What’s At Stake

What’s At Stake

Saturday, February 25, 2017

Pizzagate Turned PedoGate Leads to Momentum Surge in Busting Global Child Sex Trafficking Rings

 

source of featured image: http://dianedimond.net/whats-your-definition-of-a-pimp/ 

music:

https://www.youtube.com/watch?v=ll3CMgiUPuU 

 

 

This article will examine the current status of the so called “Pizzagate” scandal. But from here on out this presentation will refer to it as PedoGate for several reasons. Pedogate involves global child sex trafficking networks that have been operating over a lengthy period of time, far beyond the WikiLeaks release of the John Podesta emails and his obsession over “pizza,” and incriminating contents found on disgraced former New York congressman Anthony Weiner’s laptop leading up to last November’s election. PedoGate also extends far beyond the so called Comet Ping Pong pizza parlor in Northwest DC that was last year’s epicenter of alleged child sex crime activity resulting from an intensive online investigation linking Comet to the Podesta brothers, the Clintons, Obama and George Soros. And though virtually every business on that entire DC block located so close to the White House may well be [or have been] involved in a major Washington child trafficking sex ring based on substantive circumstantial evidence uncovered, PedoGate addresses the growing global epidemic of children being abducted from their hometowns and moved across both state and international borders for the purpose of sexual exploitation as victims of pedophilia, pornography, Satanic ritual abuse and even sacrificial murder.

With the internet age, 76% of pedophile sex with underage girls starts out as online contact. Of the estimated up to 800,000 victims of human trafficking each year, 76% are women and girls and 27% are children. When internally trafficked victims are included, the numbers jump to 2-4 million annually raped, beaten and tortured. Half of the worldwide trafficked humans within a country are children. In the global commercial sex trade, 2 million children are being exploited. Worldwide human trafficking has skyrocketed since 2012 with over 20.9 million victims.

At $32 billion a year, profit from human trafficking has even surpassed the total global illegal arms sales. Up to 300,000 US children are lured annually into the commercial sex trade. Of those exploited children, 14,500 to 17,500 are trafficked into America from other countries. The average age is 11-14 and the average lifespan of child trafficking is only 7 years with death caused by attack, abuse, overdose, HIV/STD’s, malnutrition and suicide. Clearly, sexually exploited children have reached the global crisis stage.

Just prior to the election last year psychiatrist and longtime intelligence operative within the state department Steve Pieczenik has stated publicly that both Bill and Hillary Clinton are pedophiles having made multiple trips on their buddy sex offender Jeffrey Epstein’s Lolita Express to his Caribbean sex slave island.

Epstein is the most infamous case in recent years that links the Clintons, Anthony Weiner and his estranged wife Huma Abedin, Hillary’s longtime aide. Multi-billionaire Jeffrey Epstein was investigated in 2005 in Florida, arrested in 2006 and convicted in 2008 of pedophilia, having to register as a sex offender after being convicted of having sex with underage girls. His mansion on his private Caribbean island, Little St. James in the Virgin Islands, has been the Lolita Express getaway destination for a number of high profile pedophiles who “partied,” engaging in sex with child slaves. One victim said the mansion was wired with secret cameras in a number of rooms where recorded orgies and sex with minors are filmed for blackmailing purposes of powerful invited guests. In addition to the Clintons and Weiners, retired Harvard law professor and attorney Alan Dershowitz who represented Epstein and got him off with a sweetheart deal along with English royalty Prince Andrew and Oscar-winning actor Kevin Spacey are all known to have traveled on Epstein’s private Boeing 727.

Veteran CIA case officer and US Marine Corps intelligence officer Robert David Steele maintains that Epstein has been a Mossad agent who was set up as a “made” financier to work on behalf of Israel to entice numerous high profile politicians both from America and abroad to his island, equipped with electronic monitoring in order to get the dirt on the world’s major power players for potential blackmail and subsequent control. Department store tycoon and ultra-Zionist Leslie Wexler took a young Epstein under his wing as his mentor, and suddenly Jeffrey Epstein went from prep school math teacher and college dropout to owning Wexler’s Manhattan East Side mansion and managing billionaire hedge funds. Epstein also employed media mogul-Mossad spy Robert Maxwell’s daughter Ghislaine Maxwell as his longtime girlfriend and closest assistant. As a Mossad agent Epstein was nearly overnight transformed mysteriously into a billionaire owning massive amounts of real estate properties in Palm Beach, NYC, his “Virgin” Island, New Mexico and a Paris apartment.

By capturing on video file the world’s political elite in compromising positions as pedophiles, such pro-Israel senators as John McCain, Lindsey Graham and Chuck Schumer are forever controllable and beholding to the Greater Israel Project, committed haters of Russia and Trump, and traitors of America. That way Congress and presidents are easily bought, sold and completely owned by the powers-that-shouldn’t-be.

Additionally, an anonymous Homeland Security Department insider explained that Israel, Mossad, the CIA and UK’s MI6 are working together to manipulate their blackmailed puppets like the three aforementioned politicians to so vehemently oppose Putin and Trump’s desire to forge a partnership to “eradicate ISIS off the face of the earth.” It’s in the interests of the globalists, US deep state, DC neocons, Israel and Saudi Arabia to keep ISIS alive in order keep their “endless war on terror” going, and continue provoking Russia, China and Iran as designated cold war enemies to trigger World War III. The destruction of the United States and the entire Western civilization is an integral part of their diabolical agenda to foist a one world crime cabal tyranny on every human inhabiting the earth. To this sinister end, blackmailing and controlling power puppets in the worldwide halls of government is an effective means to bringing their perversely demonic nightmare to full fruition.

Both the DHS source and Steele maintain that a large number of major players in Washington are pedophiles who have become tools for deep state and the puppet masters to own and control. The DHS operative claims that about one third of the Congress members in the two major parties are pedophiles and Steele estimates that the over 500 internal enemies operating within the US government are bona fide US traitors actively conspiring to overthrow Trump.

President Trump’s first choice for Labor Secretary, fast food mogul Andy Puzder, after realizing his confirmation was highly unlikely based on the prehearing backlash, decided to withdraw his nomination. Chief amongst a number of personal issues is his ex-wife disclosing on Oprah Winfrey years ago how her husband abused her. So Trump’s next choice to fill the post announced last week also comes with a load of controversial past baggage. Alexander Acosta happened to be the southern Florida district US attorney from 2005 to 2009 who oversaw and agreed to the sweetheart deal given to convicted pedophile Jeffrey Epstein. And in so doing, Acosta violated the Crimes Victims Act, never bothering to inform Epstein’s victims about letting the billionaire off so easy. Epstein pleaded guilty to one felony count of soliciting prostitution and another felony for procuring sex with a minor, serving 13 months of an 18 month sentence. Sex with teenage girls under 18 is a federal crime that normally carries a minimum sentence of ten up to fifteen years in prison. But once again, if you’re an elitist 1%-er, you either get off completely or receive a mere slap on the hand issued with a standard get-out-of-jail card.

Subsequently when the then two underage minors learned of Epstein’s ridiculously light sentence many months later, they took Epstein to federal court charging that their rights had been violated under the Crimes Victims Act requiring prosecutors to inform victims of the convicted perpetrator’s plea bargained sentence. Undoubtedly had they lawfully been looped in, they never would have agreed to Epstein’s sweetheart deal. The pedo-billionaire was allowed a private wing at the West Palm Beach jail that permitted him to be a free man all day long six days a week for “work” purposes and only report back to confinement to sleep overnight. To not have to serve time in state or federal prison for those felony sex charges but at a local jailhouse is equally unheard of. Signing off on such a sweet arrangement for a convicted pedophile, then reacting to the flak once word got out, attorney Alexander Acosta defensively wrote in a 2011 letter:

Our judgment in this case, based on the evidence known at the time, was that it was better to have a billionaire serve time in jail, register as a sex offender and pay his victims restitution than risk a trial with a reduced likelihood of success.

So rather than risk Epstein walking after a potential yet unlikely not guilty verdict in a federal court, Acosta opted to accept the plea bargain deal at the state court level that was personally authored by Epstein’s famous lawyer Alan Dershowitz. Aside from coming up with the details in a joke of a sentence, the Epstein defense team led by Dershowitz also told Acosta to break the law by not notifying the victimized plaintiffs about their secret deal, so a compromised Acosta went along with his instruction from the criminal’s “dream team” and it was months afterwards that the two girls finally did learn of the gross travesty of justice. Acosta himself described the many months of negotiations prior to the September 2007 non-prosecution agreement as “a year-long assault” “more aggressive” than he and his prosecutors ever encountered by the pit-bullish Dershowitz team that included Kenneth Starr (investigator of Clinton-Lewinsky fame), hotshot Florida trial lawyer Roy Black and star attorney Gerald Lefcourt.

Another underage accuser filing suit against Epstein, Virginia Roberts Giuffre, later also accused Dershowitz of having sex with her on board Epstein’s plane as well as on Epstein’s sex slave island among the sex offender’s other stateside owned estates. With his wife, Dershowitz admittedly has vacationed at Epstein’s Florida mansion and Dershowitz’s name did also appear numerous times on the infamous air flight log of the Lolita Express to the Virgin Island mansion. In recent years the famous 78-year old powerhouse attorney has scrambled to defend both his reputation and legacy despite a defamation suit against him being dropped last year. But his accuser and her lawyer dispute Dershowitz’s repeated denials, so a cloud of controversial doubt still hangs over the lawyer famous for his aggressive courtroom tactics.

Uncovering letters between Acosta’s office and Epstein’s legal defense team, the victims’ lawyers contend that a conspiracy to conceal vital information not to prosecute took place between the government and Epstein attorneys. And the two victims’ subsequent civil suit that awards no financial damages to them nor reopens the case for meting out any further punishment, filed way back in 2008 has ever since been stalled in federal court, remarkably still pending after all these years. At a hearing last summer a federal district court judge ruled that Epstein would be required to testify and answer questions under oath from his victims’ attorneys. Additionally last month a new civil case was filed against Epstein and his fellow child sex traffickers scheduled for a pretrial conference on March 9th, 2017. Court records show that Epstein has had sex with at least 30 or more girls under age 18 and has been allowed to simply pay dozens of them off with confidential financial out-of-court settlements. Estimates including Epstein’s teenage victims who chose to avoid legal action number in the hundreds. But the insular systemic protection that Epstein and his high powered friends like the Clintons have enjoyed for decades may just be coming to an end now.

As the world recognizes pedophilia as an out of control, heinous act of the worst kind, perhaps some form of legal justice may prevail in holding the monsters accountable… though the injustice perpetrated on the millions of child victims worldwide may never be resolved. Having worked as a therapist with sexually abused youth and adolescents for many years, the emotional scars and damage can be permanent, depending on the age and severity of abuse. What’s even more disturbing is the fact that child protective services (CPS) in America are a growing part of the problem. From 2008-12 the number of referrals for child protective services have spiked by 8.3% while overall rates of actual child abuse have dropped by 3.3%. This statistic indicates that CPS is overstepping its bounds, too often intervening when it’s not warranted.

The one government agency designed from the outset to protect children seems to be increasingly guilty of literally snatching children from their biological families where no abuse is occurring and criminally funneling and selling children for profit to a highly organized, well-funded black market of worldwide child sex trafficking rings. An extremely brave Georgia state legislator Nancy Schaefer and her husband were likely murdered in 2010 because she was exposing this diabolical system. These worldwide networks abducting and trafficking kids are covertly financed, supported and protected by national governments and their court systems, European royalty, various deep pocketed non-government organizations and very prominent pedophiles lurking and embedded at the highest echelons of global power and control.

As one example, UK entertainer Jimmy Savile got away with raping and pimping small children for a half century, protected by the likes of the BBC, Prime Minister Margaret Thatcher and the royal family. Former British Prime Minister Edward Heath was also a pedophile.

Over the near decade since Epstein’s conviction, the truth has slowly trickled out, exposing a dark, twisted and perverse sex slave trafficking network that Epstein and his bevy of co-conspirators, allegedly recruiting child victims as sex slaves from poorer Florida neighborhoods. Incredibly, his trio of female procurers were all granted immunity as the victims’ handlers trafficking them as directed by Epstein to the sex slave island and his other residential locations serving the pedophilia crowd from the billionaire’s black book containing names of many high powered CEO’s, entertainers, presidents, prime ministers, royalty, judges as well as politicians, for blackmailing purposes so that US deep state and Israel can continue unchallenged controlling the global geopolitics chessboard.

Even President Trump apparently was a longtime close friend of Jeffrey Epstein. In a 2002 New York Magazine issue, Trump gave this glowing report on his pedo-pal:

I’ve known Jeff for fifteen years. Terrific guy… he’s a lot of fun to be with. It is even said that he likes beautiful women as much as I do, and many of them are on the younger side. No doubt about it – Jeffrey enjoys his social life.

From this brief but rather revealing account, it sounds as though the Donald knew back in 2002 that his longtime bud was in fact a pedophile three whole years before he got caught.

Another bizarre twist hit Trump last April and June when yet another alleged underage victim who went by the pseudonym Katie Johnson first filed an April lawsuit in California that was thrown out. But then she filed another suit a few months later in New York against both Epstein and then presidential candidate Trump. Johnson accused Trump of raping her repeatedly when she was only 13. One of Epstein’s recruiters of underage girls calling herself Tiffany Doe apparently claimed that there exists corroborating evidence that Tiffany not only furnished Katie Johnson as a barely teen aspiring model-Oklahoma runaway fetched fresh from Port Authority to an Epstein party where Katie allegedly was raped in violent sex roleplays by Trump at several of Epstein’s New York sex parties in 1994. Of course when this latest bombshell surfaced last summer, Trump denied raping any girl and claimed that he barely knew Jeffrey Epstein. Then just four days before Election Day, Johnson’s sex suit was suddenly dropped, allegedly because she had made up the story. Among the doubters of course were Hillary supporters who immediately suspected that Johnson had been secretly paid off or that her life was threatened. At this point we may never know the real truth.

But what we do know from both media and police records, Epstein’s infamous black book contains 14 personal phone numbers belonging to Donald Trump, including his ex-wife Ivana and daughter Ivanka as well as his then future wife Malania. Also records demonstrate that Trump has made phone calls to Epstein, dined and partied at the pedophile’s Florida and Manhattan mansions, that Epstein has been a visitor at Trump’s Mar-a-Lago and that Trump has flown on Epstein’s infamous plane (though unlike Bill and Hillary, Trump’s name has not surfaced yet on any known flight logs).

Trump promised at the second presidential debate that when president, he’d put Hillary Clinton behind bars, receiving high marks from millions of debate scorekeepers. On another occasion, Trump alluded to “a lot of legal problems coming up” for Bill Clinton over his past Epstein liaisons. Yet once winning the election, the president Trump has backed off considerably, claiming that Hillary “has been through enough” to not bother going after her.

There can be no dispute that Donald Trump and the Clintons were both in tight socially with the same convicted pedophile friend, and clearly ran with the same highbrow New York crowd. Trump is also on record having financially donated to the Clinton cause as well as taken a series of photos together, one on a boys club golf outing with Bill Clinton that included former “Big Apple” mayors Rudy Giuliani and Michael Bloomberg, as well as other family album pics with the Trumps and Bill Clinton arm and arm and the Donald yukking it up with the Clintons looking like they’re best of friends together. So if President Trump suddenly becomes overwhelmed with compassion and pity towards Hillary that “prevents” him from further investigating the Clintons’ shady, murderously treasonous, pedophile past, of course that only will raise more suspicions that “birds of a feather flock together.” Also perhaps his most popular and appealing campaign promise, to “drain the swamp,” will be completely shot to pieces if he lets the Clinton crime cabal off the hook, becoming more than convincing evidence that he too is cut from the same criminal cabal cloth. Trump loyalists will be hard put to defend their president if he fails to hold the Clintons accountable.

And now in a very much related matter, Trump is apparently rewarding the former US attorney who let the Clintons’ and Trump’s longtime pedo-friend off the hook as Trump’s latest choice for US Labor Secretary. This move certainly will not help Trump’s cause, at either draining the swamp or distancing himself from that same global pedophile sex ring cabal.

Always insightful investigative journalist Wayne Madsen offers a great idea on how Trump can begin draining that swamp:

Trump should start his anti-trafficking campaign by seizing Jeffrey Epstein’s planes and Little St James Island. But then, Jeff may release the pics, audio & video of the Wexner mansion from 1994.

The following fact speaks volumes: just hours after National Security Advisor Michael Flynn’s forced resignation, a gloating Hillary tweeted a Happy Valentine’s Day message revealing that Flynn got canned for getting too close to the Pizzagate “fake news” scandal. It was her coup d’état on Trump for his apparently feeble attempt to normalize relations with Putin as Trump that same day waved his white flag also on Twitter demanding that Putin get out of Crimea. Does this mean Trump’s vow to drain the Clinton-owned swamp and avoid World War III against nuclear powered Russia were mere empty word campaign promises simply to get himself elected? Similar to Obama’s false promise to be the most open and transparent president in US history? Only time will tell.

Then when added to this mix the highly credible, former CIA source Robert David Steele’s recent disclosure that Flynn had acquired an FBI pedophile list of top DC politicians, immediately Flynn’s firing makes much more sense. Steele maintains that one of the names on that pedo-list happens to be Vice President Mike Pence’s “best friend.” It was falsely reported in fake-stream press that Flynn withheld information from Pence about Russian sanctions, but instead he withheld info about PedoGate and an FBI list Flynn had in his possession targeting high profile offenders from both the Republican and Democratic parties that includes Pence’s best friend. Deep state CIA/NSA sources sympathetic to Clinton and Obama had illegally recorded and leaked Flynn’s late December ambassador conversation(s) to the Washington Post. But Pence grew upset when he found out that Flynn had failed to mention to him that the security advisor had shared with the Russian diplomat his and the FBI’s plan to take down top name Capitol Hill pedophiles.

Robert David Steele also revealed that in certain select restaurants in Washington DC and Saudi Arabia that a member of the elite pedophile club “can order children off the menu,” implicating a high powered international child sex trafficking ring operating between major players in both the US and Saudi governments. Movement of trafficked children from the US and around the globe suddenly become child victims in a system where the US State Department is complicit in a steady flow of abducted children bought and flown in to be used as sex slaves by powerful sick high-end rollers that are oil-rich sheiks and princes. Saudi princes are the worst culprits due to the wide acceptance of sex with young children as their privileged right. Under diplomatic immunity many foreign based trafficking rings operating in the US remain off limits to both parents and law enforcement.

Hundreds if not thousands of innocent American kids in recent years have been lured abroad by modeling or acting opportunities. Most children are snatched up by stateside child trafficking procurers, often drugged and rapidly transported and forced into a life of sexual slavery inside terrorist supporting Gulf State monarchies that not only include the House of Saud but also United Arab Emirates, Qatar and Kuwait, all having direct links to the Clintons. Hillary accepted Clinton Foundation money from them knowing the Gulf States were the chief financiers of ISIS that she and Obama created. In fact, 20% of Hillary’s pay-to-buy-her presidency was supplied by Saudi Arabian money alone. Her notorious pay-to-play arms trade deals while Obama’s Secretary of State are well documented. So are international drug trafficking and money laundering by the Bush-Clinton crime cartel.

But the Bush and Clintons’ lesser known illicit enterprises continue to be human trafficking of children as sex slaves. Recall George senior’s tainted White House with “midnight tours” for young boys from Nebraska’s Boys Town in the horrific Franklin scandal of the late 1980’s, excellently documented in the film “Conspiracy of Silence” that was suddenly pulled from viewing on the Discovery Channel. It’s also important to mention in recent years that the US has supported ISIS in both its human sex trafficking, arms trafficking as well as human organ trafficking with prime suspect Israel as the controlling hub.

Though Middle Eastern Gulf States may be a primary perpetrator destination for the child sex trafficking trade, the guilty parties amongst Gulf State royalty and wealthy families are still a relative minority. It’s also important to note that they are not alone in the heinous human trafficking industry. For example, the Eastern European nation Romania made up 40% of the exported human trafficking victims in Europe tracked by Europol from 2009 to 2013. Additionally, the US led NATO-UN peacekeeping forces deployed during the balkanizing aftermath of war in the former Yugoslavian Republic, overnight created organized crime that profited from trafficking women and underage girls for the commercial sex trade. In 2015 the UK saw a 40% increase in human trafficking from the year prior with nearly 20% coming from Albania.

Also the tiny oil-rich Asian nation of Brunei (5th richest in the world) is also infamous for importing enslaved female child sex victims from the United States. The younger brother of a Brunei sultan, Prince Jefri Bolkiah, has made it his harem habit plucking up young beauties from America and Europe. Former Miss USA Shannon Marketic was fortunate enough to escape from her Brunei prince’s enslavement comprised mostly of underage girls, but lost her $10 million lawsuit to diplomatic immunity.

Again, sex trafficking is a global problem with the most active movement of abducted victims from poor and violent Third World countries to more affluent Western destinations. For example, war torn Syria and Yemen possess large preyed upon source populations. Algeria and Libya are slave transit countries and Sub Saharan Africa are also exploited for slaves. Thailand is among the worst nations for human trafficking as a sex trade source, destination and transit location. The Marshall Islands are a source for sex slaves servicing the fishing trade. The poor “hermit” nation North Korea also acts as a source for human trafficking, some sold to China and Siberia by their own government. As geographic gateways to Western Europe, sex trafficking in Moldova and Ukraine are source nations and Belarus and Russia are prone to serving as both source and transit nations. Per capita, Europe has the dubious distinction of having the highest level of sexual slavery in the world, although in pure numbers Asia does.

Perpetrators and accomplices including both US federal government agencies as well as their US private contractors are both notorious for their criminal involvement, with DynCorp and Halliburton amongst the worst contractor offenders operating overseas. Protected by management, DynCorp employees in Bosnia bought and sold underage girls as sex slaves. Raping of underage victims with impunity by both US military as well as US civilian personnel in foreign nations is commonplace. With equal impunity, UN peacekeeping forces also regularly engage in sexual misconduct with young girls, in 21 different nations in 2015 alone. Even Wall Street’s largest bank Goldman Sachs was caught investing in a media company running a sex trafficking forum.

Since Pizzagate broke late last fall, a couple of the more noteworthy developments involving individuals connected to PedoGate are the recent search warrants issued for New Hampshire Democrat Alderman and State Representative Thomas Katsiontonis’ home and two of his pizza businesses. Not surprisingly Katsiontonis has ties to both Hillary and Obama. Also infamous pedophile and former Penn State Coach Jerry Sandusky’s adopted and no doubt sexually abused son was arrested on pedo-charges. Currently America’s law enforcement is deploying a strategy of arresting the little fish that feed at the swampy bottom of the predator pond acting as recruiters of child victims supplied to the bigger fish predators at the top of the food chain like the Clintons. As the little fish squeal the beans for lighter sentences, the bigger fish will fry. Ultimately the best means of most rapidly arriving at the full truth is through setting up truth and reconciliation commissions.

Perhaps rounding up the little fish explains multiple international police actions recently making an unprecedented number of busts of large trafficking rings just since Pizzagate broke late last year. A recent ZeroHedge article details the chronology of major arrests involving various sex trafficking networks across America just since Trump took office, which already has doubled the total for the entire year in 2014. With the Epstein case a rare exception, until just recently police officers who’ve devoted their entire careers investigating and cracking pedophile cases have consistently been stopped short of making arrests beyond the lowest levels before their higher-ups in metropolitan, state and federal law enforcement agencies prohibited further pursuit of predators at the top rungs of the pedophile power pyramid.

So far those who are part of the elite that have engaged regularly in pedophilia for literally centuries have been protected by police, high courts and governments, immune from prosecution with very few exceptions. Aside from Epstein, another rare exception is the longest running GOP House Speaker Dennis Hastert who to this day is still friends with the Podesta brothers. Though due to expired statute of limitations, since April last year Hastert is doing 15 months in prison for violating banking laws, withdrawing $1.7 million as attempted hush money to pay off a pedophile victim and then lying to the FBI. Since then a number of Hastert’s victims have come forth. Fortunately for humanity, it appears that the age-old protection of sexual predators acting out their evil pathology at the very top levels of power may finally be coming to a close we hope.

Three weeks ago an alleged FBI insider implicated such household names as Senators John McCain, Lindsey Graham, Tim Kaine, Chuck Schumer and House minority leader Nancy Pelosi as suspected pedophiles soon to be arrested after Attorney General Jeff Sessions signed their arrest warrants. 30 highly known politicians and 40 other suspects involved in the Washington-Virginia-New York City areas that are part of the child trafficking pedo ring will allegedly be arrested.

As public awareness of the growing pedophilia networks increases as an international epidemic, movement by the mainstream media, deranged head shrinks and its controllers have quietly been pushing to acclimate, normalize and ultimately legalize pedophilia. An example is a New York Times article that makes the twisted argument that pedophilia is a mere illness and not a crime. Mass media through the entertainment and mass advertising industries satanically handled by infested Hollywood pedophiles in high places, have sought to brainwash the global population into accepting pedophilia as a mere life choice or sexual orientation. This demented push in mainstream mass media is a well-organized, well-funded, insidiously unfolding propaganda scheme to destroy our values and morality as well as an overt assault on families, religions and national sovereignty, the same centuries held objectives of powerful evil secret societies like the Illuminati and Freemasons.

Yet another disturbing facet of the PedoGate story and its related scandals is the horrific fate of journalists and whistleblowers who have boldly attempted to expose the sinister truth. A long list of these courageous heroes have paid the ultimate price in America and around the world for simply telling the truth. The “suicided” murder of journalist Gary Webb for uncovering the Iran Contra affair that pumped tons of cocaine into America’s ghettos and barrios in the 1980’s was run by VP daddy Bush using his CIA foot soldiers in their war on drugs and minorities for black ops profit. To further decimate the African American community, his successor Bill Clinton and his 1994 Crime Bill needlessly filled up prisons with nonviolent drug offending persons of color, and allocating near $10 billion for private prison construction and keeping the feds’ drug war flourishing. After all as governor, the Clintons had profiteered generously and politically from running HW’s operations out of the Mena airport as the US cocaine distributor during the 1980’s.

Investigative reporter Danny Casolaro stumbled upon the Clintons Mena drug connection under the first Bush regime and while writing a book exposing the Bush-Clinton crime cartel, he was suddenly found dead in a West Virginia hotel room in August 1991 with both his wrists deeply slashed. The evidence he’d compiled in his writing was missing from the crime scene and the fatal cuts made it impossible for his second wrist to be self-inflicted. As two truth telling journalists Webb and Casolaro lost their lives from efforts to expose the Bush-Clinton cabal that with CIA involvement controlled illegal drug and arms running that in turn contributed to the enormous covert black ops budget. Since the Vietnam War the CIA has remained as much or more in control over our planet’s drug smuggling operations than so called organized crime cartels.

Thirty-three year old journalist Michael Hastings died in June 2012 after his late model Mercedes Benz was more than likely electronically remote controlled to speed up to 100 MPH in the streets of Los Angeles prior to it exploding, its engine thrown 100 feet away from where the charred blackened vehicle remains ended up having nothing to do with impact collision with any object or tree. That same day Hastings had told friends his car was behaving strangely and he felt he was being investigated by the FBI, which was true on both accounts. The Rolling Stone reporter had written articles that boldly exposed and ruined one general’s career in Stanley McChrystal and slammed another in a David Petraeus critique of his failed Afghanistan surge. Hastings was very likely targeted by CIA director John Brennan who according to the intel site Stratfor had an axe to grind against journalists, especially ones like Michael Hastings who was working on an expose to uncover deep state’s rampant criminality operating with total impunity around the world.

Less than a year after Hastings’ death, Andrew Breitbart, founder of his own news agency, was most likely murdered after calling John Podesta a pedophile and exposing the Clinton child trafficking ring. Then last year while in Warsaw to speak at a conspiracy theory conference, 39-year old British Ufologist Max Spiers died mysteriously after vomiting two liters of black fluid. Several days earlier, from Poland he texted his mother saying, “If anything happens to me, investigate.” After searching for answers, his mother suspects he was murdered by a satanic cult that had pumped lethal drugs into him.

Within a few days after Hillary lost her election, young journalist Monica Petersen was mysteriously found dead in Haiti. Monica had been working on unraveling the Clinton Foundation’s raping of Haiti for billions of dollars’ worth, focusing on the goldmining operation given to Hillary’s brother and its nexus with Haitian child trafficking. The journalist’s family and friends in the US were kept completely in the dark regarding the bizarre circumstances and cause of her death. What immediately comes to mind is the long trail of fallen corpses over the past many decades left in the wake of the Clintons’ rise and fall. Another fatality was Democratic Party insider Seth Rich who was murdered last June for likely leaking DNC emails to WikiLeaks. Less than a month after lead attorney Shawn Lucas served notice to the DNC for fraud on behalf of Bernie Sanders supporters, he wound up mysteriously dead in early August last year.

On January 17th television news journalist Ben Swann had the balls to run a 7-minute segment featuring the Pizzagate story on his Atlanta CBS affiliate station succinctly capsulizing the strange circumstantial evidence. At the end Swann asks other than internet media why isn’t there a thorough, much needed police investigation as a follow-up. As the first and likely only mainstream media news anchor to date to at least seriously cover Pizzagate without the typical fake news condescension, Swann then disappeared from his CBS job along with his suddenly closed Twitter and Facebook accounts (that had near a half million followers) with only his cryptic message “going dark” on February 1st as his last post. With even his Truth in Media website down, Swann is raising speculation that deep state is silencing yet another media truth teller.

Award winning author and journalist Liz Crokin has resorted to posting a YouTube video to let the world know she is not suicidal in case something foul comes her way after being bruised and roughed up for likely writing a story about how Hillary Clinton swindled thousands from some of her poorest donors by continually charging them for funds they never authorized. As an advocate for sexual assault victims and a victim herself, she is among the few journalists with the courage to take on PedoGate having recently connected with two government whistleblowers.

Clearly heavy risks abound in exposing the dark truth about the planetary controllers. Those of us who seek the truth that will help bring down the evildoers in charge have welcomed Donald Trump’s promise to “drain the swamp.” Now that he occupies a turbulent White House being attacked from all sides by formidable opposition forces bent on destroying his presidency, it remains to be seen if he will survive much less follow through on his campaign promise to purge the scourge that’s long been embedded in the Washington machine. Though we have only just begun to see the earliest results of what appears to be a concerted worldwide law enforcement effort to rid the global child sex trafficking rings that have reached epidemic proportions, humanity’s best chance of saving our children is to clean house by bringing to justice the elite’s grip that’s controlled the pedophile networks for so long. Spreading awareness of what’s at stake here is a must if we are ever to remove the powers-that-shouldn’t-be from destroying our world, beginning with eradicating pedophilia off the face of the earth.

Joachim Hagopian @ http://empireexposed.blogspot.co.id/2017/02/pizzagate-turned-pedogate.html 

After his graduation from West Point and service as a US Army officer, Joachim earned a master’s degree in Clinical Psychology and worked as a licensed therapist in the mental health field with abused youth and adolescents for more than a quarter century. In recent years he has focused on his writing, becoming an alternative media journalist. 

nexus

nexus

OPINION: Media have chance to look in mirror as Trump continues attacks

By Walter Bird Jr. – February 18, 2017

It is beyond easy to assail Donald Trump’s position on the news media. His war with “the enemy” is filled with so much bombast, so much rhetoric, it takes neither a Pulitzer Prize winner nor a seasoned journalist to note just how ridiculous his war is.

It also takes attention away from a very real and disturbing truth: some in the media, long before Donald Trump every became president, were cheaters. Liars. Fabricators. Plagiarists.

To suggest the media as a whole have been beacons of purity, whose sole mission is to inform the people who consume their product, is beyond foolish. It is flat out wrong.

And if we in the media ourselves cannot hold ourselves accountable for the myriad ways in which we have sullied our profession, then did we not, in some way, create the juice for the anti-media venom now flowing so freely from our 45th president?

It is not to say the entire news media universe indulges in “fake news.” But the list of utter falsehoods initially passed off as truths by many respected media sources is, indeed, not a short one. Worse still, in some of the cases, there were very real and tragic consequences of the false reporting.

•As Dale Jacquette wrote in, “Journalistic Ethics: Moral Responsibility in the Media,” Newsweek, in May 2005 published a story in which it was reported that soldiers at Guantanamo Bay, Cuba, had placed copies of the Koran on toilets, in one cases flushing a copy down. That story turned out to be baseless and unsubstantiated. The damage, however, had been done. Several Islamic protests broke out. In Afghanistan, Jacquette wrote, citing the Associated Press, 14 people died in one such protest.

•Jayson Blair in 2003 resigned as a reporter at The New York Times after it was found he had fabricated or plagiarized in a number of his stories. He has done nothing of relevance as a writer since, outside of a memoir that fared rather poorly.

•In 2004, the Boston Globe published pictures from a porn web site, and passed them off as images of U.S. soldiers raping Iraqi women. The photos were quickly exposed as fake.

•Janet Cooke won the Pulitzer Prize for her 1980 story in The Washington Post about an 8-year-old heroin addict. The day after she received her award, she admitted she had made up the youthful subject of the story, “Jimmy.”

•Dan Rather reported in 2004 that George W. Bush had failed to fulfill his service to the National Guard. His report was based on documents that were later found to have been forged. Rather ended up retiring a year earlier than planned.

•Doris Kearns Goodwin was found to have plagiarized several parts of her bestselling book, “The Fitzgeralds and the Kennedys.”

•Former Boston Globe columnist Mike Barnicle resigned in 1998 after some of the facts and words in two of his columns came into question. In one, a few lines were similar to those in George Carlin’s 1997 book, “Brain Droppings.”

(Note: some of the above information was culled from the Huffington Post and Boston Globe.)

It is fair to say the “fake” in “fake news” was there long before Trump became president. What the new president has done, however, is sought to lump almost all mainstream news media into one giant pot of falsehoods and corruption. He has found among his base a rabid distrust of the media; rather, he has put together a recipe that has cooked up a hatred and disdain for many of us in the media.

The unpleasant reality is Trump is not wrong in that there are more than just the above examples of fraudulent journalism and misplaced ethics. One need not go too far back in time to see that. Donna Brazile resigned from CNN last year after leaked emails showed she had fed debate questions ahead of time to Hillary Clinton.

Where Trump falters is his blanket generalization of “fake news.” He is hardly the first to paint with a broad brush, but just as there were serious consequences as a result of some of those who committed the cardinal sin of plagiarizing or making up stories, so too is there the risk of serious damage to the public’s right to know by Trump’s no-holds-barred verbal assault on the press.

Trump would be wise to tone down the rhetoric, stop with the generalizations and not try to divide the news media and the very people they have been keeping informed for years.

At the same time, many of us in the media would do just as well to come down off our high horses, look in the mirror and admit that, on many occasions, we have lived in glass houses.

The very fate of journalism and the continued and unfettered dissemination of information to the public may well hang in the balance.

https://worcestermag.com/2017/02/18/opinion-media-chance-look-mirror-trump-continues-attacks/49475 

[&&]{**}[##]

Why Americans Don’t Trust Main Stream Media

THE MSM MUST DEAL WITH A PRESIDENT WHO CALLED THEM OUT ON THEIR “FAKE NEWS”

February 20, 2017 Frosty Wooldridge

The MSM is becoming irrelevant as more and more Americans turn to alternative media to get the real story on issues that concern them

After 30 years of slanted, biased and false news reporting from major players in the Main Stream Media (MSM) —Americans turn toward more reliable sources—such as citizen journalists writing for Internet news services.  Social media features speakers like British speaker Pat Condell telling hungry audiences what’s really happening with the Muslim invasion of Europe.

Whistleblowers such as Julian Assange and Edward Snowden exposed deeper layers of fraud and deception continuing in Washington DC and in Europe.

One look at the talking heads at CBS, NBC, ABC, NPR and CNN shows untenable bias and false reporting on multiple levels.  In the past 20 months, prominent news anchors pretty much cut off their noses to spite their faces.  Their election polls showed Hillary Clinton winning the White House while major pundits predicted Trump’s collapse.

Pelley, Muir and Holt downplayed Islamic terrorism in America by reporting “lone wolf” Muslims as mentally ill or suffering from depression—when in fact, those terrorists followed the dictates of the Quran while exacting violence.  Similar examples abound everyday in the USA and Europe, i.e., rapes, honor killings, female genital mutilation, gay killings and arranged marriages.

For the past 15 years, the anchors at NBC, CBS, ABC, NPR told the American people that 11,000,000 illegal aliens inhabited the United States.  After extensive research as to U.S. Census Bureau data by Ann Coulter in her book, Adios Amigo, she noted 31,000,000 (million) illegal migrants living, working and violating America’s laws.

All the while, Dr. Steven Camarata, researcher for Center for Immigration Studies,www.cis.org, discovered that 500,000 illegal aliens jump America’s borders annually.  His research shows the illegal population in America exceeds anything the mainstream press purports.

Additionally, while the MSM hounded General Flynn out of a job as National Security Advisor, they decline to report on 22 Islamic terrorist training camps operating in America from New York through Michigan and on to Oregon and California. Would you like to hear about these training camps concerning your family’s protection?

Host Bill O’Reilly reports explicit footages of 22 Islamic jihadist training camps in the USA in this video:

100% Video Proof of Radical Muslim Terrorist Training Camps in America – Bill O’Reilly

https://www.youtube.com/watch?v=M37z1MBvT7k [six minutes]

[Ed.: Note too that the video is posted on the channel of Forida Guns Classified.]

Clarion Project: http://www.clarionproject.org 

 

You would never hear about those terror camps from NBC, CBS, ABC, NPR or CNN.  Those camps train terrorists to kill you and your family— in your own country.  Of course, once they strike and kill countless Americans in Orlando, San Bernardino, Chattanooga or Ohio State, the MSM reports the aftermath of the massacres.

Notice the Boston Marathon bombings:  those two Tsarnaev brothers enjoyed major support from other Muslims and the imams at their Boston Mosque, but the MSM assured that no one knew anything about the brothers’ support team.

“Opposition to Islam is no different than opposition to communism, fascism, Nazism or any other belief system that seeks to control human conduct. Every American/Canadian (indeed, every human being on Earth) has basic human rights — the unalienable rights to life, liberty, and property — and every belief system with principles that violate these rights is unjust. In short, anti-communism, anti-fascism, and anti-Islam are the logical justice, whether in America/Canada or anywhere else in the world.” ~ Paul Pauker ~

While we face upwards of 31 million illegal aliens costing taxpayers $113,000,000,000.00 (billion) annually across 15 federal agencies, the MSM refuses to report on thousands of rapes, house break-ins, homicides, drug gangs, shoplifting into the millions of dollars daily, drunk driving deaths and sex-trafficking across this nation.  Do you recall MSM regularly reporting on widespread crime committed by illegal migrants?  Of course not!

Have you seen investigative journalism exposing employers of illegals such as: Chipotle’s, McDonald’s, Marriott Hotels, Tyson Chicken, Hormel Foods, Holiday Inns and restaurants because somebody pays big bucks to keep the laws from being enforced?  How much money keeps mouths shut?

As to the Syrian refugees, you won’t hear anything other than “puff” pieces by 60 Minutes or David Muir or Lester Holt, but average communities like Lewiston, Maine and Minneapolis, Minnesota all the way to Twin Falls, Idaho face massive financial and sociological impact in their cities via violent, illiterate and welfare-abusing immigrants.

Much like the false bias in the election polls showing Trump losing the presidential election, after only 30 days in office, Chuck Todd of “Meet the Press” gleefully showed 79 percent stressed democrats and 59 percent stressed republicans as to our nation’s situation.  Chuck Todd, pretending to be a journalist, demonstrates his bias at every juncture.

On “Face the Nation”, John Dickerson repeatedly reported chaos in the White House by choosing “they” and “other sources” to depict Trump as inept.  Reince Priebus, chief of staff, sternly corrected Dickerson for giving unnamed sources for such false and hollow stories.

“The real disunity is between a doomed Status Quo and those willing to deal with reality. Right now those willing to deal with reality are few, but they have the distinct advantage of reality on their side, while the Status Quo has only propaganda, artifice, phony political theater and empty promises….Every attempt to lead the public toward the realization that the present is unsustainable will be crushed by a frantic assault of the fiefdoms, cartels and players who will lose power and profits when the Status Quo crumbles under its own weight.”—Charles Hugh Smith “The Shape of Things To Come”

The MSM continues its directive to undermine, delegitimize and destabilize the Trump administration.  A report this past week indicated that Trump suffers from mental illness.  Intriguing statement, when in fact, President Trump accomplished ten major items of his campaign promises.

President Trump’s first four weeks proved the most active in recent history:

▪Executive order to stop Muslim immigration loaded with jihadists coming into America. Creating extreme vetting.

▪Stopped the Trans Pacific Partnership.

▪Put coal miners back to work.

▪Met with three top foreign leaders.

▪Started the process for building a wall to stop illegal drugs and migrants from crossing U.S. border with Mexico.

▪Increased the Border Patrol by 5,000 agents to stop the $50,000,000,000.00 (billion) in drugs crossing our borders annually from Mexico and 500,000 illegal migrants.

▪Negotiated with top CEOs to keep jobs in America.

▪Created confidence so much so the Stock Market stands at its highest in months.

▪Started rounding up and deporting criminal illegal aliens as promised.

▪Moved to replace the failed Obamacare health system that would have collapsed within several years.

▪Carried through on his promise to stop funding cities who maintain sanctuary status for illegal alien migrants.

▪Selected Neil Gorsuch for Supreme Court Judge.

When you look at the big picture, Congress and the ruling elite of DC enjoyed so much easy corruption for the past 30 years, they think it’s normal to make big bucks and cheat American taxpayers out of money and jobs. They failed to enforce our immigration laws, never passed beneficial trade laws for American jobs and did little for African-Americans as to jobs, education and training.

The elites in Congress failed to stop 350,000 anchor babies being born annually at our expense for food, housing and K-12 education.  They cried job creation while pumping 1,000,000 legal and 500,000 illegal immigrants into our country annually without rescinding the 1965 Immigration Reform Act.  Meanwhile, they jumped our federal debt to $19.5 trillion.

All of a sudden, they must deal with a president who called them out on their “fake news”.   To reporter Jim Acosta of CNN, “…very fake news.”  The American people call out those in the MSM to report the facts to us or find yourselves irrelevant.

This is what the press said about President Lincoln in 1861:  “Had we any respect for Mr. Lincoln, as a man, or as President-elect of the United States…the final escapade by which he reached the capital would have utterly demolished it…. He might have entered Willard’s Hotel with a headspring and a summersault, and the clown’s merry greeting to Gen. Scott. Here we are! And we should care nothing about it, personally. We do not believe the Presidency can ever be more degraded by any of his successors than it has by him, even before his inauguration.” November 21, 1861

In reality, Trump proves himself a workaholic for the American people.  When they tore down Lincoln, he remained steadfast for the immense mayhem of those times.  President Trump remains dedicated to the task ahead.

© Copyright by Frosty Wooldridge, 2017. All rights reserved.

http://www.capitolhilloutsider.com/americans-dont-trust-main-stream-media/ 

[&&]{**}[##]

https://gse.gmu.edu/assets/images/tr/triangle200.jpg

[Ed.: Triangulate the convergence of Doug Valentine’s remarks on Operation Phoenix, the George Webb video series with respect to Dyncorp, and the articles on Palantir et al in “Nexus”.]

[&&]{**}[##]

HOW PETER THIEL’S PALANTIR HELPED THE NSA SPY ON THE WHOLE WORLD

Sam Biddle

February 22 2017, 6:06 a.m.

DONALD TRUMP HAS inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.

Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.

Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.

“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.

https://www.youtube.com/watch?v=yAJv0EvHt_I

Palantir government 3.0

https://www.youtube.com/watch?v=yAJv0EvHt_I 

Despite all the grandstanding about lucrative, shadowy government contracts, co-founder Karp does not shy away from taking a stand in the debate over government surveillance. In a Forbes profile in 2013, he played privacy lamb, saying, “I didn’t sign up for the government to know when I smoke a joint or have an affair. … We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people we’d like to be.” In that same article, Thiel lays out Palantir’s mission with privacy in mind: to “reduce terrorism while preserving civil liberties.” After the first wave of revelations spurred by the whistleblower Edward Snowden, Palantir was quick to deny that it had any connection to the NSA spy program known as PRISM, which shared an unfortunate code name with one of its own software products. The current iteration of Palantir’s website includes an entire section dedicated to “Privacy & Civil Liberties,” proclaiming the company’s support of both:

Palantir Technologies is a mission-driven company, and a core component of that mission is protecting our fundamental rights to privacy and civil liberties. …

Some argue that society must “balance” freedom and safety, and that in order to better protect ourselves from those who would do us harm, we have to give up some of our liberties. We believe that this is a false choice in many areas. Particularly in the world of data analysis, liberty does not have to be sacrificed to enhance security. Palantir is constantly looking for ways to protect privacy and individual liberty through its technology while enabling the powerful analysis necessary to generate the actionable intelligence that our law enforcement and intelligence agencies need to fulfill their missions.

It’s hard to square this purported commitment to privacy with proof, garnered from documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSA’s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSA’s arsenal.

According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSA’s own admission its “widest reaching” program, capturing “nearly everything a typical user does on the internet.” A subsequent report by The Intercept showed that XKEYSCORE’s “collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.

But how do you make so much data comprehensible for human spies? As the additional documents published with this article demonstrate, Palantir sold its services to make one of the most powerful surveillance systems ever devised even more powerful, bringing clarity and slick visuals to an ocean of surveillance data.

PALANTIR’S RELATIONSHIP WITH government spy agencies appears to date back to at least 2008, when representatives from the U.K.’s signals intelligence agency, Government Communications Headquarters, joined their American peers at VisWeek, an annual data visualization and computing conference organized by the Institute of Electrical and Electronics Engineers and the U.S. National Institute of Standards and Technology. Attendees from throughout government and academia gather to network with members of the private sector at the event, where they compete in teams to solve hypothetical data-based puzzles as part of the Visual Analytics Science and Technology (VAST) Challenge. As described in a document saved by GCHQ, Palantir fielded a team in 2008 and tackled one such scenario using its own software. It was a powerful marketing opportunity at a conference filled with potential buyers.

In the demo, Palantir engineers showed how their software could be used to identify Wikipedia users who belonged to a fictional radical religious sect and graph their social relationships. In Palantir’s pitch, its approach to the VAST Challenge involved using software to enable “many analysts working together [to] truly leverage their collective mind.” The fake scenario’s target, a cartoonishly sinister religious sect called “the Paraiso Movement,” was suspected of a terrorist bombing, but the unmentioned and obvious subtext of the experiment was the fact that such techniques could be applied to de-anonymize and track members of any political or ideological group. Among a litany of other conclusions, Palantir determined the group was prone to violence because its “Manifesto’s intellectual influences include ‘Pancho Villa, Che Guevara, Leon Trotsky, [and] Cuban revolutionary Jose Martí,’ a list of military commanders and revolutionaries with a history of violent actions.”

The delegation from GCHQ returned from VisWeek excited and impressed. In a classified report from those who attended, Palantir’s potential for aiding the spy agency was described in breathless terms. “Palantir are a relatively new Silicon Valley startup who are sponsored by the CIA,” the report began. “They claim to have significant involvement with the US intelligence community, although none yet at NSA.” GCHQ noted that Palantir “has been developed closely internally with intelligence community users (unspecified, but likely to be the CIA given the funding).” The report described Palantir’s demo as “so significant” that it warranted its own entry in GCHQ’s classified internal wiki, calling the software “extremely sophisticated and mature. … We were very impressed. You need to see it to believe it.”

The report conceded, however, that “it would take an enormous effort for an in-house developed GCHQ system to get to the same level of sophistication” as Palantir. The GCHQ briefers also expressed hesitation over the price tag, noting that “adoption would have [a] huge monetary … cost,” and over the implications of essentially outsourcing intelligence analysis software to the private sector, thus making the agency “utterly dependent on a commercial product.” Finally, the report added that “it is possible there may be concerns over security — the company have published a lot of information on their website about how their product is used in intelligence analysis, some of which we feel very uncomfortable about.”

Click on link:

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/Palantir_Solution-1487021968-1000×773.png

A page from Palantir’s “Executive Summary” document, provided to government clients.

However anxious British intelligence was about Palantir’s self-promotion, the worry must not have lasted very long. Within two years, documents show that at least three members of the “Five Eyes” spy alliance between the United States, the U.K., Australia, New Zealand, and Canada were employing Palantir to help gather and process data from around the world. Palantir excels at making connections between enormous, separate databases, pulling big buckets of information (call records, IP addresses, financial transactions, names, conversations, travel records) into one centralized heap and visualizing them coherently, thus solving one of the persistent problems of modern intelligence gathering: data overload.

A GCHQ wiki page titled “Visualisation,” outlining different ways “to provide insight into some set of data,” puts succinctly Palantir’s intelligence value:

Palantir is an information management platform for analysis developed by Palantir Technologies. It integrates structured and unstructured data, provides search and discovery capabilities, knowledge management, and collaborative features. The goal is to offer the infrastructure, or ‘full stack,’ that intelligence organizations require for analysis.

Bullet-pointed features of note included a “Graph View,” “Timelining capabilities,” and “Geo View.”

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/BehaviouralAnalysis_IA11-1487274060-1000×750-1487705651-1000×710.png

A GCHQ diagram indicates how Palantir could be used as part of a computer network attack.

Under the Five Eyes arrangement, member countries collect and pool enormous streams of data and metadata collected through tools like XKEYSCORE, amounting to tens of billions of records. The alliance is constantly devising (or attempting) new, experimental methods of prying data out of closed and private sources, including by hacking into computers and networks in non-Five Eyes countries and infecting them with malware.

A 2011 PowerPoint presentation from GCHQ’s Network Defence Intelligence & Security Team (NDIST) — which, as The Intercept has previously reported, “worked to subvert anti-virus and other security software in order to track users and infiltrate networks” — mentioned Palantir as a tool for processing data gathered in the course of its malware-oriented work. Palantir’s software was described as an “analyst workspace [for] pulling together disparate information and displaying it in novel ways,” and was used closely in conjunction with other intelligence software tools, like the NSA’s notorious XKEYSCORE search system. The novel ways of using Palantir for spying seemed open-ended, even imaginative: A 2010 presentation on the joint NSA-GCHQ “Mastering the Internet” surveillance program mentioned the prospect of running Palantir software on “Android handsets” as part of a SIGINT-based “augmented reality” experience. It’s unclear what exactly this means or could even look like.

Above all, these documents depict Palantir’s software as a sort of consolidating agent, allowing Five Eyes analysts to make sense of tremendous amounts of data that might have been otherwise unintelligible or highly time-consuming to digest. In a 2011 presentation to the NSA, classified top secret, an NDIST operative noted the “good collection” of personal data among the Five Eyes alliance but lamented the “poor analytics,” and described the attempt to find new tools for SIGINT analysis, in which it “conducted a review of 14 different systems that might work.” The review considered services from Lockheed Martin and Detica (a subsidiary of BAE Systems) but decided on the up-and-comer from Palo Alto.

Palantir is described as having been funded not only by In-Q-Tel, the CIA’s venture capital branch, but furthermore created “through [an] iterative collaboration between Palantir computer scientists and analysts from various intelligence agencies over the course of nearly three years.” While it’s long been known that Palantir got on its feet with the intelligence community’s money, it has not been previously reported that the intelligence community actually helped build the software. The continuous praise seen in these documents shows that the collaboration paid off. Under the new “Palantir Model,” “data can come from anywhere” and can be “asked whatever the analyst wants.”

 

Along with Palantir’s ability to pull in “direct XKS Results,” the presentation boasted that the software was already connected to 10 other secret Five Eyes and GCHQ programs and was highly popular among analysts. It even offered testimonials (TWO FACE appears to be a code name for the implementation of Palantir):

[Palantir] is the best tool I have ever worked with. It’s intuitive, i.e. idiot-proof, and can do a lot you never even dreamt of doing.

This morning, using TWO FACE rather than XKS to review the activity of the last 3 days. It reduced the initial analysis time by at least 50%.

Enthusiasm runs throughout the PowerPoint: A slide titled “Unexpected Benefits” reads like a marketing brochure, exclaiming that Palantir “interacts with anything!” including Google Earth, and “You can even use it on a iphone or laptop.” The next slide, on “Potential Downsides,” is really more praise in disguise: Palantir “Looks expensive” but “isn’t as expensive as expected.” The answer to “What can’t it do?” is revealing: “However we ask, Palantir answer,” indicating that the collaboration between spies and startup didn’t end with Palantir’s CIA-funded origins, but that the company was willing to create new features for the intelligence community by request.

On GCHQ’s internal wiki page for TWO FACE, analysts were offered a “how to” guide for incorporating Palantir into their daily routine, covering introductory topics like “How do I … Get Data from XKS in Palantir,” “How do I … Run a bulk search,” and “How do I … Run bulk operations over my objects in Palantir.” For anyone in need of a hand, “training is currently offered as 1-2-1 desk based training with a Palantir trainer. This gives you the opportunity to quickly apply Palantir to your current work task.” Palantir often sends “forward deployed engineers,” or FDEs, to work alongside clients at their offices and provide assistance and engineering services, though the typical client does not have access to the world’s largest troves of personal information. For analysts interested in tinkering with Palantir, there was even a dedicated instant message chat room open to anyone for “informally” discussing the software.

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/Screen-Shot-2017-02-15-at-12.48.10-PM-1487180948-540×536.png

The GCHQ wiki includes links to classified webpages describing Palantir’s use by the Australian Defence Signals Directorate (now called the Australian Signals Directorate) and to a Palantir entry on the NSA’s internal “Intellipedia,” though The Intercept does not have access to copies of the linked sites. However, embedded within Intellipedia HTML files available to The Intercept are references to a variety of NSA-Palantir programs, including “Palantir Classification Helper,” “[Target Knowledge Base] to Palantir PXML,” and “PalantirAuthService.” (Internal Palantir documents obtained by TechCrunch in 2013 provide additional confirmation of the NSA’s relationship with the company.)

One Palantir program used by GCHQ, a software plug-in named “Kite,” was preserved almost in its entirety among documents provided to The Intercept. An analysis of Kite’s source code shows just how much flexibility the company afforded Five Eyes spies. Developers and analysts could ingest data locally using either Palantir’s “Workspace” application or Kite. When they were satisfied the process was working properly, they could push it into a Palantir data repository where other Workspace users could also access it, almost akin to a Google Spreadsheets collaboration. When analysts were at their Palantir workstation, they could perform simple imports of static data, but when they wanted to perform more complicated tasks like import databases or set up recurring automatic imports, they turned to Kite.

Kite worked by importing intelligence data and converting it into an XML file that could be loaded into a Palantir data repository. Out of the box, Kite was able to handle a variety of types of data (including dates, images, geolocations, etc.), but GCHQ was free to extend it by writing custom fields for complicated types of data the agency might need to analyze. The import tools were designed to handle a variety of use cases, including static data sets, databases that were updated frequently, and data stores controlled by third parties to which GCHQ was able to gain access.

This collaborative environment also produced a piece of software called “XKEYSCORE Helper,” a tool programmed with Palantir (and thoroughly stamped with its logo) that allowed analysts to essentially import data from the NSA’s pipeline, investigate and visualize it through Palantir, and then presumably pass it to fellow analysts or Five Eyes intelligence partners. One of XKEYSCORE’s only apparent failings is that it’s so incredibly powerful, so effective at vacuuming personal metadata from the entire internet, that the volume of information it extracts can be overwhelming. Imagine trying to search your Gmail account, only the results are pulled from every Gmail inbox in the world.

 

MAKING XKEYSCORE MORE intelligible — and thus much more effective — appears to have been one of Palantir’s chief successes. The helper tool, documented in a GCHQ PDF guide, provided a means of transferring data captured by the NSA’s XKEYSCORE directly into Palantir, where presumably it would be far easier to analyze for, say, specific people and places. An analyst using XKEYSCORE could pull every IP address in Moscow and Tehran that visited a given website or made a Skype call at 14:15 Eastern Time, for example, and then import the resulting data set into Palantir in order to identify additional connections between the addresses or plot their positions using Google Earth.

Palantir was also used as part of a GCHQ project code-named LOVELY HORSE, which sought to improve the agency’s ability to collect so-called open source intelligence — data available on the public internet, like tweets, blog posts, and news articles. Given the “unstructured” nature of this kind of data, Palantir was cited as “an enrichment to existing [LOVELY HORSE] investigations … the content should then be viewable in a human readable format within Palantir.”

Palantir’s impressive data-mining abilities are well-documented, but so too is the potential for misuse. Palantir software is designed to make it easy to sift through piles of information that would be completely inscrutable to a human alone, but the human driving the computer is still responsible for making judgments, good or bad.

A 2011 document by GCHQ’s SIGINT Development Steering Group, a staff committee dedicated to implementing new spy methods, listed some of these worries. In a table listing “risks & challenges,” the SDSG expressed a “concern that [Palantir] gives the analyst greater potential for going down too many analytical paths which could distract from the intelligence requirement.” What it could mean for analysts to distract themselves by going down extraneous “paths” while browsing the world’s most advanced spy machine is left unsaid. But Palantir’s data-mining abilities were such that the SDSG wondered if its spies should be blocked from having full access right off the bat and suggested configuring Palantir software so that parts would “unlock … based on analysts skill level, hiding buttons and features until needed and capable of utilising.” If Palantir succeeded in fixing the intelligence problem of being overwhelmed with data, it may have created a problem of over-analysis — the company’s software offers such a multitude of ways to visualize and explore massive data sets that analysts could get lost in the funhouse of infographics, rather than simply being overwhelmed by the scale of their task.

If Palantir’s potential for misuse occurred to the company’s spy clients, surely it must have occurred to Palantir itself, especially given the company’s aforementioned “commitment” to privacy and civil liberties. Sure enough, in 2012 the company announced the formation of the Palantir Council of Advisors on Privacy and Civil Liberties, a committee of academics and consultants with expertise in those fields. Palantir claimed that convening the PCAP had “provided us with invaluable guidance as we try to responsibly navigate the often ill-defined legal, political, technological, and ethical frameworks that sometimes govern the various activities of our customers,” and continued to discuss the privacy and civil liberties “implications of product developments and to suggest potential ways to mitigate any negative effects.” Still, Palantir made clear that the “PCAP is advisory only — any decisions that we make after consulting with the PCAP are entirely our own.”

What would a privacy-minded conversation about privacy-breaching software look like? How had a privacy and civil liberties council navigated the fact that Palantir’s clientele had directly engaged in one of the greatest privacy and civil liberties breaches of all time? It’s hard to find an answer.

Palantir wrote that it structured the nondisclosure agreement signed by PCAP members so that they “will be free to discuss anything that they learn in working with us unless we clearly designate information as proprietary or otherwise confidential (something that we have rarely found necessary except on very limited occasions).” But despite this assurance of transparency, all but one of the PCAP’s former and current members either did not return a request for comment for this article or declined to comment citing the NDA.

The former PCAP member who did respond, Stanford privacy scholar Omer Tene, told The Intercept that he was unaware of “any specific relationship, agreement, or project that you’re referring to,” and said he was not permitted to answer whether Palantir’s work with the intelligence community was ever a source of tension with the PCAP. He declined to comment on either the NSA or GCHQ specifically. “In general,” Tene said, “the role of the PCAP was to hear about client engagement or new products and offerings that the company was about to launch, and to opine as to the way they should be set up or delivered in order to minimize privacy and civil liberties concerns.” But without any further detail, it’s unclear whether the PCAP was ever briefed on the company’s work for spy agencies, or whether such work was a matter of debate.

There’s little detail to be found on archived versions of Palantir’s privacy and civil liberties-focused blog, which appears to have been deleted sometime after the PCAP was formed. Palantir spokesperson Matt Long told The Intercept to contact the Palantir media team for questions regarding the vanished blog at the same email address used to reach Long in the first place. Palantir did not respond to additional repeated requests for comment and clarification.

A GCHQ spokesperson provided a boilerplate statement reiterating the agency’s “longstanding policy” against commenting on intelligence matters and asserted that all its activities are “carried out in accordance with a strict legal and policy framework.” The NSA did not provide a response.

Anyone worried that the most powerful spy agencies on Earth might use Palantir software to violate the privacy or civil rights of the vast number of people under constant surveillance may derive some cold comfort in a portion of the user agreement language Palantir provided for the Kite plug-in, which stipulates that the user will not violate “any applicable law” or the privacy or the rights “of any third party.” The world will just have to hope Palantir’s most powerful customers follow the rules.

Documents published with this article:

GCHQ VisWeek 2008 Conference Report

Palantir Executive Summary

NDIST Cyber Defence

Mastering the Internet

The Tale of Two Sources

TWO FACE on GCHQ Wiki

XKEYSCORE Helper Notes

SDSG Integrated Analytics Workshop

https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/ 

[##]

See also the previous entries here at The Sullen Bell which have discussed Palantir. 

See also

from February 2014

Peter Thiel’s Newest Obsession: Nanotechnology

https://www.entrepreneur.com/article/231660 

[&&]{**}[##]

WAYNE MADSEN | 24.02.2017 | OPINION

The Three Trump Administrations

Foreign and national defense ministries around the world, as well as embassies in Washington, DC, are struggling to ascertain who is actually in charge of the U.S. government one month after Donald Trump was sworn in as president of the United States. It is a fair question, considering the conflicting statements issuing forth from the White House, State Department, and the Pentagon.

Suffice to say, there are, essentially, three Trump administrations, all with varying degrees of power.

The first administration and the most visibly powerful is Trump’s inner circle. At the present time, this consists of Trump, chief strategist Stephen Bannon, Trump daughter Ivanka Trump and her husband Jared Kushner, special assistant to the president Stephen Miller, and Attorney General Jeff Sessions. Although Bannon came to Trump from the presidential campaign of Senator Ted Cruz, the former Breitbart News publisher has become a virtual «Svengali», influencing Trump on foreign and domestic policies.

The second administration represents the establishment Republicans who endorsed Trump after he secured the Republican presidential nomination. This circle includes White House chief of staff Reince Priebus, the former Republican National Committee chairman, and Sean Spicer, Trump’s press secretary who had the same job at the Republican National Committee under Priebus. Trump’s counselor and former presidential campaign manager Kellyanne Conway, who, like Bannon, came from the Cruz campaign, funds herself often on the outside of the Trump inner circle and more in the company of establishment Republicans Priebus and Spicer. Priebus and Conway, and, to a lesser extent, Spicer, are the eyes and ears of congressional Republicans like Senate Majority Leader Mitch McConnell and Speaker of the House of Representatives Paul Ryan in the White House.

The third administration represents the longtime «deep state» interests and is a combination of George W. Bush/Ronald Reagan administration neoconservative activists and powerful Wall Street and Houston/Dallas oil business moguls traditionally linked to Republican politics. While the neocons and business interests do not agree on much, they are taking advantage of the disorganization of the Trump administration to secure their own power centers. Recently, officials of this «third» administration were seen vying for influence and stature at the 2017 Munich Security Conference.

It is clear that the third Trump administration is the one that hopes to take the reins of power if either Trump is forced out of the presidency as a result of impeachment and conviction or ill-health. Representing the international status quo, the third Trump administration, represented chiefly by Vice President Mike Pence and Defense Secretary James Mattis, was very active in promoting NATO, the European Union, and continued sanctions on Russia at Munich. The statements by Pence and Mattis ran counter to the opinions previously aired by Trump. Secretary of State Rex Tillerson, opting not to attend the Munich conference, attended a G20 foreign ministers’ summit in Bonn held before the gathering in Munich. This leg of the Trump triad is the one with which the global elites feel most comfortable.

Tillerson, a Texas native and friend of the Bush family and former Secretary of State James Baker, showed that the neocons continue to have clout inside the Trump administration when he dared propose Elliott Abrams, an Iran-contra felon from the Reagan administration, to be his deputy Secretary of State. Abrams’s campaign rhetoric, in which he criticized Trump, resulted in the president vetoing Abrams for the State Department’s number two position. But that did not stop another arch-neocon, the never-confirmed former U.S. ambassador to the UN John Bolton, from being considered for number two at State and, more recently, as Trump’s national security adviser.

Tillerson’s ambassador to the United Nations, former South Carolina Governor Nikki Haley, has publicly condemned Russia over the Ukraine situation, even though Trump has indicated he wants a rapprochement with Russia. The third Trump administration is full of similar contradictions, with paleo-conservatives like Tillerson willing to hire on neocons like Abrams. Other deep state players within this third leg of the Trump triad include Central Intelligence Agency director Mike Pompeo, who wasted no time traveling to Turkey and Saudi Arabia to pay homage to the vested political interests of both nations, and Director of National Intelligence director-designate, former Senator Dan Coats of Indiana, a longtime friend of Pence.

Former national security adviser Michael Flynn, the former director of the Defense Intelligence Agency and a retired three-star general, was never a member of the Trump inner circle. In fact, Flynn was closer to the neocons worming their way into the Trump administration. Flynn was the co-author of the book titled «The Field of Flight: How We Can Win the Global War Against Radical Islam and Its Allies», with one of the most dangerous neocons around, Michael Ledeen, an Iran-contra co-conspirator of Abrams and another neocon vying for influence in the Trump White House, Frank Gaffney.

Ensconced with Pence and Mattis in Munich were the two most hawkish Republican senators who would have Trump adopt even more drastic sanctions against Russia: Senators John McCain, the chairman of the Senate Armed Services Committee, and fellow committee member Lindsey Graham. McCain used Munich to not only bash Russia but also Trump, while his close friend Graham promised that 2017 would be «the year of kicking Russia in the ass.» The mere fact that McCain and Graham were permitted to represent at Munich a hawkish policy at loggerheads with that of Trump, while Pence remained silent and Mattis championed America’s commitments to NATO and the EU, shows the world that the United States government now speaks through different voices. Joining McCain and Graham to reinforce U.S. defense and financial commitments was Senate Foreign Relations Committee chairman Bob Corker and former NATO commander and proposed Trump national security adviser General David Petraeus, previously disgraced by a sex scandal.

Munich provided the third Trump administration with a platform from which to reinforce the «world order» that Trump campaigned against. Governments that had donated handsomely to the Clinton Foundation and made no secret of their abhorrence of Trump as a candidate, were on hand in Munich to warmly embrace Pence and Mattis. Among those in attendance were Saudi Arabia’s wily anti-Iranian foreign minister and former ambassador in Washington Adel bin Ahmed al-Jubeir, Saudi Arabia’s more slyer former intelligence chief Prince Turki al-Faisal bin Abdulaziz, Qatari foreign minister Shaikh Mohammed bin Abdulrahman al-Thani and defense minister Khalid bin Mohammed al-Attiyah, Bahraini foreign minister Shaikh Khalid bin Ahmed bin Mohammed al-Khalifa, Kuwaiti deputy prime minister Shaikh Khaled al Jarrah al-Sabah, and Moroccan royal cabinet minister Youssef Amrani and the Moroccan king’s counselor André Azoulay. Undoubtedly, these Arab potentates will soon bestow their largesse upon members and corporate contrivances of the Trump family.

Pence and Mattis also rubbed shoulders at Munich with such influential anti-Trump personages as Bono, the U-2 rock band celebrity; former U.S. Secretary of State Madeleine Albright; former Homeland Security Secretary Michael Chertoff; Ohio Governor John Kasich; former Defense Secretary William Cohen; Microsoft founder Bill Gates; Woodrow Wilson Center director Jane Harman; Robert Kagan of the Brookings Institution and his wife and chief architect of the 2014 Ukrainian Coup Victoria Nuland; former Senator Joseph Lieberman; International Rescue Committee director David Miliband; Nebraska Republican Senator Ben Sasse; ranking Democrat on the House Intelligence Committee Adam Schiff; and Frank Wisner, Jr., a longtime U.S. diplomat with deep state ties and the son of Frank Wisner, Sr., the CIA’s original crafter of «fake news», CIA propaganda disguised as actual news.

And if Trump’s avid anti-globalist supporters believe that their president is «draining the swamp» of their bitterest of foes, they might be surprised that Pence and Mattis were in the company in Munich of Lady Lynn Forester de Rothschild, Trilateral Commission deputy chairman Michael Fuchs, and global political troublemaker George Soros.

The third Trump administration of Pence, Mattis, and Tillerson signaled the world that the actual Trump administration, the one representing America’s «deep state», will continue to run the U.S. government. This is the part of the Trump administration that will continue to conspire with the world’s elite at places like Bilderberg, Davos, Bohemian Grove, Cernobbio, APEC, and G-7. Trump has not «drained the swamp» as he promised. He has merely joined the reptiles already in it. In fact, Eric and Donald Trump Jr., who now head up the Trump Organization, recently opened a luxurious Trump golf course in Dubai. That set the ground for a very amiable meeting at the G20 meeting in Bonn between Tillerson and his counterpart from the United Arab Emirates. The French have a saying for Trump’s «revolution» – «plus ca change, plus c’est la meme chose» or «the more things change, the more they stay the same».

http://www.strategic-culture.org/news/2017/02/24/three-trump-administrations.html 

[&&]{**}[##]

https://www.youtube.com/watch?v=pni_kDv9BsU 

Published on Feb 9, 2016

In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal government. Don’t miss out on learning her methodologies in spotting deception.

Speaker:

Susan Carnicero, Author of Spy the Lie and founding partner, Qverity

[&&]{**}[##]

US Military Megacity Pacification and Assault Planning Videos (for educational purposes of course)

Posted on February 24, 2017 by willyloman

by Scott Creighton

[&&]{**}[##]

https://imgs.xkcd.com/comics/location_reviews.png 

[&&]{**}[##]

https://www.youtube.com/channel/UCrQ-wHKVi0JDWjQGcuoYnew 

[Ed.: I’ve caught up through Day 123; have you?.

If you need to go back to go forward, you can start at the bottom of investigative pointillism.]

[&&]{**}[##]

From 2008:

“U.S. warfighters are finding that human intelligence, or HUMINT, is more important than ever in the war on terrorism. The Defense HUMINT Management Office (DHMO) is working to produce new technologies to aid the warfighter in the quest for effective HUMINT collection and dissemination.

Trench coats have given way to optical collectors.

Intelligence technology research normally focused on electronics-related disciplines increasingly is being applied to improving human intelligence capabilities. These capabilities, which range from intelligence collection to distribution, define human intelligence activities in the war on terrorism.

Human intelligence, or HUMINT, is increasing in importance as allied forces in Iraq and Afghanistan deal with terror networks moving about the general populace. Preventing attacks on innocent civilians in Southwest Asia as well as the West may depend on being able to gather information using HUMINT assets and techniques.

The U.S. Defense Department has organized its Defense HUMINT Management Office (DHMO) to support HUMINT operators in the field. Much of this support includes tapping conventional and nontraditional sources for technologies that aid HUMINT collection, processing and dissemination.

Drew Bewick is the chief of technology tradecraft at the DHMO. Bewick’s office represents the HUMINT elements in the military services, the combatant commands and the Defense Intelligence Agency (DIA). He is tasked with finding new HUMINT technologies and capabilities and speeding them to the field in the war on terrorism.

“To win this war on terrorism and to find people, HUMINT is first among equals,” Bewick declares.

The DHMO has four organizational pillars: plans and policies; operations and assessments; training, including training standards and career paths; and technology tradecraft. For its activities, the office has two focus areas. One is to develop key technologies that enable the department to penetrate difficult targets. The other is to integrate HUMINT data into the joint and coalition intelligence, surveillance and reconnaissance (ISR) picture. This requires correlating HUMINT data with that of signals intelligence (SIGINT), geospatial intelligence (GEOINT) and measurement and signatures intelligence (MASINT), for example. How the HUMINT data helps the commander in the field is a key criterion for generating the right knowledge, Bewick allows.

The DHMO is aiming to improve collection, processing and dissemination equally as it strives to apply technologies for better HUMINT. For example, Bewick relates that as DHMO personnel visit the commands in the field, they often find that HUMINT technology tool sets are nothing more than stubby pencils and paper. Even improving how HUMINT data is reported will have a major effect. “You didn’t see James Bond writing too many reports,” he analogizes. “Yet, HUMINTers in the Defense Department spend an awful lot of time writing reports.” Providing new capabilities to help them report data is vital to the success of HUMINT, he declares.

“If it were possible to develop only capabilities for HUMINT collectors in the field, that would be awesome—that would help them do their job of penetrating difficult targets,” he continues. “But equally, to help them share that data with whomever needs it is just as important.”

HUMINT comprises a broad spectrum of activities and data. The result is a story that often is in the form of textual information, Bewick offers. That may change as intelligence takes new forms. The office has established a limited partnership with In-Q-Tel (SIGNAL Magazine, April 2001) that Bewick describes as “terrific.” Through In-Q-Tel, the DHMO invested in the video game company Destineer, based in Plymouth, Minnesota. The DHMO is seeking modeling and simulation for teaching tactics, techniques and procedures, especially for integrating HUMINT data. Finding people involves social network analysis, but when HUMINT data is correlated with other data, the information that results is no longer textual.

The DHMO’s team works with In-Q-Tel and with partners in other corporations and government agencies to find the talent that can offer solutions to its technology needs. Many entrepreneurs have good ideas that the DHMO wants to leverage.

“What we really do is save the lives of good ideas,” he declares.

Bewick continues that his office wanted to adapt the In-Q-Tel approach to its own operating environment. So it added a venture capital model that focuses on understanding the warfighter. The DHMO formed working groups of a user board, and these groups are queried when the office encounters a potential solution. These users may offer a way of altering the innovative technology to make it more effective.

The DHMO’s efforts already have borne fruit. One technology that has been accelerated is the mobile immersive video-ground, or MID-G. It comprises a 360-degree full-motion video capability that can collect visual information from all directions simultaneously. Bewick offers that it helps with mission planning for attacking terrorist objectives. “There are places that we are asked to go to that are dangerous; we only want to go once and get as much information as we can. It is incredibly valuable, when operationalizing our human capabilities, to get an understanding of what it feels and looks like on the ground from the human perspective.

“You couldn’t do this before.”

The DHMO currently is testing MID-G and transferring it to the field. Bewick notes that the office has driven its commercial cost down by a factor of 10 in only eight months. He adds that for every dollar invested by the office through In-Q-Tel, anywhere from $8 to $11 are matched by the venture capital community. That sustainment by the commercial marketplace is vastly different from the traditional government contracting model, he points out.

 

Among the vital HUMINT technologies that the DHMO is speeding to the field are handheld Arabic-to-English translation devices.

Another key technology comes from Palantir Technologies Incorporated, Palo Alto, California. The founders of this company are the original developers of PayPal, the online payment system acquired by eBay. Having developed algorithms to detect fraud, they have been asked by the DHMO to develop a means to discover information about a social network—largely to help find people.

This touches upon the vitally important task of understanding network threats. It encompasses how people are connected and through what kind of structures, as well as how a group stays cohesive.

On a more esoteric level, some technology basic research can lead to improvements in HUMINT collection capabilities. One important area is microfluidic lenses. Imagery collection, from ubiquitous picture cell phones to specialized advanced sensing systems, largely uses mechanical lenses. A small microfluidic lens can change its shape to be telescopic and zoom in on a distant object. The DHMO has found several companies working on this technology, which may first emerge commercially in picture cell phones.

But an emerging technology need not have an immediate battlefield impact to serve the defense HUMINT community. “Our measure of success is not that everything we make an investment in has a high mission impact,” Bewick offers. “If it were, my concern would be that we were not setting ourselves up for the next conflict.

“So the metric I have is that 50 percent of our portfolio should be high mission impact, and 50 percent of our portfolio should involve taking some risks. Our CENTCOM [U.S. Central Command] executors don’t want to hear what we’ll be giving them two years from now; they want to know what we have that will help them now. But the hypothesis is that while we have to do that, we also have to get ready for the next kinds of challenges that we will have to face,” he concludes.

Among the risky technologies is identity management. Bewick cites the need for a mobile DNA fingerprinting capability to ensure proper identification of terrorists among innocents. This can make the difference between detaining a terrorist and inadvertently freeing one.

Not all technologies involve laboratory technologies. Bewick observes that operators using HUMINT databases can benefit from knowledge discovery search engines that turn up vital information. The DHMO has worked with Endeca Technologies Incorporated, Cambridge, Massachusetts—which is an In-Q-Tel company that has a guided navigation capability used by Walmart.com and BarnesandNoble.com—to develop a search capability for finding information already collected. It already has been adopted by the DIA, he notes. “You see knowledge immediately,” he explains. “This has been remarkably powerful, and we are moving it out to the field.”

The DHMO’s technology tradecraft office also has an objective to operationalize HUMINT. This will require synchronizing HUMINT activities, which is a capability that is lacking today. A synchronization matrix capability must be developed to correlate with other intelligence so that a commander in the field can see the time frame for earliest value and least value for intelligence. This has been attained for other intelligence disciplines, but it has not been achieved for HUMINT. The DHMO is accelerating its development, and Bewick is hopeful that this will produce some capability next year.

With the DHMO’s focus on operators in the field, the near-term technology that is most prominent on the office’s radar is communications. Bewick notes a sense of urgency for near person-to-person links or over-the-horizon connectivity. Interoperability is a must, which affects whether other government communications technologies can be transferred to defense HUMINT.

For the longer term, nanotechnology looms large in potential HUMINT applications. The mobile DNA fingerprinting capability, for example, could be optimized by nanotechnologies. Other biometric technologies as well as communications could benefit. The DHMO also is investing in alternative power sources, Bewick relates.

The other focus area, data integration, is no less important than technology-driven collection. “Our challenge is to convert data into knowledge rapidly,” Bewick says. “Given what we’re asked to do, we must integrate human intelligence data like we never did before.” This requires joint and coalition ISR interoperability. HUMINT now is being integrated into the Global Information Grid (GIG). So, the DHMO is emphasizing the need to plan for HUMINT data in building the GIG. As Joint Intelligence Operations Centers are emerging at the theater level (SIGNAL Magazine, October 2005, page 44), the office must integrate human data at that level. This supplements existing data integration efforts at joint task force level and below.

“Our mission is from tactical to national,” Bewick says. “We take a departmental level view, not only of the research and development effort but also of the interoperability picture for the department.”

This effort also sends the office to other government agencies to determine how they would use HUMINT data. Bewick cites the Joint Improvised Explosive Device (IED) Defeat Organization, which is designed to overcome IEDs. The DHMO is determining whether it can contribute its own science and technology or add its data to be integrated with other intelligence data.

“What we find ourselves doing is building bridges,” he says. “We are trying to bridge this valley of death where we are finding [that] technologies are dying on the vine.” Many organizations develop technologies and capabilities in their science and technology elements that reach a certain stage but progress no further. The DHMO has “boots on the ground” and communities reaching out to these other organizations.

The office has established a JointDefensewideHUMINTInnovationCenter structure that is based on finding technologies and capabilities developed among businesses or other government organizations. This portfolio management approach is based on “the serendipity of finding what has been developed elsewhere for the end user who says, ‘I need it, I’ll do an operational test of it, I’ll even commit to putting it in my POM [program objective memorandum] if you can get it to me right now.’ That’s kind of the value add that we have,” Bewick states.

 

The DHMO is embedding support personnel at select commands and agencies—such as those that are adept at tagging, communications or data management— who can transfer solutions to the field. Combined with user groups, these experts can help speed new technologies to the operator.

Bewick relates that recently the I Marine Expeditionary Force (MEF) in Iraq sent the DHMO an urgent-need statement for language translation capabilities. Within 24 hours, the office and its partners tapped existing expertise to provide the MEF with a solution that came with operational instruction on how to use the capability. The user never knew that this capability existed and was obtainable off the shelf until the DHMO provided it.

The DHMO established a Defense Department tradecraft technology board in March 2005, and it included representatives from the combatant commands, the DIA and the military services. The office asked this board to define the most critical challenges facing HUMINT operatives in the field. While this query was framed in a technology perspective, it emerged in a capability perspective.

The DHMO compared those responses, and when a similar—hence a joint—problem was apparent, the office made it a DHMO problem set. A total of nine problem sets were established, including biometrics, tagging, communications, language translation, data management, remote sensing and novel power sources.

For integrating HUMINT data and sharing information, the undersecretary of defense for intelligence asked the office to establish a HUMINT integrated product team (IPT) under the Distributed Common Ground Surface System, which is the collection system for intelligence at joint task force and below. Bewick chairs this HUMINT IPT, which also includes representatives from the services and the commands.

Among the points that emerged from these two efforts was that the DHMO would take a portfolio management approach to these targeted areas. So, the DHMO established two paths. In one would go capabilities that the department already does well but can do better. The other would comprise capabilities that are not done or are not done well today but that must be available in the next few years. Among these are biometrics and person location through a social network, Bewick offers. The office is issuing its first Defense Department HUMINT metadata standards, which are emerging in part from work performed with SAIC at the JointDefensewideHUMINTInnovationCenter. People who need to find HUMINT will be able to generate a user-defined operating picture. “Our measure for interoperability will be to make HUMINT data accessible, visible, available to whomever has a need for it wherever they are [and] whenever they need it,” Bewick declares.

The DHMO also established its own metric for determining whether an innovation is worthy of investment. This metric entails assessing the return on intelligence based on a predictive mission impact measure. Bewick explains that the DHMO frames it in terms of values and risk tradeoff.

The values it keys on are military advantage; end-user urgency or enthusiasm, especially where users have requested this type of innovation or have existing related programs of record; jointness, particularly whether there is more than one user among the services and the commands; and strategic policy alignment.

For risk assessment, the office considers operational risk. If someone uses a capability, might it fail and result in friendly fatalities? The office seeks to determine the effects if it does not work as well as its defined uncertainty. Another risk involves the defense infrastructure—will it require considerable changing? A solution must be compatible—and interoperable—with the existing infrastructure.

And, technological functional risk is an issue. A technology solution may require new unproven innovations. While this and the other issues weigh heavily in the decision, alone they do not necessarily determine the adoption of a solution, Bewick notes.

 

Web Resources

Destineer: www.destineerstudios.com

Palantir Technologies: www.palantirtech.com

Endeca: http://endeca.com

http://www.afcea.org/content/?q=defense-humint-needs-technology-too 

[&&]{**}[##]

THE DARK NEXUS OF MIND CONTROL AND ARTIFICIAL INTELLIGENCE

Published: January 30, 2015

Is Alice’s nightmare world becoming a reality? Note that Alice in Resident Evil is subjected to mind control and genetic manipulation by a secretive corporation that controls governments, the Umbrella Corp.

In researching the MK ULTRA programs and their various offshoots, I came across an interesting connection to the coming SmartGrid.  Under Dr. Ewan Cameron, a prison tracking device known as the Schwitzgebel Machine was utilized to monitor inmates locations, heart rate and other personal details that were reciprocally transmitted to the good doctors.  What comes to the fore is the similarity with the development of the Smartphone and its new capabilities for monitoring heart rate, health, etc., as well as basically anything else.  Is there a connection between mind control and the coming A.I. takeover?  While this may sound like the ultimate paranoiac tin foliage, I suspect more at work here.

In my analysis, the rollout of the great technological utopia we are being sold was not the result of mere organic market forces that competed to produce harder, better, faster and stronger products.  The average libertarian, for example, believes this deception, presuming the “invisible hand” of the market results in a natural advancement, while any other economic model retarded growth and “progress.”  On the contrary, much of the technological progress we have seen in the last few decades is not the result of independent, competing ideas, but is rather the strategically timed and intentional release of the military industrial tech complex, given to an idiot public for the purpose of long term enslavement and depopulation.

The connection to MK ULTRA arises in relation to experiments with jc manipulation which I have already highlighted in regard to Dr. Michael Aquino and his infamous essay, “From PSYOP to MindWar: The Psychology of Victory,” where the combination of ELF/VLF and various RF manipulation is discussed in detail towards the end.  A Nexus Magazine article “Techniques Used by Governments for Mind Control,” by Sid Taylor outlines the RF experimentation in the MK programs:

“MK ULTRA SUBPROJECT-68

This was Dr. Cameron’s ongoing “attempts to establish lasting effects in a patient’s behaviour” using a combination of particularly intensive electroshock, intensive repetition of prearranged verbal signals, partial sensory isolation, and repression of the driving period carried out by inducing continuous sleep for seven to ten days at the end of the treatment period. During research on sensor deprivation, Cameron experimented with the use of Curare, (the deadly poison used by South American Indians to tip their arrow heads), to immobilise his patients.

After one test he noted: “Although the patient was prepared by both prolonged sensory isolation (35 days) and by repeated depatterning, and although she received 101 days of positive driving, no favourable results were obtained.” Patients were regularly treated with hallucinogenic drugs, long periods in the “sleep room”, and testing in the Radio Telemetry Laboratory that was built by Rubinstein under Dr. Cameron’s direction. Here, patients were exposed to a range of RF and electromagnetic signals and monitored for changes in behaviour. It was later stated by other staff members who had worked at the Institute that not one patient sent to the Radio Telemetry Lab showed any signs of improvement afterwards.”

When we consider the intersect with drug experimentation, the cocktail of brainwashing, “imprinting” and RF frequency technology becomes clear as something engineered by design.  Taylor continues, echoing something akin to a mondo Faces of Death flick:

“There were an enormous number of MKUltra operations. The project farmed out work to eighty institutions, of which forty-four were colleges or universities, fifteen research facilities or private companies, twelve hospitals and three prisons. The estimated total cost of the operation was 10-25 million dollars.

Prisoners were used in experiments conducted at the California Medical Facility in Vacaville State Prison by Dr. James Hamilton. Funded by another chain of front organisations, Dr. Hamilton conducted “clinical testing of behavioural control materials.” In New Jersey, testing was conducted by Dr. Carl Pfieffer at the Borden Reformatory, on similar materials. At Holmesburg State Prison in Philadelphia volunteers were used to test a particularly violent incapacitating drug. Around the same time as these tests were being conducted by the CIA the US Army initiated two projects, THIRD CHANCE and DERBY HAT. They conducted experiments both home and abroad, and at one time the New York State Psychiatric Institute was conducting research under contract to the Army. Between 1955 and 1958 the Army also tested LSD on 1,000 volunteer US servicemen at Fort Bragg and the Army’s Chemical Warfare Laboratories at Edgewood….

In this MKSearch sub-project the isolation chamber that had been constructed earlier by Dr. Cameron at the Allan Memorial Institute was rebuilt at a laboratory of the National Institutes of Mental Health. This time, instead of humans, apes were to be subjected to a cruel combination of treatments. After first being lobotomised, the animals were kept in total isolation. The radio telemetry techniques developed earlier by Leonard Rubenstein were adapted so that radio frequency energy could be beamed into the brains of the highly disturbed animals. Many were then decapitated and their heads would be transplanted onto another body to see if the RF energy would bring them back to life. The apes that were not killed in this way were later bombarded with radio waves until they fell unconscious. Autopsies revealed that their brain tissue had literally been fried. These experiments were conducted around 1965/66, so it is a frightening reality that it is around 25 years since intelligence agencies covertly started experimenting with the use of radiated energy to control behavior….

THE SCHWITZGEBEL MACHINE

After consultation with the DCI, Richard Helms, Dr. Gottlieb hired the former director of the Agency’s Office of Scientific Intelligence, Dr. Stephen Aldrich, and set him up in a safe house where a KGB defector had recently been interrogated and tortured continuously for almost three years, so that he could experiment with a device known as the Schwitzgebel Machine. This was a ‘Behavioural Transmitter-Reinforcer’ (BT-R) fitted to a body belt that received signals from, and transmitted signals to, a radio module. The machine was “linked to a missile tracking device which graphs the wearer’s location and displays it on a screen.” It was developed by Ralph K. Schwitzgebel in the Laboratory of Community Psychiatry at Harvard Medical School. [ https://www.abebooks.com/book-search/author/schwitzgebel-ralph/ ]His brother, Robert, subsequently modified the prototype into a more refined final product. The machine drew enthusiastic praise from criminologists who were supportive of ORD’s concepts for the intelligence techniques of the new world order. [ https://www.goodreads.com/book/show/3508334-psychotechnology-electronic-control-of-mind-and-behavior ]

On December 10th 1972, Helmes cancelled Operation Often. The memo sent to Dr. Gottlieb to notify him was marked READ DESTROY. Dr Gottlieb resigned from the agency in January 1973. Before he left he was ordered by Helmes to shred all records from MKUltra – MKSearch.

130 boxes would later be discovered in the Langley archives that inexplicably, Dr Gottlieb had failed to destroy. It was thought that the records had been misfiled and would have been destroyed if Helms and Gottlieb had been aware of them.”

https://jaysanalysis.files.wordpress.com/2015/01/511jkk5m0ol__sy344_bo1204203200_.jpg?w=200&h=300

With all that madness in mind, when we consider the Smartphone, we see a device that utilizes RF and tracks your every move, desire and taste, with all of that data being transferred to mysterious third parties which are sold and stored in vast data centers around the globe.  In line with JC Collins’ thought, as well as NSA whistleblower William Binney, I have opined that this is all being stored with the intent of a global SmartGrid control system.  While it is true that one level competition between Silicon Valley tech companies may be permitted, the reality was elucidated years ago in former CIA operative Melissa Mahle’s 2004 autobiography, Denial and Deception: An Insider’s View of the CIA, where she explained the origins of In-Q-Tel:

“Rather than run a full in-house R&D program, Tenet authorized the directorate to create a technology-incubation organization, In-Q-Tel, to serve as an information technology portal from the private sector to the intelligence community…With an initial funding of 28.5 million in CIA funds, the venture focused on building productive relationships with small firms involved in IT innovation, In-Q-Tel concentrated on technologies that integrate Internet technology and applications to intelligence work, that develop new security and privacy technologies, and nurture data-mining technologies to take better advantage of the CIA’s vast storehouse of records, and modernize the CIA’s computer systems. (pg. 267)

In-Q-Tel was also instrumental in some other names you might recognize, like Google and Facebook.  James Corbett’s piece on this connection gives an excellent summary of these pseudo-free market firms:

For decades, the Defense Advanced Research Projects Agency, or DARPA, has been the American governmental body tasked with conducting high-risk, high-payoff research into cutting edge science and technology. Responsible most famously for developing the world’s first operational packet switching network that eventually became the core of the Internet, DARPA tends to garner headlines these days for some of its more outlandish research proposals and is generally looked upon a a blue-sky research agency whose endeavours only occasionally bear fruit….

Two of the names that come up most often in connection with In-Q-Tel, however, need no introduction: Google and Facebook.

The publicly available record on the Facebook/In-Q-Tel connection is tenuous. Facebook received $12.7 million in venture capital from Accel, whose manager, James Breyer, now sits on their board. He was formerly the chairman of the National Venture Capital Association, whose board included Gilman Louie, then the CEO of In-Q-Tel. The connection is indirect, but the suggestion of CIA involvement with Facebook, however tangential, is disturbing in the light of Facebook’s history of violating the privacy of its users….

Google’s connection to In-Q-Tel is more straightforward, if officially denied. In 2006, ex-CIA officer Robert David Steele told Homeland Security Today that Google “has been taking money and direction for elements of the US Intelligence Community, including the Office of Research and Development at the Central Intelligence Agency, In-Q-Tel, and in all probability, both the National Security Agency (NSA) and the Army’s Intelligence and Security Command.” Later that year, a blogger claimed that an official Google spokesman had denied the claims, but no official press statement was released.”

So what about my claims about the same strategic goal associating all of this with mind control?  You’ll note that much of the very secret covert work pertains to nanotechnology, cancer and producing human resistance to the radioactive effects of all of this frequency pollution.  According to Business Insider, CIA startups are intimately connected to WiFi R&D, as well as with transhumanist Bilderberg attendee, Peter Thiel, stating:

“We’ve talked about Palantir before and the impact it is having on the Army intelligence community.  What we didn’t go into as much was the fact that In-Q-Tel was an early investor in the technology on behalf of the Central Intelligence Agency.  Palantir makes software that integrates data together from a wide array of resources and databases.

It’s one of the best programs at coordinating the vast databases accumulated by the U.S. intelligence apparatus. It assembles comprehensive dossiers on objects of interest, collated from the sprawling databases of intelligence agencies.”

And Corbett makes this connect to nanotech and bio-engineering and biometrics, illustrating further the danger these corporate-government mergers represent (operating under the guise of being private sector):

“The In-Q-Tel website currently lists two “practice areas,” “Information and Communication Technologies” and “Physical and Biological Technologies.” The latter field consists of “capabilities of interest” such as “The on-site determination of individual human traits for IC purposes” and “Tracking and/or authentication of both individuals and objects.” In-Q-Tel also lists two areas that are “on its radar” when it comes to biotech: Nano-bio Convergence and Physiological Intelligence. Detailed breakdowns of each area explain that the intelligence community is interested in, amongst other things, self-assembling batteries, single molecule detectors, targeted drug delivery platforms, and sensors that can tell where a person has been and what substances he has been handling from “biomarkers” like trace compounds in the breath or samples of skin.”

Thus the intersect of advanced technology, intelligence agencies and mind control is not far-fetched.  The reality is, all of this is war gamed and planned for implementation by an establishment that long ago adopted the panopticism model of Jeremy Bentham and the Malthusian Royal Society.  The goals have nothing to do with creating a tech utopia for you and your progeny, where you will fly off to floating moonbases and partake of Elysium-style healing machines with Matt Damon.

The same establishment that is publicly determined to destroy humanity en masse and implement the A.I. kill grid is rolling out their designs even faster than we “conspiracy theorists” expected!  In fact, this week mainstream news is reporting that IBM’s Watson, the famed Jeopardy-playing A.I. bot will play a role in determining health care!

Forbes writes, trying to dissuade fears of the bots making the decision on your care, but this ignores an important fact – the article itself touts Watson’s superiority to human decision making, which will inevitably lead to the conclusion the bots are a better option than the human, and on top of that, the establishment interested in fostering all this are committed to dysgenics (not actually eugenics), which is the destruction of the human genome:

“Watson has made huge strides in its medical prowess in two short years. In May 2011 IBM had already trained Watson to have the knowledge of a second-year medical student. In March 2012 IBM struck a deal with Memorial Sloan Kettering to ingest and analyze tens of thousands of the renowned cancer center’s patient records and histories, as well as all the publicly available clinical research it can get its hard drives on. Today Watson has analyzed 605,000 pieces of medical evidence, 2 million pages of text, 25,000 training cases and had the assist of 14,700 clinician hours fine-tuning its decision accuracy. Six “instances” of Watson have already been installed in the last 12 months.”

If you played Nintendo in the 80s like I did as a kid, you’ll recall Mother Brain, the ill-tempered A.I. behemoth from Metroid.

Metroid was actually far more accurate in its description of the actual “Mother” that is being erected and sold as a sexy Scarlett Johansson (as in Spike Jonze’s Her).  Mother Brain, like the Red Queen in Resident Evil and Skynet in Terminator is given a distinctly feminine quality because she functions as a synthetic anima mundi.  The system is selling her as sexy, but I assure you, this is anything but. [See https://qz.com/911681/we-tested-apples-siri-amazon-echos-alexa-microsofts-cortana-and-googles-google-home-to-see-which-personal-assistant-bots-stand-up-for-themselves-in-the-face-of-sexual-harassment/ ]

This week the BBC is reporting that a Swedish firm is offering employees to be RF microchipped, and the wage slaves willingly complied.  I have highlighted the microchipping plan as something decades old, which shows the rollout of all this is clearly planned years in advance and is not an organic market development.  It is with the microchip that we can see the clear connection between the mind control programs of MK ULTRA and the rise of the A.I. grid, as well as the mind control of marketing employed in selling everyone on this trap.  As I outlined in numerous previous analyses (and here), when we consider the T Phage nanotech the Royal Society finds appealing,  one wonders if the T Virus and the Red Queen aren’t real, and out for blood.

http://www.blacklistednews.com/The_Dark_Nexus_of_Mind_Control_and_Artificial_Intelligence 

[&&]{**}[##]

https://jaysanalysis.com/2015/06/08/bilderberg-implementation-of-the-a-i-grid/ 

[&&]{**}[##]

insert book graphic

The audio of Wednesday night’s 9/11 and Other Deep State Crimes Teleconference is available here:

http://houston911truth.net/audio/22217.mp3

It features, amoing other things, a presentation by Doug Valentine a definitive study of the infamous “Phoenix Program,” responsible for the deaths of so many innocent victims in Vietnam but, according to Doug, refined and used as a template ever since in various forms. That book and this excellent article in Thursday’s Huffington Post provides readers a good sense of Doug’s work and influence.

 [&&]{**}[##]

Published on Feb 22, 2017

The next gen of vaccine horror is here. You better pay EXTREMELY close attention to this conversation. ‘Science’ has announced that vaccines are moving away from traditional formats and will now be composed of viruses that will carry entirely new forms of DNA right into your cells where they will REPLACE or join your body’s existing, God-given NATURAL DNA with this new SYNTHETIC DNA. This new DNA will allegedly confirm protection on you from various viruses that each new DNA type is created to kill. However, this new virus-delivered  SYNTHETIC DNA can be created to do almost ANYTHING to you…permanently and forever. This fake DNA can CHANGE ANY PART OF YOUR BEING…from intellectual and emotional processes to all physical traits that are created and regulated by our natural DNA. We are entirely governed by our birth DNA but soon, according to one scientist, ‘EVERYONE WILL HAVE SYNTHETIC DNA.’ We are talking about ABSOLUTE CONTROL of the human species through synthetic, DNA. This is a monumentally important video.

https://www.youtube.com/watch?v=o7aMlMs-51Y 

[45 minutes]

dancing children

Dancing Children

or

Knowing One’s Place in the Scheme of Things

I have come full circle.  I was a boy born to a mother who died immediately, perhaps at the hands of my father but that is only a distant third-party allegation, who grew up to watch as a small group of sheltered and sheltering effete Eastern liberal snobs snickered sotto voce “they shot Jack”, and then I went off to college to watch them shoot Martin and Bobby too, and the leadership of the multi-phase awakening of Black identity, and to discover the deepest depths of their political depravity while I labored to try to help save lives one at a time, sometimes in glumps.

Fool that I was, I thought I could make a difference, but now at the end of my life, which has been ceded over in ownership of car, auto, house to my spouse and whose terminal point has been pre-decided to include the discreet turning off of the pacemaker-defibrillator in my chest along with the likely injection of increasing doses of morphine to shut down the instinct to breathe, I have come full circle.  Most of society snickers sotto voce about Trump having been put in his place; now we can sit back and watch the sidewalks get rolled up.

At one point, I thought I’d likely had a bunk pre-assigned to me in the detention centers and death camps of the State but I am so far along that it is likely they will just let me ease away on my own dime, what two of them I can find to rub together on the meager Social Security pension they allow me.  Even that is under their control and should I dare to speak up too loudly or out of turn, they can hasten the day. They can dim the lights of a person or a society so slowly you’ll barely notice.  I maintain strongly, to this minute, this is not an ordinary cold.

The Valentine Day’s Massacre of 2017 went down with the requisite op-ed notices from numerous places but that is just panem et circensees, good entertaining read to give one’s sense of outrage a short outing, like wheeling the terminal nursing home patient out onto the deck bundled in a blanket for one last long look across the valley to the snow-covered peaks that used to be playgrounds in youth. I would suspect little if any notice is given to the import of the little mini-coup, despite efforts by many to spell it out in detail. People have been warned away from reading those kinds of things; the MSM will act like not much has happened, or it’s in fear of the evil Russian bear, and anyway the game shows are still on TV so life can’t be all bad. I’d like to buy a vowel, Pat. I’ll take covert ops for a thousand, Alex.

Anyway, the path is now cleared for lots of people to rake in lots of dough on their war dividends, the Prizker and Crown families, the Soros cavalcade and, most of all, of course, the Rothschild empire.  Lots of people will be riding on those coat-tails without even a moment’s thought about the human costs when all those armaments are used, those brand-spanking-new F-whatevers with their pilot’s AI thinking caps, and the down-the-generations depleted uranium munitions, and the new drone Navy.  There is, undoubtedly buried somewhere in the stock market algorithims, some cute game that takes wagers on which American city or cities are going to be sacrified in the forthcoming first-strike mini-nuclear wars against Russia and Iran.  The cockroaches will be scurrying into their tunnels, their bunkers, light having been shown for a moment on their true nature. And, of course, the way has been cleared for continued fun and games involving pedophilia, snuff films, and all manner of rapine and pillage; there is nothing that can stand in the way of some good clean fun now. Bring on the dancing children.

https://www.youtube.com/watch?v=9twZX_CwVvQ

 

unfamiliar environment unknown dangers

unfamiliar environment unknown dangers

music:

https://www.youtube.com/watch?v=4OKQkZJJRkA 

As I finished assembling this blog entry, just before titling and adding the music, I thought that it was about our ability to gaze out into the world, and wandered for a while on search engines thinking about hunter-gathers’ vision, forecasting a post-global existence, and reflecting on the fact that I approach the end of a lifetime writing to a world that has, for the most part, and hopefully, only just begun theirs. 

Somewhere in this long pile of offerings is the idea that a purpose of journalism is so that we might make better decisions about our own small existence in a world that is driven for the most part by others with other values and interests than our own

As you read this, you can ask yourself who is aiding and abetting whom and, as Heinlein warns us in a book he wrote in 1955 about the final exam for a high school course to teach what one should do to survive in an unfamiliar environment with unknown dangers and in the midst of political leadership not unlike the type you find where you live, watch out for the stobor.

[&&]{**}[##]

https://cdn-images-1.medium.com/max/600/1*gI_eeXpeehk-khUT-y83Cw.png 

The phrase data-driven journalism is used by George Webb in his video series.  When I think of data-driven research and journalism, the first example that comes to my mind is the graphic which represented one example of the data research done by Catherine Austin Fitts that used “software, databases and pricing tools to identify and price existing and pro forma geographic flows of private and public income and investment on an integrated basis”

The shorter and more explicit phrase:

“follow the money”.  

“… Her numbers proved that S&L and HUD fraud were perpetrated by the same networks, in the same places, and involved the same use of federal credit.” 

If you are at all familiar with this remarkable woman, you are familiar with the roller-coaster ride she was taken on from there. If you are not, you can start here or go here or read her own online book Dunwalke

It was there where I discovered this:

http://www.dunwalke.com/images/photos/south_central_los_angeles_housing_map.gif 

 I suspect that, even though she probably does not consider herself a journalist (though her kinship with data and her curiosity have been critical in telling investigative research stories), George Webb once encountered this graphic too and understands the tremendous importance that the graphic has in the history of government-watching.  

The fascinating thing is how the same name pops up as both skeins of data-driven yarn get unraveled. 

Equally of interest is that both queries have to do with tracking the transportation, or trafficking, of things.

https://www.youtube.com/watch?v=TA_tNh0LMEs 

https://upload.wikimedia.org/wikipedia/commons/4/48/Data_driven_journalism_process.jpg 

[##]

“According to information architect and multimedia journalist Mirko Lorenz, data-driven journalism is primarily a workflow that consists of the following elements: digging deep into data by scraping, cleansing and structuring it, filtering by mining for specific information, visualizing and making a story.[2] This process can be extended to provide information results that cater to individual interests and the broader public.

Data journalism trainer and writer Paul Bradshaw describes the process of data-driven journalism in a similar manner: data must be found, which may require specialized skills like MySQL or Python, then interrogated, for which understanding of jargon and statistics is necessary, and finally visualized and mashed with the aid of open source tools.[3]

A more results driven definition comes from data reporter and web strategist Henk van Ess (2012).[4]Data-driven journalism enables reporters to tell untold stories, find new angles or complete stories via a workflow of finding, processing and presenting significant amounts of data (in any given form) with or without open source tools.” Van Ess claims that some of the data-driven workflow leads to products that “are not in orbit with the laws of good story telling” because the result emphazes on showing the problem, not explaining the problem. “A good data driven production has different layers. It allows you to find personalized details that are only important for you, by drilling down to relevant details but also enables you to zoom out to get the big picture”.

In 2013, Van Ess came with a shorter definition in [5] that doesn’t involve visualisation per se:

Datajournalism is journalism based on data that has to be processed first with tools before a relevant story is possible.”

[snip]

Based on the perspective of looking deeper into facts and drivers of events, there is a suggested change in media strategies: In this view the idea is to move “from attention to trust”. The creation of attention, which has been a pillar of media business models has lost its relevance because reports of new events are often faster distributed via new platforms such as Twitter than through traditional media channels. On the other hand, trust can be understood as a scarce resource.

much more here: https://en.wikipedia.org/wiki/Data-driven_journalism 

[##]

https://www.youtube.com/watch?v=5Zg-C8AAIGg 

Published on Nov 23, 2012

View full lesson: …

http://ed.ted.com/lessons/david-mccandless-the-beauty-of-data-visualization  

David McCandless turns complex data sets, like worldwide military spending, media buzz, and Facebook status updates, into beautiful, simple diagrams that tease out unseen patterns and connections. Good design, he suggests, is the best way to navigate information glut — and it may just change the way we see the world.

Talk by David McCandless.

[##]

DataDrivenJournalism.net is a hub for news and resources from the community of journalists, editors, designers and developers who use data to support journalism. The website is part of an European Journalism Centre initiative dedicated to accelerating the diffusion and improving the quality of data journalism around the world. We also run the online course Doing Journalism with Data as well as the School of Data Journalism, and are behind the acclaimed Data Journalism Handbook.

http://datadrivenjournalism.net 

[##]

Data-centric journalism, once the domain of a few computer geeks hunched over in remote corners of the American newsroom, is coming to the forefront. With easier-to-use technology available, more data-savvy journalists are pushing the boundaries of what’s possible in their niche. Heartened by social media buzz over such stories and prodded by competition hungry for unique content, news organizations are pouring money into recruiting talent and expanding their menu of stories derived from a mix of sophisticated number crunching, explanatory narratives and interactive graphics that weren’t possible in the old days of print.

“There’s more information now available through more people faster than ever before,” says Almar Latour, executive editor of The Wall Street Journal. “There is a lot more flexibility in displaying and telling stories.”

Data crunchers have been part of newsrooms since the 1980s, as “computer-assisted reporting” gained traction among editors looking to gain an edge. But the lack of computing power, dearth of talent who could handle data and heavy costs kept the endeavor in check….”

More:

http://www.usatoday.com/story/money/business/2014/03/16/data-journalism-on-the-rise/6424671/ 

[##]

http://towcenter.org/wp-content/uploads/2014/05/Tow-Center-Data-Driven-Journalism.pdf 

[##]

“… Finally, make sure to share what you’re learning with others. Very often the questions people will ask you show challenges and motivate you to search for the right answers that you hadn’t thought of, increasing your knowledge and encourage you to try different approaches.

What I want to say is: If you want to do data-driven journalism, go ahead and start. Good ways to start learning include online courses, books and tutorials.

If you live in Latin America, you can take advantage of projects like Chicas Poderosas (“Powerful Girls”), which promotes the development of data-driven journalism skills through workshops that connect journalists, developers, designers, animators and storytellers and get them to work together on storytelling projects.

I also recommend global initiatives like Hacks & Hackers, which hosts meetups in many countries in and outside Latin America.

You must also commit to never stop learning. Even after you have developed advanced skills and a deep understanding of the techniques, tools and methodologies of analysis and visualization, there will always be a bigger challenge ahead – bigger datasets, new software to test, new techniques to try and different approaches to generate participation from people for whom your story is important…..”

More here:

https://www.propublica.org/nerds/item/data-driven-journalisms-secrets 

[##]

“… data journalism is the peanut butter to the jelly of open government data releases: Journalists are a crucial component of confirming that the data public officials describe has actually been released in a form and quality that can be consumed….. In the video below, I moderate a Google+ Hangout with several notable practitioners of DDJ. We covered a lot of ground in 53 minutes, discussing what data journalism is, how journalists are applying it, the importance of storytelling, considering ethics, the role of open source software, “showing your work,” and much more.

https://www.youtube.com/watch?v=haOc54NmP0k

…. The stories data journalists can tell with these new tools and techniques reach the most aspirational heights available to the profession, revealing the hidden channels of money, power, and influence in society to the public and government, serving as a bulwark to democracy. That does not, however, make it a panacea. Just as data-driven policy can be corrupted by bad data, hidden biases, or mistaken analyses, journalists may also successfully clean and present data but fail to clearly tell a story to readers or wrap it in the necessary context. Skepticism and intellectual rigor becomes more important, not less, if journalists seek to apply a scientific mindset to their work.

While data journalism massive open online courses (MOOCs) offer bonafide new options for distributed learning, they are not a replacement for the experience of the hands-on workshops available to attendees….”

Alex Howard writes about how shifts in technology are changing government and society. A former fellow at Harvard and Columbia, he is the founder of “E Pluribus Unum,” a blog focused on open government and technology.

http://www.techrepublic.com/article/data-driven-journalism-fuels-accountability-and-insight-in-the-21st-century/ 

[##]

https://www.youtube.com/watch?v=TZuNOeii1rs 

Data-Driven journalism for small newsrooms

90 minutes

International Journalism festival

[note that there is no sound for the first 90 seconds]

[##]

https://www.youtube.com/watch?v=qJyjcVVtrQw

https://www.youtube.com/watch?v=qJyjcVVtrQw 

Data journalism tools: maps (beginner) (75 minutes)

[##]

https://www.youtube.com/watch?v=_HYiV_skkek 

A breathless 25-minute tour of the universe of free software that’s available to help import, summarize, manage, graph and map your data. From statistical analysis in R and Python to geospatial analysis in QGIS, PostGIS, and Spatialite, we’ve got the tools for you.

This session is good for: Journalists held back by a shoestring software budget.

What you need to know: no previous knowledge required.

[##]

 

https://www.youtube.com/watch?v=h2zbvmXskSE 

10 minutes

Data-journalists are the new punks:

Simon Rogers at TEDxPantheonSorbonne in Paris the 8/11/12

[##]

https://www.youtube.com/watch?v=kY-l9UQpf0Y

10 minutes

Citizen Journalism is Reshaping the World: 

Brian Conley at TEDxMidAtlantic

Brian Conley is director of Small World News and has been involved in media literacy and media democracy work for more than ten years and has trained journalists and citizen media makers in a dozen countries. Brian designed the program and training for IndiaUnheard a national “community news service” comprised of Indian community activists from all over the country, and he led Small World News’ work assisting Pajhwok Afghan News to develop a video service, which expanded the capacity of their provincial journalists to produce quality multimedia journalism. He has designed an array of projects leveraging emerging technologies to develop community media in conflict areas and repressive states.

[##]

 

https://www.youtube.com/watch?v=niJJHZ7cjvo 

Lessons in investigative journalism

Carol Marin at TEDxMidwest (17:46)

Carol Marin, a Veteran Investigative Journalist, taps into her audience’s deeply rooted interest in bad guys and catastrophic events. She is completely captivating as she recounts thrilling tales of organized crime and political corruption in “The Windy City” as well as the fear and chaos of the day she spent rushing toward the falling Twin Towers in New York City.

[##]

http://www.poynter.org/tag/data-driven-journalism/ 

[##]

“Sir, the possibility of successfully navigating an asteroid field is approximately 3,720 to 1.”

“Never tell me the odds!” ―C-3PO and Han Solo

Yogi Berra famously threw the fat lady off her stage in 1973 when he said, “It ain’t over till it’s over.” With the rise of and reliance upon data-driven modeling of elections and sports we might just as well rephrase it as, “It’s over before it begins.” But we’d be wrong to do so.

Like most oddsmakers going into Super Bowl LI, Nate Silver’s FiveThirtyEight.com, owned by ESPN, predicted the New England Patriots to win. Going into the half-time as the Falcons were up 28-3, the site gave the Patriots a less than 1 percent chance of winning. FiveThirtyEight tweeted: “That Patriots drive took another 5:07 off the clock and actually dropped their win probability from 1.1% to 0.5%.”

Of course we all know what happened next. In yet another brilliant statistical upset in a year of upsets, the Patriots defied all probability after the half. They scored 25 unanswered points, taking the Super Bowl into an historically uncharted overtime which they then proceeded to win—giving America, and the world at large, a clinic in determination, momentum, and the ability of human beings to surmount even the greatest of statistical odds.

It was a lesson in the value of risk taking and accomplishment; values that were once core elements in the American mythos but that increasingly have fallen out of favor in exchange for the perceived infallibility of data-driven models and analyses.

Since the mainstreaming of data punditry, exemplified by Nate Silver’s meteoric rise and FiveThirtyEight’s hallowed place in the culture, we’ve seen a cultural shift with regard to the use of statistics and data. Big Data, polling, and more specifically, Silver’s predictions, have become the equivalent of a mic-drop in any conversation about sports or politics.

Throughout the election cycle, on TV shows and social media feeds across the country, his pronouncements were treated as sacrosanct papal bulls. His data-driven analysis, whether accurate or not, provided gravitas for those seeking a more commanding way to eviscerate opponents in debate. “Silver gives Hilary a x percent chance to win the election” became the trump card in any conversation.

We’d moved to a point where we seemingly were willing to assign data modeling more value than the possible variances, irrationality and risk-taking inherent in human decision-making. This happened during the Super Bowl just as it happened during the election. In both cases, statistical models were held up as unassailable predictors.

And in both instances, they were wrong.

More here:

https://amgreatness.com/2017/02/07/nate-silver-fetish-data-driven-journalism/ 

[##]

https://www.youtube.com/watch?v=cYoO2RvZn7Y 

“The Gamma: 

Programming Tools for Data Journalism”

by Tomas Petricek  [38 minutes]

Published on Sep 28, 2015

Computer programming may not be the new literacy, but it is finding its way into many areas of modern society. In this submission, we look at data journalism, which is a discipline combining programming, data analysis and traditional journalism. In short, data journalism turns articles from a mix of text and images into something that is much closer to a computer program.

Most data journalists today use a wide range of tools that involve a number of manual steps. This makes the analysis error prone and hard to reproduce. In this video, we explore the idea of treating a data driven article as an executable program. We look how ideas from programming language research can be used to provide better tools for writing (or programming) such articles, but also to enable novel interactive experience for the reader.

The project also makes data journalism more accountable and reproducible. We let the reader verify how exactly are the visualizations generated, what are the data sources and how are they combined together.

Tomas Petricek

UNIVERSITY OF CAMBRIDGE

Tomas is a computer scientist, book author and open-source developer. He wrote a popular book called “Real-World Functional Programming” and is a lead developer of several F# open-source libraries, but he also contributed to the design of the F# language as an intern and consultant at Microsoft Research. He is a partner at fsharpWorks (http://fsharpworks.com) where he provides trainings and consulting services. Tomas recently submitted his PhD thesis at the University of Cambridge focused on types for understanding context usage in programming languages, but his most recent work also includes two essays that attempt to understand programming through the perspective of philosophy of science.

[##]

“Before joining CIR in January of 2008 Rosenthal had done pretty much everything that could be done done in a newspaper: copy-boy, reporter, foreign correspondent, investigative reporting and executive editor. He did not have a ring side seat to the collapse of the newspaper business model, he was in the ring, taking some serious shots. At CIR he is in the forefront of creating a new model for high quality, unique journalism, within the crucial niche of investigative reporting. He believes that the new newsroom must be innovative, risk taking, and nimble. The journalists, the story tellers — and story telling is central — must exist in a symbiosis with the technology wizards. Together they can find the answer to sustainability, audience growth and impact at a time when the credibility of news is under assault. Trustworthy organizations will not only have financial value, they are crucial to democracy.”

Recorded April 2, 2011 at The Palace of Fine Arts Theatre, San Francisco, California.

TEDxPresidio – Robert Rosenthal – Investigative journalism in the 21st Century

https://www.youtube.com/watch?v=KgcxYCUmqeo [12 minutes]

 

[##]

The concept of citizen journalism (also known as “public“, “participatory“, “democratic“,[1]guerrilla[2] or “streetjournalism[3]) is based upon public citizens “playing an active role in the process of collecting, reporting, analyzing, and disseminating news and information.”[4] Similarly, Courtney C. Radsch defines citizen journalism “as an alternative and activist form of newsgathering and reporting that functions outside mainstream media institutions, often as a response to shortcomings in the professional journalistic field, that uses similar journalistic practices but is driven by different objectives and ideals and relies on alternative sources of legitimacy than traditional or mainstream journalism”.[5] Jay Rosen proposes a simpler definition: “When the people formerly known as the audience employ the press tools they have in their possession to inform one another.”[6]

Citizen journalism is not to be confused with community journalism or civic journalism, both of which are practiced by professional journalists. Collaborative journalism is also a separate concept and is the practice of professional and non-professional journalists working together.[7] Similarly, Social Journalism is a separate concept denoting a digital publication with a hybrid of professional and non-professional journalism. Citizen journalism is a specific form of both citizen media and user-generated content. By juxtaposing the term “citizen”, with its attendant qualities of civic-mindedness and social responsibility, with that of “journalism”, which refers to a particular profession, Courtney C. Radsch argues that this term best describes this particular form of online and digital journalism conducted by amateurs, because it underscores the link between the practice of journalism and its relation to the political and public sphere.[8]

New media technology, such as social networking and media-sharing websites, in addition to the increasing prevalence of cellular telephones, have made citizen journalism more accessible to people worldwide. Due to the availability of technology, citizens often can report breaking news more quickly than traditional media reporters. Notable examples of citizen journalism reporting from major world events are, the 2010 Haiti earthquake, the Arab Spring, the Occupy Wall Street movement, the 2013 protests in Turkey, the Euromaidan events in Ukraine, and Syrian Civil War and the 2014 Ferguson unrest.

Critics of the phenomenon, including professional journalists[who?], claim that citizen journalism is unregulated, too subjective, amateur, and haphazard in quality and coverage.

Theory[edit]

Citizen journalism, as a form of alternative media, presents a “radical challenge to the professionalized and institutionalized practices of the mainstream media”.[9]

According to Terry Flew, there have been three elements critical to the rise of citizen journalism: open publishing, collaborative editing, and distributed content.[10] Mark Glaser, a freelance journalist who frequently writes on new media issues, said in 2006:[11]

The idea behind citizen journalism is that people without professional journalism training can use the tools of modern technology and the global distribution of the Internet to create, augment or fact-check media on their own or in collaboration with others. For example, you might write about a city council meeting on your blog or in an online forum. Or you could fact-check a newspaper article from the mainstream media and point out factual errors or bias on your blog. Or you might snap a digital photo of a newsworthy event happening in your town and post it online. Or you might videotape a similar event and post it on a site such as YouTube.

The accessibility of online media has also enhanced the interest for journalism among youth and many websites, like ‘Far and Wide’ a publication focusing on travel and international culture,[12] as well as WorldWeekly a news blog covering a range of topics from world politics to science,[13] are founded and run by students.

In What is Participatory Journalism?,[14] J. D. Lasica classifies media for citizen journalism into the following types:

1Audience participation (such as user comments attached to news stories, personal blogs, photographs or video footage captured from personal mobile cameras, or local news written by residents of a community)

2Independent news and information Websites (Consumer Reports, the Drudge Report)

3Full-fledged participatory news sites (one:convo, NowPublic, OhmyNews, DigitalJournal.com, GroundReport, ‘Fair Observer’

4Collaborative and contributory media sites (Slashdot, Kuro5hin, Newsvine)

5Other kinds of “thin media” (mailing lists, email newsletters)

6Personal broadcasting sites (video broadcast sites such as KenRadio)

The literature of citizen, alternative, and participatory journalism is most often situated in a democratic context and theorized as a response to corporate news media dominated by an economic logic. Some scholars have sought to extend the study of citizen journalism beyond the Western, developed world, including Sylvia Moretzsohn,[15] Courtney C. Radsch,[16] and Clemencia Rodríguez.[17] Radsch, for example, wrote that “Throughout the Arab world, citizen journalists have emerged as the vanguard of new social movements dedicated to promoting human rights and democratic values.”[18]

Versus “grassroots media”[edit]

One criticism of the term “citizen journalism” to describe this concept is that the word “citizen” has a conterminous relation to the nation-state. The fact that many millions of people are considered stateless and often, are without citizenship (such as refugees or immigrants without papers) limits the concept to those recognised only by governments. Additionally, the global nature of many participatory media initiatives, such as the Independent Media Center, makes talking of journalism in relation to a particular nation-state largely redundant as its production and dissemination do not recognise national boundaries. Some additional names given to the concept based on this analysis are, “grassroots media,” “people’s media,” or “participatory media.”

Relationship to local journalism[edit]

Criticisms have been made against citizen journalism, especially from among professionals in the field. Citizen journalists are often portrayed as unreliable, biased and untrained – as opposed to professionals who have “recognition, paid work, unionized labour and behaviour that is often politically neutral and unaffiliated, at least in the claim if not in the actuality”.[19] Citizen journalists gather material by being on the streets. Their tools can be narrowed down to a camera, social media and an instinct to start recording whenever something seems newsworthy or out of order. Much of their knowledge regarding the issues that are raised are obtained through their experience as a part of the community.

However, some major news reporting agencies, threatened by the speed with which news is reported and delivered by citizen journalism, have launched campaigns to bring in readers and financial support. For example, Bill Johnson, president of Embarcadero Media, which publishes several northern California newspapers, issued an online statement asking readers to subscribe to local newspapers in order to keep them financially solvent. Johnson put special emphasis on the critical role played by local newspapers, which, he argues, “reflect the values of the residents and businesses, challenge assumptions, and shine a light on our imperfections and aspirations.”[20]

History[edit]

The idea that every citizen can engage in acts of journalism has a long history in the United States. The contemporary citizen journalist movement emerged after journalists began to question the predictability of their coverage of events such as the 1988 U.S. presidential election. Those journalists became part of the public, or civic, journalism movement, which sought to counter the erosion of trust in the news media and the widespread disillusionment with politics and civic affairs.[21][22][23]

Initially, discussions of public journalism focused on promoting journalism that was “for the people” by changing the way professional reporters did their work. According to Leonard Witt, however, early public journalism efforts were “often part of ‘special projects’ that were expensive, time-consuming, and episodic. Too often these projects dealt with an issue and moved on. Professional journalists were driving the discussion. They would have the goal of doing a story on welfare-to-work (or the environment, or traffic problems, or the economy), and then they would recruit a cross-section of citizens and chronicle their points of view. Since not all reporters and editors bought into this form of public journalism, and some outright opposed it, reaching out to the people from the newsroom was never an easy task.” By 2003, in fact, the movement seemed to be petering out, with the Pew Center for Civic Journalism closing its doors.

With today’s technology the citizen journalist movement has found new life as the average person can capture news and distribute it globally. As Yochai Benkler has noted, “the capacity to make meaning – to encode and decode humanly meaningful statements – and the capacity to communicate one’s meaning around the world, are held by, or readily available to, at least many hundreds of millions of users around the globe.”[24] Professor Mary-Rose Papandrea, a constitutional law professor at Boston College, notes in her article, Citizen Journalism and the Reporter’s Privilege, that:[25]

[i]n many ways, the definition of “journalist” has now come full circle. When the First Amendment of the U.S. Constitution was adopted, “freedom of the press” referred quite literally to the freedom to publish using a printing press, rather than the freedom of organized entities engaged in the publishing business. The printers of 1775 did not exclusively publish newspapers; instead, in order to survive financially they dedicated most of their efforts printing materials for paying clients. The newspapers and pamphlets of the American Revolutionary era were predominantly partisan and became even more so through the turn of the century. They engaged in little news gathering and instead were predominantly vehicles for opinion.

The passage of the term “journalism” into common usage in the 1830s occurred at roughly the same time that newspapers, using high speed rotary steam presses, began mass circulation throughout the eastern United States. Using the printing press, newspapers could distribute exact copies to large numbers of readers at a low incremental cost. In addition, the rapidly increasing demand for advertising for brand-name products fueled the creation of publications subsidized, in large part, by advertising revenue. It was not until the late nineteenth century that the concept of the “press” metamorphized into a description of individuals and companies engaged in an often-competitive commercial media enterprise.

[snip]

Citizen journalists[edit]

According to Jay Rosen, citizen journalists are “the people formerly known as the audience,” who “were on the receiving end of a media system that ran one way, in a broadcasting pattern, with high entry fees and a few firms competing to speak very loudly while the rest of the population listened in isolation from one another— and who today are not in a situation like that at all. … The people formerly known as the audience are simply the public made realer, less fictional, more able, less predictable.”[37]

Abraham Zapruder, who filmed the assassination of President John Fitzgerald Kennedy with a home-movie camera, is sometimes presented as an ancestor to citizen journalists.[38] Egyptian citizen Wael Abbas was awarded several international reporting prizes for his blog Misr Digital (Digital Egypt) and a video he publicized of two policemen beating a bus driver helped lead to their conviction.[39]

Public Journalism is now being explored via new media, such as the use of mobile telephones. Mobile telephones have the potential to transform reporting and places the power of reporting in the hands of the public. Mobile telephony provides low-cost options for people to set up news operations.[citation needed]

During 9/11 many eyewitness accounts of the terrorist attacks on the World Trade Center came from citizen journalists. Images and stories from citizen journalists close to the World Trade Center offered content that played a major role in the story.[40][41]

In 2004, when the 9.1-magnitude underwater earthquake caused a huge tsunami in Banda Aceh Indonesia and across the Indian Ocean, a weblog-based virtual network of previously unrelated bloggers emerged that covered the news in real-time, and became a vital source for the traditional media for the first week after the tsunami.[42] A large amount of news footage from many people who experienced the tsunami was widely broadcast,[43](subscription required) as well as a good deal of “on the scene” citizen reporting and blogger analysis that was subsequently picked up by the major media outlets worldwide.[42] Subsequent to the citizen journalism coverage of the disaster and aftermath, researchers have suggested that citizen journalists may, in fact, play a critical role in the disaster warning system itself, potentially with higher reliability than the networks of tsunami warning equipment based on technology alone which then require interpretation by disinterested third parties.[44]

The microblog Twitter played an important role during the 2009 Iranian election protests, after foreign journalists had effectively been “barred from reporting”. Twitter delayed scheduled maintenance during the protests that would have shut down coverage in Iran due to the role it played in public communication.[45]

Sometimes citizen journalists are, at the same time, bloggers and after some time they often become professional journalists, just as[when?] Paweł Rogaliński, a prized[by whom?] Polish blogger and journalist did.[citation needed]

Criticisms[edit]

Objectivity[edit]

Citizen journalists also may be activists within the communities they write about. This has drawn some criticism from traditional media institutions such as The New York Times, which have accused proponents of public journalism of abandoning the traditional goal of objectivity. Many traditional journalists view citizen journalism with some skepticism, believing that only trained journalists can understand the exactitude and ethics involved in reporting news. See, e.g., Nicholas Lemann, Vincent Maher, and Tom Grubisich.

An academic paper by Vincent Maher, the head of the New Media Lab at Rhodes University, outlined several weaknesses in the claims made by citizen journalists, in terms of the “three deadly E’s”, referring to ethics, economics, and epistemology. The paper has been criticized in the press and blogosphere.[46]

An analysis by language and linguistics professor, Patricia Bou-Franch, found that some citizen journalists resorted to abuse-sustaining discourses naturalizing violence against women. She found that these discourses were then challenged by others who questioned the gendered ideologies of male violence against women.[47]

Quality[edit]

An article in 2005 by Tom Grubisich reviewed ten new citizen journalism sites and found many of them lacking in quality and content.[48] Grubisich followed up a year later with, “Potemkin Village Redux.”[49] He found that the best sites had improved editorially and were even nearing profitability, but only by not expensing editorial costs. Also according to the article, the sites with the weakest editorial content were able to expand aggressively because they had stronger financial resources.

Another article published on Pressthink examined Backfence, a citizen journalism site with three initial locations in the D.C. area, which reveals that the site has only attracted limited citizen contributions.[50] The author concludes that, “in fact, clicking through Backfence’s pages feels like frontier land -– remote, often lonely, zoned for people but not home to any. The site recently launched for Arlington, Virginia. However, without more settlers, Backfence may wind up creating more ghost towns.”

David Simon, a former Baltimore Sun reporter and writer-producer of the popular television series, “The Wire,” criticized the concept of citizen journalism—claiming that unpaid bloggers who write as a hobby cannot replace trained, professional, seasoned journalists.

“I am offended to think that anyone, anywhere believes American institutions as insulated, self-preserving and self-justifying as police departments, school systems, legislatures and chief executives can be held to gathered facts by amateurs pursuing the task without compensation, training or for that matter, sufficient standing to make public officials even care to whom it is they are lying to.”

An editorial published by The Digital Journalist web magazine expressed a similar position, advocating to abolish the term “citizen journalist”, and replacing it with “citizen news gatherer”.

“Professional journalists cover fires, floods, crime, the legislature, and the White House every day. There is either a fire line or police line, or security, or the Secret Service who allow them to pass upon displaying credentials vetted by the departments or agencies concerned. A citizen journalist, an amateur, will always be on the outside of those lines.

Imagine the White House throwing open its gates to admit everybody with a camera phone to a presidential event.”[51]

While the fact that citizen journalists can report in real time and are not subject to oversight opens them to criticism about the accuracy of their reporting, news stories presented by mainstream media also misreport facts occasionally that are reported correctly by citizen journalists. As low as 32% of the American population have a fair amount of trust in the media.[52]

Legal repercussions[edit]

Edward Greenberg, a New York City litigator,[53] notes higher vulnerability of unprofessional journalists in court compared to the professional ones:

“So-called shield laws, which protect reporters from revealing sources, vary from state to state. On occasion, the protection is dependent on whether the person [who] asserted the claim is in fact a journalist. There are many cases at both the state and federal levels where judges determine just who is/is not a journalist. Cases involving libel often hinge on whether the actor was or was not a member of the “press”.”[51]

The view stated above does not mean that professional journalists are fully protected by shield laws. In the 1972 Branzburg v. Hayes case the Supreme Court of the United States invalidated the use of the First Amendment as a defense for reporters summoned to testify before a grand jury. In 2005, the reporter’s privilege of Judith Miller and Matthew Cooper was rejected by the appellate court.

Proponents and facilitators[edit]

Dan Gillmor, former technology columnist with the San Jose Mercury News, is one of the foremost proponents of citizen journalism, and founded a nonprofit, the Center for Citizen Media,[54] to help promote it. The Canadian Broadcasting Corporation‘s French-language television network also has organized a weekly public affairs program called, “5 sur 5”, which has been organizing and promoting citizen-based journalism since 2001. On the program, viewers submit questions on a wide variety of topics, and they, accompanied by staff journalists, get to interview experts to obtain answers to their questions.[citation needed]

Jay Rosen, a journalism professor at New York University, was one of public journalism’s earliest proponents. From 1993 to 1997, he directed the Project on Public Life and the Press, funded by the Knight Foundation and housed at NYU. He also currently runs the PressThink weblog.

Professor Charles Nesson, William F. Weld Professor of Law at Harvard Law School and the founder of the Berkman Center for Internet & Society, chairs the Advisory Board for Jamaican citizen journalism startup On the Ground News Reports.[55]

One of the leading proponents for citizen journalism in Australia is Margo Kingston, author and former political journalist for the Sydney Morning Herald. Kingston launched one of the world’s first mainstream citizen journalism platforms, Webdiary, in 2000, well before the New York Times, Washington Post and The Guardian. Kingston resigned from Webdiary in 2005 but the site continues and has been preserved in Pandora, Australia’s National Web Archive. After a period of retirement, Kingston returned to citizen journalism in 2013 by co-publishing a new site No Fibs. It was on this site that Kingston published an exclusive story that the Australian Prime Minister, Tony Abbott, had inappropriately claimed expenses for promoting his book.[56]

In March 2014, blogger and novelist James Wesley Rawles launched a web site that provides free press credentials for citizen journalists called the Constitution First Amendment Press Association (CFAPA).[57][58] According to David Sheets of the Society for Professional Journalists, Rawles keeps no records on who gets these credentials.[57]

Maurice Ali, a citizen journalist from Canada, founded one of the first international citizen journalist associations called the International Association of Independent Journalists Inc. (IAIJ) in 2003. The association through its President (Maurice Ali) have published studies and articles on citizen journalism, attended and spoken at UNESCO[59] and United Nations events[60][61] as advocates of citizen journalism worldwide.

https://en.wikipedia.org/wiki/Citizen_journalism 

[##]

https://www.youtube.com/watch?v=czLI3oLDe8M 

[85 minutes]

Published on Oct 31, 2014

Deep Learning: Intelligence from Big Data

Tue Sep 16, 2014 6:00 pm – 8:30 pm

Stanford Graduate School of Business

Knight Management Center – Cemex Auditorium

641 Knight Way, Stanford, CA

A machine learning approach inspired by the human brain, Deep Learning is taking many industries by storm. Empowered by the latest generation of commodity computing, Deep Learning begins to derive significant value from Big Data. It has already radically improved the computer’s ability to recognize speech and identify objects in images, two fundamental hallmarks of human intelligence.

Industry giants such as Google, Facebook, and Baidu have acquired most of the dominant players in this space to improve their product offerings. At the same time, startup entrepreneurs are creating a new paradigm, Intelligence as a Service, by providing APIs that democratize access to Deep Learning algorithms. Join us on September 16, 2014 to learn more about this exciting new technology and be introduced to some of the new application domains, the business models, and the key players in this emerging field.

Moderator

Steve Jurvetson, Partner, DFJ Ventures

Panelists

Adam Berenzweig, Co-founder and CTO, Clarifai

Naveen Rao, Co-founder and CEO, Nervana Systems

Elliot Turner, Founder and CEO, AlchemyAPI

Ilya Sutskever, Research Scientist, Google Brain

Demo Companies**:

Clarifai | SkyMind | Ersatz Labs | AlchemyAPI

[&&]{**}[##]

http://i0.wp.com/www.pollockmarketinggroup.com/wp-content/uploads/2016/02/unravelled_yarn_knitting.jpg

One of the fascinating things about the reading I have done for the past twelve years is the continual presence of the term enterprise software; some examples include the whole story, several books, and multiple articles about PROmis, the descriptions by Indira Singh and Richard Andrew Grove relative to 9/11( https://www.corbettreport.com/articles/20100305_911_whistleblowers.htm ) (but read this https://realitybloger.wordpress.com/2015/07/18/spin-job-the-odd-case-of-richard-andrew-grove/ ), and now this (which I do not suggest was involved in either of those yarns). 

 

YARN is the architectural center of Hadoop that allows multiple data processing engines such as interactive SQL, real-time streaming, data science and batch processing to handle data stored in a single platform, unlocking an entirely new approach to analytics.

More here:

http://hortonworks.com/apache/yarn/ 

music: 

https://www.youtube.com/watch?v=KAoty-WyX0U 

[&&]{**}[##]

 

Friday, 10 February 2017

Political Networking (how social networking is changing politics forever)

Social networking is changing politics, that fact should be clear by now.  A simple proof:  Trump wouldn’t be in the White House without it.

But where is political networking taking us?  That’s the BIG question. I’ve been doing lots of thinking about this (it’s going into my book). Here’s my shorthand for where our political system is headed. We have three political networks to choose from:

1 Insurgency

2 Orthodoxy

3 Participatory

Insurgency

Trump used an open source insurgency (I first wrote about this back in 2004) to become president. This insurgency didn’t just with the election, it:

•blew up both the Republican and Democrat parties

•did it without much organization or advertisement spending

•accomplished it despite vocal and strident opposition from the entire media establishment (from NY to Hollywood), all of academia, and most of Silicon Valley

Trump’s insurgency worked like open source insurgencies in the past (from the Iraq war to Egypt/Tunisia).

•An open source insurgency is a loose network (meshed) that is composed of many individuals and small groups working independently, but united by a single purpose (in this case: electing Trump).

•Open source insurgencies are much more innovative than their bureaucratic counterparts. They constantly coming up with and trying out new ideas. For example: the seventy to one hundred groups in the Iraqi insurgency rolled out new innovations (tactics to weapons) in days, while it took months for the US military to counter them.

•Trump accelerated and directed this insurgency by interacting with it.  For example, he accelerate the innovation of the insurgency by paying attention to it (read Gustavo’s essay for more). Tweets and media mentions incentivised innovation and spread new ideas across the insurgency in minutes (not days/weeks).   Trump also selected targets for the insurgency. In many, many instances, Trump directed the insurgency to silence individuals in the opposition through a torrent of online/offline abuse.

Trump’s currently trying to adapt this insurgency to govern.  Where will it take us? Early results suggest that Trump’s insurgency is better suited for dismantling a large, bureaucratic government and international order than running it. It’s also the type of network that will erode the rule of law over time.

Orthodoxy

The second form of political social networking I’m seeing is found in the opposition to Trump’s presidency.  Right now, it’s known as the #resistance   The orthodoxy wasn’t planned, it:

•arose out of the ashes of the political parties and it is growing without any formal leadership

•is ALREADY firmly in control of nearly all public forums

•enforces opposition to Trump

The orthodoxy is an open source insurgency in reverse.  It uses social networking to crack down on deviation and dissent.

•The orthodoxy is tightly interconnected network that uses social networking to exert pressure on people to accept the orthodox position (in this case: #resistance to Trump).

•Online orthodoxies grow through peer pressure and disconnecting deviants from the network.  It doesn’t innovate.  It rejects, cajoles, and pillories.

•This online orthodoxy is growing at an accelerated pace because Trump feeds the outrage that fuels it.

How will an orthodox network govern?  It will eventually formalize compliance with the orthodoxy. Compliance, evidenced by a long social networking history, will qualify people for positions of authority and power. Any deviation will result in bans, loss of income, etc. until the target repents.  This orthodoxy will work in parallel to the rule of law and likely exceed its coercive power over time.

Participatory

This form of social networking doesn’t have an example in the US yet.

•The Movement 5 Star in Italy is a political party run as a social network.  It is running number one in the polls, has mayor in Rome and Turin, and recently deposed the Prime Minister.

•The political representatives the M5S sends to Rome must vote the way the party tells them to vote.  They aren’t independent.

•The M5S is a participatory political party.  The people in the party debate the issues and vote on how their representatives should vote in Rome.

The participatory party is still young, but it combines the fluidity of the “insurgency” with the solidarity of “orthodoxy.”

•A participatory party could be run as a cell phone app.  This would allow it to scale… to 70 plus million members is possible.

•Unlike current political parties, this party wouldn’t just vote every 2 years to elect candidates.  It would operate continuously.  Voting on all major issues.

•A participatory party could arise independently, growing virally, or it could coopt an existing political party from the inside out.

How would a participatory network govern?  Unlike the other systems, it has the best chance of working within the confines of the current US Constitution.  It also has the strength to tame political distortions caused by globalization without resorting to the extremes of either the orthodoxy or the insurgency.

My bet is on a participatory political system made possible by social networking.  It’s the best chance for a better future.  A system where we put social networking to work for us instead of against us.

Of course, the reality is probably something different: we’re prepping for a civil war.

Sincerely,

John Robb

Posted by John Robb on Friday, 10 February 2017 at 05:13 PM | Permalink

investigative pointillism?

investigative pointillism?

We live in a world that is basted regularly in the electric media which, given a shortened attention span on the part of its viewers, must elevate and conflate in order to keep you tuned in — http://www.inquisitr.com/3916823/lena-nersesian-sex-tape-photos-video-of-youtube-star-lena-the-plug-go-viral-after-her-promise-to-fans/  — so you’ll buy the messages and the content and the Kool-Aid. 

[I wonder how many people are aware of the patented technology for the transmission of silent sound in HD TV transmissions. What are they whispering into our subconsciousness by opening our built-in filter door with brain-wave technologies?]

So when Sports Illustrated uses the already-controversial New England Patriots (because the franchise and its QB are the chosen target of the NFL) to bash Donald Trump some more—  http://www.si.com/nfl/2017/01/24/tom-brady-donald-trump-friendship-electionif you want to know more about Time, Inc., the folks who own SI, then read Kris Millegan’s “Fleshing Out Skull and Bones” and George Michael Evica’s “A Certain Arrogance” (especially the part about C. D. Jackson and Time’s role in the cover-up of the assassination of the man who gave a speech warning the press about “a monolithic and ruthless conspiracy that relies on covert means for expanding its sphere of influence”  —  it becames necessary to throw some cold water on your face in the hopes that you will snap out of your stupor

[&&]{**}[##]

‘Scientology knock-off’: Whistleblower exposes ‘cult’ that thinks ‘children are sexy’ (EXCLUSIVE)

Published time: 25 Jan, 2017 09:26

Edited time: 25 Jan, 2017 13:45

“… Speaking exclusively to RT, one ex-Accessory, known here as Jane, says the group “programs its members to think like robots.” She says Access works to change its members’ “points of references” on ingrained ideas around sex, intimacy and family.

Members who ask too many questions can be rebuked, Jane says.

“You are trapped and you are afraid to say anything that is seen as judgement of Access.

“It is very clever how it is done. Because it’s not like any other ‘cult’ but it is mind control, very much mind control, and it’s very much, ‘Do as I tell you although I’m not telling you.’”

“People think that they are free, but mentally they are not free.”….”

More in this long, multi-video, multi-media article:

https://www.rt.com/uk/375002-access-consciousness-scientology-cult/ 

[&&]{**}[##]

George Orwell Explains How “Newspeak” Works, the Official Language of His Totalitarian Dystopia in 1984

in Literature| January 25th, 2017

 

https://www.youtube.com/watch?v=R7Pkcg3DdOY 

 

As we noted yesterday, and you likely noticed elsewhere, George Orwell’s classic dystopian novel 1984 shot to the top of the charts—or the Amazon bestseller list—in the wake of “alternative facts,” the latest Orwellian coinage for bald-faced lying. The ridiculous phrase immediately produced a barrage of parodies, hashtags, and memes; healthy ways of venting rage and disbelief. But maybe there is a danger there too, letting such words sink into the discourse, lest they become what Orwell called “Newspeak.”

It’s easy to hear “Newspeak,” the “official language of Oceania,” as “news speak.” This is perfectly reasonable, but it gives us the impression that it relates strictly to its appearance in mass media. Orwell obviously intended the ambiguity—it is the language of official propaganda after all—but the portmanteau actually comes from the words “new speak”—and it has been created to supersede “Oldspeak,” Orwell writes, “or Standard English, as we should call it.”

In other words, Newspeak isn’t just a set of buzzwords, but the deliberate replacement of one set of words in the language for another. The transition is still in progress in the fictional 1984, but is expected to be completed “by about the year 2050.” Students of history and linguistics will recognize that this is a ludicrously accelerated pace for the complete replacement of one vocabulary and syntax by another. (We might call Orwell’s English Socialists “accelerationsts.”) Newspeak appears not through history or social change but through the will of the Party.

The purpose of Newspeak was not only to provide a medium of expression for the world-view and mental habits proper to the devotees of Ingsoc, but to make all other modes of thought impossible.

It’s entirely plausible that “alternative facts,” or “altfacts,” would fit right into the “Ninth and Tenth Editions of the Newspeak Dictionary,” though it might easily fall out of favor and “be suppressed later.” No telling if it would make the cut for “the final, perfected version” of Newspeak, “as embodied in the Eleventh Edition of the Dictionary.”

These quotations come not from the main text of 1984 but from an appendix called “The Principles of Newspeak,” which you can hear read at the top of the post. Here, Orwell dispassionately discusses the “perfected” form of Newspeak, including its grammatical “peculiarities,” such as “an almost complete interchangeability between different parts of speech” (an issue current translators have encountered). He then introduces its vocabulary, divided into “three distinct classes,” A, B, and C.

The A class contains “everyday life” words that have been mutated with cumbersome prefixes and intensifiers: “uncold” for warm, “pluscold and doublepluscold” for “very cold” and “superlatively cold.” The B class contains the compound words: sinister doublethink coinages like “joycamp (forced-labor camp)” and “Minipax (Ministry of Peace, i.e. Ministry of War).” These, Orwell explains, are similar to “the characteristic features of political language… in totalitarian countries” of the early 20th century.

The citizen of Oceana, Orwell tells us, must have “an outlook similar to that of the ancient Hebrew who knew, without knowing much else, that all nations other than his own worshipped ‘false gods’…. His sexual life, for example, was entirely regulated by the two Newspeak words sexcrime (sexual immorality) and goodsex (chastity).” The latter included only “intercourse between man and wife, for the sole purpose of begetting children, and without physical pleasure on the part of he woman: all else was sexcrime.

The C class of words may be the most insidious of all. While it “consisted entirely of scientific and technical terms” that “resembled the scientific terms in use today,” the Party took care “to define them rigidly and strip them of undesirable meanings.” For example,

There was no vocabulary expressing the function of Science as a habit of mind, or a method of thought irrespective of its particular branches. There was, indeed, no word for ‘Science,’ any meaning that it could possibly bear being already sufficiently covered by the word Ingsoc.

Orwell then goes on to discuss the difficulty of translating the work of the past into Newspeak. He uses as an example the Declaration of Independence: “All mans are equal was a possible Newspeak sentence,” but only in that “it expressed a palpable untruth—i.e. that all men are of equal size, weight, or strength.” As for the rest of Thomas Jefferson’s rousing preamble, “it would have been quite impossible to render this into Newspeak,” writes Orwell. “The nearest one could come to doing so would be to swallow the whole passage up in the single word crimethink.”

Related Content:  

George Orwell’s 1984 Is Now the #1 Bestselling Book on Amazon

Hannah Arendt Explains How Propaganda Uses Lies to Erode All Truth & Morality: Insights from The Origins of Totalitarianism

Huxley to Orwell: My Hellish Vision of the Future is Better Than Yours (1949)

Josh Jones is a writer and musician based in Durham, NC. Follow him at @jdmagness

http://www.openculture.com/2017/01/george-orwell-explains-how-newspeak-works.html 

via

http://www.blacklistednews.com

[&&]{**}[##]

https://2.bp.blogspot.com/-dvXe_XA0I2Y/WIwe1qcaAXI/AAAAAAACdlI/MsnHIyq68e066sksX69Eb3WNYe_WmDaWwCLcB/s1600/fakepg-large.jpg

[&&]{**}[##]

https://www.youtube.com/watch?v=al3anBiHwmI 

https://en.wikipedia.org/wiki/The_Whistleblower

[&&]{**}[##]

REVERSE ENGINEERING: THE (INFORMATION) REBELLION’S ONLY ROAD TO VICTORY

Posted by   IRIS HQ   |   Categories :   Rebel News

IRIS · ir-is.org · January 28, 2017

Here’s how you can not win a war against a propaganda and war machine that can rely on endless supplies of funding and resources:

First. You can’t win from within. You can’t change the system on the inside. It was built to operate the way it does now. So any attempt to install a new president – for instance – who is allegedly on the side of the people makes great content for bedtime stories – but nothing more.

Second. You can’t be posting your great ideas in public forums and in online discussions on social media websites and networks. It doesn’t work like that. Any such communication will result in the co-opting of your idea and your following. You don’t give the specific details of any strategy or technique that you have. You keep it secret or at least communicate about it away from public eyes. Email at least puts a layer of secrecy, although not an ideal solution when you are planning to take down an entire government for instance. Although governments HAVE been toppled largely through Twitter messaging. Lessons have been learned from that since at least 2009 during OP Iran.

Here’s how you CAN win:

You build a new society. Parallel with today’s global civilization. You limit or ban altogether any links with it. For instance, you do not connect your banking system with SWIFT or VISA or MasterCard and so on. This is one of the reasons why Bitcoin and all other similar crypto currencies will never be truly decentralized and independent. Any real crypto currency that seeks unconditional autonomy for the people MUST stay away from the central banks and all the currencies that these banks print. The same goes for any other branch of your new and parallel society. You HAVE TO keep it sterile. Allowing even one gateway into your new system – your new society – will render it compromised eventually. All of this is, however, pretty much contemplating about an utopia since a completely detached new society would have to be started away from the internet, which  would seriously limit the number of people who would know about it or can contribute to it. Although there are options available that keep this utopia a potential and not an impossibility.

Setting the former aside for now, since we are going to be locked within the current system anyway for many years more, there is a way that we can tip the balance of justice in our favor.

There is a way we too  – as a rebellion – can actually perpetually exist and be victorious at least as many times and to at least the same extents as the powers that want to be, instead of constantly losing battles and losing ground as has been happening during the past decades. During which the international rebellion has effectively been reduced to, relatively, a handful of pockets of resistance that never work together as a destructive force of nature. The potential is there though. It has just never been utilized to its full capacities.

The key to both that new parallel system, as described above, and a successful rebellion is reverse engineering.

We have to reverse engineer our current society and we have to reverse engineer the powers that want to be and their power structure and information and hot war arsenals.

Their system is all around us. Their news and entertainment media. Their internet. Their banking. Their military. Their clans and their dynasties. Their schools. Their governments. Their taxes. Their industry. Their rules. Their history. Their future.

What about OUR news and entertainment media? OUR internet. OUR banking. OUR military. OUR clans and OUR dynasties. OUR schools. OUR governments. OUR taxes. OUR industry. OUR rules. OUR history. OUR future.

Reverse engineering on this scale is of course an enormous task that we would put on our shoulders but it is the only way forward for us if we are even remotely serious about what we are doing and saying as a rebellion.

Reverse engineering an entire society and propaganda and war machine is what we must do. It can be done.

They have spent hundreds of years crafting their oppressive system so it will at least take the same time and double the efforts from us to merely counter theirs. Let alone topple and remove it altogether.

That is why we haven’t got a minute to waste. What are YOU waiting for?

[&&]{**}[##]

 

Recently at Occurrences, I noted the continuous updating of George Webb’s previously-noted video series on the saga of Eric Braverman; here’s the link to his channel: https://www.youtube.com/channel/UCrQ-wHKVi0JDWjQGcuoYnew

Note how he has changed the title as progress in research was made. 

Note too that he now updates his list of sources and his slides are archived here on at least an occasional new video.

Here’s a time-saving tip: Click on the wheel just to the right of “CC” and change the playback speed to 1.25x or even 1.5x. The speech is still understandable. 

The video noted in my recent news digest has been updated several times; the description of how the CIA harnesses religious groups can be seen historically in George Michael Evica’s book “A Certain Arrogance”.  The description — starting at the 14-minute mark — of the means for a slow and silent assassination technique was chilling. [See this as an example. ] 

I’m spent a good part of the weekend catching up with the series.

I went back six days to the end of day 90 for this demonstration of how he used a software package for collaboration to document things. He provides a mechanism for others to add content: 

https://trello.com/b/RMx1r5dG 

On Day 91 (Part 1), after the 8-minute mark, there are some dots connected, but here’s the question: Is this entire series by Webb a masterpiece of citizen investigation journalism in which he has taken dot-connecting to the level of pointillism? 

Some quotes:

“This is happening on a massive [industrial] scale.” 

“All this stuff got started in NATO.”

“This is not a Hillary witch hunt.”

“It’s all one thing….”

“We’re going in a bad direction….”

Day 91, part 3 puts teddy bears in a new category.

“This is a blood network…”  “There’s always a big move that covers a small move.” 

Day 91, part 3 puts costume in a new category.

Day 92(1): Ehud Barak ties to Epstein’s island… 

Day 92(2): Was “invasion by disaster” what happened during Katrina? 

Here’s the discussion on Team Rubicon.

Was the flyover used of incapacitating agent first tested during the infamous le pain maudit” event that was linked to the death of Olson?

From 8:05 through 14:00, an explanation of Palantir, the tracking of “quantum dots” by satellite… 

Is the same “eye of God” mentioned at the end of 92(2) the same “eye of God” that is being fitted into F35 jet aircraft?

Day 92(3): Is the multi-phase process what is envisioned for the military troops being assembled on the borders of Russia?

Day 92(4): He explains that the numbering system he uses has been changed by someone else.

Day 93(2): Sanctuary cities?

Here I jumped ahead. but I will go back and fill in the gaps.

Day 97(2):  Homan Square? Mining. 

Day 97(3): Last summary to date. Chicago, Boston, Baltimore, Philadelphia named as future centers for organ harvesting. [The same cities that have seen urban riots in the past?]

 

 

Update: 

George Webb has a great series where he’s figured out what’s actually going on. This is part 8 of “cliff notes” on George Webb’s video series. This is my attempt to drink from the firehose of George Webb’s material by taking notes on it. https://www.reddit.com/r/conspiracy/comments/5qsubd/part_8_cliff_notes_on_george_webbs_series/

Here are previous versions:

algocracy

algocracy

Algorithm warfare is literally everywhere nowadays yet most people haven’t got the slightest idea what is going on or what they are being exposed to.

Most of us can relate to Allan Weisbecker’s example of how Yahoo mail served him an ‘associated’ advertisement when one day he mentioned “walking the dog” as he wrote an email.

“This one came up as I was signing ‘allan.’ 

Coincidence? Pu-lease. My point is the lightning speed with which Yahoo’s algorithm worked. Like two seconds was all it took to analyze ‘walking the dog’ then nail me with a dog-related ad – what shocked me was the speed, considering all the cyber-details that had to go through the system. This is what Yahoo uses on a casual daily basis. Imagine the algorithm NSA has grinding away at Fort Meade, to keep track of what you’re thinking and doing.”

More:

http://ir-is.org/2017/01/23/algorithm-warfare-when-ad-slots-become-weaponized-information-windows/ 

[&&]{**}[##]

featured graphic:

two rival swarms of critters wage a non-stop war for the space

source of featured image: http://www.cellfighter.com/conway-life-screensaver.html

music:

https://www.youtube.com/watch?v=0nAsk7cwZBk

The Algorithm of Jazz @Yale: Matt Griffith ’14 performs Artie Shaw Concerto for Clarinet

[&&]{**}[##]

“… The reality is that the gap between mainstream and alternative media outlets has artificially been reduced by co-opting the alternative media and their audiences. Countless examples of this exist. At least 9 out of 10 alt media outlets are pretty much carbon copies of each other and have during the last 5 years been putting their weight behind government policies that would have been exposed and debunked years earlier.

For instance, the false war on islam terror is widely accepted now by guys like Alex Jones, Steve Quayle and Doug Hagmann. All of them are also buying into and spreading other zionist scams, lies and propaganda fluff. For sure these characters are the best of all to put on mainstream news broadcasts – where they belong. They go into suicidal funks when they can parrot Netanyahu’s insane waffling.

The conditioning was, it now seems, planned to climax all along when a type like Trump came into the White House. It is also at this very moment that all of this is being suggested right as zionist puppet Trump is “reshaping” the press room in Washington. How convenient. Likely the NSA algorithms didn’t see this one coming. Riiiight….

Shockingly, well – not really, Hodges’ suggestions are greatly welcomed by his following, when we observe the feedback he gets for it.

Well folks, wish Dave Hodges good luck. Wish him a fruitful career at CNN, ABC or NBC because that’s where he is planning to apply.

It looks like they have come full circle at the transparent alternative media. What once was a platform or niche for alleged dissent has now officially turned into a mergers and acquisitions business model…..”

http://ir-is.org/2017/01/23/the-power-of-a-trump-deception-alternative-media-broadcaster-suggests-mainstream-media-should-survive-by-merging-with-alternative-media/ 

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=LSHZ_b05W7o (Daddy’s Car, three minutes)

a song composed by Artificial Intelligence – in the style of the Beatles 

[&&]{**}[##]

Hierarchical Temporal Memory algorithms for understanding asymmetric warfare

Conference Paper:  (PDF Available) April 2009

Abstract

There is a problem in combat modeling when it comes to accurately representing asymmetric warfare. The roots of this problem stem from the ways in which warfare has evolved over the last century from force-on-force combat to the network-centric warfare (NCW) that has emerged today in its most exemplary fashion in the Middle East, especially in the context of Joint Urban Operations (JUO). Therefore, this paper focuses on some of the previous attempts as a means to motivate the need for a new technique that understands the interactions on which an accurate representation of NCW rests. Given the difficulties of previous modeling attempts, this work then focuses on the profound impact that human behavior has on the modeling of NCW. Furthermore, with such attention to human behavior, the discussion of modeling NCW shifts to the human brain and its impact on behavior in such an environment. Thus the topic of this paper turns towards what results from neuroscience are useful for understanding NCW and how those facts can be translated into use on modern computers, via the use of hierarchical temporal memory (HTM) algorithms; finally, the inherent issues with such a task shall then be discussed.

https://www.researchgate.net/publication/224407873_Hierarchical_Temporal_Memory_algorithms__for_understanding_asymmetric_warfare 

[&&]{**}[##]

From the single desk of a startup hedge fund to the gilded halls of Goldman Sachs, computer code is now responsible for most of the activity on Wall Street.

AUTHOR: FELIX SALMON AND JON STOKES.

 DATE OF PUBLICATION: 12.27.10.

ALGORITHMS TAKE CONTROL OF WALL STREET

https://www.wired.com/2010/12/ff_ai_flashtrading/ 

[&&]{**}[##]

https://www.yahoo.com/news/cyberwarfare-isis-blow-global-finance-152124337.html?ref=gs 

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=Cbb08ifTzUk

https://www.youtube.com/watch?v=Cbb08ifTzUk 

(3:13)

[&&]{**}[##]

https://britcruise.files.wordpress.com/2010/03/emotionmap_expression.jpg 

https://consumerist.com/2016/10/17/sony-algorithm-will-compose-new-music-based-on-songs-you-like/ 

https://consumerist.com/2016/10/17/sony-algorithm-will-compose-new-music-based-on-songs-you-like/ 

http://algorithmicjazz.com/p5js/jazz_1/windex.html 

http://algorithmicjazz.com/p5js/coj/cojindex.html A jazz melody algorithm. Click, hold, and move the cursor around on the screen.

http://algorithmicjazz.com/p5js/ct4/windex.html 

source of image:

https://britcruise.com/2010/05/31/strategy-for-emotion-control-in-an-algorithmic-music-composition-engine/ 

[&&]{**}[##]

http://ir-is.org/wp-content/uploads/2017/01/algorithms.jpg

Page created January 20, 2017 – Last updated January 24, 2017

Algorithm warfare is a very complex topic that needs to be introduced to the world, not the least due to the present and future dangers that it poses.

Algorithm warfare includes more than just the deployment of analytical, defensive and conditioning or offensive (hostile) algorithms by commercial entities and government agencies. It is also about constantly creating floods of fresh mineable data; analyzing, exploiting and manipulating financial markets, perceptions and public opinions; and the eventual creation and deployment of self-perpetuating loops of algorithmic artificial intelligences that can steer a planetary populace on autopilot.

Although the basic concept of algorithms is understood by the general public, the advances and potential capabilities in the field are far less understood. It is therein that the dangers lay.

In our introductory articles [1, 2, 3, 4] the concept of algorithm warfare has already been explained with practical examples but a clear overview of who and what the major players are for instance, who the centerpieces are if you will, had yet to be created.

This page will also serve that purpose, to list those involved directly and indirectly. The longer the list becomes the clearer the bigger picture will become on where algorithm warfare is coming from and where it is heading.

ADDITIONAL RECOMMENDED READING

Enhanced PROMIS Contract (Inslaw)

Insider Trading 9/11: Substantial Profits in Financial Markets

http://ir-is.org/algorithm-warfare-in-the-21st-century/ 

[&&]{**}[##]

“Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been … used “to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people.” 

Various techniques are used, and are aimed at influencing a target audience’s value system, belief system, emotions, motives, reasoning, or behavior

It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator’s objectives, and are sometimes combined with black operations or false flag tactics. 

It is also used to destroy the morale of enemies through tactics that aim to depress troops’ psychological states. 

Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. 

Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country…..”

https://en.wikipedia.org/wiki/Psychological_warfare 

[&&]{**}[##]

https://warfareplugins.com/future-social-warfare-wordpress-plugin/ 

The co-founder & lead developer for Warfare Plugins is a WordPress enthusiast and U.S. Army Reserves Psychological Operations Sergeant.

[&&]{**}[##]

This article was published by Jeff Gates for Foreign Policy Journal on August 28, 2009.  It was included on the IRIS website because it provides a perspective that is completely in line with their algorithm warfare sensitization campaigns and it explains an aspect of it from a specific point of view that interlocks with our previous report titled “Israeli Intelligence Deploys New ‘Anti-Semitism’ Identification System“.

http://ir-is.org/2017/01/23/algorithm-warfare-how-israel-wages-game-theory-warfare/ 

“… Israeli game theorists operate not from the Center for Morality or the Center for Justice but from the Center for Rationality. As modeled by Zionist war planners, game theory is devoid of all values except one: the ability to anticipate—within an acceptable range of probabilities—how “the mark” will react when provoked. Thus we see the force-multiplier potential for those who wage war with well-planned provocations and well-timed crises.

Israeli behavior is often immoral and unjust but that does not mean it is irrational. For Colonial Zionists committed to the pursuit of an expansionist agenda, even murderous provocations are rational because the response can be mathematically modeled, ensuring the results are reasonably foreseeable. That alone is sufficient for a people who, as God’s chosen, consider it their right to operate above the rule of law.”

[&&]{**}[##]

“… already points to a future in which intelligence-gathering, assessment and military action, including the calculation of who can legally be killed, will largely be performed by machines based upon an ever-expanding database of aggregated information. As such, this transition to execution by algorithm is not simply a continuation of killing at ever greater distances inaugurated by the invention of the bow and arrow that separated warrior and foe, as many have suggested. [3] It is also a consequence of the ongoing automation of warfare, which can be traced back to the cybernetic coupling of Claude Shannon’s mathematical theory of information with Norbert Wiener’s wartime research into feedback loops and communication control systems. [4] As this new era of intelligent weapons systems progresses, operational control and decision-making are increasingly being outsourced to machines…..”

“…. When one poses the question, under what conditions is it morally acceptable to deliberately kill a human being, one is not, in this case, asking whether the law permits such an act for reasons of imminent threat, self-defence or even empathy for someone who is in extreme pain or in a non-responsive vegetative state. The moral register around the decision to kill operates according to a different ethical framework: one that doesn’t necessarily bind the individual to a contract enacted between the citizen and the state. Moral positions can be specific to individual values and beliefs whereas legal frameworks permit actions in our collective name as citizens contracted to a democratically elected body that acts on our behalf but with which we might be in political disagreement. ….”

https://www.radicalphilosophy.com/commentary/deadly-algorithms 

Click here to download the PDF of this item 

[&&]{**}[##]

http://cdn.defenseone.com/media/img/upload/2016/01/19/f35_24226214486_224b146722_o/defense-large.jpg 

JANUARY 19, 2016

The F-35 Joint Strike Fighter, the most expensive weapons program ever, won’t justify its price tag by outmaneuvering other jets (it can’t), flying particularly fast, or even by carrying munitions in a stealthy bomb bay. Instead, the U.S. military is banking on an emerging technology called cognitive electronic warfare to give the jet an almost-living ability to sniff out new hard-to-detect air defenses and invent ways to foil them on the fly.

While the specifics of the jet’s electronic warfare, or EW, package remain opaque, scientists, program watchers and military leaders close to the program say it will be key to the jet’s evolution and its survival against the future’s most advanced airplane-killing technology. In short, cognitive EW is the most important feature on the world’s most sophisticated warplane…..

Read “interaction” in that context to mean the critical moment when an adversary, perhaps a single lowly radar operator, detects a U.S. military aircraft on a covert operation. That moment of detection is the sort of world-changing event that happens, literally, in the blink of an eye.

Just before the study came out, the Defense Advanced Research Projects Agency, or DARPA, established the Adaptive Radar Countermeasures program to “enable U.S. airborne EW systems to automatically generate effective countermeasures against new, unknown and adaptive radars in real-time in the field.”

The goal: EW software that can perceive new waveforms and attacks as quickly and as clearly as a living being can hear leaves rustle or see a predator crouching in the distance, then respond creatively to the threat: can I outrun that? Can I fight it? Should I do anything at all? It’s a problem of artificial intelligence: creating a living intelligence in code….”

The full article is here:

http://www.defenseone.com/technology/2016/01/most-important-technology-f-35/125228/ 

[&&]{**}[##]

“What we’ve done with the 5th Generation [aircraft] is the computer takes all those sensory inputs, fuses it into information. The pilot sees a beautiful God’s eye view of what’s going on. […] It’s a stunning amount of information.”

—Gen. Mike Hostage, Commander, Air Combat Command, U.S. Air Force

https://www.f35.com/about/capabilities/electronicwarfare 

[&&]{**}[##]

Algocracy

Posted May 23, 2015 by Danny Crichton (@DannyCrichton), Contributor

“… Algorithms are not just determining who lives, but also who dies. The Defense Department, taking advantage of incredible advancements in autonomous technologies, is increasingly advocating for self-flying drones. The hope is that machine learning and better algorithms can reduce the human error in drone-based assassinations, potentially allowing these technologies to make the decision to shoot without human intervention.

Ever since the development of computers in the mid–20th century, algorithms have been used to increase business efficiency. Today, algorithms run our world. UPS and FedEx use algorithms to optimize the routes of its drivers, Procter & Gamble and Walmart use learning algorithms to ensure that sufficient products are on store shelves, and banks use algorithms not only for securities trading but also to predict cash flows…..”

“… There is an objective quality about the computer that is lacking in a human being, even though they are both ultimately political. It is just that the human seems political at the time the decision is made, while the algorithm was political when it was designed and implemented…..”

“… There is a belief that moving such decisions away from humans and into the machine-learning black box is the solution to many of our political problems. That is precisely wrong. We aren’t avoiding the politics of our decisions, but rather giving up human agency itself to allow the computer to make it for us. This is the fundamental difference between first and second generation algorithms.

Developing policies in our society is the forcing function to ensure that we come together, debate, and ultimately work toward a usable consensus on how we want our government to function. The more we give up on those sorts of arenas for debate, the more we will increasingly find that our society simply cannot work together whatsoever.

Algocracy?

Algorithms will not save us. They cannot make the decisions we have to make any easier, and in fact, can massively increase the level of polarization that takes place in our country. Using an algorithm in immigration to predict economic performance may sound like a way to avoid a hard debate about immigration, but that is precisely why it is so dangerous. Who exactly do we want to allow into our country? Computer code can’t make us content…..

I still believe that when the algorithms themselves are part of the political debate, we can increase the efficiency of government while also improving the lives of citizens.

Ultimately, we live with each other in a human society. We should never give up our seat at the table in order to allow the algorithms to just do their work. The data we allow them to use and the models we allow them to calculate should all be areas where humans have a voice. Our politicians need to see the algorithm as where politics is increasingly centered, and engage with them accordingly.”

https://techcrunch.com/2015/05/23/algocracy/

[&&]{**}[##]

QUESTION:

“HOW DOES ONE ARRIVE AT THE OFFICIAL FBI CODE NAME ‘PENTTBOM’ (PENTAGON/TWIN TOWERS BOMBING INVESTIGATION) WHEN ONLY AIRPLANES WERE USED TO DESTROY THE TWIN TOWERS AT THE WTC AND PARTIALLY THE FACADE OF THE PENTAGON? IN OTHER WORDS: HOW DOES ONE COME TO THE CONCLUSION THAT THE WORD ‘BOMBING’ MUST BE INCLUDED IN THIS PROMINENT CASE’S CODE NAME?”

For this occasion the comment section will be opened below. 

http://ir-is.org/2017/01/24/911-conspiracy-the-question-for-all-skeptics-and-inside-job-deniers/

inauguration illumination

inauguration illumination

“President Trump’s brief inaugural speech was a declaration of war against the entirety of the American Ruling Establishment. All of it….. The interest groups designated by Trump as The Enemy are well entrenched and accustomed to being in charge. Their powerful networks are still in place. Although there are Republican majorities in the House and Senate, most of those in Congress are answerable to the ruling interest groups that provide their campaign funds and not to the American people or to the President. The military/security complex, offshoring corporations, Wall Street and the banks are not going to roll over for Trump. And neither is the presstitute media, which is owned by the interest groups whose power Trump challenges.

Trump made it clear that he stands for every American, black, brown, and white. Little doubt his declaration of inclusiveness will be ignored by the haters on the left who will continue to call him a racist just as the $50 per hour paid protesters are doing as I write.

Indeed, black leadership, for example, is enculturated into the victimization role from which it would be hard for them to escape. How do you pull together people who all their lives have been taught that whites are racists and that they are the victims of racists?….

So along with the globalists, the CIA, the offshoring corporations, the armaments industries, the NATO establishment in Europe, and foreign politicians accustomed to being well paid for supporting Washington’s interventionist foreign policy, Trump will have arrayed against him the leaders of the victimized peoples, the blacks, the hispanics, the feminists, the illegals, the homosexuals and transgendered. This long list, of course, includes the white liberals as well, as they are convinced that flyover America is the habitat of white racists, misogynists, homophobes, and gun nuts. As far as they are concerned, this 84% of geographical US should be quarantined or interred…..

Consider the forces that Trump has against him:

Black and hispanic leaders need victimization, because it is what elevates them to power and income. They will turn a jaundiced eye toward Trump’s inclusiveness. Inclusiveness is good for blacks and hispanics, but not for their leaders.

The executives and shareholders of global corporations are enriched by the offshored jobs that Trump says he will bring home. If the jobs come home, their profits, performance bonuses, and capital gains will go away. But the economic security of the American population will return.

The military/security complex has a 1,000 billion annual budget dependent on “the Russian threat” that Trump says he is going to replace with normalized relations. Trump’s assassination cannot be ruled out.

Many Europeans owe their prestige, power, and incomes to the NATO that Trump has called into question.

The financial sector’s profits almost entirely flow from putting Americans into debt bondage and from looting their private and public pensions. The financial sector with their agent, the Federal Reserve, can overwhelm Trump with financial crisis. The New York Federal Reserve Bank has a complete trading desk. It can send any market into turmoil. Or support any market, because there is no limit on its ability to create US dollars.

The entire political ediface in the US has insulated itself from the will, desires, and needs of the people. Now Trump says the politicians will be accountable to the people. This, of course, would mean a big drop in their security in office and in their income and wealth.

There are a large number of groups, funded by we-know-not-who. For example, RootsAction has responded today to Trump’s forceful commitment to stand for all of the people against the Ruling Establishment with a request to “ask Congress to direct the House Judiciary Committee to open an impeachment investigation” and to send money for Trump’s impeachment.

Another hate group, human rights first, attacks Trump’s defense of our borders as closing “a refuge of hope for those fleeing persecution.” Think about this for a minute. According to the liberal-progressive-left and the racial interest group organizations, the US is a racist society and President Trump is a racist. Yet, people subject to American racism are fleeing from persecution to America where they will be racially persecuted? It doesn’t make sense. The illegals come here for work. Ask the construction companies. Ask the chicken and animal slaughter houses. Ask the vacation area cleaning services…..”

http://www.paulcraigroberts.org/2017/01/20/trumps-declaration-war/ 

[&&]{**}[##]

http://www.occurrencesforeigndomestic.com/2017/01/21/power-transition/ 

[&&]{**}[##]

music: https://www.youtube.com/watch?v=ULDuVXldpgI&list=PLK0ytmOt8PAIyx9ax_vswD_JH4R-P5slS 

[&&]{**}[##]

President Trump & the Establishment (Part 1) 

Will Banyan, 13 Jan. 2017

http://www.conspiracyarchive.com/2017/01/13/president-trump-the-establishment-part-1/ 

Part 2 expected “very soon”

http://www.conspiracyarchive.com 

[&&]{**}[##]

Trump’s “Russia Connection”, Behind America’s Perpetual Wars

Why the Enemy Structures US Identity

By Prof. John McMurtry

Global Research, January 20, 2017

“… the US-Enemy group-mind is governed by an inner logic of reverse projections.  It projects onto the designated Enemy what the US is doing itself as the justification for warring against it…..“

http://www.globalresearch.ca/trumps-russia-connection-behind-americas-perpetual-wars/5569853 

[&&]{**}[##]

Mass protests are held across the country ahead of the ceremony, with protesters smashing windows, damaging cars and blocking some entry points to the inauguration in Washington, DC.

https://en.ria.ru/cartoons/201701201049814934-trump-inauguration-protests/ 

[&&]{**}[##]

https://www.oathkeepers.org/wp-content/uploads/2017/01/Screen-Shot-2017-01-20-at-10.28.41-AM-800x500_c.png 

At 0800 on 20 January 2017, Forward Observer’s Analysis & Control Element (ACE) began battle tracking civil disturbances in the Capitol area of Washington DC during the Inauguration of President Donald J. Trump. What follows is the Situation Report as of 1830hrs Eastern. You can view the battle tracking map here.

https://www.oathkeepers.org/battle-track-inauguration-sitrep-1830e/ 

[&&]{**}[##]

In 1971, the People Didn’t Just March on Washington — They Shut It Down 

[this same image is the featured image just below the masthead above]

This excerpt from Direct Action by L. A. Kauffman tells the story of the most influential large-scale political action of the ’60s, that actually happened in 1971. It was called the Mayday action, and it provides invaluable lessons for today.

Read Now  https://longreads.com/2017/01/20/in-1971-the-people-didnt-just-march-on-washington-they-shut-it-down/?mc_cid=481696a154&mc_eid=9528811089 

https://snuffysmithsblog.blogspot.com/2017/01/in-1971-people-didnt-just-march-on.html 

[&&]{**}[##]

“… I became fascinated with the so-called “first professional revolutionist,” especially the evidence of his indebtedness to the stratagems of the Bavarian Illuminati (directly or otherwise).

In the midst of Lehning’s thorough outline of the central role Buonarroti played in various secret societies during the period, a short passage caught my attention involving a clandestine nexus of French Carbonarists, Joseph Rey’s ‘L’Union,’ and a particularly revolutionary Masonic Lodge of the Grand Orient: the ‘Amis de la Vérité’ [Friends of Truth]:

In 1821 the secret leadership of the anti-Bourbon opposition went over to the “Charbonnerie française”. Bazard, the later Saint-Simonist, formed in 1818 the “Loge des amis de la vérité” with its military “Compagnie franche des écoles”.

Behind the “Loge” stood the secret “Union” of Rey, and it was Victor Cousin (of the “Union”) who, in fact, took the initiative. Involved in the military conspiracy of 19th August 1820, two of its members, Joubert and Dugied, having fled to Italy, brought back from Naples the statutes of the Neopolitan “carbonari”. They form 1st May 1821 the first “Haute Vente” of the “Charbonnerie française” of which soon the leading personalities of the parliamentarian opposition such as Lafayette, De Corcelle, Koechlin, Manuel – all deputies – and also Cabet and De Schonen, became members (127).

Illuminated Politics

The name of the lodge was no doubt chosen as an homage to the paramasonic revolutionary club ‘Cercle Social,’ or ‘Confédération Universelle Des Amis de la Vérité’ [Universal Confederation of the Friends of Truth]. Co-founded by masons Nicolas de Bonneville (1760-1828) and Claude Fauchet (1744-1793) in Paris, 1790, this “société fraternelle” had its own printing house that published a short-lived yet influential journal called La Bouche de Fer [The Mouth of Iron], where the tradition of revolutionary-as-journalist-agitator originated. James H. Billington characterized the Cercle Social as “nothing less than the prototype of a modern revolutionary movement” (44); while Karl Marx and Friedrich Engels, in 1844, had opined that “the revolutionary movement… began in 1789 in the Cercle Social [itself].”

The mystic-occult current during the French Revolution, the pervasiveness of mesmerism in particular, has been carefully documented by Robert Darnton. The Cercle Social, Darnton writes, was “an association of mystic revolutionaries who hoped to establish a Universal Confederation of Friends of the Truth with a masonic organization. The ideology of the Cercle Social derived from a strain of occultism expressed most fully by Restif de la Bretonne” (132), dubbed the “Rousseau of the gutter.”

Restif’s “baroque imagination,” elaborates Darnton:

produced a cosmology made up of animal planets that produced life by copulation; Pythagorean sprits that evolved with each incarnation through a hierarchy of stones, plants, animals, and creatures inhabiting countless worlds of countless solar systems; and a pantheistic god who endlessly created universes by a process of crystallization and then destroyed them by absorption in the sun, the brain of the universal “Great Animal.” Restif lubricated this animalistic, sexual cosmos with “intellectual fluid” that, like Mesmer’s fluid, acted as the intermediary between God and man’s internal sense. “God is the material and intellectual brain of the single great animal, of the All, whose intelligence is an actual fluid, like light, but much less dense, as it does not touch any of our external senses and acts only upon the inner sense” (ibid).

Wild stuff, for sure — typical of the illuminist strain of thought (Dom Pernety, Saint-Martin, Mesmer, Cagliostro, Lavater, Swedenborg et al.) during the Enlightenment. Restif was also the first to use the word communist in print in 1785 (Billington 79; Grandjonc 146), submitted an appeal for agrarian communalism to the Estates-General in 1789, and by 1793 “used the term communism as his own for the first time” (Billington 82). Hence, the origins of the modern conceptions of socialism and communism stem from a particular “irrational” undercurrent during the so-called “Age of Reason.”

In the introduction to the invaluable Dictionary of Gnosis & Western Esotericism, Wouter Hanegraaff observed that during the Enlightenment “the boundaries between reason and its ‘other’ were in fact blurred and shifting, with many important figures finding themselves with one foot in each camp” (x). Bonneville and his Cercle Social was the embodiment of this ostensible contradiction. They preached “communism … [and] demanded the redistribution of property” while at the same time promulgating the virtues of “communication with spirits, fraternal organizations, and grand oratory” (Darnton 134-5). Marx and his materialist acolytes acknowledged the Cercle Social as revolutionary progenitors but had obviously overlooked the fact that La Bouche de Fer subscribers “read about the animal planets, the transmigration of souls, the primitive religion and language, and, also, universal harmony” (133)…..“

http://www.conspiracyarchive.com/2015/11/05/militant-masonry-amis-de-la-verite-buonarroti-masters-and-french-carbonari/ 

By Terry Melanson (February 18, 2013). Webmaster/editor of Conspiracy Archive

author of Perfectibilists: the 18th Century Bavarian Order of the Illuminati.

[&&]{**}[##]

 

combat

combat

I am reading a book that I should have read in high school. It falls into line behind another book I should have read in high school, and a third one in which I am making slow progress. (I’m listening.) 

http://i.imgur.com/hhd158k.jpg

I went to a very good high school and had one very very good teacher for AP English who was an Army veteran and who introduced me to writing, literature, and World War One war poems in a way that no one else did.

My AP History teacher was a veteran of World War One (his arm was permanently damaged in battle and he wore an early prosthetic forearm in a sling, inert and dysfunctional, perhaps for me the next level in empathy after Farragut’s Theorem).

Either one of these live human beings who taught me on a daily basis might have stood in for the fictional high school instructor of History and Moral Philosophy described in Starship Troopers.

The author described high school classes I wish were available to me, but weren’t. The course in survival preparation described in Tunnel in the Sky is unlike anything offered even today by small companies of preppers and former soldiers; the final exam was its climax.

 

Heinlein’s Starship Troopers is topically resurgent online today and has also spin off movies, role-playing games, and more.  But here today I’m focused on the book and the philosophies.

And the reason that I’m reading this book and looking at the phenomenon of its resurgence is simple: we’re going to war.

And we have not yet begun to even glimpse the final exam for that course.

We’ve been at war for a long time. We are a warring nation.  We like war.  Many of our elite get rich through war.  They foster and incite violence, conflict and hatred regularly. There is a long tradition among the extremely wealthy of funding both sides of a war at the same time. They probably get some form of perverse enjoyment out of the sacrifices of humans to their fantasies of power. Henry Kissinger has a quote or two about these things. Mike Rivero has published an article on war and bankers. Today’s alternative news will bring you forecasts of impending war with Russia (and perhaps China, or both).  Many people are aware of and concerned about the Soros-driven waves of Islamist refugees into Europe. The EU and NATO are described as the modern-day version of the Third Reich.

Others are concerned about waves of immigrants from various countries and cultures arriving via the US southern border. Imigration out of Asia into the Pacific Northwest has been forecast. War, weather and color revolutions have put a lot of peole on the march.

Civil war is forecast; the CONUS military exercises like Jade Helm have been widely discussed. Political change and degradation of rights enumerated under the Constitutiuon, itself widely degraded and no longer deemed worthy of protection by many, will be visible on the streets of the nation’s Capitol as a new President is inaurgurated (or perhaps assassinated, if you read some people).

So an old piece of science fiction that isn’t much younger than I am and that describes political and other virtues of military discipline and training comes into sharp focus for an individual concerned about the well-being of his family.

http://3.bp.blogspot.com/-f22sqdXrJPU/UguAWfxVA6I/AAAAAAAAY9s/7c72hZn5GnQ/s320/518d5846103f5_299379n.jpg

source of image: http://futurewarstories.blogspot.com/2013/08/fws-topics-powered-armor.html

“… Science fiction is a useful tool of cultural criticism in that it posits future worlds so as to reflect contemporary social concerns.”

Masters’ thesis in literature

http://scholarworks.uno.edu/cgi/viewcontent.cgi?article=2322&context=td 

https://www.youtube.com/watch?v=jYFcV004RfU

http://theessential.com.au/media/articles/123/starship-troopers-3.jpg prepared for insertion

“War is not violence and killing, pure and simple; war is controlled violence, for a purpose. The purpose of war is to support your government’s decisions by force. The purpose is never to kill the enemy just to be killing him . . . but to make him do what you want him to do. Not killing . . . but controlled and purposeful violence. But it’s not your business or mine to decide the purpose of the control. It’s never a soldier’s business to decide when or where or how–or why–he fights; that belongs to the statesmen and the generals. The statesmen decide why and how much; the generals take it from there and tell us where and when and how. We supply the violence; other people–“older and wiser heads,” as they say–supply the control.”

Robert Heinlein, Starship Troopers

http://3.bp.blogspot.com/–FPhwtNMff8/Uelh6wQsIGI/AAAAAAAAYRY/xnH5NDwux0U/s400/amplifierFrame.gif

source of image: http://futurewarstories.blogspot.com/2013/08/fws-topics-powered-armor.html

“LANCE CPL. STEVEN West steps into a remote enemy hideout clad in a 350-pound exoskeleton, sensors piercing the darkness and displaying digital info on his helmet visor, until a shock of static feedback knocks him to the dirty floor. A band of locals surround him with pipes and rebar. “The feedback stopped, leaving his ears ringing, and grainy video feed warped back into view as he was struck again. And again.”

This scene isn’t pulled from the latest Clancy-esque techno-thriller, but a short story written as part of a new Marine Corps exercise using science fiction to think about possible threats 15 to 30 years in the future.

“Water’s a Fightin’ Word” recounts what happens when a squad of Marines on a humanitarian mission in Africa gets surrounded during a global freshwater shortage. The author slips in glimpses of military technology in its infancy today, such as the exoskeleton, electromagnetic pulse weapons, and combat-ready robots, and combines it with likely geopolitical scenarios, such as conflict over water and other environmental resources.

Officers at the Marine Corps Warfighting Laboratory/Futures Directorate in Quantico, Va., came up with the idea last year to host a sci-fi contest to spur creativity, as well as get uniformed Marines to conceive of threats in a different way. A total of 84 entries were narrowed down to 18 finalists, who were paired with professional sci-fi writers—including “World War Z’s” Max Brooks—during a workshop co-hosted by the Atlantic Council. After months of editing, the top three stories were collected in “Science Fiction Futures: Marine Corps Security Environment Forecast 2030-2045″ and published online [ http://www.mcwl.marines.mil/Portals/34/Documents/FuturesAssessment/Marine%20Corps%20Science%20Fiction%20Futures%202016_12_9.pdf?ver=2016-12-09-105855-733 ].

The stories share common themes of political chaos, a rising China, a less-powerful and more inward-looking United States, conflicts over environmental resources, and the growth of megacities in the developing world. For Marines, who are the first US boots on the ground in the toughest situations, the toughest challenges may stem from the latter.

“It will not be like Fallujah or Hue City,” said Marine Lt. Col. Patrick Kirchner, citing intense block-by-block conflicts in Iraq 2004 and Vietnam 1968. “But more like Manhattan, and not on a weekend.” Kirchner’s comments came at a panel on the sci-fi Marine warfighting project at the Atlantic Council in Washington. “You can’t pick out the enemy and you can’t just shoot him. You’ve got to figure out how to clear a skyscraper. You can’t just hang green t-shirts or chem-lites in the window and say it’s clear. We have to find out how to figure out this kind of situations.”

More:

https://www.wired.com/2017/01/better-way-marines-prepare-future-wars-sci-fi/ 

 

Music:  https://www.youtube.com/watch?v=onGWF8mz1Zw 

 

“Robert Heinlein’s ‘Starship Troopers’ is the only novel on the required reading list at the Army War College and Annapolis for the study of small force tactics.” 

“Small Unit Tactics” by Will Serwetman is available as a free download on the Internet.

On YouTube, you can find hours of assessment by major national think tanks on Russian military capabilities, hybrid warfare, urban warfare and the growth of mega-cities, and I probably only scratched that surface

YouTube is also resplendent with videos on squad tactics, urban warfare techniques, land navigation, and more.  Books and classes are available on community squad formation, how to conduct local “intel”, etc.  In today’s world, whether in the military or on the home front, we must consider the role and presence of women.

Preparing for war has become part of our culture. 

Somebody wants to bring combat upon you.

Are you ready for it?

Heinlein’s Starship Troopers is a story about boot camp and military duty.

“COMBAT – that means life and death with people actively seeking to destroy you.”  Learning how to survive combat  is a serious business involving “the teaching of serious skills in a dynamic, live-fire environment. It takes tough men [and women[ to have first acquired the skills in order to teach them and it takes tough men [and women] to maintain order, discipline and safety in an environment to teach those skills.”

Starship Troopers: Thoughts #1

Note that I am not an expert in, nor have I ever experienced combat. 

 

http://breakingdefense.sites.breakingmedia.com/wp-content/uploads/sites/3/2016/10/Screen-Shot-2016-10-20-at-1.47.36-PM-1024×640.png

source of image:  http://breakingdefense.com/tag/marine-future/ 

“… Advanced sensors, air/land/sea vehicles that can stay on alert for extended periods of time, and immediate battle damage assessment have changed the rules of warfare — as well as what is considered acceptable collateral damage.

All these factors make it easier to control violence. But it’s up to the politicians to tell the military what purpose the violence serves, and that hasn’t gotten any easier. Sun Tzu himself warned about it, saying, “He will win who has military capacity and is not interfered with by the sovereign.” However, Sun Tzu never had to deal with satellite communications, a 24-hour news cycle, or a pesky thing called democracy.”

http://www.popularmechanics.com/military/weapons/a13103/starship-troopers-is-the-new-the-art-of-war/ 

[Ed.: But we don’t have a democracy, and never did; we have what’s left of a constitutional republic….]

 

Heinlein’s tidy piece of science fiction offers lessons in civilian leadership.

 

8 Military-to-Civilian Career Transition Tips from Starship Troopers

Oct 21, 2015

Robert Heinlein’s science fiction classic Starship Troopers, published in December 1959, is a permanent fixture on military reading lists among the Army, Navy, Marine Corps, and Air Force. Starship Troopers describes how Johnnie Rico starts as a private in the Mobile Infantry, an Earth-based military force that serves as a galactic and heavily armed raiding force. The Mobile Infantry was similar to a WWII Marine Raider force or the Army Rangers of WWII – high on firepower, shock tactics, and infantry force.  The essence of Starship Troopers was a fight for survival of the human race across the galaxy.  Humans were threatened by a race of intelligent, highly skilled, and ferocious spider-like creatures (“Bugs”).  Standing in their way, the front line of Earth’s defense forces, was the Mobile Infantry.  The Mobile Infantry could be considered as interstellar Marines, transported from plant to planet in huge starships and then “parachuted” from planetary orbit.  On the ground, the Mobile Infantry fought in incredible, 2,000 lb, powered, armored suits.

Starship Troopers showed us that, despite the technology, being in the Infantry was still the Infantry with constant hard work, impossible odds, and zero thanks.  The Mobile Infantry fought and trained as Infantry has always done: outnumbered, in the cold and dark, and against incredible odds to save the human race and each other.  Starship Troopers made its way into the modern military lexicon more than a decade ago, most notably during the U.S. involvement in Somalia, where local Somali militia were referenced as “Skinnies” in comparison to one of the antagonist militaries that the Earth forces fought against in the opening chapters of the book.

Robert Heinlein’s Starship Troopers is a great refresher on some of the truly vital and critical skill sets that veterans bring to organizations in their post-military careers. If you are on the first day or your 10th year of your military transition, be sure to look down this list to contribute all you can.  There are 8 key insights that matter to how effective military veterans can be in business and their second careers.

1  The Entire Team Works On The Primary Mission.

The motto of the Mobile Infantry is, “Everybody drops and everybody fights.” On numerous drops, all of Rico’s unit went into combat.  Regular soldiers, but also cooks, administrative personnel, and even Chaplain’s – everyone fought.  From an organizational standpoint, this was the sheer genius from the Mobile Infantry. Literally, 100% of the organization was dedicated to its primary purpose of combat. The concept of “everybody fights” was a simple and valuable reminder that the majority of your organization should be dedicated to its mission.

Relevance to Military-To-Civilian Career Transition.  When you come into a new company or organization, how much of your job should be dedicated to doing what your company does for its customers? If your primary job reinforce safety standards on oil rigs, then how much of your time do you actually spend enforcing and training on oil rig safety standards? In the military and in the corporate world, it can be very, very easy to be distracted by activities that take time and effort, but do not contribute to the primary purpose of your organization towards its customers.

1  Performance in The Present, Not In The Past, Is All Important

Every person in the mobile infantry, and society at large, was judged by what they did, how they performed, and how well they followed orders. This focus on performance as the sole benchmark of personal value weas refreshing. In Heinlein’s sci-fi future, you could be rich or poor, from a great family or a questionable one, or have a PhD or a high school degree, and the only thing that mattered in the mobile infantry was well you performed.  In business, you can have a great corporate culture but if the product was bad, the customer service ineffective, or the company was not innovative, then you failed.  For both business and the military, performance was everything.

Relevance to Military-To-Civilian Career Transition.  Performance was a central driving criteria for veterans because no matter that you were a crewmember on a destroyer or an Apache Helicopter pilot, what mattered was how well you performed your current job. Don’t worry about how your background compares to others in your organization. Worry about how well you perform and always seek to improve.

1  Difference And Diversity Is A Non-Issue In The Modern Workplace

Starship Troopers gets some diversity and gender issues right and others completely wrong.  Gender, physical disability, and race played significant roles throughout the book. Women were allowed to perform all combat roles, even direct ground combat. However, there were barely any women in the Mobile Infantry because they were better suited for more vital military roles, like being starship pilots, serving in military intelligence, or weapons development. Women, it turns out, were even more valuable than men in effective combat performance and outcomes. The most important, strategic positions were reserved for women.

What Heinlein missed was the concept that a woman would want a direct combat position?  If Heinlein had ever met Ronda Rousey, then the whole Mobile Infantry might have been women.  The vast majority of Rico’s teachers were disabled combat veterans.  His Strategy instructor was the best military strategist who only happened to be blind. If anything, according to Rico, it made him a better strategist. Based on the concept of superior job performance that permeates the book, disability was an illogical reason to exclude anyone, because everyone’s value was based on how they performed.

Relevance to Military-To-Civilian Career Transition.  For military veterans, we are used to dealing with gender, diversity, and other issues on a daily basis.  Military members, like the Mobile Infantry, are used to dealing with different races and religions.  Veterans will need to work with other non-veteran civilians to have their military service fully understood and how it contributes to their current workplace.  Veterans will need to strive at times to be open and understanding with others as they explain and demonstrate the value of their service for their employer’s success.  The lesson from Starship Troopers was that when an organization unites under a compelling mission, truly focuses on performance, then difference does not apply.

5 More Lessons at Military One Click.  Content Provided Courtesy of Military One Click: http://militaryoneclick.com/8-military-to-civilian-career-lessons/ 

http://www.military.com/veteran-jobs/career-advice/military-transition/famous-veteran-robert-a-heinlein.html 

“… A scientifically verifiable theory of morals must be rooted in the individual’s instinct to survive–and nowhere else!–and must correctly describe the hierarchy of survival, note the motivations at each level, and resolve all conflicts. We have such a theory now; we can solve any moral problem, on any level. Self-interest, love of family, duty to country, responsibility toward the human race . . . . The basis of all morality is duty, a concept with the same relation to group that self-interest has to individual.”

Robert Heinlein, Starship Troopers

 

 

 

 

If it is true, as Heinlein says, that “The noblest fate that a man can endure is to place his own mortal body between his loved home and the war’s desolation”, then a lot of us have a lot of thinking and work to do, even those of us who are physically impaired, elderly, or otherwise not inclined to sign up for some physically-punishing romp up and down some hills in the Appalachians, the Rockies, or even the flatlands.

With or without training, with or without armaments, in forthcoming wars, civil or otherwise, you will have to be mindful, self-aware, alert, prepared, and trained in the use and maintenance of your arms, your legs, your heart, your lungs, and your brain.

“It is a basic function of self defense and your job as an adult member of your family/ community. It is not a responsibility to be handed off the the police, or the State. When you do, it is all too easy to take that responsibility and capability away from you entirely, by disarming you and making you incapable of self defense. Whether by physically disarming you, or brainwashing your mind, you are gelded.”

https://www.maxvelocitytactical.com/2015/04/starship-troopers-thoughts-1/ 

Isn’t that in parallel with one of my most favored quotes from Tim Gallwey in Summon The Magic ?

One’s true capacity for moving,

or being moved, can be achieved

only when one’s commitment to others

is in fact connected to and derived from

his primary commitment to himself. 

When we find this kind of alignment of purpose,

there is a harmony of motivation

that can provide the fuel and clarity

to overcome great obstacles

in the pursuit of great challenge.

from The Inner Game of Work, by W. Timothy Gallwey

 

If your nation unleashes an environment — whether or not you are its target or merely it witness — of engineered super-soldiers, the use of drones, EMP and other directed-energy weapons, artificial intelligence and cyberwar, robotic military vehicles, drones and neuroweapons, are you ready?

Are you left of bang ?

http://i.enkivillage.com/v58pv9wJzC9uKU5EzfoYjzAef04=/800×0//images/2016/08/3f229385e389c52ece0423d8cb7566ea.jpg

“… To permit irresponsible authority is to sow disaster; to hold a man responsible for anything he does not control is to behave with blind idiocy….”

Resources:

https://www.goodreads.com/work/quotes/2534973-starship-troopers 

https://en.wikiquote.org/wiki/Starship_Troopers 

https://www.part-time-commander.com/17-quotes-and-leadership-lessons-from-the-book-starship-troopers/ 

https://www.abebooks.com/products/isbn/9780425071588 

https://en.wikipedia.org/wiki/Starship_Troopers 

http://en.metapedia.org/wiki/Robert_Heinlein 

http://www.heinleinsociety.org 

http://www.thesullenbell.com/2016/05/26/reverse-engineering-humanity/ 

http://i.enkivillage.com/7IC2bS4x_rz7EH9CfwjP18SlVCw=/800×0//images/2016/08/51a5ecb8b057df1f2d7d77e24498483b.jpg

 

Webb’s Braverman videos

Webb’s Braverman videos

There is a growing awareness in the world about the video series that has been put together by one fellow named George Webb.

As was said at Occurrences  previously,

Essential viewing: this and/or any segment in an ongoing series of analyses by George Webb in which he identifies the formulaic connections between Syria, Haiti, the Clinton Foundation, Petraeus, oil deals, pipelines, rat lines, weapons sales, regime toppling, and human trafficking.

Or you can read about it in The Captain’s Journal.

 

music:

Mark Lettieri Group: Tears For Fears’ “Everybody Wants to Rule the World” – Uptown Jazz Dallas

https://www.youtube.com/watch?v=qislIOSqRx4

 

I have caught a few of the most recent ones and watched enough to know that there is something here to which Americans must pay attention, particularly those still concerned about liberty, the Republic, governmental transparency, the free press, and the Bill of Rights. 

The work stands on its own merits simply in terms of depth, perserverance, etc.,, but also in the fact that he has created and placed on line a complete set of slides that he uses in the tapes, as well as more information on his sources (slide #73, expanded below for readability).

George Webb posted 3 weeks ago

I am going to throw some dead man switch info out there just in case. I’m George Webb Sweigert from Portland, Oregon. If the videos stop, check the news and carry on the torch.

https://www.blogger.com/profile/14616689288744868067

 

Here is George’s full YouTube channel.

https://www.youtube.com/user/georgwebb 

 

I have not yet watched all of these; I’ve been busy compiling, for my own benefit and use by others, a complete list of available videos.  Some of them are longer than others; on some days, he makes as many as three to five videos. They are numbered for both day (the first number) and order (the second number). So, for example, the fifth video on day #12 wouild show up as [5/12].

It’s been said, perhaps erroneously, that some of the videos were disappearing, which is why I made this compilation. I do not know the date or the number of the very first video.  There is progression over time as more and more information came to light. The collection of information and its analysis continue.

 

https://docs.google.com/presentation/d/1X2ZNdpHMx23Nm-pGZULrBbU6SxpfiNMId6KXqe3deIE/edit#slide=id.g1906d72a88_0_0  [slides]

 

slide #73 exploded for readability

James Risen, NYT, Seymour Hersh, Pulitzer Prize Winner,

FOX news – Brett Baier, Gregg Jarrett, Catherine Herridge, Pamela Browne,

Wikileaks, Judicial Watch

http://www.foxnews.com/politics/2016/10/05/doj-abruptly-drops-case-against-gun-runner-who-threatened-to-reveal-clintons-libya-dealings.htm l

Did Braverman Figure Out Clinton Foundation Was An Arms Merchant and Oil Broker?

Were the 1,000 Hidden Donation Funneled Through Giustra Enterprise Partnership to avoid the eyes of Eric Braverman?

https://www.washingtonpost.com/politics/1100-donors-to-a-canadian-charity-tied-to-clinton-foundation-remain-secret/2015/04/28/c3c0f374-edbc-11e4-8666-a1d756d0218e_story.html?utm_term=.69c48ae5db68

https://www.bloomberg.com/politics/articles/2015-04-29/clinton-foundation-failed-to-disclose-1-100-foreign-donations

Tulsi Gabbard – US Directly and Indirectly Funding ISIS

Congresswoman Tulsi Gabbard Says The U.S. Government Is Directly Funding… https://youtu.be/_qdf2WH4g9k  via @YouTube

Obama to Directly Supply ISIS?

http://uawire.org/news/president-barack-obama-lifted-restrictions-on-the-supply-of-weapons-to-us-allies-in-syria

Did Hillary Go After Libya’s $30B?

Drumheller Blumenthal Documents 2012

https://www.documentcloud.org/documents/1697077-3.html#document/p1

Drumheller Blumenthal Germany, South Korea,  Algeria, Magreb, Libya Documents – 2013

https://cryptome.org/2015/03/guccifer-drumheller-blumenthal-memos.pdf

http://www.nytimes.com/2011/07/16/world/africa/16libya.html

Judicial Watch Asks For Videos of CF FBI Testimony

http://www.politico.com/blogs/under-the-radar/2016/12/clinton-email-depositions-release-judicial-watch-23221 3

Libya’s Current Civil War

https://en.wikipedia.org/wiki/Libyan_Civil_War_(2014%E2%80%93present)

Are CF Donations Stinger Sales?

Sid Was Emailed The Coup Plans For South Sudan

http://observer.com/2016/01/hillarys-emailgate-goes-nuclear/

2016 UN Report on Recovered Weapons Libya – Dolarian Bouncing Beatties APMs

http://www.derechos.org/peace/libya/doc/unlby23.html

Hillary Gave Joe Wilson’s Company Symbion Lucrative Contract

http://dailycaller.com/2015/07/03/after-an-email-to-hillary-company-directed-by-ambassador-joe-wilson-was-awarded-africa-contract/2/

Sid Blumenthal Had a Financial Stake in Mercenary Group

http://www.nationalreview.com/article/425295/gowdy-sidney-blumenthal-sent-classified-info-lobbied-clinton-profit-libya

Clinton Sent Dozens of Classified Reports to Mercenaries

https://www.propublica.org/article/private-emails-reveal-ex-clinton-aides-secret-spy-network

Hillary Clinton Had SAP and SCI Top Secret Info Reclassified

http://observer.com/2016/09/emailgate-and-the-mystery-of-the-missing-gamma/

National Review Article on Clinton Foundation Donors

http://www.nationalreview.com/article/419791/clinton-foundation-reeks-crooks-thieves-and-hoods-deroy-murdock

Did Hillary Delay Boko Haram Terror Designation?

http://www.judicialwatch.org/blog/2015/05/did-clinton-foundation-donor-get-hillary-to-delay-boko-haram-terror-designation/

Hillary Forces Out Kenya Ambassador To Open Somalia Off Shore Oil Leases

http://oilprice.com/Energy/Energy-General/Tensions-Spike-As-Kenya-And-Somalia-Battle-For-Oil-Rich-Offshore-Blocks.html

Some Nigerian Army Officers Selling Arms to Boko Haram

http://www.usnews.com/news/world/articles/2016-09-04/nigerian-military-some-officers-selling-arms-to-boko-haram

Same Qatar Individuals That Gave To Clinton Foundation Gave To ISIS

http://www.independent.co.uk/news/people/julian-assange-clinton-foundation-isis-same-money-saudi-arabia-qatar-funding-a7397211.html

UN Security Council Libya Panel On Recovery of Libya Weapons

http://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/s_2016_209.pdf

Charles Ortel – UNITAID (21 minute mark)

http://dailycaller.com/2016/11/05/clinton-foundation-is-the-largest-unprosecuted-charity-fraud-ever-video/

How the Hillary Email Case, Huma Email Case, the Clinton Foundation investigations, the Mark Turi Stingers from Libya to Benghazi Case, and the David Petraeus Sex Scandal Case are all pieces of the Same Puzzle.

New York Times – Timber Sycamore

http://www.nytimes.com/2016/01/24/world/middleeast/us-relies-heavily-on-saudi-money-to-support-syrian-rebels.html?_r=0

NYT – Libya Arms Supplied Syrian Rebels

http://www.nytimes.com/2016/06/27/world/middleeast/cia-arms-for-syrian-rebels-supplied-black-market-officials-say.html

1,000 Clinton-Petraeus emails missing from records sent to State, FBI files show

http://www.foxnews.com/politics/2016/10/22/1000-clinton-petraeus-emails-missing-from-records-sent-to-state-fbi-files-show.html

An Attempted Hillary Email Coverup?

http://www.weeklystandard.com/an-attempted-hillary-email-coverup/article/2004907

TRUMP TO PRESSURE FOREIGN LEADERS TO PROBE CLINTON FOUNDATION

http://www.infowars.com/trump-to-pressure-foreign-leaders-to-probe-clinton-foundation/

Judicial Watch Asks Federal Court to Find Government Misconduct in Clinton Email Scandal, Force Release of Documents

http://www.judicialwatch.org/press-room/press-releases/judicial-watch-asks-federal-court-find-government-misconduct-clinton-email-scandal-force-release-documents/

NATO has 10,000 Stingers Missing

In addition, George has appeared on a number of radio shows; where they have been found, those links appear as well.

https://www.youtube.com/watch?v=Yc8jMrce7mE

George Webb on the Max Igan Show

https://www.youtube.com/watch?v=-dcBwXC6xrU

George Webb on the Jeff Rense Show

 

Here is the list of individual videos (oldest show number last, but first show part first); in some cases, the numbering is erratic.  Hopefully I have not erred by mixing things up.

I’m not sure when Webb started the series, despite the numbered-day titling (a la the birth of ABC’s Nightline/Ted Koppel show); if you have found one of the missing shows, please send its link to me via http://www.thesullenbell.com/contact/.

 

Note that each YouTube video carries comments from viewers as well as further notes.

 

If you have comments about the nature and quality of Webb’s work and analysis,

feel free to comment on the newest YouTube videos or by using  http://www.thesullenbell.com/contact/

 

Format: htt#YouTube link [series #/part #]

https://www.youtube.com/watch?v=A_E4tW1fq-k [83/1]

https://www.youtube.com/watch?v=_-JeR-J8bTE [82/1]

https://www.youtube.com/watch?v=Q0tAhMlBCEc [82/2]

https://www.youtube.com/watch?v=MJNpf5GIvZg&feature=em-uploademail [82/3]

https://www.youtube.com/watch?v=1955PlW3Nbs [81/1]

https://www.youtube.com/watch?v=YVOM0mdWnc8 [81/2]

https://www.youtube.com/watch?v=_RiPfG1miG8 [81/3]

https://www.youtube.com/watch?v=g-km5K9uOQw [81/4]

https://www.youtube.com/watch?v=qfinFUWIH6s [80/1]

https://www.youtube.com/watch?v=_RuZKVxt6fg [80/2]

https://www.youtube.com/watch?v=JyOXw2dtb-o [80/3]

https://www.youtube.com/watch?v=iCcSrCng8Rg [80/4]

https://www.youtube.com/watch?v=ADVVhtwumIE [79/1]

https://www.youtube.com/watch?v=JscBxQCcRwU [79/2]

https://www.youtube.com/watch?v=u-zlUhrGyvo [78/1]

http://www.thedenverchannel.com/news/local-news/survivor-of-child-sex-traffickers-wants-to-help-others-still-being-exploited

https://www.youtube.com/watch?v=mMJutrdWxsE [78/2]

https://www.youtube.com/watch?v=TMdaCwEpCYk [77/1]

https://www.youtube.com/watch?v=IYAN-9Lg6iw

George Webb on the Richie Allen Show

https://www.youtube.com/watch?v=M5DvITArYl0 [77/2]

https://www.youtube.com/watch?v=Qp144GSAANI [77/3]

https://www.youtube.com/watch?v=oaU72gYydjk [76/1]

https://www.youtube.com/watch?v=KzvGNmpM1to [76/2]

https://www.youtube.com/watch?v=oaU72gYydjk [76/3]

https://www.youtube.com/watch?v=REgyxQrzwk4 [76/4]

https://www.youtube.com/watch?v=fu8zYltSvKE&t=32s [76/5]

https://www.youtube.com/watch?v=fu8zYltSvKE [76/5]*

https://www.youtube.com/watch?v=StN7y3SPsAU [76/6]

* It is not known yet if this is a duplicate or was re-taped to replace one taken down.

https://www.youtube.com/watch?v=yisqDe7lmoA  [75/1]

https://www.youtube.com/watch?v=R3vL1csT3yI [75/2]

https://www.youtube.com/watch?v=73OqOGZCriU [74/1]

https://www.youtube.com/watch?v=ZDJB26FJOlk [74/2]

https://www.youtube.com/watch?v=7T7o5BhARTY [73/1]

https://www.youtube.com/watch?v=kk0tcW6DWUA [73/2]

https://www.youtube.com/watch?v=w9zyaHDfrB0 [72]

https://www.youtube.com/watch?v=MpwXb__QNps [71]

https://www.youtube.com/watch?v=vam6qxfQrgA [70/1]

https://www.youtube.com/watch?v=qlLN2wUaXwA [70/2]

https://www.youtube.com/watch?v=NjnAcacvsOA [70/3]

https://www.youtube.com/watch?v=h6gvBEutuRM [69]

https://www.youtube.com/watch?v=yUvoOVYjNuE [68/1]

https://www.youtube.com/watch?v=UTNPN0snwEU [68/2]

https://www.youtube.com/watch?v=x3mwF1W_jnI [67/1]

https://www.youtube.com/watch?v=mSjcaCbOpZQ [67/2]

https://www.youtube.com/watch?v=OWItaf3JlAM [67/3]

https://www.youtube.com/watch?v=aNZVLs5rL5E [66]

https://www.youtube.com/watch?v=44zXm1EdVmw [66/Erdogan]

https://www.youtube.com/watch?v=L-huk9-kIU0 [66/2 Arms & Oil]

https://www.youtube.com/watch?v=BveyoMUeprs [66/3]

https://www.youtube.com/watch?v=9UVkkLCrj3w [65/1]

https://www.youtube.com/watch?v=jjhfXhTVjJ4 [65/2]

https://www.youtube.com/watch?v=JvW4k3hDfLQ [65/3, researcher version]

https://www.youtube.com/watch?v=JiXyk7G6GRE [65/4]

https://www.youtube.com/watch?v=G_4nQdCMic0 [64]

https://www.youtube.com/watch?v=-q3i_fH4RXk [63/1]

https://www.youtube.com/watch?v=6bV_vAn9hys [63/2]

https://www.youtube.com/watch?v=GgzFdmldoFs [63/3]

https://www.youtube.com/watch?v=Wfxdl-Rw4p0 [62]

https://www.youtube.com/watch?v=BlUBZ89Zvj0 [62, again?]

https://www.youtube.com/watch?v=OWl_6SOX4i4 [61]

https://www.youtube.com/watch?v=ECJhrDoA6Ms [61, too]

https://www.youtube.com/watch?v=BO4zw_dJScM [60]

https://www.youtube.com/watch?v=LrhV1POBGus [59]

https://www.youtube.com/watch?v=3-BYdDRbug0 [59, late edition]

https://www.youtube.com/watch?v=xja4KYUa22A [58]

https://www.youtube.com/watch?v=YuLs9VIf55U [57/1]

https://www.youtube.com/watch?v=ivw8v4a1gAs [57/2]

https://www.youtube.com/watch?v=8NQqHuQgSYw [56]

https://www.youtube.com/watch?v=x9VyrKB88DM [55]

https://www.youtube.com/watch?v=lc45mbeAMNI [54]

https://www.youtube.com/watch?v=rCTzFNrsKns [53]

At this point in the progression, the shows could not be found on the Webb Channel; #’s 46-52 showed up as mirrors on another channel.

https://www.youtube.com/watch?v=Eyie4wZ2ZQw [52]

https://www.youtube.com/watch?v=p82gGwmfFVk [51]

https://www.youtube.com/watch?v=h3Q5ZxQ5KYM [50]

https://www.youtube.com/watch?v=bUQRBH-cgNs [49]

https://www.youtube.com/watch?v=yrKWpnw4Voc [48]

https://www.youtube.com/watch?v=cy0yj3pKC-Q [47]

https://www.youtube.com/watch?v=wsmxkQYN0KY [46]

From here on, shows became exceedingly difficult to find in series; these were mirrored on a third channel.

https://www.youtube.com/watch?v=mfFcHiDC0m8&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [John Shedlock]

https://www.youtube.com/watch?v=lOorF8cjiK8&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=18 [45, mirrored from RU12]

https://www.youtube.com/watch?v=B5PZD1VCgQw&index=17&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [43, mirrored from RU12]

https://www.youtube.com/watch?v=kFqnKLJhe8g&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=16 [42, mirrored from RU12]

https://www.youtube.com/watch?v=jV7UJ2ZbJSs&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=15 [[40, mirrored from RU12]

https://www.youtube.com/watch?v=yYBkOFVY6vM&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=12 [35, mirrored from RU12]

https://www.youtube.com/watch?v=-MDiu32qQMQ&index=11&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [34]

https://www.youtube.com/watch?v=_nqXNj9RpTA&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=10 [33]

https://www.youtube.com/watch?v=F86XRMFGaUk&index=9&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [32]

https://www.youtube.com/watch?v=hkN0bHdvEX0&index=8&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [31]

https://www.youtube.com/watch?v=1KOY6muWUWA&index=7&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [30]

https://www.youtube.com/watch?v=NqqwS0N9Ppc&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=6 [29]

https://www.youtube.com/watch?v=mmAH4sSGHKE&index=5&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [27]

https://www.youtube.com/watch?v=b3dXhJmgN1I&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=4 [26]

https://www.youtube.com/watch?v=Ifuprc_WeQY&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI&index=3 [25]

https://www.youtube.com/watch?v=7fYCQV2I_ew&index=2&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [24]

https://www.youtube.com/watch?v=mfFcHiDC0m8&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [23]

https://www.youtube.com/watch?v=wh9l3VTAukQ&index=14&list=PLW3bSsM6ASVx4XIrbR4e8Cq_h10CGpEOI [20, mirrored from RU12]

organized political upheaval

organized political upheaval

GEORGE SOROS CONJURES HITLER IN ATTACK ON ‘ASCENDANT POPULISTS’, WARNS “DEMOCRACY IS NOW IN CRISIS”

“Well before Donald Trump was elected President of the United States, I sent a holiday greeting to my friends that read: “These times are not business as usual. Wishing you the best in a troubled world.” Now I feel the need to share this message with the rest of the world. But before I do, I must tell you who I am and what I stand for. I am an 86-year-old Hungarian Jew who became a US citizen after the end of World War II. I learned at an early age how important it is what kind of political regime prevails. The formative experience of my life was the occupation of Hungary by Hitler’s Germany in 1944. I probably would have perished had my father not understood the gravity of the situation. He arranged false identities for his family and for many other Jews; with his help, most survived…..”

Read the whole nokedii, in George’s own words, here:

http://www.blacklistednews.com/ 

[&&]{**}[##]

https://www.youtube.com/watch?v=z3jSugm-4VE 

[&&]{**}[##]

This is a friendly observation from out here in the deep bleachers, aimed at the global socio-political-informational playing field: 

 

Can we back off on the usage of the concept and phrase ‘coup d’etat’ unless it is fully warranted and fully explained? A search for the term at Google News gained a massive response; five of the ten on the first page were about the possibility inside the United States given the election of Trump, and the top ten did not include Stephen Lendman’s column from earlier today. Nor did it include, at that time, at least, James Petras’ warning about a forthcoming coup against Trump and his military/Wall Street/Defense. Petras notes a crescendo of media hysteria.  

  

https://manchikforcongress.files.wordpress.com/2016/01/tjeffsmlr.jpg 

Source of graphic: 

https://manchikforcongress.wordpress.com/2016/01/29/the-corporate-coup-d-etat-of-america-and-the-end-of-democracy-in-america/ 

[Note that he’s a Jill Stein supporter.]

 

There has been a great deal of attention given to Trump’s generals recently (even by me).  That attention is most amusing when rendered by people who have stood silently by as a couple of bushes and an obomber have wreaked global havoc with their military toys.

That august and revered (not) but too-easily-used  (even by me) Wikipedia cites the august and revered (not) Samuel Huntington: 

 

“Writing in 1968, political scientist Samuel P. Huntington identified three types of coup d’état, which correspond to the role the military plays in three different types of praetorian society”. As society changes, so does the role of the military. In the world of oligarchy, the soldier is a radical; in the middle class he is a participant and arbiter; as the “mass society looms on the horizon he becomes the conservative guardian of the existing order”.

“During the Carter administration, Huntington was the White House Coordinator of Security Planning for the National Security Council. He is best known for his 1993 theory, the “Clash of Civilizations“, of a post-Cold War new world order. He argued that future wars would be fought not between countries, but between cultures, and that Islamic extremism would become the biggest threat to Western world domination. Huntington is credited with helping to shape U.S. views on civilian-military relations, political development, and comparative government.[1] He earned his Master’s degree from the University of Chicago, and completed his Ph.D. at Harvard University where he began teaching at age 23…. His first major book was The Soldier and the State: The Theory and Politics of Civil-Military Relations (1957), which was highly controversial when it was published, but presently is regarded as the most influential book on American civil-military relations.[8][9][10] He became prominent with his Political Order in Changing Societies (1968), a work that challenged the conventional opinion of modernization theorists, that economic and social progress would produce stable democracies in recently decolonized countries.

As a consultant to the U.S. Department of State, and in an influential 1968 article in Foreign Affairs, he advocated the concentration of the rural population of South Vietnam, via a strategy of carpet-bombing and defoliating the rural lands and jungles of Vietnam, as a means of isolating the Viet Cong…. He also was co-author of The Crisis of Democracy: On the Governability of Democracies, a report issued by the Trilateral Commission during 1976. In 1977, his friend Brzezinski – who had been appointed National Security Adviser in the administration of Jimmy Carter – invited him to become White House Coordinator of Security Planning for the National Security Council. He served in this position until the end of 1978….” [ Huntington

http://www.globalsecurity.org/military/library/policy/army/accp/is3003/fig2-2.gif

At about the same time, another tactical Zio-NWO prong arrived out of the London School of Economics embodied in the persona of Edward Luttwak, who “has served as a consultant to the Office of the Secretary of Defense, the National Security Council, the United States Department of State, the United States Navy, United States Army, United States Air Force, and several NATO defense ministries. Working for OSD/Net Assessment, he co-developed the current maneuver-warfare concept, working for TRADOC, he introduced the “operational level of war” concept into U.S. Army doctrine, wrote the first manual for the Joint Special Operations Agency, and co-developed the Rapid-Deployment Force concept (later U.S. Central Command) for the Office of the Secretary of Defense International Security Affairs…. His book Coup d’État: A Practical Handbook has been reprinted numerous times, and translated into 18 languages. His well known book Strategy: The Logic of War and Peace is widely used as a textbook in war colleges and universities, has also been translated in several languages.”

Richaerd A. Posner, on page 142 of his book “Public Intellectuals” notes that “Luttwak described the United States as a country on the way down. He asked “When will the United States become a third-world country?” and answered “One estimate would place the date as close as the year 2020. A more optimistic prediction might add another ten or fifteen years. Either way, … all but a small minority of Americans will be impoverished soon enough….” 

Luttwak’s revised “practical” handbook on coups d’etat “offers an altogether new way of looking at political power one that considers, for example, the vulnerability to coups of even the most stable democracies in the event of prolonged economic distress. The world has changed dramatically in the past half century, but not the essence of the coup d etat. It still requires the secret recruitment of military officers who command the loyalty of units well placed to seize important headquarters and key hubs in the capital city. The support of the armed forces as a whole is needed only in the aftermath, to avoid countercoups. And mass support is largely irrelevant, although passive acceptance is essential. To ensure it, violence must be kept to a minimum. The ideal coup is swift and bloodless. Very violent coups rarely succeed, and if they trigger a bloody civil war they fail utterly. Luttwak identifies conditions that make countries vulnerable to a coup, and he outlines the necessary stages of planning, from recruitment of coconspirators to postcoup promises of progress and stability. But much more broadly, his investigation of coups updated for the twenty-first century uncovers important truths about the nature of political power.”

 

If the reader has an historical curiosity, he might consult Wikipedia’s list of coups d’etat and coup attempts as a starting point; you’re own historical analysis may offer an alternative. It reminds me of the old joke about what South Americans love most: futbol: “Isn’t it revolting?” “No, that’s their second favorite thing.” The wiki list talks a lot about military figures but fails to artioculate those shadowy figures flitting around near and sinside the military.  Note that there is no mention either of any of the real or imagined coups d’etat within the United States. 

Listverse.com has a more succinct list of the top ten significant historical coups detat

For fans of the UFC-style “if it bleeds, it leads” mentality, List25.com has the 25 most violent military coups. 

William Blum, the author of Killing Hope: U.S. Military and CIA Interventions Since World War II and Rogue State: A Guide to the World’s Only Superpower, has his master list master list of instances of he United States overthrowing, or attempting to overthrow, a foreign government since the Second World War (* indicates successful ouster of a government).

Intellectuals and academics may be interested in this undated final copy of a paper (the most recent case study is 2011) from within NYU’s Deprtment of Politics entitled “Popular Protest and Elite Coordination in a Coup D’Etat” which presents a model that “suggests that protests in countries with media freedom better facilitate elite coordination”. 

https://images-na.ssl-images-amazon.com/images/I/514URs8kudL._SX331_BO1,204,203,200_.jpg

Perhaps you favor an alternative POV, one from Britain via  Jeff Bezos’ global monopoly bookstore: How to Stage a Military Coup: From Planning to Execution, “a unique textbook for the armchair revolutionary, as well as a practical guide for the idealist with a soft spot for the sound of artillery fire”

Note the OTPOR fist variant.

https://theinternationalreporter.org/2016/09/27/george-soros-false-flag-factories/ Gyorgy has been a prominent and active supporter of the near-moribund Clinton campaign. 

Pretend that you can hear the “whump” or mortar fire here

https://westernrifleshooters.files.wordpress.com/2013/11/generalissimo-jarrett.jpg 

Generalissimo Jarrett was said — by a known Satanist and seminal information wars strategist — to be involved in a “purge” of top-level U.S. military officers during the Obama administration.

 

If you want to take the pulse of an online community, see the discussion at Quora.com What-country-has-had-more-coups-and-coups-detats-than-any-other? but you may have to sign in with one of those social media giants which play such a huge and heavily-biased role in our socio-political milieu, either Google or Facebook.

 

[&&]{**}[##]

 

NEW YEARS 2017: COPS TO USE ‘MENTAL HEALTH ASSESSMENTS’ ON EVERYONE

Happy New Years and welcome to nightmare 2017. Last week, I warned everyone, that beginning next year cops will be using pot breathalyzers to arrest innocent people but what’s about to happen in Texas, should scare the ‘you know what out’ of everyone. According to an article in the ‘Dallas News’ beginning this spring, Texas cops will begin using ‘Mental Health Assessments’ (MHA) on everyone!

Nine bogus ‘risk assessments’ in use right now:

1 Firefighters are giving homes risk assessments

2 Police are giving homes ‘social disorder’ ratings

3 Our homes are given color-coded threat assessments

4 DHS and the FBI are giving our homes threat assessments

5 Americans being given threat assessments while travelling inside the U.S.

6 Risk assessments used to sentence people to death and jail

7 Probation officers give nearly 7 million Americans threat assessments     

8 American students being given threat assessments

9 Grade school kids are being given social and emotional mindset assessments

 

http://www.blacklistednews.com/Cops_to_use_mental_health_assessments_on_everyone/56010/0/38/38/Y/M.html