say something that could greatly harm a person’s life, and providing information that could lead to long term incarceration would be doing that,” Olejnik wrote before being booked. “Icannot and will not be a party to a McCarthyist policy that is asking individuals to condemn each other based on political beliefs.” On the No Political Repression blog, a support of Olejnik writes that she was prohibited from taking notes during her time on the stand, during which she says she resisted questioning. Days before her imprisonment began, Matt Duran was also jailed for contempt. According to his attorneys, Duran was not only imprisoned by placed in solitary confinement, denied intimate contact with his lawyer, denied visitor requests forms, personal dietary requirements and sunlight an fresh air.
  • LawFare Section 1022 purports not merely to authorize but to require military custody for a subset of those who are subject to detention under Section 1021. In particular, it requires that the military hold “a covered person” pending disposition under the law of war if that person is “a member of, or part of, al-Qaeda or an associated force that acts in coordination with or pursuant to the direction of al-Qaeda” and is participating in an attack against the United States or its coalition partners. The president is allowed to waive this requirement for national security reasons. The provision exempts U.S. citizens entirely, and it applies to lawful permanent resident aliens for conduct within the United States to whatever extent the Constitution permits. It requires the administration to promulgate procedures to make sure its requirements do not interfere with basic law enforcement functions in counterterrorism cases. And it insists that “Nothing in this section shall be construed to affect the existing criminal enforcement and national security authorities of the Federal Bureau of Investigation or any other domestic law enforcement agency with regard to a covered person, regardless whether such covered person is held in military custody.”
  • StopNDAAOn September 12, 2012 we had one of the biggest victories for civil liberties and against government overreach in a decade. Judge Forrest granted a permanent injunction against Section 1021(b)(2), the government promptly filed an appeal, and then went further: they requested a stay of execution on the injunction from Judge Forrest, once again providing no evidence and failing to answer all of her questions and concerns, while again claiming that the detention powers of the Authorization for Use of Military Force (AUMF) of 2001, (the law that allows the president to detain those who were involved in the 9/11 attacks and/or are members of Al Qaeda or the Taliban) and the NDAA's Section 1021 powers are precisely the same.   ...   This is disingenuous. Section 1021 provides sweeping powers of detention through incredibly vague and undefined terms, that are missing in the AUMF. The government is completely contradicting itself. Judge Forrest made it clear that her ruling did not touch the AUMF. And in their request for an emergency stay, the government claimed "irreparable harm" would be incurred if they do not have the powers of Section 1021.    ...   On October 2, 2012, a stay against the permanent injunction was granted by a three judge motions panel of the Second District US Court of Appeals, pending appeal on the merits. Appeal briefs are due to the court on November 2, 2012 and December 3, 2012. The government then has until December 13, 2012 to file their brief in reply. The schedule is ordered to be expedited, and arguments will be docketed for the first available week following the filing of our opposition brief. That date is not yet set. Thank you for your interest in our case. Please continue to support us in any way you can! More at StopNDAA
  • LawFare  ...  That claim of authority is based on the Authorization for Use of Military Force (“AUMF”) passed by Congress shortly after the September 11 attacks, as informed by the law of war. The Bush Administration previously claimed very similar authority, albeit invoking not just the AUMF but also the inherent power of the President under Article II of the Constitution. In any event, such claims have been subjected to judicial challenge repeatedly, most commonly in the context of the Guantanamo detainee habeas litigation. As we explain below, the courts have had a decidedly mixed reaction in the pair of cases involving persons captured within the United States, but as for persons captured abroad, they have largely endorsed the government’s position. The D.C. Circuit, in fact, has tentatively adopted a definition of the class detainable under the AUMF that is, if anything, broader than what the administration seeks. While the administration–and now Congress–would detain only on the basis of “substantial support,” the D.C. Circuit has articulated a standard which would permit detention of those who “purposefully and materially support” the enemy, even if not substantially.
  • BusinessInsider 10/2012  NDAA Plaintiffs Say Obama Flipped Out When A Judge Blocked The Act Because He Was Already Detaining People   The Obama administration might be coming for you, no matter who you are, according to a group of people fighting President Barack Obama's indefinite detention act. Chris Hedges, Daniel Ellsberg, and a whole host of others involved in the fight against the National Defense Authorization Act yesterday took to Reddit to answer questions about the act. A federal judge permanently blocked the NDAA — which allows the government to indefinitely detain anyone even remotely related to terrorism — claiming it has a "chilling effect" on free speech. But the Obama administration was quick to pounce, saying Judge Katherine B. Forrest overstepped her bounds in opposing the White House. "Anyone who dissents is in threat," Hedges wrote in response to a question about who should fear the act. "The legislation, as the dumped emails by Wikileaks from the security firm Stafford illustrated, allows the state to tie a legitimate dissident group to terrorism and strip them of their right of dissent." Another Redditor asked why Obama was so quick to fight Forrest's ruling. "If the Obama administration simply appealed it, as we expected, it would have raised this red flag," Hedges wrote. "But since they were so aggressive it means that once Judge Forrest declared the law invalid, if they were using it, as we expect, they could be held in contempt of court. This was quite disturbing, for it means, I suspect, that U.S. citizens, probably dual nationals, are being held in military detention facilities almost certainly overseas and maybe at home."
  • comment Ross Wolf: Americans deemed by President Obama as Belligerent are vulnerable to Arrest and Indefinite Detention under the passed NDAA, National Authorization Defense Act. Recently the Obama Administration filed an appeal to stop a judge’s injunction that blocked enforcement of some NDAA provisions the Obama Administration stated (were justified) that gives the President the authorization to lock belligerents up indefinitely—because cases involving belligerents directly-aligned with militants against the good of America—warrants such punishment.) Obama can use those blocked provisions of NDAA to round up millions of Americans alleging they are belligerents or threat to National Security. Hitler included similar provisions in his Discriminatory Decrees signed February 28, 1933 to arrest German Citizens without evidence by giving power to German Police and other German authorities to arrest without evidence anyone Nazi authorities claimed attempted or incited public unrest: arrested among others were outspoken Germans, writers, journalists, peaceful protestors and artists.    ...   The U.S. 2012 NDAA legislation Obama signed 12-31-11 is similar to Hitler’s 1933 fascist laws the SS and Gestapo used to target persons in Germany for arrest, imprisonment and execution without probable cause; confiscate millions of dollars of property.    ...   During the Obama Administration's recent appeal to stop a Federal Judge blocking enforcement of some provisions in NDAA—never clarified what constitutes a (belligerent); or militant; or what belligerent activities (directly align with a militant) to order a belligerent’s arrest or indefinite detention; or what is against the good of America. Under NDAA the U.S. Government or President could deem (directly aligned with militants) e.g. any political or other association; charge any activity, statement, writing or communication with any individual or group government deemed militant is (directly aligned) to arrest and detain Americans. Writers and journalists that disagree with or question U.S. Government or its allies—may under NDAA be subject to arrest and indefinite detention. 2012 / 2013 NDAA and Hitler’s 1933 Decrees are similar; both laws allow forced government censorship; warrant-less searches of private property and property forfeiture of property from persons not charged with crime.    ...   Provisions in 2013 NDAA keep the door open for corrupt U.S. police; government agents and provocateurs which there are many, to falsify reports and statements to target any American, group or organization for arrest, indefinite detention, complete disappearance; and civil asset forfeiture of their property.    ...  You may have noted NDAA referred to the USA Patriot Act. Under the Patriot Act, lending itself to Government / police corruption, the Federal Government may use secret witnesses and informants to cause civil asset forfeiture of Americans’ property. Witness(s) and informants may be paid up to 50% of assets forfeited. Federal Government is only required to use a preponderance of civil evidence, little more than hearsay to Civilly Forfeit Private Property. Under the Patriot Act innocent property owners may be barred from knowing or challenging evidence federal government uses to forfeit their property.    ...   Sections of 2013 NDAA are so broad, it appears U.S. Government or the President could (retroactively) deem an American’s past 1st Amendment activities prior to passage of 2012 NDAA—supported hostilities, terrorism or (Belligerents) to order the arrest and Indefinite Detention of any U.S. Citizen, writer, group or organization.    ...   Under NDAA It should be expected that indefinitely detained U.S. Citizens not involved in terrorism or hostile activities, not given Miranda Warnings when interrogated, not allowed legal counsel or habeas corpus may be prosecuted for non-terrorist (ordinary crimes) because of their (alleged admissions) while held in Indefinite Detention.   ...  
  • CenterforConstitutionalRights  The National Defense Authorization Act (NDAA) of 2012 Information for Concerned Activists 1 What does Section 1021 of the NDAA say? Section 1021 of the 2012 National Defense Authorization Act “affirms” that the Authorization to Use Military Force (AUMF) allows the government to detain certain people, defined below, under the law of war. The AUMF was passed by Congress days after 9/11 to authorize the president to use “all necessary and appropriate force” against individuals and groups believed to be responsible for the 9/11 attacks. This section of the NDAA applies to (1) those who planned or were otherwise involved in 9/11, as well as (2) any “person who was a part of or substantially supported al-Qaeda, the Taliban, or associated forces that are engaged in hostilities against the United States or its coalition partners, including any person who has committed a belligerent act or has directly supported such hostilities in aid of such enemy forces.” Under the NDAA people who fit into either of these two categories may be detained under the law of war, without trial, until the end of hostilities authorized by the AUMF. 2 What about Section 1022? Section 1022 of the NDAA states that certain people captured in the course of AUMF-authorized hostilities must be held in military custody. This provision applies to people who are members or a part of Al Qaeda or an “associated force” that acts in coordination or under the direction of Al Qaeda, who have participated in planning or carrying out an attack or attempted attack against the United States or its coalition partners. Section 1022 explicitly exempts U.S. citizens, and may also exempt some lawful resident aliens. 3 Do these provisions apply only to Al Qaeda members, or could they be applied to U.S. activists? While the text of the act purports to be limited to those already subject to detention under the AUMF, that authorization was explicitly linked to 9/11 and has been interpreted by the courts to apply only to those who are “part of” Al Qaeda. Section 1021 is more expansive, as it seems to authorize detention of Al Qaeda members, as well as those who support Al Qaeda or “associated forces.” There is no limitation requiring knowledge or intent to support Al Qaeda, and no limitation on what is meant by “associated forces.” The law could be interpreted to extend to someone who unwittingly donates money to a charity they believe supports orphans but is really an Al Qaeda front, or to members of groups which did not exist at the time of 9/11 and have no actual connection to Al Qaeda, but who the government says are inspired by (and thereby associated) with Al Qaeda. It is unlikely that the law could be read to apply to groups with no connection or shared ideology with Al Qaeda. But the military doesn’t have to prove the Al Qaeda connection before detaining the person Winter 2012 Center for Constitutional Rights email info@ccrjustice.org • www.CCRjustice.org in question, so theoretically, the category is extremely open to abuse by this or future administrations. Moreover, the NDAA should be very troubling to us all, as it reflects a trend on the part of Congress and the president to increasingly militarize the fight against “terrorism” both here and abroad, and it significantly expands the role of the military in domestic law enforcement operations, which in turn rolls back laws on the books since Reconstruction. 4 Does the law allow for the detention of American citizens captured in the U.S.? Possibly. Section 1021(e) of the NDAA states that nothing in the act “shall be construed to affect existing law or authorities relating to the detention of U.S. citizens, lawful resident aliens of the United States, or any other persons who are captured or arrested in the United States.” However, existing law is not settled with respect to whether U.S. citizens captured in the United States may be indefinitely detained.1 The answer to that question turns on whether the AUMF applies to the detention of American citizens captured in the United States. The Center for Constitutional Rights believes it does not; but the government— now or in the future—may argue it does. Moreover, an effort by Senator Diane Feinstein to include language in the NDAA clarifying that the AUMF only applies “abroad” was rejected by the Senate. The exemption of U.S. citizens under section 1022 does not change this analysis, it simply means that military detention of qualifying U.S. citizens is discretionary rather than mandatory under the law. 5 For how long can someone be held under the NDAA? The NDAA allows for detention until the “end of hostilities,” which in the context of a so-called global war on terror, could mean forever. And those held in indefinite detention are not necessarily afforded the fundamental rights which many take for granted in the U.S., including the right to counsel, to a trial, to confront one’s accusers, etc. These individuals would retain their habeas corpus rights (the right to challenge their detention in federal court) if captured in the U.S. or sent to Guantánamo Bay, but not if captured abroad and, for example, sent to Bagram Air Force Base. And even if they retained habeas rights, the Guantánamo detainee litigation has demonstrated such rights have been rendered largely meaningless by D.C. Circuit case law. 6 What is the impact of President Obama’s signing statement? When President Obama signed the NDAA into law, he accompanied it with a “signing statement” promising that his administration would not authorize the indefinite military detention of American citizens, and would work with Congress to “mitigate” concerns with the detainee provisions in the legislation, “oppose” attempts to expand those provisions in the future, and “seek the repeal” of those provisions. A signing statement is nothing more than a presidential press release; it is not legally binding and has no impact or influence on the courts. It is worth noting that President Obama issued a similar signing statement with the 2011 NDAA, promising to “mitigate,” “oppose” and “seek the repeal” of the detainee transfer restrictions included in that law, but did none of those things. Even if President Obama follows through on promises in his signing statement, he will not be president forever, and the statement does not bind his successors. 1 This issue was raised in the Padilla case—where the U.S. claimed authority to hold Jose Padilla, a U.S. citizen arrested in Chicago, in indefinite military detention—but it was never resolved by the Supreme Court because the government “mooted” the case by transferring Padilla back to the federal criminal courts to avoid Supreme Court review.
  • Guardian   US detention of Imran Khan part of trend to harass anti-drone advocates The vindictive humiliation of Pakistan's most popular politician shows the US government's intolerance for dissent Share1097 Email Glenn Greenwald guardian.co.uk, Sunday 28 October 2012 10.06 EDT Jump to comments (809) Imran Khan, centre, chairman of Pakistan Tehreek-e-Insaf, with party's supporters. He has led a high-profile campaign against US drone strikes. Photograph: A Majeed/AFP/Getty Images Imran Khan is, according to numerous polls, the most popular politician inPakistan and may very well be that country's next Prime Minister. He is also a vehement critic of US drone attacks on his country, vowing toorder them shot down if he is Prime Minister and leading an anti-drone protest march last month. On Saturday, Khan boarded a flight from Canada to New York in order to appear at a fundraising lunch and other events. But before the flight could take off, US immigration officials removed him from the plane and detained him for two hours, causing him to miss the flight. On Twitter, Khan reported that he was "interrogated on his] views on drones" and then added: "My stance is known. Drone attacks must stop." He thendefiantly noted: "Missed flight and sad to miss the Fundraising lunch in NY but nothing will change my stance." The State Department acknowledged Khan's detention and said: "The issue was resolved. Mr Khan is welcome in the United States." Customs and immigration officials refused to comment except to note that "our dual mission is to facilitate travel in the United States while we secure our borders, our people, and our visitors from those that would do us harm like terrorists and terrorist weapons, criminals, and contraband," and added that the burden is on the visitor "to demonstrate that they are admissible" and "the applicant must overcome all grounds of inadmissibility." There are several obvious points raised by this episode. Strictly on pragmatic grounds, it seems quite ill-advised to subject the most popular leader in Pakistan - the potential next Prime Minister - to trivial, vindictive humiliations of this sort. It is also a breach of the most basic diplomatic protocol: just imagine the outrage if a US politician were removed from a plane by Pakistani officials in order to be questioned about their publicly expressed political views. And harassing prominent critics of US policy is hardly likely to dilute anti-US animosity; the exact opposite is far more likely to occur. But the most important point here is that Khan's detention is part of a clear trend by the Obama administration to harass and intimidate critics of its drone attacks. As Marcy Wheeler notes, "this is at least the third time this year that the US has delayed or denied entry to the US for Pakistani drone critics." Last May, I wrote about the amazing case of Muhammad Danish Qasim, a Pakistani student who produced a short film entitled "The Other Side", which "revolves around the idea of assessing social, psychological and economical effects of drones on the people in tribal areas of Pakistan." As he put it, "the film takes the audience very close to the damage caused by drone attacks" by humanizing the tragedy of civilian deaths and also documenting how those deaths are exploited by actual terrorists for recruitment purposes. Qasim and his co-producers were chosen as the winner of the Audience Award for Best International Film at the 2012 National Film Festival For Talented Youth, held annually in Seattle, Washington. He intended to travel to the US to accept his award and discuss his film, but was twice denied a visa to enter the US, and thus was barred from making any appearances in the US. The month prior, Shahzad Akbar - a Pakistani lawyer who represents drone victims in lawsuits against the US and the co-founder of the Pakistani human rights organization, Foundation for Fundamental Rights - was scheduled to speak at a conference on drones in Washington. He, too, was denied a visa, and the Obama administration relented only once an international outcry erupted. There are two clear dynamics driving this. First, the US is eager to impose a price for effectively challenging its policies and to prevent the public - the domestic public, that is - from hearing critics with first-hand knowledge of the impact of those policies. As Wheeler asks, "Why is the government so afraid of Pakistanis explaining to Americans what the drone attacks look like from a Pakistani perspective?" This form of intimidation is not confined to drone critics. Last April, Ireported on the serial harassment of Laura Poitras, the Oscar-nominated documentarian who produced two films - one from Iraq and the other from Yemen - that showed the views and perspectives of America's adversaries in those countries. For four years, she was detained every single time she reentered the US, often having her reporters' notebook and laptop copied and even seized. Although this all stopped once that article was published - demonstrating that there was never any legitimate purpose to it - that intimidation campaign against her imposed real limits on her work. That is what this serial harassment of drone critics is intended to achieve. That is why a refusal to grant visas to prominent critics of US foreign policy was also a favorite tactic of the Bush administration. Second, and probably even more insidious, this reflects the Obama administration's view that critics of its drone policies are either terrorists or, at best, sympathetic to terrorists. Recall how the New York Times earlier this year - in an article describing a new report from the Bureau of Investigative Journalism documenting the targeting of Pakistani rescuers and funerals with US drones - granted anonymity to a "senior American counterterrorism official" to smear the Bureau's journalists and its sources as wanting to "help al-Qaida succeed". For years, Bush officials and their supporters equated opposition to their foreign policies with support for the terrorists and a general hatred of and desire to harm the US. During the Obama presidency, many Democratic partisans have adopted the same lowly tactic with vigor. That mindset is a major factor in this series of harassment of drone critics: namely, those who oppose the Obama administration's use of drones are helping the terrorists and may even be terrorist sympathizers. It is that logic which would lead US officials to view Khan as some sort of national security threat by virtue of his political beliefs and perceive a need to drag him off a plane in order to detain and interrogate him about those views before allowing him entrance to the US. What makes this most ironic is that the US loves to sermonize to the world about the need for open ideas and political debate. In April, Secretary of State Hillary Clinton lectured the planet on how "those societies that believe they can be closed to change, to ideas, cultures, and beliefs that are different from theirs, will find quickly that in our internet world they will be left behind," That she is part of the same government that seeks to punish and exclude filmmakers, students, lawyers, activists and politicians for the crime of opposing US policy is noticed and remarked upon everywhere in the world other than in the US. That demonstrates the success of these efforts: they are designed, above all else, to ensure that the American citizenry does not become exposed to effective critics of what the US is doing in the world.
False Flag Cyber Attack
PROGRESSIVE  REFERENCE CONSERVATIVE*

  • Walsh Report, National Archives search: Robert Gates, nominee for Secretary of Defense and go to NFU 'War on Terrorism' pages for more
  • Emp-zan)  Iraq  -- NFU visitor
  • American Immigration Lawyers Association search Patriot Act
  • Center for Strategic and International Studies  
  • Conflict Watch
  • IAEA International Atomic Energy Association
  • Institute for Defence and Strategic Studies, Singapore, Thailand, links and thing tanks
  • Intel Daily, Sarkozy, "people are born pedophiles", 
  • International Committee of the Red Cross, why did they wait months to report Iraq prison abuse.
  • International Relations and Security Network, Swiss Contribution to the Partnership for Peace
  • International Terrorism Observatory, Paris, France
  • Legislation related to 9/11
  • National CFIDS Foundation Chronic Fatigue Immune Dysfunction,  ME, Myalgic Encephalopathy
  • National Security Archive in periodically releases unclassified docs. 
  • North American Freedom Foundation "Advocating for U.S. and Canadian victims and survivors of mind control, torture, slavery, and related terror through education and remembrance."
  • Strategic Intelligence, from Loyola College Department of Political Science
  • Times Online The US is helping Morocco to build a new interrogation and detention facility for Al-Qaeda suspects near its capital, Rabat.  search terms: Ain Aouda, Direction de la Securité du Territoire (DST), Temara, Moroccan secret police, rendition, CIA, Rumsfeld
  • UN NewsCentre  
  • Office of Managing Risk and Public Safety
  • Urban Institute
  • UCLA, Dept of Epidemiology, School of Public Health
  • URUKnet Abu Ghraib
  • Web Index, 9/11, Johns Hopkins
  • notes
  • Office of Special Plans? Mother Jones, on Pentagon intelligence unit built case for Iraq war.  more search words: Kwiatkowski, NESA, Wolfowitz, Feith, Committee for the Liberation of Iraq.  Ignore Palestinians, go for regime change in region.  Harold Rhode,  American Enterprise Institute, Defense Policy Board, David Wurmser.  They all knew there was no noteworthy link between Al Qaeda and Iraq.  
  • Pedophilia, White House, 1989, YouTube
  • topic map  
  • NATIONAL SECURITY PRESIDENTIAL DIRECTIVE / NSPD 51

  • HOMELAND SECURITY PRESIDENTIAL DIRECTIVE / HSPD-20

  • notes Chad, War on Terror, oil, France, Sarkozy  

  • Wikipedia Idriss Deby  At the end of August 2006, Déby made international news after calling for his country to have a 60 per cent stake in its oil output after receiving "crumbs" from foreign companies running the industry. He said Chevron and Petronas were refusing to pay taxes totalling $486.2 million. Recently, Chad passed a World Bank-backed oil revenues law that required most of its oil revenue to be allocated to health, education and infrastructure projects. The World Bank had previously frozen an oil revenue account in a dispute over how Chad spent its oil profits. 12]  ...Corruption In October 2006, Chad was placed at the top of the list of the world's most corrupt nations by Forbes magazine for "what may turn out to be the single most piggish use of philanthropic funds". Proceeds from a project, funded in part by the World Bank, to build an oil pipeline through Chad and Cameroon were supposed to have been ring-fenced by Déby's government to assist and feed "the desperately poor people of these nations. Instead, some $30 million was diverted to buy arms to keep in power the government of President Idriss Déby

  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. 2] 3] 4] 5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture. 6]

  • WMR is pleased to offer a new public service for former members of the US military, federal law enforcement, and intelligence community who refused to "cook the intelligence books," engage in extra-constitutional and illegal activities, and brought to light fraudulent and other illegal activity by the military-intelligence-industrial complex. WMR offers a resume service for individuals who are now seeking employment and offering their specialized training to potential employers. and from 2005:  More on Firstfruits. The organization partly involved in directing the National Security Agency program to collect intelligence on journalists -- Firstfruits -- is the Foreign Denial and Deception Committee (FDDC), a component of the National Intelligence Council. The last reported chairman of the inter-intelligence agency group was Dr. Larry Gershwin, the CIA's adviser on science and technology matters, a former national intelligence officer for strategic programs, and one of the primary promoters of the Iraqi disinformation con man and alcoholic who was code named "Curveball." Gershwin was also in charge of the biological weapons portfolio at the National Intelligence Council where he worked closely with John Bolton and the CIA's Alan Foley -- director of the CIA's Office of Weapons Intelligence, Nonproliferation, and Arms Control (WINPAC) -- and Frederick Fleitz -- who Foley sent from WINPAC to work in Bolton's State Department office -- in helping to cook Iraqi WMD "intelligence" on behalf of Vice President Dick Cheney and Scooter Libby. In addition to surveilling journalists who were writing about operations at NSA, Firstfruits particularly targeted State Department and CIA insiders who were leaking information about the "cooking" of pre-war WMD intelligence to particular journalists, including those at the New York Times, Washington Post, and CBS 60 Minutes.  full story
  • New York Times, FEMA got caught in fake news conference, John P. Philbin, fired two days before leaving  FEMA as public relations chief,  will now not work for  Michael McConnell,  televised news conference on California fires,  audience composed of agency staff, pretending to be reporters, easy questions, other search terms: R. David Paulison, Admiral Harvey E. Johnson, Russ Knocke, Katrina
  • Wikipedia: "Rex 84, short for Readiness Exercise 1984, was a plan by the United States federal government to test their ability to detain large numbers of American citizens in case of massive civil unrest or national emergency. Exercises similar to Rex 84 happen periodically. 1] Plans for roundups of persons in the United States in times of crisis are constructed during periods of increased political repression such as the Palmer Raids and the McCarthy Era. For example, from 1967 to 1971 the FBI kept a list of persons to be rounded up as subversive, dubbed the "ADEX" list. 2]  According to scholar Diana Reynolds: The Rex-84 Alpha Explan (Readiness Exercise 1984, Exercise Plan), otherwise known as a continuity of government plan], indicates that FEMA in association with 34 other federal civil departments and agencies conducted a civil readiness exercise during April 5-13, 1984. It was conducted in coordination and simultaneously with a Joint Chiefs exercise, Night Train 84, a worldwide military command post exercise (including Continental U.S. Forces or CONUS) based on multi-emergency scenarios operating both abroad and at home. In the combined exercise, Rex-84 Bravo, FEMA and DOD led the other federal agencies and departments, including the Central Intelligence Agency, the Secret Service, the Treasury, the Federal Bureau of Investigation, and the Veterans Administration through a gaming exercise to test military assistance in civil defense. The exercise anticipated civil disturbances, major demonstrations and strikes that would affect continuity of government and/or resource mobilization. To fight subversive activities, there was authorization for the military to implement government ordered movements of civilian populations at state and regional levels, the arrest of certain unidentified segments of the population, and the imposition of martial rule. 3] Existence of a master military contingency plan, "Garden Plot" and a similar earlier exercise, "Lantern Spike" were originally revealed by alternative journalist Ron Ridenhour, who summarized his findings in "Garden Plot and the New Action Army." 4]  Rex 84 was mentioned during the Iran-Contra Hearings in 1987, and subsequently reported on by the Miami Herald on July 5th, 1987. 5]A number of websites and alternative publications that span the political spectrum have hypothesized upon the basic material about Rex 84, and in many cases hyperbolized it into a form of urban legend or conspiracy theory. Nonetheless, the basic facts about Rex 84 and other contingency planning readiness exercises--and the potential threat they pose to civil liberties if fully implemented in a real operation--are taken seriously by scholars and civil liberties activists."  
  • WMR  March 20, 2008 -- Bush's secretive pal's airline connections to torture flight network  ...  The CIA's current network of CIA torture flight airlines and companies has its roots in the shadowy past network created by the CIA under George H, W. Bush's tutelage to secretly arm Iran's mullahs, support the Nicaraguan contras, and fly cocaine from Colombia to the United States during the 1980s. ... In the 1980s, much of the CIA's secret airline business centered around James R. Bath, George W. Bush's Texas Air National Guard friend who later represented the interests of the Bin Laden family in the United States. ... Bath's core airline in the CIA proprietary airline business was Skyways Aircraft Leasing, which was originally registered in 1980 in the Cayman Islands as Cotopax Investments. Skyways was linked to another Cayman firm, IC Inc., that was linked to Oliver North's illegal support network for the Nicaraguan contras code-named the "Enterprise."  full story
  • WMR  Bin Laden: Body buried at sea, shoddy proof of death more
  • McClatchy  Torture, 'War Council' ...  "The framework under which detainees were imprisoned for years without charges at Guantanamo and in many cases abused in Afghanistan wasn't the product of American military policy or the fault of a few rogue soldiers.  ...  It was largely the work of five White House, Pentagon and Justice Department lawyers who, following the orders of President Bush and Vice President Dick Cheney, reinterpreted or tossed out the U.S. and international laws that govern the treatment of prisoners in wartime, according to former U.S. defense and Bush administration officials.  ...   The Supreme Court now has struck down many of their legal interpretations. It ruled last Thursday (Jun 08) that preventing detainees from challenging their detention in federal courts was unconstitutional.  ...  The quintet of lawyers, who called themselves the “War Council," drafted legal opinions that circumvented the military's code of justice, the federal court system and America's international treaties in order to prevent anyone — from soldiers on the ground to the president — from being held accountable for activities that at other times have been considered war crimes." and search terms: Carl Levin, investigating origin of harsh interrogation techniques, not a 'few bad apples',  twisted law, international conventions, secret meetings, memorandums not public, Judge Advocate General, War Council members: David Addington, Alberto Gonzales, John Yoo, Timothy E. Flanigan, William J. Haynes II, ....  "Treaties that were relevant to U. S. criminal code were not relevant. That was the trick", circumvent the law, Geneva Conventions, Common Article Three forbidding humiliating and degrading treatment and torture didn't cover al Quida or Taliban, Military Commissions Act, Uniform Code of Military Justice, kangaroo court, JAG, Office of Legal Council, outside the courts, Navy warships, Yoo wanted Indian wars laws, due process is mumbo jumbo, presumed guilty if caught as a 'terrorist', 
  •  History Commons "Human rights groups claim that the US is operating “floating prisons” as detention facilities for prisoners taken in the “war on terror.” The groups claim that the US is keeping prisoners aboard ships such as the USS Ashland, the USS Bataan, and the USS Peleliu (see December 27, 2001), and say that the Americans refuse to admit to the existence of such detainees. The human rights group Reprieve has asked that the US list the names and whereabouts of such “ghost detainees” held aboard US vessels. The existence of the detainees has come to light from a number of sources, including statements from US military officials, information provided by the Council of Europe and other parliamentary bodies, and prisoner testimonies (see June 2, 2008). Details of Detentions - Reprieve says the US has used as many as 17 ships as “floating prisons” since 2001. While aboard, the prisoners are interrogated, then rendered to undisclosed locations. Fifteen of those ships may have operated around the British territory of Diego Garcia, which hosts a large British-American military base (see July 27, 1971-May 26, 1973 and After February 7, 2002). According to information obtained by Reprieve, in early 2007, the Ashland was involved in the detention and rendering of over 100 individuals abducted by Somali, Kenyan, and Ethiopian forces during an upsurge of fighting in Somalia, and then interrogated by FBI and CIA agents. Those individuals have now disappeared, but many are believed to be held in prisons in Kenya, Somalia, Ethiopia, Djibouti and Guantanamo Bay, among other possible sites. One prisoner released from Guantanamo has retold the account of a fellow inmate’s detention: “ H]e was in the cage next to me. He told me that there were about 50 other people on the ship. They were all closed off in the bottom of the ship. The prisoner commented to me that it was like something you see on TV. The people held on the ship were beaten even more severely than in Guantanamo.” Clive Stafford Smith, Reprieve’s legal director, says the US military “choose ships to try to keep their misconduct as far as possible from the prying eyes of the media and lawyers. We will eventually reunite these ghost prisoners with their legal rights.… By its own admission, the US government is currently detaining at least 26,000 people without trial in secret prisons, and information suggests up to 80,000 have been ‘through the system’ since 2001 (see November 17, 2005). The US government must show a commitment to rights and basic humanity by immediately revealing who these people are, where they are, and what has been done to them.” British Officials Ask for Accountability - Andrew Tyrie, the Conservative MP who chairs the all-party parliamentary group on extraordinary rendition, says both the US and British governments must own up to their practices of rendition and “ghost detainees.” “Little by little, the truth is coming out on extraordinary rendition,” he says. “The rest will come, in time. Better for governments to be candid now, rather than later. Greater transparency will provide increased confidence that President Bush’s departure from justice and the rule of law in the aftermath of September 11 is being reversed, and can help to win back the confidence of moderate Muslim communities, whose support is crucial in tackling dangerous extremism.” Tyrie has requested that an investigation into the use of Diego Garcia as a rendition refueling stop be undertaken (see June 2, 2008). Liberal Democrat MP Edward Davey adds: “If the Bush administration is using British territories to aid and abet illegal state abduction, it would amount to a huge breach of trust with the British government. Ministers must make absolutely clear that they would not support such illegal activity, either directly or indirectly.” A US Naval spokesman says that none of its vessels have “detention facilities,” but admits that some detainees had been put on ships “for a few days” during their initial days of detention. He refuses to comment on reports that US Naval vessels stationed in or near Diego Garcia had been used as “prison ships.” Guardian, 6/2/2008] Entity Tags: Council of Europe, Andrew Tyrie, Central Intelligence Agency, Clive Stafford Smith, Federal Bureau of Investigation, Edward Davey, Reprieve Timeline Tags: Torture in Iraq, Afghanistan and elsewhere"
 

 

FEMA    top             Fran Townsend, Whitewash?
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Katrina report:  "compiled by Stephen Henthorne, a former professor of the US Army's War College ..... and deputy-director in the Louisiana relief efforts.... the bulk of the Louisiana and Mississippi National Guard was deployed in Iraq,... endemic corruption"  were major causes to Katrina failures.  Common Dreams
  • Democracy Now search Chertoff, Kissinger, Argentina, 'dirty war'.
  • Talking Points Memo
  • Daily KOS
  • WayneMadsenReport "Details emerge of electronic surveillance system opposed by Ashcroft and Comey  ...  On March 10, 2004, White House Chief of Staff Andrew Card and then-White House Counsel Alberto Gonzales, over the objections of Janet Ashcroft and acting Attorney General James Comey, paid a bedside visit to Attorney General John Ashcroft while he was in the intensive card unit at George Washington Hospital recovering from surgery. According to Comey's testimony before the Senate Judiciary Committee, Janet Ashcroft received a phone call from a high White House official, likely President Bush himself, that Card and Gonzales were on the way to her husband's hospital room to get him to approve and sign a surveillance plan. Mrs. Ashcroft quickly alerted Comey.  ...  FBI Director Robert Mueller instructed FBI agents not to evict Comey from Ashcroft's room when he arrived to confront Card and Gonzales. Comey, with a full security motorcade, sirens wailing and lights a blazing, sped to George Washington hospital and told Card and Gonzales that the surveillance program instituted by the White House had been ruled illegal by the Justice Department. Card and Gonzales were adamant about continuing the surveillance. Ashcroft, who was barely conscious, lifted his head from his pillow and told Card and Gonzales that he agreed with his acting Attorney General on the illegality of the surveillance and that it did not really matter because Comey was the Attorney General. more search terms: Comey concerned with personal safety, Whitehouse, Solicitor General Ted Olson, 'Wednesday Night Massacre', mass resignation, March 2004, FEMA, domestic intelligence files, 1980, Reagan, William Webster, General Louis Giuffrida, American citizens, opposition to U. S. policies in Central America, Oliver North, REX-84, Readiness Exercise 1984, martial law, Attorney General William French Smith, Mount Pony in Culpepper, Virginia, warrantless surveillance of American citizens, Main Core database, National Security Agency, Freedom of Information Act, 
  • FEMA database, protesters, American citizens, NSA,  Reagan era cronie California National Guard commander Gen. Louis Giuffrida created list, Webster demanded he return all copies to FBI, but Oliver North had a copy and used it to develop a 'continuity of government' contingency plan, REX-84, Readiness Exercise 1984, martial law, round up citizens, William French Smith protested, all this tied to recent March 2004 confrontation of Andrew Card, Alberto Gonzales, Ashcroft and James Comey, in a hospital room, Bush wanted subversive database.  Madsen working on Texas Observer article, ADEX, Edwin Meese, McFarlane.   WayneMadsenReport
Military Commissions Act of 2006  (Bush Torture Law)   top
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Democracy Now search Chertoff, Kissinger, Argentina, 'dirty war'.
  • Feingold
  • MediaMonitors "The Act passed the House on September 29th with 96% of Republicans supporting and 83% of Democrats opposing legislation that allows American citizens to be labeled “enemy combatants,” incarcerated, and tortured. Senator Arlen Specter warned before he inexplicably voted for the bill that the Act would “take our civilization back 900 years.”
  • Zmag MCA 2006, Unchecked Powers
  • Balkin blog "Does Military Commissions Act apply to citizens?  Yes, and it's probably unconstitutional, and some applications are deeply troubling.
  • FOI, Missouri.edu Iran Contra
  • From the Wilderness "U.S. Government Targeting of American Dissidents"  ...  by Carolyn Baker, Ph. D.  history 
  • Jurist "The father of Australian Guantanamo Bay JURIST news archive] detainee David Hicks JURIST news archive] has said that Hicks' defense team will challenge the Military Commissions Act of 2006"
  • Military Commissions Act of 2006  exerpt: “LAWFUL ENEMY COMBATANT.-The term ‘lawful enemy combatant’ means an individual determined by or under the authority of the President or Secretary of Defense (whether on an  individualized or collective basis) to be: (i) a member of the regular forces of a State party engaged in hostilities against the United States or its 4 co-belligerents; (ii) a member of a militia, volunteer corps, or organized resistance movement belonging to a State party engaged in such hostilities, which are under responsible command, wear a fixed distinctive sign recognizable at a distance, carry their arms openly, and abide by the law of war; or (iii) a member of a regular armed forces who professes allegiance to a government engaged in such hostilities, but not recognized by the United States.  “SECRETARY.-The term ‘Secretary’means the Secretary of Defense. " UNLAWFUL ENEMY COMBATANT.-The term ‘unlawful enemy combatant’ means an individual determined by or under the authority of the President or the Secretary of Defense “(A) to be part of or affiliated with a force or organization-including but not limited to al Qaeda, the Taliban, any international terrorist organization, or associated forces-engaged in hostilities against the United States or its co-belligerents in violation of the law of war; “(B) to have committed a hostile act in aid of such a force or organization so engaged; or “(C) to have supported hostilities in aid of such a force or organization so engaged."   COULD THIS BE INTERPRETED TO INCLUDE ANTI-WAR PROTESTORS?  YES
  • But Ali Saleh Kahlah al-Marri is a U.S. resident being held in a South Carolina military brig; he is the only enemy combatant held on U.S. soil. That makes his case very different. ... Authorities say he was an al-Qaida sleeper agent living in middle America, researching poisonous gasses and plotting a cyberattack.  To justify holding him, the government claimed a broad interpretation of the president's wartime powers, one that goes beyond warrantless wiretapping or monitoring banking transactions. Government lawyers told federal judges that the president can send the military into any U.S. neighborhood, capture a citizen and hold him in prison without charge, indefinitely.
Negroponte Watch    top
PROGRESSIVE  REFERENCE CONSERVATIVE*
NewsFollowUp:  Iran Contra, Iraq War Connections     pages index
Chertoff Watch Martial Law   top
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • DOJ
  • Detroit News U.S. Attorney Jeffrey G. Collins ordered to review docs and ensure nothing held back, by U.S. District Judge Gerald E. Rosen.
  • FOI, Missouri.edu Iran Contra
  • search Chertoff, Kissinger, Nixon
  • Search web: Chertoff, BCCI, Bush, banking scandal
  • Free Republic
  • CIA, ghost detainees
  • Argentina believed it had U.S. approval for its assault on leftists. 1976,  Guzetti.  
  • National Security Archive.  
  • American Nationalist Union  links include: Council of Conservative Citizens, Heritage and Destiny, The Propaganda Matrix.  search Kissinger, Chertoff..  
  • DOJ
  • Sen Charles Grassley "Justice Dept has retaliated against prosecutors in a Detroit terror trial because they cooperated with Congress"
  • Chertoff, Michael    search: Israel, Carlyle Group, Iran Contra, Clinton impeachment, chief counsel Whitewater,  Zacarias Moussaoui, U.S. Patriot Act, Vincent Foster, 
  • Chertoff, Michael University Star more search terms:  ties to 9/11 financiers, Bergen County, New Jersey, Chertoff defended accused terrorist financier Dr Magdy Elamir.  Elamir,  Osama iin Laden, Operation Diamondback, FBI/ATF, Operation Green Quest, Title III, USA Patriot Act, Chertoff career path not ordinary.  
  • Liberty-Antigone poster:  "Just who these enemies might be is one of the scariest things about Rep. Harman’s singular focus on terror prevention. Much like predicting in advance who will become a criminal, predicting who among us might become a terrorist is a difficult task. Harman has taken to it aggressively, sponsoring a bill which sailed through the House last year called the “Violent Radicalization & Homegrown Terrorism Prevention Act of 2007“, ominously subtitled “to prevent homegrown terrorism, and for other purposes.” The act establishes a commission to hold hearings around the country and a “Center of Excellence” to study the findings on what might make individuals “born and raised” in the US tend towards violence in support of their ideological leanings, or “to advance political, religious, or social change.” The bill has earned the nickname “The Thought Crimes Bill” because of its Orwellian language and its focus on dissent as an indicator of potential violent radicalization. The RAND corporation, which has close ties to Rep. Harman and is rumored to have written the bill, has long studied this issue and identifies environmentalists and anti-globalization activists as target groups to watch for ideologically-based violence. ... Jane Harman is a “Blue Dog” Democrat who is reported to have once called herself “The best Republican in the Democratic Party.” She is a multi-millionaire (Harman/Kardon electronics) and a pro-war hawk who voted twice for the PATRIOT Act. She was in line to become the chair of the House Permanent Select Committee on Intelligence when the Democrats regained Congress in 2006 but was passed over by Speaker Nancy Pelosi when it was reported that Harman was under federal investigation for allegedly improper dealings with AIPAC lobbyists."
  • AP Dept Homeland Security, Chertoff, Guards say HQ building unsafe:  "For instance, when an envelope with suspicious powder was opened last fall at Homeland Security Department headquarters, guards said they watched in amazement as superiors carried it by the office of Secretary Michael Chertoff, took it outside and then shook it outside Chertoff's window without evacuating people nearby." 
  •  and click on pic for full size
  • CIA Rendition flights, tail number list pic, large file Valparaiso, Indymedia report on Amnesty International work
  • Anti-Imperialist "The SOA/WHINSEC is used by the U.S. government as a training ground for foreign military officers. Labeled by many as the "School of the Assassins," the school has produced thousands of officers subsequently linked with assassinations, "death squads," drug-trafficking, and human rights abuses in Latin America. Tens of thousands of military and police officials have trained at the school. Many of its graduating officers have become some of the most notorious leaders of death-squads and have been implicated in numerous war crimes, human rights abuses, and drug-trafficking. The school's official training manuals openly condone torture, blackmail, and assassination. A 1996 report by a U.S. government oversight board admitted that the school's "instruction materials.... condone practices such as executions of guerrillas, extortion, physical abuse, coercion and false imprisonment."
 
WMR  Bin Laden: Body buried at sea, shoddy proof of death -- another "Made in Hollywood" performance from "Ari Gold"  May 2-3, 2011 --
Years after Public Enemy Number One, Osama Bin Laden, was reportedly killed in the mountains of the Afghan-Pakistani border region or died from kidney failure in his native Hadhramaut region of Yemen, President Obama pulled the Bin Laden rabbit out of his political hat during a Sunday late-night television address, when many Americans were already watching the tube, thus increasing Obama's market share for his "surprise announcement." After all, Obama, who has close links to Oprah Winfrey and Rahm Emanuel's super-Hollywood agent brother, Ari Emanuel, depicted as the vile "Ari Gold" in fiction, is well-aware of TV Sunday prime time ratings.

So, in a few words, Obama announced that Bin Laden had been killed by a U.S. team that caught the wily Saudi Arabian terrorist mastermind by surprise. Bin Laden was not caught in a cave or some other underground facility in Waziristan but in a $1 million walled-off estate in Abbottabad, a military cantonment where a number of active and retired members of Pakistan's military and intelligence community lived. Abbottabad is also home to Pakistan's version of West Point, the Kakul Military Academy, where the firefight between U.S. Navy SEALS and Bin Laden's security guards allegedly took place a mere 800 meters away.

Up until the 1980s, the mountains around Abbottabad were dotted with small U.S. National Security Agency (NSA)/U.K. Government Communications Headquarters (GCHQ) listening posts in places like Bada Bier and Parachinar were used to eavesdrop on signals from the Soviet Union and China. It was a time period when Bin Laden was operating his mujaheddin forces in Afghanistan under the aegis of Pakistan's Inter-Services Intelligence (ISI) agency and its CIA overseers.

Abbottabad is also very familiar to the CIA and U.S. Special Forces, which operated from the nearby Kalabagh air force base, which has reportedly been used in the past by U.S. Special Operations forces, including U.S. Marines. Why Bin Laden would want to locate a massive safe house in the heart of Pakistani and American counter-insurgency and intelligence activity is curious.

Bin Laden's body was reported by the Pentagon to have been buried somewhere in the north Arabian Sea from the aircraft carrier, USS Carl Vinson. The Pentagon has assured the public that they confirmed Bin Laden's identity through DNA sampling and are "100 percent" certain that the body they buried in the sea was that of Bin Laden. The question remains as to where Bin Laden's comparative DNA samples were obtained over the past several years when the terrorist mastermind was supposedly a phantom-like fugitive.

However, the word from WMR sources at NSA is that no signals intercepts, from Pakistan or U.S. military sources, indicate that the man shot to death in Abbottabad was Osama Bin Laden. After the so-called killing of Bin Laden, operators were deluged with intercepted chatter about Bin Laden having been killed. However, not once did signals intercept operators, linguists and intelligence analysts based in Pakistan, Afghanistan, NSA headquarters at Fort Meade, Maryland, or on ships offshore -- who would have been cleared for and involved with the top secret mission to kill Bin Laden -- pick up any intelligence about Bin Laden prior to his reported assassination by the U.S. Special Forces "kill" team acting on the direct orders of President Obama.

George W. Bush and other neo-con leaders, like Obama, have often pulled the Bin Laden rabbit out of their hat, years after reports of the Al Qaeda leader's death in either thr Afghanistan-Pakistan border region or Yemen. On September 7, 2007, WMR reported: "'Osama bin Laden' supposedly appears in a new videotape with a dyed and trimmed beard and talking about Democratic control of Congress and the coming to power of Nicolas Sarkozy in France and Gordon Brown in Britain. 'Bin Laden' also refers to George W. Bush as the 'leader of Texas.' He also talks of the Democrats' failure to 'stop the war.' "Bin Laden,' who once recommended William Blum' s book 'Rogue State,' is back in the Book-of-the-Month Club business in plugging Noam Chomsky and ex-CIA 'Bin Laden Unit' chief Michael Scheuer. 'Bin Laden' also mentions 'neoconservatives' like Dick Cheney, Donald Rumsfeld, and Richard Pearl sic], meaning Richard Perle. He also refers to Colin Powell and Richard Armitage and 'their blood history of murdering humans.' Former British Prime Minister Tony Blair also gets honorable mention. 'Bin Laden' also states that President John Kennedy was killed and 'corporations were the primary beneficiary of his killing.' Days before a huge anti-war march in Washington, on September 15, Bin Laden states that carrying 'anti-war placards' in the streets is of no use. As if expecting that many people will view the tape as a fake, the neocon media and their usual 'sources' and 'experts' are already claiming that it is quite common for Arab mean to dye their beards to make themselves look younger."

On September 9, 2007, WMR reported on how "Al Qaeda" video and audiotapes are transmitted to the news media as authentic: "The so-called 'Osama Bin Laden tape' was not only transmitted via the auspices of the Search for International Terrorist Entities (SITE) Institute, a Washington, DC-based research institute with links to Israeli right-wing Likud elements, but U.S. intelligence officials are now claiming that large portions of the 'Bin Laden' speech were written by Los Angeles native Adam Gadahn, born Adam Pearlman, (aka Azzam the American), the number three man in charge of Al Qaeda, whose grandfather, Carl K. Pearlman, was a member of the board of the Anti Defamation League (ADL), an important component of the Israeli Lobby in the United States. Carl Pearlman, a prominent California urologist, was the chairman of the Orange County Bonds for Israel campaign and the United Jewish Welfare Fund. SITE and an Israeli intelligence front operation in Washington, MEMRI (the Middle East Media Research Institute), are closely linked. MEMRI has been responsible for mis-translating several speeches made by Iranian President Mahmoud Ahmadinejad. SITE's director is Rita Katz, an Iraq-born Jew who moved to Israel after her father was executed by Saddam Hussein's government for spying for the Mossad. She emigrated to the United States from Israel in 1997. Katz worked for the U.S. Treasury Department in its pursuit of Muslim charity funds in the United States in Operation Green Quest and as a consultant for the FBI. The main coordinator for Green Quest was the then-head of the Justice Department's Criminal Division, Michael Chertoff.

Not surprisingly, the Zawahiri tape ridiculing Obama was made available by the SITE Intelligence Group in Washington.

Our September 9, 2007 report continued: "The delivery of the latest 'Bin Laden' video was reported by the Associated Press as follows: 'the 30-minute video was obtained by the SITE Institute, a Washington-based group that monitors terrorist messages, and provided to the Associated Press.' In the past, Bin Laden videos were sent to Al Jazeera and other Arab media sources directly. The first news of the video's release came on the al-Sahab web site, where 'Al Qaeda' has previously posted messages. Last year, a leaked French intelligence report stated that Bin Laden died of typhoid fever in Pakistan. There are other reports that after the US attack on Afghanistan, Bin Laden was spirited out of Afghanistan to his native Hadhramaut region of Yemen, where he later died of kidney failure surrounded by his close and extended family members. Bin Laden's post-9/11 presence in Hadhramaut was hinted to by reputable Israeli intelligence sources in discussions with this editor in 2002. The speed at which the corporate media accepted the obviously bogus 'Bin Laden makeover' tape is amazing. However, considering the links between the neocon disinformation machinery in Washington, DC and the corporate media, it may not be so surprising when put into context."

After years of lies from the U.S. government about Saddam Hussein's non-existent weapons of mass destruction, including "intelligence" about mobile biological weapons trailers from a known fraudster code named "Curveball"; bogus Niger documents on Iraq's possession of yellow cake uranium; bogus Iraq Oil Ministry documents on Iraqi payoffs to Western political leaders under the UN's Oil-for-Food program; and, more recently, false charges from Obama's ambassador to the UN that Muammar Qaddafi's troops in Libya were ingesting Viagra tablets before raping women, the public should be wary of a president who shows every tendency to lie as much as his three immediate predecessors: Bush II, Clinton, and Bush I. The White House is, perhaps, the greatest source of lies and disinformation in the world today, topping anything similar that may emanate from Pyongyang or Tripoli. There is no reason for any sane person to believe that anything Mr. Obama says is true. But Obama's supporters wasted no time in proclaiming that Bin Laden's killing ensures Obama's re-election next year.

 

Israel   top
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Israeli spies: Rosen, Stev; Weissman, Keith; Kadish, Ben-ami; Pollard, Jonathan; Israeli Art Students; Berger, Sandy; 
Bioport, Vaccinations, Court Martial    top
PROGRESSIVE  REFERENCE CONSERVATIVE*
supporting details, Bioport court martial, refuse vaccine  
  • Bioport, Carlyle, anthrax
  • Cipro
  • FDA gives BioPort ok to use quarantined anthrax vaccine on public
  • BioPort timeline
  • Maj. Glenn MacDonald USAR, sold Sadam Hussein anthrax warfare tech
  • Fuad El-Hibril, close to Bin Laden, was CEO of BioPort
  • El-Hibril operated a vaccine manf co. in England in 90's. Porton Products International, UK.
  • U.S. attack anthrax named Porton strain??
  • Sept 98, BioPort gets $45 million contract for vaccine.
  • Nov 98, Crowe & Bush sr. meet with Bin Laden
  • BioPort fails inspections, sterility tests, Bush jr oks vaccine use.
  • Hollister-Stier Labs subcontract vaccine 
  • Only forces not to get any Gulf War Syndrome were French, who did not get Porton vaccine.
  • BioPort fired, used Enron bookeeping tactics.
  • all these links above
  • Aug 2001, Whitehouse gets Cipro
  • Battelle Memorial Institute, Operation Jefferson, develops anthrax strain.  Hires William C. Patrick III to weaponize thru postal syst.  Battelle involved with BioPort
  • BioPort manuals found in caves in Afghanistan
  • Bush oks BioPort vaccine Jan 2002
  • Institute of Medicine says vaccine ok.  
  • Aug 2002, Timothy Read says anthrax from attack can be differentiated, arrests Stephen Hatfill, but all fake out.
  • American Free Press, see anthrax article.
  • Anthrax Vaccination Immunization Program Army cover-up, search court martial
  • Canadian Military drops court martial
  • FAS search
  • Gulf War Vets Anthrax vaccine deaths info, court martial
  • MajorBates.com refused anthrax vaccine. LINKS, last updated 2002
  • Mercola search, soldiers illnesses
  • Military Corruption.com anthrax vaccine info, court martial
  • Dr. Buck, 1st to be court martialled for refusing vaccine.
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. 2] 3] 4] 5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture. 6]
  • Acambis
  • Asa Hutchinson, Dept of Homeland Security, Israel links, from Clinton impeachment demonizing efforts by conservatives
  • BioPort anthrax vaccine manufacturer
  • National Guard, in Natural Disaster?..."The review advocated more disaster-relief training and equipping of the National Guard, who are part-time troops under the command of state governors but can also be mobilized by the Pentagon in times of emergency.  "In truly catastrophic events state and locals may be incapacitated or overwhelmed or even worse," Townsend said.  "It may be that our military is the last and only resort. We need to plan and prepare for the Department of Defense to play a significant supporting role during future catastrophic events," she said Townsend said the "bright lines" should be preserved, referring to an 1878 law, The Posse Comitatus Act, which restricts the government from using the military in a law enforcement capacity within the United States. But the president can waive the law in an emergency.  The National Guard can support law enforcement functions in a way active duty military do not, Townsend said. "So you can preserve the bright lines and not seek additional authorities."  A change in law was not required for deploying military forces to help in disasters, she said. "We did not believe the president needed additional authority."
 
Guantanamo, Abu Ghraib, sexual torture top   
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Alternet search, Guantanamo
  • Amnesty International, UK Guantanamo Bay, latest news, releases
  • On July 11, 1990, Gary Caradori was killed along with his 6-year old son in the crash of his small plane, after a mid-air explosion, the cause of which was never discovered. He had told friends repeatedly in the weeks before his death that he was afraid his plane would be sabotaged. GeorgeWalkerBush, death list
  • Center for Constitutional Rights, watching the events of Guantanamo, detainees, Supreme Court decisions.
  • Center for Defense Information arms trade, children in war, missile defense info
  • Cooperative Research, Stephen Cambone, ritualistic sexual abuse
  • CounterPunch, "Secret World of Stephen Cambone ... 
  • FAS search National Intelligence estimate
  • Global Policy Watching Guantanamo
  • Guantanamobile Project
  • Here-Now, Supreme Court decision on Guantanamo  and related stories. Boston NPR News Source
  • Human Rights Watch
  • Insider Magazine, Wayne Madsen article, Expose the Christian Mafia
  • Karpinski, Janus, 
  • Ladlass, search: Boykin, Cambone, Nebraska, BSCT, sexual torture
  • News from Russia  Pravda, Israel, search
  • New Yorker, Seymour Hersh, May 2004, 
  • New Yorker, Jane Mayer, article: 'The Experiment', techniques of sexual and religious  humiliation of prisoners, developed by military behavioral scientists
  • Palast, Greg, UK  Guantanamo search.
  • Slate "Name: Mild, non-injurious physical contact, e.g. grabbing, poking, or light pushing (aka "a little bit of smacky face") Source: Decision Memorandum from Defense Department General Counsel William Haynes II to Secretary of Defense Donald Rumsfeld, for commander, U.S. Southern Command, Dec. 2, 2002
  • SourceWatch (Center for Media and Democracy) David S. Addington,"Rumsfeld to Cheney to-Addington-to-Torture Lawrence Wilkerson, former chief of staff to Secretary of State Colin L. Powell, told NPR November 3, 2005, that "he had uncovered a 'visible audit trail' tracing the practice of prisoner abuse by U.S. soldiers directly back to Vice President Cheney's office
  • SourceWatch, Boykin
  • The7thfire, Zionism, Zionists support of torture, Abu Ghraib "The most vitriolic systematic denigration of Arabs and Muslims in the Middle East is found in the writings an speeches of influential US-based Zionist ideologues, like the Pipes (father and son), the Kristols (senior and junior), the Kagans, Cohens, Goldhagens, ..."
  • Truthout BSCT, Behavioral Science Consultation Teams,
  • Veterans for Common Sense, Abu Ghraib, Rumsfeld
  • Yurica Report Guantanamo Bay
  • WSWS Lt. Gen. William Boykin, prisoner sexual abuse.   MORE below      WSWS
  • Discourse.net CIA, Pentagon inquiry
  • EIR search terms: spoon-benders, rape, sodomy, murder, deliberate systematic policy, first tried in Guantanamo, links to Presidio and Offutt Franklin Scandal, naked prisoners being forced  into sexual acts with one another, 'Darby photos', incite increased  terrorist recruitment, humiliate Muslims, young boys sodomized, at Abu Ghraib, Maj. Gen. Geoffrey Miller, Lt. Gen. William Boykin, Muslim-hating, Behavioral Science Consultation Teams, BSCT, SERE, sexual embarrassment, religious dilemma, desecration of the Bible, Koran, Undersecretary of Intelligence Stephen Cambone, Boykin is assistant, Task Force 20, Gitmo-ize Iraq, JFK Special Warfare School, 
  •  
  • Fay Report
  • Flocco, Cambone TopSecretNotes
  • Findlaw, War on Terrorism Special coverage
  • Griggs, Kay "Kay, a self-declared Christian, became privy to the real workings of the United States military, leadership training, drug-running and weapons sales, and the secret worldwide camps that train professional assassins."
  • Guantanamo.com from World News
  • International Relations and Security Network, Swiss Contribution to the Partnership for Peace
  • Intellibriefs, Mindwars, Boykin, Somalia, intelligence
  • International Committee of the Red Cross, why did they wait months to report Iraq prison abuse.
  • Newstrove, Guantanamo Bay
  • Human Rights First, formerly Lawyers Committee for Human Rights
  • Justice, Dept of  press releases  
  • Judicial Watch  
  • PBS "SCOTT HORTON: Well, I think there is a direct line that run from Secretary Rumsfeld to Abu Ghraib and that runs through Maj. Gen. Miller. I think the major unanswered questions have to do with what led the secretary to decide to send Maj. Gen. Miller there. What is the role of Lt. Gen. Boykin and Steve Cambone in that process and why did that visit have the consequences we saw, not just in Abu Ghraib but also in other facilities in terms of violent treatment of detainees and use of sexual humiliation and military dogs?"
  •  
  • Taguba Report, SourceWatch
  • Tearerism, that concept of tearing down the phrase ' war on terror',  it has started in Great Britain.
  • Wikipedia, Abu Ghraib, sexual abuse, search terms: 2004, torture, Iraq, Baghdad Correctional Facility, 372nd Military Police, Taguba Report, 90% of the prisoners were innocent of any crime, 
  • Wikipedia Stephen Cambone, Germany, war crimes MORE
  • World Court, International Court of Justice
  • Gannon, Guckert, spent many nights in the White House,  ... visits when no news briefings, many with no record of entry or exit YouTube  How does this relate to Congress, Clergy, military sex scandals? Insider Magazine, Wayne Madsen Gannongate
  • American Center for Law and Justice search
  • American Conservative Union 
  • Anti Terrorism Coalition, Islam is taking over the world Action Alert help ACU lobby Congress on these issues  
  • Boykin, William Lt. Gen. ... said God put George Bush in the White House, 
  • Cambone, Stephen, Clairemont Graduate School, notes: undersecretary of defense for intelligence, Rumsfeld's chief henchmen, neo-con, PNAC, Wolfowitz, Germany, war crimes prosecution, Feith, Douglas, Stephen Cambone, Office of Analysis and Evaluation, threat to Generals, "Gray Fox", assassinations, circumvent Geneva Conventions, soften up Iraqi prisoners, interrogators, private contractors, Camp Cropper, Baghdad, Delta Force, abusive interrogations, Boykin, Christian warrior, Oregon revival tour, "a war against Satan", Christian God is mightier than Allah", Islamophobe, central role in torture scandal, General Miller, Col, Pappas, Israeli advice,
  • Council on Foreign Relations  corporate power to rural poor Republicans
  • Counter-Intelligence Field Activity, Stephen Cambone,
  • CSIS, Center for Strategic and International Studies, Stephen Cambone
  • Defense Security Service, controlled by Stephen Cambone
  • Debka File search
  • Defense Intelligence Agency, controlled by Stephen Cambone, 
  • EthicsDaily "Controversial Christian General Named in Prisoner-Abuse Scandal .. "
  • Global Security Guantanamo Bay, Camp X-Ray.
  • GospelGrace, Kay Griggs "Colonel's Wife Names Names In Military Homosexual Pedophile Underground ...Fags have a 3 point agenda: 1) decriminalize sodomy, 2) add fags to the protected classes as victims like blacks, and 3) criminalize Gospel preaching against fags.
  • Guantanamo Bay Naval Station official site.
  • Israeli Minister of Foreign Affairs
  • Military Religious Freedom Foundation, Cambone, Boykin
  • National Imagery and Mapping Agency, controlled by Stephen Cambone
  • National Reconnaisance Organization, controlled by Stephen Cambone,  
  • National Review search on Guantanamo Bay, Rich Lowry
  • National Security Agency, controlled by Stephen Cambone,
  • National Security Agency, Stephen Cambone
  • Southern Baptist Convention, Bobby Welch, defends Boykin EthicsDaily  and sex offender registry EthicsDaily
  • Townhall search
  • US Army Criminal Investigation Command, UCMJ,
  • Washington Institute for Near East Policy US
  • Washington Post
  • Washington Post "Interrogators at the U.S. detention facility at Guantanamo Bay, Cuba, forced a stubborn detainee to wear women's underwear on his head ... The report shows that they were used on Qahtani several months before the United States invaded Iraq.  The investigation also supports the idea that soldiers believed that placing hoods on detainees, forcing them to appear nude in front of women and sexually humiliating them were approved interrogation techniques for use on detainees. "
  • SourceWatch,"'The idea was to get a handle on what worked in Cuba and to apply it to Iraq,"
  • WSWS "On September 16, Jonathan Idema was convicted in Afghanistan on counts of torture and other crimes. Idema was arrested after Afghan police found eight men tied up or hanging in his private prison in Kabul. Idema, a former member of the Special Forces, has claimed that he was acting at the behest of sections of the CIA and the Defense Department, including Deputy Undersecretary of Defense for Intelligence William Boykin. Idema claims that he was left out to dry after his case became politically problematic for the administration. The Afghan judge refused to consider evidence of high-level American support for the operation."
  • Hidden Mysterious Soon afterwards, Boykin’s Pentagon intelligence group was discovered to have been involved with the torture and sexual molestation of prisoners in Iraq, Afghanistan, and Guantanamo Bay, Cuba. The sexual molestation of prisoners included male and female teens being held in Iraq. Also of note is the current head executive director of the OCF. He is retired Lt. Gen. Bruce Fister, the former head of the U.S. Air Force Special Operations Command.
  • Center for Constitutional Rights  "CCR TO FILE WAR CRIMES COMPLAINT AGAINST DONALD RUMSFELD  Opinions and Documents Background Brief on the Case Against Donald Rumsfeld (PDF) 177KB    Synopsis: On November 14, 2006, CCR will file a criminal complaint against former Secretary of Defense Donald Rumsfeld in German Court. The complaint requests the German Federal Prosecutor open an investigation and, ultimately, a criminal prosecution that will look into the responsibility of high-ranking U.S. officials for authorizing war crimes in the context of the so-called "War on Terror." Former White House Counsel (and current Attorney General) Alberto Gonzalez, former Director of Central Intelligence George Tenet, and other high-ranking U.S. officials are also charged in the complaint. The complaint is brought on behalf of 12 torture victims – 11 Iraqi citizens who were held at Abu Ghraib prison and one Guantánamo detainee – and is being filed by the Center for Constitutional Rights (CCR), the International Federation for Human Rights (FIDH), the Republican Attorneys' Association (RAV) and others, all represented by Berlin Attorney Wolfgang Kaleck. The complaint is related to a 2004 complaint that was dismissed, but the new complaint is filed with substantial new evidence, new defendants and plaintiffs, a new German Federal Prosecutor and, most important, under new circumstances that include the resignation of Donald Rumsfeld as Secretary of Defense and the passage of the Military Commissions Act of 2006 in the U.S. granting officials retroactive immunity from prosecution for war crimes. For full background on the complaint, please see the attached briefing paper."
  • Wikipedia "On 10 November 2006, the German Federal Government announced that it had decided, within the legal framework of universal jurisdiction, to permit the war crimes prosecution of Stephen A. Cambone for his alleged role in condoning the abuse of prisoners in Abu Ghraib prison during his tenure from 2001 to 2003 as U.S. Undersecretary of Defense for Intelligence."
  • WayneMadsenReport "Blackwater was founded in 1997 by Erik Prince, a former US Navy SEAL and right-wing fundamentalist Christian from Michigan. Prince's father is Edgard Prince, who founded the Family Research Council with Gary Bauer. Erik Prince's sister is Betty DeVos, who is married to Dick DeVos, the son of Amway co-founder and Mormon bigwig Richard DeVos. The General Counsel for Erik Prince's Blackwater parent company, the Prince Group, is Joseph Schmitz, the Pentagon's former Inspector General. Schmitz's brother, John Schmitz, Jr. deputy counsel to George H. W. Bush and who is married to the sister of Columba Bush, Jeb Bush's wife. The father of John and Joseph was extreme right-wing Republican Congressman John Schmitz, Sr. Their sister is Mary Kay Letourneau, a former Washington State schoolteacher jailed for having sex with a thirteen year old American Samoan student who she later married."
  • MSNBC GUANTANAMO BAY, Cuba - The Defense Department's former chief prosecutor for terrorism cases appeared Monday at the controversial U.S. detention facility here to argue on behalf of a terrorism suspect that the military justice system has been corrupted by politics and inappropriate influence from senior Pentagon officials. Sitting just feet from the courtroom table where he had once planned to make cases against military detainees, Air Force Col. Morris Davis instead took the witness stand to declare under oath that he felt undue pressure to hurry cases along so that the Bush administration could claim before political elections that the system was working.  His testimony in a small, windowless room -- as a witness for Salim Ahmed Hamdan, an alleged driver for Osama bin Laden -- offered a harsh insider's critique of how senior political officials have allegedly influenced the system created to try suspected terrorists outside existing military and civilian courts."
  • USA Today An Iraqi man who says he was tortured while detained at the Abu Ghraib prison is suing two U.S. military contractors. Emad al-Janabi claims in a federal lawsuit filed Monday in Los Angeles that he was abused for 10 months beginning in September 2003 by employees of CACI International Inc. and L-3 Communications, formerly Titan Corp. Al-Janabi says his jailers punched him, slammed him into walls, hung him from a bed frame and kept him naked and handcuffed in his cell. He claims contractors conspired to cover up the torture by destroying documents and other information. Pictures of prisoner abuse by U.S. soldiers at Abu Ghraib ignited international outrage.
Secret Prisons for 'Terrorists',  Rendition   top
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Amnesty International
  • Democracy Rising "Congressman Edward J. Markey (D-MA) has taken the lead on working toward ending torture by U.S. officials or by "rendition" of suspects to foreign governments for torture there.  He has introduced, along with 48 colleauges, H.R. 952 the Torture Outsourcing Prevention Act
  • Eurolegal Services International institutions, news, comment, Middle East affairs, Iraq Body Count, Iraqi resistance to occupation.  
  • FAS search National Intelligence estimate
  • FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW
  • Glasgow Media Group promote new research methodologies on the media
  • Global Policy Watching Guantanamo
  • Global Witness International 
  • Notes: Shannon Airport, Ireland, rendition flights,  March 2008, also Norway Hungary, Iceland, Gulfstream IV jet, N475LC, N478GS,  see also Tel Aviv, Bucharest, Stuttgart, Tbilisi Georgia, Glasgow, see also N71PG, N54PA Lear jets, 
  • Secret prisons, prison ships, planes, Italy, kidnapping.
  • CBS News Extraordinary Rendition..."the government policy wherein terror suspects are transferred from U.S. control into the control of foreign governments, so that interrogation methods that are not permitted under U.S. law may be applied to the suspects"
  • CBS The CIA ran secret prisons in Poland and Romania from 2003 to 2005 to interrogate detainees in its war on terror, Council of Europe investigator Dick Marty said in a report released Friday.
  • Council of Europe   see below
  • Findlaw, War on Terrorism Special coverage
  • Griggs, Kay "Kay, a self-declared Christian, became privy to the real workings of the United States military, leadership training, drug-running and weapons sales, and the secret worldwide camps that train professional assassins."
  • Guardian: "Al-Libi, the New York Times claims, had been subjected to such rendition when he told his interrogators that Iraq had trained al-Qaida in the use of chemical and biological weapons. An assessment from the US Defence Intelligence Agency cast doubt on the claims because of the conditions of his captivity, according to both Mr Wilkerson and the New York Times's sources. Mr Wilkerson told the BBC the assessment was made before Mr Powell made his now discredited claims to the UN security council on contacts between Saddam Hussein and al-Qaida, but neither the then secretary of state or his office were told of it. Before the Iraq war, George Bush, Dick Cheney and Mr Powell frequently cited Mr Libi's statement as "credible evidence" that Iraq was training al-Qaida. If correct, the claims would suggest that rendition and the reliance on third country interrogations had played a role in the unreliability of intelligence before the March 2003 invasion of Iraq by US-led coalition.
  •  Andrews Air Force Base, rendition flights,  
  • Braxton Management Services, purported CIA front 
  •  International Criminal Court Protection
  • New York Times : Bush: Iraq War prisoners not entitled to Geneva Convention rules
  • Anti Terrorism Coalition, Islam is taking over the world Action Alert help ACU lobby Congress on these issues  
  • Council on Foreign Relations  corporate power to rural poor Republicans
  • Debka File search
  • Global Security Guantanamo Bay, Camp X-Ray.
  • Godman Army Air Field, Kentucky, rendition flights, 
  • GospelGrace, Kay Griggs "Colonel's Wife Names Names In Military Homosexual Pedophile Underground ...Fags have a 3 point agenda: 1) decriminalize sodomy, 2) add fags to the protected classes as victims like blacks, and 3) criminalize Gospel preaching against fags.
  • Guantanamo Bay Naval Station official site.
  • Israeli Minister of Foreign Affairs
  • National Review search on Guantanamo Bay, Rich Lowry
  • Phoenix Air Group, Inc, Cartersville, Georgia, 
  • VPC Planes, Wilmington, Delaware, 
 
  • Council of Europe   "Swiss Senator Dick Marty, Council of Europe Parliamentary Assembly rapporteur, will present his report on alleged secret detentions and unlawful inter-state transfers involving Council of Europe member states to the Committee on Legal Affairs and Human Rights in Paris on Wednesday 7 June.  The report is scheduled for debate during the plenary session of the 630-members-strong Parliamentary Assembly in Strasbourg on Tuesday 27 June 2006.
  • The Council of Europe's action follows allegations revealed by the Washington Post and the NGO Human Rights Watch in 2005 about the existence of secret CIA detention centres in Council of Europe member states. On 1 November 2005, the Parliamentary Assembly launched an investigation for which Swiss Senator Dick Marty was appointed rapporteur. On 21 November 2005, the Secretary General, Mr Terry Davis, acting under Article 52 of the European Convention on Human Rights (see box), sent a questionnaire to the 45 States Parties to this convention (the 46th letter was sent to Monaco on 15 December following that country's ratification of the convention). On 15 December 2005, the Parliamentary Assembly requested an opinion from the Venice Commission on the legality of secret detention in the light of the member states' international legal obligations, particularly under the European Convention on Human Rights.  On 1 March 2006, the Secretary General released his report based on the official replies from all 46 member states. Report of the Secretary General Addendum to the report of the Secretary General Statement Speaking notes  On 22 March 2006, the Venice Commission published its opinion on the international legal obligations of Council of Europe member states in respect of secret detention facilities and inter-state transport of prisoners. Venice Commission opinion  "
  • Age, The -- RAAF, The Royal Australian Air Force (RAAF) allegedly asked a woman to cover up the fact her children (aged eight and 12)  were sexually assaulted by a senior officer --- Wing Commander Terry Morgan.--- Fairfax newspaper.  ... Morgan was convicted  of four counts of indecent acts on a child under 16, and possession of child pornography ... attempted cover-up didn't work.
  • WMR "The so-called "Australian Taliban," David Hicks, the Adelaide-born horse trader and kangaroo skinner imprisoned by the U.S. military for the past five years in Guantanamo Bay, Cuba after being picked up by U.S. forces in Afghanistan, was flown to Australia from Guantanamo on a CIA rendition aircraft with an interesting history.  The Gulfstream Aerospace G550 that flew Hicks to Australia is registered to Time Works Leasing LLC, 223 Industrial Avenue, Teterboro, New Jersey. Time Works Leasing is being reported in some Australian media as a CIA front company. The Gulfstream's current tail number is N90AM. Previously, the plane's U.S. tail number was N592GA and it was transferred from Raven Acquisition Technologies of Washington state to Time Works on January 31, 2001. The plane has also been registered as tail number VP-CI, a Cayman Islands registration. However, FAA records indicate that the Gulfstream was transferred to the Caymans on April 5, 2006.
  • WMR "On May 22, WMR reported on the Gulfstream Aerospace G550 (Tail Number N90AM) that flew "Australian Taliban" David Hicks to Australia from incarceration in Guantanamo Bay, Cuba. The Gulfstream's travel itinerary over the past 7 years closely matches those of other CIA rendition aircraft.  A Securities and Exchange Commission EDGAR database search reveals that the actual owner of N90AM is ProFlite LLC, an air charter company that is a Delaware limited liability company. ProFlite's principal place of business is 233 Industrial Avenue, Teterboro, New Jersey, the same address listed in FAA records for Time Works LLC. ProFlite's SEC filings also reveal that N90AM has been leased to Monster Worldwide, Inc., a Delaware corporation having its principal place of business at 622 Third Avenue, New York, New York, 10017.  A search of the New Jersey State Business Gateway Services reveals that Time Works LLC is a Foreign Limited Liability Corporation whose home jurisdiction is Delaware. Time Works' corporation filing papers were submitted on December 21, 2000 and its last annual report was filed on December 16, 2005. The corporation's status is "Active." There are two other entities listed in New Jersey's business registration database but they are spelled "Timeworks."  Time Works LLC's President is listed as Christopher Cummings of 222 N.E. Monroe Street, 8th Floor, Peoria, Illinois 61602. Listed under Officers/Directors/Members is Jeffrey Corron of the same Peoria address. Cummings and Corron are also listed as officers of the Marquette Group, a marketing group with offices at 222 N.E. Monroe Street, 8th Floor, Peoria, IL 61602.  Corron is listed as a contributor to the Bush-Cheney 2004 primary campaign under CFO, "Market Group," 222 N.E. Monroe St., Peoria, IL 61602."  
Israeli Spy List 
Pollard is hardly the only Israeli spy operating in the United States. He just had the misfortune to get caught. Here are just a few examples of the Israeli spy operations that have been detected.

1947. Information collected by the ADL in its spy operations on US citizens is used by the House Select Committee on Unamerican Activities. Subcommittee Chair Clare Hoffman dismisses the ADL’s reports on suspected communists as “hearsay."

1950 John Davitt, former chief of the Justice Department's internal security section notes that the Israeli intelligence service is the second most active in the United States after the Soviets.

1954 A hidden microphone planted by the Israelis is discovered in the Office of the US Ambassador in Tel Aviv.

1956 Telephone taps are found connected to two telephones in the residence of the US military attaché in Tel Aviv.

1954 "The Lavon Affair". Israeli agents recruit Egyptian citizens of Jewish descent to bomb Western targets in Egypt, and plant evidence to frame Arabs, in an apparent attempt to upset US-Egyptian relations. Israeli defense minister Pinchas Lavon is eventually removed from office, though many think real responsibility lay with David Ben-Gurion.

1965 Israel apparently illegally obtains enriched uranium from NUMEC Corporation. (Washington Post, 6/5/86, Charles R. Babcock, "US an Intelligence Target of the Israelis, Officials Say.")

1967 Israel attacks the USS Liberty, an intelligence gathering vessel flying a US flag, killing 34 crew members. See "Assault on the Liberty," by James M. Ennes, Jr. (Random House). In 2004, Captain Ward Boston, Senior Legal Counsel for the Navy’s Court of Inquiry into the attack swears under oath that President Lyndon Johnson ordered the investigation to conclude accident, even though the evidence indicates the attack was deliberate. Given the use by Israel of unmarked boats and planes, and the machine-gunning of USS Liberty’s lifeboats, the most likely explanation is that USS Liberty was to be sunk with all hands, with evidence left to frame Egypt for the sinking. This would have dragged the US into the war on Israel’s side.

1970 While working for Senator Henry “Scoop” Jackson, Richard Perle is caught by the FBI giving classified information to Israel. Nothing is done.

1978, Stephen Bryen, then a Senate Foreign Relations Committee staffer, is overheard in a DC hotel offering confidential documents to top Israeli military officials. Bryen obtains a lawyer, Nathan Lewin, and the case heads for the grand jury, but is mysteriously dropped. Bryen later goes to work for Richard Perle.

1979 Shin Beth the Israeli internal security agency] tries to penetrate the US Consulate General in Jerusalem through a “Honey Trap”, using a clerical employee who was having an affair with a Jerusalem girl.

1985 The New York Times reports the FBI is aware of at least a dozen incidents in which American officials transferred classified information to the Israelis, quoting former Assistant Director of the F.B.I.] Mr. Raymond] Wannal. The Justice Department does not prosecute.

1985 Richard Smyth, the owner of MILCO, is indicted on charges of smuggling nuclear timing devices to Israel (Washington Post, 10/31/86).

1987 April 24 Wall Street Journal headline: "Role of Israel in Iran-Contra Scandal Won't be Explored in Detail by Panels"

1992 The Wall Street Journal reports that Israeli agents apparently tried to steal Recon Optical Inc's top-secret airborne spy-camera system.

1992 Stephen Bryen, caught offering confidential documents to Israel in 1978, is serving on board of the pro-Israeli Jewish Institute for National Security Affairs while continuing as a paid consultant -- with security clearance -- on exports of sensitive US technology.

1992 "The Samson Option," by Seymour M. Hersh reports, “Illicitly obtained intelligence was flying so voluminously from LAKAM into Israeli intelligence that a special code name, JUMBO, was added to the security markings already on the documents. There were strict orders, Ari Ben-Menashe recalled: "Anything marked JUMBO was not supposed to be discussed with your American counterparts."

1993. The ADL is caught operating a massive spying operation on critics of Israel, Arab-Americans, the San Francisco Labor Council, ILWU Local 10, Oakland Educational Association, NAACP, Irish Northern Aid, International Indian Treaty Council, the Asian Law Caucus and the San Francisco police. Data collected was sent to Israel and in some cases to South Africa. Pressure from Jewish organizations forces the city to drop the criminal case, but the ADL settles a civil lawsuit for an undisclosed sum of cash.

1995 The Defense Investigative Service circulates a memo warning US military contractors that "Israel aggressively collects US] military and industrial technology." The report stated that Israel obtains information using "ethnic targeting, financial aggrandizement, and identification and exploitation of individual frailties" of US citizens.

1996 A General Accounting Office report "Defense Industrial Security: Weaknesses in US Security Arrangements With Foreign-Owned Defense Contractors" found that according to intelligence sources "Country A" (identified by intelligence sources as Israel, Washington Times, 2/22/96) "conducts the most aggressive espionage operation against the United States of any US ally." The Jerusalem Post (8/30/96) quoted the report, "Classified military information and sensitive military technologies are high-priority targets for the intelligence agencies of this country." The report described "An espionage operation run by the intelligence organization responsible for collecting scientific and technologic information for Israel] paid a US government employee to obtain US classified military intelligence documents." The Washington Report on Middle East Affairs (Shawn L. Twing, April 1996) noted that this was "a reference to the 1985 arrest of Jonathan Pollard, a civilian US naval intelligence analyst who provided Israel's LAKAM Office of Special Tasks] espionage agency an estimated 800,000 pages of classified US intelligence information."

The GAO report also noted that "Several citizens of Israel] were caught in the United States stealing sensitive technology used in manufacturing artillery gun tubes."

1996 An Office of Naval Intelligence document, "Worldwide Challenges to Naval Strike Warfare" reported that "US technology has been acquired by China] through Israel in the form of the Lavi fighter and possibly SAM surface-to-air] missile technology." Jane's Defense Weekly (2/28/96) noted that "until now, the intelligence community has not openly confirmed the transfer of US technology via Israel] to China." The report noted that this "represents a dramatic step forward for Chinese military aviation." (Flight International, 3/13/96)

1997 An Army mechanical engineer, David A. Tenenbaum, "inadvertently" gives classified military information on missile systems and armored vehicles to Israeli officials (New York Times, 2/20/97).

1997 The Washington Post reports US intelligence has intercepted a conversation in which two Israeli officials had discussed the possibility of getting a confidential letter that then-Secretary of State Warren Christopher had written to Palestinian leader Yasir Arafat. One of the Israelis, identified only as “Dov”, had commented that they may get the letter from "Mega”, the code name for Israel’s top agent inside the United States.

1997 US ambassador to Israel, Martin Indyk, complains privately to the Israeli government about heavy-handed surveillance by Israeli intelligence agents.

1997 Israeli agents place a tap on Monica Lewinsky’s phone at the Watergate and record phone sex sessions between her and President Bill Clinton. The Ken Starr report confirms that Clinton warned Lewinsky their conversations were being taped and ended the affair. At the same time, the FBI’s hunt for “Mega” is called off.

2001 It is discovered that US drug agents’ communications have been penetrated. Suspicion falls on two companies, AMDOCS and Comverse Infosys, both owned by Israelis. AMDOCS generates billing data for most US phone companies and is able to provide detailed logs of who is talking to whom. Comverse Infosys builds the tapping equipment used by law enforcement to eavesdrop on all American telephone calls, but suspicion forms that Comverse, which gets half of its research and development budget from the Israeli government, has built a back door into the system that is being exploited by Israeli intelligence and that the information gleaned on US drug interdiction efforts is finding its way to drug smugglers. The investigation by the FBI leads to the exposure of the largest foreign spy ring ever uncovered inside the United States, operated by Israel. Half of the suspected spies have been arrested when 9-11 happens. On 9-11, 5 Israelis are arrested for dancing and cheering while the World Trade Towers collapse. Supposedly employed by Urban Moving Systems, the Israelis are caught with multiple passports and a lot of cash. Two of them are later revealed to be Mossad. As witness reports track the activity of the Israelis, it emerges that they were seen at Liberty Park at the time of the first impact, suggesting a foreknowledge of what was to come. The Israelis are interrogated, and then eventually sent back to Israel. The owner of the moving company used as a cover by the Mossad agents abandons his business and flees to Israel. The United States Government then classifies all of the evidence related to the Israeli agents and their connections to 9-11. All of this is reported to the public via a four part story on Fox News by Carl Cameron. Pressure from Jewish groups, primarily AIPAC, forces Fox News to remove the story from their website. Two hours prior to the 9-11 attacks, Odigo, an Israeli company with offices just a few blocks from the World Trade Towers, receives an advance warning via the internet. The manager of the New York Office provides the FBI with the IP address of the sender of the message, but the FBI does not follow up.

2001 The FBI is investigating 5 Israeli moving companies as possible fronts for Israeli intelligence.

2001 JDL’s Irv Rubin arrested for planning to bomb a US Congressman. He dies before he can be brought to trial.

2002 The DEA issues a report that Israeli spies, posing as art students, have been trying to penetrate US Government offices.

2002 police near the Whidbey Island Naval Air Station in southern Washington State stop a suspicious truck and detain two Israelis, one of whom is illegally in the United States. The two men were driving at high speed in a Ryder rental truck, which they claimed had been used to "deliver furniture." The next day, police discovered traces of TNT and RDX military-grade plastic explosives inside the passenger cabin and on the steering wheel of the vehicle. The FBI then announces that the tests that showed explosives were “false positived” by cigarette smoke, a claim test experts say is ridiculous. Based on an alibi provided by a woman, the case is closed and the Israelis are handed over to INS to be sent back to Israel. One week later, the woman who provided the alibi vanishes.

2003 The Police Chief of Cloudcroft stops a truck speeding through a school zone. The drivers turn out to be Israelis with expired passports. Claiming to be movers, the truck contains junk furniture and several boxes. The Israelis are handed over to immigration. The contents of the boxers are not revealed to the public.

2003 Israel deploys assassination squads into other countries, including the United States. The US Government does not protest.

2004 Police near the Nuclear Fuel Services plant in Tennessee stop a truck after a three mile chase, during which the driver throws a bottle containing a strange liquid from the cab. The drivers turn out to be Israelis using fake Ids. The FBI refuses to investigate and the Israelis are released.

2004 Two Israelis try to enter Kings Bay Naval Submarine Base, home to eight Trident submarines. The truck tests positive for explosives.

This brings us to the present scandal. Two years into an investigation of AIPAC’s possible role as a spy front for Israel, Larry Franklin, a mid-level Pentagon Analyst is observed by the FBI giving classified information to two officials of AIPAC suspected of being Israeli spies. AIPAC hires lawyer Nathan Lewin to handle their legal defense, the same lawyer who defended suspected Israeli spy Stephen Bryen in 1978.

Larry Franklin worked in the Pentagon Office of Special Plans, run by Richard Perle, at the time Perle (who was caught giving classified information to Israel back in 1970) was insisting that Iraq was crawling with weapons of mass destruction requiring the United States to invade and conquer Iraq. There were no WMDs, of course, and Perle has dumped the blame for the “bad intelligence” on George Tenet. But what is known is that the Pentagon Office of Special Plans was coordinating with a similar group in Israel, in Ariel Sharon’s office.

With two suspected Israeli spies (at least) inside the office from which the lies that launched the war in Iraq originated, it appears that the people of the United States are the victims of a deadly hoax, a hoax that started a war.

The leaking of the investigation of AIPAC to the media on August 28th, 2004 gave advance warning to other spies working with Franklin. The damage to the FBI’s investigation was completed when United States Attorney General John Ashcroft ordered the FBI to stop all arrests in the case. Like the Stephen Bryen case and the hunt for “Mega”, this latest spy scandal seems destined by officials who have their own secret allegiances to protect, barring a massive public outcry.

The organization at the heart of the latest spy investigation, AIPAC, wields tremendous influence over the US Congress. Through its members and affiliated PACs, AIPAC directs a huge flow of campaign cash in favor of, and occasionally against, Senators and Representatives solely on the basis of their willingness to support Israel. As an example, in 2002, U.S. Rep. Artur Davis, D-Birmingham received so much help from pro-Israeli pacs that 76% of his campaign budget came from OUTSIDE the state of Alabama, mostly from New York.

Let me repeat that. A Congressman AIPAC wanted elected received more money from pro-Israel groups outside his state than from his own constituents inside his state. Who is that Congressman going to be thinking of when he votes in Congress?

So here is the mother of all scandals.

For two years, the FBI has suspected AIPAC of spying for a foreign country, and for those two years (and for decades before) that group suspected of spying for Israel has been reshaping the US Congress for the benefit of a foreign government.

 

 
common franklingate terms: Ak Sar Ben, Albert foods Alberto Gonzalez Alisha Owen, Amato, Andersen, Harold, Michael Aquino, Army of the Night, Dennis Baack,  Max Baer, Max Baird, holz zeilinger, bi-sexual, bobby Eberle, Bonacci, Boystown bradford brian burzynski BSCT byrnne randall call-boy carlton-ritz casseday catholic cia citron, peter clatty commercial federal savings conagra coos bay Lehman copple Cornwall Craig Spence Creager credit union Crist David Ambrose, David Hinton Decamp Dick Roth discovery channel Duke Cunningham Dwight Harris Ed Wwens Eisenstatt Ernie Chambers Fbi Foggo Fort Bragg Foster care review board Frank Figueroa franklin advisory board gannon guckert gannongate gerry falwell gopusa hambright hitler youth hotmilitarystud iran-contra james dobson james duffy james gannon james kelly john queen john stevens barry johnny sutton jubilation day care julie walters kay griggs kimbrough king, lawrence labedz libby apprentice lonnie latham lustfull utterances lynch male prostitution mark grossman mcconnell methamphetamine midnight tour mike jones murray state bank nambla nebraska nelson, rusty northern natural gas northwest bell offutt ogen, utah omaha omaha national bank orr case pagegate pedophigate poindexter presidio probe ensnares protestant ratzinger reagan, ronald rendition rick perry R-lynn robert kirchner robert spire rove, karl samuel vanpelt sarkozy paedophilia satanism schoedinger scott mcclellan secret service shawn vassel sodomy southern baptist convention stephen cambone stitt strategic air command talon news tarpley temple of set texas youth commission the colonel the fellowship thomas reynolds thompson, hunter tom delay tongsun park tripp schweer union pacific railroad urbom wadman, robert washington times weber state university west texas state school westin crown center hotel william boykin williams energy world herald world vision yorkshire television yosef sagiv franklin cover-up mcateer  libby book apprentice homoeroticism, bestiality and incestuous themes, with an unspeakably gross passage where a ten-year-old girl is abused.  Caged, and forced to have sex with bears, to become a prostitute, search terms: a scene of incest between two uncles and their niece; fukk a freshly killed deer, prepubescent girl's painted 'mound', lack of vaginal odor ronald roskens kent state 1970 cfr usaid chancellor uno board of regents caradori homosexual orgies ed mccateer leola Mcconnell roundtable falwell bisexual lustfull utterances tennessee knoxville victor ashe kitty kelly las vegas mayor tang yale bulldog lips sodomite nevada governor .........................gopusa gay porn sites mcclellan austin gay bars bypassed secret service security controls background check fleischer press credential mcclendon inr bureau of intelligence and research state department wilson plame endeavor media group llc houston theconservativeguy.com exposejessejackson militaryescorts bedrock corporation wilmington delaware j. daniels dividezero.net gkg.net college station bush presidential library lawrence king elizabeth doles liaison to the white house rove fundamentalist Christian politics operation rescue bible reading by guckert reverend rob schenk american center for law and justice pat robertson justice roy moore pentacostal national community church giddings school Washington Ashcroft congregant Gannon Schenk friends park bench plan righttalk.com leadership institute's broadcast school of journalism arlington virginia morton blackwell head of college republicans south dakota politics thune on gannon's radio webcasts daschle free speech foundation probush.com james abourezk mike marino west point pennsylvania traitors list carter sarandon mortensen gore stern kerry kennedy MLKing mckinney moore dixie chicks aei gannon article march 2004 anti-gay rights  ....Deborah Jeane Palfrey, Pamela Martin & Associates, legal escort service, Tobias, Brandy Britton, 07-046-GK, Catherine Connelly, racketeering, Ulman, Dick Morris, adult fantasy, Miz Julia, prostitution, pimping, Montgomery Blair Sibley, ABC, Disney, Akin Gump Strauss Hauer Feld LLP, Eli Lilly, Quale, NASA, Kessler, Shirlington limousine, poker parties, Watergate, Westin Grand, hookergate whoregate, D. C. madam, Duke-stir, Langley, .... Letterman about Cheney ""I can't believe a good-looking guy like that would ever have to pay for sex, you know what I'm saying?"  ....  Thomas DiBiagio, Jonathan Luna, Ed Norris, Governor Ehrlich, Watergate, Westin Grand, James Comey, Ashcroft, ABC producers Rhonda Schwartz, Justin Rood, defense contractors, AIPAC, World Bank, IMF, Halliburton, smokinggun, Wells Fargo Bank, Troy Burrus, John Stendrinni, Wilkes / Michael indictment. ....  Barney Frank, Steve Gobie, Thomas Foley, Edwin Cassem, Massachusetts General Hospital, Paul Shanley, Creighton University, Dobson, homophobia, Val Peter, archdiocese, Boston, house ethics committee, Warren Buffett, Cardinal law  Senator Larry Craig, Idaho, plainclothes officer, lewd behavior, airport men's room, tapped foot, anti same-sex marriage votes, homophobia, anti-gay rights, Romney campaign, Offutt, Barney Frank
Neil Entwistle    top
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Global Research   
  • CASMI
  • Dark Government
  • Deep Journal
  • FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW
  • Greg Palast privatization of FBI, see InQtel, Choicepoint
  • IncogPress, Zakheim  There is also evidence that a possible headquarters for this remote control was located at the Boston Airport, in the offices of a major Military/Industrial complex player, the Mitre Corporation: A company sharing offices with them named Ptech. The reporter Joe Bergantino of WBZ-TV, was following the story, but it was squelched by Michael Chertoff, dual-citizen of Israel and Zionist. PTECH INFO  more
  • Islamic Intelligence Dov Zakheim has served more than two decades at the highest level of the Dept. of Defense, since the Reagan administration came to power in 1981. Before that he was at the Congressional Budget Office in the department overseeing National Security and International Affairs from 1975 until 1981. ... These Israeli enterprise software products, like Ptech and Mitre, were key to the execution of 9-11.
  • LookingGlassNews, Abramoff, Hillman ... Top 25 censored stories 2007
  • RumorMillNews    IS DEFENSE CONTRACTOR MITRE CORP. THE TROJAN HORSE OF 9/11?  By Christopher Bollyn American Free Press American Free Press Did a central controller with "super user" privileges of the command and control systems of the Department of Defense, NORAD, the Air Force, and the FAA, control the aerial attacks of 9/11? There is only one agency that has that capability – a little-known private company known as  continued below  and file
  • WayneMadsenReport Entwistle's firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House during the 9-11 terrorist attacks. According to Entwistle's mother-in-law, he also told his wife that he had large amounts of money held in 'offshore' accounts.
  • What Really Happened
  • notes: poster: '. Ember, founded by MIT alumni Robert Poor and Andrew Wheeler, Ember Corporation began operations in 2001. In-Q-Tel initially invested in Ember in September 2005.  .  ENT stand for Embedded Technical Networking - ENT (which we All think is short for ENTtwistle thanks to court TV ) this is what his job was - not looking for escorts, but encoding these sites for the FBI .
  • Global Report The Center for Public Integrity and the Fund for Independence in Journalism determined, through a collective study and breakdown of Bush administration speeches, press briefings and interviews, that Bush and other top officials "led the nation to war on the basis of erroneous information." and OpEdNews
  • Neil Entwistle, and 911 'inside job'  ... follow the trail: P-Tech, command and control, terrorist financing, Bush / Clinton, Afghanistan, Mujahideen, Kosovo, oil, 911, Iraq War.  more

    • Summary
    • A Massachusetts jury found British computer specialist Neil Entwistle guilty of murdering his wife and baby daughter on January 19, 2006. Entwistle fled the United States for Britain after the double homicide.  notes
    • WBZTV Neil Entwistle's attorney says he will raise constitutional issues in his appeal of guilty verdict.
    • WayneMadsenReport "has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA, more below, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11.      full article
    • Wikipedia, PTech
    • Wikipedia, Operation Green Quest  more below
    • Cooperative Research PTech
    • RumorMillNews  Mitre Corporation, 911, Trojan Horse, file
    • Judith Miller, 
  • Foreign Affairs, The Challenge of Radical Islam by Judith Miller, Muslim Brotherhood
  • Embedded New  Technologies Company Overview" Embedded New Technologies (ENT) offers Intellectual Property cores for Xillinx, Altera and Actel FPGAs. DSP systems and system-on-chip, SoC, embedded systems can be provided using our floating-point, fp, fast fourier transform, fft, fir filter and digital down converter cores
  • NPR  Joe Bergantino, a CBS journalist who will be the first to report on Ptech, will say of Ptech in 2002, “The worst-case scenario is that this is a situation where this was planned for a very long time to establish a company in this country and in the computer software business that would target federal agencies and gain access to key government data to essentially help terrorists launch another attack.” National Public Radio, 12/8/2002]
  • International Extradition Blog
  • Trials & Tribulations
  • TrueCrimeWeblog
  • Wikipedia, Neil Entwistle   On June 25, 2008, Neil Entwistle was found guilty on two counts of first degree murder and sentenced to life imprisonment without the option of parole. Jurors at Middlesex County Superior Court in Woburn, Massachusetts, had deliberated for 13 hours before finding Entwistle guilty. As well as being found guilty of the murders, he was convicted of two other charges - illegal possession of a firearm and illegal possession of ammunition - and sentenced to probation which forbids him from gaining profit from the sale of his story to the media. ...  Entwhistle is serving his life sentences at Massachusetts Correctional Institution - Cedar Junction supermax prison.
  • WebSlueths
  • Wikio Neil Entwistle
  • AP  Entwistle linked to escort services, smear campaign? pornography, set-up.  Google search on murder.
  • video Ron Paul names neo-cons video
  • Boston Globe   ... he will be transferred to the maximum-security Souza-Baranowski Correctional Center in Shirley. There he will undergo medical and physical tests, which include obtaining a sample of his DNA, as is the case for all inmates, said Diane Wiffin, a spokeswoman for the state Department of Correction.
  • Boston Herald A juror who carefully watched a curiously grinning Neil Entwistle over 12 days of testimony by 46 witnesses said the perfectly coiffed wife-and-baby killer is nothing but a narcissist.
  • CBSNews Entwistle
  • CIA
  • FBI
  • Ember Ember Corporation’s wireless semiconductor solutions help auto­mate homes, lower buildings’ energy consumption, reduce manu­facturing plants’ breakdowns, and keep the country’s borders and infrastructure safe and secure. With more than 120 customers, Headquartered in Boston, Massachusetts, with offices and distributors worldwide, the company is a lead promoter of the ZigBee Alliance; its platform is the National Technical Systems’ (NTS) “Golden Suite” 
  • FoxNews  We know that our son Neil is innocent, and we are devastated to learn that the evidence points to Rachel murdering our grandchild and then committing suicide. I knew Rachel was depressed. Our son will now go to jail for loving, honoring, and protecting his wife's memory.
  • In-Q-tel, CIA company
  • Mitre Corporation
  • Norquist, Grover
  • P-Tech
  • WBZTV, laptop, Google search  Judge Diane Kottmyer agreed to allow prosecutors to present evidence suggesting Neil Entwistle trolled the internet for sex in the days before the murders and logged into his account at Adult Friend Finder after the murders.
  • notes: BMI / PTech  Yassin al-Qadi, a Saudi multimillionaire. He will invest $5 million of Ptech’s start-up money. The US will declare him an al-Qaeda financier shortly after 9/11 (see October 12, 2001). In 1998, al-Qadi will come under investigation by FBI agent Robert Wright (see October 1998) for potential ties to the 1998 US embassy bombings (see August 7, 1998). Al-Qadi is also a major investor in BMI Inc., an investment firm with connections to a remarkable number of suspected terrorist financiers (see 1986-October 1999). Al-Qadi later will claims that he sold his investment in Ptech in 1999, but there will be evidence he may continue to hold a financial stake after that year, and even after the US will officially declare him a terrorism financier (see 1999-After October 12, 2001).
  • Jewish Virtual Library, Dov Zakheim, mastermind of 911
  • WayneMadsenReport Entwistle's firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House during the 9-11 terrorist attacks. According to Entwistle's mother-in-law, he also told his wife that he had large amounts of money held in 'offshore' accounts. ......  WMR has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11.  more search terms: Gatwick Airport, Hanscom Air Force Base, Gulfstream rendition aircraft, full article
  • notes: Neil Entwistle (born 18 September 1978) is an English-born man accused of murdering his wife, Rachel Entwistle, and their infant daughter Lillian on January 20, 2006 in the United States. ... The bodies of 27-year-old Rachel and 9-month-old Lillian were found on January 22, in the master bedroom of the couple's rented Hopkinton, Massachusetts home where the Entwistles had been living for only ten days. Autopsy results showed that Rachel died of a gunshot wound to the head, and the baby died of a gunshot wound to the stomach
  • Wikipedia  Ptech Inc. was a Quincy, Massachusetts-based provider of business process modelling software that was closed down in the wake of a December 5, 2002 raid by federal authorities under the auspices of Operation Green Quest.  ... Business domain Describing itself as a "provider of enterprise architecture, business modeling, analysis and integration software solutions, "the privately-held corporation was founded in 1994, and known for its technology, which was based on a unique implementation of neural net and semantic technologies. Ptech was recognized as one New England Technology's "Fast 50" by Deloitte Touche Tohmatsu in 2001. For four years in row (from 2000 to 2003), Ptech was also recognized, for their velocity of innovation in the knowledge economy, as one of the hundred companies that matters in the world of IT and Business  with the major names in Technology companies such as Microsoft, IBM, HP and Oracle Corporation..  The CEO of Ptech Oussama Ziade appeared on different television shows in the USA and has been featured on the cover of several magazines. . The company was once part of UML Partners, the consortium that was convened to develop standards for UML, the Unified Modeling Language.  ...  Federal investigation Ptech was brought to the front of the spotlight following the visit of law enforcement officials to its Headquarters in the middle of the night of December 5th 2002, under the operation of Operation Green Quest, a U.S. Customs Services unit charged with the investigation of alleged terrorist funding networks. The December raid brought a rush of media sources to Ptech's Boston headquarters 7] amid allegations of Ptech's involvement in terrorist financing, which the White House and the Federal Attorney General of Massachusetts later rebuffed  ...  Notable clientele Ptech's roster of clients included several governmental agencies, including the United States Armed Forces, NATO, Congress, the Department of Energy, the Department of Justice, the Federal Bureau of Investigation, Customs, the FAA, the IRS, the Secret Service, and the White House. Despite the media allegation that the company's was connected to terrorism, an allegation that both the US government and the company's official denied, as of May 2004 they were still contracted by several federal agencies, including the White House.  ...  Ptech had a security clearance to work on sensitive military projects dating to 1997.  ... edit] Notable personnel Yaqub Mirza, angel investor, board member. Hussein Ibrahim, VP, Chief Scientist    ..........Ymette St guillen murder and her father's ties to Venezuela via the infamous "School of the Americas"
  • Wikipedia  "Operation Green Quest was a United States Customs Service-sponsored interagency investigative unit formed in October of 2001, and concerned with the surveillance and interdiction of terrorist financing sources. The FBI refused to participate in the raid and to date, no charges have ever been filed.  ... SAAR   ...    Synopsis Led by the U.S. Customs Service, and included agents and analysts from the Internal Revenue Service (IRS), the Secret Service, the Bureau of Alcohol, Tobacco and Firearms (ATF), the Federal Bureau of Investigation (FBI), the Office of Foreign Assets Control (OFAC), the Financial Crimes Enforcement Network (FinCEN), the U.S. Postal Inspection Service, and the Naval Criminal Investigative Service. Federal prosecutors from the U.S. Justice Department's Criminal Division also formed an integral part of Operation Green Quest. The director of Operation Green Quest was a senior special agent from U.S. Customs and the deputy director is a senior special agent from the IRS.  ....  According to Customs, by its fourth month of operation Operation Green Quest had initiated more than 300 probes into terrorist finances, seizing about $10.3m in smuggled US currency and $4.3m in other assets. Its work resulted in 21 searches, 12 arrests and four indictments.  SAAR network raid:  Its most spectacular operation of was March 20, 2002 raid ... 19 interrelated business and non-profit entities in Herndon, VA associated with an umbrella corporation known as the SAAR Foundation, looking for ties to the Al Taqwa Bank and the Muslim Brotherhood. No arrests were made and no organizations were shut down, but over 500 boxes of files and computer files were confiscated, filling seven trucks. Finding no incriminating evidence, much of the confiscated material has been returned.   The raid would raise concerns of unfair persecution within the American Muslim community, 2] leading to an April 4, 2002 meeting (arranged by Grover Norquist) in which several notable Muslim figures, including Palestinian-American financier and Republican organizer Talat M. Othman and Islamic Institute head Khaled Saffuri were received by Treasury Secretary Paul O'Neill as representatives of the Muslim-American community, and to voice complaints about the raid
  • Cooperative Research  On December 3, 2001, New York Times reporter Judith Miller telephones officials with the Holy Land Foundation charity in Texas and asks them to comment about what she says is a government raid on the charity planned for the next day. Then in a December 4, 2001, New York Times article, Miller writes that President Bush is about to announce that the US is freezing the assets of Holy Land and two other financial groups, all for supporting Hamas. US officials will later argue that Miller’s phone call and article “increased the likelihood that the foundation destroyed or hid records before a hastily organized raid by agents that day.” Later in the month, a similar incident occurs. On December 13, New York Times reporter Philip Shenon telephones officials at the Global Relief Foundation in Illinois and asks them to comment about an imminent government crackdown on that charity. The FBI learns that some Global Relief employees may be destroying documents. US attorney Patrick Fitzgerald had been investigating the charities. He had been wiretapping Global Relief and another charity in hopes of learning evidence of criminal activity, but after the leak he changes plans and carries out a hastily arranged raid on the charity the next day (see December 14, 2001). Fitzgerald later seeks records from the New York Times to find out who in the Bush administration leaked information about the upcoming raids to Miller and Shenon. However, in 2005 Fitzgerald will lose the case. It is still not known who leaked the information to the New York Times nor what their motives were. Ironically, Fitzgerald will succeed in forcing Miller to reveal information about her sources in another extremely similar legal case in 2005 involving the leaking of the name of CIA agent Valerie Plame. New York Times, 12/4/2001; New York Times, 12/15/2001; Washington Post, 9/10/2004; Washington Post, 2/25/2005] The 9/11 Commission will later conclude that in addition to the above cases, “press leaks plagued almost every raid on Muslim charities] that took place in the United States” after 9/11. Washington Post, 9/10/2004  full research
  • Cooperative Research “Investigators tried to prove Alamoudi was a terror middleman but could not find ‘smoking gun’ evidence. That allowed Alamoudi to became a politically connected Muslim activist and co-founder of the American Muslim Armed Forces and Veteran Affairs Council, which helps the US military select Muslim chaplains.” New York Post, 10/1/2003] This same year, Alamoudi will be one of the founders of Ptech, a US computer company with suspected terrorism ties (see 1994). It will later be alleged that he was able to operate with impunity for years due to his close ties to Grover Norquist, a powerful Republican lobbyist (see March 20, 2002). In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004).
  • RumorMillNews   continue:   MITRE Corp. ... There are basically two versions of events surrounding the terror attacks of September 11, 2001. There is the government version, propagated by the controlled media, which claims that 19 Arab terrorists, organized by Osama Bin Laden in Afghanistan, hijacked 4 passenger aircraft and used them to attack the World Trade Center and the Pentagon. This version, used to launch the "war on terror" and two invasions in the Middle East, is challenged by a lack of evidence. On the other hand, a host of unofficial explanations, based on available evidence, make up what can be called the "inside job" or anti-government version. This version basically claims that agents embedded within the U.S. military and intelligence organizations conspired to carry out the terror attacks.
  • IncogPress Ptech was financed by the Guardium Corporation of Israel, a hi-tech investment company with ties to the Mossad through the front groups Cedar Firm, Veritas Venture Partners and StageOne, all located in Herzelia, the same as Mossad’s headquarters. Also, these companies are tied to AMDOCS and COMVERSE INFOSYS, who builds the digital-switching telecomm equipment, used all over the US and in the government and thought to have a back door for intelligence gathering. ...  This was the subject to Carl Cameron’s banned FOX report, from December, 2001, that showed phone information of LA undercover Drug agents and DEA were given to an Israeli Ecstasy Drug ring. Abe Foxman of the ADL forced FOX to discontinue the reports and to remove them from their website. These reports may be seen here (for now): FOX REPORTS  ...  Ptech was owned by Lebanese and Arab front men; but appears that one Michael Goff, the son of a member of Commonwealth lodge 600 of the B’nai B’rith Worcester, Massachussets and who strangely left his job as a lawyer to go run a Hi-Tech start-up company. Was he a Sayan (Jew Mossad collaborator)? More on Ptech coming up in another Blog posting.  
PTECH & 9-11  source: z13.invision forum
  • The subject of computer sabotage in relation to the aerial attacks of 9-11 was brought to the fore by Indira Singh, who spoke at early 9-11 truth events organized by Kyle Hence. During these early 9-11 "truth" events, a small Massachusetts-based software company called Ptech was brought up by Singh, who sought to link it to Arab terrorists. Ptech was said to be a start-up company from Quincy, Mass. whose software was loaded onto the most sensitive computer systems across the U.S. government, including those of the Federal Aviation Administration (FAA) and the U.S. Air Force, two agencies whose systems failed miserably on 9-11. Singh, a senior consultant with JP Morgan Chase on 9-11, is described as a "whistle-blower" because of her revelations about Ptech's involvement with the critical computer systems that failed on 9-11. "Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA -- that there was a window of opportunity or to insert software or to change anything -- it would have been Ptech along with MITRE." Singh has spoken extensively about Ptech's alleged connections with Saudi Arabia, for example with Pacifica Radio in 2005:
  • "Maybe those organizations don’t fully know who their masters are. And Ptech is the one thread, the one golden thread you pull on and all of this is unraveled, because it goes into the corporations, it goes into these government entities, it goes into the terrorism financing entities that were, that none of which have been, by the way, taken to task. There are just so many questions about what does this all mean. And as we investigated, as I investigated further, we found that the origins of Ptech were very interesting – where did this company come from obviously is the first question. And how did they get to be so powerful, who were the people, who were the organizations that brought them in, who knew, who gave them the power?" Ptech software "is utilized at the highest levels of almost every government and military and defense organization in this country," Singh said, "including the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the U.S. Navy, the U.S. Air Force, and, last but not least, the Federal Aviation Administration." I found it hard to believe that the most sensitive government and military computers would run enterprise software from a Lebanese-owned start-up company called Ptech from Quincy, Mass. All the talk about the Saudi-financier behind Ptech being linked to Osama bin Laden smelled like a "cut out" to me. It simply did not make sense that the most secure computer systems of the U.S. government would be running software written by a Lebanese Muslim financed by a Saudi who happened to be on the most-wanted list of global terrorists. When I turned my attention to Ptech, I soon discovered that the real key person involved in the development of the company was a Zionist Jewish lawyer named Michael Goff from Worcester, Mass. Goff also worked for an Israeli-run computer security company called Guardium. This confirmed my suspicion that Ptech was probably an Arab "cut out" controlled by the Mossad, and that Goff was their point man in Ptech. Goff's father and grandfather had been high-level Masons in the Worcester lodge of B'nai B'rith, a secret Jewish Masonic group formed in New York City in 1843. Goff obviously lied to me about how he had gotten involved with Ptech in 1994 when he said that he had wound up becoming the manager of the company through a temporary agency. It seemed to me that the Ptech cut-out had been exposed. My revelations about Ptech's Zionist roots were published in a newspaper based in Washington, D.C. Singh, however, ignored the evidence of Israeli involvement with the creation of Ptech and continued to accuse the company of being linked to Saudi sponsors of terror. Meanwhile, Ptech software is still running on U.S. government and military computers. Singh and I were asking the same questions: How did Ptech get to be so powerful? Who were the people, who were the organizations that brought them in? Who knew? Who gave them the power? After 9-11, the crucial question was how did Ptech's software get loaded onto the critical U.S. government networks – particulary those of the FAA, the U.S. Air Force, and NORAD. Who, in their right mind, would have allowed Ptech personnel and software anywhere near the FAA's core air traffic control system computers in Herndon, Virginia? During my research about the military exercises that were on-going when 9-11 occurred, I read documents about how the FAA and NEADS computer systems failed. The FAA, in particular, was extremely slow to contact the military about the rogue aircraft of 9-11. In one case, one of the rogue aircraft had been allowed to fly without communication for nearly 30 minutes before the military was notified. "THE HEART OF THE MATTER" The flawed and delayed FAA procedures and communications with the military are at "the heart of the matter," as 9-11 relative Kristen Breitweiser said:"You know, it is very upsetting that the 9/11 Commission had to subpoena the Federal Aviation Administration FAA]. According to news reports, there are 150,000 documents that were left out of what the FAA sent to the commission. Those documents went toward the time line of when the FAA notified the North American Aerospace Defense Command NORAD], when the fighter jets were scrambled and the communications between air-traffic control and the pilots. These are threshold issues that go to the heart of the matter. How did the FAA overlook 150,000 documents pertaining to these issues? It is more than mildly upsetting that they would leave out these documents." MONTE BELGER – FAA DEPUTY ADMINISTRATOR In the documents about the FAA failures on 9-11, I came across the name of a Monte R. Belger, acting deputy administrator of the FAA at the time. A long-term FAA official who began his career with the FAA in Chicago, Monte Belger was the senior official who oversaw the upgrading of the FAA air traffic computer systems that began in the late 1990s and which was on-going in 2001. Belger, as the Acting Deputy Administrator for Air Traffic Services and System Operations, was the key man at the FAA making the executive decisions about these upgrades. As the New York Times of June 7, 2001, reported:"The aviation agency is installing a computer system that controllers can use to determine whether airplanes can depart from established traffic lanes and fly long distances, and whether they will conflict with other airplanes by doing so." Belger was the key decision maker at the Federal Aviation Administration, responsible for the software and computer upgrades that involved Ptech, the suspicious upgrades which were being done during the years prior to 9-11. Documents and reports from the MITRE Center for Advanced Aviation System Development in McLean, Virginia, show that Ptech was working with MITRE on FAA computer systems. As his on-line biography says, Belger, a 30-year veteran of the FAA, was Acting Deputy Administrator for the FAA for five years, from 1997-2002, leading the 49,000-person team and in charge of operating the world's safest aviation system. During his tenure with the FAA, Belger was the Associate Administrator for Air Traffic Services, responsible for day-to-day operations of the nation's airspace system, and supervised the FAA's modernization plan aimed at improving aviation capacity, safety and service to airlines. Belger played a pivotal role in assisting in the transition of aviation security responsibilities from the FAA to the new Transportation Security Administration, and he co-chaired the FAA's successful efforts to adopt acquisition and personnel reform. Belger retired from the FAA in September 2002.
  • U.S. AVIATION TECHNOLOGY LLC      After he left the FAA, Belger became the "Vice President, Government Connection" of a small Israeli-run company based in the Fort Lauderdale area called U.S. Aviation Technology. The company was founded by Ehud "Udi" Mendelson, who described himself as "a captain in the prestigious Army Intelligence Unit of the Israel Defense Force." "Ehud received his BS Degree in Business and Economics from the Bar-Elan sic] University in Tel-Aviv, Israel. He holds a computer Network Engineer certification from Microsoft and Novel," according to his webpage. Company documents and information from the Israel Venture Capital Research Center website specifically name Monte Belger of Centreville, Virginia, as a Vice President and Government Connection of U.S. Aviation Technology LLC.
  • Federal Whistleblower Mary Schneider www.maryschneider.us gets bogus mocking email from a 9-11 connected p-tech software company (Mitre) that was used to over ride the Pentagon computers on 9-11-2005
  • It was then Asst. Attorney General Michael Chertoff, now head of US Dept. of Homeland Security, that helped lobby for P-Tech Software pre-9-11.  
    Note: P-Tech Software is now linked to the destabilization of the US Radar and Defense Shield on 9-11 in which US Dept of Justice War games were used to masquerade and turn a mock drill into the real Black Op aka the 9-11 Attack on America. Reference: Both Vanity Fair and Lou Dobbs of CNN have now fingered the 9-11 Treason and Norad in disarray
  • 911review  THE PTECH CUTOUT       Ptech, a mysterious software company has been tied with the events of 9/11. The Quincy, Massachusetts-based company was supposedly connected to "the Muslim Brotherhood" and Arab financiers of terrorism.  The firm's suspected links with terrorism resulted in a consensual examination by the FBI in December 2002, which was immediately leaked to the media. The media reports of the FBI "raid" on Ptech soon led to the demise of the company.  Ptech "produced software that derived from PROMIS, had an artificial intelligence core, and was installed on virtually every computer system of the U.S. government and its military agencies on September 11, 2001," according to Michael Ruppert's From the Wilderness (FTW) website.  "This included the White House, Treasury Dept. (Secret Service), Air Force, FAA, CIA, FBI, both houses of Congress, Navy, Dept. of Energy, IRS, Booz Allen Hamilton, IBM, Enron and more," FTW reported.  "Whoever plotted 9/11 definitely viewed the FAA as the enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful," FTW reported. "To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House and Secret Service had the same software on their systems - likely a superior modified version capable of 'surveillance and intervention' systems."  But did the U.S. government unwittingly load software capable of "surveillance and intervention" operations and produced by a company linked to terrorism onto its most sensitive computer networks, or was Ptech simply a Mossad "cutout" company?  Oussama Ziade, a Lebanese Muslim immigrant who came to the U.S. in 1985, founded Ptech in 1994. But the company's original manager of marketing and information systems was Michael S. Goff, whose PR firm, Goff Communications, currently represents Guardium, a Mossad-linked software company.  And Goff comes from a well-to-do line of Jewish Masons who have belonged to Worcester's Commonwealth Lodge 600 of B'nai Brith for decades. So, why would a recently graduated Juris Doctor in Law leave a promising law career to join forces with a Lebanese Muslim's upstart company sponsored with dodgy funders in Saudi Arabia?  "As information systems manager for Ptech], Michael handled design, deployment and management of its Windows and Macintosh, data, and voice networks," Goff's website says. "Michael also performed employee training and handled all procurement for software, systems and peripherals."      AFP asked Goff, who left the Worcester law firm of Seder & Chandler in 1994, how he wound up working at Ptech. "Through a temp agency," Goff said. Asked for the name of the agency, Goff said he could not remember.  Could it be Mossad Temps, or maybe Sayan Placement Agency?  Goff, the original marketing manager for Ptech software, said he did not know who had written the code that Ptech sold to many government agencies. Is this believable?  Goff leaves a legal practice in his home town to take a job, through a temp agency, with a Lebanese Muslim immigrant who is selling software, and he doesn't know who even wrote the code?  AFP contacted the government agencies that reportedly have Ptech software on their computers, and IBM, to ask if they could identify who had written the source code of the Ptech software.  By press time, only Lt. Commander Ron Steiner of the U.S. Navy's Naval Network Warfare Command had responded. Steiner said he had checked with an analyst and been told that none of the Ptech software has been approved for the Navy's enterprise networks. http://911review.org/companies/Odigo/Mossa...Odigo_9-11.html 
  • Sites.Google When compared to the media circus that surrounded the pretrial investigation and ultimate trial and conviction of Scott Peterson in 2005 for the murder of his wife Laci and unborn child Conner, the just concluded Neil Entwistle murder case doesn’t even register a whisper. This is very curious. The Neil Entwistle case had all the elements necessary for a media circus…a wife shot to death in her home along with her 9-month old daughter, plus an international angle where the suspect husband flees back home to England.

    One would think that programs such as Nancy Grace, Anderson Cooper 360, Verdict with Dan Abrams and Larry King Live would have milked the tragedy for all it was worth as they had the Scott Peterson case or the still unsolved 2005 disappearance of Natalee Holloway in Aruba incident, but there was no coverage. This silence is a story in itself.

    Except for periodic coverage of the trial on Court TV, the only mention in the media of Neil Entwistle after wife Rachel and daughter Lillian were found dead were two curt dispatches announcing Neil’s arrival back in the United States in February 2006 to stand trial, and his conviction on June 25, 2008. That’s it! What caused this self-imposed media blackout costing valuable advertising dollars? Before we get to that story, let’s first examine the many oddities that swirl around the Neil Entwistle case.

    The first sign that something was amiss was Neil Entwistle’s extradition flight back to the United States. Instead of flying coach on a commercial airliner as is usual in extradition cases, Neil, in the custody of United States marshals, was "…returning to the U.S. on a private flight" according to British police.1 Hold on, though. The flight back to the United States gets even more interesting. It would seem not only were authorities in Massachusettes interested in getting Neil Entwistle back to the United States, and in a comfortable fashion no less, but so was the Central Intelligence Agency, because the "private flight" Neil flew back on was, according to former NSA officer Wayne Madsen, a "CIA Gulfstream…previously used to fly "renditioned" Al Qaeda suspects around the world."2 Madsen reports "After questions were raised from reporters] about the use of the Gulfstream, Massachusetts authorities claimed it had merely "rented" the U.S. government’s aircraft for the sole purpose of transporting Entwistle."3 This explanation is, of course, ludicrous. Agency aircraft are not lent out. Such an action would constitute a serious security breach even if the temporary passengers were Americans.

    The story gets even odder! After initially landing at "Bangor, Maine, to pass customs, Neil Entwistle] then flew to…Hanscom Air Force Base in Bedford, Mass."4 So instead of flying directly to Boston Logan Airport, first the CIA Gulfstream lands at Bangor, Maine to pass customs then proceeds to Hamscom Air Force Base. Of course, this round about process could have been handled more expeditiously by landing at Boston Logan Airport in the first place. Then again if Neil Entwistle had landed at Boston Logan Airport, reporters there would not have been so restrained in their coverage of his return as they would be on a military base. Madsen notes one aspect of the media’s restraint at Hamscom as "TV footage of the aircraft CIA Gulfstream] studiously avoided showing the plane’s tail number."5

    You’re probably thinking to yourself this is one strange story, and it couldn’t get any stranger. Wrong. Like a good thriller (or a bad thriller), the odyssey of Neil Entwistle goes seriously serpentine.

    Madsen reports, "Entwistle’s firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House during the 9-11 terrorist attacks."6 Well, well, well, that would certainly explain the keen interest the CIA had in Neil Entwistle.

    If you remember, during the 9/11 attacks FAA radar was continuing to pick up false contacts after the NORAD war games going on that morning were called off, confusing Air Traffic Control’s response to the attacks.7 Was this the work of P-Tech who we learn had a software contract with the FAA during the 9/11 attacks? Before we answer that question, we need to know who was behind P-Tech - where did P-Tech get its financing - and how did P-Tech become such an influential provider of software to departments and agencies of the United States government?

    A senior consultant to JPMorganChase and Risk, Indira Singh was tasked in April 2002 with developing a next-generation, operational, risk blueprint that "would proactively identify exposures, including money laundering, rogue trading, and illicit financing patterns."8 Indira reached out to the top people in her profession for recommendations on software companies that could assist her on the project. The responses Indira got were unanimous. P-Tech, a software company based in Quincy, Massachusetts, would fit the job Indira was told.

    Indira invited representatives from P-Tech to pay a visit to her firm for a demonstration of the company’s software. When they arrived alarm bells immediately started to go off in Indira’s head. P-Tech hadn’t brought the software to the demonstration, but assured Indira that they could develop the software on the laptop they had brought with them. All they needed to do was hook onto the Internet at the workstation Indira had prepared for the demonstration. This is a serious breach of standard operating procedure in the software business, for at the end of the day, according to Indira, "he’s walking out the door and I don’t have anything and he’s walking away with pretty much enough of how we’re thinking about doing operational risk. Operational Risk is about how to spot bad things that are going on in a financial institution, things like rogue trading, money laundering, and so on and so forth."9

    With the P-Tech representatives still on site, Indira excused herself and called several colleagues who had initially recommended P-Tech to her. When she informed one individual that P-Tech was on site, the individual asked why she brought them to her work place. The individual advised Indira to watch them closely. These responses were not what Indira expected, especially from individuals who had recommended P-Tech to her. And so started an eight month odyssey where Indira learned from P-Tech employees and FBI agents that P-Tech was a "cutout", "a front…a regular CIA front…"10 Indira also learned that P-Tech’s main financing came from Yassin Al-Kadi, a Saudi businessman, according to Jeff Goins, Vice President of Sales for P-Tech. With this information, Indira went online and discovered that Yassin Kadi had been placed on the FBI terror list in October, 2001.11

    On June 28, 2002 Indira Singh was fired from JPMorganChase because she refused to stop investigating P-Tech and warning other businesses and clients of P-Tech’s terrorist linked financing. On December 5, 2002 U.S. Customs, FBI, IRS, Secret Service, INS and the Massachusetts State Police raided the Ouincy, Massachusetts offices of P-Tech.12 The raid, however, was a fraud. The only reason P-Tech was raided was due to the incessant and embarrassing questions Indira was asking about the company and its terrorist linked financing. After the raid P-Tech changed its name to Go Agile, and the FBI investigation fizzled out.

    One can now begin to appreciate the reason for the media blackout on the Entwistle case. P-Tech was a "protected" company used by elements within the United States intelligence community. P-Tech’s software allowed the United States intelligence community to manipulate computer networks, such as placing phantom radar contacts on FAA radar monitors during the 9/11 attacks. Just the type of work Entwistle was involved with according to the latest from Wayne Madsen:

    " Madsen] has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11."13

    So did Neil Entwistle kill his wife? The forensic evidence supports what Neil Entwistle and defense council maintained at the trial, that Rachel Entwistle murdered her nine-month old child and then killed herself. The police found no gunshot residue in Neil’s car,15 but did find gunshot residue on Rachel’s hands.16

    So why did Neil Entwistle flee to England? If he was innocent, certainly fleeing the country is a good indicator that he was guilty, one might conclude. Fleeing the scene of a crime, or the country where the crime was committed, is not proof of guilt. For instance, an innocent individual who witnessed a murder but didn’t know the murder victim, or an innocent individual that witnessed a murder and did know the victim, but knows that the authorities would have no reason to believe he/she witnessed the murder, flee such crime scenes all the time, and usually do so because the witness doesn’t want to be wrongly implicated in the crime. Running in this instance, however, would present more problems for Neil Entwistle than remaining to face the authorities’ questions. Since Neil Entwistle was the husband and father of the victims, there is every reason for the authorities to suspect that he was the murderer, and therefore there would be no good reason for him to run if he didn’t want to compound the authorities’ suspicions.

    Unless.

    Unless you worked for a terrorist funded software company that sabotaged the United States defense computer network on September 11, 2001, thereby resulting in the deaths of 3,000 individuals. With such knowledge, and now with the spotlight thrown on you thanks to your wife’s suicide and the murder of your baby, you might get the feeling that someone out there may try to silence you, not necessarily because they think you will give something away, but because you might give something away. One can understand how Neil Entwistle would feel safer in England.

    Ironically enough the dearth of media attention in the Neil Entwistle case may afford him better prospects in a new trial. If Neil Entwistle does get a new trial, let it not take place in Middlesex. Emotions there are just too high to afford Neil Entwistle a fair and impartial hearing.

    One final note. What of the adult websites Neil Entwistle visited days before the deaths of Rachel and Lillian?17 Well, before you jump to conclusions, could Neil Entwistle have been encoding those sites for the FBI? You find that difficult to believe? Then why didn’t the prosecution present the witnesses that Neil Entwistle had extramarital relationships with? Those witnesses would have been quite easy to find. The reason no such witnesses were presented by the prosecution is because Neil Entwistle wasn’t trolling those websites for personnel reasons. He was literally on the job when he was in those adult websites!

     

 

Zawahiri_Negroponte Letter    top
PROGRESSIVE  REFERENCE CONSERVATIVE*
  • Dailykos   "Zawahiri Letter to Zarqawi: A Shiite Forgery?  The Arabic text of the recently released letter alleged to be by Zawahiri (al-Qaeda's number two man) to Abu Musab al-Zarqawi in Iraq raises questions for me as to its authenticity.  The very first element of the letter is the blessing on the Prophet. It says: al-salah wa al-salam `ala rasuli'llahi wa a-lihi wa suhubihi . . . (peace and blessings be upon the Messenger of God and his family and his companions . . .)  the phrase "salla Allahu `alayhi wa alihi wa sallam" (the blessings and peace of God be upon him and his family) is a Shiite form of the salutation, because of the emphasis of the Shiites on the House or descendants of the Prophet. Because of the cultural influence of Shiism in South Asia, one does find that form of the salutation in Pakistan and India among Sunni Muslims."
  • Juan Cole search Zawahiri hoax letter, Negroponte
  • Washington Post  "The 6,000-word letter from Osama bin Laden's chief lieutenant, Ayman Zawahiri, to Iraqi insurgent leader Abu Musab Zarqawi amounts to a detailed portrait of al Qaeda's long-term goals in Iraq and the Middle East, and includes a striking critique of how Zarqawi has gone about waging his war against not only U.S. troops but also Iraqi civilians. The letter was posted yesterday on the Web site of Director of National Intelligence John D. Negroponte -- http://www.dni.gov/ -- after senior intelligence officials released excerpts of it last week."
  • CNN Zarqawi says the letter is a fake
  • GOPUSA Zawhiri Letter Draws Increasing Skepticism
  • Office of the Director of National Intelligence, Negroponte Zawahiri, Zarqawi hoax letter, copy
  • "Among the letter's highlights are discussions indicating: & The centrality of the war in Iraq for the global jihad.  &  From al Qa'ida's point of view, the war does not end with an American departure.  &  An acknowledgment of the appeal of democracy to the Iraqis.  &  The strategic vision of inevitable conflict, with a tacit recognition of current political dynamics in Iraq; with a call by al-Zawahiri for political action equal to military action.  &  The need to maintain popular support at least until jihadist rule has been established.  &  Admission that more than half the struggle is taking place "in the battlefield of the media."

     

....
Al-CIA-duh
Al-CIA-duh: Is Patrick Fitzgerald a Zealous "Independent" Prosecutor or Experienced Cover-up Artist? Tuesday, October 25, 2005 - 03:22 AM, - Posted by valis (7751 Reads) SOURCE W/LINKS: http://valis.cjb.cc/index.php?name=News&file=article&sid=100

"Coincidentally, the U.S. Attorney for Chicago, Patrick Fitzgerald, on the job for only a couple of weeks, had extensive experience as a terrorism prosecutor and immediately became involved in the investigation of BIF Benevolence International Foundation] and GRF Global Relief Foundation]" 

# National Commission on Terrorist Attacks Upon the United States Terrorist Financing Staff Monograph Chapter 6 - The Illinois Charities Case Study PDF | HTML]

And "Fitzgerald immersed himself in the case and took a major role"? Well, this was quite a "coincidence." In this post Re: FRANK RICH: It's Bush-Cheney, Not Rove-Libby!!!!, I explained that Fitzgerald also was part of the prosecution team in the Omar Abdel Rahman case. Just to recap this, the prosecutors in the Rahman case didn't want their case thrown out on "national security" grounds, so they were careful to totally leave the CIA out of the picture. The leading prosecutor even claimed that when they discovered this "mujahideen" paramilitary training by Rahman's followers, "the FBI’s concern was that the group could be violating federal 'neutrality' laws." Of course, everybody knows that the US was not "neutral" in the Afghan war, and US officials publicly eulogized the "mujahideen" as "freedom fighters." I think that Fitzgerald's role in the Rahman case indicates that the Valerie Plame case will remain as matter of "Rove-Libby," and not "Bush-Cheney."

After examining Fitzgerald's role in the GRF & BIF cases, I am even more convinced that this Valerie Plame case will not reach the "Bush-Cheney" level. Just look at the outcome of the BIF & GRF cases. As soon as the investigations reached those close to higherups in Washington, the prosecutors seemed to spend more time on a coverup, than on pursuing a bona fide investigation. Then attorney general Ashcroft kept a tight rein on the BIF-Arnaout case. "The case fell apart and Arnaout was convicted only of fraud." The terrorism charges were dropped and the DOJ reached this plea deal with Arnaout. It doesn't look like the feds ever even intended to bring a criminal case against the Haddad or the GRF. The plan seemed to be to lock him up until they got him out of the country.

"The decision to deport him rather than continue the criminal investigation was made in Washington, without consultation with the Detroit case agent who had investigated Haddad"? I think that the feds opted to skip a public trial and to get Haddad deported because Haddad had worked directly with the Bin Laden, Azzam, & MAK. With Arnaout, he did work for MAK, but there was more distance between him & the hierarchy of the MAK. GRF co-founder "Rabih Haddad had worked for years for bin Laden‘s and Azzam's] Makhtab al-Khidamat, which supported the tens of thousands of Arabs who rushed to Afghanistan to join the anti-Soviet resistance in the 1980s." A GRF attorney said "The United States also supported that organization Makhtab al-Khidamat] then." This is true. A BIF attorney also correctly stated that "Mr. Arnaout's activities in war-torn regions like Afghanistan in the 1980's and Bosnia in the 1990's came on behalf of many of the same rebel fighters the United States was backing then." I think this is the main reason why Fitzgerald came to have such a "major role" in these cases. He had already proved himself in the Rahman case, as someone who knew when to limit the scope of these inquiries. Quite frankly, if he didn't have this reputation, I think that the Bush administration would have found a way to get him off the Valerie Plame case.

It came out in the Kifah Waed Jayyousi case that Rahman's followers had "a network across North America to fund-raise for and recruit mujahedeen to train and fight in various areas including but not limited to Bosnia, Kosovo, Chechnya, and Somalia." Jayyousi "was transferring money intended for Chechen militants through the Global Relief Foundation." Fitzgerald would have been well aware of a connection between the GRF and the followers of Sheikh Omar Abdel Rahman through Alkifah and Wadih El Hage:

"At the beginning of the Afghan war against the Soviet Union, El Hage left Louisiana and traveled to Pakistan to enroll in mujahedeen war training programs. Thousands of young Arab men from around the world flocked to Pakistan to help the Afghans expel the Soviets. Sources told FRONTLINE that El Hage was a follower of Sheik Abdullah Azzam, one of the most important spiritual leaders of the Arab mujahedeen forces. Azzam preached that the war in Afghanistan was a jihad, or holy war, and that those who participated would have a special place in heaven...

In early 1991, according to El Hage's grand jury testimony, he was called to New York to help direct the Alkifah Refugee Center, a Brooklyn-based group that raised money to support veterans of the Afghan war. According to documents from the World Trade Center case, Alkifah had a Tucson office and contacts with the main mosque in Arlington, Texas, and family members confirmed that El Hage had been in contact with the group." "

Azzam was also involved with Brooklyn's Alkifah group. During the CIA’s Jihad, to the “US intelligence community,” "Azzam was considered a prime asset because of his close connections to the Muslim Brotherhood, Saudi intelligence, and the Muslim World League." Note that Rahman himself had received four visas from "CIA agents acting as consular officers at American embassies in Khartoum and Cairo." Alkifah in Brooklyn “became the de facto headquarters of” Rahman. This was the springboard for building up this "string of jihad offices that had been set up across America with the help of Saudi and American intelligence.” This network didn't dry up after the Cold War ended. It came out in Rahman's trial that his followers were receiving funds from the Saudi embassy in Washington to recruit for Bosnia. See: Al Qaeda Recruited U.S. Servicemen: Testimony Links Plot To Saudi Gov't. Alkifah followed suit: ARAB VETERANS OF AFGHANISTAN WAR LEAD NEW ISLAMIC HOLY WAR

Oct. 1994] "The Al-Kifah, or Struggle, Refugee Center in New York, which used to recruit and raise funds for Mujahedeen headed for Afghanistan, last year announced it was switching its operations to Bosnia. It was established in the mid-1980s by Egyptian Mustafa Rahman as a joint venture with Sheikh Omar Abdel-Rahman, spiritual leader of Gamaat al-Islamiya."

If the FBI wanted to know what the GRF & BIF were doing and where the money was going, they didn't have to rely on what they found in trash bins. The GRF & BIF didn't exactly keep their agenda a secret. It was known for years that these "charities" did a lot more just than feed starving kids. This List of Muslim Relief Organizations was published by the Muslim Students Association of the USA and Canada in the 1990's. The BIF & GRF are listed:

Benevolence International Foundation PO Box 548, Worth, IL 60482 USA Tel. 708-233-0062 Fax. 708-233-0069 Email: bif@benevolence.org URL: www.benevolence.org Focus: Benevolence International Foundation (BIF) is a humanitarian organization dedicated to helping those afflicted by wars. BIF first provides short-term relief such as emergency food distribution, and then moves on to long term projects providing education and self-sufficiency to the children, widowed, refugees, injured and staff of vital governmental institutions. Current list of projects include running refugee camps, hospitals and clinics, sponsoring orphans, operating vocational and computer centers, and conducting seasonal projects. Established in 1987, BIF is currently conducting projects in five countries including Azerbaijan, Bosnia, Chechnya, Daghestan, and Tajikistan. BIF is incorporated in the state of Illinois, USA as a non-profit, humanitarian organization and coordinates its efforts through an office in Chicago. BIF is solely supported by private donations and does not receive any governmental assistance. Entry updated: Apr 1999. .......

Global Relief Foundation PO Box 1406, Bridgeview, IL 60455 Phone: 1-888-256-2532 (1-888-ALNAJDA) Phone: 708-233-1473 Fax: 708-233-1474 Email: talk2grf@aol.com Email: info@grf.org URL: www.grf.org US Tax ID#: 36-3804626 Focus: Chechnya, Kosova (Kosovo) and other places. You can ask for a documentary illustrating the genocide in Kosovo. You can use this documentary to create awareness and raise funding for Kosvo. You can order English/Arabic. Entry updated: Dec 1999."

In 1992, the GHW Bush administration decided that Izetbegovic was their man to lead the Bosnia "jihad." Warren Zimmerman, U.S. Ambassador in Belgrade "persuade d] Izetbegovic to renege on the Lisbon peace] agreement, promising him all political, diplomatic and military aid if he agreed to do so." The GHW Bush & Clinton administrations "pulled the strings from the background, encouraging the world-wide Moslem agitation in favor of Izetbegovic." Many of these "strings" were in the Bin Laden network. As to Kosovo, Kosovo Liberation Army (KLA) training camps in Albania were "run by Osama bin Laden, and various other foreign mujahedeen" and also by the "CIA and British intelligence." And "the CIA seems to have provided monetary support." There was a civil war in Kosovo with atrocities on all sides, but there was no "genocide." Kosovo - the site of a genocide that never was. In other words, after the Cold War, the CIA & the Pentagon continued to use this same network of "charities," like the BIF & GRF, to serve US strategic aims.

Batterjee was "affiliated with a group of wealthy donors from the Persian Gulf region known as the 'Golden Chain'"? This Golden Chain was a huge Pandora's box, which shows that the BCCI never was really shut down. Just some of the names of the fronts changed. After Fitzgerald took on a leading role in the BIF investigation, the feds made a plea deal with Arnaout, dropping the terrorism charges and ending any further investigation of the case. Now the last time I looked, Bin Laden's Al Qaeda was officially called a "terrorist organization." So there was no lack of evidence. The evidence just led to directions where the higherups in Washington didn't want to go. How many references do you see to the Muslim World League MWL], the Binladens, Bin Mahfouz, & Abdullah Taha Bakhish on this Golden Chain? According to the DOJ's own documents in the Arnaout case, this is "a list of people referred to within Al Qaida as the 'Golden Chain,' wealthy donors to mujahideen efforts." This was found in a file called "Osama's history" in the BIF office in Bosnia. The CIA had used the BCCI to channel the funds "to CIA client Osama bin Laden, part of the $2 billion Washington sent to the Afghani mujahideen." Bill Clinton's old pal in Arkansas, Jackson Stephens, arranged a BCCI "bailout" for George W. Bush's Harken. "A board seat was given to Harken shareholder Sheikh Abdullah Taha Bakhsh, whose chief banker was BCCI shareholder Bin Mahfouz." You may also remember Jackson Stephens and the Riadys from the Clinton "China-gate" scandal. In 1984, Mochtar Riady bought "a stake in the Worthen holding company whose assets include the Stephens-controlled Worthen Bank....Other Worthen co-owners will eventually include BCCI investor Abdullah Taha Bakhish." Jackson Stephen had bankrolled both Republican and Democratic campaigns.

It is also clear from this 9-11 Commission's staff report account that the CIA was working with the FBI on both the BIF & GRF cases prior to 9-11 and the Patriot Act. Apologists for the Patriot Act claim that this was needed to authorize communications and "intelligence sharing" between the FBI and CIA or other intelligence agencies. Of course, since the BIF & GRF involved the protection of former and current CIA "assets," the "CIA held back some information" in dealing with the FBI. Also one way to kill an investigation is to make inflated claims, which if disproved, can bring down the entire case. I think that the WMD in these "charity" cases was really a stretch, and I think that when the investigation was diverted into this direction, that it was headed for a deadend. Also this could have served as a rationale for Haddad's deportation. Unproven weapons claim led to Islamic charity raid in '01

"This plan went awry when word of the impending action apparently leaked to GRF. FBI personnel learned that some of the targets of the investigations may be destroying documents"? There is some question as to Judith Miller's involvement in "alerting" the GRF of action to freeze their assets. We do know that Judith Miller had connections to the Pentagon & other top Bush officials and that she did play a role in the disinformation about Saddam's WMD. Last year, Chicago U.S. Attorney Patrick J. Fitzgerald "informed the New York] Times by letter...that his office has subpoenaed telephone company records" of reporters Philip Shenon and Judith Miller. "The move is part of an effort to determine whether anyone in the government told Times reporters of planned federal asset seizures in December 2001" at the GRF's office. "The FBI believes that a call from a reporter to a representative of the charity, the Illinois-based Global Relief Foundation, may have led to the destruction of documents there the night before the government's raid, according to findings by the Sept. 11 commission." It is possible that Shenon & Miller were the channel for this "alert" to the GRF. However, this "alert" could have come from a number of sources through channels in the US "intelligence community," in ways that could not be traced back to the source. There is also a question of exactly how much damage that this destruction of evidence may have done to the prosecutors' case. It is very unlikely that there was ever any serious intent to prosecute Haddad or anyone else in the GRF. The Bush administration certainly seemed in a rush to get him out of the country, and this plan was brought to fruition after "Fitzgerald immersed himself in the case and took a major role."

By BlackJade

 

Zawahiri 'Letter' Draws Increasing Skepticism  By Sherrie Gossett  CNSNews.com Staff Writer  http://www.gopusa.com/news/2005/october/1018_zawahiri_letter2.shtml  October 18, 2005  file

(CNSNews.com) -- A letter purportedly written by a senior al Qaeda leader -- and said to be authentic by U.S. intelligence officials who released it last week -- may be a forgery, according to Washington analysts who cite numerous anomalies in the text.  Some analysts have gone so far as to label the letter a likely U.S. government "influence operation," which, if exposed, threatens American credibility in the Middle East.  "If this is a forgery, then either it was designed to blow up in the face of the American government; or someone in the 'coalition of the willing' has been caught with their pants down," said one analyst, who spoke with Cybercast News Service on the condition of anonymity.  The 6,000-word letter was dated July 9 and released Oct. 11 by the U.S. Office of the Director of National Intelligence. Intelligence officials said the letter, purportedly penned by Osama bin Laden's chief deputy Ayman al-Zawahiri and addressed to Iraqi terror mastermind Abu Musab al-Zarqawi, was intercepted in a counter-terrorism operation in Iraq.  Stephen Ulph, from the foreign policy think tank, The Jamestown Foundation, noted that despite the confidence U.S. officials expressed in the letter's authenticity -- namely that it had been verified by "multiple sources over an extended period of time" -- there was little in the way of independent corroboration offered.  The anonymous source remarked that the U.S. "apparently found the original letter, suggesting we 'closed the loop' and have been reading mail of senior al Qaeda for months, yet we appear to not know where al Qaeda leaders] are at."  Christopher Brown, research associate at the Hudson Institute's Transitions to Democracy program, doubts that Zarqawi was even in Iraq at the time the letter was purportedly written to him, an opinion shared by a retired U.S. intelligence operative who spoke recently with Cybercast News Service.  In email communications with Cybercast News Service last week, Brown also pointed out that Zawahiri uses both Muslim and Christian dates in his letter. The use of Western dual dates is customarily done only for material designed for western consumption, not for internal communications, he said.  The letter, dated July 9, also makes no reference to the July 7 London bombings, Brown noted.  Zawahiri purportedly mentions in the letter that he has a daughter named "Nawwar," which he explains "means the timid female gazelle and the woman who is free from suspicion ..." But Brown questioned why Zawahiri would feel the need to explain the meaning of an Arab word to another Arab.  Furthermore, Zawahiri's alleged definition of "Nawwar" as "timid female gazelle" is incorrect, according to translators with Transperfect Translations, a global translation firm. "Nawwar means: blossom, flower, bright as in illuminated. It also could be a nice female's name, and by extension could be the beginning of the spring season," said the translators.  >> Continued -- Page 1 2

Page 2 of 2

The letter notes the effectiveness of Pakistani military operations, yet there is little evidence to support that idea, Brown said, except for a three- to four-week period in May when Pakistani anti-terrorist operations were conducted with U.S. assistance.  The Zawahiri letter, if genuine, makes no mention of al Qaeda working "within Iranian strategy" in Iraq, Brown said. That strategy and the accompanying tactics, he added, are serving the terror network's own goals in Iraq as well as those of Iran.  " B]y declaring all-out war on the Shi'a, al Qaeda is] driving the Shi'a population further into the hands of the Iranians, who can provide them with security through both their own organizations and what I would venture to say is their either formal or informal control over al Qaeda," Brown said.  "Therefore, the areas that cooperate with the U.S. get hit and the areas that cooperate with Iran become safe havens. This is in addition to their increasing control over the social services, security organizations and most importantly, the political institutions on both the national and local levels," he added.  Aegis Defense Services, a London-based consultancy, has argued that the letter, addressed to Zarqawi, was actually sent to Abu Musab al-Suri, a Syrian who acted as an intermediary for al Qaeda in Europe during the 1990s and whose whereabout are unknown, according to the Financial Times of London.  A Washington Post editorial by David Ignatius cited skepticism voiced by Juan Cole, professor of history at the University of Michigan. Cole had contended on his website that the salutation of the letter was Shiite, not Sunni and may have been the work of Iranian operatives.  There is speculation about the potential political fallout, especially for John Negroponte, U.S. director of national intelligence, if the letter is discovered to be propaganda generated by the U.S.  The cabinet-level position that Negroponte holds coordinates all 15 components of the American intelligence community. It was created in response to one of the recommendations of the 9/11 commission. Negroponte serves as the principal intelligence adviser to the president and the statutory intelligence advisor to the National Security Council.  "If and when this breaks, the blowback of this kind of American hand-in-the-cookie jar could severely hurt us in the Middle East, Europe and with an already skeptical American media that would likely declare all-out war on the administration over this," the Cybercast News Service source requiring anonymity said.  Ulph added that "pending further confirmation of origin, it would be wise to treat the letter with skepticism."  Copyright © 1998-2005 CNSNews.com - Cybercast News Service

fair use

 
Guantanamo, retraction, from APFN email May 16, 2005 - Bill Moyers' speech to the National Conference for Media Reform
Call it preventive capitulation.FREEPRESS.NET, Tue May 17 17:57
ATTN: STAFF OF NEWSWEEK: About your retraction....Eric A. Smith, Tue May 17
http://disc.server.com/Indices/149495.html  
ATTN: STAFF OF NEWSWEEK: About your retraction....
Tue May 17, 2005 18:13
http://disc.server.com/discussion.cgi?disc=149495;article=83899;title=APFN
-------- Original Message --------
Subject: About your retraction....
Date: Wed, 18 May 2005 04:38:56 +0900
From: Eric Smith snowdog@juno.ocn.ne.jp
To: constitution@ajc.com
CC: apfn@apfn.org, "t r u t h o u t" messenger@truthout.org,

To Mark Whitaker and the staff of Newsweek:

If you back down from the truth, you'll send a very clear message to the billions worldwide who are really paying attention to what this "Administration" is doing. Incidents of guards flushing copies of the Quran have been documented on multiple previous occasions by people who were released -- because they were innocent. For example:

(ABC Radio Australia, August 5, 2004) Guantanamo Bay freed ex-prisoners David Hicks and Mamdouh Habib are quoted as saying that "guards would throw detainees' Korans down the toilet and shave them, to try to get them to abandon their Muslim faith."

(ABC News's John Berman, August 3, 2004) Another British citizen also released from Guantanamo Bay is quoted: "Asif Iqbal says guards would 'kick the Koran, throw it in the toilet, and generally disrespect it.'"

(Lawsuit, October, 2004) Four Britons wrongly detained by the U.S. repeated the charge in court proceedings.

(Houston Chronicle, March 2003) 18 released Afghanis said "American soldiers insulted Islam by sitting on the Koran or dumping their sacred text into a toilet."

(Washington Post, March, 2003) "Ehsannullah, 29, said American soldiers who initially questioned him in Kandahar before shipping him to Guantanamo hit him and taunted him by dumping the Koran in a toilet. 'It was a very bad situation for us,' said Ehsannullah, who comes from the home region of the Taliban leader, Mohammad Omar. 'We cried so much and shouted,
"Please do not do that to the Holy Koran."

(Seattle Times, January 9, 2005) Captain James Yee, quoting Guantanamo Bay former superintendent Command Sgt. Maj. John VanNatta: "One of their biggest complaints was of guards kicking their Qurans, flushing them down the toilets and disrespecting their religion."

It is very, very frightening to see a major force of journalism so patently buckle under pressure,,, this nudges us one step closer to the precipice of fascism.

sincerely,
Eric A. Smith
Tokyo

=====================

Newsweek must do more about Koran case: White House
ABC News - 4 hours ago
May 17, 2005 — WASHINGTON (Reuters) - The White House called on Newsweek magazine on Tuesday to help repair damage to the US image in the Muslim world by its ...
Newsweek retracts story that killed 16 Australian
State Dept. Tries to Undo Newsweek Damage San Francisco Chronicle
Newsweek Retraction Has Hollow Ring for Some Pakistanis Washington Post
NPR (audio) - Arizona Republic -

'Newsweek' article a traitorous act
Arizona Republic, AZ - 14 hours ago
I am upset and dismayed at the report that Newsweek published an article about the desecration of the Koran by US interrogators. ...
http://www.azcentral.com/arizonarepublic/opinions/articles/0517tuelets172.html

White House: Newsweek Story Did Great Harm
Guardian Unlimited, UK - 21 minutes ago
By TERENCE HUNT. WASHINGTON (AP) - The White House said Tuesday the United States' image abroad had suffered irreparable damage from ...
http://www.guardian.co.uk/worldlatest/story/0,1280,-5012689,00.html

Free Press is a nonpartisan organization working to involve the public in media policymaking and to craft policies for more democratic media. Learn more»
http://www.freepress.net/


 

Democracy Rising "Congressman Edward J. Markey (D-MA) has taken the lead on working toward ending torture by U.S. officials or by "rendition" of suspects to foreign governments for torture there. He has introduced, along with 48 colleauges, H.R. 952 the Torture Outsourcing Prevention Act FAS Italy kidnappings, torture, U.S.  Secret prisons, prison ships, planes, Italy, kidnapping. CBS News Extraordinary Rendition..."the government policy wherein terror suspects are transferred from U.S. control into the control of foreign governments, so that interrogation methods that are not permitted under U.S. law may be applied to the suspects" International Criminal Court Protection New York Times : Bush: Iraq War prisoners not entitled to Geneva Convention rules Alternet search, 9/11 Center for Defense Information arms trade, children in war, missile defense info Findlaw, War on Terrorism Special coverage  Global Policy Watching Zionism, 9/11 News from Russia  Pravda, Israel, search Non Violence USA International Relations and Security Network, Swiss Contribution to the Partnership for Peace Newstrove, Guantanamo Bay World Court, International Court of Justice American Center for Law and Justice search American Conservative Union Action Alert lobbyists  Anti Terrorism Coalition, Islam is taking over the orld  BioPort anthrax vaccine manufacturer KOLIsrael Danger Zone Jobs.com Debka File search National Review search on zionist, 9/11  National Strategy to Secure Cyberspace Whitehouse, Bush, Cheney, 'war on terrorism' Alternet search, Guantanamo Amnesty International, UK Guantanamo Bay, latest news, releases Center for Constitutional Rights, watching the events of Guantanamo, detainees, Supreme Court decisions. Center for Defense Information arms trade, children in war, missile defense info FAS search National Intelligence estimate  Global Policy Watching Guantanamo Here-Now, Supreme Court decision on Guantanamo  and related stories. Boston NPR News Source  Human Rights Watch News from Russia  Pravda, Israel, search Palast, Greg, UK  Guantanamo search. Discourse.net CIA, Pentagon inquiry  Findlaw, War on Terrorism Special coverage Guantanamo.com from World News International Relations and Security Network, Swiss Contribution to the Partnership for Peace International Committee of the Red Cross, why did they wait months to report Iraq prison abuse.  Newstrove, Guantanamo Bay Human Rights First, formerly Lawyers Committee for Human Rights Justice, Dept of  press releases  Judicial Watch   World Court, International Court of Justice American Center for Law and Justice search American Conservative Union  Anti Terrorism Coalition, Islam is taking over the world Action Alert help ACU lobby Congress on these issues   Council on Foreign Relations corporate power to rural poor Republicans Debka File search Global Security Guantanamo Bay, Camp X-Ray. Guantanamo Bay Naval Station official site. Israeli Minister of Foreign Affairs National Review search on Guantanamo Bay, Rich Lowry Townhall search Washington Institute for Near East Policy US   Anthrax Vaccination Immunization Program Army cover-up Carlyle Group.net Center for Defense Information arms trade, children in war, missile defense info Gulf War Vets Anthrax vaccine deaths info IACenter Founded by Ramsey Clark News from Russia  Pravda, Israel, search  News Insider search New World Peace FBI incriminated in anthrax mailings NucNews you send articles, news, search BioPort Palestinian Non-Governmental Organization's Network rule of law, social justice, respect for Human Rights, links Vaccination Liberation hoax info, links Vaccination News vaccines, autism, shaken baby syndrome. links What Really Happened anthrax hoax  FDA search UCLA dept of Epidemiology, Bioterrism National CFIDS Foundation Chronic Fatigue Immune Dysfunction, ME, Myalgic Encephalopathy Safety Alerts consumer product safety recall info, news UCLA, Dept of Epidemiology, School of Public Health  Agilent Anthrax Vaccine Immunization Program  Official U.S. site Battelle Memorial Institute develops new tech, commercializes products  Bayer, has Cipro patent, anthrax. BioMed Central the-Scientist.com, news, BS, Research BioPort anthrax vaccine manufacturer  CIDRAP Center for Infectious Disease Research & Policy FDA search FDA News Drug industry news, daily Gulf War Medical Research Library  Harvard, Risk of death, bioterroism, 1 in 56 million Hollister-Stier Labs in partnership with BioPort National Acadamies Press articles on Agent Orange, dioxins, TCDD National Center for Biotechnology Information National Library of Medicine, NIH NTI Security News  PNNL, neural network, protein research, operated by Battelle, with Agilent  TEVA Pharma, Cipro, patent, anthrax vaccine
NFU visitors: altaec233.nbcuni.com (Nbc Universal) New York, New York,  sc215019.robins.af.mil (78 Cs/scsc), dma-cs-proxy.dm.af.mil (355th Communications Squadron,pomproxy.monterey.army.mil (Presidio Of Monterey, wdcsun17.usdoj.gov (Us Dept Of Justice), gao-ng.gao.gov (U.s. General Accounting Office) Maryland, Upper Marlboro, Maryland, Potomac, cheetah.usafa.hpc.mil (Dod Network Information Center)Ohio, Columbus, wdcsun24.usdoj.gov (Us Dept Of Justice) Maryland, Potomac, The Washington Post- Kaplan Inc)      ip68-13-155-193.om.om.cox.net (Cox Communications Inc) Nebraska, Boys Town   pc24-27.apg.army.mil (Headquarters Usaaisc) Maryland, Aberdeen  hqvf.centcom.mil (U.s. Central Command (uscentcom))  athena.afrc.af.mil (Hq Afrc/sco) Georgia, Warner Robins   intziabcizn01.iraq.centcom.mil (Dod Network Information Center --NewsFollowUp.com visitor,  blv-proxy-05.boeing.com (The Boeing Company) Washington, Seattle   proxya.scott.af.mil (Air Mobility Command Comp/systems Squadron) Illinois, Scott
common franklingate terms: ak sar ben albert foods alberto gonzalez alisha owen amato andersen, harold aquino, michael army of the night baack dennis baer, max baer, max baird holz zeilinger bi-sexual bobby eberle bonacci boystown bradford brian burzynski BSCT byrnne randall call-boy carlton-ritz casseday catholic cia citron, peter clatty commercial federal savings conagra coos bay lehman copple cornwall craig spence creager credit union crist david ambrose david hinton decamp dick roth discovery channel duke cunningham dwight harris ed owens eisenstatt ernie chambers fbi foggo foley fort bragg foster care review board frank figueroa franklin advisory board gannon guckert gannongate gerry falwell gopusa hambright hitler youth hotmilitarystud iran-contra james dobson james duffy james gannon james kelly john queen john stevens barry johnny sutton jubilation day care julie walters kay griggs kimbrough king, lawrence labedz libby apprentice lonnie latham lustfull utterances lynch male prostitution mark grossman mcconnell methamphetamine midnight tour mike jones murray state bank nambla nebraska nelson, rusty northern natural gas northwest bell offutt ogen, utah omaha omaha national bank orr case pagegate pedophigate poindexter presidio probe ensnares protestant ratzinger reagon, ronald rendition rick perry R-lynn robert kirchner robert spire rove, karl samuel vanpelt sarkozy paedophilia satanism schoedinger scott mcclellan secret service shawn vassel sodomy southern baptist convention stephen cambone stitt strategic air command talon news tarpley temple of set texas youth commission the colonel the fellowship thomas reynolds thompson, hunter tom delay tongsun park tripp schweer union pacific railroad urbom wadman, robert washington times weber state university west texas state school westin crown center hotel william boykin williams energy world herald world vision yorkshire television yosef sagiv franklin cover-up mcateer  libby book apprentice homoeroticism, bestiality and incestuous themes, with an unspeakably gross passage where a ten-year-old girl is abused.  Caged, and forced to have sex with bears, to become a prostitute, search terms: a scene of incest between two uncles and their niece; fukk a freshly killed deer, prepubescent girl's painted 'mound', lack of vaginal odor ronald roskens kent state 1970 cfr usaid chancellor uno board of regents caradori homosexual orgies ed mccateer leola mcconnell roundtable falwell bisexual lustfull utterances tennessee knoxville victor ashe kitty kelly las vegas mayor tang yale bulldog lips sodomite nevada governor ...Deborah Jeane Palfrey, Pamela Martin & Associates, legal escort service, Tobias, Brandy Britton, 07-046-GK, Catherine Connelly, racketeering, Ulman, Dick Morris, adult fantasy, Miz Julia, prostitution, pimping, Montgomery Blair Sibley, ABC, Disney, Akin Gump Strauss Hauer Feld LLP, Eli Lilly, Quale, NASA, Kessler, Shirlington limousine, poker parties, Watergate, Westin Grand, hookergate whoregate, D. C. madam, Duke-stir, Langley,   Letterman about Cheney ""I can't believe a good-looking guy like that would ever have to pay for sex, you know what I'm saying?"  ....  Thomas DiBiagio, Jonathan Luna, Ed Norris, Governor Ehrlich, Watergate, Westin Grand, James Comey, Ashcroft, ABC producers Rhonda Schwartz, Justin Rood, defense contractors, AIPAC, World Bank, IMF, Halliburton, smokinggun, Wells Fargo Bank, Troy Burrus, John Stendrinni, Wilkes / Michael indictment.  Warren Buffett, Cardinal law, Senator Larry Craig, Idaho, plainclothes officer, lewd behavior, airport men's room, tapped foot, anti same-sex marriage votes, homophobia, anti-gay rights, Romney campaign, Offutt, Barney Frank 
follow up, the act of following up. 2. an action or thing that serves to increase the effectiveness of a previous one, as a second or subsequent letter, phone call, or visit. 3. Also called follow. Journalism. a. a news story providing additional information on a story or article previously published. b. Also called sidebar, supplementary story. a minor news story used to supplement a related story of major importance. Compare feature story (def. 1), human-interest story, shirttail. –adjective 4. designed or serving to follow up, esp. to increase the effectiveness of a previous action: a follow-up interview; a follow-up offer. 5. of or pertaining to action that follows an initial treatment, course of study, etc.: follow-up care for mental patients; a follow-up survey. fol·low –verb (used with object) 1. to come after in sequence, order of time, etc.: The speech follows the dinner. 2. to go or come after; move behind in the same direction: Drive ahead, and I'll follow you. 3. to accept as a guide or leader; accept the authority of or give allegiance to: Many Germans followed Hitler. 4. to conform to, comply with, or act in accordance with; obey: to follow orders; to follow advice. 5. to imitate or copy; use as an exemplar: They follow the latest fads. 6. to move forward along (a road, path, etc.): Follow this road for a mile. 7. to come after as a result or consequence; result from: Reprisals often follow victory. 8. to go after or along with (a person) as companion. 9. to go in pursuit of: to follow an enemy. 10. to try for or attain to: to follow an ideal. 11. to engage in or be concerned with as a pursuit: He followed the sea as his true calling. 12. to watch the movements, progress, or course of: to follow a bird in flight. 13. to watch the development of or keep up with: to follow the news. 14. to keep up with and understand (an argument, story, etc.): Do you follow me? –verb (used without object) 15. to come next after something else in sequence, order of time, etc. 16. to happen or occur after something else; come next as an event: After the defeat great disorder followed. 17. to attend or serve. 18. to go or come after a person or thing in motion. 19. to result as an effect; occur as a consequence: It follows then that he must be innocent. –noun 20. the act of following. 21. Billiards, Pool. follow shot (def. 2). 22. follow-up (def. 3). —Verb phrases23. follow out, to carry to a conclusion; execute: They followed out their orders to the letter. 24. follow through, a. to carry out fully, as a stroke of a club in golf, a racket in tennis, etc. b. to continue an effort, plan, proposal, policy, etc., to its completion. 25. follow up, a. to pursue closely and tenaciously. b. to increase the effectiveness of by further action or repetition. c. to pursue to a solution or conclusion. —Idiom26. follow suit. suit (def. 13). fol·low·a·ble, adjective —Synonyms 3. obey. 4. heed, observe. 8. accompany, attend. 9. pursue, chase; trail, track, trace. 19. arise, proceed. Follow, ensue, result, succeed imply coming after something else, in a natural sequence. Follow is the general word: We must wait to see what follows. A detailed account follows. Ensue implies a logical sequence, what might be expected normally to come after a given act, cause, etc.: When the power lines were cut, a paralysis of transportation ensued. Result emphasizes the connection between a cause or event and its effect, consequence, or outcome: The accident resulted in injuries to those involved. Succeed implies coming after in time, particularly coming into a title, office, etc.: Formerly the oldest son succeeded to his father's title. —Antonyms 1. precede. 2, 3. lead. 4. disregard. 9. flee.  news follow up

 

 
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  safe and free
  • Senator Daniel Akaka (D-Hawaii).  Choicepoint and Acxiom companies are data aggregators.  Nuala O'Connor Kelly is head of privacy for Dept of Homeland Security. 
  • Alternet, Patriot II, details, search, government surveillance, spying
  • Center for Democracy and Technology, domestic spying watch 
  • Center for a Legitimate Government    
  • Commercial Alert, protecting children from corporate predation
  • Cryptorights.org human rights for security workers. SF
  • Disinfo  New Surveillance Camera Can Search 36 Million Faces For Matches Per Second
  • Dissenter / FireDogLake Federal Judge’s Injunction Finds NDAA Is Worse Than Material Support Law
  • Echelon Watch discuss civil liberty threats
  • Electronic Privacy Information Center lawsuits, FBI, FOI  
  • Electronic Frontier Foundation working to protect civil and free speech
  • EFF Is Your Printer Spying on YOu
  • EFF  List of Printers Which Do or Do Not Display Tracking Dots, search terms: yellow tracking dots, printer models, output, Machine Identification Code Technology Project, forensic watermarking, dithering technique, blue light, microscope, Brother, Canon, Dell, Epson, Hewlett-Packard, Fuji, Xerox, IBM, Konica / Minolta, Kyocera, Lanier, Lexmark, Okidata, Panasonic, Ricoh, Savin, Samsung, Tektronix, Toshiba, color laser printers.
  • Buy Wayne Madsen's book Overthrow a Fascist Regime on $15 a Day.
  • Epic  Electronic Privacy Information Center
  • F-Secure, info on CD rootkits 
  • Eyeballing TIA
  • Freedom Scorecard, ACLU
  • Future of Freedom First Amendment Rights 
  • Global Issues.org
  • Google-Watch Google search engine is spyware
  • High Tech Billboards  domestic surveillance
  • Human Rights Watch briefing paper on MCIS
  • Internet Democracy Project enhance open participation, public accountability and hr of internet
  • KeepAmericaFree  Yes, Pres. Obama, The NDAA DOES Authorize Warrantless, No Due Process, Indefinite Military Detention by the Military of American Civilians
  • MediaFilter covert action quarterly
  • MediaRoots the Clark County Republican Party Central Committee of Nevada unanimously called for its appeal while legislators in Michigan are currently considering a bill that could virtually revoke the federal law in that state.
  • NoNAIS.com Protect Traditional Rights to Farm, stop RFID privicacy intrusion by Bush corporate America.
  • OpManning Free Bradley Manning
  • Privacy International Human rights group, watchdog on surveillance by govt/biz
  • Privacy  
  • PrivacyToday  news
  • Refuse & Resist the device formerly known as Carnivore,
  • Salon  Israeli art students, DEA, Amdocs searchable file
  • Smirking Chimp Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA
  • Southwest Research and Information Center  Energy, Environment research analysis. 
  • Total Information Awareness Resource Center
  • VeritasVirtualVengeance Righteous Negative Publicity and Black PR: Exposing the terrible truths to take down corrupt corporations.  Surveillance
  • White Dot find out how to free yourself from television.
  • notes: Wayne Madsen Report ... cell phone  "The "echoing" is not limited to particular cell phone service providers or cell phone types. Customers of AT&T, Verizon, and T-Mobile are reporting the same problem with phones from Nokia, Samsung, Nokia, Motorola, and Ericsson.  ...  Technicians report that echos occur when there is not a complete connection or if there is a third party connection on the call. While echoing has been a minor problem in the past, the frequency of complaints is increasing and affecting journalists and political activists from Washington, DC to New York City and California to Texas.  ...  Government agencies are already able to remotely activate a cell phone and use the microphone to listen in on conversations. The only way to prevent this surveillance is to agree to "batteries out" conversations, something that is employed more and more among journalists while talking to sources as well as others concerned about high-tech snooping from "roving bugs." Similarly, removing the battery from a cell phone also disables the Global Positioning System and cell tower triangulation capabilities used by law enforcement and intelligence agencies to track the location of the user, according to U.S. intelligence sources."

 

  • Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA).  ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by theDirector of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing.  There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval.  Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004.  Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community.  In December 2007, DTO was folded into the newly created IARPA  1]. A move to a research park near the University of Maryland, College Park was announced at about the same time  2].

  • Wikipedia Real ID The REAL ID Act of 2005, Pub.L. 109-13, 119 Stat. 302, enacted May 11, 2005, was an Act of Congress that modified U.S. federal law pertaining to security, authentication, and issuance procedures standards for the state driver's licenses and identification (ID) cards, as well as various immigration issues pertaining to terrorism. The law set forth certain requirements for state driver's licenses and ID cards to be accepted by the federal government for "official purposes", as defined by the Secretary of Homeland Security. The Secretary of Homeland Security has currently defined "official purposes" as presenting state driver's licenses and identification cards for boarding commercially operated airline flights and entering federal buildings and nuclear power plants. The REAL ID Act implements the following: Title II of the act establishes new federal standards for state-issued driver licenses and non-driver identification cards. Changing visa limits for temporary workers, nurses, and Australian citizens. Funding some reports and pilot projects related to border security. Introducing rules covering "delivery bonds" (similar to bail bonds but for aliens who have been released pending hearings). Updating and tightening the laws on application for asylum and deportation of aliens for terrorist activity. Waiving laws that interfere with construction of physical barriers at the borders. As of April 2, 2008, all 50 states have either applied for extensions of the original May 11, 2008 compliance deadline or received unsolicited extensions. 4] As of October 2009, 25 states have approved either resolutions or binding legislation not to participate in the program, and with President Obama's selection of Janet Napolitano (a prominent critic of the program) to head the Department of Homeland Security, the future of the law remains uncertain, 5] and bills have been introduced into Congress to amend or repeal it. 6] The most recent of these, dubbed PASS ID, would eliminate many of the more burdensome technological requirements but still require states to meet federal standards in order to have their ID cards accepted by federal agencies. 

  • Wired Random numbers are critical for cryptography: for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random-number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency.
  • Wikipedia NAIS The National Animal Identification System, (NAIS) is a government-run program in the United States intended to extend government animal health surveillance by identifying and tracking specific animals. Administered at the federal level by the Animal and Plant Health Inspection Service, a branch of the United States Department of Agriculture, NAIS will also be overseen by state animal health boards. While the federal program is voluntary, money received by some states, 2] tribes, and non-profit entities from the USDA through cooperative agreements has been used to make parts or all of the program mandatory. Critics claim the system will put small farmers out of business, by requiring that farmers pay the cost of registration devices of between $1 and $20 for each animal. Large, corporate factory farms which are connected to vertically integrated, birth-to-death factory systems ID and pay by the herd (and not the individual animal), while small farmers must pay it for each animal.  Finally, fears persist about plans to make NAIS mandatory on the federal level, which would threaten the religious freedom of those who believe that making a “mark” is sinful, such as the Amish. The Amish also object to the use of electronic devices such as microchips. 24] If microchip implants were required, as has been proposed in a 2004 report by the United States Animal Health Association’s Committee on Livestock Identification, it would also violate the rights of those who believe that this practice is morally wrong.
  • PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ...
    Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS
    The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform mass surveillance and monitoring of public and corporate Internet communications in real time. Common Dreams ...
    Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change,
  • WMR  "January 30-February 1, 2009 -- Stellar Wind blows Democratic governors out of office  WMR has previously reported on the malfeasance of the U.S. Attorney for Northern Illinois, Patrick Fitzgerald, in his investigation of the 1993 World Trade Center bombing and the outing of CIA covert agent Valerie Plame Wilson. In the case of the 1993 attack, Fitzgerald sat on critical signals intelligence (SIGINT) evidence that would have tied the bombing to Osama bin Laden in exile in Sudan. Bin Laden remained a U.S. intelligence asset at the time of the World Trade Center bombing so Fitzgerald, following orders from Langley, simply failed to enter into evidence wiretaps communications between the Sudanese Mission to the United Nations in New York and the Sudanese Foreign Ministry in Khartoum that contained references to Bin Laden. In the outing of Plame, Fitzgerald refused to enter as evidence tapped phone calls of Vice President Dick Cheney's Chief of Staff I. Lewis "Scooter" Libby and others that would have proven the severe damage of Libby's actions to the covert counter-proliferation operation involving Plame and her Brewster Jennings & Associates cover firm. Fitzgerald's actions in covering up the World Trade Center link to Sudan and Bin Laden was so significant that Libby's New York Times interlocutor, Judith Miller, once asked this editor for my sources on the Sudanese wiretap story. I told her that one was well known, the late ABC News reporter John McWethy had reported on the Sudan UN mission wiretaps by the National Security Agency (NSA) in 1993. The other, a confidential source in Khartoum, remains confidential. McWethy died in a February 2008 skiing accident in Colorado.   full story
  • Wikipedia Stellar Wind Stellar Wind is the open secret code name for certain information collection activities performed by the United States' National Security Agency and revealed by Thomas M. Tamm to New York Times reporters James Risen and Eric Lichtblau. 1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001. 2] The program's activities involve data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity. 1] There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants. 3] In March 2004, the Justice Department under Attorney General John Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel Alberto Gonzales and Chief of Staff Andrew Card, Jr. to Ashcroft's hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the Justice Department's ruling. However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal Justice Department objections. Federal Bureau of Investigation (FBI) director Robert Mueller, Acting Attorney General James Comey, and many prominent members of the Justice Department were prepared to resign over the matter. Valerie Caproni the FBI general counsel, said, "From my perspective, there was a very real likelihood of a collapse of government." Bush subsequently reversed the authorization. 2] During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as "pizza cases" because many seemingly suspicious cases turned out to be food takeout orders. Approximately 99 percent of the cases led nowhere, but 1 percent bore fruit. 2] One of the known uses of these data were the creation of suspicious activity reports, or "SARS", about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Elliot Spitzer's use of prostitutes, even though he was not suspected of terrorist activities. 1] In March 2012 Wired Magazine published "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)" talking about a new NSA facility and says "For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail." Naming the official William Binney a former NSA code breaker. Binney goes on to say that the NSA has highly secured rooms that tap into major switches, and satellite communications at AT&T and Verizon both. 4] The article suggests that the otherwise dispatched Stellar Wind is actually an active program.
  • WMR Bush / Clinton complicity in NSA illegal wiretapping.  A problem for Hillary? ...  1999 docs show NSA and Clinton White House hiding information about Foreign Intelligence Surveillance Act (FISA) compliance.  Illegal request for NSA wiretapping made in February 27, 2001 meeting ... Nacchio refused, then indicted for insider stock trading... 10th Circuit Court of Appeals, (they're all crooks?).  search terms: AT&T switching center, Folsom Street, San Francisco, 4ESS equipment, Mark Klein (whistleblower), see  HPSCI, Porter Goss, attorney client privilege, Executive Order 12333, all concerning hiding  documents referring to legality of NSA activities, ... and Wilma A. Lewis, Mark Nagle, Marina Utgoff Braswell, Electronic Privacy Information Center, (Civil No. 99-3197 PLF), information withheld from FOIA, domestic wiretapping  full story
  • Economist "Security experts reckon the latest technology can detect hostile intentions before something bad happens. Unless it is perfect, though, that may be bad in itself   ...   MONITORING surveillance cameras is tedious work. Even if you are concentrating, identifying suspicious behaviour is hard. Suppose a nondescript man descends to a subway platform several times over the course of a few days without getting on a train. Is that suspicious? Possibly. Is the average security guard going to notice? Probably not. A good example, then—if a fictional one—of why many people would like to develop intelligent computerised surveillance systems.   ...   The perceived need for such systems is stimulating the development of devices that can both recognise people and objects and also detect suspicious behaviour. Much of this technology remains, for the moment, in laboratories. But Charles Cohen, the boss of Cybernet Systems, a firm based in Ann Arbor, Michigan, which is working for America’s Army Research Laboratory, says behaviour-recognition systems are getting good, and are already deployed at some security checkpoints" 
  • According to Associated Press, the director of CIA's Open Source Intelligence, Doug Naquin, admitted the existence of a secret facility and a team of operatives for exclusive monitoring of social networks such as Facebook and Twitter. But I've found evidence pointing out that these online communities might actually have been created by CIA for data mining and COINTELPRO operations on the internet.   Hosted  FEMA Concentration Camp, Beech Grove,  Indiana YouTube & Google Map: Emerson Ave, Beech Grove, Indiana and lists Domestic Spying, FBI, AT&T page Prodigal email, im, text scanning Darpa
Domestic Spying News    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Advanced Research and Development Activity Office     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  objects to CAPPS, no due process, easily circumvented.
  • Electronic Frontier Foundation working to protect civil and free speech  & lawsuit  
  • Epic  Electronic Privacy Information Center
  • FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW
  • CDC Center for Disease Control and Prevention.
  • Dept of Health and Human Services.
  • PrivacyDigest privacy news
  • Softswitch.org  to develop universal communications solutions over packet-based voice, data and video.
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
  • Biowatch, detect biological warfare threats. fear Bush.
  • Dept of Health and Human Services.
  • Dept of Homeland Security domestic spying
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Virage Inc Video analysis and contact extraction. Part of the Autonomy Group
  • Wikipedia IARPA Intelligence Advanced Research Projects Activity From Wikipedia, the free encyclopedia (Redirected from IARPA) The Intelligence Advanced Research Projects Activity (IARPA) is a United States research agency under the Director of National Intelligence's responsibility. In January 2008, Lisa Porter, an administrator at NASA with experience at DARPA, was appointed director 1] of the activity formed in 2006 from the National Security Agency's Disruptive Technology Office (DTO), the National Geospatial-Intelligence Agency’s National Technology Alliance and the Central Intelligence Agency’s Intelligence Technology Innovation Center. 2] Contents hide] 1 Goals 2 Program offices 3 The Metaphor Program 4 See also 5 References 6 Further reading 7 External links edit]Goals   ...   "IARPA's mission is] to invest in high-risk/high-payoff research programs that have the potential to provide the United States with an overwhelming intelligence advantage over future adversaries." – FBI National Press Release, 2009 3] The Director of National Intelligence in a September 2006 speech stated that the goal of the agency 4] is to conduct research that Cuts across multiple IC agencies; Targets new opportunities that lie in the white spaces between agencies; Provides innovations that agencies avoid because of current business models; and Generates revolutionary capabilities that will surprise our adversaries and help us avoid being surprised. Program offices    ...   IARPA is divided into three program offices, Smart Collection, Incisive Analysis, and Safe & Secure Operations. The goal of the Office of Smart Collection is to "dramatically improve the value of collected data from all sources." The Office of Incisive Analysis exists to "maximize insight from the information we collect, in a timely fashion." IARPA's third division, the Office of Safe & Secure Operations, exists to "counter new capabilities implemented by our adversaries that would threaten our ability to operate freely and effectively in a networked world." edit]The Metaphor Program    ...  The Metaphor Program is a two-phase project designed to first develop automated techniques for recognizing, defining and categorizing linguistic metaphors and then use that information to characterize differing cultural perspectives. The Program is headed by Heather McCallum-Bayliss. On May 2011, IARPA issued an open solicitation for private sector parties to participate in the Program
  • Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA). ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by the Director of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing. There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval. Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004. Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community. In December 2007, DTO was folded into the newly created IARPA  A move to a research park near the University of Maryland, College Park was announced at about the same time 2].

 

Amdocs, Israel Telecom Immunity   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  and NSA lawsuit
  • Cryptome search Narus spy
  • DailyKOS EFF lawsuit, nationwide class action, AT&T Technician stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight
  • EFF State Secrets Act invoked on wiretapping lawsuit.  National Security Agency
  • Cryptome search Narus spy
  • DailyKOS EFF lawsuit, nationwide class action, AT&T Technician stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight
  • Moon of Alabama search terms: CDR, call detail records, usage behavior, mortgate data, credit card data, addresses, names, NSA took over Total Information Awareness Project, if you're against Bush are you a terrorist? Datamining, small groups, false tips, 
  • NoGW CIA
  • Scoop ISP, black box, NARUS, Model ST-6400, 
  • Notes, search terms: internet protocol Detail Record, analyzes data 'meaning' impeach bush
  • Serendipity: Timeline of CIA atrocities, School of the Americas, 
  • C/Net downloads
  • Findlaw NSA
  • Eric Umansky
  • Findlaw, Dean
  • Hoover's Narus
  • Liquid Matrix China asks Narus for tech to block VOIP calls.  
  • EFF State Secrets Act invoked on wiretapping lawsuit.  National Security Agency
  • Wired search Narus, Amdocs
  • Notes, search terms, EFF lawsuit against AT&T over their secret work with NSA, ST-6400, content triggers, Narus Insight, Ori Cohen, VDONet, JP Morgan Partners, Mayfied, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software, Sumisho Electronics, William P. Crowell, 
  • Schema-Root AIPAC, Weisman, search Rosen Franklin,
  • Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
  • New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005
  • Wired  stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight
  • Notes, search terms: internet protocol Detail Record, analyzes data 'meaning', voice recognition, business cards, social network analysis,
  • Amdocs search Narus
  • American National Union Should Hayden be confirmed or court-martialed
  • Comverse and Information Clearing House Carl Cameron report  and see CALEA
  • Comverse CEO resigns amid options probe, MORE below
  • Center for Strategic and International 
  • Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems.
  • Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems...more
  • Republicans who are against Bush spying are an irrelevant impotent and small group.
  • New York Times  NSA executive order authorizing data mining of phone calls and file Dec 16, 2005
  • Narus Board of Directors  Notes on Narus: Narus is a private company founded in 1997 by Ori Cohen, was  in charge of tech development for VDONet,  media streaming pioneer. It has venture funding from  investors including JP Morgan Partners, Mayfield, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software and Sumisho Electronics
  • WMR At first blush, the recent adoption by the House of Representatives of the Foreign Intelligence Surveillance Act Amendments Act, which gives telecommunications companies that illegally eavesdropped on the telephone conversations, faxes, text messages, and emails of Americans retroactive immunity from lawsuits from privacy-violated and aggrieved customers, would see to have little to do with the powerful American Israel Public Affairs Committee (AIPAC).  ...  However, the support for the bill by AIPAC's biggest boosters, including House Majority Leader Steny Hoyer of Maryland, whose sister, Bernice Manocherian, was an executive president of AIPAC, and Jane Harman, who was slated to become chair of the House Permanent Select Committee on Intelligence (HPSCI) but whose nomination was nixed by Speaker Nancy Pelosi after a Justice Department investigation of Harman's contacts with AIPAC  ....    To ensure a lock on the no retroactive lawsuit provisions, the man who became HPSCI chair, Sylvestre Reyes, supported the measure. He was joined by other AIPAC sure bets, including Brad Sherman (D-CA), Gary Ackerman (D-NY), Ellen Tauscher (D-CA), John Yarmuth (KY), Rahm Emanuel (D-IL), Jason Altmire (D-PA), and, for added measure Pelosi. full article
Auto Black Box     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • CDC Center for Disease Control and Prevention.
  • ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive?

 

  • Biowatch, detect biological warfare threats. fear Bush.
  • Dept of Health and Human Services.
  • Dept of Homeland Security domestic spying
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Virage Inc Video analysis and contact extraction. Part of the Autonomy Group
  • ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive? Probably never, but there's electronic data everywhere and that includes your car collecting digital evidence which might turn into the star witness to testify against you. You may not think about or be aware of your vehicle's event data recorder (EDR), yet it is constantly recording evidence like a plane's "black box" and is being used after a crash to explain why it happened.   Way back in 2006, the National Highway Traffic Safety Administration (NHTSA) mandated that all new vehicles be equipped with EDR "black boxes" by the 2013 model year PDF]. 85% of U.S. vehicles now have EDR devices that "must capture and preserve at least 15 types of crash data, including pre-crash speed, engine throttle, changes in forward velocity and airbag deployment times." Some capture 30 types of data.   What cars are equipped to narc on you? According to Crash Forensics, "As of 2011, GM vehicles as old as 1994 have accessible data, Ford vehicles as old as 2001 have accessible data, Chrysler vehicles as old as 2005 have accessible data, Toyota and Lexis vehicles as old as 2006 have accessible data, as well as some Isuzu, Fiat, Mitsubishi, Scion, Sterling, and Suzuki vehicles." You can also check this list PDF] or this list PDF] for vehicles with accessible EDRs.  Does that data about your driving belong to you or to insurance companies? It really depends where you have an accident since some courts have ruled the info belongs to the insurance companies and others have ruled the data belongs to drivers. As IEEE pointed out, "In the 37 states without EDR laws, there are no ground rules preventing insurance companies from obtaining the data-sometimes without the vehicle owner ever knowing that the data existed." John Tomaszewski, general counsel at TRUSTe, said "People should not relinquish their Fourth Amendment rights merely because of the location of their information." What about your right to plead the Fifth Amendment and not witness against yourself?
Automatic License Plate Recognition     top    MORE
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • DeathandTaxes
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia Automatic number plate recognition (ANPR;
  • Wikipedia Automatic number plate recognition (ANPR; see also other names below) is a mass surveillance method that uses optical character recognition on images to read vehicle registration plates. They can use existing closed-circuit television or road-rule enforcement cameras, or ones specifically designed for the task. They are used by various police forces and as a method of electronic toll collection on pay-per-use roads and cataloging the movements of traffic or individuals. ANPR can be used to store the images captured by the cameras as well as the text from the license plate, with some configurable to store a photograph of the driver. Systems commonly use infrared lighting to allow the camera to take the picture at any time of the day. 1] 2] ANPR technology tends to be region-specific, owing to plate variation from place to place. Concerns about these systems have centered on privacy fears of government tracking citizens' movements, misidentification, high error rates, and increased government spending.
  • DeathandTaxes  NEWS License plate readers enhance Big Brother’s intrusive gaze By DJ Pangburn 51 days ago This month the ACLU has launched a nationwide effort to demand information from police departments and other authorities about automatic license plate readers (ALPRs), arguing that they violate privacy. Are ALPRs yet another eye of Big Brother or is the ACLU’s freedom of information request much ado about nothing? “ALPRs are cameras mounted on stationary objects (telephone poles, the underside of bridges, etc.) or on patrol cars,” writes the ACLU. “The cameras snap a photograph of every license plate that passes them by – capturing information on up to thousands of cars per minute. The devices convert each license plate number into machine-readable text and check them against agency-selected databases or manually-entered license plate numbers, providing an alert to a patrol officer whenever a match or ‘hit’ appears.” As with drone technology, no longer do the watchmen have to try to be everywhere at once—they are everywhere at once. According to the ACLU, “When the ALPR system captures an image of a car, it also meta-tags each file with the GPS location and the time and date showing where and when the photograph was snapped.” The ACLU notes that often And often, the photograph of the license plate is also stored in a database. “The system gathers this information on every car it comes in contact with, not simply those to which some flag or ‘hit’ was attached.”
 
American Telecommunications Companies     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • EFF NSA Spying  The U.S. government with assistance from major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.   ...   News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of several members of Congress revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.    ...   The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed “this isn’t a wiretap it’s a country-tap.”
Apple, Iphone, Google Android     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • WMR April 22-24, 2011 -- I-Phone, Android back doors are courtesy of the NSA.    ...   News reports that Apple's I-Phone and I-Pads, as well as Google's Android operating system-enabled phones can track a user's location, as well as Internet activities, is nothing new, according to a well-placed intelligence source. In fact, the Apple and Google "spy ware" is courtesy of a deal struck with the U.S. National Security Agency (NSA), which is the ultimate recipient of the location and web data being collected by Apple and Google.    ...   NSA's aggressive insistence that it have "back door" access to state-of-the-art commercial communications products was on display in the 1990s when Britain's Ministry of Defense discovered eight different back doors installed in Windows 98 and subsequent releases of the operating system. Microsoft is a long-time partner of the NSA in ensuring that its products are accessible by the American eavesdropping agency.    ...   Although Britain's Government Communications Headquarters is a signals intelligence (SIGINT) partner of the NSA, a "rainbow team" representing computer security experts, drawn from multiple British government agencies. discovered the NSA back doors while conducting a security evaluation of Britain's latest tank battlefield system. While back engineering the Microsoft source code at their research facility at Farnborough, the team discovered the eight NSA back doors.    ...   Microsoft threatened legal action against the British government for what the firm considered to be the illegal examination of its source code. However, after the British government claimed Crown immunity and threatened to leak the information about the NSA back doors to the media, Microsoft backed down. Britain removed the eight back doors and was able to secure its tank and other battlefield systems from the NSA.    ...   Apple and Google, like Microsoft, have remained quiet about the surveillance capabilities of their products. WMR's intelligence source stresses that the silence from Apple and google is being directed by the actual developer of the surveillance back doors, the NSA.   
  • CNN  2012 Under Apple's patent, a traveler's phone would automatically send electronic identification to a TSA agent as soon as the traveler gets in line. While each traveler waits in line, TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler's phone would confirm to security agents that the traveler's ID had already been checked. Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the process. (See details on Apple's proposal in the photo gallery above.) The patent documents offer a surprising number of details which open doors to key questions about the system, but Apple declined to discuss the patent. The TSA wouldn't comment either on the viability of Apple's plan. But other government officials, aviation authorities and longtime industry experts say Apple faces at least three high hurdles if they want to see this idea to fruition. Verification Several experts say a key question that must be answered is: How would you prove that the phone is yours? In other words, how would you prove that the e-passport is actually you? To get around this problem, future phones or electronic ID may require some form of biometric security function -- like fingerprint matching. In general, passports must be designed to be difficult to copy. Recent security changes to U.S. passports have included a hidden radio frequency identification chip to hinder counterfeiters. The chip includes the same data as the paper passport, a unique chip ID number, a digital version of the passport holder's photo "which will facilitate the use of face recognition technology at ports-of-entry," according to the State Department website.
  • EFF NSA Spying  The U.S. government with assistance from major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.   ...   News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of several members of Congress revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.    ...   The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed “this isn’t a wiretap it’s a country-tap.”
Biosurveillance, Biowatch     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • CDC Center for Disease Control and Prevention.
  • Dept of Health and Human Services.
  • PrivacyDigest privacy news
 
CALEA Communications Assistance for Law Enforcement Act    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • ZD Net  search: Communications Assistance for Law Enforcement Act.
  • VOIP wiretapping
  • Wired  Fed step up push to tap internet phone calls
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
CAPPS   color coding airline passengers    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
Carnivore, DCS 1000, EtherPeek       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
Cell Site Tracking      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell-site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment.  ...
  • Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell-site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment.  ...   The decision by the 3rd U.S. Circuit Court of Appeals (.pdf) was not, however, an outright Obama administration victory. Lower courts, the three-judge panel wrote, could demand the government show probable cause — the warrant standard — before requiring carriers to release such data to the feds.    ...   The opinion does leaves the privacy issue in a legal limbo of sorts. The standard by which the government can access such records — which can be used in criminal prosecutions — is left to the whims of district court judges. Historical cell-site location information, which carriers usually retain for about 18 months, identifies the cell tower to which the customer was connected at the beginning of a call and at the end of the call.    ...   Lower courts across the country have issued conflicting rulings on the topic and will continue to do so without appellate guidance or congressional action. The Philadelphia-based court was the first appeals court to address the issue.    ...   The Obama administration argued a judge could force a carrier to produce cell-site data on a showing that the information was “relevant and material” to an investigation.   ...   But the appeals court, ruling in a narcotics case, said the Stored Communications Act, the law in question, was vague as to what standard was required.    ...   The court left open the possibility that it would revisit the case again and decide whether the constitution requires a warrant for the cell site data. The court said the statute itself could be interpreted as not requiring one.   ...   The judges did not directly address the constitutionality of the statute, said Kevin Bankston, a privacy lawyer with the Electronic Frontier Foundation, which weighed in on the case with a friend-of-the-court brief.
Census Bureau      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • WMR By Wayne Madsen According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received about the Arab population." The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claim it on a currency entry declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger Program Officer in identifying which language of signage, based on U.S. ethnic nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific language sign versus other cities only one copy." more
CODIS Collect DNA from every arrest     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes
  • Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes. CODIS was an outgrowth of the Technical Working Group on DNA Analysis Methods (TWGDAM, now SWGDAM) which developed guidelines for standards of practice in the United States and Canadian crime laboratories as they began DNA testing in the late 1980s. TWGDAM was sponsored by the FBI Laboratory which hosted several scientific meetings a year at Quantico, Virginia, to accelerate development of laboratory guidelines and peer-reviewed papers to support forensic DNA testing which was, to some, an unproven forensic tool. TWGDAM completed a white paper in October 1989 which provided conceptual and operational concepts for a Combined DNA Index System to share DNA profiles among crime laboratories similarly to automated fingerprint identification which had become commonplace in law enforcement during the 1980s. The FBI Laboratory began a pilot project with six state and local crime laboratories to develop software to support each laboratory's DNA testing and allow sharing of DNA profiles with other crime laboratories. The DNA Identification Act of 1994 formally authorized the FBI to operate CODIS and set national standards for forensic DNA testing. The TWGDAM guidelines served as interim standards until recommendations were provided by a DNA Advisory Board required under the Act. Although the Act was passed in 1994, CODIS did not become fully operational until 1998.  The CODIS database originally was primarily used to collect DNA of convicted sex offenders. Over time, this has expanded. Currently all fifty states have mandatory DNA collection from certain felony offenses such as sexual assault and homicide, and 47 states collect DNA from all convicted felons. Other states have gone further in collecting DNA samples from juveniles and all suspects arrested. In California, as a result of Proposition 69 in 2004, all suspects arrested for a felony, as well as some individuals convicted of misdemeanors, will have their DNA collected starting in 2009. In addition to this, all members of the US Armed Services who are convicted at a Special court martial and above are ordered to provide DNA samples, even if their crime has no civilian equivalent (for example adultery). Currently, the ACLU is concerned with the increased use of collecting DNA from arrested suspects rather than DNA testing for convicted felons. Along with the ACLU, civil libertarians oppose the use of a DNA database for privacy concerns as well as possible institutionalized discrimination policies in collection.
COFEE Computer Online Forensic Evidence Extractor      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW
  • Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that may have been used in crimes.  The COFEE, which stands for Computer Online Forensic Evidence Extractor, is a USB "thumb drive  Seattle Times  The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer's Internet activity, as well as data stored in the computer. 
Controlled Drug Users       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • WMR The Drug Enforcement Agency says it does track prescriptions of so-called controlled substances — including some mood-altering medications — but not all prescriptions made in the United States." The issue is to what extent does the DEA track prescription drug users and what prompted the government to check on records pertaining to Cho Seung-hui, who was reported to have been treated for mental problems in the past? The Psychotropic Substances Act of 1978 added mind-altering drugs to the list of official Controlled Substances. Prescriptions for these controlled substances have a "DEA Number" used for tracking controlled substances. The Cho incident and the comments and quick retractions by "senior federal officials" indicate that there is a secret federal government capability to track controlled drug users.
DARPA, IPTO, BICA, LifeLog, Forester, Virat, RSTA       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
 
  • Wikipedia Information Innovation Office) Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived. 3] 4] 25] Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies only be used for military or foreign intelligence purposes against foreigners. 26] TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the Disruptive Technology Office (run by to the Director of National Intelligence). They are funded by National Foreign Intelligence Program for foreign counterterrorism intelligence purposes. One technology, codenamed "Basketball" is the Information Awareness Prototype System, the core architecture to integrate all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by SAIC through its former Hicks & Associates consulting arm run by former Defense and military officials and which had originally been awarded US$19 million IAO contract to build the prototype system in late 2002. 27] The other project has been re-designated "TopSail" (formerly Genoa II) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005. edit]Media coverage and criticism  ....   The first mention of the IAO in the mainstream media came from The New York Times reporter John Markoff on February 13, 2002. 28] Initial reports contained few details about the program. In the following months, as more information emerged about the scope of the TIA project, civil libertarians became concerned over what they saw as the potential for the development of an Orwellian mass surveillance system. On November 14, 2002, The New York Times published a column by William Safire in which he claimed " TIA] has been given a $200 million budget to create computer dossiers on 300 million Americans." 29] Safire has been credited with triggering the anti-TIA movement. 30]
    • BICA: project to create "Biologically Inspired Cognitive Architectures"
    • Bootstrapped Learning: a project to bring about "instructable computing" by driving the creation of machine learning algorithms that are responsive to models of human-to-human instruction
    • LifeLog, an IPTO project "to trace the 'threads' of an individual's life in terms of events, states, and relationships" by creating "an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities."
    • FORESTER: a program to develop a helicopter-borne radar system that can detect soldiers and vehicles moving underneath folliage cover
    • VIRAT: analysis and storage of video surveillance data
    • Deep Green: U.S. Army battlefield decision-making support system
    • Heterogeneous Urban RSTA Team: aerial surveillance program designed to monitor cities with self-directed UAVs
    • High Productivity Computing Systems: project for developing a new generation of economically viable high productivity computing systems for national security and industry in the 2007 to 2010 timeframe
Digital TV       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • ISP Planet news
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.
 
There is a connection between NSA phone records database , Amdocs and 9/11.
DNA databases       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
 
Drones & Balloons, HART/HURT   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia The Heterogeneous Aerial Reconnaissance Team (HART) -- formerly known as the "Heterogeneous Urban RSTA Team (HURT)" -- program was an aerial surveillance project funded by the Information Processing Technology Office (which was merged into the Wikipedia Information Innovation Office) of the Defense Advanced Research Projects Agency with program managers John Bay and Michael Pagels. The purpose of the program was to develop systems that could provide continuous, real-time, three-dimensional surveillance of large urbanized areas, using unmanned aerial vehicles. The project team was led by Northrop Grumman corporation, and involved several other academic and corporate researchers.The unique features of the HART program are that it developed systems to "decouple soldiers from flight control" -- that is, the UAVs automatically pilot themselves—taking care of flight control, collision prevention, and camera/sensor control automatically. When the drones notice suspicious activity, they notify the person with the HART control panel so that they can monitor the situation. Another feature of HART was to design handheld devices, to display surveillance video to small unit leaders in the field (as opposed to only being available to officers/agents in a control room). A third significant feature is that troops can request surveillance in an area, and a set of drones will automatically come over and take care of it themselves—all the soldiers have to do is ask for it, and then they can forget about it.
and also see Totse Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Remember FBI wiretaps of Martin Luther King, 

What are connections between Amdocs, Narus (Semantic Traffic Analysis) and NSA phone records database?  Tony Snow, Carl Cameron, FoxNews report on Israeli art students removed?  Why?

Drug Testing       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
DSL Internet Service  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Echelon       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Einstein, Network Infrastructure Security, Deep Packet Inspection
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • RipoffReport Certifion   Certifion Corporation - Locate America ripoff company made additional charges of $60+ to my credit card without my permission Internet *Editor's Suggestions on how to get your money back into your bank account!
  • notes: Accurint, ChoicePoint's Autotrack or LexisNexis
  • GlobalResearch  Under the rubric of cybersecurity, the Obama administration is moving forward with a Bush regime program to screen state computer traffic on private-sector networks, including those connecting people to the Internet, The Washington Post revealed July 3.
  • Certifion
  • Entersect a subsidiary of Certifion,
  • LocatePlus  claims it maintains 12 billion records about 98 percent of Americans.
  • Washington Post
  • notes Despite protests to the contrary by securocrats, like other Bush and Obama “cybersecurity” initiatives the Einstein program is a backdoor for pervasive state surveillance. Government Computer News reported in December 2008 that Marc Rotenberg, the executive director of the Electronic Privacy Information Center (EPIC) said that “the misuse or exposure of sensitive data from such a program Einstein] could undermine the security arguments for surveillance.”
  • WMR "... WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion dollar project called the "Einstein" program.  ...   Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from intrusion by outsiders.   ...  In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal government's computer and network security.   ...   Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team (US-CERT) of the National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths, protocols, source and destination IP addresses, source and destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the text of messages and not the header data." full story ... more search terms: PINWHEEL, PINWALE, GCSB, New Zealand, private sector surveillance, black projects, .com, .edu, .int, .gov, .mil, FCC, black budgets, Vodaphone, cellular phone eavesdropping, Greece, locked field, trap door, sub system,
  • GlobalResearch Called the “flagship system” in the national security state’s cyber defense arsenal, The Wall Street Journal reports that Einstein is “designed to protect the U.S. government’s computer networks from cyberspies.” In addition to cost overruns and mismanagement by outsourced contractors, the system “is being stymied by technical limitations and privacy concerns.” According to the Journal, Einstein is being developed in three stages: Einstein 1: Monitors Internet traffic flowing in and out of federal civilian networks. Detects abnormalities that might be cyber attacks. Is unable to block attacks. Einstein 2: In addition to looking for abnormalities, detects viruses and other indicators of attacks based on signatures of known incidents, and alerts analysts immediately. Also can’t block  attacks. Einstein 3: Under development. Based on technology developed for a National Security Agency program called Tutelage, it detects and deflects security breaches. Its filtering technology can read the content of email and other communications. (Siobhan Gorman, “Troubles Plague Cyberspy Defense,” The Wall Street Journal, July 3, 2009)
Electronic Passport, top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight, 
Email Surveillance, top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight, 
Entersect       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • RipoffReport Certifion   Certifion Corporation - Locate America ripoff company made additional charges of $60+ to my credit card without my permission Internet *Editor's Suggestions on how to get your money back into your bank account!
  • notes: Accurint, ChoicePoint's Autotrack or LexisNexis
  • Certifion
  • Entersect a subsidiary of Certifion,
  • LocatePlus  claims it maintains 12 billion records about 98 percent of Americans.
  • Washington Post
  •  
  • WayneMadsenReport An April 2, 2008 article in The Washington Post by Robert O'Harrow that reported on the expansion of intelligence "fusion centers" around the country that are compiling personal information on Americans from a CIA database called "Proton," the FBI, police departments, and private data mining firms referred to a little-known private data company called Entersect, which is routinely tapped by Maryland law enforcement and homeland security entities.  ...  The Post article stated that Entersect has 12 billion files on 98 percent of Americans. Entersect is headquartered in Santa Ana, California and is a subsidiary of Certifion Corporation, which is, in turn, a wholly-owned subsidiary of LocatePlus Holdings Corporation. LocatePlus' other subsidiaries are LocatePlus Corp., Dataphant, Inc. (which acquired Voice Power Technology, Inc.), and Metrigenics, Inc., a biometrics firm.
  • WMR  NSA / Trailblazer   More high-level fraud at NSA uncovered    January 18-19, 2012 --   WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.    ...   When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.    ...   There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.    ...   At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.    ...   The following press release was issued on May 12, 2005: "Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . . OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."    ...   Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.     ...   Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZERcontract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.    ...   Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.    ...   One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."    ...   Among the spin-offs of TRAILBLAZERwas the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.    ...   Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.    ...   Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."
EZPass       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • AP Yahoo story below
  • MotorAuthority  Kapsch has a ten-year agreement in place to provide transponders for 22 electronic toll systems across the United States. Kapsch’s latest patent filing is for a transponder equipped with a multi-function camera system, for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car.
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • MotorAuthority  Automated toll transponder systems, like EZ Pass used in the Northeast, make life easier for those who commute on toll roads, across bridges and through tunnels. Despite initial paranoia over the devices’ ability to track your speed from one point to another, no tickets have ever been issued to motorists who arrived at a toll plaza early, courtesy of a heavy right foot. With that in mind, there are two ways to look at the latest advance in transponder systems: it’s either no big deal, or it’s the stuff of an Oliver-Stone-film-induced nightmare. Kapsch TrafficCom AG is an Austrian company that manufactures transponders for programs such as EZ Pass. In fact, Kapsch has a ten-year agreement in place to provide transponders for 22 electronic toll systems across the United States. Kapsch’s latest patent filing is for a transponder equipped with a multi-function camera system, for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car.
Facial Recognition       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
FBI Tracking Devices      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The device is similar to the one Yasir Afifi found underneath his car.
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • AP Yahoo story below
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The device is similar to the one Yasir Afifi found underneath his car. If you're curious where this one came from, Wired has posted a writeup about Kathy Thomas, the woman who found this tracker under her car. They've also posted a video of Kyle doing the teardown.   ...  The device comprises of a GPS unit for receiving the car's position, an RF transmitter for relaying your location to the interested authority (aka the FBI), and a set of sweet D-cell batteries that power the whole enchilada. But we didn't stop there, of course. Read on to find out exactly what components make this secretive device tick.    ...   Disclaimer: We love the FBI. We've worked with them on several occasions to fight crime and locate criminals. We've helped them with instructions on gaining entry into certain devices. We have nothing against them, and we hope they don't come after us for publishing this teardown.
FBI Surveillance      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
FEMA secret databases    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • FBI
  • FDIC
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliance with the BSA and the implementing regulations 31 CFR 103. The FDIC monitors compliance with the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA compliance is a safety and soundness issue due to the reputational, regulatory, legal, and financial risk exposure to the bank for being involved in money laundering schemes or willfully violating the BSA statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings. Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance.
  • Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML") or jointly as “BSA/AML”. 1]
FDIC Bank Transaction Surveillance    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • FBI
  • FDIC
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliance with the BSA and the implementing regulations 31 CFR 103. The FDIC monitors compliance with the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA compliance is a safety and soundness issue due to the reputational, regulatory, legal, and financial risk exposure to the bank for being involved in money laundering schemes or willfully violating the BSA statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings. Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance.
  • Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML") or jointly as “BSA/AML”. 1]
FirstFruits, Warrantless Surveillance of American Journalists       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Summary
  • NSA listening to private conversations of  Americans, data mining, blackmail? ABCNews , Senate Intelligence Committee, Jay Rockefeller investigating. 
  • FIRSTFRUITS NSA wiretaps of American Journalists, program revealed by Wayne Madsen, name of program then changed.  WMR  Higher Than Top Secret
  • Daily Newscaster Martial Law Training, Indianapolis --- June, 2008
  • Neil Entwistle, 911, FAA, NORAD, Ptech, foreknowledge of 911 communication systems role in 911, convicted of murder, questionable trial, proceedings.
 
  • Cnet Tech News First
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • AP Yahoo story below
  • notes: WMR has learned from additional National Security Agency (NSA) sources that this editor's (Madsen) communications -- cell phone, e-mail, text messages, and faxes -- are under a full digital interception order by the NSA. Previously, I was informed by NSA sources that a "full digital" surveillance package was authorized on all my communications.  ...   It is becoming apparent that the "Eyes Only"/compartmented code word program authorized by President George W. Bush and Vice President Dick Cheney in the wake of the 9/11 attacks included warrantless surveillance of American journalists and their sources. WMR exposed the existence of a database containing journalist surveillance data that was code-named "FIRSTFRUITS" before the code name was changed after our disclosure.
  • ABCNews  
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • UPI  file  In order that the database did not violate United States Signals Intelligence Directive (USSID) 18, which specifies that the names of "U.S. persons" are to be deleted through a process known as minimization, the names of subject journalists were blanked out. However, in a violation of USSID 18, certain high level users could unlock the database field through a super-user status and view the "phantom names" of the journalists in question. Some of the "source" information in FIRSTFRUITS was classified—an indication that some of the articles in database were not obtained through open source means. In fact, NSA insiders report that the communications monitoring tasking system known as ECHELON is being used more frequently for purely political eavesdropping having nothing to do with national security or counter terrorism.
  • WMR  Higher Than Top Secret  "One of the most classified surveillance programs in the Bush administration was so limited in access only very few individuals, including President George W. Bush, Vice President Dick Cheney, Cheney Chief of Staff David Addington, CIA director Michael Hayden, FBI director Robert Mueller, then-White House Chief of Staff Andrew Card, and three successive Attorneys General -- John Ashcroft, Alberto Gonzales, and Michael Mukasey -- know of its existence.  ...   Known by a code word, sometimes abbreviated, following the classification TOP SECRET - EYES ONLY and which was contained on some files that Gonzales took home with him and kept in an unsecured manner against Justice Department regulations, the warrantless National Security Agency (NSA) surveillance program was so beyond legality that acting Attorney General James Comey refused to re-certify it upon its expiration in March 2004. There is a strong possibility that the code word program was connected to the NSA surveillance program aimed at tracking down leaks of classified information to the media from government sources. The leak tracking program was code named FIRSTFRUITS. Due the program's revelations by WMR, NSA has renamed the operation with a new code word. Previously, WMR learned from an informed source that part of the domestic surveillance system may have also involved a Federal Emergency Management Agency (FEMA) database of suspect Americans. The database is called Main Core. "
  • DailyKOS "Apparently, they've also been spying on other members of the government who may have been potential whistleblowers, journalists and even members of Congress. ... NSA spied on its own employees, other U.S. intelligence personnel, and their journalist and congressional contacts. WMR has learned that the National Security Agency (NSA), on the orders of the Bush administration, eavesdropped on the private conversations and e-mail of its own employees, employees of other U.S. intelligence agencies -- including the CIA and DIA -- and their contacts in the media, Congress, and oversight agencies and offices. ... The journalist surveillance program, code named "Firstfruits," was part of a Director of Central Intelligence (DCI) program that was maintained at least until October 2004 and was authorized by then-DCI Porter Goss. Firstfruits was authorized as part of a DCI "Countering Denial and Deception" program responsible to an entity known as the Foreign Denial and Deception Committee (FDDC). Since the intelligence community's reorganization, the DCI has been replaced by the Director of National Intelligence headed by John Negroponte and his deputy, former NSA director Gen. Michael Hayden."
  •  Wired blog  "Inside Operation Highlander: the NSA's Wiretapping of Americans Abroad  ...   A top secret NSA wiretapping facility in Georgia accused of spying on Americans illegally was hastily staffed with inexperienced reservists in the months following September 11, where they worked under conflicting orders and with little supervision, according to three former workers at the spy complex.   ...    "Nobody knew exactly what the heck we were doing," said a former translator for the project, code named Highlander, who spoke on condition of anonymity. "We were figuring out the rules as we were going along."   ...   Former Army Reserve linguist Adrienne Kinne, who worked at the facility at Fort Gordon, won new attention this week for her year-old claim that she and her group intercepted and transcribed satellite phone calls of American civilians in the Middle East for the National Security Agency. Senate intelligence committee chair Jay Rockefeller (D-W.Va.) opened a probe into the alleged abuses after ABC News reported on them Thursday." Oct 2008
Garden Plot, Blog Tracking        top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*

Go to Bush / Obama warrantless surveillance of American Journalists...program: FirstFruits

 

  • Wikipedia The Operation Garden Plot is a map of the U.S. Army and the National Guard of the United States to respond to major disasters in civil society within the United States. The plan was developed in the 1960s to respond to civil disorder and is now under the control of Northern Command ( NORTHCOM ). It allows the military to help U.S. federal law enforcement to assist local governments in the States of the United States for public order problems. Operation Garden Plot was implemented to provide military assistance to civil authorities during the attacks of September 11, 2001 in New York triggering the operation Noble Eagle Protection airspace. The Pentagon has also developed this project to restore public order during the 1992 riots in Los Angeles . "The monitoring of these missions on national security should be provided by the NGB (National Guard Bureau) based on the model" Garden Plot "to which National Guard units are trained and equipped to support our missions to the civil authorities Crowd control problems and maintaining public order. " 1
  • AngelBabe43 Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Garden Plot is the program to control the population. Cable Splicer is the program for an orderly takeover of the state and local governments by the federal government. FEMA is the executive arm of the coming police state and thus will head up all operations. The Presidential Executive Orders already listed on the Federal Register also are part of the legal framework for this operation.
  • WMR has been investigating a covert operation involving active duty and reserve U.S. military personnel who infiltrate anti-war groups in the United States, particularly Iraq and Afghanistan veterans groups opposed to the Bush administration's war policies.  The move by the Bush administration appears to be a resurrection of Operation Garden Plot, a 1960s program that saw the use of National Guard units to quell civil disturbances in the United States, in addition to the infiltration of anti-war groups by National Guard and Reserve intelligence personnel.  
  • WMR On April 11, 2002, Major General (ret.) Richard Alexander, the executive director of the National Guard Association of the United States, tipped his hand on Garden Plot when he testified before the Senate Appropriations Committee on Homeland Defense. Alexander stated, "Oversight of these homeland security missions should be provided by the National Guard Bureau based on the long-standing Garden Plot model in which National Guard units are trained and equipped to support civil authorities in crowd control and civil disturbance missions."  The governing directive for Garden Plot is Department of Defense Civil Disturbance Plan 55-2, Garden Plot. The Air Force implements Garden Plot in United States Air Force Civil Disturbance Plan 55-2, Garden Plot, dated July 11, 1984, while the Army implements Garden Plot with Department of the Army (DA) Civil Disturbance Plan - GARDEN PLOT, dated March 1, 1984.  Acting in coordination with the FBI's Domestic Counter-Intelligence Program (COINTELPRO), military intelligence agents infiltrated anti-war groups like the Vietnam Veterans Against the War (VVAW).  

 

Geographic Information Systems GIS       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
GPS Location Technology       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Health Information Systems       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • History of the Internet DARPA
  • Tetradyne Jeffrey Engel, M.D. State Epidemiologist NC DHHS, Division of Public health  Presentation – NC initiatives Homeland Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHHS to "establish an operational national epidemiologic surveillance system for human health, with international connectivity where appropriate,
  • Tetradyne Biosurveillance:: Big Brother or Homeland Security? Jeffrey Engel, M.D. State Epidemiologist NC DHS, Division of Public health  Presentation – NC initiatives Homeland Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHS to "establish an operational national epidemiologic surveillance system for human health, with international connectivity where appropriate, that is predicated on State, regional, and community-level capabilities and creates a networked system to allow for two-way information flow between and among Federal, State, and local government public health authorities and clinical health care providers." Key Terms Operational: organizational expertise and resources that produce real information products as early as possible National: emphasis is on the national picture and reflects a gap in nationwide perspective International connectivity: this national picture should look toward early detection and characterization of external threats to human health that could be imported Predicated on…build first on what exists and establish current capabilities
Insurance Inspection, satellite       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Internet Traffic Analysis   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*

 

 

  • CBS down
  • C/Net downloads, spyware
  • Findlaw, Dean
  • History of the Internet DARPA
  • Info / Law, Harvard Blog filtering, modes of internet regulation: code, law, markets, and social norms  LINKS
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • MSNBC  VOIP Blocking
  • Narus Bill Crowell,  past positions have included President and Chief Executive Officer of Cylink, a leading provider of e-business security solutions as well as a series of senior positions at the National Security Agency, including Deputy Director of Operations and Deputy Director of the Agency
  • New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005
  • OpenNet Initiative, search Narus
  • Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight, 
  • Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
  • Skype VOIP blocking
  • USA Today NSA has massive database of Americans' phone calls
  • Vonage search VOIP blocking
  • Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room  ... Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."
  • Are Republicans who oppose Bush warrantless spying  irrelevant and impotent?
  • Center for Strategic and International
  • Comda Ltd. Israel
  • ComSign, Israel
  • Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems...more
  • Republicans who are against Bush warrantless spying are an irrelevant impotent.
  • Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
  • Mathaba search content based billing, VOIP  blocking
  • Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems.
  • Narus / Verisign  IP lawful intercept
  • NICE, Shami, Shamir, Oz, Cohen, Huberman,  Menkes, Shaul, Zaltzman, Eidelman, Gorev, Ginat ...
  • Verisign Sclavos, Evan, Korzenliewski, Lin, Balogh, Haddad, McLaughlin, Ulam, Bidzos, Chenevich, 
  • Verso Technologies Inc, VOIP Blocking

 

  • PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ...
    Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS
    The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform mass surveillance and monitoring of public and corporate Internet communications in real time. Common Dreams ...
    Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), AdvancedIO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change,
Infragard   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
ISP Surveillance   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • DigitallyMediatedSurveillance Ohm asserts that we should focus on individual harms stemming from surveillance and recognize that technological, economic, and ethical forces all point towards a “storm of unprecedented, invasive ISP monitoring” (4). He maintains that ISPs oversell their ability to anonymize collected data, that providers’ claims of needing to more deeply inspect content are suspect, and that we should distrust suggestions that users and ISPs have entered consensual agreements around DPI-based surveillance. To determine the risk of individual harms stemming from surveillance, ISPs and regulators should adopt a three-step process that asks how sensitive is the information at risk, whether there there been harmful breaches in the past and if so, requires policymakers to make predictions about the future. ...   Critically, “anonymity cannot effectively address the harm to the sense of repose. The harm comes from the fear that one is being watched. It can result in self-censorship. It is not the kind of harm that is easily offset by hypertechnical arguments about encryption and one-way hash functions” (49). Thus, novel surveillance systems like DPI must be (largely) restricted to preventing hacking and viral outbreaks and traditional monitoring systems that cannot capture personal information relied upon for network management. Most importantly, Ohm argues that privacy, freedom, liberty, and autonomy must be introduced into the otherwise technocratic discussions of network neutrality and management to ensure that ISPs’ networks facilitate these key democratic values.
Libery Alliance Project   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • History of the Internet DARPA
  • ISP Planet news
  • Wikipedia  The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies,
  • Security Focus News Microsoft
  • SecureLab Computer security news and consulting
  • USA Today NSA has massive database of Americans' phone calls
  • Wikipedia  The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies, educational organizations and governments from around the world, as well as hundreds of additional organizations that participate in Liberty's various open community Special Interest Groups (SIGs). It has released Frameworks that address Federation (since contributed to OASIS for the SAML standard), Identity Assurance, Identity Governance, and Identity Web Services, as various services applications. It has also been active in privacy and policy issues relative to identity. As of 2006, the Liberty Alliance has tracked well over one billion Liberty-enabled identities and devices in fields as diverse as defense & law enforcement to telecommunications to egovernment. Management Board members include AOL, British Telecom, Computer Associates (CA), Fidelity Investments, Intel, Internet Society (ISOC), Novell, Nippon Telegraph and Telephone (NTT), Oracle Corporation and Sun Microsystems. As of June 2009, the work of the Liberty Alliance is transitioning to the Kantara Initiative.
MATRIX  Multi-State Anti-Terrorism Information Database, NCTC top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • OccupyCorporatism American has quickly grown into a big brother control and surveillance nation. Internet Service Providers (ISP) will begin the biggest civilian surveillance operation in history. On July 12, 2012, your ISP will be watching your movements on the internet. They will profile your activity and report to the Motion Picture Association of American (MPAA), Recording Industry Association of America (RIAAA) and National Security Agency (NSA) under direction of the Obama administration. Their goal: to penalize as many internet users as it takes to justify their infringement on our right to freedom of information.   ...   A facility in Utah has been built to assist the NSA and CIA in spying more efficiently on Americans. Every mode of communication (i.e. text messages, emails, phone calls, internet activity, etc . . . ) will be recorded, deciphered and filed for use at the distraction of the US government.   ...   Department of Justice Attorney General Eric Holder has signed new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.
Microsoft Explorer   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Rupert Murdoch   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia Murdochgate The News International phone-hacking scandal — dubbed "Hackgate", "Rupertgate", or "Murdochgate" by the press — is an ongoing controversy involving the defunct News of the World and other British newspapers published by News International, a subsidiary of News Corporation. Employees of the newspaper were accused of engaging in phone hacking, police bribery, and exercising improper influence in the pursuit of publishing stories. Investigations conducted from 2005–2007 concluded that the paper's phone hacking activities were limited to celebrities, politicians and members of the British Royal Family. In July 2011, it was revealed that the phones of murdered schoolgirl Milly Dowler, relatives of deceased British soldiers, and victims of the 7/7 London bombings were also accessed, resulting in a public outcry against News Corporation and owner Rupert Murdoch. Advertiser boycotts contributed to the closure of the News of the World on 10 July, ending 168 years of publication. 1] Continued public pressure later forced News Corporation to cancel its proposed takeover of the British telecommunications company BSkyB. British prime minister David Cameron announced on 6 July 2011, that a public inquiry would look into the affair after police investigations had ended. On 13 July 2011, Cameron named Lord Justice Leveson as chairman of the inquiry, with a remit to look into phone hacking and police bribery by the News of the World, while a separate inquiry would consider the culture and ethics of the wider British media. 2] He also said the Press Complaints Commission would be replaced "entirely". 1] The inquiries led to several high-profile resignations, including Dow Jones chief executive Les Hinton; News International legal manager Tom Crone; and chief executive Rebekah Brooks. The commissioner of London's Metropolitan Police Service, Sir Paul Stephenson, also resigned his post. Former News of the World managing editor Andy Coulson, former executive editor Neil Wallis, and Brooks were all arrested. Murdoch and his son, James, were summoned to give evidence before the Leveson Inquiry.
  • WMR July 14-15, 2011 -- Murdoch intelligence-gathering network extended to U.S. Congress   ...   U.S. Congressional sources have confirmed to WMR that the U.S. Capitol Police and other congressional officials shared sensitive information on members of Congress with Rupert Murdoch's media outlets in Washington, including Fox News, in a manner similar to the situation in the United Kingdom where reporters for Murdoch's now-defunct News of the World bribed British law enforcement officials for sensitive information on public officials and private citizens.     ....   Representative Peter King (R-NY) has already leveled charges that News of the World reporters tried to bribe U.S. law enforcement officials for phone records and transcripts of wiretaps of victims of the 9/11 attack. King did not elaborate on why law enforcement would have found it necessary, in the first place, to wiretap the conversations of 9/11 victims and their surviving next-of-kin.    ...   On March 28, 2007, WMR first reported the relationship between the newly-appointed U.S. Senate Sergeant-at-Arms Terrance Gainer, who was formerly the chief of the U.S. Capitol Police, and Fox News in three highly-publicized incidents involving only Democratic members of the U.S. Senate and House of Representatives. The three incidents involved Fox News receiving information directly from Gainer on incidents involving then-Representative Cynthia McKinney (D-GA), then-Representative Patrick Kennedy (D-RI), and an aide to Senator Jim Webb (D-VA).    ...   After a highly-publicized scuffle involving McKinney and an aggressive U.S. Capitol Police officer, one in which McKinney was physically assaulted by the officer, Fox News was the first to report the incident. The media hype resulting from the incident resulted in a criminal referral to the US Attorney for the District of Columbia. Shortly after Gainer resigned as chief and his being appointed by Senate Democratic Majority Leader Harry Reid, Representative Kennedy was involved in a minor automobile accident on Capitol Hill. Again, Fox News was the first to receive the information about the incident and Gainer stated publicly that Kennedy should have been given a sobriety test by the Capitol cops.    ...   The third incident involved Phillip Thompson, the executive assistant to Virginia Democratic Senator Jim Webb, who was arrested by the Capitol Police at the Russell Senate Office Building for carrying a loaded pistol allegedly given to him by Webb. The Capitol Police enforced a DC law in force at the time that prohibited anyone other than law enforcement officers from carrying weapons in the District. Webb said he has a license to carry a concealed weapon in Virginia and Thompson, an ex-Marine, inadvertently carried the weapon into the building after dropping Webb off at the airport. WMR's March 2007 report stated: "Details of the Thompson] incident were leaked by the cops to Fox News and other neo-con outlets." WMR also reported that the leaks by US Capitol Police and Sergeant-at-Arms staff also occurred in the cases of McKinney and Kennedy.    ...    Gainer is a long-time Republican who unsuccessfully challenged incumbent Richard M. Daley, Jr. as the Republican candidate for Cook County (Illinois) State's Attorney in 1988. Gainer got his start in law enforcement as a rookie Chicago cop in 1968 where he helped put down riots at the Democratic National Convention, a melee that saw Chicago cops clubbing anti-Vietnam War protesters.    ...   As U.S. Senate Sergeant-at-Arms, Gainer is responsible for the installation and maintenance of the Senate's telecommunications networks and computer and other equipment, including those that handle Senators' e-mail, phone calls, faxes, Blackberry tweets, and photocopies of documents.    ...   Some members of Congress have indicated the investigation of Murdoch's News Corporation's information-gathering practices warrant a full-scale investigation in the United States. Senator Jay Rockefeller (D-WV) told CNN, "My bet is we'll find some criminal stuff . . . This is going to be a huge issue." Rockefeller said he may launch his own investigation. Perhaps he might want to start with the Senate's Sergeant-at-Arms and ask Harry Reid why he chose to appoint Gainer, a Republican, to the post after evidence surfaced that tied Gainer to leaks of law enforcement information to Fox News.    ...    In Britain, law enforcement officials, including royal guards, reportedly asked the News of the World for money in exchange for personal information about the Royal family, including Queen Elizabeth II, Prince Philip, Prince Charles, Duchess of Cornwall Camilla, Duchess of Cambridge Catherine, and others. While he was Chancellor of the Exchequer and Prime Minister, Gordon Brown was also subjected to private communication surveillance by private detectives who had a close relationship with law enforcement agencies, including Scotland Yard. 
NIST / NSA integration   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • SANS  2012 NIST Issues (Flawed) Draft Updates to Cybersecurity Guides (July 30, 2012) The National Institute of Standards and Technology (NIST) has issued updated versions of two publications aimed at helping federal agencies and private organizations protect their networks from attacks, intrusions, and malware infections. The Guide to Intrusion Detection and Prevention Systems and the Guide to Malware Incident Prevention and Handling for Desktop and Laptops have been updated to incorporate current best practices in cybersecurity. NIST is accepting public comment on the documents through August 31, 2012. The intrusion detection publication was originally released in February 2007 and has not been updated since then.   and NSA  NSA Director Asks Defcon Attendees to Help Defend Cyberspace (July 27 & 29, 2012) Speaking at the Defcon hacker conference, General Keith Alexander, who heads both the National Security Agency (NSA) and the US Cyber Command, asked attendees for help securing cyberspace. Alexander told those present that "In this room right here is the talent our nation needs to secure cyberspace," and spoke about the "superb" program called Defcon Kids, which guides kids in the direction of white-hat hacking. Alexander also told his audience that the NSA does not compile dossiers on US citizens. However, a former NSA employee speaking on a panel at the same conference said that the NSA does collect information about US citizens' email messages, tweets, online searches and other information.
  • Epic  New NIST/NSA Revelations Less than three weeks after the White House announced a controversial initiative to secure the nation's electronic communications with government-approved cryptography, newly released documents raise serious questions about the process that gave rise to the administration's proposal. The documents, released by the National Institute of Standards and Technology (NIST) in response to a Freedom of Information Act lawsuit, suggest that the super-secret National Security Agency (NSA) dominates the process of establishing security standards for civilian computer systems in contravention of the intent of legislation Congress enacted in 1987.    ...   The released material concerns the development of the Digital Signature Standard (DSS), a cryptographic method for authenticating the identity of the sender of an electronic communication and for authenticating the integrity of the data in that communication. NIST publicly proposed the DSS in August 1991 and initially made no mention of any NSA role in developing the standard, which was intended for use in unclassified, civilian communications systems. NIST finally conceded that NSA had, in fact, developed the technology after Computer Professionals for Social Responsibility (CPSR) filed suit against the agency for withholding relevant documents. The proposed DSS was widely criticized within the computer industry for its perceived weak security and inferiority to an existing authentication technology known as the RSA algorithm. Many observers have speculated that the RSA technique was disfavored by NSA because it was, in fact, more secure than the NSA-proposed algorithm and because the RSA technique could also be used to encrypt data very securely. ...   The newly-disclosed documents -- released in heavily censored form at the insistence of NSA -- suggest that NSA was not merely involved in the development process, but dominated it. NIST and NSA worked together on the DSS through an intra-agency Technical Working Group (TWG). The documents suggest that the NIST-NSA relationship was contentious, with NSA insisting upon secrecy throughout the deliberations. A NIST report dated January 31, 1990, states that    ...   The members of the TWG acknowledged that the efforts expended to date in the determination of a public key algorithm which would be publicly known have not been successful. It's increasingly evident that it is difficult, if not impossible, to reconcile the concerns and requirements of NSA, NIST and the general public through using this approach. more
  • Wikipedia  TIDES Translingual Information Detection, Extraction and Summarization (TIDES) developing advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages. 16] Outside groups (such as universities, corporations, etc.) were invited to participate in the annual information retrieval, topic detection and tracking, automatic content extraction, and machine translation evaluations run by NIST. 16]
 
NSA, Domestic phone records database,  NFU pages index
  • Issues to research
  • How is the internet and phone system tapped?   Narus
  • Are there ties between the recent NSA warrantless wiretapping and the old 'Israeli art students' revelations?  How does Comverse Infosys (Verint), Amdocs, Telrad, Israel fit?
  • How does it all tie back to 9/11?  FoxNews, Carl Cameron, Israeli art students?
  • What lawsuits are now pending? 
  • What are administrative subpoenas, National Security letters?
  • William T. Crowell, Narus Board of Directors, was Deputy Director of Operations of NSA.
  • Wired News, Mark Klein, Whistleblower Outs NSA Spy Room  ...more 
  • Israeli companies dominate phone billing and firewall markets
  • News

 

National Security Agency  NSA   top       and go to Amdocs
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  lawsuit, wiretap without a warrant on U.S. soil.  and NSA lawsuit
  • Center for Constitutional Rights New York, letter to Senate Intelligence Committee,
  • CommonDreams search terms: lawsuit, AT&T, submitted under seal, illegal electronic surveillance, Negroponte, Lt. General Keith Alexander (director of NSA), state secrets privilege used to deny info on NSA, phone and internet records turned over illegally without a warrant or suspicion of wrongdoing. class action, 
  • CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief Judge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would cause critical harm to U.S. national security.
  • Constant Pated, blog Narus STA-6400, state secrets, prove Bush broke the law.
  • John Conyers
  • CounterPunch, Bush wiretaps to identify whistleblowers. 
  • Dailykos Narus ST-6400
  • Detroit Free Press "U.S. District Judge Anna Diggs Taylor declared the administration's secret spying program unconstitutional and blocked the government from intercepting calls into this country from abroad that might involve terrorists without getting warrants from the Foreign Intelligence Surveillance Court.
  • Electronic Frontier Foundation working to protect civil and free speech, search AT&T lawsuit
  • Huffington Post NSA, amdocs, Hayden and Hayden "the sudden resignation of Goss as the Foggo sex scandal comes creeping centerwise provided the Department of Defense its best-yet opportunity to finally seize its long-time intelligence and covert operations rival for itself"
  • Indymedia
  • The Nation History and structure of global telegraphic surveillance 
  • NSAWatch formerly EchelonWatch, resources, surveillance networks, documents.
  • OpEdNews "Amdocs, Hayden, CIA, phone records, database, billing data, Israeli-based company, 9/11, students, Bobby Ray Inman, AT&T, BellSouth, Verizon, legality of surveillance, Sen. Spector
  • RawStory
  • Salon  Israeli art students, DEA, Amdocs searchable file
  • TimesOnline.UK "A report in the newspaper USA Today, which claimed that since the 9/11 attacks the National Security Agency (NSA) has secretly collected the records of billions of domestic calls, also cast doubt on the confirmation prospects for General Michael Hayden, Mr Bush’s choice to head the CIA"
  • TomPaine search: Bush's NSA Spying Defense
  • Wayne Madsen Report, exclusive1
  • Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room  ... Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."
  • BBC George W Bush personally stopped an inquiry into a controversial programme to monitor the phone calls and e-mails of Americans, a top official has said. Attorney General Alberto Gonzales said internal investigators wanted to look at the role justice department lawyers had played in drafting the programme
  • Findlaw, Dean, Bush's impeachability..
  • search terms: Amdocs, Hayden, CIA, phone records, database, billing data, Israeli-based company,
  • Use NSA data to mine all of Karl Rove's phone calls....right....
  • search terms: Hayden was architect of Bush's domestic spying program. The Federal Intelligence Security Act (FISA) is prohibited in monitoring people inside the U.S. without express permission of a federal judge.  Nixon era controls.  2005 Bush issued executive order undermining FISA.  
  • State secrets privilege defense says a lawsuit must be dismissed if it can't be litigated without the risk of exposing military secrets.  But there is political fallout from this.
  • How does all this tie back to Israel spying: Jonathon Pollard, Pentagon, Douglas Feith, Mega
  • Jurist, legal news and research, Bush used argument that warrantless was implicitly authorized by the resolution for the Authorization for the Use of Military Force in Afghanistan, but....more
  • Rense All US Phone Call Records And Billing Done In Israel - Part 2 Carl Cameron Investigates FoxNews.com 12-13-1
  • Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
  • Yahoo, BellSouth denies working with NSA.  Included in $200 billion lawsuit
  • Wikipedia
  • go to Amdocs
  • search internet: Tony Snow, FoxNews, Carl Cameron, Israeli Art Students.
  • also see Jonathan Pollard.com
  • Are Republicans who oppose Bush warrantless spying are an irrelevant impotent group?
  • AT&T lawsuit $200 billion
  • Amdocs  Israel, phone records database, Hayden
  • BellSouth
  • Cato Institute
  • Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • GOP search
  • GOP Insight search
  • Haaretz search
  • Heritage.org "....this critical counterterrorism effort isn't intrusive, illegal or unnecessary...?  commentary.  see Smith v. Maryland 1979. 
  • Markle Foundation
  • MiddleEast Info  discussion
  • Middle East Intelligence Bulletin  Daniel Pipes
  • Narus Semantic Traffic Analysis
  • Narus & Amdocs more below
  • Narus Board of Directors: William T. Crowell (DARPA, Markle Foundation, Cylink, Deputy Director of Operations NSA, Presidents Export Council on Encryption.  Also Yogen K. Dalal (Mayfield Fund), Andrew Kau (Walden International), Greg Oslan (CNET Inc, AT&T),  Tony Pantuso ( NeoCarta, GE), Shahan D. Soghikian (JP Morgan Partners).
  • National Institute for Public Policy, Iran policy
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • TMCnet  Amdocs, Israeli Business Arena Via Thomson Dialog NewsEdge,
  • Topix Amdocs DOX page
  • US-Israel.org
  • US News & World Report , Gergen rebuttal to "The Israel Lobby and U.S. Foreign Policy"
  • NSA 
  • Verizon
  • Walden Media, Walden International, Walden Israel Ventures II, Walden VC II, Ambex
  • Whitehouse  Bush
 
Summary of NSA issues
  • ABC News  Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." continued below
  • New York Times  and file   A  senior government official, granted anonymity to speak for publication about the classified program, confirmed on Friday that the security agency (NSA) had access to records of most telephone calls in the United States. The official said the call records were used for the limited purpose of identifying regular contacts of "known bad guys." The official would not discuss the details of the program, including the identity of companies involved.  lawsuit  (EFFsuit) see Amdocs / Narus 
  • New York Times  and file In 2004, more than 80 percent of the 463 billion domestic calls made in the United States were local, according to the Federal Communications Commission. Verizon said yesterday that "phone companies do not even make records of local calls in most cases because the vast majority of customers are not billed per call for local calls.".    but see Narus 
  • New York Times Because federal law protects the privacy of phone records in the absence of warrants, companies providing such records could face legal action. Yesterday in Manhattan, a class-action suit filed against Verizon after the USA Today article appeared was expanded to include BellSouth and AT&T as defendants, The Associated Press reported. It asked $200 billion in damages.
  • ACLU "The American Civil Liberties Union today strongly condemned a new proposal drafted by Senate Judiciary Committee Chairman Arlen Specter (R-PA) that embraces the president’s claims of inherent power to secretly wiretap Americans without meaningful checks. Also today, the organization renewed its request to the Justice Department’s Inspector General to open an investigation into the involvement of the department in the warrantless spying on Americans by the National Security Agency  ....  Specter’s new draft would replace a bill he had previously introduced, S.2453, the National Security Surveillance Act of 2006. The new version would pardon the president for authorizing the warrantless wiretapping of Americans, in violation of current criminal and intelligence laws. Specifically, the new bill would amend the Foreign Intelligence Surveillance Act (FISA) and the criminal code by allowing wiretapping at the direction of the president outside of those existing laws. This move would create a retroactive exception to criminal liability when warrantless wiretapping is done at the president’s direction under a claim of inherent authority."
  • ACLU v. NSA lawsuit:  "The ACLU is suing the National Security Agency for violating the U.S. Constitution. The illegal NSA spying program authorized by President Bush just after September 11, 2001, allows the NSA to intercept vast quantities of the international telephone and Internet communications of innocent Americans without court approval.  Without a system of checks and balances, the government can monitor any phone call or e-mail they want, and they can collect and disseminate any data they find however they like. Just knowing that the government is spying without cause on innocent Americans sends a chilling message to all of us that our conversations are not our own.  The NSA's warrantless surveillance must end and checks and balances be restored."
  • Information Clearing House on Fox News (Carl Cameron) investigative report and Eric Umansky BellSouth subcontracts with an Israeli company known as Amdocs to handle its billing, as do several other U.S. phone companies. In 2001, U.S. intelligence officials were on record as saying that the information that Amdocs handled was so valuable that a great deal could be learned if sophisticated data-mining techniques were used against that information -- Brit?    Information Clearing House  search Amdocs, Israeli art students.
  •  
  • Information Clearing House Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible.
  • see Amdocs / Narus  relationship
  • Information Clearing House, Carl Cameron report:  Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide.
  • Wired Blog:  One of the questions to emerge in press analysis of Wednesday's court hearing in the EFF's case against AT&T is whether the company might be legally immunized if the attorney general wrote a secret letter authorizing the alleged internet wiretaps.  Declan McCullagh at CNET News.com parsed the AT&T lawyer's oral arguments carefully, and concluded that the company may have received certification from the Justice Department under this section of Title 18 U.S.C. 2511
  • London's 7/7 where Visor Consulting headed up by the ex-spokesman of Scotland Yard Peter Power was conducting drills of a terrorist attack at the exact locations at the exact times where Verint Systems (Comverse) was running security and hasn't released the videos from inside the tube,
  • CommonDreams "FBI Plans New Net-Tapping Push"  search terms: new legislation that would require ISP's to create wiretapping hubs for police surveillance...introduced by Sen. Mike DeWine, Ohio Republican, CALEA
  • CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief Judge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would cause critical harm to U.S. national security.  search terms: Case 3:06-cv-00672-VRW  Document 308, Northern District of California, Tash Hepting et al Plaintiffs,v AT&T CORPORATION, et al Defendants.  AT&T Inc., violate First and Fourth Amendments to the Constitution, by illegally intercepting, disclosing, divulging and/or using plaintiffs' communications.  collaborating with the National Security Agency NSA in a massive warrantless surveillance program.  Section 109 of FISA, Section 802 of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, Section 705 of Title VII of the Communications Act of 1934, Section 201 of Title II of the ECPA, Seciton 201 of the Stored Commications Act, California Unfair Competition Law, Mark Klein, J. Scott Marcus, state secrets privilege, Negroponte, Alexander, 
  •      Click on pic to go to NFU Internet page
  • NSA ISP data mining, Narus   source:  Scoop  Are We Paranoid Enough Yet?  utunga.blogspot.com On 26 Jan 2006 I wrote:   Particularly scary is that the Patriot act gives the feds the right to basically march up to every ISP in the country and install special 'black boxes' doing] God only knows what and the ISP's cannot even mention this fact publicly let alone not comply... ********* Now we have confirmation from a whistleblower that this is exactly what they've been doing.

    "I learned that the person whom the NSA interviewed for the secret job was the person working to install equipment in this room," Klein wrote. "The regular technician work force was not allowed in the room." .. he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal," Klein wrote.The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers, according to Klein's statement.The secret room also included data-mining equipment called a Narus STA 6400... "  And what can we find out about the Narus 6400? Well the google cache appeared busted on the subject but the preview gives us this one sentence..

    Fully configured, the Model 6400 captures application-layer usage details via NARUS Semantic Traffic Analysis (STA) on up to six full-duplex 100 BaseTADVERTISEMENT (Update: Dailykos has since published an artice All About NSA's and AT&T's Big Brother Machine, the Narus 6400 which fills out a lot of the details).  In my opinion the key words here are "Semantic Traffic Analysis".   As I wrote previously:  Many people think ECHELON simply targets 'keywords'. However, based on patents filed by various government agencies you can assume it is *much* more sophisticated than that, for instance rudimentary 'language recognition' patents as well as 'topic classification' patents. The topic classification patent is especially interesting, because, if they are able to create a map of all the types of people / types of conversations that people have, then they can more easily filter out the 'Jana's having a baby!' conversations and zero in on the 'lets organize a march' conversation of radicals and other undesirables - oh, yeah, and those] "terrorists" and "drug dealers" - the only problem here is that to find the largest number of these in the most cost effective way all they would need to do is walk down the hall start arresting people.. The words semantic analysis are used somewhat differently in the patents I mention than in the technical specs for the Naurus 6400, but forgive me for assuming that the NSA has technology that is more advanced (by a small margin and in the same direction) than what is available to the general public.

    ********* I guess this casts the Google action in preventing DOJ into their data centers in a quite different light. As I said previously, this isn't about reading the query log - this was always about the right to install a room of 'black servers' right in the middle of the google data center. Google's actions in standing up to that are all the more laudable.  ********* Just to be crystal clear on this; at this time what we now have is clear evidence of (sophisticated) *monitoring and analysis* of internet and phone traffic - something we pretty much knew for a long time.  Thats very scary (and illegal, in my opinion), but its certainly better than actual direct government censorship of content on the internet ('chilling effects' on free speech aside).  On the pessimistic side, however, direct (but covert) censorship is probably the next obvious step once you have the right hardware installed in the key data centers.

    It may be that if you want to actually directly censor and block information all you need to do is control the choke points - which means ISP's (like AT&T) and not the search engines (like Google). However, it could well be that a more sophisticated (and probably more practical) form of censorship is to control the search engines. Certainly the Chinese found that controlling the search engine content was more effective (and subtle) form of censorship than outright blocks on entire search engines or particular websites.

    My suspicion (OK, its a total guess) is that, in the States at least, the NSA and other parts of the state/non-state military-technological apparatus are probably experimenting with the censorship of certain specifc pieces of information even right now. A good place for them to start might be, for instance, information about themselves, their methods and what they plan to do next.

    At this time I'm pretty sure that direct censorship or control of political discourse on the internet is something that organisations such as the NSA wouldn't consider themselves able to do. Despite all their technology and hardware, the number of bits to flip and the sheer volume of content to mechanically 'understand' and filter makes that effectively impossible. It can be argued that have achieved a high degree of success in the mass media - ask someone who's actually lived in the states for a few years and I'm sure you'll see what i mean - but its still too hard for them to control the discourse of 'blogosphere' directly at this stage - but you just wait and see.. as soon as they believe they can do this - they will. Furthermore, if 'they' are smart they won't give any indication that this is their next step until they are ready to go.  "The internet" may be the last truly free bastion of political free speech in the States at ths time.. and if that were to be closed down via a more sophisticated version of 'the chinese firewall" .. well God help us all.

    ENDS

  • NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider
    The Register  NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider ....   By Lewis Page • , 8th July 2010 09:20 GMT    ...   The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems.    ...   The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance.    ...   According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother".    ...   The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them.    ...   The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources.    ...   "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper.    ...   Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring.    ...   The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to.    ...   The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on.    ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ®
Open BSD FBI Backdoor  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ArsTechnica FBI accused of planting backdoor in OpenBSD IPSEC stack  ... In an e-mail sent to BSD project leader Theo de Raadt, former NETSEC CTO Gregory Perry has claimed that NETSEC developers helped the FBI plant "a number of backdoors" in the OpenBSD cryptographic framework approximately a decade ago.   ...  Perry says that his nondisclosure agreement with the FBI has expired, allowing him to finally bring the issue to the attention of OpenBSD developers. Perry also suggests that knowledge of the FBI's backdoors played a role in DARPA's decision to withdraw millions of dollars of grant funding from OpenBSD in 2003.   ...   "I wanted to make you aware of the fact that the FBI implemented a number of backdoors and side channel key leaking mechanisms into the OCF, for the express purpose of monitoring the site to site VPN encryption system implemented by EOUSA, the parent organization to the FBI," wrote Perry. "This is also probably the reason why you lost your DARPA funding, they more than likely caught wind of the fact that those backdoors were present and didn't want to create any derivative products based upon the same."   ...  The e-mail became public when de Raadt forwarded it to the OpenBSD mailing list on Tuesday, with the intention of encouraging concerned parties to conduct code audits. To avoid entanglement in the alleged conspiracy, de Raadt says that he won't be pursuing the matter himself. Several developers have begun the process of auditing the OpenBSD IPSEC stack in order to determine if Perry's claims are true.
Patriot Act       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*

 
 
 
Patriot Act       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Police Depts tracking protesters, Pre-crime surveillance       top    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • , info
  • National Security Agency 
RFID Technology       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • eWeek
  • EETimes
  • Intelnet news from 500 sources automated  
  • InfoWorld  for IT Managers
  • Internet News  for IT Managers
  • RFID, remotely storing and retrieving info from product stickers, tags, via radio signals.
  • Axalto, BearingPoint, Infineon, Supercom, passport chips contracts.  ICAO, Enhanced Border Security Act
  • Wikpedia, definition, info
Restroom taping       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy
Road Sensors       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Satellites       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FAS, Federation of American Scientists Project on Government Secrecy.
  • Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
  • search Beaulieu, Arctic Slope Regional Corp, Chenega Corp, ANSCA, NIMA, no bid contracts, roads in Alaska.
  • American Federation of Government Employees, Bush gave no-bid contracts for mapping project to Native Indian contractors.  (Union busting)
Search engines       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Google Desktop Search automatically reads and records locally Outlook e-mail, also saves copies of web pages, chat conversations in AOL IM, and finds Word Powerpoint and Excel files on your computer.  Google says it has no access.   But its multi-user  capabilities reveal security flaws. 
  • Wikipedia, National Geospatial Intelligence Agency
Stoplight Cameras       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
Synchronization, Knowledge Management and Intelligence Fusion       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Code Pink under surveillance by SKMIF,     
  • Schema-Root military intelligence, news feeds
  • Sen. Joe Dunn, tracking California National Guard spying on citizens
  • Veterans for Peace
  • San Jose Mercury News
  • SignOnSanDiego search
  • notes: National Guard Bureau investigating if SKMIF spied on citizens, protesters.  similar to Viet Nam era surveillance?
  • National Guard Bureau search legal division.
  • Synchronization, Knowledge Management and Intelligence Fusion unit.  Schwarzenegger
SWIFT,  Society for Worldwide Interbank Financial Telecommunication        top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU, National ID card,
  • EPIC  Electronic Privacy Information Center, National ID card,
  • Privacy International, Swift violated European and Asian data protection rules, fishing expedition, not a legally authorized investigation, 
  •  
  • Council of Europe, Strasbourg, 
  • San Jose Mercury News
  • European Union, Stras
  • Financial Times, SWIFT, bank transaction data mining,  "Tens of thousands of electronic searches have been conducted under a secret US programme to monitor global financial transfers for signs of terrorist activity" more search terms: Stuart Levy (under-secretary for terrorism and financial intelligence, US Treasury), SWIFT (Society for Worldwide Interbank Financial Telecommunication),  Bush used International Emergency Economic Powers Act to gain access to the data. 
  • People's Party, largest and most influential bloc in the European Parliament,  demand compensation, Swift did not seek approval from European authorities.
  • Wikipedia SWIFT, Terrorist Finance Tracking Program
  • CIA
  • FBI 
  • New York Times
  • Senate Republicans support warrantless wiretaps of international financial transactions.
  • SWIFT Society for Worldwide Interbank Financial Telecommunication, Brussels,
  • Terrorist Finance Tracking Program
TALON, Threat and Local Observation Notice       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  •  
  • Wikipedia, National Geospatial Intelligence Agency
  • Washington Post "TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead."  TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead."  ...   In 2006, authorities quietly launched Railhead, a project worth as much as $500 million over five years, to improve TIDE and eventually replace it and some related systems with technology that would significantly expand their capabilities.   ...  After more than a year and about $100 million, the Railhead project has become the focus of criticism from some counterterrorism analysts and contractors, who have said it does not provide the search capabilities they expected and appears to be behind schedule. One lawmaker has taken up those questions and publicly asked for an investigation by the inspector general of the Office of the Director of National Intelligence, saying his congressional staff has information from a contractor whistle-blower that shows the project is on the "brink of collapse," possibly threatening national security.
Terahertz Spectroscopy       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however.
Traffic Stop, drug sniffing  dogs       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
TRAPWIRE       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
US-VISIT       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • National Network for Immigrant and Refugee Rights
  • U.S. English
  • National Immigrants' Rights Project
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy
White House, 'web tracking bug'       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • AP  White House Tracking Bug
  • CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department
  • Dept of Homeland Security ID all immigrants, potential terrorists?
  • Fox
  • US Info search: collect biometric data on foreigners
 
Smile - You're on Candid Cable Surveillance Camera!  http://www.tbrnews.org/Archives/a2734.htm  The Voice of the White House  Washington, D.C., August 10, 2007: “How do they watch you? Let me count the ways. With the new surveillance law being voted in by a weak-kneed Congress, the useless AG, Gonzales can now listen to any conversation or read any email without a court order. I have several additional comments to be made on this subject. Let’ s consider a means by which you can be spied on without a warrant. The first is by using your very own television set to listen to you. Sounds fantastic? Another nutty blog idea? Think again. Here I am quoting from an in-house memorandum: ‘The methodology of using a commercial television set connected to a cable network system being used as a transmitter as well as a receive, allowing other parties to hear conversations conducted in the vicinity of the set utilizes the medium of a digital oscillator installed in television sets. This use is only for a set itself connected to a cable system. The additional use of a cable box connected to the television set is the only means by which the set can be used to listen to nearby conversations because these boxes are designed to feed back information through the cable system. This feedback makes it possible for a subscriber to cable to use his telephone to call the cable company for the inclusion of a special program to the subscriber’s system. The cable company is automatically able to ascertain the telephone number from the call and using that information, send the desired program to the television set via their network and the box. The subscriber code of the subscriber matches the data on the subscriber’s box. This makes the use of the box as an instrument of clandestine surveillance possible.. It is then possible for such information to be fed into other channels, including investigative ones. The use by private parties of the cable system to obtain clandestine information in this manner would be difficult if not impossible but the NSA and FBI techniques in other electronic surveillance matters are more than sufficient to ensure electronic eavesdropping. ••••••••••••

 

 WMR How 9/11 began the process of a massive grab by the government of personal data.  January 28-30, 2011
With the neo-fascist Republican Party now in charge of the House of Representatives, there is proposed data retention legislation that would give the FBI virtual unfettered access to stored Internet transactional data from a variety of service providers with or without a criminal predicate. Democrats like Debbie Wasserman-Shultz from Florida also support the proposed mandatory data retention legislation. Government "fishing expeditions" for personal data had its beginning in the weeks after 9/11. This hunger for personal data has culminated in a massive $1.5 billion National Security Agency data warehouse now under construction at Camp Williams in Utah.

Although NSA insists that it will have few analysts at its new data warehouse, the NSA Utah Data Center, the government's grab for Internet user data clearly shows intent by NSA to conduct more sophisticated forms of data mining, extraction, and analysis than NSA and other federal agencies sought in the weeks and months after 9/11. JetBlue provided passenger data to a firm called Torch Concepts, a defense contractor based in Huntsville, Alabama, that had major plans to apply military- and intelligence-level data analysis programs to the American public. American and Delta Airlines had rejected requests for their passenger data by Torch.

Torch's conclusions were that poorer people who did not live in their homes for a long period of time time posed a greater terrorist risk (passenger stability indicator) than wealthier long-term homeowners.

The Census Bureau is also vulnerable to seeing its massive databases acquired by NSA Utah for data mining purposes. This editor previously reported on the value of U.S. Census data to intelligence analysts in 2004:

HOMELAND SECURITY MINES CENSUS DATA FILES

Possible Violation of Federal Law

By Wayne Madsen

According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received about the Arab population."

The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claim it on a currency entry declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger Program Officer in identifying which language of signage, based on U.S. ethnic nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific language sign versus other cities only one copy."

The Branch Chief then assures Census, "the data obtained from Census was used only for the above purpose and subsequently has been purged from my files!" Although the Branch Chief's name was blocked out in the released documents, the names of two DHS officials involved in the Census data request, Jerome A. Walfish and Mark S. Ziner, were not redacted.

Privacy experts point out that the reasoning given by DHS for obtaining the Arab ancestry files has some major flaws. One, is why someone involved with Outbound operations would be concerned with entry currency declarations. Another is why DHS requested data files on Arab ancestry populations in New England that include a number of second, third, and fourth generation Maronite Christian Lebanese whose language is English and would, therefore, not require airport signage written in Arabic.

The confidentiality of U.S. Census data is established in federal law. Title 13 U.S.C. Section 9, states that U.S. census data is confidential. In addition, Title 13, U.S.C. Section 9 (a) (a) states that non-employees of the Census Bureau must take an "oath of non disclosure," and must be special sworn status (SSS) officers if they are from another department or agency. There is no indication that DHS personnel who viewed the confidential Census records were special sworn status officers of the Census Bureau.

DHS was particularly interested in a 2000 Census file denoting the "population of Arab ancestry" from all places in the United States with 10,000 or more population. The information would be helpful in the possible targeting by DHS of cities with large percentages of Arab-American citizens, particularly Dearborn, Michigan with a 30.01 percent Arab-American population; Bailey's Crossroads, Virginia, 0.69 percent; Hamtramck, Michigan, 9.39 percent; Dearborn Heights, Michigan, 7.86 percent; Bridgeview, Illinois, 7.18; Tyson's Corner, Virginia, 6.53 percent; and Lackawanna, New York, 5.83. Lackawanna is home to the "Lackawanna Six," six Yemeni-Americans who were convicted of aiding Al Qaeda. There were allegations of U.S. Justice Department prosecutorial misconduct in the case against the six, mainly that the government threatened to indefinitely jail the six in a military detention facility unless they voluntarily pleaded guilty to terrorism charges.

In addition, DHS was provided with very detailed Arab-American demographic data from the states of Massachusetts, Rhode Island, and New Hampshire, and the commonwealth territory of Puerto Rico. In the case of New Hampshire, the census data yielded some very definitive information on Arab-Americans broken down by ZIP codes into small towns and cities. In the case of Nashua, New Hampshire, the combined ZIP codes of 03060,03062, 03063, and 03064 indicates the presence of 269 Lebanese-Americans. This community of Maronite Christian Catholics includes some of New Hampshire's best-known politicians and their families, including current Republican Senator John E. Sununu and his three children and former Nashua Mayor Brenda Elias.

In the case of Salem, New Hampshire (ZIP code 03079), the 594 Lebanese Americans include former New Hampshire Republican Governor and chief of staff to former President George H. W. Bush, John H. Sununu, the father of Senator Sununu. In Bedford (ZIP code 03110), the 44 Lebanese-Americans in the town include members of the Sununu family. In the case of Dover (ZIP Code 03820), the Lebanese-American community includes Bill Shaheen, the husband of former Democratic Governor Jeanne Shaheen, and their three children. Jeanne Shaheen is currently the national co-chair of Senator John Kerry's presidential campaign.*

DHS also obtained specific breakdowns of Iraqi-Americans and Palestinian-Americans. In certain towns, where their respective populations are low, it would not be difficult for DHS to ascertain the identities of the individuals by family unit. Such are the cases with the Iraqi-American populations of the Massachusetts towns of Longmeadow (7 people), Andover (8 people), Cambridge (6 people), Chelsea (8 people), and East Providence, Rhode Island (5 people). The same situation applies to Palestinian-Americans in the census records where the breakdown shows 5 members of that ancestry in Springfield, Massachusetts and 3 in Londonderry, New Hampshire.

* Shaheen is now the senior Senator from New Hampshire.

 

 

 

 
anonymous
This administration likes to write memos to itself, justifying the most horrendous acts. Wars of aggression, torture, assassination, the destruction of 800 years of our common law heritage (habeas corpus), and 250 years of American law in the body of our Constitution.

Some of these are public. Two more have recently come partially into the light.

The first is an awareness of some kind of communication surveillance. Currently some groups believe that this is limited to the data mining of so called pen register information. But, pen register data does not require a warrant for access. This data is composed of basic information about individual calls like date, time, length, and number called. There is no need for the NSA to collect this data either. All most all billing of American phone calls is done by an Israeli company called Amdocs. This data would be most cheaply and conveniently purchased directly from Amdocs.

NSA also has the legal "right" to collect basic email data without a warrant as well. This includes the information in the email header including but not limited to sender, recipients, data, time, length, attachment names, etc. The legal precedent for the NSAs gathering of basic email data without a warrant was actually based on its existing "right" to pen register data.

So this current debacle is over something more than pen register data. For around two decades, academic publication of much optical computing theory and technology has been suppressed by our government. The suppression of academic information is nothing new. I specifically recall that during the 1970's our government prevented the publication of biomedical research because the research referred to unapproved uses of FDA cleared drugs.

Specialized optical units and array processors will massively increase the parallel processing capacities of the real time capacity required to effectively provide voice recognition capabilities on a large scale. The NSA has been rumored to have these capacities for some time. It is much more likely that the contents of the phone calls themselves are being monitored and data mined. Otherwise, there would be no furor over this whole issue.

The other significant Constitutional attack that is presently coming into the light is about a program of warrant-less sneak and peek searches of Muslim owned homes, businesses and property. These illicit searches are reputed to center around searches for radioactive material. At first 100 such searches were said to have taken place, but more recent reports have upped that number to over 500.

It is clear that this tyrant president will not accept any limitations on his power. Even though the law is clear, his minions tout the line that his war powers are unlimited. Our entire legal and societal heritage as well as our way of life is under viscious attack from our own leaders.

 

Wired   Appeals Court Allows Classified Evidence in Spy Case By David Kravets February 27, 2009 | 3:49:39 PMCategories: Surveillance A federal appeals court dealt a blow to the Obama administration Friday when it refused to block a judge from admitting top secret evidence in a lawsuit weighing whether a U.S. president may bypass Congress, as President George W. Bush did, and establish a program of eavesdropping on Americans without warrants.

The legal brouhaha concerns U.S. District Judge Vaughn Walker's decision in January to admit as evidence a classified document allegedly showing that two American lawyers for a now-defunct Saudi charity were electronically eavesdropped on without warrants by the Bush administration in 2004. The lawyers — Wendell Belew and Asim Ghafoor — sued the Bush administration after the U.S. Treasury Department accidentally released the top secret memo to them.

The courts had ordered the document, which has never been made public, returned and removed from the case after the Bush administration declared it a state secret. The document's admission to the case is central for the two former lawyers of the Al-Haramain Islamic Foundation charity to acquire legal standing so they may challenge the constitutionality of the warrantless-eavesdropping program Bush publicly acknowledged in 2005.

Absent intervention from the U.S. Supreme Court, the one-line decision (.pdf) by the 9th U.S. Circuit Court of Appeals means the lawyers' case is the only lawsuit likely to litigate the merits of a challenge to Bush's secret eavesdropping program adopted in the aftermath of the Sept. 11 terror attacks.

"We're trying to establish a legal precedent: A rule that the president must comply with legislation passed by Congress," said Jon Eisenberg, the attorney for the two lawyers. "The president is not above the law. This case is important to establish a legal precedent."

The lawyers' suit looked all but dead in July when they were initially blocked from using the document to prove they were spied on. They were forced to return it to the government after it was declared a state secret.

But last month, Walker said the document could be used in the case because there was sufficient, anecdotal evidence unrelated to the document that suggests the lawyers for the Al-Haramain charity were spied upon. Without the document, the lawyers didn't have a case.

The Bush and the Obama administration's said the document's use in the trial was a threat to national security. The document at issue isn't likely to ever become public.  Walker's Jan. 5 order only allows lawyers in the case to view it, and they are forbidden to publicly discuss its contents.

Bush acknowledged the existence of the so-called Terror Surveillance Program in 2005. It authorized the NSA to intercept, without warrants, international communications to or from the United States that the government reasonably believed involved a member or agent of al-Qaeda, or affiliated terrorist organization. Congress authorized such spying activity in July.

The Electronic Frontier Foundation claims the TSP went further, and accuses the nations' telecommunication companies of funneling all electronic communications to the National Security Agency without warrants. However, as part of the spy bill approved in July, the government immunized the telcos from lawsuits accusing them of being complicit with the Bush administration.

The Obama administration on Thursday urged Judge Walker, the same judge in the Al-Haramain case, to dismiss the EFF's challenge to the immunity legislation. Walker's decision is pending. The U.S. government had designated Al-Haramain a terror organization.  The Justice Department declined comment.

 

free hit counter javascript

Warrantless searches by FBI
WASHINGTON - The FBI secretly sought information last year on 3,501 U.S. citizens and legal residents from their banks and credit card, telephone and Internet companies without a court's approval, the Justice Department said Friday.

It was the first time the Bush administration has publicly disclosed how often it uses the administrative subpoena known as a National Security Letter, which allows the executive branch of government to obtain records about people in terrorism and espionage investigations without a judge's approval or a grand jury subpoena.  Friday's disclosure was mandated as part of the renewal of the Patriot Act, the administration's sweeping anti-terror law.

The FBI delivered a total of 9,254 NSLs relating to 3,501 people in 2005, according to a report submitted late Friday to Democratic and Republican leaders in the House and Senate. In some cases, the bureau demanded information about one person from several companies.

The numbers from previous years remain classified, officials said.  The department also reported it received a secret court's approval for 155 warrants to examine business records last year under a Patriot Act provision that includes library records. However, Attorney General Alberto Gonzales has said the department has never used the provision to ask for library records.

The number was a significant jump over past use of the warrant for business records. A year ago, Gonzales told Congress there had been 35 warrants approved between November 2003 and April 2005.  The spike is expected to be temporary, however, because the Patriot Act renewal that President Bush signed in March made it easier for authorities to obtain subscriber information on telephone numbers captured through certain wiretaps.

The Foreign Intelligence Surveillance Court, the same panel that signs off on applications for business records warrants, also approved 2,072 special warrants last year for secret wiretaps and searches of suspected terrorists and spies. The record number is more than twice as many as were issued in 2000, the last full year before the terrorist attacks of Sept. 11, 2001.

The FBI security letters have been the subject of legal battles in two federal courts because, until the Patriot Act changes, recipients were barred from telling anyone about them.  Ann Beeson, the associate legal counsel for the American Civil Liberties Union, said the report to Congress "confirms our fear all along that National Security Letters are being used to get the records of thousands of innocent Americans without court approval."  The number disclosed Friday excludes requests for subscriber information, an exception written into the law. It was unclear how many FBI letters were not counted for that reason.

Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted
Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. Kinne described the contents of the calls as "personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism." WATCH Kinne discuss why it was 'awkward' listening to her fellow Americans. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Watch "World News Tonight with Charles Gibson" and "Nightline" for more of Brian Ross' exclusive report. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. "Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another," said Faulk. WATCH Faulk discuss what a day on the job was like listening to Americans. The accounts of the two former intercept operators, who have never met and did not know of the other's allegations, provide the first inside look at the day to day operations of the huge and controversial US terrorist surveillance program. "There is a constant check to make sure that our civil liberties of our citizens are treated with respect," said President Bush at a news conference this past February. But the accounts of the two whistleblowers, which could not be independently corroborated, raise serious questions about how much respect is accorded those Americans whose conversations are intercepted in the name of fighting terrorism. US Soldier's 'Phone Sex' Intercepted, Shared Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of "cuts" that were available on each operator's computer. "Hey, check this out," Faulk says he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy'," Faulk told ABC News. Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions. "I feel that it was something that the people should not have done. Including me," he said. In testimony before Congress, then-NSA director Gen. Michael Hayden, now director of the CIA, said private conversations of Americans are not intercepted. "It's not for the heck of it. We are narrowly focused and drilled on protecting the nation against al Qaeda and those organizations who are affiliated with it," Gen. Hayden testified. He was asked by Senator Orrin Hatch (R-UT), "Are you just doing this because you just want to pry into people's lives?" "No, sir," General Hayden replied. Asked for comment about the ABC News report and accounts of intimate and private phone calls of military officers being passed around, a US intelligence official said "all employees of the US government" should expect that their telephone conversations could be monitored as part of an effort to safeguard security and "information assurance." "They certainly didn't consent to having interceptions of their telephone sex conversations being passed around like some type of fraternity game," said Jonathon Turley, a constitutional law professor at George Washington University who has testified before Congress on the country's warrantless surveillance program. "This story is to surveillance law what Abu Ghraib was to prison law," Turley said. Listening to Aid Workers NSA awarded Adrienne Kinne a NSA Joint Service Achievement Medal in 2003 at the same time she says she was listening to hundreds of private conversations between Americans, including many from the International Red Cross and Doctors without Borders. "We knew they were working for these aid organizations," Kinne told ABC News. "They were identified in our systems as 'belongs to the International Red Cross' and all these other organizations. And yet, instead of blocking these phone numbers we continued to collect on them," she told ABC News. WATCH Kinne describe how listening to aid workers was part of the job. A spokesman for Doctors Without Borders, Michael Goldfarb, said: "The abuse of humanitarian action through intelligence gathering for military or political objectives, threatens the ability to assist populations and undermines the safety of humanitarian aid workers." Both Kinne and Faulk said their military commanders rebuffed questions about listening in to the private conversations of Americans talking to Americans. "It was just always, that , you know, your job is not to question. Your job is to collect and pass on the information," Kinne said. Some times, Kinne and Faulk said, the intercepts helped identify possible terror planning in Iraq and saved American lives. "IED's were disarmed before they exploded, that people who were intending to harm US forces were captured ahead of time," Faulk said. NSA job evaluation forms show he regularly received high marks for job performance. Faulk left his job as a newspaper reporter in Pittsburgh to join the Navy after 9/11. Kinne says the success stories underscored for her the waste of time spent listening to innocent Americans, instead of looking for the terrorist needle in the haystack. "By casting the net so wide and continuing to collect on Americans and aid organizations, it's almost like they're making the haystack bigger and it's harder to find that piece of information that might actually be useful to somebody," she said. "You're actually hurting our ability to effectively protect our national security." The NSA: "The Shadow Factory" Both former intercept operators came forward at first to speak with investigative journalist Jim Bamford for a book on the NSA, "The Shadow Factory," to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark "Puzzle Palace" which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers." WATCH Bamford describe how the NSA missed signals leading up to 9/11. A spokesman for General Hayden, Mark Mansfield, said: "At NSA, the law was followed assiduously. The notion that General Hayden sanctioned or tolerated illegalities of any sort is ridiculous on its face."
NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider
The Register  NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider ....   By Lewis Page • , 8th July 2010 09:20 GMT    ...   The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems.    ...   The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance.    ...   According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother".    ...   The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them.    ...   The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources.    ...   "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper.    ...   Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring.    ...   The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to.    ...   The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on.    ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ®
Electronic Frontier Foundation  
AP SAN FRANCISCO - The Justice Department said Friday it was moving to dismiss a federal lawsuit challenging the Bush administration's secretive domestic wiretapping program.   The lawsuit, brought by the Internet privacy group, Electronic Frontier Foundation, does not include the government.  Instead, it names AT&T, which the San Francisco-based group accuses of colluding with the National Security Agency to make communications on AT&T networks available to the spy agency without warrants.

The government, in a filing here late Friday, said the lawsuit threatens to expose government and military secrets and therefore should be tossed. The administration added that its bid to intervene in the case should not be viewed as a concession that the allegations are true.  As part of its case, the EFF said it obtained documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network, and those documents are under seal. The former technician said the documents detail secret NSA spying rooms and electronic surveillance equipment in AT&T facilities.

Next month, U.S. District Judge Vaughn Walker will hold a hearing on whether they should be divulged publicly.  President Bush confirmed in December that the NSA has been conducting the surveillance when calls and e-mails, in which at least one party is outside the United States, are thought to involve al-Qaida terrorists.  In congressional hearings earlier this month, Attorney General Alberto Gonzales suggested the president could order the NSA to listen in on purely domestic calls without first obtaining a warrant from a secret court established nearly 30 years ago to consider such issues.

Gonzales said the administration, assuming the conversation related to al-Qaida, would have to determine if the surveillance were crucial to the nation's fight against terrorism, as authorized by Congress following the Sept. 11 attacks.  The EFF lawsuit, alleging AT&T violated U.S. law and its customers' privacy, seeks to stop the surveillance program.  The San Antonio-based telecommunications giant said it follows all applicable laws.

 

 

60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years   May 24, 2011 -- WayneMadsenReport
CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.

WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."

NSA and selling the nation's prized secrets to contractors

June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.

But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

 

Terahertz Spectroscopy
Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however.
Prodigal
Cherie Anderson runs a travel company in southern California, and she’s convinced the federal government is reading her emails. But she’s all right with that. “I assume it's part of the Patriot Act and I really don't mind,” she says. “I figure I'm probably boring them to death.” It's likely Anderson is not alone in her concerns that the government may be monitoring what Americans say, write, and read. And now there may be even more to worry about: a newly revealed security research project called PRODIGAL -- the Proactive Discovery of Insider Threats Using Graph Analysis and Learning -- which has been built to scan IMs, texts and emails . . . and can read approximately a quarter billion of them a day.

“Every time someone logs on or off, sends an email or text, touches a file or plugs in a USB key, these records are collected within the organization,” David Bader, a professor at the Georgia Tech School of Computational Science and Engineering and a principal investigator on the project, told FoxNews.com. PRODIGAL scans those records for behavior -- emails to unusual recipients, certain words cropping up, files transferred from unexpected servers -- that changes over time as an employee "goes rogue." The system was developed at Georgia Tech in conjunction with the Defense Advanced Research Projects Agency (DARPA), the Army's secretive research arm that works on everything from flying cars to robotic exoskeletons. Initially, PRODIGAL will scan only the communications of military volunteers and people who work in federal agencies. But the very existence of such a project is sure to unnerve citizens like Anderson. Is the government reading my emails? Are they already monitoring me? "Some people say it's one step further toward a police state," said Anthony Howard, a book author and security expert who has consulted for the Department of Homeland Security. But Bader and other experts are quick to dismiss the idea that PRODIGAL could be used to monitor everyone in America. The scans work only on internal systems, they say -- not across the entire Internet. And the experts say such a project is long overdue: by monitoring for "anomalies" and predicting extreme behavior, catastrophes can be prevented, such as a soldier in good mental health becoming homicidal or a government employee sharing key classified information. “Today, an analyst may receive tens of thousands of 'anomalies' per day, where an anomaly is an unexplained event,” Bader said. The new system is designed to aid analysts in processing those anomalies. And it's not alone. Bader equated the PRODIGAL system to Raytheon SureView, an internal scanning system that looks for suspicious activity and alerts federal agencies about possible threats. Another system is the Einstein project, which was developed after 9/11 and scans government employees for key words and links suspicious activity to National Security Agency databases. But PRODIGAL scans vastly more data than those systems: as much as a terabyte or more per day, what Georgia Tech described as "massive data sets." PRODIGAL is part of an existing DARPA security project called Anomaly Detection at Multiple Scales (ADAMS), which was announced earlier this year. Details about how ADAMS works are not widely known; Georgia Tech's recent announcement is one of the first reports to explain how these detection engines work.

According to Bader, PRODIGAL uses complex "graph-processing" algorithms to analyze threats and piece together a jigsaw puzzle of communications. The system then ranks the unusual activity before feeding the most suspicious threats to agents. Cyber-security expert Joseph Steinberg, CEO of Green Armor Solutions, said ADAMS is unique in that it scans through a massive stream of data. He says the new project, which will take about two years to develop and will cost $9 million, will be more effective at analyzing threats and determining if they are valid. But the issue is not the scanning technology itself; it’s how the information is interpreted -- and whether it ultimately helps at all, Howard told FoxNews.com. "Since there is no real data publicly available to substantiate that any of this technology is preventing terrorist attacks or strengthening our borders from within, we can't] really say definitively that this technology is doing any good," he said. The challenge, he said, is that criminals and terrorists often use multiple channels of communication, some encrypted -- and know how to avoid existing detection systems. Nevertheless, PRODIGAL’s ability to scan reams of data is clearly the next step in tracking unusual activity, and it’s guaranteed to raise a red flag for Anderson and others. "Since people tend to be imperfect, the data captured can easily be mishandled. Where does it end?" Howard said.

Read more: http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/#ixzz1fUgqaOeA

 

WMR  NSA spying operation targeting journalists focused but massive
April 20-22, 2012 -- NSA spying operation targeting journalists focused but massive  National Security Agency (NSA) sources have reported the following to WMR: The NSA has conducted a targeted but massive surveillance operation against certain journalists who have routinely exposed NSA's illegal domestic communication surveillance program, code named STELLAR WIND.    ...   NSA has, for some time, kept tabs on journalists who wrote about the communication spying agency. In its embryonic stage, the journalist surveillance system, originally code-named FIRSTFRUITS, was basically a clipping service that provided NSA and CIA analysts with copies of newspaper, magazine, and Internet articles that mentioned one or both of the two agencies.    ...   Shortly after the September 11, 2001 attacks, Vice President Dick Cheney's legal counsel, David Addington, visited NSA headquarters at Fort Meade, Maryland with a list of individuals he wanted NSA to spy on and provide Cheney's office with transcripts of phone calls and e-mails. From that visit, STELLAR WIND was developed as an illegal surveillance system targeting journalists, members of Congress, and other "persons of interest" for the White House.    ...   In March 2004, Attorney General John Ashcroft ruled STELLAR WIND illegal but the next day he became critically ill with pancreatitis. When White House chief of staff Andrew Card and White House counsel Alberto Gonzales visited Ashcroft in his hospital room to demand he sign off on the program, Ashcroft deferred to his deputy James Comey and FBI director Robert Mueller who both refused to authorize the program. George W. Bush overruled Ashcroft, Comey, and Mueller and continued to authorize STELLAR WIND. President Obama has continued to authorize STELLAR WIND, according to NSA sources.    ...   Although STELLAR WIND continues to generally target journalists who write about intelligence and national security matters, NSA has concentrated its efforts on three journalists, in particular. They are New York Times' reporter and author of State of War James Risen, journalist and author of The Puzzle Palace and Body of Secrets James Bamford, and WMR editor Wayne Madsen. Risen continues to fight a grand jury subpoena to testify about his sources on Operation Merlin, a CIA program to deliver flawed nuclear design technology to Iran. Former CIA officer Jeffrey Sterling has been indicted and charged under the Espionage Act for revealing details of the program. Risen's subpoena was quashed by Judge Louise Brinkema of the U.S. District Court for the Eastern District of Virginia, but the Obama administration has appealed the decision to the U.S. Appeals Court for the Fourth Circuit in Richmond, Virginia and oral arguments in the case are scheduled for next month.    ...   NSA sources report: Wayne Madsen's e-mails and phone conversations back to 2002 are in the possession of the NSA. The phone calls range from those with his mother to those with government sources. All passwords to social networking websites, banks, phone companies, credit card companies, and his website, WayneMadsenReport, are held by the NSA. The data includes the list of his subscribers to WayneMadsenReport, as well.    ...   The same level of detailed data is maintained on Risen and Bamford.    ...   Personal observation: It is very clear that a number of individuals who contacted this editor over the past several years to pass on information were stymied at the last minute from maintaining contact. These individuals were willing to provide information on: the movement and temporary "loss" of nuclear weapons from Minot Air Force Base in North Dakota to Barksdale Air Force Base in Louisiana in 2007 coupled with the murder of Air Force special operation Captain John Frueh in Washington state; documents proving Canadian military involvement in torture of detainees in Afghanistan; information on the 2000 attack on the USS Cole in Aden harbor being a "false flag" attack; evidence that there were no human remains found at the crash site of United flight 93 in Shanksville, Pennsylvania; and evidence showing that Harvard virologist Dr. Don Wiley, who was investigating the initial anthrax attacks, was murdered in Memphis in November 2001.    ...   In all these cases, individuals who contacted this editor and were willing to provide information ceased contact after their initial phone calls, letters, and email.    ...   NSA also maintains mail covers on addresses of certain individuals in the event that contact is made via the U.S. Postal Service or private companies such as FedEx or DHL.    ...   FIRSTFRUITS, which is now known by a different cover name, contains, in addition to articles, complete transcripts of phone calls, e-mails, faxes, and letters, in addition to the numbers and names of all individuals who have been in contact with targeted journalists. In addition to the three high priority targets -- Risen, Bamford, and Madsen -- other journalists who are a subject of the NSA warrantless surveillance include Bill Gertz of The Washington Times, Eric Lichtblau and Scott Shane of The New York Times, Siobhan Gorman, formerly of The Baltimore Sun and now with The Wall Street Journal, and Seymour Hersh with The New Yorker.   ..   So far, the Obama administration has brought Espionage Act charges against six individuals for contact with the media. They are charged with providing classified information to journalists and "aiding the enemy."    ...   However, the Justice Department may take an even more draconian turn. This editor has heard from NSA insiders that there is a willingness by some quarters to charge two of the three key targeted journalists under the Espionage Act. Since Bamford and Madsen both once worked at NSA and both signed non-disclosure agreements -- Bamford in the 1960s and Madsen in the mid-1980s -- there has been talk of indicting them also for violations of the Espionage Act, along with their sources in the intelligence community.

 

RT Stratfor emails reveal secret, widespread TrapWire surveillance system
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing. Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails. On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning. Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site. According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.” In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces. What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf). “Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.” In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product “can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.” An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “ walk] back and track the suspects from the get go w/facial recognition software.” Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well. In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the eleven months. News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
FBI / BioMetric   Facial Recognition and Identification Initiative.pdf text and RT
Facial Recognition and Identification Initiatives Richard W. Vorder Bruegge Federal Bureau of Investigation 2 Image Technology in the Forefront • Unparalleled ease of capturing, storing, copying, and sharing images • Proliferation of surveillance cameras, expanding global media enterprises, and average citizens with mobile phone still and video camera capabilities • Unprecedented level of sharing images and videos via the internet and other advanced communication methods • Photographs and videos depicting victims, suspects, and eyewitnesses are becoming the subject of investigations Face: Forensic Discipline And Biometric 3 Biometrics Forensics • A measurable biological (anatomical and physiological) or behavioral characteristic used for identification – Facial Recognition (FR) - the automated searching of a facial image in a computer database, typically resulting in a group of facial images ranked by computer evaluated similarity computer- evaluated • Visible physical characteristics one can use for the purposes of measurements or comparisons that are collected after an event – Facial Identification (FI) - the manual examination of the differences and similarities between two facial images for the purpose of determining if they represent different persons or the same person Event 4 FI & FR Address Multiple Missions • Mission Areas: – Access control – Automated identity verification – Human identification – Screening – Surveillance – Law enforcement & national security investigations – Identity intelligence to understand intent 5 FBI Facial Use Cases • Identifying fugitives and missing persons in FR systems • Identifying unknown persons of interest from images (1:N) • Tracking subjects movements to/from critical events (e.g., 9/11) • Conducting automated surveillance at lookout locations (1:M, where 1<M<<N) • Identifying subjects in public datasets • Identifying subjects from images in seized systems • Verifying mug shots against National Criminal Information Center (NCIC) records (1:1) • Controlling access 6 Identifying Subjects from Images for 40 Years • The FBI’s Facial Recognition/Identification work is performed within the Forensic Audio, Video, and Image Analysis Unit (FAVIAU) • The FAVIAU is one of only a few accredited laboratories in the world that conducts examinations in the disciplines of video, image, and audio analysis The Biometric Center of Excellence (BCOE) is the Federal Bureau of Investigation’s (FBI) program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations 7 Driving New FBI Biometric Capabilities 8 Sponsoring Applied Research • Ongoing applied research, development, test & evaluation: – Universal Face & Iris Workstation – FBI Facial Collaboration-Facial Land marking/Facial Aging – Automated Face Detection and Recognition in Video – FI/FR of Twins (blemishes) – Obscuring Identity in Video – Repro Face (2D-3D-2D) – Facial Image and Camera Certification Process – Automated Retrieval of Scars, Marks, and Tattoos – Ear Recognition – Multiple Biometric Grand Challenge/Multiple Biometric Evaluation/ III Data Set Testing 9 Sponsoring Standards Development • Facial Identification Scientific Working Group (FISWG) • Sponsored by the BCOE and established in 2009 • Mission - “develop consensus standards, guidelines, and best practices for the discipline of image-based comparisons of human features” • Participants include federal, state, local, and international government agencies, as well as invited non-governmental organizations • Next meeting scheduled for November 15-18 in San Antonio, Texas • Visit www.FISWG.org Deepening FR Collaboration • Sponsored the International Face Collaboration Meeting – 5 foreign countries and 11 U.S. agencies participated • Participated in the FR workshop “From Bones to Bits” – 55 U.S. government and 47 contractor attendees • Sponsored the U.S. Government Facial Collaboration Meeting – 88 attendees representing numerous law enforcement, intelligence, and military agencies 10 Analyzing Legal And Privacy Concerns Tasks associated with this analysis include: • Identifying databases external to the FBI to which the FBI has legal access • Defining policy for both automated and human-tandem searching of databases and methods of how the images are used in searching and how they are destroyed or retained • Identifying privacy implications of applied research using images of human subjects 11 Developing Training Curriculum 12 Preparing for FR incorporation into Next Generation Identification (NGI) • The NGI system: – Incremental replacement of the current IAFIS – Improving current functionality and providing new functionality – Developing multimodal collection and search identification services  An upgrade to IAFIS – The FBI is developing an automated, interoperable multimodal biometric system 13 Enhanced ten print services 2011 Palmprints and latents 2012 Photos/Facial, scars, marks, and tattoos 2013 Iris 2014 13 Value Of the FBI-DMV Pilot Operational Results FR System Testing Identification of Follow-On Projects The BCOE-sponsored FR pilot program with NC DMV led to more than 700 leads including: • One federal fugitive apprehension • Six state fugitive apprehensions • One missing person resolution FACEMASK has also served as an opportunity for FBI analysts to operationally test a FR system and determine its strengths and weaknesses. This aids the FBI as it develops its own FR capability Due to this success, the FBI took advantage of an ongoing survey of U.S. DMVs and used it as an opportunity to identify other prospective state DMVs for follow-on projects Purpose Of The DMV Survey Initial Purpose • Collect DMV FR POC Information • Identify DMVs that have implemented FR systems Expanded Purpose • Gather data about FR vendors, state laws, and search protocol to help the FBI identify a DMV for a potential follow-on project • Technical systems information • Receptiveness to collaborating with the FBI • Various concerns and suggestions voiced by the DMVs and trends were recorded The FBI wanted to identify key FR POC in order to direct inquiring investigators and agencies. The original DMV survey focuses around contact information; however, with the success of the original pilot the purpose and scope of the data gathering effort changed. Potential FBI-DMV FR Pilot Expansion Active FR System NO FR System Unknown/No Response Key Takeaway: More than half of all state DMVs have FR systems. Their main goal is to detect and combat fraud Responses current as of (05/28/2010) 16 * * * * * * * * * * * * * * * * * * Permit Law Enforcement Access to Data * DMV Survey High Level Findings Specific Findings  The vast majority of states that have FR Systems use L1 Technologies Technology Vendors Legal Requirements Funding Knowledge  Many DMV image databases are maintained and searched by their vendors. This presents privacy issues that should be explored   Across the nation, there are widely varying legal requirements. To initiate searches, some DMVs require Memorandums of Understanding (MOU) while some just require the requesting agency to buy their vendor’s software  Due to a lack of funding, some states who had planned to develop FR systems had to delay or cancel their plans due to budgetary constraints  Many DMV POCs lacked technical knowledge about their systems and the legal issues involved in their use. Since most POCs were unable or unwilling to nominate alternative POCs, more in-depth research may be required before FBI collaboration can be considered (i.e., researching state laws that apply to the DMV’s FR system or interviewing a DMV’s vendor for more specific systems information)  Questions / Comments Contact Information: Richard Vorder Bruegge Email: Richard.VorderBruegge@ic.fbi.gov Additional Resources: www.BiometricCoE.gov Email: BiometricCoE@leo.gov
WMR GROUNDBREAKER   NSA and selling the nation's prized secrets to contractors
June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.

But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

 

National Security letter,  Administrative subpoena   color coding airline passengers    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • Findlaw, Dean
  • Jurist, legal news and research, University of Pittsburg
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK   temporary restraining order (which they subsequently converted to a motion for preliminary injunction in a conference with the Court), seeking to enjoin enforcement of § 1021.
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ---------------------------------------- CHRISTOPHER HEDGES, DANIEL ELLSBERG, JENNIFER BOLEN, NOAM CHOMSKY, ALEXA O’BRIEN, US DAY OF RAGE, KAI WARG ALLA, HON. BRIGITTA JONSDOTTIR M.P., Plaintiffs, -v- BARACK OBAMA, individually and as representative of the UNITED STATES OF AMERICA; LEON PANETTA, individually and in his capacity as the executive and representative of the DEPARTMENT OF DEFENSE, JOHN MCCAIN, JOHN BOEHNER, HARRY REID, NANCY PELOSI, MITCH MCCONNELL, ERIC CANTOR as representatives of the UNITED STATES OF AMERICA, Defendants. ---------------------------------------- X : : : : : : : : : : : : : : : : : : : : : : X 12 Civ. 331 (KBF) OPINION AND ORDER KATHERINE B. FORREST, District Judge: On December 31, 2011, President Obama signed into law the National Defense Authorization Act for Fiscal Year 2012, Pub. L. 112-81, 125 Stat. 1298 (Dec. 31, 2011) (the “NDAA”). Plaintiffs, a group of writers and activists, brought a lawsuit on January 13, 2012, seeking preliminary and permanent injunctive relief with respect to one section (indeed, one page) of that voluminous legislation: § 1021. Plaintiffs assert that Section 1021 is constitutionally infirm, violating both their free speech and associational rights guaranteed by the First Amendment as well as USDC SDNY DOCUMENT ELECTRONICALLY FILED DOC #: _________________ DATE FILED: May 16, 2012 2 due process rights guaranteed by the Fifth Amendment of the United States Constitution. On February 27, 2012, plaintiffs filed a motion for a temporary restraining order (which they subsequently converted to a motion for preliminary injunction in a conference with the Court), seeking to enjoin enforcement of § 1021. In support of their motion, plaintiffs assert that § 1021 already has impacted their associational and expressive activities--and would continue to impact them, and that § 1021 is vague to such an extent that it provokes fear that certain of their associational and expressive activities could subject them to indefinite or prolonged military detention. On March 30, 2012, after expedited discovery, this Court held an evidentiary hearing on plaintiffs’ motion. At the hearing, three plaintiffs testified live and, pursuant to stipulation, another by sworn declaration. The Government did not call any witnesses, submit any documentary evidence, or file any declarations in connection with its opposition to plaintiffs’ motion.1 As mentioned, plaintiffs’ challenge § 1021 as vague and thus, violative of their First and Fifth Amendment rights. The Government opposes plaintiffs’ request for preliminary injunctive relief on three bases: first, that plaintiffs lack standing; The parties filed post-hearing memoranda; and the motion was fully submitted on May 4, 2012. 1 “The Government” refers to all defendants in this action. 3 second, that even if they have standing, they have failed to demonstrate an imminent threat requiring preliminary relief; and finally, through a series of arguments that counter plaintiffs’ substantive constitutional challenges, that Section 1021 of the NDAA is simply an “affirmation” or “reaffirmation” of the authority conferred by the 2001 Authorization for Use of Military Force, Pub. L. 107-40, 115 Stat. 224 (Sept. 18, 2011) (the “AUMF”), passed in the wake of September 11, 2001. In essence, the Government argues that as an “affirmation” of the AUMF, § 1021 of the NDAA does nothing new; and therefore, since the type of activities in which plaintiffs are engaged were not subject to legal action under the AUMF, there is no reasonable basis for plaintiffs to assert that § 1021 could suddenly subject them to governmental action now. According to the Government, as an affirmation of the AUMF, the NDAA must be “read against the backdrop of Executive practice and court decisions”--a backdrop which clarifies the scope of § 1021. (See Gov’t’s Supplemental Mem. of Law in Opp’n to Pls.’ Mot. for a Prelim. Inj. (“Gov’t Supp. Mem.”) (Dkt. No. 33) at 1.) For the reasons set forth below, this Court finds that § 1021 is not merely an “affirmation” of the AUMF. To so hold would be contrary to basic principles of legislative interpretation that require Congressional enactments to be given independent meaning. To find that § 1021 is merely an “affirmation” of the AUMF would 4 require this Court to find that § 1021 is a mere redundancy--that is, that it has no independent meaning and adds absolutely nothing to the Government’s enforcement powers. In addition to rendering § 1021 meaningless, the Government’s position ignores the differences between the two statutes. Section 1021 lacks what are standard definitional aspects of similar legislation that define scope with specificity. It also lacks the critical component of requiring that one found to be in violation of its provisions must have acted with some amount of scienter--i.e., that an alleged violator’s conduct must have been, in some fashion, “knowing.” Section 1021 tries to do too much with too little--it lacks the minimal requirements of definition and scienter that could easily have been added, or could be added, to allow it to pass Constitutional muster. This Court finds that plaintiffs (who, as discussed below, have a reasonable fear of future government action sufficient to confer standing) have carried their burden with respect to the necessary elements for issuance of preliminary injunctive relief. They have demonstrated a likelihood of success on the merits with respect to their constitutional challenges; they have put forward specific evidence of actual and threatened irreparable harm; the balance of the equities and the public interest favors issuance of preliminary relief (particularly, but not only, in light of the fact that the Government’s entire position is premised on the 5 assertion that §1021 does nothing new--that it simply reaffirms the AUMF; in which case, preliminarily enjoining enforcement should not remove any enforcement tools from those the Government currently assumes are within its arsenal). Accordingly, this Court preliminarily enjoins enforcement of §1021 pending further proceedings in this Court or remedial action by Congress mooting the need for such further proceedings. BACKGROUND I. THE STATUTES The Government’s central argument with respect to both standing and the merits is that the NDAA is nothing more than an affirmation of the AUMF. Thus, the Court sets forth the relevant portions of both statutes as well as the relevant enforcement history relating to the AUMF. The Court also discusses a similar statute recently examined by the Supreme Court of the United States, which has informed some of its thinking on the merits of the instant motion. A. The AUMF The AUMF was passed in direct response to the terrorist event of September 11, 2001. The AUMF provides: t]hat the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future 6 acts of international terrorism against the United States by such nations, organizations or persons. Pub. L. 107-40, 115 Stat. 224 (Sept. 18, 2001) § 2(a). President Bush utilized the authorization granted under the AUMF to send U.S. armed forces into Afghanistan “with a mission to subdue al Qaeda and quell the Taliban regime that was known to support it.” Hamdi v. Rumsfeld, 542 U.S. 507, 510 (2004)(plurality); accord Rasul v. Bush, 542 U.S. 466, 470 (2004). The hostilities that commenced in 2001 remain ongoing today. The Government has captured and detained a number of individuals pursuant to the authority in the AUMF. See generally, e.g., Hamdi, 542 U.S. 507. In Hamdi, the Supreme Court recognized the authority granted by the AUMF to detain the individuals captured: “detention of individuals . . . for the duration of the particular conflict in which they were captured, is so fundamental and accepted an incident to war as to be an exercise of the ‘necessary and appropriate force’ Congress has authorized the President to use”. Id. at 518. A number of subsequent cases, many of which arose in the context of habeas proceedings relating to those captured pursuant to the AUMF and detained at Guantanamo Bay, have similarly upheld the detention authority granted under the AUMF. See, e.g., Barhoumi v. Obama, 609 F.3d 416, 432 (D.C. Cir. 2010); In re Petitioners Seeking Habeas Corpus Relief, 700 F. Supp. 2d 7 119, 135 (D.D.C. 2010); see also Hamdan v. Rumsfeld, 548 U.S. 557, 603-04 (2006). In March 2009, the Government submitted a memorandum in an action relating to Guantanamo Bay detainees, In re Guantanamo Bay Detainee Litigation, Misc. No. 08-442 (D.D.C.), in which it set forth its views on the President’s AUMF detention authority (“March 2009 Mem.”).2 The President has the authority to detain persons that the President determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, and persons who harbored those responsible for those attacks. The President also has the authority to detain persons who were part of or substantially supported, Taliban or al-Qaida forces or associated forces that are engaged in hostilities against the United States or its coalition partners, including any person who has committed a belligerent act, or has directly supported hostilities, in the aid of such enemy forces. That memorandum, upon which the Government relies in the instant matter regarding certain interpretative principles and the scope of § 1021 of the NDAA, states: March 2009 Mem. at 1-2. At oral argument, the Government conceded that the March 2009 Memorandum simply states the Government’s litigation position in the Guantanamo Bay Detainee Litigation, and that it does not have the effect of law. Tr. 216-17.3 2 In re Guantanamo Bay Detainee Litigation, Misc. No. 08-442, Resps.’ Mem. Re: the Gov’t’s Detention Authority Relative to Detainees Held at Guantanamo Bay (D.D.C. Mar. 13, 2009). (Filed in this litigation at Dkt. No. 24-1.) 3 References to “Tr.” are to the transcript of the March 30, 2012 hearing on plaintiffs’ motion for preliminary injunction. 8 B. The NDAA Section 1021 of the NDAA--entitled “Affirmation of Authority of the Armed Forces of the United States to Detain Covered Persons Pursuant to the Authorization for Use of Military Force”--provides (a) In General. Congress affirms that the authority of the President to use all necessary and appropriate force pursuant to the AUMF] includes the authority of the Armed Forces of the United States to detain covered persons (as defined in subsection (b)) pending disposition under the law of war. (b) Covered Persons. A covered person under this section is any person as follows . . . (2) A person who was part of or substantially supported al-Qaeda, the Taliban, or associated forces that are engaged in hostilities against the United States or its coalition partners, including any person who has committed a belligerent act or has directly supported such hostilities in aid of such enemy forces. (c) Disposition Under the Law of War. The disposition of a person under the law of war as described un subsection (a) may include the following: (1) Detention under the law of war without trial until the end of hostilities authorized by the AUMF]. . . . (4) Transfer to the custody or control of the person’s country of origin, any other foreign country or any other foreign entity. (d) Construction. Nothing in this section is intended to limit or expand the authority of the President or the scope of the AUMF]. (e) Authorities. Nothing in this section shall be construed to affect existing law or authorities 9 relating to the detention of United States citizens . . . . Pub. L. 112-81, 125 Stat. 1298 § 1021. When he signed the NDAA into law on December 31, 2011, President Obama simultaneously issued a “signing statement.” A portion of that statement referred explicitly to § 1021: Section 1021 affirms the executive branch’s authority to detain persons covered by the AUMF]. This section breaks no new ground and is unnecessary. The authority it describes was included in the 2001 AUMF, as recognized by the Supreme Court and confirmed through lower court decisions since then . . . . Moreover, I want to clarify that my Administration will not authorize the indefinite military detention without trial of American citizens . . . . My Administration will interpret section 1021 in a manner that ensures that any detention it authorizes complies with the law. Statement on Signing the National Defense Authorization Act for Fiscal Year 2012, 2011 DAILY COMP. PRES. DOC. 978 (Dec. 31, 2011) at 1-2 (hereinafter “Signing Statement”), available at http://www.gpo.gov/fdsys/pkg/DCPD-201100978/pdf/DCPD-201100978.pdf. As stated above, the NDAA is a broad package of legislation that includes both authorizations for military spending as well as additional, non-spending legislation (such as § 1021). Pub. L. 112-81, 125 Stat. 1298 at Preamble (“An Act”); see also generally Pub. L. 112-81, 125 Stat. 1298 § 2. In addition to § 1021, the NDAA includes § 1022 which separately authorizes “Military Custody for Foreign Al-Qaeda Terrorists.” See Pub. L. 112-81, 125 Stat. 10 1298 § 1022. That statute authorizes “Custody Pending Disposition Under Law of War.” Id. Section 1022(a)(2) defines who constitutes a “Covered Person ]” under that prong of the statute, id. § 1022(a)(2), and contains a specific provision that states that, “The requirement to detain a person in military custody under this section does not extend to citizens of the United States . . . ,” id. § 1022(b)(1). Section 1022 further provides, in pertinent part: (c)(1) Not later than 60 days after the date of the enactment of this Act, the President shall issue, and submit to Congress, procedures for implementing this section. (2) Elements. The procedures for implementing this section shall include, but not be limited to, procedures as follows: (A) Procedures designating the persons authorized to make determinations under (a)(2) and the process by which such determinations are to be made . . . . Pub. L. 112-81, 125 Stat. 1298 § 1022(c)(1)-(2)(A). On February 28, 2012, the White House issued a Presidential Policy Directive (PPD-14) entitled, “Requirements of the National Defense Authorization Act” regarding the procedures for implementing § 1022 of the NDAA (but not § 1021). “Directive on Procedures Implementing Section 1022 of the National Defense Authorization Act for Fiscal Year 2012,” 2012 DAILY COMP. PRES. DOC. 136 (Feb. 28, 2012), available at http://www.gpo.gov/fdsys/pkg/DCPD-201200136/pdf/DCPD-201200136.pdf. That directive provides specific guidance as to 11 the “Scope of Procedures and Standard for Covered Persons Determinations.” Specifically, it states that “covered persons” applies only to a person who is not a citizen of the United States and who is a member or part of al-Qaeda or an associated force that acts in coordination with or pursuant to the direction of al-Qaeda; and “who participated in the course of planning or carrying out an attack or attempted attack against the United States or its coalition partners.” Id. at 1-2. The directive consists of 11 pages of specific implementation procedures including defining scope and limitations. As mentioned, no such directive was issued with respect to section 1021 of the NDAA. C. 18 U.S.C. § 2339B and Holder v. Humanitarian Law Project In Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010), the Supreme Court considered whether a criminal statute prohibiting the provision of material support to terrorists, or providing resources to foreign terrorist organizations, was constitutionally infirm under either the First or Fifth Amendments. Id. at 2712-13. There, the relevant statutory provision stated, in pertinent part: Whoever provides material support or resources or conceals or disguises the nature, location, source or ownership of material support or resources, knowing or intending that they are to be used in preparation for, or in carrying out, a violation of various criminal statutes] . . . shall be . . . imprisoned for not more than 15 years. 12 18 U.S.C. § 2339A(a). The term “material support,” as well as the types of activities encompassed by “material support”--e.g., “expert advice or assistance”--are defined within the statute itself. See 18 U.S.C. § 2339A(b)(1)-(3). The following section of that statute, § 2339B, sets forth the penalties associated with violating 18 U.S.C. § 2339A, and in doing so, relies upon the definitions supplied in § 2339A. See 18 U.S.C. § 2339B. The penalties to be imposed are for, as § 2339B states, the “prohibited activit y]” of “ p]roviding material support or resources to a foreign terrorist organization, or attempts or conspires to do so . . . .” 18 U.S.C. § 2339B(a)(1). The penalties set forth in § 2339B are imposed only upon a showing that the person “ha d] knowledge that the organization is a designated terrorist organization . . . , or that the organization has engaged or engages in terrorism . . . .” Id. In finding that § 2339B did not violate either the First or Fifth Amendments, the Supreme Court pointed specifically to the definitional sections and the requirement for “knowing” conduct. Holder, 130 S. Ct. at 2720. The Supreme Court found, Applying the statutory terms in this action ‘training,’ ‘expert advice or assistance,’ ‘service,’ and ‘personnel’--does not require similarly untethered, subjective judgments . . . Congress took care to add narrowing definitions to the material-support statute over time. These definitions 13 increased the clarity of the statute’s terms . . . and the knowledge requirement of the statute further reduces any potential for vagueness, as we have held with respect to other statutes containing a similar requirement. Id. (citations omitted). II. THE PARTIES A. Plaintiffs Plaintiffs are a group of writers and political activists. Of the seven named plaintiffs, only five submitted any evidence in connection with this motion: Jennifer Ann Bolen, Christopher Hedges, Alexa O’Brien, Kai Wargalla, and Hon. Brigitta Jonsdottir. (Dkt. Nos. 10, 11, 14, 17, 18.) Two of the plaintiffs, Daniel Ellsberg and Noam Chomsky, are listed in the caption and referred in the text of the verified amended complaint (see Dkt. No. 4-1), but did not submit either affidavits in support of the motion or appear live to provide testimony at the evidentiary hearing.4 4 This action was commenced by filing a verified complaint. While procedurally the factual statements relating to a plaintiff in a “verified” complaint may be taken as having the weight of a declaration or other statement under penalty of perjury, see Colon v. Coughlin, 58 F.3d 865, 872 (2d Cir. 1995), this Court required that any plaintiff asserting standing for preliminary relief put forward a specific, separate declaration and make him or herself available for deposition (see Dkt. No. 16). Accordingly, the Court has not based its determination herein on the allegations in the verified amended complaint. Bolen, who, as mentioned, submitted a declaration in support of the motion, did not testify at the evidentiary hearing and was not deposed. Thus, her statements were not cross-examined and this Court has not relied upon them for purposes of deciding the 14 instant motion. 5 Plaintiffs Hedges, O’Brien, Wargalla, and Jonsdottir testified at the hearing (Jonsdottir by declaration as agreed by the parties).6 1. Christopher Hedges At the hearing in this matter, Hedges testified that he has been a foreign correspondent for 20 years. Tr. 156. He won the Pulitzer Prize for journalistic reporting. Tr. 157. Over the course of his career, he has primarily worked in Latin America, Africa, the Middle East, and the Balkans. Tr. 157. He makes his living writing, teaching, and lecturing. He has published a number of articles in the New York Times, the Christian Science Monitor, the Dallas Morning News, Harper’s Magazine, and the New York Review of Books. Tr. 157. After September 11, 2001, Hedges was based in Paris and covered al-Qaeda in all European countries (with the exception of Germany) as well as the Middle East. Tr. 157.7 5 Based upon the oral representations of plaintiffs’ counsel, plaintiff Bolen was apparently ill and unable to appear for deposition. She did attend the hearing, but due to the fact that she was not deposed prior to that date, she did not testify at the hearing. As part of that coverage, Hedges retraced the steps of Mohammed Atta, one of the participants in the 9/11 events; he covered the abortive Paris embassy bombing plot, the suicide bombing attack on the synagogue 6 The Court found the testimony of each of the witnesses who testified live to be earnest and credible. 7 Hedges does not speak German but does speak English, French, Spanish, and Arabic. Tr. 157. 15 in Djerba in Tunisia, and he covered Richard Reed, the so-called “Shoe Bomber.” Tr. 158. Hedges testified that some of the people he has interviewed in connection with his work were al-Qaeda members who were later detained and are currently in prison. Tr. 158. Accordingly to Hedges himself, his reporting on al-Qaeda or other terrorist organizations is read widely in the Middle East. Tr. 159. Certain of Hedges’ writings appear on Islamic or jihadist websites. Id. Hedges stated that having covered war for 20 years, he is familiar with the fact that a number of individuals who may be detained as enemy combatants might not have ever carried a weapon. Tr. 160. In that regard, he referred to Osama Bin Laden’s driver, a Guantanamo detainee. Tr. 160. Hedges testified that he has read § 1021 of the NDAA. Tr. 160. Hedges testified that he is also familiar with the provisions of the AUMF and has a specific understanding as to what they mean. Tr. 165 (“enemy combatants on foreign soil that are engaged in direct hostilities with the United States and are linked directly with those who carried out the attacks of 9/11”). He does not, however, understand that § 1021 is entirely co-extensive and goes no further than the AUMF. Tr. 165. Indeed, he testified that he reads §1021 as “radically different” from the AUMF. Tr. 166. In that regard, Hedges is unclear as to the 16 meaning of what constitutes “associated forces” in § 1021, see Tr. 168, nor does he understand what the phrases “engaged in hostilities,” “covered person,” or “substantially supported” means as used in § 1021, Tr. 162-63. Hedges testified that he has reported on 17 groups contained on a list prepared by the State Department of known terrorist organizations. (See Court Ex. 9 (Country Reports on Terrorism, Report of the U.S. State Dep’t, Ch. 6 (“Terrorist Groups”) (Aug. 2010) at 1 (Certification of Christopher Lynn Hedges Ex. A (Dkt. No. 11-1).)8 Hedges testified that some of those organizations are considered to be in hostilities with coalition partners of the Included among the groups on which Hedges has reported (and which are on the State Department lists admitted as Court Exhibit 9) are: the Abu Nidal Organization, the al-Aqsa Martyrs Brigade, the Armed Islamic Group, Al-Jihad, the Gama’a al-Islamiya, Hamas, Hizballah, Kahane Chai, the Konga-Gel, KGK (a/k/a “PKA”), the Mujahedin-e Khalq Organization (“MEK”), the Palestine Liberation Front, the Palestine Islamic Jihad, the Popular Front for the Liberation of Palestine (including also the Central Command), al-Qaeda, Revolutionary People’s Party/Front, and the Salafist Group for Call and Combat. (Id. at 1-2.) See also Tr. 169. 8 References to “Court Ex.” refer to documents marked for identification during the March 30 preliminary injunction hearing. 17 United States. For instance, the PKK is engaged in hostilities with Turkey, which is one of the United States’ coalition partners. Tr. 169. In connection with his coverage of the PKK, he travelled with members of the PKK on occasion, and was with the PKK when it was attacked by Turkish war planes. Tr. 170-71. Other groups Hedges has covered, such as the Popular Front for the Liberation of Palestine (“PFLP”), have carried out acts of terrorism against U.S. targets. Tr. 170. Hedges has also had a number of speaking engagements in Belgium and France in which he has encountered and conversed with members of al-Qaeda and the Taliban. Tr. 174. In connection with his reporting on Hamas, Hedges met with members of Hamas’ leadership, stayed in their homes, and socialized with them. Tr. 172. Hedges lived in Gaza and had frequent contact with members of Hamas in connection with his work. Tr. 172. Hedges testified that because he speaks a number of languages, he has been approached by publications--e.g., Harper’s Magazine, the Nation and others--to return to the Middle East as a correspondent. Tr. 172-73. He testified that he has a realistic expectation that his work will bring him back to the Middle East. Tr. 173. Hedges testified that since the passage of § 1021, he has altered his associational and speech activities with respect to 18 some of the organizations upon which he previously reported due to his concern that those activities might bring him within the ambit of § 1021, thereby subjecting him to indefinite military detention. See, e.g., Tr. 174, 177, 186 (“When people begin to speak about carrying out acts that are clearly illegal or embracing acts that are violent or talking about terrorism, my reaction so far is to get out as fast as I can because I think under the NDAA i.e., § 1021], at least as I see it, there is a possibility that those people looking at my activities from the outside would not make a distinction between myself and the person who embraced that kind of activity.”). At the time of the hearing, Hedges had speeches scheduled in Paris and Brussels at which he expected members of al-Qaeda or the Taliban to be present and he intended to change his speech as a result of § 1021. Tr. 174. Hedges also testified that he has previously associated with a group called Bob Avakiam Revolutionary Party, a Maoist group, which he stated he understands endorses the use of violence towards revolutionary ends--a philosophy to which Hedges stated he did not ascribe. Tr. 177. Despite that fact, Hedges understands § 1021 as potentially encompassing his association with the Avakiam Revolutionary Party and thus, the statute already has had a chilling effect on his associational activities. Tr. 177. 19 Hedges testified that prior to the passage of § 1021 he had never feared military detention for his activities. Tr. 206. 2. Alexa O’Brien Alexa O’Brien has written a number of articles on a variety of topics relating to, inter alia, interviews of prison guards or detainees at Guantanamo Bay. (Court Ex. 3 (series of articles authored by O’Brien, published on WL Central).) She refers to her occupation as a “content strategist.” Tr. 38. She is the founder and website designer for U.S. Day of Rage. Tr. 40, 42. She testified that she founded U.S. Day of Rage in March 2011. Tr. 42. U.S. Day of Rage has never been involved in armed conflict with the United States, and never been a co-belligerent with al-Qaeda or the Taliban, according to O’Brien. Tr. 52, 56. O’Brien is also a contributor and editor to a website called “WL Central.” Tr. 40. WL Central is “a collection” of international news journalists. Tr. 40. O’Brien testified that “our definition of ‘news’ is information that enables citizens to govern themselves.” Tr. 40. O’Brien has made a number of contributions to that website, including reporting on WikiLeaks’ release of U.S. State Department cables, the “JTF” Memoranda for Guantanamo Bay, and various revolutions in the Middle East (e.g., Egypt, Bahrain, Yemen, Iran). Tr. 41. Her reporting has included both articles and live blogs. Tr. 41. Altogether, since January 2011, she has written approximately 50 pieces covering these types 20 of topics. Tr. 41. She testified that to her knowledge WL Central has not been involved in armed conflict with the United States nor has it been a co-belligerent with al-Qaeda or the Taliban. Tr. 56. O’Brien testified credibly that in February 2012, she learned that an individual employed by a private security firm had allegedly been asked to tie U.S. Day of Rage to Islamic fundamentalist movements. Tr. 43. She received a copy of an email which indicated that there had been communications in this regard dating back to August 2011. Tr. 43. The email exchange was located on the WikiLeaks website and was between individuals named Thomas Kopecky and Fred Burton. Tr. 45. Based on first-hand knowledge, O’Brien testified that she is aware that Burton is a former diplomatic security official, previously employed by the U.S. State Department. Tr. 45-46. O’Brien testified that she also received twitter messages from a private security contractor called Provide Security. Tr. 47. One of the messages indicated that U.S. Day of Rage had been found on an Islamic jihadist website. Tr. 48. The message stated, “Now you are really in over your head with this. Muslims from an Afghanistan jihad site have jumped in.”9 9 The messages that O’Brien received were marked as Court Exhibit 4, admitted to show the reasonableness of O’Brien’s fearful state of mind regarding being subject to § 1021, and not for the truth. 21 O’Brien also testified that in September 2011 she was contacted by someone she knew to be a Federal agent, but to whom she guaranteed confidentiality of source. Tr. 52. She testified that that individual had seen a memorandum from the Department of Homeland Security (“DHS”) addressed to law enforcement across the nation (a) regarding the fact that DHS planned to infiltrate U.S. Day of Rage and (b) linking U.S. Day of rage to a loosely knit “organization” called “Anonymous” that O’Brien knew to be associated with cyber-terrorism. Tr. 51-54. O’Brien later met with a journalist who told her that he had seen either the same memo to which the federal agent had referred or one with similar content. Tr. 69. O’Brien testified that in August 2011 she learned of an article suggesting that U.S. Day of Rage had been posted on Shamuk and Al-Jihad, two al-Qaeda recruitment sites. Tr. 59. O’Brien testified that since § 1021 has gone into effect (or when she perceived it to go into effect because there is a dispute by the Government as to when § 1021 became effective), it has had a chilling effect on her speech. Tr. 72 (“Court: Are you saying that there is a causal relationship between the passage of § 1021] and your withholding of these articles? A: Absolutely.”). She testified specifically to two articles that she has withheld from publication. Tr. 70. One of the articles details conversations with former military personnel at Guantanamo 22 describing physical restraints used there and other information. Tr. 70. The second article relates to discussions with a defense attorney making accusations that a military defense attorney for a military detainee “threw a case.” When asked why she had withheld those articles, O’Brien testified she could not risk the danger to herself under § 1021. Tr. 71. She testified that prior to the passage of § 1021, in July 2011, she had published an article relating to a former Guantanamo detainee, Omar Deghayes, and that she was currently concerned regarding whether her publication of that article could be encompassed within the conduct of § 1021. Tr. 77. Plaintiffs marked as Court Exhibits 2 and 3 a number of articles published by O’Brien. Exhibit 3 consisted of a compilation of articles that on the topics she testified gave her concern with regard to whether they would be encompassed by § 1021. Tr. 79-80. O’Brien also testified that she has incurred expenses in connection with § 1021 including the purchase of an additional hard drive on which she double encrypts files in order to protect them from detection by others, including for purposes of protecting them from the NDAA. O’Brien testified that she has read § 1021. Tr. 74. She testified that in particular the statute’s references to “associative sic] forces and substantial support” led to her withholding her articles. Tr. 74. She stated: 23 I think it’s best to use an example of someone like Sami Al-Hajj, who is a Sudanese Al Jazeera cameraman, who was later released from Guantanamo Bay and now works for Al Jazeera. Again, ‘substantially supported,’