Monthly Archives: August 2015

for the people


  • the documented history of Operation Gladio, COINTELPRO, Operation Phoenix, and Operation Mockingbird (as well as the increase in propaganda aimed at the American populace);
  • these seven components [augmented humans; automated decision making and autonomous processes; misinformation as a weapon; micro-targeting; large-scale self-organization and collective decision-making; cognitive modeling of the opponent; and the ability to understand and cope in a contested, imperfect information environment] in the tactical ground battlefield of the future;
  • the trend toward “synthetic, manufactured hyper-reality”; 
  • Google’s leased military airfield and its acquisition of military/intelligence resources; 
  • an increase in hacking by state and non-state entities; 
  • the acceleration in the development of functionally-effective and autonomous robots; 
  • the upgraded use of weaponized UAV’s in domestic airspace; 
  • the use of oligarch-employed mercenaries;
  • the recent exposure of what appears to be private access to and use of highly-classified “Top Secret/Sensitive Compartmented Information” satellite intelligence; 
  • “identity intelligence operations providing land force commanders and other decision-makers with robust and enduring “identity intel” capabilities;

How do the two items noted below fit into the above (all of which were discussed in previous entries here at The Sullen Bell) as well as the background posts and the 3+-hour-long audio (the Caravan to Midnight episode #309 ) posted here?


“WASHINGTON (Sputnik) — The US military is set to launch on Monday its fourth communications satellite that supports mobile US forces on the ground, the Navy’s space and warfare command announced in a press release.

The communications satellite, called the Mobile User Objective System (MUOS), operates like a smartphone network in space to support mobile US forces on the ground by transmitting on-demand voice and mission data on a high-speed IP-based system, the Navy explained on Friday.”

More here: 


Pentagon Teams Up with Apple, Boeing to Develop Wearable Tech

August 28th, 2015 by Kevin

Via: Reuters:

U.S. Defense Secretary Ash Carter awarded $75 million on Friday to help a consortium of high-tech firms and researchers develop electronic systems packed with sensors flexible enough to be worn by soldiers or molded onto the skin of a plane.

Carter said funding for the Obama administration’s newest manufacturing institute would go to the FlexTech Alliance, a consortium of 162 companies, universities and other groups, from Boeing , Apple and Harvard, to Advantest Akron Polymer Systems and Kalamazoo Valley Community College.

The group will work to advance the development and manufacture of so-called flexible hybrid electronics, which can be embedded with sensors and stretched, twisted and bent to fit aircraft or other platform where they will be used.

“This is an emerging technology that takes advanced flexible materials for circuits, communications, sensors and power and combines them with thinned silicon chips to ultimately produce the next generation of electronic products,” Carter said.

He was speaking at NASA’s Ames Research Center in the heart of Silicon Valley.

Posted in Dictatorship, Economy, Elite, Outsourced, Rise of the Machines, Technology, War



What are the implications for domestic surveillance, military and intel operations (overt and covert) in the continental United States (CONUS), and the domestic politics of the future?

These topics and implications ought to be addressed by:

spokespeople for the United States military; 

leaders within the OathKeepers and others in the Liberty movement; 

alternative media commentators and authors such as such as Joachim Hagopian, James Fetzer, John Whitehead, and others; 

assorted bloggers; 

investigative journalists;

Senators and Congressional representatives;

Presidential candidates;

the mainstream press. 

Note: The featured image at the top of this blog entry is a screenshot from the newly-arriving-and-still-being-tweaked desktop-computer tactical battle simulator called Ultimate General: Gettysburg

Readers may wish to divert or be diverted to a discussion about the Confederacy or its battle flag, or the ongoing efforts by some to denigrate history.

That’s not what this game or this blog entry are about

The game, available for under $15, created and designed by DarthMod for GameLabs LLC and multiple demos of which are available on YouTube, is noted here because it incorporates artificial intelligence.  

Also of note is that the game allows to some degree a few “what if?” scenarios [the two greatest might be these: “What if Stonewall Jackson hadn’t died after Chancelorsville and was on the ground at the critical moment north of Culp’s Hill?” and “What if Robert E. Lee had listened to Longstreet?”; a third one cuts to the core of battlefield intelligence.

“The game’s difficulty is accomplished only by nine distinctive AI personalities, each with their own advantages and special skills. AI Commanders are able to evaluate and gain tactical superiority in real time, reacting according to their different commanding skills, aggressively or defensively, heroically or cunningly and resemble different, competent human players. Each one of the AI generals is a formidable, non-scripted opponent ….” 

I’ve long had an amateur level of enjoyment and understanding about tabletop war gaming and took that into a strong professional interest in simulation. I saw the degree of sophistication and the quality, speed and interactivity of on-screeen imagery available within the DOD sphere over a decade ago. I can only imagine how good it is now. 

Gettysburg remains the battle that is most studied and “gamed”.  There’s a YouTube channel belonging to the US Army War College in Carlisle, PA (located, of course, a days’ cavalry ride north of the actual battlefield) which provides video lectures of this and other battles. Video “staff rides” as well as historical tours are available.  Ultimate General: Gettysburg is a publicly-available product for small dollars that offers a capacity that approximates older DOD technologies.  

Gettysburg was, of course, the deciding battle of the Civil War. 

There is some concern or fear or reality that the topics noted in this blog entry are strongly suggestive of a second American Civil War. 

Last year’s release of the game notes that they are looking for new players. 

America is looking for more people to discuss what’s going in the domestic militarization of its culture, the application of artificial intelligence to its military command and integrated surveillance/communications systems, and the ramifications of their trial and application to the American political process.

“… and that government of the people, by the people, for the people shall not perish from the earth.”

“The floor is open.”

hot waters

hot waters

August 25, 2015

“SALMON, Idaho (Reuters) – A man hiking through a national forest in Idaho suffered severe burns and his two dogs were scalded to death when both canines plunged into a hot spring and he jumped in after them to try to save his pets, authorities said on Tuesday.

More (and the implications) here: 


“… JP 1-02 defines Identity Intelligence as “The intelligence resulting from the processing of identity attributes concerning individuals, groups, networks, or populations of interest.” These outputs enable Joint Force Command directed tasks, missions, and actions to establish identity, affiliations and authorizations in order to deny anonymity to the adversary and protect Land Force and partner nation assets, facilities, and forces.

Tasks achieved using identity operations:

•Identify an unknown individual during tactical operations

•Track a person of interest

•Control physical access

•Share identity information

Providing land force commanders and other decision-makers with robust and enduring Identity capabilities are necessary to combat future threats in these complex environments…..”

More at the link and in the downloadable document: 




vision and learning

Is a Cambrian Explosion Coming for Robotics?

August 20th, 2015 by Kevin

“Gill A. Pratt will be stepping down next month from his position as a Program Manager of the Defense Advanced Research Projects Agency (DARPA), Arlington, Virginia…”

Via: American Economic Association (.pdf):

About half a billion years ago, life on earth experienced a short period of very rapid diversification called the “Cambrian Explosion.” Many theories have been proposed for the cause of the Cambrian Explosion, with one of the most provocative being the evolution of vision, which allowed animals to dramatically increase their ability to hunt and find mates (for discussion, see Parker 2003). Today, technological developments on several fronts are fomenting a similar explosion in the diversification and applicability of robotics. Many of the base hardware technologies on which robots depend—particularly computing, data storage, and communications—have been improving at exponential growth rates. Two newly blossoming technologies—“Cloud Robotics” and “Deep Learning”—could leverage these base technologies in a virtuous cycle of explosive growth. In Cloud Robotics— a term coined by James Kuffner (2010)—every robot learns from the experiences of all robots, which leads to rapid growth of robot competence, particularly as the number of robots grows. Deep Learning algorithms are a method for robots to learn and generalize their associations based on very large (and often cloud-based) “training sets” that typically include millions of examples. Interestingly, Li (2014) noted that one of the robotic capabilities recently enabled by these combined technologies is vision—the same capability that may have played a leading role in the Cambrian Explosion.

Posted in Rise of the Machines, Technology, War




[music link embedded] 




reservooirsix copy 

Escalating Volatility


long-term data storage

long-term data storage

[graphic from second article]


IBM: Digital Rat Brain

August 19th, 2015 by Kevin

Via: Quartz:

In August 2014, IBM announced that it had built a “brain-inspired” computer chip—essentially a computer that was wired like an organic brain, rather than a traditional computer. These chips are designed to work like neurons—the brain’s nerve cells. Wired reported on Aug. 17 that the team working on the brain chips recently hit a new milestone—a system has about 48 million digital neurons, which is roughly as many as found in the brain of a rodent.

Dharmendra Modha, the lead researcher on the project, recently told Quartz that he sees the future of computing being composed of two types of computers—traditional, logical computers, and synaptic brain computers—working together in a sort of left brain-right brain symbiosis to create systems that were previously unimaginable. 

“Existing computers as really fast calculators,” Modha said.

While current chips are excellent at analyzing information in sequential order, the new “neuromorphic” types of chips Modha’s team are working on are better suited to finding patterns in information—like the right side of the brain. The chips’s design, with digital neurons communicating over digital versions of synapses, result in more powerful chips that need less power to run. Traditional chips follow instructions, whereas IBM’s new chip manages “spikes”—rather like spikes in electrical activity in an organic brain. The spikes are like a single bit of information, passing between neurons. “Together, this creates this truly path-breaking architecture that can process sensory data in real time while consuming minimal energy in a mobile phone factor,” Modha said.

IBM held a bootcamp to explain to government agencies, researchers, and universities how its chips work, and how to build apps using them. As the chips aren’t wired like traditional computer chips, they needed their own programming language, which the team designed, and is now showing to the world. For these chips, “the old mindset would be a square peg round hole,” Modha said.

Posted in Covert Operations, Economy, Rise of the Machines, Surveillance, Technology, War


First Almost Fully-Formed Human Brain Grown in Lab, “For Military Research”

August 19th, 2015 by Kevin

Via: Guardian: [has multiple links and related stories]

An almost fully-formed human brain has been grown in a lab for the first time, claim scientists from Ohio State University. The team behind the feat hope the brain could transform our understanding of neurological disease.

Though not conscious the miniature brain, which resembles that of a five-week-old foetus, could potentially be useful for scientists who want to study the progression of developmental diseases. It could also be used to test drugs for conditions such as Alzheimer’s and Parkinson’s, since the regions they affect are in place during an early stage of brain development.

The brain, which is about the size of a pencil eraser, is engineered from adult human skin cells and is the most complete human brain model yet developed, claimed Rene Anand of Ohio State University, Columbus, who presented the work today at the Military Health System Research Symposium in Fort Lauderdale, Florida.

For now, the team say they are focusing on using the brain for military research, to understand the effect of post traumatic stress disorder and traumatic brain injuries.

Posted in Florida, Health, Mind Control, Rise of the Machines, Technology, War

[“… The ethical concerns were non-existent, said Anand. “We don’t have any sensory stimuli entering the brain. This brain is not thinking in any way.”

Anand claims to have created the brain by converting adult skin cells into pluripotent cells: stem cells that can be programmed to become any tissue in the body. These were then grown in a specialised environment that persuaded the stem cells to grow into all the different components of the brain and central nervous system…..”]


Oath Keepers to Arm Ferguson Residents – (2015-08-19)

“A Missouri Oath Keepers leader and his squad will test state law with a unique experiment by arming 50 blacks with AR-15 rifles while marching through downtown Ferguson, Mo”

See also:


0130 hours GMT-5 realtime coverage at Google News 




Monday, August 17, 2015

Manufactured Terrorism, Other Offshoots & Ramifications

During an hour long podcast last Sunday on host Tim Kelly’s “These Interesting Times” show, I got to cover a full range of topics in a connecting the dots discourse exposing ISIS, false flag terrorism and global enslavement. We get into the Islamic State as the latest US monster “enemy” on steroids, the propagandized cover as just another mercenary proxy force US ally created by western intelligence agencies. We also talk about the history of false flag terrorism and why the series of shootings and other so called terrorist incidents are mere staged events carried out by criminal elements within the national security state. Lastly we discuss the psychopathic agenda of the ruling elite and why mobilizing locally at the neighborhood, community and state levels is the optimal way to reverse the globalist centralist agenda towards one world government and global enslavement.

Joachim Hagopian is a West Point graduate and former US Army officer. He has written a manuscript based on his unique military experience entitled “Don’t Let The Bastards Getcha Down.”  It examines and focuses on US international relations, leadership and national security issues. After the military, Joachim earned a master’s degree in Clinical Psychology and worked as a licensed therapist in the mental health field for more than a quarter century. He now concentrates on his writing and has a blog site at He is also a regular contributor to Global Research and




Long Term Data Storage in DNA

August 17th, 2015 by Kevin

Via: Independent:

DNA has the advantage over hard drives in that it is an extremely dense form of data storage with the potential to survive for long periods of time. An external hard drive for instance is about the size of a paperback book, can store about five terabytes of data and might last 50 years.

In contrast, an ounce (28 grams) of DNA could fit on a penny, store 300,000 terabytes of memory and palaeontologists have shown the information stored in DNA recovered from fossils can survive for up to a million years.

One of the remaining problems, other than the currently exorbitant cost of making DNA for digital storage, is to be able to retrieve the information quickly and easily, which is why Dr Grass is working on a method of labelling specific places on the DNA molecule to make it easier to search.

Posted in Technology

morning light

Morning Light

Everybody I talk to is ready to leave with the light of the morning

They’ve seen the end coming down long enough to believe

That they’ve heard their last warning

Standing alone each has his own ticket in his hand

And as the evening descends I sit thinking ’bout everyman

Seems like I’ve always been looking for some other place to get it together

Where with a few of my friends I could give up the race

Maybe find something better

But all my fine dreams well though out schemes to gain the motherland

Have all eventually come down to waiting for everyman

Waiting here for everyman

Make it on your own if you think you can

If you see somewhere to go I understand

Waiting here for everyman

Don’t ask me if he’ll show baby I don’t know

Make it on your own if you think you can

Somewhere later on you’ll have to take a stand

Then you’re going to need a hand

Everybody’s just waiting to hear from the one

Who can give them the answers

Lead them back to that place in the warmth of the sun

Where sweet childhood still dances

Who’ll come along and hold out that strong and gentle father’s hand?

Long ago I heard someone say something ’bout everyman

Waiting here for everyman

Make it on your own, make it if you think you can

If you see somewhere to go I understand

I’m not trying to tell you that I’ve seen the plan

Turn and walk away if you think I am

But don’t think too badly of one who’s left holding sand

He’s just another dreamer, dreaming ’bout everyman 



[Joachim Hagopian]



Sailors, marines and naval air pilots of the two countries will be training together in combined operations in an amphibious assault exercise. 



Published on Aug 15, 2015

+ Russ Tedrake – Director, Center for Robotics, MIT Computer Science and Artificial Intelligence Lab

+ Sangbae Kim – MIT Biomimetic Robotics Lab

+ Mick Mountz – Founder, Kiva Systems

+ Gill Pratt – Program Manager, DARPA Robotics Challenge, DARPA Defense Sciences

+ Marc Raibert – Founder, Boston Dynamics

  • Radhika Nagpal – Self-organizing Systems Research and Robotics Group, Harvard University

Fab11: Making Robots 




Must read: 8 Reasons to turn your lawn into a farm and help change the world

In Puerto Rico, Water Has Been Cut Off  

Permanent Link posted by Rice Farmer @ 7:09 PM 






Political Discourse in America

[Ed.: Newspeak is upon us.  Cognitive infiltration is well underway if a questionable alternative media outlet media, citing a sherriff who supports the SPLC, can paint a group of people who swear to uphold the Constitution as being interested in overthrowing the government. 

The coup must be solidified.] 


[&&]{**}[##] [David Codrea]

{**} [David Codrea]




NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help’

August 15th, 2015 by Kevin

NSAT&T: Since 1985.

Via: ProPublica:

The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T.

While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”

AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T has given the NSA access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&T.

The NSA’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, according to the documents. The company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. And its engineers were the first to try out new surveillance technologies invented by the eavesdropping agency.

One document reminds NSA officials to be polite when visiting AT&T facilities, noting: “This is a partnership, not a contractual relationship.”

Fairview is one of its oldest programs. It began in 1985, the year after antitrust regulators broke up the Ma Bell telephone monopoly and its long-distance division became AT&T Communications. An analysis of the Fairview documents by The Times and ProPublica reveals a constellation of evidence that points to AT&T as that program’s partner. Several former intelligence officials confirmed that finding.

Flashback 2007: AT&T Invents Programming Language for Mass Surveillance

Posted in Covert Operations, Surveillance, Technology




NSA Preparing Quantum Resistant Encryption Algorithms

August 15th, 2015 by Kevin

Via: National Security Agency:

IAD recognizes that there will be a move, in the not distant future, to a quantum resistant algorithm suite. Based on experience in deploying Suite B, we have determined to start planning and communicating early about the upcoming transition to quantum resistant algorithms. Our ultimate goal is to provide cost effective security against a potential quantum computer. We are working with partners across the USG, vendors, and standards bodies to ensure there is a clear plan for getting a new suite of algorithms that are developed in an open and transparent manner that will form the foundation of our next Suite of cryptographic algorithms.

Until this new suite is developed and products are available implementing the quantum resistant suite, we will rely on current algorithms. For those partners and vendors that have not yet made the transition to Suite B algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum resistant algorithm transition.

For those vendors and partners that have already transitioned to Suite B, we recognize that this took a great deal of effort on your part, and we thank you for your efforts. We look forward to your continued support as we work together to improve information security for National Security customers against the threat of a quantum computer being developed. Unfortunately, the growth of elliptic curve use has bumped up against the fact of continued progress in the research on quantum computing, necessitating a re-evaluation of our cryptographic strategy.

Related: Microsoft: Securing Today’s Data Against Tomorrow’s Quantum Computers

Posted in Covert Operations, Surveillance, Technology




Remember that Space-War Center? In June Deputy Defense Secretary Robert Work touted a new space operations center that would serve as a backup to an existing facility at Vandenberg Air Force Base in California. Turns out the new ops center might become the primary one, Space News‘ Mike Gruss reports from the Space and Missile Defense Symposium in Huntsville, Ala. Unlike the Vandenberg center, the new one “will draw more heavily on intelligence community and allied surveillance assets,” Gruss writes. More here





I have no idea, but that’s the question Wired magazine asks, though more ominously that I put it:

Google’s Search Algorithm Could Steal the Presidency

IMAGINE AN ELECTION—A close one. You’re undecided. So you type the name of one of the candidates into your search engine of choice. (Actually, let’s not be coy here. In most of the world, one search engine dominates; in Europe and North America, it’s Google.) And Google coughs up, in fractions of a second, articles and facts about that candidate. Great! Now you are an informed voter, right? But a study published this week says that the order of those results, the ranking of positive or negative stories on the screen, can have an enormous influence on the way you vote. And if the election is close enough, the effect could be profound enough to change the outcome.

In other words: Google’s ranking algorithm for search results could accidentally steal the presidency. “We estimate, based on win margins in national elections around the world,” says Robert Epstein, a psychologist at the American Institute for Behavioral Research and Technology and one of the study’s authors, “that Google could determine the outcome of upwards of 25 percent of all national elections.”

Read the whole thing if you have time. I have no idea if there’s much to this, but beyond the techniques of “data mining” implied here, it should be filed away that Silicon Valley, and Google in particular, lean to the left, and even when not consciously left, tend toward an authoritarian elitism that is troubling. If Google could swing an election, there’s no doubt which way they’d swing it. 




]Ed.: Did you know that Google leases an old military airfield with two giant hangars just miles from its HQ?]







meta description: emotional dishonesty, parenting, childhood, dysfunctional family, misogyny, domestic violence, abusive behavior, personal development, culture, society

operating platforms

operating platforms


Ruby Ridge Deja Vu?

Idaho Sheriff Guarding U.S. Navy Veteran Against Federal Gun Confiscation

August 6th, 2015


A group of residents in northern Idaho have lined outside a U.S. Navy veteran’s house to protest claims that federal officials are planning on confiscating the man’s weapons.

Idaho Republican state Rep. Heather Scott says the Veteran Affairs office has sent a letter to John Arnold of Priest River warning him that he cannot possess or purchase firearms.

Bonner County Sheriff Daryl Wheeler says he and his deputies will stand guard against any federal attempts to remove Arnold’s guns.

[Ed.: Who has the definitive, accurate, and honest history of what happened on Ruby Ridge? might be one. 

The Wikipedia entry has obviously been tampered with by Elmer Fudd:

The ADL wrote something three years ago on the 20th anniversary which should tell you something. 


Sandy Hook, Ruby Ridge, Waco, OKC, Columbine: Conflicting Stories and Common Threads

Posted on August 25, 2014 by Bradlee Dean

“The more we do to you, the less you seem to believe we are doing it.”

– Dr. Josef Mengele, German SS officer]


Hagopian earns more demerits 


Goal 1 End poverty in all its forms everywhere

Goal 2 End hunger, achieve food security and improved nutrition and promote sustainable agriculture

Goal 3 Ensure healthy lives and promote well-being for all at all ages

Goal 4 Ensure inclusive and equitable quality education and promote lifelong learning opportunities for all

Goal 5 Achieve gender equality and empower all women and girls

Goal 6 Ensure availability and sustainable management of water and sanitation for all

Goal 7 Ensure access to affordable, reliable, sustainable and modern energy for all

Goal 8 Promote sustained, inclusive and sustainable economic growth, full and productive employment and decent work for all

Goal 9 Build resilient infrastructure, promote inclusive and sustainable industrialization and foster innovation

Goal 10 Reduce inequality within and among countries

Goal 11 Make cities and human settlements inclusive, safe, resilient and sustainable

Goal 12 Ensure sustainable consumption and production patterns

Goal 13 Take urgent action to combat climate change and its impacts*

Goal 14 Conserve and sustainably use the oceans, seas and marine resources for sustainable development

Goal 15 Protect, restore and promote sustainable use of terrestrial ecosystems, sustainably manage forests, combat desertification, and halt and reverse land degradation and halt biodiversity loss

Goal 16 Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions at all levels

Goal 17 Strengthen the means of implementation and revitalize the global partnership for sustainable development 



Published on Aug 2, 2015

A Russian crawling traction robotic system due to be trialed by the end of 2015 will be capable of being used in human-unfriendly environments, such as a battlefield, a nuclear fallout area, extreme polar night Arctic conditions or mine sweeping.

The robotic platform, called URP-01G, will weigh up to 7 tons, depending on the equipment requirements and type of armor, with dimensions of about 3.5 meters long and less than 2 meters wide. The robot will carry up to 2 tons of hardware and have a maximum speed of 40 km/h. It will remain operable after a fall of up to 2 meters.

The system is being developed by Russia’s Systemprom Concern, an integral part of the United Instrument Manufacturing Corporation. The producer promises that will be used in situations where human life is endangered, such as army scout-attack missions, police counter-terrorist operations, firefighting, post-accident clean-up after incidents at nuclear power plants, chemical and biological hazard reconnaissance, guard patrol functions and rescue operations.

Russia unveils armored multipurpose battlefield robot

Iran Press TV

In-Depth Coverage

Sun Aug 2, 2015 10:50PM

Russian scientists are developing an AI-capable armored robotic platform, which is utilizable in battlefield, nuclear fallout, and extreme arctic environments.

URP-01G, a crawling traction robotic system, was designed by Russia’s Systemprom Concern and is scheduled for factory tests by the end of the year, RT reported on Sunday.

The system is “a universal robotic complex capable of carrying various types of working payload. Onboard the complex, there will be a large variety of accessory sub-systems to maintain [electric] supply and control of the payload systems,” said Systemprom’s Science and Technology department chief Aleksey Simulin.

Based on various armor configurations and environmental requirements the platform’s weight can reach seven tons with dimensions of around 3.5 meters in length and around 2 meters in width.

With enough power and integrated command and control systems the platform can do “virtually anything,” Simulin said, adding that the robot is even capable of using payload modules from various producers.

It can be as a radio-electronic warfare unit or even a communication repeater, he added.

The system has a 10-kilometer initial range from its controlling unit but plans are present to render it autonomous with artificial intelligence, according to Systemprom Concern which is an integral part of the United Instrument Manufacturing Corporation.

“The machine is designed in such a way that it could be loaded into a military truck or could be airdropped,” added Simulin.

Systemprom is developing two versions of the platform for the Russian military, a battlefield version equipped with a heavy machine gun and grenade launchers, and a scout model equipped with a small reconnaissance unmanned aerial vehicle. 


The War of the Worlds by H.G. Wells 

in mp3 audio format for iPod and iTunes –  32kbps mono 


The D Brief (DefenseOne’s daily update) reports that Obama has nominated a new Pentagon intel chief.For months, Marcel Lettre has been waiting to succeed Michael Vickers and James Clapper as the defense undersecretary for intelligence. He’s been the “acting,” after all. President Obama sent his formal nomination on Wednesday. A defense official points out to Defense One that Lettre has served four defense secretaries, “playing key behind the scenes roles in strategic challenges and getting the Pentagon to focus more on the warfighter.” Lettre was Leon Panetta’s deputy chief of staff, and led the transition teams from Robert Gates to Panetta, and Panetta to Chuck Hagel. Before that, he was principal DASD for legislative affairs, a job he got after working as senior advisor to Senate Majority Leader Harry Reid, D-Nev., and on the House intelligence committee.”  

Lettre’s 17-minute keynote presentation at the GEOINT 2015 can be watched here: 



Why do people think computers will be alive?

by Jon Rappoport

August 7, 2015

“Because, supposedly, one digital processing unit will eventually be able to manipulate zillions of pieces of information at a faster rate than all the human brains on the planet taken together…the result will be…what? And if that digital unit is sitting in The Cloud and every human’s brain is hooked up to it, the result will be…what? A person will be able to master French in five minutes? How does that work? Information can be injected like a drug and produce instant learning? Automatically? Perhaps this is a fantasy hatched at Disney World. Two machines can rapidly exchange data and programmed methods of analysis, but it so happens that humans are not machines, even if they believe they are.” (The Underground, Jon Rappoport)

How do you think a super-brain would be constructed? I’m talking about the technocrats’ dream to build a computer that would rival and surpass the human brain, in terms of “reliable data.” And don’t forget, the plan is to somehow connect brains directly to the super-computer, so data can be downloaded into humans.

And this computer would, technocrats believe, come alive.


Because a) it can store far more information than the human brain; b) it can choose how to utilize that information to solve problems; c) it can solve those problems at lightning speed; and d) it can work on millions of problems at the same time.

Basically, technocrats believe a super-computer will be alive because it can process enormous amounts of data—as if there is a threshold beyond which the sheer volume of processing triggers an event…birth. What was merely a machine is now something More.

I’ve boiled down the above statement, in order to remove mystical fluff.

The statement looks strange, quite strange.

By way of analogy, if you could outfit a Porsche so it can run at 400mph, without need of a driver; and also view detailed traffic patterns within a radius of a hundred miles, adjusting its trajectory to minute changes; also report weather, stock market moves, headlines, and the moment-to-moment output of home surveillance sensors; also cook soup; acquire hostile targets and fire beam weapons to eliminate them; shop remotely at any of 50,000 stores; interview and pitch prospective customers to win contracts; deliver a haircut, shave, and minor surgery; write your autobiography in 5000 volumes; track ice flows at the North Pole; day-trade stocks and commodities; report the second-to-second movements and conversations of up to 100,000 people; record every event taking place on a million other planets…and do all this simultaneously… at some point the Porsche will cross over and become alive.

I’m afraid not.

It will still be a machine.

For technocrats, “information processing” is basically a religious undertaking. As if it were a form of prayer, a blessing conferred, a ritual connecting the computer to the innards of the universe.

There is no level of complexity beyond which life suddenly occurs. Complexity, in and of itself, does not initiate life.

There is no number of “correct answers” which triggers life.

At bottom, technocracy assumes quite juvenile concepts: accumulation of data automatically imparts learning; the power of information-processing bypasses the problem of false, authority-based data; enough learning eliminates the need for imagination.

Technocrats assume that mysteries about how humans learn can be solved by claiming: “well, the brain is doing something we’ll eventually understand. It’s all happening in the brain because…what else is there?”

There is the individual.


If you are your brain, an ant is a spaceship pilot.

Technocrats are making the brain into a sacred totem, a magic gizmo.

If you’re aware you have a brain, who is being aware? You’re just an artifact fed illusions about self by your brain? You aren’t there at all?

I’m an illusion writing illusions to the illusion called you?

Now, we’re getting to the core of the matter. A great many channels of propaganda, for obvious reasons, are aimed at the eradication of the concept of the individual, of self. It suits the collectivist model.

The assertion that the brain is “all there is” is a piece of political puppetry. It leads directly into the effort to “enhance” (alter, re-program, control) the brain.

The brain is not conscious.

A computer is not conscious.

A brain-computer interface is not conscious.

There is no function or system that equals consciousness.

Individual consciousness comes before any function or system.

The individual is not defined as the passive recipient of signals from the brain. The individual is intensely creative, although for various reasons he can bury that capacity to the point where he will deny he has it.

When the individual expresses his imagination and creative power intensely enough, he surpasses the habitual and passive acceptance of things as they are. And in doing so, his consciousness assumes a different level, and he sees life from a far different perspective. All this does not emanate from the brain.

Theoretically, if one had a super-computer of sufficient power, he could program it to spit out all the paintings in all the museums in the world, and all the music ever composed, and all the poems and novels and plays ever written, plus billions of new paintings and songs and poems. But…

So what?

Does that mean that human imagination is just an illusion?

If a carpenter makes a cabinet, and a computer running a machine produces the same cabinet, does that mean the carpenter is useless, and has gained nothing from his endeavor? Of course not.

Imagination is the source of reality, including the creation of computers.

Imagination is also the means by which an individual can attain a state in which he truly understands that the universe of “rigid natural laws” is actually an infinitely malleable stage play.

Technocrats want to be machines. They aren’t, but they keep trying.

If necessary, let them have their own island, where they can fiddle and diddle to their hearts’ content, without imposing their machinery on the rest of us. Call it an experiment. We run it. We watch what happens to them as they expend titanic effort to be brains and computers. We’ll call the experiment: “A Self-Selecting Cohort of Humans Who Think They’re Machines Attempt to Attain a Lowest-Common-Denominator Default Setting As If It Were Enlightenment.”

In my search for a different approach to the power of individual consciousness, I came upon the history of early Tibet, before the society hardened into a theocracy.

Several sources were particularly helpful. The work of author John Blofeld (The Tantric Mysticism of Tibet), the writings of the intrepid explorer, Alexandra David-Neel, and a quite unconventional healer, Richard Jenkins, with whom I worked in the early 1960s in New York.

Jenkins once wrote to me:

“There are people who want to tell us what consciousness should perceive. They’re blind to the electric, alive, and free nature of awareness. They’re wrapped up in content and addicted to it. Their biggest mistake is omitting the creative nature of human beings…”

That creative nature was the intense focus of the early Tibetans.

These practitioners, teachers, and students, some 1500 years ago, realized that most people viewed consciousness as an accumulator of knowledge. A searching tool, or a receiving apparatus.

Instead, the Tibetans embarked on a far more adventurous course.

Their many images (e.g., mandalas) weren’t meant as depictions of what finally exists in higher realms. Those realms were just as provisional and changeable as the physical world. You might call the multiple locales and dimensions representations of “what humans in certain Asian cultures would expect to encounter in their journeys of spirit.”

In other words, the Tibetans consciously treated their pantheons of gods and semi-gods as convincing illusions.

Several of their key exercises and techniques were all about having students mentally create these illusions in voluminous and meticulous detail. That was difficult enough, to be sure. Far more difficult was the next aspect of their practice: get rid of these creations.

Put them there; destroy them.

The Tibetans were committed to living life on the level of imagination, with all that implied.

And what does it imply?

A new psychology. A psychology of unlimited possibility:

A person’s past, his history, his problems, his relationships are all framed against the wider context of what he can imagine and then invent, create, in the world.

Living through and by imagination long enough, the individual discovers that his prior relationships are transformed. They no longer set themselves up as questions or problems.

He is operating from a platform that affords an utterly different, original, and unexpected outcome.

A psychology of possibility not only looks forward to the future, it has a reason to do so. Bringing electricity back into life depends, initially, on viewing possibilities in the space of one’s own imagination.

It may strike you at this point that our current civilization is bent on lowering possibilities; and that is true. That is the psychology of the psyop.

There is a good reason for this programming, as well as the staging of events that seem to give the programming validity. Those who aim to control the destiny of humankind want to shrink the “size of humans.” That is their intent.

A psychology of possibility would reverse that trend and expose it.

To the casual observer, the weight of this civilization and all its accoutrement seems enormous. But the creative potential of the individual outstrips that structure by light years.

How does the individual realize that fact? What is the spark that ignites his understanding? It all begins in imagination, which is the home of possibility.

Against this background, the computer is a drop in the ocean.

Jon Rappoport 


IBM is adding medical images to the health data its Watson artificial-intelligence technology can mine to help doctors make diagnoses.

The company announced Thursday morning that it was buying Merge Healthcare, a medical-imaging software company, for $1 billion. When IBM established its Watson health business in April, it began with a couple of smaller medical-data acquisitions, as well as partnerships with Apple, Johnson & Johnson and Medtronic.

Last week, IBM announced a partnership with CVS Health, the large pharmacy chain, to develop data-driven services to help people with chronic ailments like diabetes and heart disease better manage their health.

But the purchase of Merge Healthcare is both a sizable investment and an additional resource for IBM’s new Watson health unit. “We’re bringing Watson and analytics to the largest data set in health care – images,” said John Kelly, IBM’s senior vice president for research, who oversees the Watson business.

Images like CT scans, X-rays and mammograms, IBM researchers estimate, represent about 90 percent of all medical data today. The images and a patient’s electronic health records are typically separate. So, for example, a radiologist might examine thousands of patient images a day, but is looking only for abnormalities on the images themselves rather than also taking into account a person’s medical history, treatments and drug regimens.

“Watson will be able to understand both,” Kelly said.

The Watson artificial-intelligence technology has mainly been applied to analyzing text in documents and on the Web. It employed this natural-language processing capability initially in its highly publicized demonstration project – beating human champions in the question-and-answer game “Jeopardy!” in 2011.

But for the last two years, Kelly said, IBM researchers at its labs in Yorktown Heights, New York, and in San Jose, California, have been training Watson’s artificial-intelligence engine in image recognition. “We’ve been giving Watson eyes, so to speak,” he said.

Merge Healthcare, based in Chicago, specializes in software for storing, viewing and sharing medical images. Its technology is used by a wide array of health care providers and imaging-equipment makers, and its rights to use the archived images varies according to customer requirements, and state and federal health privacy rules.

Merge Healthcare is the third medical data company IBM has acquired since setting up the Watson health business. In April, it agreed to buy two startups: Explorys, a spinoff from the Cleveland Clinic, whose data on 50 million patients is used to spot patterns in diseases, treatments and outcomes; and Phytel, a maker of software to manage patient care and reduce readmission rates to hospitals. The financial details of those smaller deals, both with private companies, were not disclosed.

The Watson technology, sold as a cloud service, has been used in applications for IBM customers to help them spot patterns from the data gathered in their businesses. But health care is the first field where IBM is building an offering for an entire industry.

In the past, automated decision-support systems in medicine have often been greeted with initial optimism, only to prove disappointingly limited in practice.

But IBM is investing not only money but also some of its corporate reputation in the belief that it can be a technological leader in improving health care, with better outcomes for patients and more efficient spending for providers, insurers and patients.

In an interview on “Charlie Rose” on PBS in April, Virginia M. Rometty, IBM’s chief executive, spoke of the company’s role over the years in supplying technology for big projects, from computerizing census statistics to putting astronauts on the moon.

“Our moonshot,” Rometty said, “will be the impact we will have on health care.”

–2015 New York Times News Service 


Kristina Rus: 

What advantage can the 10 times bigger defense budget buy for the US army over Russia? 

“We have great signals intelligence, and we can listen all day long, but we can’t shut them down one-tenth to the degree they can us

Joaquin Flores:  

We saw this article and thought our readers would find it interesting.  While reinforcing the western narrative of intimate Russian involvement, it also talks about a technology gap that the US seems to be suffering in the area of jamming. This may or may not be true: during the Cold War the US often would inflate Russian military prowess in order to justify its own increased expenditures.  These resulted in windfall profits for the military industrial complex.  At the same time, the claim in itself seems possibly true.  The US has not had to focus on developing these technologies, as it had specifically targeted countries that were technologically deficient.  Now that the US is against a more formidable opponent, whether directly or through proxies, it seems to make sense that its own short-comings would be pronounced more now than at any point in the recent past.

Electronic Warfare: What US Army Can Learn From Ukraine

By Joe Gould for Defense News 12:42 p.m. EDT August 4, 2015

WASHINGTON — The US military has for weeks been training Ukrainian forces in US tactics, but the commander of US Army Europe says Ukrainian forces, who are fighting Russian-backed separatists, have much to teach their US trainers.

Ukrainian forces have grappled with formidable Russian electronic warfare capabilities that analysts say would prove withering even to the US ground forces. The US Army has also jammed insurgent communications from the air and ground on a limited basis, and it is developing a powerful arsenal of jamming systems, but these are not expected until 2023.

“Our soldiers are doing the training with the Ukrainians and we’ve learned a lot from the Ukrainians,” said Lt. Gen. Ben Hodges. “A third of the [Ukrainian] soldiers have served in the … combat zone, and no Americans have been under Russian artillery or rocket fire, or significant Russian electronic warfare, jamming or collecting — and these Ukrainians have. It’s interesting to hear what they have learned.”

Hodges acknowledged that US troops are learning from Ukrainians about Russia’s jamming capability, its ranges, types and the ways it has been employed. He has previously described the quality and sophistication of Russian electronic warfare as “eye-watering.”

Russia maintains an ability to destroy command-and-control networks by jamming radio communications, radars and GPS signals, according to Laurie Buckhout, former chief of the US Army’s electronic warfare division, now CEO of the Corvus Group. In contrast with the US, Russia has large units dedicated to electronic warfare, known as EW, which it dedicates to ground electronic attack, jamming communications, radar and command-and-control nets.

Though Ukrainian troops lack the materiel to protect themselves from this form of attack, the Ukrainian military’s institutional knowledge as a former Soviet republic will help it understand how Russia fights, and its troops will have trained to operate while being jammed, Buckhout said. That’s something US ground forces can learn.

“Our biggest problem is we have not fought in a comms-degraded environment for decades, so we don’t know how to do it,” Buckhout said. “We lack not only tactics, techniques and procedures but the training to fight in a comms-degraded environment.”

It’s not hard to see why EW is an attractive option for Russia while the eyes of the world are on it. Not only is it highly effective, but as a non-kinetic form of attack, it is harder to trace and less likely to be viewed as overt aggression, and as such, less likely to incite the ire of the international community, Buckhout said.

In a fight, Russia’s forces can hinder a target’s ability to respond to, say, an artillery attack, allowing them to fire on an enemy with impunity. Ukrainian forces would be unable to coordinate a defense against incoming rockets and missiles, or release counter battery fire.

“If your radars don’t see incoming fire, you can’t coordinate counterfire,” Buckhout said.

The US, Buckhout said, lacks a significant electronic attack capability.

“We have great signals intelligence, and we can listen all day long, but we can’t shut them down one-tenth to the degree they can us,” she said. “We are very unprotected from their attacks on our network.”

Multifunctional EW

Col. Jeffrey Church, the Army’s electronic warfare division chief, acknowledged that since the Cold War, adversaries have continued to modernize their EW capabilities, while the Army began reinvesting its capabilities for Iraq and Afghanistan. Church called the fielding of Army electronic warfare equipment the “No. 1 priority” of his job.

“The  Army must have electronic warfare capabilities that could be used to dominate key terrain on the electromagnetic spectrum against any adversary,” Church said.

A developing Army program, Multifunctional Electronic Warfare (MFEW), is intended to provide an offensive electronic attack capability, able to jam cell phone, satellite and GPS signals, said Lt. Col. Gregory Griffin, chief of the Electronic Warfare Division’s programs and requirements branch. However, the focus had been until recent years on “defensive electronic attack,” namely counter-radio-controlled-IED devices that create bubbles of protective jamming around vehicles and people, and signals collection for intelligence purposes.

The Army has demonstrated some ability to counter enemy communications, not under formal acquisitions programs but as quick-reaction capabilities. In Afghanistan, the Army used a handful of C-12 aircraft equipped with Communications, Electronic Attack, Surveillance and Reconnaissance (CEASAR) jamming pods to jam insurgent push-to-talk radios, and two fixed-site systems — Ground Auto Targeting Observation/Reactive (GATOR) jammer and Duke V2 EA — to jam radios and repeater towers.

On an ad hoc basis, troops in Afghanistan used GATOR — conceived to protect forward operating bases — to suppress repeater towers while on patrol or training Afghan forces, providing themselves the freedom to maneuver while denying communications to potential enemies, Griffin said.

“It was unlimited capability, limited by the number of systems,” Griffin said. “Honestly, we just did not have enough to support the demand that was in the Army.”

The Army’s electronic warfare cadre, which totals 813 officers, warrant officers and noncommissioned officers,  has wielded more theory than hardware, except when deployed. In garrison, it was common for these troops to be assigned other jobs, leading to the joke that EW stands for “extra worker” — though this is changing as the Army ramps up its electronic warfare materiel strategy, Griffin said.

MFEW, due to reach initial operating capability in 2023 and full operating capability in 2027, is intended to offer a suite of powerful, sophisticated sensors and jammers for in the air, on ground vehicles and in fixed locations. The Army is due to consider a capability design document for the “air large” capability, akin to Caesar, potentially for a C-12 or a MQ-8 Fire Scout drone. Last year it tested the Networked Electronic Warfare Remotely Operated (NERO), a jamming pod attached to the Gray Eagle drone.

The Defense Department in March set up a panel to address its electronic warfare shortfalls, which, Griffin said, has generated discussion about accelerating the timeline for MFEW.

‘Future of War Is in the Ukraine’

Forces with US Army Europe have for the last 10 weeks been training three battalions of Ukraine Ministry of the Interior troops, known as Ukraine’s national guard. The second cycle of that training was paused so that troops could participate in a combined multinational exercise, underway through early August, and it will resume and conclude with the third battalion in August.

The Ukrainian military — which is in the midst of a reform and modernization effort even as it wars with Russia — has shown interest in creating a noncommissioned officer corps modeled after that of the US, Hodges said. Ukrainian military officials charged with reform efforts visited Washington in recent weeks and, in a press conference, acknowledged the challenges of corruption and shoddy soldier equipment, which they sought to correct.

But Konstiantyn Liesnik, an adviser to the Defense Ministry’s reform office and head of its working group for logistics and procurement, noted the US military’s experience in recent years has concerned insurgents in Iraq and Afghanistan, not a powerful, organized and well-equipped adversary like Russia.

The future of war is in the Ukraine, and I think in this case our experience is very important to US personnel how war should be in this century and next century,” Liesnik said.

Beyond electronic warfare, Russian anti-aircraft rockets have prevented Ukrainian forces from using their airplanes, and it has had to consider personal armor that can protect against artillery.

Ukrainian forces interacting with US soldiers have spoken frankly about their difficulties, something Hodges said he saw firsthand when the chief of the Ukrainian Army, at an event attended by senior leaders from other countries, discussed with a group of officers  his force’s battlefield experiences and shortcomings.

“I have been very impressed with the earnestness of the Ukrainian military to fix their shortcomings and improve their capabilities,” Hodges said. “It was one of the most professional things I have ever seen of any army, and they were very candid: We were not prepared to do this, and here’s how we adapted.”

Ukrainian troops have not only had to adapt to Russian electronic warfare, but its artillery and unmanned aerial systems. The Ukrainian Army official, Hodges said, also detailed how unprepared Ukrainian troops have been for the number of casualties and their treatment.

The US provided Ukraine with lightweight counter-mortar radars in November 2014, which Hodges said its troops have “used in ways we have not used it ourselves, and made it more effective than we thought was possible.” These troops, he said, would be savvy enough to operate a more advanced radar with a wider range — which the Pentagon is reportedly in talks to send.

An official at the US State Department said the administration believes there is no military resolution to this crisis, but Ukraine has the right to defend itself. To that end, it announced a $75 million Defense Department aid package in March that includes 30 armored Humvees, 200 other Humvees, radios and unarmed surveillance drones, night-vision devices and medical supplies.

The 173rd Airborne Brigade Combat Team, based in Vicenza, Italy, had been training Ukrainian troops in western Ukraine, in battlefield medicine, casualty evacuation, and tactical tasks such as anti-roadside bomb techniques and basic battlefield movement.

Saber Guardian, a command post exercise which rotates between Ukraine, Romania and Bulgaria, this year was linked to Rapid Trident, an annual field training exercise held in Ukraine, according to the US Army. The combined exercise, which includes roughly 1,800 soldiers from 18 different nations, is meant to focus on defensive operations to ensure a safe and secure environment within the operating environment.

This year’s scenario consists of a host nation that comes under attack. The nation is able to defend itself at great cost. A multinational force is sent to assist the host nation and the challenge is to bring together and train a multinational brigade, which would then be sent to assist the host nation in its defense. 


The media entity that originally started at the Parker House Hotel in Boston (the originator of Boston creme pie), the one which published the war propaganda of a poem eventually put to music, the one founded by Ralph Waldo Emerson, Henry Wadsworth Longfellow, James Russell Lowell, Moses Phillips and Oliver Wendell Holmes, Sr., has grown and branched out.

Atlantic Media is dedicated to equipping opinion leaders with breakthrough ideas and original insights. Its powerful brands, including The Atlantic, Government Executive, National Journal,  Quartz, and Defense One reach leaders across all sectors—consumer, business, media, and government. Strategically designed to meet the unique needs of this community, Atlantic Media’s innovative portfolio of digital, print, event, social, and mobile platforms engages an influential audience of over 30 million worldwide each month.” The chairman and owner of Atlantic Media has the bona fides of a Fulbright Scholarship, a degree from Swarthmore, an MBA from Harvard Business, a law degree from Georgetown University, and memberships in the Council on Foreign Relations and the Manila-based Child Protection Network. Defense One, whose mission is to inform, elevate and challenge the national discourse, is produced by Government Executive Media Group. It’s “D Brief” today reports that the newest naval aircraft carrier, the one that forever memorializes the name of a Member of Congress around whom pivoted the Warren Commission and Watergate, has been occupied by over 200 seaman, “the first to live aboard the $13 billion, first-in-class ship”. Reporter Molly O’Toole noted “fear and posturing” during Monday’s “Voters First Forum” in New Hampshire for Republican Presidential candidates: “China is taking over the South China Sea. Russia’s threatening the unity of Europe and NATO. Iran is on the verge of acquiring not just a nuclear weapon—but as Senator [Ted] Cruz pointed out—the ability to deliver it to the United States,” Sen. Marco Rubio, R-Fla., said. “Radical jihadists have now spread across multiple continents across the world, and some are even located here within the United States.” “The U.S. Air Force wants to upgrade its MQ-9 Reapers so they can be sent into non-permissive airspace with a wider array of weaponry.”

This piece stands out and is called to our attention (check out the bios of the authors).  “When one steps back to consider the demands of global reassurance, [these] conclusions stand out. First, easing fully the anxieties of our allies would require a level of resources that would be very difficult to muster and even harder to maintain. Region by region, it is easy to see how the U.S. could add more military capabilities, sell more weapons, or get more diplomatically engaged. But the challenge for President Obama and his successor will be to do all this simultaneously, especially when the resources for reassurance are tighter. Just as the world is asking for more, the dynamic in Washington will leave us with less. Some reforms may be necessary – closing some outdated facilities overseas, or reducing the size of the U.S. Army – but that will make reassurance harder. The next President will have to be more creative as he or she seeks to balance competing demands in a way that is effective, realistic and sustainable. A good start would be a comprehensive review of U.S. force posture that would weigh allies’ requests for reassurance against America’s core national security interests and its resource constraints.  Second, the defense budget must rise….”

Finally, “a new study from researchers at William & Mary and the University of Wisconsin “asked an identical set of questions about war to a random sample of Americans and academics who study international relations,” and “found that in almost all situations, the public is more likely to support wars than the experts are.” Vox puts the study in context over here.”


The next day’s issue of the D Brief, after a discussion about the “subtle escalation of rhetoric” surrounding China’s sandy expansionism, offered up (among lots of other stuff) these tidy little nuggets:

Little-known fact: Military-to-military contacts between the U.S. and China have been shooting up since 2010, and are on pace to reach historic highs, Defense One‘s Kedar Pavgi reports. In the past, mil-to-mil contacts have been among the first ties severed when things went south between Washington and Beijing. So what’s behind the recent sustained momentum? And how will the mil-to-mil relationship help shape the course of national security? Pavgi explains, along with a chart that traces two decades of the U.S.-China mil-to-mil relationship. All that begins, here.

Is the roughly 375-member National Security Council a Kafka-esque maze of bureaucracy? Despite National Security Advisor Susan Rice’s efforts to trim staff numbers, the NSC’s size “has come to symbolize an overbearing and paranoid White House that insists on controlling even the smallest policy details, often at the expense of timely and effective decisions,” the Washington Post‘s Karen DeYoung reports…. “Any little twerp from the NSC can call a meeting and set the agenda,” groaned another anonymous State Department official. Read the rest in DeYoung’s Wednesday #LongRead.

ICYMI—the Islamic State or al-Qaeda: who poses a bigger threat to the U.S.? The Obama administration’s chief intelligence and counterterrorism officials can’t agree, and “This is not an academic argument,” writes Eric Schmitt of the New York Times. [No, it’s a budgetary argument.]

What are they up to? [Ed.: Emphases added.] “The Silicon Valley office — located next to a military airfield now leased by Google — is part of a broader push by the Pentagon to find technologies that will give troops an edge on the battlefield of the future. Among the technologies being eyed are in the areas of robotics, additive manufacturing, big data analytics and cyber…But tech firms have been skeptical of the Pentagon’s outreach for numerous reasons..” Read Weisgerber’s report in full here.


Apparently they read this stuff over in Russia too: 


I offer up this dip into the media world of Atlanticism out of my own curiosity about what the world is saying and to allow the reader the option of doing the same.

I look askance (a word which appeared the other day on that top-flight NWO game show Jeopardy) at much of this stuff, or at least hold it at arms’ length long enough to let some of the propaganda fall out to the floor, but every once in a while there might be a nugget.

One example would be the idea that they have time to pick out their favorite moment from Jon Stewart’s Daily Show: “ this one from February 2014 when then-Defense Secretary Chuck Hagel announced the Army would be shrinking to levels not seen since World War II”.

And, given the availability of Bill Blunden’s book “Behold a Pale Farce:” Cyberwar, Threat Inflation, and the Malware Industrial Complex”, this offering, “brought to you by IBM”, the same company which has developed cognitive and machine learning (and pioneered efforts to create aa numerical approach to entering people’s names into a data base in preparation for their detention in concentration camps):

Preparing Your Agency for Next Gen Cyber Attacks with Next Gen Investigation Tools

While malware is a serious threat, the bigger threats are the programmers, insiders, criminals, and nation states that write the malicious code behind the cyber attacks. So what can you and your agency do to help prepare for a next gen attack? Get Cyber Threat Intelligence.

Learn more here.

And here: 

“… China is accused of obtaining personal information about 20 million Americans, federal employees and contractors, and that’s a big deal. But the US’s NSA, according to documents leaked by whistleblower Edward Snowden, processes 20 billion phone calls and internet messages every day. The NSA’s unofficial motto for years has been “Collect It All.”

The article notes that the US has its own “intelligence operations inside China”—but pretends these are purely defensive, referring to “the placement of thousands of implants in Chinese computer networks to warn of impending attacks.”

Sanger was one of the main journalists covering the joint US/Israeli cyberattack against Iran known as Stuxnet; one of his stories went out under the headline, “Obama Ordered Wave of Cyberattacks Against Iran.” But here, in this context, he writes, “The United States has been cautious about using cyberweapons or even discussing it.”


 Or here:

China has warned the US to “think twice” before lashing out at Beijing due to unfounded hacking accusations, cautioning that it is “strongly determined to protect the safety of its cyber space and reserves all rights to counter any outside threats and intrusions”, the Chinese news agency Xinhua reported on Monday.

China has responded to recent threats issued by the US that it would strike back at Beijing for the theft of personal information from the databases of the US Office of Personnel Management (OPM), which allegedly originated in China.

It cautions that the US is “on the brink of making another grave mistake in the name of protecting cyber security”.

“The United States, which made a mistake last year when it brought false charges against Chinese officers, should not repeat the mistake by taking retaliatory measures against China over the OPM incident,” read an op-ed article in New China, the English language website of its state news agency Xinhua.

“Just like it protects its territorial sovereignty and integrity, China is strongly determined to protect the safety of its cyber space and reserves all rights to counter any outside threats and intrusions. It will meet any form of political or economic retaliation with corresponding countermeasures,” it further warns.

Read more:


I don’t want to suggest to the reader, however, that I am picking on one particular media outlet. I’ve simply opened up another window. I still take more than an occasional look at; you can read  about their editorial team here.  The word “breaking”, I gather, is a new term, not a defense term. One article almost seems to be a press release from one of their advertisers, the fourth-largest defense contractor.

Another notes a RAND study “found that the public has persistently and over time lost its positive views of any one service compared to the other.

The report says the “most striking and important trend in American public opinion toward the military services is the convergence in views between 1949 and 2014.” After World War II the public thought the Air Force and air power had played a huge role in forcing Japan to surrender through the fire bombing of Tokyo and the delivery of the two atomic bombs.”

Which probably explains why this next article notes that nuclear weapons are “relatively affordable”. 

“… eliminating air-dropped weapons — “would save you about $20 billion dollars over the next five years,” but “for comparison…, implementing just one proposal from the Military Compensation and Retirement Modernization Commission — an adjustment to TRICARE health benefits for military dependents and retirees — would save $26 billion over the same period.”

““Nukes are affordable” is probably not a popular position on the eve of the 70th anniversary of Hiroshima….” note the author who graduated summa cum laude from Harvard (BreakingDefense’s deputy editor), but the editorial decision team summoned up enough hubris chutzpah moxie complete lack of sensitivity to run anyway; its authors, who look young enough to still be in college, are assuredly MAD.

“When two adversaries both possess nuclear weapons, they cannot undertake aggressive actions without risking escalation to a nuclear exchange.” One wonders if they’ve read the appendix to Sir B.H. Liddell-Hart’s book “Strategy” which suggests that the MAD doctrine serves merely to enable the kinds of brush-fire or “proxy” wars with which the globe has been plagued for the last seventy years, some of which have arguably involved at least depleted uranium weaponry (which destroys the genetic future of people in those zones) if not tactical nukes or white phosphorus incendiaries.


The State Duma speaker says it’s necessary to create an international court to look into the nuclear attacks on Hiroshima and Nagasaki in 1945, noting that America’s modern policy has borrowed a lot from the cynical approach of its former leaders.

Speaking at a roundtable meeting in the Moscow Institute of International Relations on Wednesday, Sergey Naryshkin said the US nuclear bombings of Hiroshima and Nagasaki were not necessary for the military campaign against Japan. He added that the thousands of civilians killed by the atomic bombs had not been involved in crimes of the Japanese military.

READ MORE: ‘Third World War would be last for humanity’ – Duma speaker

The lower house speaker suggested that the participants of the roundtable imagine the situation in which Nazi Germany completely destroyed the population of one or several European cities, for example by means of chemical weapons.

Would this have been included in charges pressed during the Nuremberg trial? Of course, it would!” he said.

Naryshkin also accused the modern leaders of the United States of intent to silence the real reasons behind the nuclear bombings.

The current US authorities want to conceal not the tragedy of Hiroshima and Nagasaki, this would be impossible, but the hypocrisy and cynicism of their leaders of these times. This happens because such behavior casts a shadow on the modern American policies which, of course, retain the legacy of exceptionalist ideology and the position of own infallibility and arrogant force.”

Deputy Duma Speaker Andrey Isayev supported the initiative, saying that there were enough grounds for such step. Isayev also noted that the single and universally-recognized legal assessment of the 1945 attacks was the most important thing that could be done by the international tribunal. 


People who came to help the victims during the first 5-10 days died. 




Here’s another that I haven’t gotten terribly familiar with, and here is one of their articles that may be pertinent to the future of the continental terrain:

Population-Centric Military Strategy 

going to rain today

going to rain today






Five years before he was shot to death in the failed terrorist attack in Garland, Texas, Nadir Soofi walked into a suburban Phoenix gun shop to buy a 9-millimeter pistol.

At the time, Lone Wolf Trading Co. was known among gun smugglers for selling illegal firearms. And with Soofi’s history of misdemeanor drug and assault charges, there was a chance his purchase might raise red flags in the federal screening process.

Inside the store, he fudged some facts on the form required of would-be gun buyers.

What Soofi could not have known was that Lone Wolf was at the center of a federal sting operation known as Fast and Furious, targeting Mexican drug lords and traffickers. The idea of the secret program was to allow Lone Wolf to sell illegal weapons to criminals and straw purchasers, and track the guns back to large smuggling networks and drug cartels.

Instead, federal agents lost track of the weapons and the operation became a fiasco, particularly after several of the missing guns were linked to shootings in Mexico and the 2010 killing of U.S. Border Patrol Agent Brian Terry in Arizona.

Soofi’s attempt to buy a gun caught the attention of authorities, who slapped a seven-day hold on the transaction, according to his Feb. 24, 2010, firearms transaction record, which was reviewed by the Los Angeles Times. Then, for reasons that remain unclear, the hold was lifted after 24 hours, and Soofi got the 9-millimeter.

As the owner of a small pizzeria, the Dallas-born Soofi, son of a Pakistani American engineer and American nurse, would not have been the primary focus of federal authorities, who back then were looking for smugglers and drug lords.

He is now.

In May, Soofi and his roommate, Elton Simpson, burst upon the site of a Garland cartoon convention that was offering a prize for the best depiction of the prophet Muhammad, something offensive to many Muslims. Dressed in body armor and armed with three pistols, three rifles and 1,500 rounds of ammunition, the pair wounded a security officer before they were killed by local police.

A day after the attack, the Department of Justice sent an “urgent firearms disposition request” to Lone Wolf, seeking more information about Soofi and the pistol he bought in 2010, according to a June 1 letter from Sen. Ron Johnson (R-Wis.), chairman of the Senate Homeland Security Committee, to U.S. Atty. Gen. Loretta Lynch.

Though the request did not specify whether the gun was used in the Garland attack, Justice Department officials said the information was needed “to assist in a criminal investigation,” according to Johnson’s letter, also reviewed by The Times.

The FBI so far has refused to release any details, including serial numbers, about the weapons used in Garland by Soofi and Simpson. Senate investigators are now pressing law enforcement agencies for answers, raising the chilling possibility that a gun sold during the botched Fast and Furious operation ended up being used in a terrorist attack against Americans.

Among other things, Johnson is demanding to know whether federal authorities have recovered the gun Soofi bought in 2010, where it was recovered and whether it had been discharged, according to the letter. He also demanded an explanation about why the initial seven-day hold was placed on the 2010 pistol purchase and why it was lifted after 24 hours.

Asked recently for an update on the Garland shooting, FBI Director James B. Comey earlier this month declined to comment. “We’re still sorting that out,” he said.

Officials at the Justice Department and the FBI declined to answer questions about whether the 9-millimeter pistol was one of the guns used in the Garland attack or seized at Soofi’s apartment.

It remains unclear whether Soofi’s 2010 visit to Lone Wolf is a bizarre coincidence or a missed opportunity for federal agents to put Soofi on their radar years before his contacts with Islamic extremists brought him to their attention.

Though Islamic State militants have claimed to have helped organize the Garland attack, U.S. officials are still investigating whether Soofi and Simpson received direct support from the group or were merely inspired by its calls for violence against the West.

Comey suggested that the attack fits the pattern of foreign terrorist groups indoctrinating American citizens through the Internet. He referred to it as the “crowdsourcing of terrorism.”


[&&]{**}[##]  [&&]{**}[##]

Methods of Media Manipulation

By Michael Parenti 


Pentagon Employing Top Scientists to Improve US Propaganda Machine 


PRESIDENT BARACK OBAMA has signed an executive order authorizing the creation of new supercomputing research initiative called the National Strategic Computing Initiative, or NSCI. Its goal: pave the way for the first exaflop supercomputer—something that’s about 30 times faster than today’s fastest machines.

Supercomputers are at the heart of a huge number of important scientific and defense research projects. They’re used by aerospace engineers to model planes and weapons, and by climatologists to predict the the near-term impact of hurricanes and the long-term effects of climate change.

Researchers involved in the White House’s Precision Medicine initiative believe exaflop speed supercomputers could aid the creation of personalized drugs, while the European Commission’s Human Brain Project hopes they will help unlock the secrets of the human brain.

Several government agencies, most notably the Department of Energy, have been deeply involved in the development of supercomputers over the last few decades, but they’ve typically worked separately. The new initiative will bring together scientists and government agencies such as the Department of Energy, Department of Defense and the National Science Foundation to create a common agenda for pushing the field forward.

The specifics are thin on the ground at the moment. The Department of Energy has already identified the major challenges preventing “exascale” computing today, according to a fact sheet released by the government, but the main goal of the initiative, for now, be to get disparate agencies working together on common goals.




Echoing through the back hallways of the web are the video of the outburst at the sentencing portion of the trial of the biological mother of James Holmes and its apparently-interlinked claims that the child was ‘adoped by the FBI’. 

HuffingtonPost has a lengthy article on his upbringing from back in 2012. Todd McGhee is noted in the article and was also interviewed very early on in the media coverage of the Boston Marathon bombings. He also spoke at the March 2015 joint dinner meeting between the Boston chapters of ASIS and IAHSS on the topic of ISIS (you in the back corner, stop laughing).  

It’s an industry and its apparently been very industrious.

All of this has the odor of a very complex psy-op whose tentacles reach into alternative and mainstream alternative media that are as mysterious as the facts. 

Previously posted in one of my blogs were the reports from Wayne Madsen (with my own remarks attached) about the Aurora shooting, the apparent perp, his background and the suspicions it raised with regard to mind control. 

Speaking of mind control, it looked for a long time like it was going to rain today:  



MK-Ultra and Mind Control

Here are six links, the first of which was tucked away for a rainy day.  It thundered repeatedly overhead today and so…

Words of caution are necessary. 

Caveat lector (or viewer)(or mouse operator).

I don’t know who the people are behind this web site.

The web site (represented by this sampling of six links but which contains an archive with lots more) contains an enormous amount of material in the form of photos and graphics, links, and videos.

I have not tested all those links to see if they still function. Nor have I yet watched any of those videos to see if they are still viable on some server somewhere. Some of the links have hundreds of comments. Many of the links are downloads, pdf’s, Scribd documents, etc.

Because of the nature of the topic, the material may be upsetting and it may contain triggers for those who have been exposed to even a low-level of conditioning, programming, etc. Numerous blessings are included within the material to which I add my own. 

I am generally aware of this topic and this type of information. As noted, I have had what I regard as brush-by exposure to purveyors, practitioners, victims etc. I am still examing and exploring those links, experiences, etc.

This is only one web site. There are dozens more. Much of this material is archived safely on inaccessible servers throughout the world. I am aware of at least five other major sites tracking this kind of information, providing support for survivors, etc. There are also countless books.

Here are the links:

This is the link I tucked away for further exploration. To my surprise, the link was still active and I was able to explore and find the other five. The last tweet, however, appears to be from three years ago.  [This is the main link.] [This is the most recent post.] [This is the most recent “journal” or collection of material.]  [If you are new to the topics, this is a basic primer.] 


Is any of this believable? That’s for you to decide. And then there is the question of further commitment and action. 

We take the morally indefensible and bring it to the surface where it and its practitioners can be exposed.