Monthly Archives: February 2014

Playing At War

Primary article:

Drilling Deeper: West slams Russian exercises, glossing over NATO’s war games 


See also:

“Games and Simulations in Online Learning: Research and Development Frameworks” edited by David Gibson, Clark Aldrich, and the references on pages 79-80 to Gee’s paper, and the quote from Donk & Dennen.

See as well:

NSC develops the requirements and advocates integrated capabilities to train and develop Soldiers, leaders and units to achieve individual and collective readiness by:

  • Developing an Integrated Training Environment (ITE).
  • Developing requirements and championing capabilities for the ITE as well as Live, Virtual, Constructive and Gaming (LCVG) training enablers.
  • Supporting Army and Joint exercises 


  • The Effectiveness of Narrative Pre-Experiences for Creating Context in Military Training
    Simulation & Gaming August 1, 2013 44: 514-522
  • Games, Social Simulations, and Data–Integration for Policy Decisions: The SUDAN Game
    Simulation & Gaming February 1, 2013 44: 151-177
  • Innovation Diffusion: Learner benefits and instructor insights with the DIFFUSION SIMULATION GAME
    Simulation & Gaming December 1, 2012 43: 803-824
  • Formalizing Game-play
    Simulation & Gaming April 1, 2012 43: 157-187
  • Serious Games, Debriefing, and Simulation/Gaming as a Discipline
    Simulation & Gaming December 1, 2010 41: 898-920




Tim Lenoir and Henry Lowood , Stanford University 


Games, Simulation, & the Military Education Dilemma

by Michael Macedonia (the chief scientist and technical director of the U.S. Army Simulation, Training, and Instrumentation Command [STRICOM]). 


American tax dollars at work: The US military us spending $57 million on “the most realistic military simulator ever developed,” using Crytek’s CryEngine 3.

Called the Dismounted Soldier Training System (DSTS) and in development from Intelligent Decisions, the simulator allows the Army to train using a videogame environment with real weather effects, squad-based interactions, and motion sensor tech.

“What we’re trying to do with infantry squad-level training is suspension of disbelief, and the CryEngine 3 is the best video game technology on the market today,” said Floyd West, director of strategic programs, Orlando Division of Intelligent Decisions.

More at the link: 


For creating and supporting serious games for the military, IBM holds very different credentials from other defense vendors. We not only integrate real data and real processes into games, leading to much higher ROI, we also already have proven experience in designing, supporting, hosting and maintaining massively multiplayer games for entertainment. We do this for the entertainment studios in which FPS (First Person Shooter) and MMO (Massively Multi-player Online ) games are developed—many of the top-selling titles run on IBM infrastructure. IBM also has built and implemented several gaming systems on private clouds…..

Games—MMOs and FPSes especially—have tremendous datacenter, and datacenter operations requirements. The hosting infrastructure, or game cloud, must support communications to a large number of geographically dispersed players. In addition, games operations have special requirements that are very different from other media hosting forms such as video streaming and interactive web hosting. 



See also [edit]




This simulation of the battle is a test to pit your decisions as Robert E. Lee against what actually happened. Many historians write that this battle was not Lee’s best battle and that certain choices could have dramatically improved the fate of his army on these three critical days.

This is not a contest, only a bit of experimental “counterfactual” history to see what might have been, and a test of your own generalship.,16378,gettysburg-main.htm,,00.html? 




Required reading before you “play”: 






Added on afterthought: 




Added on March 3rd, 2014:

The new Battlefield 4 video game from Electronic Arts, in which fictional forces from the United States, Russia and China go to war with each other features a curious, perhaps coincidental, new ‘map’ that is an almost exact replica of a massive ‘secret’ Ukranian tank depot.

The map, dubbed Zavod 311, engages players from around the world in various scenarios that feature tanks, armored vehicles, helicopters, foot soldiers, and a host of weaponry with the goal being “conquest and control” of specific targets on the map. Up until recently it was just another map to play. But a report from The Daily Mail suggests that the video game could become a real-live battlefield in the very near future, because it houses hundreds of dormant tanks that may be re-commissioned should Russia decide to move its mobilized military assets from Crimea into Ukraine sovereign territory.

After hearing about the strange Soviet-era tank cemetery from a friend, photographer Patvel Itkin, 18, spent months trying find its whereabouts.

Despite the area being heavily monitored by guards, Mr Itkin managed to sneak in and spent several hours taking dozens of photographs.

Once a thriving tank repair plant, work at the depot wound down after the fall of the Soviet Union in 1991, with many of the vehicles on site abandoned.

This may all be just a coincidence, but given the World War III story line in the game and the way events are playing out around the globe with China now coming into the mix, the game could soon become reality.

Should Russia choose to send troops into Ukraine one of its first strategic targets could well be the depot located in the Slobozhanshchyna region of Ukraine just 20 miles from the Russian border.

The resemblance between Slobozhanshchyna and the Battlefield 4 Zavod 311 map is uncanny. Apparently, it’s not as big a secret as once thought, considering that the developers of Battlefield 4 have matched some of the facility’s key features. The detail is of such high quality on next generation machines likes the PS4 and Xbox One that it may be difficult to discern between the digitized version and the real thing.


[The great graphics at the original link are not reproduced here. Go there and satisfy your own curiosity and need for verification.]


The developers of Battlefield 4 describe it as All Out War on an Unprecedented Scale and Scope.

It may not be just a game for much longer.

Could it be predictive programming? Or do we chalk this one off to coincidence? 

** ** *** *** **** **** *** *** ** **

Inside the Pentagon: Preparing for War with Russia?

Writing yesterday in Foreign Policy Admiral James Stavridis (Ret) called for NATO to immediately increase” all intelligence-gathering functions through satellite, Predator unmanned vehicles, and especially cyber” and to sail “NATO maritime forces into the Black Sea and setting up contingency plans for their use.”  This is full-blown war talk – with Russia. Admiral Stavridis was Supreme Allied Commander at NATO from 2009 to 2013. He is currently dean of the Fletcher School of Law and Diplomacy at Tufts University.

If Stavridis is saying these things you can just imagine what plans are underway inside the Pentagon and at NATO HQ in Europe.


More at the link:

Written by Bruce K. Gagnon

Global Network Against Weapons & Nuclear Power in Space
PO Box 652
Brunswick, ME 04011  (blog)



“Distillation of DOD Funding Priorities for January 2014”

BoilingFrogPost Exclusive Report

A Distillation of DOD Funding Priorities for January 2014


DOD spent $15,530,647,963+ on 186 individual contracts in January 2014 

The Pentagon issues a jumbled list of contracts every business day around 5:00PM local time. Our project distills an entire month of these contracts into an accessible form.

The Department of Defense (DOD) spent at least $15,530,647,963 on 186 individual contracts during January 2014.


Agentase LLC received $11,206,720 to support DARPA’s In Vivo Nanoplatforms program (IVN), which seeks to develop new classes of adaptable nanoparticles for persistent, distributed, unobtrusive physiologic and environmental sensing, and treatment of physiologic abnormalities, illness and infectious disease.

Airtec, Inc. received $9,477,860 to provide ISR services (utilizing two contractor-owned/operated aircraft, with government furnished property previously installed on the aircraft) for USSOUTHCOM in Bogota, Columbia.

Conti Federal Services, Inc.; Cosmopolitan Inc.; CT JV; M+W U.S., Inc.; Nibor Enterprises, Inc.; Oxford Construction of PA, Inc. received $24,975,000 for construction projects in Israel.

Foresight Renewable Solutions, LLC (FRSOL) received $7,000,000,000 for use in completing and awarding power purchase agreement task orders.

L-3 received $10,000,000 for commercial tubes to improve USSOCOM lighting capabilities. L-3 received $10,000,000 for commercial lighting tubes for USSOCOM. One bid was solicited with one received.

NEK Services, Inc. received $8,232,079 to provide instructors and role players to support the Joint Exploitation Training Center [PDF, p. 7 of 11], C. Company, 6th Battalion, 1st Special Warfare Training Group (Airborne), Ft. Bragg. This was awarded per FAR 8.405-6.


L-3 received $17, 611,443 for supplies and services associated with Surface Terminal Equipment for Hawklink Tactical Common Data Link (TCDL) and the LCS configurations, and the Vortex Mini-TCDL Shipset components in support of the VTOL Fire Scout MQ-8B/8C.

Law Company Inc. received $20,078,900 to construct a UAV hanger at Ft. Riley.

Northrop Grumman received $36,294,099 for logistics and engineering support for the Hunter UAS in Afghanistan and Sierra Vista, AZ.


American International Contractors, Inc. received $9,788,000 for construction of the United Kingdom Maritime Component Command (UKMCC) including a warehouse and HQ at Mina Salman, Bahrain.

AMI Industries, Inc. received $8,817,781 to install aircraft ejection seats for Oman and Iraq. This is a sole-source acquisition.

B3H Corp. received $6,856,100 for English language instructors and training using DLI-ELC courseware and methodology at King Abdul Aziz Air Base, Dhahran.

Lockheed Martin received $48,900,000 to provide Norway with return/repair support, spares, engineering, reps and modification for C-130J aircraft.

Raytheon received $10,510,029 to provide Denmark with 9 multi-spectral targeting systems (MTS) for MH-60R/S helicopters. This was not a full and open competition, per FAR 6.302-1.

United Technologies received $183,000,000 for work on Saudi Arabia’s Air Force DB110 Reconnaissance System [PDF]. This includes in-country setup, installation, ground stations, and pod survey studies.

United Technologies received $33,884,559 to remanufacture F-100-PW-100/200/220/220E/229 engine modules for Chile, Egypt, Jordan, Thailand, Taiwan, Greece and Indonesia.


BAE Systems received $19,273,217 for MK 41 vertical launching system (VLS) canister production, which includes 89 MK 21 MOD 3 (SM-6) canisters, coding plugs, explosive bolts, and impulse cartridges. Lockheed Martin received $9,710,890 to produce MK 41 VLS AEGIS modernization module electronics. Lockheed Martin received $14,432,389 for one Mission Signal Processor suite and two array simulator cabinets for the Aegis Training & Readiness Center (ATRC).

GTI Systems received $78,200,000 for practice bombs and accoutrements.

Lockheed Martin received $31,674,868 to support Ballistic Missile Defense System (BMDS) flight test activities using LMSSC developed target hardware. Lockheed Martin received $20,618,247 for engineering, manufacturing, risk reduction, technical maturity efforts on the Long Range Anti-Ship Missile (LRASM) program.

Raytheon received $107,918,011 for work on the Patriot missile system. Raytheon received $156,000,000 for eight SM-3 Block IB missiles and “all up round build up.”

Raytheon received $17,257,960 for 28 LAU-115D/A missile launchers for Australia and 64 LAU-116-B/A missile launchers for the U.S. Navy (34 missiles – $5,819,780; 34 percent) and Australia (30 missiles – $11,438,180; 66 percent) in support of F/A-18E/F and EA-18G.

Raytheon received $52,084,929 for engineering and technical support to Phalanx, SeaRAM, and C-RAM required for maintenance, reliability, and improvements.

TASC Inc. received $6,933,916 for R&D on the Solid Rocket Motor Modernization Study, which includes investigating propulsion options and impacts for replacement or modernization of the Minuteman III.


Ball Aerospace received $9,133,111 for Advanced Laser Effects Research branch (ALTER) to advance laser weapon vulnerability research. Deliverables include: beam train work, test layout design, hardware fabrication, diagnostic instrumentation, raw data collection and documentation, and incidental programming.

Booz Allen Hamilton received $12,502,113 for program and financial management and administrative services in the Program Executive Office Enterprise Information Systems (PEO EIS), Naval Enterprise Networks (NEN) office. This was not competitively procured, per 10 U.S.C. 2304(c)(1).

General Dynamics received $6,886,969 to design and develop a CAROUSEL Applicable Specific Integrated Circuit solution involved in testing of CAROUSEL crypto engines.

Harris Corp. received $13,693,104 for additional labor to provide uninterrupted logistics for Space & Missile Systems Center Space Superiority operational Offensive Counterspace and Defensive Counterspace ground-based systems at Palm Bay, FL.

Jacobs Technology Inc. received $15,215,028, $10,657,764 and $7,712,796 for engineering technical assistance, which consists of disciplined systems/specialty engineering and technical/information assurance services, support, and products. Some work will be performed at Hanscom AFB, Peterson AFB and Dahlgren, VA.

L-3 received $85,485,879 for spare and component satellite terminal parts. This is a sole-source acquisition.

Leidos Inc. received $62,480,000 to perform software engineering, integration, technical support, and training requirements for the Integrated Strategic Planning and Analysis Network quality review.

Lockheed Martin received $8,534,310 to modernize AN/FPS-117 Long Range Radars.

Northrop Grumman received $200,000,000 for acquisition and sustainment of Embedded GPS Inertial Navigation Systems (EGI). This is a sole-source acquisition and includes unclassified FMS to Iraq and Thailand (45 percent).

Northrop Grumman received $26,110,000 for Reliability and Maintainability Information Systems (REMIS) Sustainment and Development Services.

Sparta Inc. received $7,310,558 for engineering consulting and technical advisory services including special studies to support existing staff at Space & Missile Systems Center (SMC) at Los Angeles AFB.


Aerospace Testing Alliance received $22,950,459 for operations, maintenance, information management and support of Arnold Engineering Development Complex.

Affordable Engineering Services, LLC received $20,832,874 to support air vehicle modification and instrumentation efforts.

Azimuth Corp. received $23,734,700 and General Dynamics received $23,734,700 to advance R&D on the Hardened Materials Research & Survivability Studies Program in order to advance technology, which protects Air Force aircrews and systems from a host of threats associated with photonic light and electromagnetic energy sources. Technical areas include optical/hardening materials and processing; electro-optic/infrared sensor protection; structural and warfighter protection; functional materials, proactive threat defeat, and high energy laser source materials.

Bell-Boeing JPO received $10,322,803 for logistics on MV-22 and CV-22 aircraft. Bell-Boeing JPO received $26,682,561 for V-22 flight test management, design and engineering work for Naval Rotary Wing Aircraft Test Squadron. Rolls-Royce received $13,556,862 for 17,226 engine flight hours in support of the MV-22. Rolls-Royce received $90,164,920 for forty AE1107C engines for the MV-22.

Boeing received $10,000,000 for items to ensure uninterrupted support to DOD. This is a sole-source acquisition. Boeing received $17,820,844 for remanufacturing and maintenance on the F/A-18 A-F. This was not competitively procured, per FAR 6.302-1. Boeing received $26,836,716 for F/A-18 parts repair. This was not competitively procured, per 10 U.S.C. 2304 (c)(1). Boeing received $38,103,120 for F/A-18E/F logistics and material. The was not competitively procured, per 10 U.S.C. 2304 (c)(1).

CV International, Inc. received $15,916,531 for a modernized maintenance platform for CH-47, UH-60, AH-64, OH-58 and UAS aircraft.

EADS-NA received $9,454,370 for Lakota helicopter logistics.

EFW, Inc. received $11,666,579 to procure and install helmet display tracker system (HDTS PDF) kits for AH-1W aircraft.

General Electric received $572,500,000 to repair and replace 17 F414 engine components. This was non-competitive, per 10 U.S.C. 2304(c)(1).

L-3 received $129,000,000 for maintenance and modification of the C-12/RC-12/UC-35 aircraft fleet. L-3 received $13,764,771 for maintenance on F-16, F-18, H-60 and E-2C aircraft at NAS Fallon.

Lockheed Martin received $105,287,400 (P00026) for C-130J Long Term Sustainment Program. Lockheed Martin received $35,781,319 to develop a Universal Armament Interface capability in F-35 software for Small Diameter Bomb II, Mission Systems Integration Laboratory ground test only.

Marvin Engineering Co. received $7,373,028 for 156 BRU-32 Ejector Bomb Racks for F/A-18 E/F and EA-18G aircraft.

Northrop Grumman received $12,083,976 for 11 AN/APR-39D(V)2 test assets. Northrop Grumman received $33,017,449 to design and build operational test program sets in support of the P-8A AN/ALQ 240 electronic repair depot standup at Naval Surface Warfare Center, Crane. Northrop Grumman received $52,298,661 for tasks, personnel, facilities, aircraft subsystems and equipment for the Battlefield Airborne Communications Node (BACN) E-11A at Kandahar AB, Afghanistan and Wichita, KS.

PLEXSYS Interface Products received $8,254,297 for continued AWACS MTC Block 30/35 CTSS on contractor-owned equipment until the trainers are replaced by Block 40/45 Mission Crew Training Systems.

Raytheon received $36,789,509 for second generation forward looking infrared (2GF) hardware and support to preserve the Army’s 2GF sensor industrial base. One bid was solicited, one received.

Rockwell Collins received $8,022,845 for AN/ARC-210(V) radios and equipment for a variety of aircraft. Rockwell Collins/ESA Vision Systems received $14,666,736 for spare parts for the A/24A-56 (JHMCS). This is a sole-source acquisition. A portion is FMS to Canada, Chile, Pakistan, Portugal, Thailand and Iraq.

Rolls Royce received $182,658,644 for C-130J propulsions sustainment, including logistics, program management, engineering services, spares, and technical data.

SelectTech Services Corp. received $7,680,250 for engineering technical support (preventive and remedial maintenance, inspection, modification, overhaul, fabrication, repair, calibration, certification and transport of experimental/test equipment, and laboratory instrumentation) necessary to perform maintenance and fabrication of experimental processing and test equipment at Wright-Patterson AFB.

Sikorsky received $14,352,600 for helicopter bearing assembly spindles. This is a sole-source acquisition. Sikorsky received $549,905,199 for eighteen MH-60S helicopters and nineteen MH-60R helicopters, including engineering, program management, advanced procurement funding and other logistics.

Textron (Bell Helicopter) received $13,495,182 for repair/overhaul of five high priority items for UH-1Y and AH-1Z helicopters. Textron received $18,556,810 for logistics support for Bell 407, Huey, Jet Ranger, and OH-58 helicopters. Work will be performed in Al Taji, Iraq and Piney Flats, TN.

The Entwistle Co. received $10,981,190 to repair 318 trough covers that support the Aircraft Launch & Recovery Equipment Program (ALREP). This was not a full and open competition, per FAR 6.302-1.

Thomas Instrument received $48,702,626 for aircraft winches. This is a sole-source acquisition.

TTT-Cubed received $26,983,588 for services for the development, integration, and operational support of countermeasure and emitter threat simulator systems for the Airborne Threat Simulation (ATS) Organization.


BAE Systems received $13,895,899 to update and improve the USS Wasp’s (LHD 1) military and technical capabilities. BAE Systems received $37,439,506 for USS Chung Hoon (DDG 93) dry-docking, including maintenance and modernization efforts. This was not competitively procured, per FAR 6.302-1.

Bechtel Plant Machinery Inc. (BPMI) received $593,104,854 for naval nuclear propulsion components.

BriarTek Inc. received $8,070,975 for supplies and services to help install the Man Overboard Indicator (MOBI) on various ships. This was non-competitive, per 10 U.S.C. 2304(c)(1) and FAR 6.302-1.

Cortana Corp. received $7,760,214 for R&D on sensors/systems in support of the Advanced Sensor Application Program and the Remote Environmental Sensor Program.

Detyens Shipyards, Inc. received $9,654,055 for overhaul and dry-docking of fleet replenishment oiler USNS Leroy Grumman (T-AO 195). Work includes port main engine clutch and coupling overhaul; antenna cleaning, inspecting and refurbishing; helicopter deck sprinkler and hose reel piping renewal; fall blocks and fairlead sheaves; hull painting and cleaning; and flight deck non-skid renewal.

General Dynamics received $7,475,361 for USS Carter Hall (LSD 50) maintenance. General Dynamics received $15,000,000 for non-nuclear submarine repair work on Groton-based subs under the New England Maintenance Manpower Initiative (NEMMI). General Dynamics received $15,035,596 for tube and hull material for the Ohio Class Replacement Program for the U.S. (50 percent) and the UK (50 percent). General Dynamics received $29,848,059 for engineering and technical design services to support R&D of advanced submarine technologies.

Goodrich Corp. received $7,598,764 for engineering design services and fabrication of a full scale prototype submarine rotor component under the Hybrid Demonstration program for DARPA.

Huntington Ingalls received $8,163,923 and $9,800,000 for repair parts for USS Gerald Ford (CVN 78).

Lockheed Martin received $13,188,967 for training and crew familiarization; availability advanced planning; long lead time material; warehousing; logistics; and class sustainment management LCS-1 and LCS-3.

Lockheed Martin received $8,863,977 for Technical Insertion 14 (TI-14) Integrated Submarine Imaging Systems (ISIS) and spares. The ISIS provides mission critical, all weather, visual, and electronic search, digital image management, indication, warning, and platform architecture interface capabilities.

Raytheon received $25,485,600 for engineering on the DDG 1000, including engineering, integration, production, and training and life cycle support.

Systems Engineering Support Co. received $18,626,453 for Navigation Sensor System Interface (NAVSSI) hardware. Micro USA Inc. received $17,622,114 for NAVSSI hardware.

Vigor Marine received $6,655,679 for engine overhaul, gyro replacement, diesel generator overhaul, hull cleaning and painting for USNS Yukon (T-AO 202).

Vigor Shipyards received $33,077,000 for repair and alteration of the USS Momsen (DDG 82).


AM General, LLC received $48,000,000 for HMMWV parts. This is a sole-source acquisition.

Bluewater Defense Inc. (San Lorenzo, Puerto Rico) received $108,083,360 for permethrin uniform trousers. Bronze Star Apparel Group, Inc. received $11,111,611 for various Navy working uniforms.

Boeing received $7,131,719 for Combat Survivor Evader Locator (CSEL) logistics.

Design West Technologies, Inc. received $21,554,266 for 14 suspension lock-out kits and spare parts for the M119 Howitzer.

Garrett Container Systems received $19,541,184 for nine pieces of equipment that security forces use on a daily basis, including concealable body armor, Safariland 6005 SLS M-9 Berretta leg holster, nickel plated steel handcuffs, 21-inch expandable baton, mini-flashlights with holder, and whistle.

General Dynamics received $72,690,235 for twelve M1A2 System Enhanced Package v2 tanks. One bid solicited, one received. General Dynamics received $48,000,000 to “continue the existing project manager for training devices live training transformation product line until the next consolidated product line management award.” General Dynamics received $25,960,947 to develop and produce 468 Seat Survivability Upgrade (SSU) Kits for MRAP vehicles.

Heckler & Koch received $19,647,426 for 12,400 M320/M320A1 grenade launchers. One bid was solicited with one received. [$1,584 a piece]

Kalmar RT received $8,211,055 for diesel engines, transmissions, parts and assemblies. This is a sole-source acquisition.

Robin Industries, Inc. received $10,694,880 for vehicle track shoe assemblies.

Ultimate Training Munitions Inc. received $11,250,000 for the close combat mission capability kit for the M4/M16 and M249.


Alutiiq received $6,989,861 for Redstone Information Technology Services to maintain operational continuity until the selection board has evaluated contractor proposals.

Arcadis Inc.; Nova Consulting Inc.; CH2M Hill Inc. and Black & Veatch Inc. received $9,900,000 for architectural and engineering services for the Washington Aqueduct.

Baker-AECOM JV received $60,000,000 for architect-engineer services for USCENTCOM. Stanley Consultants, Inc. received $60,000,000 for architect-engineer services for USCENTCOM. These are FMS contracts involving unnamed countries.

C.E.C. Inc. received $7,391,803 for work in and around the Lake Pontchartrain Bayou Bienvenue Swing Bridge.

Eisenbraun & Associates received $9,000,000 for a nationwide survey and mapping of shallow water habitat, floodplain changes and vegetation cover.

Four Thirteen Inc.; Blackhawk Milcon LLC; Altec Inc.; PentaCon LLC; American Contractor & Technology Inc.; Abba Construction Inc.; Jireh Group LLC; LeeTex Construction LLC; Heritage Constructors Inc.; JAM-MAP JV; and Bering Straits Technical Services, LLC received $48,000,000 for construction and rehab of Red River Army Depot (RRAD) property.

Great Lakes Dredge & Dock received $28,355,304 for deepening the main channel of the Delaware River.

Martinex Construction, Inc. received $19,244,014 for dredging three-to-six million cubic yards of material from the Savannah and Brunswick inner harbor.

Metals USA, I-Solutions Group received $99,253,923 for metal items.

Nakuuruq Solutions received $21,000,000 for machining, welding, fabrication & painting at Aberdeen Proving Ground. Bering Straits Technical Services (BSTS) received $6,778,700 to demolish, repair, and construct a variety of paving structures and drainage devices at Aberdeen Proving Ground.

Pond & Co. and Corrpro Companies, Inc. received $9,999,900 for cathodic protection and corrosion controls.

Tetra Tech/Pond JV received $9,500,000 for architectural and engineering services primarily within the Great Lakes and Ohio River boundaries. One bid was solicited with one received.

Wright & Wright Machinery Company received $776,000,000 for construction equipment.

Zyscovich, Inc.; Reynolds, Smith & Hills; and Schenkel & Shultz, Inc. received $10,000,000 for architectural/engineering to support DOD elementary and secondary schools within the U.S., overseas territories, Europe, Cuba, Japan, and South Korea.


AMEC Environment & Infrastructure; CH2M Hill Inc.; AECOM Technical Services; EA Engineering, Science & Technology Inc.; Earth Resources Technology; J. M. Waller Associates; SAIC; Tec-Weston JV; Tetra Tech, Inc. and URS Group Inc. received a collective $243,000,000 for environmental engineering support.

BOH Environmental LLC received $250,000,000 for containers and container parts. This is a sole-source acquisition.

CDM Constructors Inc. received $77,476,628 to design and build a ‘Class A’ wastewater treatment plant at Joint Base Lewis-McChord (JBLM).

CH2M HILL Constructors received $44,240,000 for design and construction of NAVSEA Headquarters Recovery Restoration at Naval Support Activity Washington (NSAW).

Kemron Environmental Services; Inc.; Sovereign Consulting, Inc.; Bhate Environmental Associates, Inc.; North Wind, Inc.; Zapata, Inc.; and PPM Consultants received $25,000,000 for environmental remediation at contaminated sites located primarily within NAVFAC Southeast [SC (40 percent); TX (30 percent); MS (10 percent); AL (5 percent); GA (5 percent), LA (5 percent), elsewhere (5 percent)].

Mississippi Limestone Corp. received $8,751,228 for casting 94,640 squares of articulated concrete mattress, providing all necessary supplies, labor, and transportation to complete the project.

Weeks Marine received $10,592,500 firm for beach restoration of NASA Wallops Island.

Wolverine Services LLC received $6,769,722 for facility maintenance and repair.


Accenture Federal Service received $7,523,792 for general fund enterprise business system onsite support and change requests.

American Water Operations & Maintenance Inc. received $288,021,970 to own and operate the water distribution system and wastewater collection system at Hill AFB.

Booze Allen Hamilton received $16,080,397 for engineering and technical assistance on the integrated personnel and pay system [PDF].

CoSTAR Services, Inc. received $9,865,087 for regional base operations support services at NAS Jacksonville, Naval Station Mayport, NOSC Atlanta, NOSC Augusta, GA, NOSC Columbus, GA, NOSC Bessemer, AL, NOSC Greenville, SC, NOSC Miami, NOSC Tallahassee, NOSC West Palm Beach, FL and MCRC Jacksonville, FL. Services may include facility investment, custodial, pest control, integrated solid waste management, and grounds maintenance and landscaping.

EJB Facilities Services received $7,261,421 for base operations support at various installations in the NAVFAC Northwest. Work may include management/admin, visual services, security, housing, facilities support, pavement clearance, utilities, vehicle and equipment work, and environmental services.

Five Stones Research Corp. received $43,653,541 for HQ and directorate support services for the ATEC, Redstone Test Center.

General PAE Applied Technologies received $28,070,424 for base operations support at Keesler AFB.

Jacobs & HDR JV received $60,000,000 for analysis of DOD infrastructure for various locations throughout NAVFAC worldwide. Work supports Navy’s Sustainment, Restoration, and Modernization.

IBM received $19,905,753 for services supporting Army General Fund Audit Readiness. KPMG LLP received $10,730,426 and $36,243,243 for all necessary management services, personnel and documentation required to support DLA’s financial audit. St. Michaels Inc. received $10,490,323 to support management services, personnel and documentation required to support DLA’s financial audit.

Trax International received $44,113,856 for test support at Yuma Proving Ground.

Wolf Creek Federal Services Inc. received $12,960,577 for housing operations and maintenance services at Naval Base Guam and Andersen AFB in Santa Rita, Guam (60 percent) and Yigo, Guam (40 percent).


Coast Citrus Distributors received $35,158,808 for fresh fruit and vegetables. Valley Fruit & Produce received $14,691,191 for fresh fruit and vegetables.

Employment Source Inc. received $15,755,197 for dining facility attendant services at Ft. Bragg.

The Merchants Co. received $12,316,254 for food and beverages. This is a sole-source acquisition. Thermo PAC LLC received $20,428,312 for food. This contract is a sole-source acquisition. US Foods International received $42,226,006 for food distribution. US Foods Inc. received $7,232,994 for food distribution. This is a sole-source acquisition.


Avfuel Corp. received $7,417,557 and $6,985,104 for jet fuel. Freeman Holdings of California received $28,455,164 for jet fuel. Lancair Corporation received $15,635,562 for jet fuel. This is a sole source acquisition. McClellan Jet Services received $37,307,380 for jet fuel. Signature Flight Support Corp. received $10,936,934 for jet fuel.

Intercomp Co. received $60,000,000 for various weight set commercial scales.

Isometrics, Inc. received $7,100,835 for design/production of A/S32 R-11 fuel trucks.

Middle Atlantic Wholesale Lumber, R.D. Buie Enterprises Inc., S & S Forest Products, and Sylvan Forest Products Inc. each received $51,294,723 for wood products.

Safety Kleen received $12,930,214 for re-refined motor oil program parts.

Transport Systems & Products Inc. received $7,366,373 for self-propelled modular transport equipment manufactured by Scheuerle Fahrzeugfabrik GmbH in support of the moored training ship conversion project at Norfolk Naval Shipyard. Work will be performed in Pfedelbach, Germany. This contract was not competitively procured.


ABM Government Services LLC received $45,000,000 for operation, maintenance, repair, and minor construction of medical research and materiel command laboratory facilities.

Brit Systems received $20,297,132 for digital imaging network-picture archive communication system.

Dispensers Optical Service Corp. received $17,006,713 for optical lenses. Randolph Engineering received $33,381,996 for optical frames and accessories.

Caduceus received $19,751,538 to provide San Antonio Military Medical Center (SAMMC) with 35 certified registered nurse anesthetists.

Esaote North America, Inc. received $7,500,000 for radiology systems, subsystems, accessories, services, manual, and repair parts. Pacsgear, Inc. received $30,000,000 for radiology systems, subsystems, accessories, service, manual, and repair/spare parts. Toshiba America Medical Systems received $187,732,814 for radiology systems, subsystems and components. Vital Images Inc. received $10,017,588 for radiology systems, subsystems and components.

General Electric received $43,200,000 for patient monitoring systems, subsystems, accessories, spare parts, and training.

MIL-Base Industries received $10,000,000 and Voto Manufacturing Sales Company received $10,000,000 for multiple leg slings.

Panakela LLC received $22,988,000 for oxygen system and related accessories.


Patriot Contract Services LLC received $7,236,660 for operation and maintenance of four large, medium-speed, roll-on/roll-off ships worldwide for MSC.

Pontaris, LLC received $85,611,925 for trucking cargo throughout Afghanistan.

# # # #


*Editing consolidated similar contracts. Italics indicate notes from the editor.

**Any clerical errors are the editor’s alone. Each month, Boiling Frogs Post presents a distillation of the previous month’s DOD Contracts. Check back regularly.


***To avoid competitive bidding, DOD invokes 10 U.S.C. 2304, FAR 6.302, and FAR 8.405-6. DOD also invokes 15 U.S.C. 638 to avoid competitive bidding when dealing with small businesses.

Christian Sorensen, a BFP Contributing Author & Analyst, is a U.S. military veteran. His writing has been featured in CounterPunch and Media Roots. 





[embedded video 26:46]

In this week’s show, Mike Lofgren joins Bill Moyers to talk about the Deep State, a hybrid of corporate America and the national security state, which is “out of control” and “unconstrained.”

posted by Bruce K. Gagnon | 5:23 PM 

‘deceiving others for the good of the state’

The History of the Honey Trap

Five lessons for would-be James Bonds and Bond girls — and the men and women who would resist them.


MI5 is worried about sex. In a 14-page document distributed last year to hundreds of British banks, businesses, and financial institutions, titled “The Threat from Chinese Espionage,” the famed British security service described a wide-ranging Chinese effort to blackmail Western businesspeople over sexual relationships. The document, as the London Times reported in January, explicitly warns that Chinese intelligence services are trying to cultivate “long-term relationships” and have been known to “exploit vulnerabilities such as sexual relationships … to pressurise individuals to co-operate with them.”

This latest report on Chinese corporate espionage tactics is only the most recent installment in a long and sordid history of spies and sex. For millennia, spymasters of all sorts have trained their spies to use the amorous arts to obtain secret information.

The trade name for this type of spying is the “honey trap.” And it turns out that both men and women are equally adept at setting one — and equally vulnerable to tumbling in. Spies use sex, intelligence, and the thrill of a secret life as bait. Cleverness, training, character, and patriotism are often no defense against a well-set honey trap. And as in normal life, no planning can take into account that a romance begun in deceit might actually turn into a genuine, passionate affair. In fact, when an East German honey trap was exposed in 1997, one of the women involved refused to believe she had been deceived, even when presented with the evidence. “No, that’s not true,” she insisted. “He really loved me.”

Those who aim to perfect the art of the honey trap in the future, as well as those who seek to insulate themselves, would do well to learn from honey trap history. Of course, there are far too many stories — too many dramas, too many rumpled bedsheets, rattled spouses, purloined letters, and ruined lives — to do that history justice here. Yet one could begin with five famous stories and the lessons they offer for honey-trappers, and honey-trappees, everywhere.

1. Don’t Follow That Girl

In 1986, Mordechai Vanunu, an Israeli technician who had worked in Israel’s Dimona nuclear facility, went to the British newspapers with his claim that Israel had developed atomic bombs. His statement was starkly at odds with Israel’s official policy of nuclear ambiguity — and he had photos to prove it.

The period of negotiation among the newspapers was tense, and at one point the London Sunday Times was keeping Vanunu hidden in a secret location in suburban London while it attempted to verify his story. But Vanunu got restless. He announced to his minders at the paper that he had met a young woman while visiting tourist attractions in London and that they were planning a romantic weekend in Rome.

The newspaper felt it had no right to prevent Vanunu from leaving. It was a huge mistake: Soon after arriving in Rome with his lady friend, Vanunu was seized by Mossad officers, forcibly drugged, and smuggled out of Italy by ship to Israel, where he was eventually put on trial for treason. Vanunu served 18 years in jail, 11 years of it in solitary confinement. Released in 2004, he is still confined to Israel under tight restrictions, which include not being allowed to meet with foreigners or talk about his experiences. Britain has never held an inquiry into the affair.

The woman who set the honey trap was a Mossad officer, Cheryl Ben Tov, code-named “Cindy.” Born in Orlando, Fla., she was married to an officer of the Israeli security service. After the operation, she was given a new identity to prevent reprisals, and eventually she left Israel to return to the United States. But her role in the Vanunu affair was vital. The Mossad could not have risked a diplomatic incident by kidnapping Vanunu from British soil, so he had to be lured abroad — an audacious undertaking, but in this case a successful one.

2. Take Favors from No One

One of the best-known honey traps in spy history involves Mata Hari, a Dutch woman who had spent some years as an erotic dancer in Java. (Greta Garbo played her in a famous 1931 film.) During World War I, the French arrested her on charges of spying for the Germans, based on their discovery through intercepted telegrams that the German military attaché in Spain was sending her money. The French claimed that the German was her control officer and she was passing French secrets to him, secrets she had obtained by seducing prominent French politicians and officers.

During the trial, Mata Hari defended herself vigorously, claiming that she was the attaché’s mistress and he was sending her gifts. But her arguments did not convince her judges. She died by firing squad on Oct. 15, 1917, refusing a blindfold.

After the war, the French admitted that they had no real evidence against her. The conclusion by most modern historians has been that she was shot not because she was running a honey trap operation, but to send a powerful message to any women who might be tempted to follow her example. The lesson here, perhaps, is that resembling a honey trap can be as dangerous as actually being one.

3. Beware the Media

Sometimes a country’s entire journalism corps can fall into an apparent honey trap. Yevgeny Ivanov was a Soviet attaché in London in the early 1960s. He was a handsome, personable officer and a popular figure on the British diplomatic and social scene, a frequent guest at parties given by society osteopath Stephen Ward.

Ward was famous for inviting the pick of London’s beautiful young women to his gatherings. One of them was Christine Keeler, a scatterbrained ’60s “good-time girl” who supposedly became Ivanov’s mistress. Unfortunately for everyone involved, Keeler was the lover of the married British MP and Secretary of State for War John Profumo, who was then working on plans with the United States to station cruise missiles in Germany.

In 1963, Profumo’s affair with Keeler was exposed in the press. Britain’s famed scandal sheets also blew up the Soviet spy/honey trap angle, for which there was no evidence. Profumo was forced to resign for lying about the affair to the House of Commons. His wife forgave him, but his career was ruined.

Ivanov was recalled to Moscow, where he lived out his days pouring ridicule on the whole story: “It is ludicrous to think that Christine Keeler could have said to John Profumo in bed one night, ‘Oh, by the way, darling, when are the cruise missiles going to arrive in Germany?'” He was probably right: When the media gets hold of a potential honey trap, the truth is easily lost.

3. Beware the Media

Sometimes a country’s entire journalism corps can fall into an apparent honey trap. Yevgeny Ivanov was a Soviet attaché in London in the early 1960s. He was a handsome, personable officer and a popular figure on the British diplomatic and social scene, a frequent guest at parties given by society osteopath Stephen Ward.

Ward was famous for inviting the pick of London’s beautiful young women to his gatherings. One of them was Christine Keeler, a scatterbrained ’60s “good-time girl” who supposedly became Ivanov’s mistress. Unfortunately for everyone involved, Keeler was the lover of the married British MP and Secretary of State for War John Profumo, who was then working on plans with the United States to station cruise missiles in Germany.

In 1963, Profumo’s affair with Keeler was exposed in the press. Britain’s famed scandal sheets also blew up the Soviet spy/honey trap angle, for which there was no evidence. Profumo was forced to resign for lying about the affair to the House of Commons. His wife forgave him, but his career was ruined.

Ivanov was recalled to Moscow, where he lived out his days pouring ridicule on the whole story: “It is ludicrous to think that Christine Keeler could have said to John Profumo in bed one night, ‘Oh, by the way, darling, when are the cruise missiles going to arrive in Germany?'” He was probably right: When the media gets hold of a potential honey trap, the truth is easily lost.

5. All the Single Ladies

The broadest honey trap in intelligence history was probably the creation of the notorious East German spymaster, Markus Wolf. In the early 1950s, Wolf recognized that, with marriageable German men killed in large numbers during World War II and more and more German women turning to careers, the higher echelons of German government, commerce, and industry were now stocked with lonely single women, ripe — in his mind — for the temptations of a honey trap.

Wolf set up a special department of the Stasi, East Germany’s security service, and staffed it with his most handsome, intelligent officers. He called them “Romeo spies.” Their assignment was to infiltrate West Germany, seek out powerful, unmarried women, romance them, and squeeze from them all their secrets.

Thanks to the Romeo spies and their honey traps, the Stasi penetrated most levels of the West German government and industry. At one stage, the East Germans even had a spy inside NATO who was able to give information on the West’s deployment of nuclear weapons. Another used her connections to become a secretary in the office of the West German chancellor, Helmut Schmidt.

The scheme lost its usefulness when the West German counterintelligence authorities devised a simple way of identifying the Stasi officers as soon as they arrived in West Germany: They sported distinctly different haircuts — the practical “short back and sides” variety instead of the fashionable, elaborate West German style. Alerted by train guards, counterintelligence officers would follow the Romeo spies and arrest them at their first wrong move.

Three of the women were caught and tried, but in general the punishment was lenient. One woman who managed to penetrate West German intelligence was sentenced to only six and a half years in prison, probably because ordinary West Germans had some sympathy with the women. Wolf himself faced trial twice after the collapse of communism but received only a two-year suspended sentence, given the confusion of whether an East German citizen could be guilty of treachery to West Germany.

Unlike most spymasters, Wolf preserved his own thoughts on his experience for posterity in his autobiography, Man Without a Face. Wolf denied that he put pressure on his officers to use die Liebe to do their jobs; it was up to the officers themselves: “They were sharp operators who realized that a lot can be done with sex. This is true in business and espionage because it opens up channels of communication more quickly than other approaches.”

How about the morality of it all? Wolf replied for all spymasters when he wrote, “As long as there is espionage, there will be Romeos seducing unsuspecting [targets] with access to secrets.” Yet he maintains: “I was running an intelligence service, not a lonely-hearts club.”

The History of the Honey Trap

Honey Traps: Intelligence business is the oldest profession….

In this Information Age, finding sensitive information is no more a daunting challenge.  The social media has solved so many problems and removed many traditional barriers. The militants fighting the occupations forces in Afghanistan have discovered a novel way, a different kind of honey trap, to get the precious information about the location of NATO soldiers in Afghanistan. They use fake identities of women, with photographs to make it look real, to lure the soldiers into friendship through sites like Facebook. According to The Telegraph, Australian soldiers are now being given briefings before they deploy to Afghanistan to warn of the risk of fake profiles being used to collect information. Soldiers also risk betraying sensitive information by posting pictures or updates tagged with their location, according to the federal government review of social media use in the armed forces. The review, reported by Australia’s Sunday Telegraph newspaper, warns troops to beware of “fake profiles – media personnel and enemies create fake profiles to gather information. For example, the Taliban have used pictures of attractive women as the front of their Facebook profiles and have befriended soldiers. Many of those surveyed for the review were overly trusting of social media contacts and complacent of the risks of divulging information.

It warned that most did not recognize that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behavior can be identified over time. The newspaper said the review also recommended friends and family of troops be warned of the dangers of giving away information including soldier’s names, ranks and locations on social media.

The Taliban tactic the soldiers are being warned about looks pale before the traditional tactics used by the intelligence agencies. Extracting sensitive information from enemies of the state has always been an insurmountable challenge. Agencies like FBI have allowed their informants to as far as using sex as a tactics to lure those possessing the treasure trove of secrets to volunteer the information. Cine-goers are familiar with these tactics who have been watching James Bond movies.

Using women for intelligence purposes is not a recent tactic. Honey traps, also called “honey pots,” have been a favorite spying tactic as long as sex and espionage have existed—in other words, forever. Perhaps the earliest honey trap on record was the betrayal of Samson by Delilah, who revealed Samson’s weakness (his hair) to the Philistines in exchange for 1,100 pieces of silver, as described in the Book of Judges. The practice continued into the 20th century and became a staple of Cold War spy craft. Governments around the world set up honey traps to this day, but it’s an especially common practice in Russia and China. The Central Intelligence Agency doesn’t comment on whether its agents use their sexuality to obtain information, but current and former intelligence officials say it does happen occasionally.

Foreign Policy published an interesting article in 2010 giving history of honey traps. This article makes an interesting reading of the dirty tactics of intelligence agencies to lure the informants. If we closely look at these tactics, it becomes extremely difficult to distinguish the business of espionage from the oldest profession of the humankind.

The classic honey trap is seduction to extract secrets. Perhaps the best-known trap layer was the Dutch exotic dancer Mata Hari, who was executed by firing squad in France in 1917 for allegedly passing secrets along to the Germans. When Israeli technician Mordechai Vanunu went public with secrets about Israel’s nuclear capabilities in 1986, he fled to London, only to be seduced by a woman who led him to Mossad agents in Rome. A rabbi later determined that the Mossad’s actions were, in fact, kosher.

Honey trapping often leads to blackmail—though some of the more famous examples didn’t go according to plan. According to Slate, when the KGB tried to blackmail Indonesian President Achmed Sukarno with sensitive videotapes of the president showing him in compromising position with Russian women disguised as flight attendants, Sukarno wasn’t upset. He was pleased. He even asked for more copies of the video to show back in his country.

No one has perfected the honey trap quite like the Russians. A trap appeared to catch  an American diplomat in Moscow in 2009, but the State Department said the evidence was fabricated as part of a smear campaign.  China, too, seems to employ honey traps regularly. When former Deputy Mayor of London Ian Clement was seduced and drugged in his Beijing hotel room in 2009 only to find his BlackBerry stolen the next day, he admitted that he “fell for the oldest trick in the book.”

Chinese are so adept at these tactics that British MI5 had to issue a 14-page document containing guidelines for hundreds of British banks, businesses, and financial institutions, titled The Threat from Chinese Espionage, in which the famed British security service described a wide-ranging Chinese effort to blackmail Western businesspeople through honey traps. The document, as the London Times reported , explicitly warns that Chinese intelligence services are trying to cultivate “long-term relationships” and have been known to “exploit vulnerabilities to pressurize individuals to co-operate with them.” The present focus of China to become number one power through economic means restricts Chinese espionage to collecting corporate intelligence but it proves the point that spymasters of all sorts have trained their spies to use the amorous arts to obtain secret information.

Honey trapping makes intelligence business the oldest profession.

Related articles


NSA Snares Americans’ Porn Viewing Histories in Effort to Target Muslims

Jason Mick (Blog) – December 1, 2013 9:00 PM

Meanwhile Google, Microsoft, and Yahoo! are forced to treat U.S. gov’t efforts like a cybercrime

The latest leak concerning the U.S. National Security Agency (NSA) by ex-contractor-turned-criminally charged whistleblower Edward Snowden reveals a new height to NSA voyeurism.

I. Dirty Deeds and Social Engineering

The freshly leaked document has been published in The Huffington Post by Glenn Greenwald, Edward Snowden’s confidante.  Mr. Greenwald — a British citizen who primarily writes for The Guardian — has been harassed for reporting on the leaked material.  British intelligence agents have destroyed hard drives from Mr. Greenwald and harassed his loved ones, but these intimidation tactics have failed to shut him up.

The newly leaked agency memo offers new details on an ambitious NSA social engineering program.  The effort is designed to carefully monitor and scrutinize online behavior of certain individuals, logging certain activities in an attempt to discredit them.  The six “exemplars” listed in the document are all described as radical Muslims. 

Mr. Greenwald and his co-columnists describe these individuals stating:

One target’s offending argument is that “Non-Muslims are a threat to Islam,” and a vulnerability listed against him is “online promiscuity.” Another target, a foreign citizen the NSA describes as a “respected academic,” holds the offending view that “offensive jihad is justified,” and his vulnerabilities are listed as “online promiscuity” and “publishes articles without checking facts.” A third targeted radical is described as a “well-known media celebrity” based in the Middle East who argues that “the U.S perpetrated the 9/11 attack.” Under vulnerabilities, he is said to lead “a glamorous lifestyle.” A fourth target, who argues that “the U.S. brought the 9/11 attacks on itself” is said to be vulnerable to accusations of “deceitful use of funds.” The document expresses the hope that revealing damaging information about the individuals could undermine their perceived “devotion to the jihadist cause.”

The document comes from The Director of the National Security Agency (“DIRNSA”) — presumably the office of NSA Director General Keith Alexander, who recently announced his decision to retire following the recent leaks.  Some members of Congress, including Sen. Ron Wyden (D-Oreg.) and Sen. John McCain (R-Ariz.), have called on Gen. Alexander to resign or be fired, as they argue he peverted the powers entrusted to the NSA to spy on Americans.

Multiple executive branch agencies, including the U.S. Department of Justice (DOJ), were CCed on the memo, so it appears the Obama administration was aware of this program.  This is important to note as the Obama administration has tried to blame the most offensive parts of the NSA spying programs on Congress, and claimed to be unaware of these programs.  Such claims have been received with much skepticism given that it was the Obama administration which lobbied secret federal courts for restrictions on spying on Americans be lifted.

The presentation states that “personal vulnerabilities” can be used to undermine the target’s authority, credibility, and reputation.  In addition to more traditional tactics — looking for inconsistent language used by a person in their personal communications (that the NSA has already been shown to be spying on en masse) and unscrupulous financial behavior (e.g. using public donations for personal items), the presentation also states that targets can be compromised by recording them “viewing sexually explicit material online or using sexually explicit persuasive language when communicating with inexperienced young girls.”

The idea is to catch the targets doing the dirty, so to speak, and then somehow let that information “leak out” to target sources as part of a sophisticated social engineering campaign.

[Image Source: NSA via The Huffington Post] 

Such a tactic appeared to be used against infamous terrorists Osama bin Laden, where it “somehow” leaked to the press that dozens of USB sticks “filled” with pornography and jars of vasoline were found at Osama bin Laden’s compound, following the U.S. deathstrike on him in May 2011.

The NSA program is believed to involve the digital equivalent of such a reputation damage campaign, curating porn viewing histories for various IPs, and then using that information to discredit targets.

II. Big Brother is Logging Your Digital Sex Life

While doing this to terrorists may sound like a welcome idea, the problem is that as with other forms of NSA spying, the NSA is believed to be mass harvesting data records, then “filtering” the data down to study the history of targets.  The NSA only considers it “spying” if it targets you with a filtered search.

But the fact is that for some unclear period your private history is floating around in agency databases, accessible by intelligence agency employees and intelligence contractors alike.  We already know that this private history the NSA has been compiling includes portions of our email and chat conversations; a log of our locations over time (as given by cell phone towers); and a list of the websites we visit.

Now this new information suggests that the NSA may pre-filter logs of adult entertainment associated with specific IP addresses inside and outside the U.S.

The first issue with this is that it’s expensive.  It appears that a major reason why Congress and the President would back such a controversial program with questionable results is because of special interest money.

Firms like Booz Allen Hamilton Holding Comp. (BAH) (whom Mr. Snowden worked for at the time of his whistleblowing), Oracle Corp. (ORCL), received billions of dollars in handouts for these massive spying programs.  Unsurprisingly before this happened intelligence contractors had paid tens of millions of dollars to federal politicians, whom they urged to adopt these new programs for “national security”.

There’s no transparency, and little competition to speak of when it comes to these payouts, because contracts typically go to those who pay off politicians, not those who offer the best results.  For example, Inc.’s (AMZN) PAC in 2012 paid a roughly 56-74 split (D/R) of campaign cash to members of the House and 37-12 split (D/R) to members of the Senate, according to OpenSecret‘s numbers from its PAC.  Lo and behold in each case money went to whatever party was in control of chamber and could pass spending legislation.  According to the site’s statistics Amazon claimed $2.5M USD in lobbying expenses in 2012 alone.

A 2011 study by researchers Raquel Alexander and Susan Scholz of the University of Kansas School of Business which estimates that per $1 USD spent on lobbying a company gets back $220 USD, on average in contracts, tax breaks, grants, etc. and you get an estimated that Amazon’s $2.5M USD contribution should theoretically earn it a $550M USD payoff.

Lo and behold Amazon reportedly received a $600M USD confidential contract recently to provide “data services” to the CIA.  Such payoffs for contracts, are more or less legal in America’s current political system, but inevitably they leave American taxpayers footing the bill for their elected leaders’s “generosity”.

This means that a laundry list of all your fetishes and most private desires of you — and potentially your significant other — could potentially be compromised, spilling this embarassing information to employers, colleagues, friends, and family members.

III. “Just Trust Us” Versus a History of Abuse

Of course the NSA would contend that such a scenario would require an agent or contractor breaking the law.  But it already has been shown in audits that NSA agents committed at least minor violations of the law thousands of times a year.

And historically there’s evidence of even larger offenses.

J. Edgar Hoover — former director of the U.S. Federal Bureau of Investigation (FBI) — famously harassed Martin Luther King, Jr. and other civil rights advocates.  He also spied on public figures he suspected of being communist sympathizers or homosexuals, collecting long surveillance dossiers on them.

He also allegedly compiled records of politicians extramarital affairs, using it to blackmail them.  President Richard Milhous Nixon allegedly oversaw a campaign to break into his rival party’s headquarters, an effort that ultimate led him to resign in the face of almost certain impeachment.

But for the Nixons and Hoovers of yesteryear, digital spying has opened the door to much cheaper, broader, and easier abuse.  J. Edgar Hoover and others of his ilk would likely salivate at the prospect of having the history of thousands of citizens accessible with a single nearly unnoticeable search query.

Both the Bush and Obama administrations have been shown to have utilized intelligence agencies multiple times to try to spy on and discredit Americans involved in peaceful groups whose political views were at odds with the sitting President’s own special-interest purchased perspective.

The NSA would also contend that the information it’s harvesting is sanitized — that information on non-targets is filtered out and deleted after some period of time.  Of course, it won’t tell us exactly how long that period of time is, or exactly how it’s trying to cleanse its data pile — in this case porn viewing logs — of records associated with American citizens.

Under President George Walker Bush (R) intelligence agencies spied on Quakers and other pro-peace groups.  President Barack Hussein Obama’s (D) deputies ordered spying on the Occupy Wall Street activists who the administration believed might upset JP Morgan Chase & Comp. (JPM) and other top campaign donors.  Under his watch the NSA also reportedly spied upon Pope Francis (Benedict XVI), the leader of the Catholic Christian church.  President Obama has claimed that he was unaware of this surveillance, but he and his deputies have not commented on the program under oath.

In short, even if the porn-viewing journals that the NSA is harvesting on Americans and foreigners have yet to fall into the “wrong hands” (as far as we know), there’s little evidence to support that such a leak couldn’t happen in the future.

IV. Microsoft Plans Encryption to Protect Users Against NSA

Meanwhile, Microsoft Corp. (MSFT), one of the largest internet software firms in America reported that it was considering new encryption efforts to protect its users following reports that the NSA tapped fiber optic cables in a program called MUSCULAR.

Google Inc. (GOOG) and Yahoo! Inc. (YHOO) have already addressed the spying, acknowledging that their internal investigations indicated revealed user privacy may have been compromised without their awareness.  Yahoo CEO Marissa Meyer said she feared being charged with treason if she objected to the spying.

Former Google CEO and current chairman of Google’s board of directors, Eric Schmidt said that the spying was “not OK” at all with his company.  He said that Google would look to deploy to encryption protections to fight government snooping on cables.

Meanwhile Microsoft’s executives met last week, according to a report in The Washington Post, the newspaper that first outed the MUSCULAR program.

Increasingly companies like Google, Yahoo!, and Microsoft are being forced to expand their efforts from defending against scammers and cybercriminals to defending users against scammers, cybercriminals, and the government.  Perhaps tellingly, the NSA and FBI have increasingly turned to cybercriminal tactics to seize user data, such as phishing and malware.  But where as cybercriminals and scammers are determined and clever, they typically operate on slim resources so they pose much less of a threat.

The government is posing a much more challenging threat to tech firms.  While it may not be the most clever at times, it has a seemingly endless pile of taxpayer money to throw at breaking protections and spying on citizens.

And worse yet, players like Google and Microsoft have to fight against their own — traditional tech powers like, Inc. (AMZN) and Oracle who have lobbied behind closed doors in support of increased spying, which feeds them billions in contracts.  In a sense, the tech world is in a state of digital civil war — both against each and against the government.

The Washington Post quotes Matthew Green, a Johns Hopkins University cryptography expert, as stating, “[It’s] a pretty big change in the way these companies have operated.  And it’s a big engineering effort.””

V. Trio of Senators Call For End to NSA Data Collection in Editorial

Also last week a trio of U.S. Senators — Sen. Ron Wyden, Sen. Mark Udall (D-Colo.), and Sen. Martin Heinrich (D-New Mexico) — ratcheted up the pressure and criticism on the NSA, writing a piece titled “End the N.S.A. Dragnet, Now”.

In the piece they acknowledge that given the USA PATRIOT Act and other recent measures, that the NSA’s actions may fall into a newly created gray area of the law.  But they argue that the collection is inherently unconstitutional and against the spirit of the Founding Fathers.

They write:

THE framers of the Constitution declared that government officials had no power to seize the records of individual Americans without evidence of wrongdoing, and they embedded this principle in the Fourth Amendment. The bulk collection of Americans’ telephone records — so-called metadata — by the National Security Agency is, in our view, a clear case of a general warrant that violates the spirit of the framers’ intentions. This intrusive program was authorized under a secret legal process by the Foreign Intelligence Surveillance Court, so for years American citizens did not have the knowledge needed to challenge the infringement of their privacy rights

Our first priority is to keep Americans safe from the threat of terrorism. If government agencies identify a suspected terrorist, they should absolutely go to the relevant phone companies to get that person’s phone records. But this can be done without collecting the records of millions of law-abiding Americans. We recall Benjamin Franklin’s famous admonition that those who would give up essential liberty in the pursuit of temporary safety will lose both and deserve neither.

The usefulness of the bulk collection program has been greatly exaggerated. We have yet to see any proof that it provides real, unique value in protecting national security. In spite of our repeated requests, the N.S.A. has not provided evidence of any instance when the agency used this program to review phone records that could not have been obtained using a regular court order or emergency authorization.

They add:

There is no question that our nation’s intelligence professionals are dedicated, patriotic men and women who make real sacrifices to help keep our country safe and free. We believe that they should be able to do their jobs secure in the knowledge that their agencies have the confidence of the American people.


But this trust has been undermined by the N.S.A.’s domestic surveillance programs, as well as by senior officials’ misleading statements about surveillance. Only by ending the dragnet collection of ordinary Americans’ private information can this trust be rebuilt.

The Democratic trio is backing the “USA Freedom Act of 2013“, cosponsored by Sens. Michael S. Lee (R-Utah) and Patrick Leahy (D-Verm.); a bill which would reign in the NSA’s Orwellian spying campaign.

At the same time they are condemning their colleague Senator Dianne Feinstein‘s (D-Calif.)  “FISA Improvements Act” — a bill which would further codify bulk data seizures by adding new language to the 50 USC § 1861.  This section of The PATRIOT Act already allows ] agents of the FBI to without warrant demand “any tangible things (including books, records, papers, documents, and other items)” from a U.S. citizen in order  “protect against international terrorism or clandestine intelligence activities.”

If Sen. Feinstein has her way, the section would be amended to included allowances for the NSA, FBI, and other agencies to seize Americans’ data in bulk, without individual warrants.  Under her vision, the NSA and other agencies could apply for FISA court warrants to collect anywhere from thousands of millions of Americans’ data — essentially a blank check to spy on U.S. citizens’ digital lives.

Civil liberty advocates are in the same camp as Sens. Wyden, Udall, and Heinrich.  They praise Sens. Lee and Leahy’s bill as a step in the right direction, if perhaps not going far enough to roll back the PATRIOT Act and restore Constitutional protections.  At the same time they blast Sen. Feinstein’s alternative as a grave assault on American freedoms.

Jennifer Granick of the Stanford Center for Internet and Society (CIS) summarizes to The Huffington Post, “The Feinstein bill is terrible and would make things worse. I think the Leahy-Sensenbrenner bill begins to address some of the problems.”

Both bills will soon be debated by the U.S. Senate, having made it out of the committee phase intact.

Meanwhile the NSA is speaking out, attacking its critics, in a recently posted memo [PDF] (a memo that isn’t a leak).  The piece is perhaps punchline-worthy in that it fails to provide any details to explicitly contradict the bulk of media commentary and characterizations.  However, lack of transparency isn’t stopping the NSA from blaming (or crediting?) the press for the mire it’s in, writing:

Recent press articles on NSA’s collection operations conducted under Executive Order 12333 have misstated facts, mischaracterized NSA’s activities, and drawn erroneous inferences about those operations.  NSA conducts all of its activities in accordance with applicable laws, regulations, and policies — and assertions to the contrary do a grave disservice to the nation, its allies and partners, and the men and women who make up the National Security Agency.

The agency acknowledges that it is prone to “incidentally acquire communications of U.S. persons”, but says it does its best to delete such records “as soon as possible”, if they aren’t pertinent to a terrorist investigation.  The document, however, is predictably devoid of any facts and details of its efforts to mitigate its “accidental” spying on Americans.  Of course, if Sens. Wyden, Udall, and Heinrich say the NSA isn’t being transparent even in confidential, closed-door Senate sessions, did you expect anything less?

Sources: The Huffington Post, The New York Times, NSA Statement [PDF], The Washington Post

[Note: Some images not reproduced (nothing salacious, though)]

‘Gaddafi’s harem’: Sex as a weapon of mass deception


by Linda Housman


Sex sells, it’s as simple as that. Modern society has become obsessed with sex. Unfortunately not because one considers it to be a source of great joy and a way to experience love and connectedness. On the contrary, people’s obsession with sex merely sprouts from all the guilt and misguided ‘values’ surrounding the topic. The bigger the taboo, the bigger the obsession with it. For that reason, the vast majority of mankind can’t do without their daily batch of stories linked to ‘forbidden’ sex in personal conversations, but even more in movies, soap series, tabloid stories et cetera.

Media moguls know this. The corporate financiers behind the media know this. But by far the most dangerous, the forces behind global war and destruction are fully aware that this is THE way to bend the public opinion – the public emotion – towards their evil agenda.

After the war on Iraq, NATO’s war on Libya once again made it crystal clear that the wars of the 21st century have become nothing but straightforward propaganda wars. Whoever was not convinced yet by the already much used trump card of “another evil dictator being on the brink of eradicating a large part of his people”, had to be won over by the topic that clearly appeals to the emotions of the majority: sex.

Global emotions ran high when mainstream media headlines in April 2011 started to claim that, according to UN diplomats, the forces of the Libyan Jamahiriya were being issued the impotency drug Viagra in order to engage in sexual violence and rape against those who supported the NATO-led rebels. From that moment in time, so-called Gaddafi supporters were inevitably also branded supporters of sexual crimes. No legitimacy for such people in the civilized world. Ergo, another free pass for NATO to proceed with its imperialist war on the once sovereign and prosperous country.

By now the outcome of this illegal war has become obvious for everyone.  NATO’s ‘free democratic Libya’ has turned out to be a failed state, ruled by militias, mercenaries and traitors of the functioning Jamahiriya. But the remainders of Muammar Gaddafi’s ideology as described in the Green Book are still there – moreover, the idea of a people’s government only has been spreading ever since the outward destruction of the Libyan Jamahiriya in 2011.

The powers that create war – the desperate powers of the Western bankrupt countries – are well aware of the fact that the blood of the martyr Muammar Gaddafi has been the seed of a growing global call for a government based on the principles of the Jamahiriya. As a result of that, they saw no other choice than to disparage his  legacy as much as possible, only to rid his supporters of their credibility and to portray them as being as “inhuman and monstrous” as their symbolic leader. And again, how to do that better than via a topic that most people are vulnerable to: sex.

“Viagra totalitarianism”

The propaganda snake that had to tarnish the reputation of Africa’s hero once and for all, came in the form of a woman. A middle-aged woman named Annick Cojean, residing in one of the main orchestrators of the war against Libya, France, who works as a journalist of French mainstream media outlet Le Monde. Her book “Gaddafi’s harem, The Story of a Young Woman and the Abuses of Power in Libya” is not only about the delicate topic of sex. The forces behind this ultimate piece of propaganda pulled out all the stops by making up a story of unbridled sexual violence and rape against underage girls by the most influential man of the entire country, who -‘oh, irony’- went by the title of Guide of the Revolution. Or, quoting a mainstream review, “after reading her book, one gets the impression that Gaddafi’s Libya was a grotesque and horrendous case of Viagra totalitarianism” and that Gaddafi “systematically used sex as a form of terrorism against his own people”.

Cojean’s book doesn’t leave much to the imagination. It is built around the “confessions” of a 22-year-old woman, who at age fifteen became “one of Gaddafi’s whores”. The girl, Soraya (pseudonym), is said to be from Sirte, the hometown of Muammar Gaddafi. Had she been from either the city of Benghazi or the city of Misrata, which both have been cradles of terrorism and conspiracy against the Jamahiriya for decades, the effect of the description of “Gaddafi’s crimes” probably would have been a little less efficient, the author must have considered.

According to the book, fifteen-year-old Soraya, in short, was “abducted from her mother’s salon and driven out of the city and into the desert, to Gaddafi’s tent”. There she was “measured, weighed, washed and shaved”, “a blood sample was taken by a Ukrainian nurse” and she was “made up and clothed in a dress with a deep décolleté over a tanga”.

Soraya then was “led back to Gaddafi, who was sitting naked on his bed”. When the girl “reacted with shock and refused to get into the bed”, “Gaddafi, although angry, let her go”. “But he shouted at Mabruka [earlier in the book described as ‘the most notorious of Gaddafi’s female thugs’]: “This whore isn’t doing what I want, make her understand and bring her back”.”

Mabruka then “went to explain to Soraya that resisting was useless, and that Gaddafi would ‘open’ her”. “The next time she was brought to Gaddafi, he raped her brutally. Over the next few days he whipped the girl, raped her again and again, even urinated on her. After a week, Soraya was taken to Tripoli to Gaddafi’s headquarters at Bab al-Azizia. There she was given a dark, damp room in the cellar. Soraya was to spend seven years here as one of many of the dictator’s slaves – at the whim of this mostly cocaine-fueled sex addict and his vicious band of female guards.”

“Smart” move

In an attempt to come across reliable, the author dressed up in the finest sheep’s clothing. “Soraya poured out all that happened to her, and spoke so freely to me that at one point I wondered if what she was saying was true”, Cojean stated in her book. “I believed her, she seemed to be telling the truth, all she had experienced just welled out of her – but I still had to follow up and make sure.” Meanwhile, no conclusive evidence whatsoever has been provided as to whether “Soraya” is telling the truth or not. Also no word about the psychopaths of this world who are able to manipulate to perfection – most likely because the author is one of them herself, or at least her clients are and she merely is their useful idiot.

The snake-gone-wolf-in-sheep’s-clothing did her homework. A considerable part of the book elaborates on a topic most readers probably are not even familiar with: the fact that the empowerment of women was central to the Libyan Al-Fateh Revolution.

The author doesn’t fail to mention that Muammar Gaddafi supported women and believed in their abilities. For that reason, he highlighted his female bodyguards as a symbol of his belief in women’s emancipation and their role in the defence of their country. Under Jamahiriya government women also made great strides in employment, with improved access to education and acceptance of female paid employment. During the last decade of King Idris’ rule, females enrolled in primary education were only between 11-19%. However, in 1969, education was made a right. And by 1990, the figure stood at 48%. And last but not least, under Jamahiriya government child marriages were banned and the minimum legal age to marry placed at 18. Since 1973, Libyan women have had equal rights in obtaining a divorce, and no person can force a Libyan woman to marry any man.

The Leader of the Al-Fateh Revolution himself explained his great efforts for women by saying: “I promised my mother to improve the situation of women in Libya”. His mother, a Bedouin tribeswoman born when Libya was an Italian colony, was unable to read or write.

This and more, including quotes from Gaddafi’s Green Book about the liberation of women and their equal rights, has been written down by Cojean – only for the purpose that is characteristic of evil forces: to turn good into bad, and bad into good. So the Le Monde journalist leaves her less-informed and less-aware readers with the poisonous question of the snakebite that this book is: “How on earth can something that looks so good on the surface have such a rotten core?”

And the devil of globalism and imperialism laughs…


The real tragedy of this propaganda book that aims to turn Africa’s hero into Africa’s brutal sex-addicted mass rapist, is not only the fact that it broadly disparages Muammar Gaddafi’s great achievements and ideology, as well as his humbleness as a Muslim and his simple personal life. It also – and be sure this is not a coincidence – massively draws away the attention from the extensive paedophile and sex abuse cases in Western governments, royal houses and churches, which currently nonetheless more and more come to light. So far no mainstream media outlet has been the voice of the numerous victims of those crimes, let alone allowing a book to be published on the sexual misconduct towards them by British Jimmy Savile, Dutch Joris Demmink and many many other high-ranking figures. Instead the proofless story of an anonymous, faceless “Libyan girl” gets the limelight – because this story exactly serves the imperialist agenda

In the end, Cojean’s book only exposes and emphasizes the purpose of the evil forces. Because in the end it always is the good fruit that the mainstream media snakes are attracted to, while the rotten ones are left alone.

And Muammar Gaddafi has been such a good fruit. 

In the eyes of posterity it will inevitably seem that, in safeguarding our freedom, we destroyed it. The vast clandestine apparatus we built up to prove our enemies’ resources and intentions only served in the end to confuse our own purposes; that practice of deceiving others for the good of the state led infallibly to our deceiving ourselves; and that vast army of clandestine personnel built up to execute these purposes were soon caught up in the web of their own sick fantasies, with disastrous consequences for them and us.

— Malcom Muggeridge, May 1966

found at  


Let me tell you a little story….

In just a few days, it will be exactly 3 1/2 years ago, that the American Federal Bureau of Investigation (FBI), the Australian Federal Police (AFP)  and the Australian Queensland Police Service announced the existence of  “Operation Achilles” which led to the breakup of what they claimed was one of the largest child pornography rings uncovered up to that time.

The individuals comprising this pedophile ring called themselves “the group” and they believed themselves untouchable, beyond the reach of the police.

(For many of them, — one-half to two-thirds, depending on which affidavit you believe — this did, indeed, turn out to be the case. This includes the ringleader, who is known by the handle Yardbird.)

The number of persons reportedly involved varied — one affidavit stated that there were 61 persons involved, another 45, and yet another 48. All in all, there were 22 persons arrested: 2 in the UK, 4 in Germany, 2 in Australia, and 14 in the U.S.

The FBI podcast, “Inside the FBI” states that the number of persons involved was 60, of which 22 were positively identified. You can listen to the podcast and read the transcript at the following URL:

Another superb source of information is the so-called “Castleman Affidavit”– this affidavit was used to justify the arrest of group member Daniel Castleman.

The Castleman affidavit explains the group’s methodology (or modus operandi) in detail.

It can be seen at:

Another good source of information is:


Leaving aside my personal feelings about pedophiles, I brought up this case as an example for several reasons:

1) Child pornography is a serious crime in virtually every jurisdiction.

As this example demonstrates, police will work together, even across national boundaries, to investigate these crimes. They are willing to invest considerable time, manpower and money in pursuit of these suspects. The only other crimes which usually merit this type of approach are drug/gun-running or terrorism. The level of effort expended in pursuing this group can be seen in that even FBI executive assistant director J. Stephen Tidwell was involved.

Normally one would not expect FBI personnel that highly placed to be involved — this shows the level of importance placed on this particular investigation. (A year or so after the busts, Yardbird himself expressed astonishment that the FBI would consider his group such a priority.)

2) This case is the only one that I’m aware of, where suspects were using sophisticated tools like PGP, Tor, anonymous remailers and nymservers.

3) This case underscores the effectiveness of these tools even against well-funded, powerful opponents like the FBI, Europol, and Interpol. (N.B.: FWIW, those who were caught used either inappropriate and/or ineffective tools and techniques to protect themselves.

4) I fully understand most people’s disgust at the types of crimes/criminals being discussed here. That said, it is important to remember that one simply cannot design a system that provides protection for one class of people, but denies it for another. You can’t, for example, deploy a system that provides privacy/anonymity for political dissidents, or whistle blowers, and yet denies it to pedophiles — either *everyone* is safe, or NO ONE is safe. This may not be palatable, but these are the facts. 



And then there are the adult online fantasy games …. in whose “digital rooms” who knows what is communicated, and how. [a division of NBCUniversal]

“The Optimist” ARG Draws Focus to Disney History

July 11, 2013 · By Michael Andersen in Game Launch, News · Comment  

This ARG Brought to You by the US Intelligence Community?

March 17, 2013 · By Michael Andersen in Info, Previews · 6 Comments  


Television and Gaming Merge in Defiance for Transmedia War Zone

January 16, 2013 · By Celina Beach in Features, Game Launch, Rumors · 1 Comment 


Imagineering New Transmedia Projects with Disney’s Living Worlds Program

November 26, 2012 · By Michael Andersen in Info · Comment 


After a long day of surfing the web, you crash hard and sleep soundly. But suddenly you are awakened by the persistent ringing of your phone.

You answer it, and the voice at the other end speaks sinisterly, “If you know what’s good for you, you’ll back off. You don’t want this, you really don’t.”

You’re sitting in the dark at 3:00 a.m., staring at the now-dead phone, thinking to yourself, “What have I gotten into?” Then you remember the strange web site you signed up for earlier that evening on a lark. You realize that whoever they are, they already know a lot more about you than you do about them.

You’d better get cracking.

Welcome to the world of Alternate Reality Gaming.

Welcome to unfiction.



Snowden Confirms Spy Agency Launched False Flag Attacks and Used Honey Traps

Posted on February 7, 2014 by WashingtonsBlog

Spy Agencies Use Dirty Tricks

We’ve repeatedly noted that the spy agencies aren’t just like giant peeping Tom’s, but they use their capabilities in mischievous offensive actions.

We’ve warned since 2009 (and see this) that the government could be launching cyber “false flag attacks” in order to justify a crackdown on the Internet and discredit web activists.

A new report from NBC News shows that the British spy agency used “false flag attacks” and other dirty tricks:

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”


The agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Sound familiar? It should:

Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them.

NBC continues:

[The agency] also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.


JTRIG used negative information to attack private companies, sour business relationships and ruin deals.


Changing photos on social media sites and emailing and texting colleagues and neighbors unsavory information.

Here are two of the documents from the British intelligence service leaked by Edward Snowden:

Previous Snowden documents published by NBC also evidence false flag attacks.

Postscript:  We await further revelations of “false flag” attacks by spy agencies. 

Comment found at that link:

In the IT world, a honeytrap basically means exposing an unused subnet that offers fictitious services (e.g. HTTP, SMTP) to would-be hackers. The idea is to gather as much identity information as possible in order to block the hackers from assaulting legitimate services. It has very little to do with sex, unless the parties are unusually geeky.

Health Care in US Prisons (RIDGEWAY from CounterPunch)

FEBRUARY 04, 2014

Health Care in US Prisons: a Human Rights Issue Hiding in Plain Sight

Black Sites Across America


There are 2.3 million people in US prisons in conditions that are often inhumane and at worst life threatening. An estimated 80,000 of US prisoners are locked up in solitary confinement, which means in a 6 ft x 9 ft cell containing little more than a bunk bed, toilet, sink, shelf, and unmovable stool. Prisoners in solitary confinement are let out in leg irons, handcuffs and belly chains for ‘exercise’ two or three times a week in dog kennel-type runs. Bathing is sporadic and the food often miserable and insufficient. One third of prisoners in solitary confinement are thought to be mentally ill and half are placed in solitary for nonviolent crimes.

Recently, the press has begun suggesting the situation in US prisons might be improving slightly. In part, this may be due to reforms pushed by the American Civil Liberties Union in Mississippi that forced reduction in numbers of men held in solitary and because of the hunger strikes in California which have brought small reforms there. Under steady pressure from citizen groups, Maine has reduced the numbers of men in solitary. Furthermore, reforms proposed by US Attorney General Eric Holder aim to reduce overall crowding in prisons by releasing the old and sick, and by loosening the hitherto mandatory drug laws.These laws have sent untold thousands into prisons on lengthy sentences for minor drug offenses.

As states cut costs, there is some pressure to shut down certain prisons, but the real story is business as usual. Cost cutting may shutdown prisons but also means that corrections officials double cell the inmates, that is, put two people in already cramped cells.  Individuals serving sentences in solitary confinement live under these cramped conditions, not for weeks or months, but for years and decades. Two men have been in solitary at Louisiana’s Angola prison for 41 years. I write to a man in New York State who has been in solitary for 26 years. In Colorado a man in solitary confinement has not seen the sun in 10 years.

The most striking aspect of this scene is the lack of decent medical care for prisoners in the US whether in solitary confinement or in the general prison population. Over the last two years I have corresponded with prisoners who have been waiting for years to have dental work, and end up pulling their own teeth. Women line up at 4 am in Alabama to receive aspirin. People with hearing impairments are thrown into solitary confinement because, unable to hear, they cannot respond to the orders of officers. According to one doctor in the south, a man with an ear ache was given drops for months but finally became so ill he was examined at a local hospital outside of prison and was diagnosed with terminal brain cancer.

I reported on a case of a woman in prison for a $11 non violent robbery who had received two consecutive life sentences. She was suffering from end stage renal disease. The subcontractor which provided health care to Mississippi prisons brought in a dialysis machine which broke down during treatment. Her condition eventually deteriorated and she was sent to a city hospital where the doctor warned the prison she would die if taken back. The prison put her back in the cell anyway. Eventually after pressure from the National Association for the Advancement of Colored People (NAACP), this woman and her sister, who was also in prison, were released by the governor on grounds that the healthy sister gives a kidney to her sister.

Herman Wallace, 71, was shut up in solitary in Louisiana for 41 years. Five years ago he was diagnosed with hepatitis C. Last year he complained of stomach cramps and weakness. He was seen by a prison doctor who said he had a stomach fungus and administered an antibiotic. A short time later, Wallace, having lost 50 pounds, still living in his tiny cell where the temperature was 96 degrees (35.6oC), became so sick he was taken to a hospital outside the prison where he was diagnosed with terminal liver cancer. His friends and lawyers requested that the state grant him compassionate release and allow the man to spend his final days with family and friends.  And, indeed, shortly before Wallace’s death, a federal judge in Louisiana, disregarding the state’s opposition, set him free. Wallace spent two days as a free man before he succumbed to the cancer.

These are not isolated cases. Every day I receive letters from people in US prisons many of them are locked in solitary confinement; fifty letters in a week. Today a man being charged money for medications goes without because he has no money to buy them. Another man with kidney and bladder ailments fears to go to lunch in case he infuriates other inmates by ‘leaking’ on a chair. A man says he hasn’t slept for days because of the constantly burning neon lights. Another says that he only catches a few minutes sleep when people around him have stopped screaming. Others stifle at the smell of excrement smeared on the walls. A young man writes he is cutting into his arm, but please don’t stress his mom by telling her. He hopes to kill himself by tomorrow night.

I have raised the question with several doctors as to why the US medical profession – doctors, nurses mental health professionals, etc – show little interest in this enormous human rights issue on their doorstep, one directly affecting public health, and one which is even recognized and studied as an epidemic. To be sure there are medical practitioners who have plunged into this morass, but they are few and far between. And there are medical bodies, including Physicians for Human Rights and the American Psychological Association, which decry solitary. Physicians for Human Rights calls for independent evaluations and reform of health care policies. Much of this work is couched in the language of scholarly discourse, and often points to promising actions in the prison business. Sitting here, reading these letters, these academic statements seem utterly disconnected with what is going on.

Help is needed now, not only in the academic arena. As a layperson it seems to me unconscionable for the medical profession to turn its back on what has become a serious, large scale human rights issue; one that can be alleviated, at least to some extent, by medical professionals employing up to date technology, not, as reported above, broken down dialysis machines.

At the same time I meet doctors who long ago worked in Africa in the Peace Corps, still returning to places like Ethiopia each year to help provide medical care. American doctors fly into Haiti to spend exhausting weeks tending to desperately poor people. But these foul prisons in their own backyards are ignored. Doctors tell me it is too complicated dealing with prisons and that even if they should show interest the wardens will turn them away at the gates.

Why can’t doctors fight? Médecins Sans Frontières/Doctors without Borders (MSF) seems to get into all sorts of difficult places amidst mass starvations, horrid natural disasters, braving fire in combat areas. When I phoned to ask MSF if they could do anything in US prisons, the answer was a bureaucratic no – can’t do business in the US. The International Red Cross is a great force for the good, and has authority to visit US prisons, but, according to a representative I spoke with, can’t reveal which prisons it enters. The UN Rapporteur on torture travels around the world visiting dreadful places, but when it comes to the US, he must go through the bureaucratic labyrinth of first securing permission from the US mission to the UN, which denies we torture, then the state department, which says we don’t torture. The US constitution and subsequent laws ban torture. The president has reiterated these bans. The Rapporteur can be turned away by wardens of state prisons where most of the prison population dwells. The press is routinely denied entrance to solitary sections of US prisons.

Prisons in the United States have become our true `Black Sites’ – our new madhouses. They are warehouses for the poor and the sick. Located all over the country, they are hiding in plain sight.

James Ridgeway is a journalist in Washington. He worked for years at the Village Voice in New York, then for Mother Jones magazine. He has written 16 books (including A Guide to Environmental Bad Guys with Jeffrey St. Clair), made documentary films, and is founder and co-editor of Solitary Watch, a web site that tracks solitary confinement in the US.  

Wayne Madsen et al. on Philip Seymour Hoffman

February 3-4, 2014 –Is Hollywood “Star Whacking” continuing?

The death from a reported drug overdose of 46-year old actor Philip Seymour Hoffman a day after a satirical website reported a hoax death of the Oscar-winning actor from the same cause has raised eyebrows among Hollywood insiders who have questioned the “official” stories surrounding the deaths of a number of Tinseltown celebrities.

On February 2, Hoffman’s body was found on the bathroom floor of his Greenwich Village apartment after he failed to pick up his three young children from the home of his longtime partner, Mimi O’Donnell, with whom he had recently separated. A website known as Media Mass reported on February 1 that Hoffman had died from a drug overdose, a claim that resulted in immediate denials from Hoffman’s publicity agents.

Hoffman is said to have had an addiction to heroin but kicked his drug habit some 22 years ago. However, police reportedly discovered bags of heroin in Hoffman’s apartment following the actor’s death.

On July 16, 2012, WMR reported that Leonard Rowe, the veteran promoter of such African-American entertainers as Michael Jackson, his sister Janet Jackson, and Toni Braxton, confirmed actor Ranmdy Quaid’s allegation that Hollywood celebrities were falling victim to “Star Whackers,” who were described by Quaid as criminal lawyers, agents, and financial advisers who were grabbing the royalties, intellectual property assets, and profits from stars after their deaths which were murders disguised as drug overdoses and suicides.

In answer to WMR’s question about Quaid’s charge that a number of Hollywood stars have fallen victim to “star whackers,” Rowe replied, “Randy Quaid is 100 percent correct.” Quaid, who has received political asylum [in British Columbia] in Canada, charged that Michael Jackson, Chris Penn, Heath Ledger, and David Carradine all fell victim to murder in order that their assets be seized. Rowe adds Whitney Houston, as well as Peter Lopez, the entertainment attorney for Jackson, to the list. Houston was found drowned in a hotel bath tub, while Lopez reportedly shot himself at his California home.”

Quaid and his wife fled to Canada after he charged that his lawyer, agent, and other criminal racketeering elements in Los Angeles attempted to ruin him financially and tried to send him to prison for failure to pay debts, which Quaid said were fraudulent claims. (3:49)

Last July, Glee star Corey Monteith’s body was found in Vancouver’s Pacific Rim hotel. British Columbia authorities concluded Monteith had died from a heroin and alcohol overdose. On November 5, 2010, WMR reported that Jackson, Penn, and Ledger “all died of drug cocktails of prescription drugs leading to cardiac arrest. The cardiologist who is related to these cases in Conrad Murray, a police cardiologist who was also Michael Jackson’s personal physician at the time of his death. Jackson allegedly died from an overdose of prescription drugs and the Los Angeles Police Department originally treated the singer’s death as a homicide . . . Quaid also believes that actor Robert Blake was set up in the murder of his wife, Bonnie Lee Bakley. In 2005, Blake was found not guilty of murdering his wife or of soliciting assistance in her murder. However, Blake was later found civilly liable for his wife’s death.”

WMR’s report also stated: “There are also suspicions about the 1999 death of director Stanley Kubrick, who died from a reported heart attack in England just four says after he attended a screening of his last movie, “Eyes Wide Shut,” with his family and Warner Brothers executives.” The movie is about a semi-religious sexual cult that features ritualistic secret orgies attended by members of the New York City wealthy elite who engage in human sacrifices.

Hoffman’s sudden death, which mirrors that of other Hollywood deaths, has added to the suspicions that Quaid’s charges have always contained a ring of truth.


Movie Bytes : The Hunger Games 2

Philip Seymour Hoffman is Plutarch Heavensbee in The Hunger Games 2 Catching Fire! You might not officially meet Plutarch Heavensbee until 2013, but today Beyond The Trailer host Grace Randolph will introduce you to the character and give you the backstory on the casting of Philip Seymour Hoffman! This is part of Tribute Week on Beyond The Trailer, where you meet those competing in the 3rd Quarter Quell! Do you think Philip Seymour Hoffman is well cast as Plutarch Heavensbee? Enjoy The Hunger Games 2 Catching Fire in 2013! And make Beyond The Trailer your first stop for entertainment news and analysis here on YouTube today! (2:38) (0:33)



It starts at midnight.
―Plutarch Heavensbee[src]

Plutarch Heavensbee is the Head Gamemaker in Catching Fire, taking the place of Seneca Crane. He becomes a commander of the rebel forces of District 13 in the book Mockingjay. [snip]


Plutarch saw the Hunger Games, and later the war against the Capitol, as giant chess games consisting of moves and countermoves. As such he was an ingenious strategist but this also caused him to be somewhat callous as he showed no concern for people who died in the Quarter Quell or the war…..



Collins resides in Sandy Hook, Connecticut, within Newtown, Connecticut with her husband and their two children.[7][19][20] She is aRoman Catholic.[21]


MSM video:

Hoffman Spotted at ATM with 2 Mystery Men 



See also:


Was It Afghan Heroin? 

Posted by kenny at 3:26 PM 24 comments

“Soviet psych drug for dissidents given to US patients”

Soviet psychiatric drug for dissidents given to US patients

 by Jon Rappoport

It’s called Haldol. The generic name is haloperidol.

It’s classified as an “anti-psychotic.”

You’ll read that Haldol is being phased out in the US, but “PM: The Essential Resource for Pharma Marketers” reports that Haldol accounts for 5% of anti-psychotic prescriptions handed out between 2010 and 201l.

That’s 2.7 million prescriptions for Haldol. In one year, in the US.

The major and frequent adverse effects of the drug? Akathisia (the irresistible and painful impulse to keep moving, the inability to sit still), dystonia (severe muscle contractions that twist the body grotesquely), and Parkinsonism.

In short, torture.

All three of these effects can indicate motor brain damage.

Here is a quote from a article, “Haloperidol—What Is Haloperidol?”:

“There are multiple reports from Soviet dissidents, including medical staff, on the use of haloperidol in the Soviet Union for punitive purposes or simply to break the prisoners’ will. Notable dissidents that were administered haloperidol as part of their court ordered treatment were Sergei Kovalev and Leonid Plyushch.”

From the same article, there is this blockbuster statement:

“Haloperidol has been used for its sedating effects during the deportations of aliens by the United States Immigration and Customs Enforcement (ICE). During 2002-2008, federal immigration personnel used haloperidol to sedate 356 deportees. By 2008, follow[ing] court challenges over the practice, haloperidol was given to only 3 detainees. Following lawsuits, U.S. officials changed the procedure so that it is done only by the recommendation of medical personnel and under court order.”

In his landmark book, Toxic Psychiatry, Dr. Peter Breggin quotes Leonid Plyushch, a scientist and political dissenter in the USSR, who escaped to the US: “[In a Soviet prison, after dosing with a small amount of Haldol] I was horrified to see how I deteriorated intellectually, morally and emotionally from day to day. My interest in political problems quickly disappeared, then my interest in scientific problems, and then my interest in my wife and children.”

In the 1960s and 70s, Haldol was given to “angry black men” in America, after laying on the justification that they were suffering from schizophrenia.

Here is a quote from the 2012 edition of Virtual Mentor, the American Medical Association Journal of Ethics. It concerns a pharmaceutical ad that ran in the May 1974 issue of the Archives of General Psychiatry:

“…in the ad, an angry African American man shakes his fist menacingly…the text above the image…’Assaultive and belligerent?’ ‘Cooperation often begins with Haldol.’”

Yes it does. Cooperation begins with the the torture delivered by Haldol.

Warning! Do not try to withdraw from Haldol or any psychiatric drug without proper guidance. The effects of the withdrawal can be more dangerous than the drug’s effects. See, for example, the work of Dr. Peter Breggin and his advice on withdrawal, at


Jon Rappoport

The author of two explosive collections, THE MATRIX REVEALED and EXIT FROM THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at