Tag Archives: NSA

nexus

nexus

OPINION: Media have chance to look in mirror as Trump continues attacks

By Walter Bird Jr. – February 18, 2017

It is beyond easy to assail Donald Trump’s position on the news media. His war with “the enemy” is filled with so much bombast, so much rhetoric, it takes neither a Pulitzer Prize winner nor a seasoned journalist to note just how ridiculous his war is.

It also takes attention away from a very real and disturbing truth: some in the media, long before Donald Trump every became president, were cheaters. Liars. Fabricators. Plagiarists.

To suggest the media as a whole have been beacons of purity, whose sole mission is to inform the people who consume their product, is beyond foolish. It is flat out wrong.

And if we in the media ourselves cannot hold ourselves accountable for the myriad ways in which we have sullied our profession, then did we not, in some way, create the juice for the anti-media venom now flowing so freely from our 45th president?

It is not to say the entire news media universe indulges in “fake news.” But the list of utter falsehoods initially passed off as truths by many respected media sources is, indeed, not a short one. Worse still, in some of the cases, there were very real and tragic consequences of the false reporting.

•As Dale Jacquette wrote in, “Journalistic Ethics: Moral Responsibility in the Media,” Newsweek, in May 2005 published a story in which it was reported that soldiers at Guantanamo Bay, Cuba, had placed copies of the Koran on toilets, in one cases flushing a copy down. That story turned out to be baseless and unsubstantiated. The damage, however, had been done. Several Islamic protests broke out. In Afghanistan, Jacquette wrote, citing the Associated Press, 14 people died in one such protest.

•Jayson Blair in 2003 resigned as a reporter at The New York Times after it was found he had fabricated or plagiarized in a number of his stories. He has done nothing of relevance as a writer since, outside of a memoir that fared rather poorly.

•In 2004, the Boston Globe published pictures from a porn web site, and passed them off as images of U.S. soldiers raping Iraqi women. The photos were quickly exposed as fake.

•Janet Cooke won the Pulitzer Prize for her 1980 story in The Washington Post about an 8-year-old heroin addict. The day after she received her award, she admitted she had made up the youthful subject of the story, “Jimmy.”

•Dan Rather reported in 2004 that George W. Bush had failed to fulfill his service to the National Guard. His report was based on documents that were later found to have been forged. Rather ended up retiring a year earlier than planned.

•Doris Kearns Goodwin was found to have plagiarized several parts of her bestselling book, “The Fitzgeralds and the Kennedys.”

•Former Boston Globe columnist Mike Barnicle resigned in 1998 after some of the facts and words in two of his columns came into question. In one, a few lines were similar to those in George Carlin’s 1997 book, “Brain Droppings.”

(Note: some of the above information was culled from the Huffington Post and Boston Globe.)

It is fair to say the “fake” in “fake news” was there long before Trump became president. What the new president has done, however, is sought to lump almost all mainstream news media into one giant pot of falsehoods and corruption. He has found among his base a rabid distrust of the media; rather, he has put together a recipe that has cooked up a hatred and disdain for many of us in the media.

The unpleasant reality is Trump is not wrong in that there are more than just the above examples of fraudulent journalism and misplaced ethics. One need not go too far back in time to see that. Donna Brazile resigned from CNN last year after leaked emails showed she had fed debate questions ahead of time to Hillary Clinton.

Where Trump falters is his blanket generalization of “fake news.” He is hardly the first to paint with a broad brush, but just as there were serious consequences as a result of some of those who committed the cardinal sin of plagiarizing or making up stories, so too is there the risk of serious damage to the public’s right to know by Trump’s no-holds-barred verbal assault on the press.

Trump would be wise to tone down the rhetoric, stop with the generalizations and not try to divide the news media and the very people they have been keeping informed for years.

At the same time, many of us in the media would do just as well to come down off our high horses, look in the mirror and admit that, on many occasions, we have lived in glass houses.

The very fate of journalism and the continued and unfettered dissemination of information to the public may well hang in the balance.

https://worcestermag.com/2017/02/18/opinion-media-chance-look-mirror-trump-continues-attacks/49475 

[&&]{**}[##]

Why Americans Don’t Trust Main Stream Media

THE MSM MUST DEAL WITH A PRESIDENT WHO CALLED THEM OUT ON THEIR “FAKE NEWS”

February 20, 2017 Frosty Wooldridge

The MSM is becoming irrelevant as more and more Americans turn to alternative media to get the real story on issues that concern them

After 30 years of slanted, biased and false news reporting from major players in the Main Stream Media (MSM) —Americans turn toward more reliable sources—such as citizen journalists writing for Internet news services.  Social media features speakers like British speaker Pat Condell telling hungry audiences what’s really happening with the Muslim invasion of Europe.

Whistleblowers such as Julian Assange and Edward Snowden exposed deeper layers of fraud and deception continuing in Washington DC and in Europe.

One look at the talking heads at CBS, NBC, ABC, NPR and CNN shows untenable bias and false reporting on multiple levels.  In the past 20 months, prominent news anchors pretty much cut off their noses to spite their faces.  Their election polls showed Hillary Clinton winning the White House while major pundits predicted Trump’s collapse.

Pelley, Muir and Holt downplayed Islamic terrorism in America by reporting “lone wolf” Muslims as mentally ill or suffering from depression—when in fact, those terrorists followed the dictates of the Quran while exacting violence.  Similar examples abound everyday in the USA and Europe, i.e., rapes, honor killings, female genital mutilation, gay killings and arranged marriages.

For the past 15 years, the anchors at NBC, CBS, ABC, NPR told the American people that 11,000,000 illegal aliens inhabited the United States.  After extensive research as to U.S. Census Bureau data by Ann Coulter in her book, Adios Amigo, she noted 31,000,000 (million) illegal migrants living, working and violating America’s laws.

All the while, Dr. Steven Camarata, researcher for Center for Immigration Studies,www.cis.org, discovered that 500,000 illegal aliens jump America’s borders annually.  His research shows the illegal population in America exceeds anything the mainstream press purports.

Additionally, while the MSM hounded General Flynn out of a job as National Security Advisor, they decline to report on 22 Islamic terrorist training camps operating in America from New York through Michigan and on to Oregon and California. Would you like to hear about these training camps concerning your family’s protection?

Host Bill O’Reilly reports explicit footages of 22 Islamic jihadist training camps in the USA in this video:

100% Video Proof of Radical Muslim Terrorist Training Camps in America – Bill O’Reilly

https://www.youtube.com/watch?v=M37z1MBvT7k [six minutes]

[Ed.: Note too that the video is posted on the channel of Forida Guns Classified.]

Clarion Project: http://www.clarionproject.org 

 

You would never hear about those terror camps from NBC, CBS, ABC, NPR or CNN.  Those camps train terrorists to kill you and your family— in your own country.  Of course, once they strike and kill countless Americans in Orlando, San Bernardino, Chattanooga or Ohio State, the MSM reports the aftermath of the massacres.

Notice the Boston Marathon bombings:  those two Tsarnaev brothers enjoyed major support from other Muslims and the imams at their Boston Mosque, but the MSM assured that no one knew anything about the brothers’ support team.

“Opposition to Islam is no different than opposition to communism, fascism, Nazism or any other belief system that seeks to control human conduct. Every American/Canadian (indeed, every human being on Earth) has basic human rights — the unalienable rights to life, liberty, and property — and every belief system with principles that violate these rights is unjust. In short, anti-communism, anti-fascism, and anti-Islam are the logical justice, whether in America/Canada or anywhere else in the world.” ~ Paul Pauker ~

While we face upwards of 31 million illegal aliens costing taxpayers $113,000,000,000.00 (billion) annually across 15 federal agencies, the MSM refuses to report on thousands of rapes, house break-ins, homicides, drug gangs, shoplifting into the millions of dollars daily, drunk driving deaths and sex-trafficking across this nation.  Do you recall MSM regularly reporting on widespread crime committed by illegal migrants?  Of course not!

Have you seen investigative journalism exposing employers of illegals such as: Chipotle’s, McDonald’s, Marriott Hotels, Tyson Chicken, Hormel Foods, Holiday Inns and restaurants because somebody pays big bucks to keep the laws from being enforced?  How much money keeps mouths shut?

As to the Syrian refugees, you won’t hear anything other than “puff” pieces by 60 Minutes or David Muir or Lester Holt, but average communities like Lewiston, Maine and Minneapolis, Minnesota all the way to Twin Falls, Idaho face massive financial and sociological impact in their cities via violent, illiterate and welfare-abusing immigrants.

Much like the false bias in the election polls showing Trump losing the presidential election, after only 30 days in office, Chuck Todd of “Meet the Press” gleefully showed 79 percent stressed democrats and 59 percent stressed republicans as to our nation’s situation.  Chuck Todd, pretending to be a journalist, demonstrates his bias at every juncture.

On “Face the Nation”, John Dickerson repeatedly reported chaos in the White House by choosing “they” and “other sources” to depict Trump as inept.  Reince Priebus, chief of staff, sternly corrected Dickerson for giving unnamed sources for such false and hollow stories.

“The real disunity is between a doomed Status Quo and those willing to deal with reality. Right now those willing to deal with reality are few, but they have the distinct advantage of reality on their side, while the Status Quo has only propaganda, artifice, phony political theater and empty promises….Every attempt to lead the public toward the realization that the present is unsustainable will be crushed by a frantic assault of the fiefdoms, cartels and players who will lose power and profits when the Status Quo crumbles under its own weight.”—Charles Hugh Smith “The Shape of Things To Come”

The MSM continues its directive to undermine, delegitimize and destabilize the Trump administration.  A report this past week indicated that Trump suffers from mental illness.  Intriguing statement, when in fact, President Trump accomplished ten major items of his campaign promises.

President Trump’s first four weeks proved the most active in recent history:

▪Executive order to stop Muslim immigration loaded with jihadists coming into America. Creating extreme vetting.

▪Stopped the Trans Pacific Partnership.

▪Put coal miners back to work.

▪Met with three top foreign leaders.

▪Started the process for building a wall to stop illegal drugs and migrants from crossing U.S. border with Mexico.

▪Increased the Border Patrol by 5,000 agents to stop the $50,000,000,000.00 (billion) in drugs crossing our borders annually from Mexico and 500,000 illegal migrants.

▪Negotiated with top CEOs to keep jobs in America.

▪Created confidence so much so the Stock Market stands at its highest in months.

▪Started rounding up and deporting criminal illegal aliens as promised.

▪Moved to replace the failed Obamacare health system that would have collapsed within several years.

▪Carried through on his promise to stop funding cities who maintain sanctuary status for illegal alien migrants.

▪Selected Neil Gorsuch for Supreme Court Judge.

When you look at the big picture, Congress and the ruling elite of DC enjoyed so much easy corruption for the past 30 years, they think it’s normal to make big bucks and cheat American taxpayers out of money and jobs. They failed to enforce our immigration laws, never passed beneficial trade laws for American jobs and did little for African-Americans as to jobs, education and training.

The elites in Congress failed to stop 350,000 anchor babies being born annually at our expense for food, housing and K-12 education.  They cried job creation while pumping 1,000,000 legal and 500,000 illegal immigrants into our country annually without rescinding the 1965 Immigration Reform Act.  Meanwhile, they jumped our federal debt to $19.5 trillion.

All of a sudden, they must deal with a president who called them out on their “fake news”.   To reporter Jim Acosta of CNN, “…very fake news.”  The American people call out those in the MSM to report the facts to us or find yourselves irrelevant.

This is what the press said about President Lincoln in 1861:  “Had we any respect for Mr. Lincoln, as a man, or as President-elect of the United States…the final escapade by which he reached the capital would have utterly demolished it…. He might have entered Willard’s Hotel with a headspring and a summersault, and the clown’s merry greeting to Gen. Scott. Here we are! And we should care nothing about it, personally. We do not believe the Presidency can ever be more degraded by any of his successors than it has by him, even before his inauguration.” November 21, 1861

In reality, Trump proves himself a workaholic for the American people.  When they tore down Lincoln, he remained steadfast for the immense mayhem of those times.  President Trump remains dedicated to the task ahead.

© Copyright by Frosty Wooldridge, 2017. All rights reserved.

http://www.capitolhilloutsider.com/americans-dont-trust-main-stream-media/ 

[&&]{**}[##]

https://gse.gmu.edu/assets/images/tr/triangle200.jpg

[Ed.: Triangulate the convergence of Doug Valentine’s remarks on Operation Phoenix, the George Webb video series with respect to Dyncorp, and the articles on Palantir et al in “Nexus”.]

[&&]{**}[##]

HOW PETER THIEL’S PALANTIR HELPED THE NSA SPY ON THE WHOLE WORLD

Sam Biddle

February 22 2017, 6:06 a.m.

DONALD TRUMP HAS inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.

Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.

Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.

“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.

https://www.youtube.com/watch?v=yAJv0EvHt_I

Palantir government 3.0

https://www.youtube.com/watch?v=yAJv0EvHt_I 

Despite all the grandstanding about lucrative, shadowy government contracts, co-founder Karp does not shy away from taking a stand in the debate over government surveillance. In a Forbes profile in 2013, he played privacy lamb, saying, “I didn’t sign up for the government to know when I smoke a joint or have an affair. … We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people we’d like to be.” In that same article, Thiel lays out Palantir’s mission with privacy in mind: to “reduce terrorism while preserving civil liberties.” After the first wave of revelations spurred by the whistleblower Edward Snowden, Palantir was quick to deny that it had any connection to the NSA spy program known as PRISM, which shared an unfortunate code name with one of its own software products. The current iteration of Palantir’s website includes an entire section dedicated to “Privacy & Civil Liberties,” proclaiming the company’s support of both:

Palantir Technologies is a mission-driven company, and a core component of that mission is protecting our fundamental rights to privacy and civil liberties. …

Some argue that society must “balance” freedom and safety, and that in order to better protect ourselves from those who would do us harm, we have to give up some of our liberties. We believe that this is a false choice in many areas. Particularly in the world of data analysis, liberty does not have to be sacrificed to enhance security. Palantir is constantly looking for ways to protect privacy and individual liberty through its technology while enabling the powerful analysis necessary to generate the actionable intelligence that our law enforcement and intelligence agencies need to fulfill their missions.

It’s hard to square this purported commitment to privacy with proof, garnered from documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSA’s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSA’s arsenal.

According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSA’s own admission its “widest reaching” program, capturing “nearly everything a typical user does on the internet.” A subsequent report by The Intercept showed that XKEYSCORE’s “collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.

But how do you make so much data comprehensible for human spies? As the additional documents published with this article demonstrate, Palantir sold its services to make one of the most powerful surveillance systems ever devised even more powerful, bringing clarity and slick visuals to an ocean of surveillance data.

PALANTIR’S RELATIONSHIP WITH government spy agencies appears to date back to at least 2008, when representatives from the U.K.’s signals intelligence agency, Government Communications Headquarters, joined their American peers at VisWeek, an annual data visualization and computing conference organized by the Institute of Electrical and Electronics Engineers and the U.S. National Institute of Standards and Technology. Attendees from throughout government and academia gather to network with members of the private sector at the event, where they compete in teams to solve hypothetical data-based puzzles as part of the Visual Analytics Science and Technology (VAST) Challenge. As described in a document saved by GCHQ, Palantir fielded a team in 2008 and tackled one such scenario using its own software. It was a powerful marketing opportunity at a conference filled with potential buyers.

In the demo, Palantir engineers showed how their software could be used to identify Wikipedia users who belonged to a fictional radical religious sect and graph their social relationships. In Palantir’s pitch, its approach to the VAST Challenge involved using software to enable “many analysts working together [to] truly leverage their collective mind.” The fake scenario’s target, a cartoonishly sinister religious sect called “the Paraiso Movement,” was suspected of a terrorist bombing, but the unmentioned and obvious subtext of the experiment was the fact that such techniques could be applied to de-anonymize and track members of any political or ideological group. Among a litany of other conclusions, Palantir determined the group was prone to violence because its “Manifesto’s intellectual influences include ‘Pancho Villa, Che Guevara, Leon Trotsky, [and] Cuban revolutionary Jose Martí,’ a list of military commanders and revolutionaries with a history of violent actions.”

The delegation from GCHQ returned from VisWeek excited and impressed. In a classified report from those who attended, Palantir’s potential for aiding the spy agency was described in breathless terms. “Palantir are a relatively new Silicon Valley startup who are sponsored by the CIA,” the report began. “They claim to have significant involvement with the US intelligence community, although none yet at NSA.” GCHQ noted that Palantir “has been developed closely internally with intelligence community users (unspecified, but likely to be the CIA given the funding).” The report described Palantir’s demo as “so significant” that it warranted its own entry in GCHQ’s classified internal wiki, calling the software “extremely sophisticated and mature. … We were very impressed. You need to see it to believe it.”

The report conceded, however, that “it would take an enormous effort for an in-house developed GCHQ system to get to the same level of sophistication” as Palantir. The GCHQ briefers also expressed hesitation over the price tag, noting that “adoption would have [a] huge monetary … cost,” and over the implications of essentially outsourcing intelligence analysis software to the private sector, thus making the agency “utterly dependent on a commercial product.” Finally, the report added that “it is possible there may be concerns over security — the company have published a lot of information on their website about how their product is used in intelligence analysis, some of which we feel very uncomfortable about.”

Click on link:

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/Palantir_Solution-1487021968-1000×773.png

A page from Palantir’s “Executive Summary” document, provided to government clients.

However anxious British intelligence was about Palantir’s self-promotion, the worry must not have lasted very long. Within two years, documents show that at least three members of the “Five Eyes” spy alliance between the United States, the U.K., Australia, New Zealand, and Canada were employing Palantir to help gather and process data from around the world. Palantir excels at making connections between enormous, separate databases, pulling big buckets of information (call records, IP addresses, financial transactions, names, conversations, travel records) into one centralized heap and visualizing them coherently, thus solving one of the persistent problems of modern intelligence gathering: data overload.

A GCHQ wiki page titled “Visualisation,” outlining different ways “to provide insight into some set of data,” puts succinctly Palantir’s intelligence value:

Palantir is an information management platform for analysis developed by Palantir Technologies. It integrates structured and unstructured data, provides search and discovery capabilities, knowledge management, and collaborative features. The goal is to offer the infrastructure, or ‘full stack,’ that intelligence organizations require for analysis.

Bullet-pointed features of note included a “Graph View,” “Timelining capabilities,” and “Geo View.”

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/BehaviouralAnalysis_IA11-1487274060-1000×750-1487705651-1000×710.png

A GCHQ diagram indicates how Palantir could be used as part of a computer network attack.

Under the Five Eyes arrangement, member countries collect and pool enormous streams of data and metadata collected through tools like XKEYSCORE, amounting to tens of billions of records. The alliance is constantly devising (or attempting) new, experimental methods of prying data out of closed and private sources, including by hacking into computers and networks in non-Five Eyes countries and infecting them with malware.

A 2011 PowerPoint presentation from GCHQ’s Network Defence Intelligence & Security Team (NDIST) — which, as The Intercept has previously reported, “worked to subvert anti-virus and other security software in order to track users and infiltrate networks” — mentioned Palantir as a tool for processing data gathered in the course of its malware-oriented work. Palantir’s software was described as an “analyst workspace [for] pulling together disparate information and displaying it in novel ways,” and was used closely in conjunction with other intelligence software tools, like the NSA’s notorious XKEYSCORE search system. The novel ways of using Palantir for spying seemed open-ended, even imaginative: A 2010 presentation on the joint NSA-GCHQ “Mastering the Internet” surveillance program mentioned the prospect of running Palantir software on “Android handsets” as part of a SIGINT-based “augmented reality” experience. It’s unclear what exactly this means or could even look like.

Above all, these documents depict Palantir’s software as a sort of consolidating agent, allowing Five Eyes analysts to make sense of tremendous amounts of data that might have been otherwise unintelligible or highly time-consuming to digest. In a 2011 presentation to the NSA, classified top secret, an NDIST operative noted the “good collection” of personal data among the Five Eyes alliance but lamented the “poor analytics,” and described the attempt to find new tools for SIGINT analysis, in which it “conducted a review of 14 different systems that might work.” The review considered services from Lockheed Martin and Detica (a subsidiary of BAE Systems) but decided on the up-and-comer from Palo Alto.

Palantir is described as having been funded not only by In-Q-Tel, the CIA’s venture capital branch, but furthermore created “through [an] iterative collaboration between Palantir computer scientists and analysts from various intelligence agencies over the course of nearly three years.” While it’s long been known that Palantir got on its feet with the intelligence community’s money, it has not been previously reported that the intelligence community actually helped build the software. The continuous praise seen in these documents shows that the collaboration paid off. Under the new “Palantir Model,” “data can come from anywhere” and can be “asked whatever the analyst wants.”

 

Along with Palantir’s ability to pull in “direct XKS Results,” the presentation boasted that the software was already connected to 10 other secret Five Eyes and GCHQ programs and was highly popular among analysts. It even offered testimonials (TWO FACE appears to be a code name for the implementation of Palantir):

[Palantir] is the best tool I have ever worked with. It’s intuitive, i.e. idiot-proof, and can do a lot you never even dreamt of doing.

This morning, using TWO FACE rather than XKS to review the activity of the last 3 days. It reduced the initial analysis time by at least 50%.

Enthusiasm runs throughout the PowerPoint: A slide titled “Unexpected Benefits” reads like a marketing brochure, exclaiming that Palantir “interacts with anything!” including Google Earth, and “You can even use it on a iphone or laptop.” The next slide, on “Potential Downsides,” is really more praise in disguise: Palantir “Looks expensive” but “isn’t as expensive as expected.” The answer to “What can’t it do?” is revealing: “However we ask, Palantir answer,” indicating that the collaboration between spies and startup didn’t end with Palantir’s CIA-funded origins, but that the company was willing to create new features for the intelligence community by request.

On GCHQ’s internal wiki page for TWO FACE, analysts were offered a “how to” guide for incorporating Palantir into their daily routine, covering introductory topics like “How do I … Get Data from XKS in Palantir,” “How do I … Run a bulk search,” and “How do I … Run bulk operations over my objects in Palantir.” For anyone in need of a hand, “training is currently offered as 1-2-1 desk based training with a Palantir trainer. This gives you the opportunity to quickly apply Palantir to your current work task.” Palantir often sends “forward deployed engineers,” or FDEs, to work alongside clients at their offices and provide assistance and engineering services, though the typical client does not have access to the world’s largest troves of personal information. For analysts interested in tinkering with Palantir, there was even a dedicated instant message chat room open to anyone for “informally” discussing the software.

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/Screen-Shot-2017-02-15-at-12.48.10-PM-1487180948-540×536.png

The GCHQ wiki includes links to classified webpages describing Palantir’s use by the Australian Defence Signals Directorate (now called the Australian Signals Directorate) and to a Palantir entry on the NSA’s internal “Intellipedia,” though The Intercept does not have access to copies of the linked sites. However, embedded within Intellipedia HTML files available to The Intercept are references to a variety of NSA-Palantir programs, including “Palantir Classification Helper,” “[Target Knowledge Base] to Palantir PXML,” and “PalantirAuthService.” (Internal Palantir documents obtained by TechCrunch in 2013 provide additional confirmation of the NSA’s relationship with the company.)

One Palantir program used by GCHQ, a software plug-in named “Kite,” was preserved almost in its entirety among documents provided to The Intercept. An analysis of Kite’s source code shows just how much flexibility the company afforded Five Eyes spies. Developers and analysts could ingest data locally using either Palantir’s “Workspace” application or Kite. When they were satisfied the process was working properly, they could push it into a Palantir data repository where other Workspace users could also access it, almost akin to a Google Spreadsheets collaboration. When analysts were at their Palantir workstation, they could perform simple imports of static data, but when they wanted to perform more complicated tasks like import databases or set up recurring automatic imports, they turned to Kite.

Kite worked by importing intelligence data and converting it into an XML file that could be loaded into a Palantir data repository. Out of the box, Kite was able to handle a variety of types of data (including dates, images, geolocations, etc.), but GCHQ was free to extend it by writing custom fields for complicated types of data the agency might need to analyze. The import tools were designed to handle a variety of use cases, including static data sets, databases that were updated frequently, and data stores controlled by third parties to which GCHQ was able to gain access.

This collaborative environment also produced a piece of software called “XKEYSCORE Helper,” a tool programmed with Palantir (and thoroughly stamped with its logo) that allowed analysts to essentially import data from the NSA’s pipeline, investigate and visualize it through Palantir, and then presumably pass it to fellow analysts or Five Eyes intelligence partners. One of XKEYSCORE’s only apparent failings is that it’s so incredibly powerful, so effective at vacuuming personal metadata from the entire internet, that the volume of information it extracts can be overwhelming. Imagine trying to search your Gmail account, only the results are pulled from every Gmail inbox in the world.

 

MAKING XKEYSCORE MORE intelligible — and thus much more effective — appears to have been one of Palantir’s chief successes. The helper tool, documented in a GCHQ PDF guide, provided a means of transferring data captured by the NSA’s XKEYSCORE directly into Palantir, where presumably it would be far easier to analyze for, say, specific people and places. An analyst using XKEYSCORE could pull every IP address in Moscow and Tehran that visited a given website or made a Skype call at 14:15 Eastern Time, for example, and then import the resulting data set into Palantir in order to identify additional connections between the addresses or plot their positions using Google Earth.

Palantir was also used as part of a GCHQ project code-named LOVELY HORSE, which sought to improve the agency’s ability to collect so-called open source intelligence — data available on the public internet, like tweets, blog posts, and news articles. Given the “unstructured” nature of this kind of data, Palantir was cited as “an enrichment to existing [LOVELY HORSE] investigations … the content should then be viewable in a human readable format within Palantir.”

Palantir’s impressive data-mining abilities are well-documented, but so too is the potential for misuse. Palantir software is designed to make it easy to sift through piles of information that would be completely inscrutable to a human alone, but the human driving the computer is still responsible for making judgments, good or bad.

A 2011 document by GCHQ’s SIGINT Development Steering Group, a staff committee dedicated to implementing new spy methods, listed some of these worries. In a table listing “risks & challenges,” the SDSG expressed a “concern that [Palantir] gives the analyst greater potential for going down too many analytical paths which could distract from the intelligence requirement.” What it could mean for analysts to distract themselves by going down extraneous “paths” while browsing the world’s most advanced spy machine is left unsaid. But Palantir’s data-mining abilities were such that the SDSG wondered if its spies should be blocked from having full access right off the bat and suggested configuring Palantir software so that parts would “unlock … based on analysts skill level, hiding buttons and features until needed and capable of utilising.” If Palantir succeeded in fixing the intelligence problem of being overwhelmed with data, it may have created a problem of over-analysis — the company’s software offers such a multitude of ways to visualize and explore massive data sets that analysts could get lost in the funhouse of infographics, rather than simply being overwhelmed by the scale of their task.

If Palantir’s potential for misuse occurred to the company’s spy clients, surely it must have occurred to Palantir itself, especially given the company’s aforementioned “commitment” to privacy and civil liberties. Sure enough, in 2012 the company announced the formation of the Palantir Council of Advisors on Privacy and Civil Liberties, a committee of academics and consultants with expertise in those fields. Palantir claimed that convening the PCAP had “provided us with invaluable guidance as we try to responsibly navigate the often ill-defined legal, political, technological, and ethical frameworks that sometimes govern the various activities of our customers,” and continued to discuss the privacy and civil liberties “implications of product developments and to suggest potential ways to mitigate any negative effects.” Still, Palantir made clear that the “PCAP is advisory only — any decisions that we make after consulting with the PCAP are entirely our own.”

What would a privacy-minded conversation about privacy-breaching software look like? How had a privacy and civil liberties council navigated the fact that Palantir’s clientele had directly engaged in one of the greatest privacy and civil liberties breaches of all time? It’s hard to find an answer.

Palantir wrote that it structured the nondisclosure agreement signed by PCAP members so that they “will be free to discuss anything that they learn in working with us unless we clearly designate information as proprietary or otherwise confidential (something that we have rarely found necessary except on very limited occasions).” But despite this assurance of transparency, all but one of the PCAP’s former and current members either did not return a request for comment for this article or declined to comment citing the NDA.

The former PCAP member who did respond, Stanford privacy scholar Omer Tene, told The Intercept that he was unaware of “any specific relationship, agreement, or project that you’re referring to,” and said he was not permitted to answer whether Palantir’s work with the intelligence community was ever a source of tension with the PCAP. He declined to comment on either the NSA or GCHQ specifically. “In general,” Tene said, “the role of the PCAP was to hear about client engagement or new products and offerings that the company was about to launch, and to opine as to the way they should be set up or delivered in order to minimize privacy and civil liberties concerns.” But without any further detail, it’s unclear whether the PCAP was ever briefed on the company’s work for spy agencies, or whether such work was a matter of debate.

There’s little detail to be found on archived versions of Palantir’s privacy and civil liberties-focused blog, which appears to have been deleted sometime after the PCAP was formed. Palantir spokesperson Matt Long told The Intercept to contact the Palantir media team for questions regarding the vanished blog at the same email address used to reach Long in the first place. Palantir did not respond to additional repeated requests for comment and clarification.

A GCHQ spokesperson provided a boilerplate statement reiterating the agency’s “longstanding policy” against commenting on intelligence matters and asserted that all its activities are “carried out in accordance with a strict legal and policy framework.” The NSA did not provide a response.

Anyone worried that the most powerful spy agencies on Earth might use Palantir software to violate the privacy or civil rights of the vast number of people under constant surveillance may derive some cold comfort in a portion of the user agreement language Palantir provided for the Kite plug-in, which stipulates that the user will not violate “any applicable law” or the privacy or the rights “of any third party.” The world will just have to hope Palantir’s most powerful customers follow the rules.

Documents published with this article:

GCHQ VisWeek 2008 Conference Report

Palantir Executive Summary

NDIST Cyber Defence

Mastering the Internet

The Tale of Two Sources

TWO FACE on GCHQ Wiki

XKEYSCORE Helper Notes

SDSG Integrated Analytics Workshop

https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/ 

[##]

See also the previous entries here at The Sullen Bell which have discussed Palantir. 

See also

from February 2014

Peter Thiel’s Newest Obsession: Nanotechnology

https://www.entrepreneur.com/article/231660 

[&&]{**}[##]

WAYNE MADSEN | 24.02.2017 | OPINION

The Three Trump Administrations

Foreign and national defense ministries around the world, as well as embassies in Washington, DC, are struggling to ascertain who is actually in charge of the U.S. government one month after Donald Trump was sworn in as president of the United States. It is a fair question, considering the conflicting statements issuing forth from the White House, State Department, and the Pentagon.

Suffice to say, there are, essentially, three Trump administrations, all with varying degrees of power.

The first administration and the most visibly powerful is Trump’s inner circle. At the present time, this consists of Trump, chief strategist Stephen Bannon, Trump daughter Ivanka Trump and her husband Jared Kushner, special assistant to the president Stephen Miller, and Attorney General Jeff Sessions. Although Bannon came to Trump from the presidential campaign of Senator Ted Cruz, the former Breitbart News publisher has become a virtual «Svengali», influencing Trump on foreign and domestic policies.

The second administration represents the establishment Republicans who endorsed Trump after he secured the Republican presidential nomination. This circle includes White House chief of staff Reince Priebus, the former Republican National Committee chairman, and Sean Spicer, Trump’s press secretary who had the same job at the Republican National Committee under Priebus. Trump’s counselor and former presidential campaign manager Kellyanne Conway, who, like Bannon, came from the Cruz campaign, funds herself often on the outside of the Trump inner circle and more in the company of establishment Republicans Priebus and Spicer. Priebus and Conway, and, to a lesser extent, Spicer, are the eyes and ears of congressional Republicans like Senate Majority Leader Mitch McConnell and Speaker of the House of Representatives Paul Ryan in the White House.

The third administration represents the longtime «deep state» interests and is a combination of George W. Bush/Ronald Reagan administration neoconservative activists and powerful Wall Street and Houston/Dallas oil business moguls traditionally linked to Republican politics. While the neocons and business interests do not agree on much, they are taking advantage of the disorganization of the Trump administration to secure their own power centers. Recently, officials of this «third» administration were seen vying for influence and stature at the 2017 Munich Security Conference.

It is clear that the third Trump administration is the one that hopes to take the reins of power if either Trump is forced out of the presidency as a result of impeachment and conviction or ill-health. Representing the international status quo, the third Trump administration, represented chiefly by Vice President Mike Pence and Defense Secretary James Mattis, was very active in promoting NATO, the European Union, and continued sanctions on Russia at Munich. The statements by Pence and Mattis ran counter to the opinions previously aired by Trump. Secretary of State Rex Tillerson, opting not to attend the Munich conference, attended a G20 foreign ministers’ summit in Bonn held before the gathering in Munich. This leg of the Trump triad is the one with which the global elites feel most comfortable.

Tillerson, a Texas native and friend of the Bush family and former Secretary of State James Baker, showed that the neocons continue to have clout inside the Trump administration when he dared propose Elliott Abrams, an Iran-contra felon from the Reagan administration, to be his deputy Secretary of State. Abrams’s campaign rhetoric, in which he criticized Trump, resulted in the president vetoing Abrams for the State Department’s number two position. But that did not stop another arch-neocon, the never-confirmed former U.S. ambassador to the UN John Bolton, from being considered for number two at State and, more recently, as Trump’s national security adviser.

Tillerson’s ambassador to the United Nations, former South Carolina Governor Nikki Haley, has publicly condemned Russia over the Ukraine situation, even though Trump has indicated he wants a rapprochement with Russia. The third Trump administration is full of similar contradictions, with paleo-conservatives like Tillerson willing to hire on neocons like Abrams. Other deep state players within this third leg of the Trump triad include Central Intelligence Agency director Mike Pompeo, who wasted no time traveling to Turkey and Saudi Arabia to pay homage to the vested political interests of both nations, and Director of National Intelligence director-designate, former Senator Dan Coats of Indiana, a longtime friend of Pence.

Former national security adviser Michael Flynn, the former director of the Defense Intelligence Agency and a retired three-star general, was never a member of the Trump inner circle. In fact, Flynn was closer to the neocons worming their way into the Trump administration. Flynn was the co-author of the book titled «The Field of Flight: How We Can Win the Global War Against Radical Islam and Its Allies», with one of the most dangerous neocons around, Michael Ledeen, an Iran-contra co-conspirator of Abrams and another neocon vying for influence in the Trump White House, Frank Gaffney.

Ensconced with Pence and Mattis in Munich were the two most hawkish Republican senators who would have Trump adopt even more drastic sanctions against Russia: Senators John McCain, the chairman of the Senate Armed Services Committee, and fellow committee member Lindsey Graham. McCain used Munich to not only bash Russia but also Trump, while his close friend Graham promised that 2017 would be «the year of kicking Russia in the ass.» The mere fact that McCain and Graham were permitted to represent at Munich a hawkish policy at loggerheads with that of Trump, while Pence remained silent and Mattis championed America’s commitments to NATO and the EU, shows the world that the United States government now speaks through different voices. Joining McCain and Graham to reinforce U.S. defense and financial commitments was Senate Foreign Relations Committee chairman Bob Corker and former NATO commander and proposed Trump national security adviser General David Petraeus, previously disgraced by a sex scandal.

Munich provided the third Trump administration with a platform from which to reinforce the «world order» that Trump campaigned against. Governments that had donated handsomely to the Clinton Foundation and made no secret of their abhorrence of Trump as a candidate, were on hand in Munich to warmly embrace Pence and Mattis. Among those in attendance were Saudi Arabia’s wily anti-Iranian foreign minister and former ambassador in Washington Adel bin Ahmed al-Jubeir, Saudi Arabia’s more slyer former intelligence chief Prince Turki al-Faisal bin Abdulaziz, Qatari foreign minister Shaikh Mohammed bin Abdulrahman al-Thani and defense minister Khalid bin Mohammed al-Attiyah, Bahraini foreign minister Shaikh Khalid bin Ahmed bin Mohammed al-Khalifa, Kuwaiti deputy prime minister Shaikh Khaled al Jarrah al-Sabah, and Moroccan royal cabinet minister Youssef Amrani and the Moroccan king’s counselor André Azoulay. Undoubtedly, these Arab potentates will soon bestow their largesse upon members and corporate contrivances of the Trump family.

Pence and Mattis also rubbed shoulders at Munich with such influential anti-Trump personages as Bono, the U-2 rock band celebrity; former U.S. Secretary of State Madeleine Albright; former Homeland Security Secretary Michael Chertoff; Ohio Governor John Kasich; former Defense Secretary William Cohen; Microsoft founder Bill Gates; Woodrow Wilson Center director Jane Harman; Robert Kagan of the Brookings Institution and his wife and chief architect of the 2014 Ukrainian Coup Victoria Nuland; former Senator Joseph Lieberman; International Rescue Committee director David Miliband; Nebraska Republican Senator Ben Sasse; ranking Democrat on the House Intelligence Committee Adam Schiff; and Frank Wisner, Jr., a longtime U.S. diplomat with deep state ties and the son of Frank Wisner, Sr., the CIA’s original crafter of «fake news», CIA propaganda disguised as actual news.

And if Trump’s avid anti-globalist supporters believe that their president is «draining the swamp» of their bitterest of foes, they might be surprised that Pence and Mattis were in the company in Munich of Lady Lynn Forester de Rothschild, Trilateral Commission deputy chairman Michael Fuchs, and global political troublemaker George Soros.

The third Trump administration of Pence, Mattis, and Tillerson signaled the world that the actual Trump administration, the one representing America’s «deep state», will continue to run the U.S. government. This is the part of the Trump administration that will continue to conspire with the world’s elite at places like Bilderberg, Davos, Bohemian Grove, Cernobbio, APEC, and G-7. Trump has not «drained the swamp» as he promised. He has merely joined the reptiles already in it. In fact, Eric and Donald Trump Jr., who now head up the Trump Organization, recently opened a luxurious Trump golf course in Dubai. That set the ground for a very amiable meeting at the G20 meeting in Bonn between Tillerson and his counterpart from the United Arab Emirates. The French have a saying for Trump’s «revolution» – «plus ca change, plus c’est la meme chose» or «the more things change, the more they stay the same».

http://www.strategic-culture.org/news/2017/02/24/three-trump-administrations.html 

[&&]{**}[##]

https://www.youtube.com/watch?v=pni_kDv9BsU 

Published on Feb 9, 2016

In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal government. Don’t miss out on learning her methodologies in spotting deception.

Speaker:

Susan Carnicero, Author of Spy the Lie and founding partner, Qverity

[&&]{**}[##]

US Military Megacity Pacification and Assault Planning Videos (for educational purposes of course)

Posted on February 24, 2017 by willyloman

by Scott Creighton

[&&]{**}[##]

https://imgs.xkcd.com/comics/location_reviews.png 

[&&]{**}[##]

https://www.youtube.com/channel/UCrQ-wHKVi0JDWjQGcuoYnew 

[Ed.: I’ve caught up through Day 123; have you?.

If you need to go back to go forward, you can start at the bottom of investigative pointillism.]

[&&]{**}[##]

From 2008:

“U.S. warfighters are finding that human intelligence, or HUMINT, is more important than ever in the war on terrorism. The Defense HUMINT Management Office (DHMO) is working to produce new technologies to aid the warfighter in the quest for effective HUMINT collection and dissemination.

Trench coats have given way to optical collectors.

Intelligence technology research normally focused on electronics-related disciplines increasingly is being applied to improving human intelligence capabilities. These capabilities, which range from intelligence collection to distribution, define human intelligence activities in the war on terrorism.

Human intelligence, or HUMINT, is increasing in importance as allied forces in Iraq and Afghanistan deal with terror networks moving about the general populace. Preventing attacks on innocent civilians in Southwest Asia as well as the West may depend on being able to gather information using HUMINT assets and techniques.

The U.S. Defense Department has organized its Defense HUMINT Management Office (DHMO) to support HUMINT operators in the field. Much of this support includes tapping conventional and nontraditional sources for technologies that aid HUMINT collection, processing and dissemination.

Drew Bewick is the chief of technology tradecraft at the DHMO. Bewick’s office represents the HUMINT elements in the military services, the combatant commands and the Defense Intelligence Agency (DIA). He is tasked with finding new HUMINT technologies and capabilities and speeding them to the field in the war on terrorism.

“To win this war on terrorism and to find people, HUMINT is first among equals,” Bewick declares.

The DHMO has four organizational pillars: plans and policies; operations and assessments; training, including training standards and career paths; and technology tradecraft. For its activities, the office has two focus areas. One is to develop key technologies that enable the department to penetrate difficult targets. The other is to integrate HUMINT data into the joint and coalition intelligence, surveillance and reconnaissance (ISR) picture. This requires correlating HUMINT data with that of signals intelligence (SIGINT), geospatial intelligence (GEOINT) and measurement and signatures intelligence (MASINT), for example. How the HUMINT data helps the commander in the field is a key criterion for generating the right knowledge, Bewick allows.

The DHMO is aiming to improve collection, processing and dissemination equally as it strives to apply technologies for better HUMINT. For example, Bewick relates that as DHMO personnel visit the commands in the field, they often find that HUMINT technology tool sets are nothing more than stubby pencils and paper. Even improving how HUMINT data is reported will have a major effect. “You didn’t see James Bond writing too many reports,” he analogizes. “Yet, HUMINTers in the Defense Department spend an awful lot of time writing reports.” Providing new capabilities to help them report data is vital to the success of HUMINT, he declares.

“If it were possible to develop only capabilities for HUMINT collectors in the field, that would be awesome—that would help them do their job of penetrating difficult targets,” he continues. “But equally, to help them share that data with whomever needs it is just as important.”

HUMINT comprises a broad spectrum of activities and data. The result is a story that often is in the form of textual information, Bewick offers. That may change as intelligence takes new forms. The office has established a limited partnership with In-Q-Tel (SIGNAL Magazine, April 2001) that Bewick describes as “terrific.” Through In-Q-Tel, the DHMO invested in the video game company Destineer, based in Plymouth, Minnesota. The DHMO is seeking modeling and simulation for teaching tactics, techniques and procedures, especially for integrating HUMINT data. Finding people involves social network analysis, but when HUMINT data is correlated with other data, the information that results is no longer textual.

The DHMO’s team works with In-Q-Tel and with partners in other corporations and government agencies to find the talent that can offer solutions to its technology needs. Many entrepreneurs have good ideas that the DHMO wants to leverage.

“What we really do is save the lives of good ideas,” he declares.

Bewick continues that his office wanted to adapt the In-Q-Tel approach to its own operating environment. So it added a venture capital model that focuses on understanding the warfighter. The DHMO formed working groups of a user board, and these groups are queried when the office encounters a potential solution. These users may offer a way of altering the innovative technology to make it more effective.

The DHMO’s efforts already have borne fruit. One technology that has been accelerated is the mobile immersive video-ground, or MID-G. It comprises a 360-degree full-motion video capability that can collect visual information from all directions simultaneously. Bewick offers that it helps with mission planning for attacking terrorist objectives. “There are places that we are asked to go to that are dangerous; we only want to go once and get as much information as we can. It is incredibly valuable, when operationalizing our human capabilities, to get an understanding of what it feels and looks like on the ground from the human perspective.

“You couldn’t do this before.”

The DHMO currently is testing MID-G and transferring it to the field. Bewick notes that the office has driven its commercial cost down by a factor of 10 in only eight months. He adds that for every dollar invested by the office through In-Q-Tel, anywhere from $8 to $11 are matched by the venture capital community. That sustainment by the commercial marketplace is vastly different from the traditional government contracting model, he points out.

 

Among the vital HUMINT technologies that the DHMO is speeding to the field are handheld Arabic-to-English translation devices.

Another key technology comes from Palantir Technologies Incorporated, Palo Alto, California. The founders of this company are the original developers of PayPal, the online payment system acquired by eBay. Having developed algorithms to detect fraud, they have been asked by the DHMO to develop a means to discover information about a social network—largely to help find people.

This touches upon the vitally important task of understanding network threats. It encompasses how people are connected and through what kind of structures, as well as how a group stays cohesive.

On a more esoteric level, some technology basic research can lead to improvements in HUMINT collection capabilities. One important area is microfluidic lenses. Imagery collection, from ubiquitous picture cell phones to specialized advanced sensing systems, largely uses mechanical lenses. A small microfluidic lens can change its shape to be telescopic and zoom in on a distant object. The DHMO has found several companies working on this technology, which may first emerge commercially in picture cell phones.

But an emerging technology need not have an immediate battlefield impact to serve the defense HUMINT community. “Our measure of success is not that everything we make an investment in has a high mission impact,” Bewick offers. “If it were, my concern would be that we were not setting ourselves up for the next conflict.

“So the metric I have is that 50 percent of our portfolio should be high mission impact, and 50 percent of our portfolio should involve taking some risks. Our CENTCOM [U.S. Central Command] executors don’t want to hear what we’ll be giving them two years from now; they want to know what we have that will help them now. But the hypothesis is that while we have to do that, we also have to get ready for the next kinds of challenges that we will have to face,” he concludes.

Among the risky technologies is identity management. Bewick cites the need for a mobile DNA fingerprinting capability to ensure proper identification of terrorists among innocents. This can make the difference between detaining a terrorist and inadvertently freeing one.

Not all technologies involve laboratory technologies. Bewick observes that operators using HUMINT databases can benefit from knowledge discovery search engines that turn up vital information. The DHMO has worked with Endeca Technologies Incorporated, Cambridge, Massachusetts—which is an In-Q-Tel company that has a guided navigation capability used by Walmart.com and BarnesandNoble.com—to develop a search capability for finding information already collected. It already has been adopted by the DIA, he notes. “You see knowledge immediately,” he explains. “This has been remarkably powerful, and we are moving it out to the field.”

The DHMO’s technology tradecraft office also has an objective to operationalize HUMINT. This will require synchronizing HUMINT activities, which is a capability that is lacking today. A synchronization matrix capability must be developed to correlate with other intelligence so that a commander in the field can see the time frame for earliest value and least value for intelligence. This has been attained for other intelligence disciplines, but it has not been achieved for HUMINT. The DHMO is accelerating its development, and Bewick is hopeful that this will produce some capability next year.

With the DHMO’s focus on operators in the field, the near-term technology that is most prominent on the office’s radar is communications. Bewick notes a sense of urgency for near person-to-person links or over-the-horizon connectivity. Interoperability is a must, which affects whether other government communications technologies can be transferred to defense HUMINT.

For the longer term, nanotechnology looms large in potential HUMINT applications. The mobile DNA fingerprinting capability, for example, could be optimized by nanotechnologies. Other biometric technologies as well as communications could benefit. The DHMO also is investing in alternative power sources, Bewick relates.

The other focus area, data integration, is no less important than technology-driven collection. “Our challenge is to convert data into knowledge rapidly,” Bewick says. “Given what we’re asked to do, we must integrate human intelligence data like we never did before.” This requires joint and coalition ISR interoperability. HUMINT now is being integrated into the Global Information Grid (GIG). So, the DHMO is emphasizing the need to plan for HUMINT data in building the GIG. As Joint Intelligence Operations Centers are emerging at the theater level (SIGNAL Magazine, October 2005, page 44), the office must integrate human data at that level. This supplements existing data integration efforts at joint task force level and below.

“Our mission is from tactical to national,” Bewick says. “We take a departmental level view, not only of the research and development effort but also of the interoperability picture for the department.”

This effort also sends the office to other government agencies to determine how they would use HUMINT data. Bewick cites the Joint Improvised Explosive Device (IED) Defeat Organization, which is designed to overcome IEDs. The DHMO is determining whether it can contribute its own science and technology or add its data to be integrated with other intelligence data.

“What we find ourselves doing is building bridges,” he says. “We are trying to bridge this valley of death where we are finding [that] technologies are dying on the vine.” Many organizations develop technologies and capabilities in their science and technology elements that reach a certain stage but progress no further. The DHMO has “boots on the ground” and communities reaching out to these other organizations.

The office has established a JointDefensewideHUMINTInnovationCenter structure that is based on finding technologies and capabilities developed among businesses or other government organizations. This portfolio management approach is based on “the serendipity of finding what has been developed elsewhere for the end user who says, ‘I need it, I’ll do an operational test of it, I’ll even commit to putting it in my POM [program objective memorandum] if you can get it to me right now.’ That’s kind of the value add that we have,” Bewick states.

 

The DHMO is embedding support personnel at select commands and agencies—such as those that are adept at tagging, communications or data management— who can transfer solutions to the field. Combined with user groups, these experts can help speed new technologies to the operator.

Bewick relates that recently the I Marine Expeditionary Force (MEF) in Iraq sent the DHMO an urgent-need statement for language translation capabilities. Within 24 hours, the office and its partners tapped existing expertise to provide the MEF with a solution that came with operational instruction on how to use the capability. The user never knew that this capability existed and was obtainable off the shelf until the DHMO provided it.

The DHMO established a Defense Department tradecraft technology board in March 2005, and it included representatives from the combatant commands, the DIA and the military services. The office asked this board to define the most critical challenges facing HUMINT operatives in the field. While this query was framed in a technology perspective, it emerged in a capability perspective.

The DHMO compared those responses, and when a similar—hence a joint—problem was apparent, the office made it a DHMO problem set. A total of nine problem sets were established, including biometrics, tagging, communications, language translation, data management, remote sensing and novel power sources.

For integrating HUMINT data and sharing information, the undersecretary of defense for intelligence asked the office to establish a HUMINT integrated product team (IPT) under the Distributed Common Ground Surface System, which is the collection system for intelligence at joint task force and below. Bewick chairs this HUMINT IPT, which also includes representatives from the services and the commands.

Among the points that emerged from these two efforts was that the DHMO would take a portfolio management approach to these targeted areas. So, the DHMO established two paths. In one would go capabilities that the department already does well but can do better. The other would comprise capabilities that are not done or are not done well today but that must be available in the next few years. Among these are biometrics and person location through a social network, Bewick offers. The office is issuing its first Defense Department HUMINT metadata standards, which are emerging in part from work performed with SAIC at the JointDefensewideHUMINTInnovationCenter. People who need to find HUMINT will be able to generate a user-defined operating picture. “Our measure for interoperability will be to make HUMINT data accessible, visible, available to whomever has a need for it wherever they are [and] whenever they need it,” Bewick declares.

The DHMO also established its own metric for determining whether an innovation is worthy of investment. This metric entails assessing the return on intelligence based on a predictive mission impact measure. Bewick explains that the DHMO frames it in terms of values and risk tradeoff.

The values it keys on are military advantage; end-user urgency or enthusiasm, especially where users have requested this type of innovation or have existing related programs of record; jointness, particularly whether there is more than one user among the services and the commands; and strategic policy alignment.

For risk assessment, the office considers operational risk. If someone uses a capability, might it fail and result in friendly fatalities? The office seeks to determine the effects if it does not work as well as its defined uncertainty. Another risk involves the defense infrastructure—will it require considerable changing? A solution must be compatible—and interoperable—with the existing infrastructure.

And, technological functional risk is an issue. A technology solution may require new unproven innovations. While this and the other issues weigh heavily in the decision, alone they do not necessarily determine the adoption of a solution, Bewick notes.

 

Web Resources

Destineer: www.destineerstudios.com

Palantir Technologies: www.palantirtech.com

Endeca: http://endeca.com

http://www.afcea.org/content/?q=defense-humint-needs-technology-too 

[&&]{**}[##]

THE DARK NEXUS OF MIND CONTROL AND ARTIFICIAL INTELLIGENCE

Published: January 30, 2015

Is Alice’s nightmare world becoming a reality? Note that Alice in Resident Evil is subjected to mind control and genetic manipulation by a secretive corporation that controls governments, the Umbrella Corp.

In researching the MK ULTRA programs and their various offshoots, I came across an interesting connection to the coming SmartGrid.  Under Dr. Ewan Cameron, a prison tracking device known as the Schwitzgebel Machine was utilized to monitor inmates locations, heart rate and other personal details that were reciprocally transmitted to the good doctors.  What comes to the fore is the similarity with the development of the Smartphone and its new capabilities for monitoring heart rate, health, etc., as well as basically anything else.  Is there a connection between mind control and the coming A.I. takeover?  While this may sound like the ultimate paranoiac tin foliage, I suspect more at work here.

In my analysis, the rollout of the great technological utopia we are being sold was not the result of mere organic market forces that competed to produce harder, better, faster and stronger products.  The average libertarian, for example, believes this deception, presuming the “invisible hand” of the market results in a natural advancement, while any other economic model retarded growth and “progress.”  On the contrary, much of the technological progress we have seen in the last few decades is not the result of independent, competing ideas, but is rather the strategically timed and intentional release of the military industrial tech complex, given to an idiot public for the purpose of long term enslavement and depopulation.

The connection to MK ULTRA arises in relation to experiments with jc manipulation which I have already highlighted in regard to Dr. Michael Aquino and his infamous essay, “From PSYOP to MindWar: The Psychology of Victory,” where the combination of ELF/VLF and various RF manipulation is discussed in detail towards the end.  A Nexus Magazine article “Techniques Used by Governments for Mind Control,” by Sid Taylor outlines the RF experimentation in the MK programs:

“MK ULTRA SUBPROJECT-68

This was Dr. Cameron’s ongoing “attempts to establish lasting effects in a patient’s behaviour” using a combination of particularly intensive electroshock, intensive repetition of prearranged verbal signals, partial sensory isolation, and repression of the driving period carried out by inducing continuous sleep for seven to ten days at the end of the treatment period. During research on sensor deprivation, Cameron experimented with the use of Curare, (the deadly poison used by South American Indians to tip their arrow heads), to immobilise his patients.

After one test he noted: “Although the patient was prepared by both prolonged sensory isolation (35 days) and by repeated depatterning, and although she received 101 days of positive driving, no favourable results were obtained.” Patients were regularly treated with hallucinogenic drugs, long periods in the “sleep room”, and testing in the Radio Telemetry Laboratory that was built by Rubinstein under Dr. Cameron’s direction. Here, patients were exposed to a range of RF and electromagnetic signals and monitored for changes in behaviour. It was later stated by other staff members who had worked at the Institute that not one patient sent to the Radio Telemetry Lab showed any signs of improvement afterwards.”

When we consider the intersect with drug experimentation, the cocktail of brainwashing, “imprinting” and RF frequency technology becomes clear as something engineered by design.  Taylor continues, echoing something akin to a mondo Faces of Death flick:

“There were an enormous number of MKUltra operations. The project farmed out work to eighty institutions, of which forty-four were colleges or universities, fifteen research facilities or private companies, twelve hospitals and three prisons. The estimated total cost of the operation was 10-25 million dollars.

Prisoners were used in experiments conducted at the California Medical Facility in Vacaville State Prison by Dr. James Hamilton. Funded by another chain of front organisations, Dr. Hamilton conducted “clinical testing of behavioural control materials.” In New Jersey, testing was conducted by Dr. Carl Pfieffer at the Borden Reformatory, on similar materials. At Holmesburg State Prison in Philadelphia volunteers were used to test a particularly violent incapacitating drug. Around the same time as these tests were being conducted by the CIA the US Army initiated two projects, THIRD CHANCE and DERBY HAT. They conducted experiments both home and abroad, and at one time the New York State Psychiatric Institute was conducting research under contract to the Army. Between 1955 and 1958 the Army also tested LSD on 1,000 volunteer US servicemen at Fort Bragg and the Army’s Chemical Warfare Laboratories at Edgewood….

In this MKSearch sub-project the isolation chamber that had been constructed earlier by Dr. Cameron at the Allan Memorial Institute was rebuilt at a laboratory of the National Institutes of Mental Health. This time, instead of humans, apes were to be subjected to a cruel combination of treatments. After first being lobotomised, the animals were kept in total isolation. The radio telemetry techniques developed earlier by Leonard Rubenstein were adapted so that radio frequency energy could be beamed into the brains of the highly disturbed animals. Many were then decapitated and their heads would be transplanted onto another body to see if the RF energy would bring them back to life. The apes that were not killed in this way were later bombarded with radio waves until they fell unconscious. Autopsies revealed that their brain tissue had literally been fried. These experiments were conducted around 1965/66, so it is a frightening reality that it is around 25 years since intelligence agencies covertly started experimenting with the use of radiated energy to control behavior….

THE SCHWITZGEBEL MACHINE

After consultation with the DCI, Richard Helms, Dr. Gottlieb hired the former director of the Agency’s Office of Scientific Intelligence, Dr. Stephen Aldrich, and set him up in a safe house where a KGB defector had recently been interrogated and tortured continuously for almost three years, so that he could experiment with a device known as the Schwitzgebel Machine. This was a ‘Behavioural Transmitter-Reinforcer’ (BT-R) fitted to a body belt that received signals from, and transmitted signals to, a radio module. The machine was “linked to a missile tracking device which graphs the wearer’s location and displays it on a screen.” It was developed by Ralph K. Schwitzgebel in the Laboratory of Community Psychiatry at Harvard Medical School. [ https://www.abebooks.com/book-search/author/schwitzgebel-ralph/ ]His brother, Robert, subsequently modified the prototype into a more refined final product. The machine drew enthusiastic praise from criminologists who were supportive of ORD’s concepts for the intelligence techniques of the new world order. [ https://www.goodreads.com/book/show/3508334-psychotechnology-electronic-control-of-mind-and-behavior ]

On December 10th 1972, Helmes cancelled Operation Often. The memo sent to Dr. Gottlieb to notify him was marked READ DESTROY. Dr Gottlieb resigned from the agency in January 1973. Before he left he was ordered by Helmes to shred all records from MKUltra – MKSearch.

130 boxes would later be discovered in the Langley archives that inexplicably, Dr Gottlieb had failed to destroy. It was thought that the records had been misfiled and would have been destroyed if Helms and Gottlieb had been aware of them.”

https://jaysanalysis.files.wordpress.com/2015/01/511jkk5m0ol__sy344_bo1204203200_.jpg?w=200&h=300

With all that madness in mind, when we consider the Smartphone, we see a device that utilizes RF and tracks your every move, desire and taste, with all of that data being transferred to mysterious third parties which are sold and stored in vast data centers around the globe.  In line with JC Collins’ thought, as well as NSA whistleblower William Binney, I have opined that this is all being stored with the intent of a global SmartGrid control system.  While it is true that one level competition between Silicon Valley tech companies may be permitted, the reality was elucidated years ago in former CIA operative Melissa Mahle’s 2004 autobiography, Denial and Deception: An Insider’s View of the CIA, where she explained the origins of In-Q-Tel:

“Rather than run a full in-house R&D program, Tenet authorized the directorate to create a technology-incubation organization, In-Q-Tel, to serve as an information technology portal from the private sector to the intelligence community…With an initial funding of 28.5 million in CIA funds, the venture focused on building productive relationships with small firms involved in IT innovation, In-Q-Tel concentrated on technologies that integrate Internet technology and applications to intelligence work, that develop new security and privacy technologies, and nurture data-mining technologies to take better advantage of the CIA’s vast storehouse of records, and modernize the CIA’s computer systems. (pg. 267)

In-Q-Tel was also instrumental in some other names you might recognize, like Google and Facebook.  James Corbett’s piece on this connection gives an excellent summary of these pseudo-free market firms:

For decades, the Defense Advanced Research Projects Agency, or DARPA, has been the American governmental body tasked with conducting high-risk, high-payoff research into cutting edge science and technology. Responsible most famously for developing the world’s first operational packet switching network that eventually became the core of the Internet, DARPA tends to garner headlines these days for some of its more outlandish research proposals and is generally looked upon a a blue-sky research agency whose endeavours only occasionally bear fruit….

Two of the names that come up most often in connection with In-Q-Tel, however, need no introduction: Google and Facebook.

The publicly available record on the Facebook/In-Q-Tel connection is tenuous. Facebook received $12.7 million in venture capital from Accel, whose manager, James Breyer, now sits on their board. He was formerly the chairman of the National Venture Capital Association, whose board included Gilman Louie, then the CEO of In-Q-Tel. The connection is indirect, but the suggestion of CIA involvement with Facebook, however tangential, is disturbing in the light of Facebook’s history of violating the privacy of its users….

Google’s connection to In-Q-Tel is more straightforward, if officially denied. In 2006, ex-CIA officer Robert David Steele told Homeland Security Today that Google “has been taking money and direction for elements of the US Intelligence Community, including the Office of Research and Development at the Central Intelligence Agency, In-Q-Tel, and in all probability, both the National Security Agency (NSA) and the Army’s Intelligence and Security Command.” Later that year, a blogger claimed that an official Google spokesman had denied the claims, but no official press statement was released.”

So what about my claims about the same strategic goal associating all of this with mind control?  You’ll note that much of the very secret covert work pertains to nanotechnology, cancer and producing human resistance to the radioactive effects of all of this frequency pollution.  According to Business Insider, CIA startups are intimately connected to WiFi R&D, as well as with transhumanist Bilderberg attendee, Peter Thiel, stating:

“We’ve talked about Palantir before and the impact it is having on the Army intelligence community.  What we didn’t go into as much was the fact that In-Q-Tel was an early investor in the technology on behalf of the Central Intelligence Agency.  Palantir makes software that integrates data together from a wide array of resources and databases.

It’s one of the best programs at coordinating the vast databases accumulated by the U.S. intelligence apparatus. It assembles comprehensive dossiers on objects of interest, collated from the sprawling databases of intelligence agencies.”

And Corbett makes this connect to nanotech and bio-engineering and biometrics, illustrating further the danger these corporate-government mergers represent (operating under the guise of being private sector):

“The In-Q-Tel website currently lists two “practice areas,” “Information and Communication Technologies” and “Physical and Biological Technologies.” The latter field consists of “capabilities of interest” such as “The on-site determination of individual human traits for IC purposes” and “Tracking and/or authentication of both individuals and objects.” In-Q-Tel also lists two areas that are “on its radar” when it comes to biotech: Nano-bio Convergence and Physiological Intelligence. Detailed breakdowns of each area explain that the intelligence community is interested in, amongst other things, self-assembling batteries, single molecule detectors, targeted drug delivery platforms, and sensors that can tell where a person has been and what substances he has been handling from “biomarkers” like trace compounds in the breath or samples of skin.”

Thus the intersect of advanced technology, intelligence agencies and mind control is not far-fetched.  The reality is, all of this is war gamed and planned for implementation by an establishment that long ago adopted the panopticism model of Jeremy Bentham and the Malthusian Royal Society.  The goals have nothing to do with creating a tech utopia for you and your progeny, where you will fly off to floating moonbases and partake of Elysium-style healing machines with Matt Damon.

The same establishment that is publicly determined to destroy humanity en masse and implement the A.I. kill grid is rolling out their designs even faster than we “conspiracy theorists” expected!  In fact, this week mainstream news is reporting that IBM’s Watson, the famed Jeopardy-playing A.I. bot will play a role in determining health care!

Forbes writes, trying to dissuade fears of the bots making the decision on your care, but this ignores an important fact – the article itself touts Watson’s superiority to human decision making, which will inevitably lead to the conclusion the bots are a better option than the human, and on top of that, the establishment interested in fostering all this are committed to dysgenics (not actually eugenics), which is the destruction of the human genome:

“Watson has made huge strides in its medical prowess in two short years. In May 2011 IBM had already trained Watson to have the knowledge of a second-year medical student. In March 2012 IBM struck a deal with Memorial Sloan Kettering to ingest and analyze tens of thousands of the renowned cancer center’s patient records and histories, as well as all the publicly available clinical research it can get its hard drives on. Today Watson has analyzed 605,000 pieces of medical evidence, 2 million pages of text, 25,000 training cases and had the assist of 14,700 clinician hours fine-tuning its decision accuracy. Six “instances” of Watson have already been installed in the last 12 months.”

If you played Nintendo in the 80s like I did as a kid, you’ll recall Mother Brain, the ill-tempered A.I. behemoth from Metroid.

Metroid was actually far more accurate in its description of the actual “Mother” that is being erected and sold as a sexy Scarlett Johansson (as in Spike Jonze’s Her).  Mother Brain, like the Red Queen in Resident Evil and Skynet in Terminator is given a distinctly feminine quality because she functions as a synthetic anima mundi.  The system is selling her as sexy, but I assure you, this is anything but. [See https://qz.com/911681/we-tested-apples-siri-amazon-echos-alexa-microsofts-cortana-and-googles-google-home-to-see-which-personal-assistant-bots-stand-up-for-themselves-in-the-face-of-sexual-harassment/ ]

This week the BBC is reporting that a Swedish firm is offering employees to be RF microchipped, and the wage slaves willingly complied.  I have highlighted the microchipping plan as something decades old, which shows the rollout of all this is clearly planned years in advance and is not an organic market development.  It is with the microchip that we can see the clear connection between the mind control programs of MK ULTRA and the rise of the A.I. grid, as well as the mind control of marketing employed in selling everyone on this trap.  As I outlined in numerous previous analyses (and here), when we consider the T Phage nanotech the Royal Society finds appealing,  one wonders if the T Virus and the Red Queen aren’t real, and out for blood.

http://www.blacklistednews.com/The_Dark_Nexus_of_Mind_Control_and_Artificial_Intelligence 

[&&]{**}[##]

https://jaysanalysis.com/2015/06/08/bilderberg-implementation-of-the-a-i-grid/ 

[&&]{**}[##]

insert book graphic

The audio of Wednesday night’s 9/11 and Other Deep State Crimes Teleconference is available here:

http://houston911truth.net/audio/22217.mp3

It features, amoing other things, a presentation by Doug Valentine a definitive study of the infamous “Phoenix Program,” responsible for the deaths of so many innocent victims in Vietnam but, according to Doug, refined and used as a template ever since in various forms. That book and this excellent article in Thursday’s Huffington Post provides readers a good sense of Doug’s work and influence.

 [&&]{**}[##]

Published on Feb 22, 2017

The next gen of vaccine horror is here. You better pay EXTREMELY close attention to this conversation. ‘Science’ has announced that vaccines are moving away from traditional formats and will now be composed of viruses that will carry entirely new forms of DNA right into your cells where they will REPLACE or join your body’s existing, God-given NATURAL DNA with this new SYNTHETIC DNA. This new DNA will allegedly confirm protection on you from various viruses that each new DNA type is created to kill. However, this new virus-delivered  SYNTHETIC DNA can be created to do almost ANYTHING to you…permanently and forever. This fake DNA can CHANGE ANY PART OF YOUR BEING…from intellectual and emotional processes to all physical traits that are created and regulated by our natural DNA. We are entirely governed by our birth DNA but soon, according to one scientist, ‘EVERYONE WILL HAVE SYNTHETIC DNA.’ We are talking about ABSOLUTE CONTROL of the human species through synthetic, DNA. This is a monumentally important video.

https://www.youtube.com/watch?v=o7aMlMs-51Y 

[45 minutes]

iron men

iron men

Many have suspected Israel controls ISIS. The computer of Netanyahu Chief of Staff Mandi al-Safadi was allegedly hacked, showing communication with ISIS members.

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=nOag-Dbnvrw 

[&&]{**}[##]

SOURCE: TOOLS FOR FREEDOM

Many have suspected Israel controls ISIS. The computer of Netanyahu Chief of Staff Mandi al-Safadi was allegedly hacked, showing communication with ISIS members.

Israel controls ISIS.

Many have long suspected the connection, given that ISIS serves the Zionist agenda so well, but now we may have more proof. According to Veterans Today, hackers were recently able to get access to several months of personal computer data and mobile phone calls of Israeli Chief of Staff under Netanyahu, Manzar (Mandi) al-Safadi. The hack allegedly revealed that al-Safadi had been communicating and cutting deals with many Lebanese personalities and Syrian opposition figures who cooperated with Israel in the Syrian crisis. The hackers allegedly found information which helped them to gain “valuable intelligence on Israel’s supports for terrorist groups in Syria and Iraq.” (Note: I have been unable to personally verify the claims of hacking by reading the documents, since Google translator says the page is too large to translate).

The ISIS Game is Up

For those paying attention, we have been inundated with clues that the whole ISIS phenomenon is a massive fraud. In a Freudian slip Obama recently stated that “with the additional steps I ordered last month, we’re speeding up the training of ISIL forces”. ISIL is another of ISIS’ many names. Earlier in the year, there were reports that Israel was attending to wounded ISIS soldiers in Israeli hospitals. The spin put on that by the Zionist-owned press was that Israel was so generous and magnanimous that it even cares for its enemies, a ridiculous lie designed to cover the fact that Israel controls ISIS. Even the alleged head of ISIS, Al-Baghdadi (accused of being a Mossad double agent), died in an Israeli hospital!

What about this piece of information that ISIS is another name for the Mossad, i.e. that it stands for Israeli Secret Intelligence Service? What about reports coming from Iraq that Israel controls ISIS, gives them weapons and fights alongside them as revealed by Luke Rudkowski in Israel Joining ISIS?

The ISIS game is up. The official narrative is simply far too much to believe.

As Bernie Suarez humorously writes:

“According to U.S. “intelligence sources” mouthpieces, ISIS has [professional camera and image editing software and skills] including social media capabilities. Amazingly, these covered-face killers have unraveled the secret of how to outsmart every world power including the U.S. Empire with regard to every form of communication. They have stomped out the U.S. military, NSA, CIA, NATO, U.N. and the intelligence of Israel, U.K. and every other nation that surrounds them …”

“ISIS is so close to Israel, they may attack Israel any given day … The big Israel attack would gain them all the PR and Marketing they need … The irony gets even crazier here. According to U.S. politicians pushing the ISIS psyop narrative, ISIS is not only unwilling to attack Israel, which they could do in a day or two, they instead prefer to make plans to travel all the way to the other side of the world to attack the world’s most powerful Empire of all time. Yes, they would rather risk getting caught, imprisoned or killed traveling halfway around the world than to go for an easy quick strike at Israel.”

How ISIS Helps the Zionist Regime of Israel

It’s very clear that ISIS serves the Zionist agenda well. That alone has been the giveaway to know that Israel controls ISIS. Just look what ISIS does. ISIS terrorists run around the Middle Eastern Islamic countries, beheading, killing, raping and pillaging, stealing land and resources, overthrowing and dividing sovereign nations and – most of all – setting Muslim against Muslim. And as ISIS runs around the desert like a headless chicken, the Western public gets thoroughly conditioned to believe in the threat of Islamic terrorism, with the added assistance of Israeli front groups like SITE (Search for International Terrorist Entities) who produce clean-cut, green-screen and entirely fake beheadings.

Meanwhile, miraculously, ISIS never seems to threaten Israel. You would think that Israel would be a logical target of hatred for a group of extreme Muslims out to form their own State or Caliphate. Yet Israel never gets attacked or touched. ISIS does, however, foment tremendous and horrific infighting among Muslims and weaken many Islamic nations, so that they are too disconnected to unite together to stand up to real threat in the region – Zionist Israel, financially owned by the Rothschilds and militarily backed by the US.

Israel, the Missing Piece of the Puzzle in the Middle Eastern Crisis

Israel is the missing piece of the puzzle. Israel controls ISIS and many other aspects of geopolitics, being the personal country of the Rothschilds, the richest family on Earth.

Just as a reminder, Israel:

– Has continuously expanded its territory by stealing land, eradicating villages and committing genocide against a sovereign people (the Palestinians);

– Has infiltrated the governments of almost all the major countries of the world, e.g. USA, Britain, France, Germany, Australia and Canada (as well as the United Nations) to the point where it dictates their foreign (and sometimes even domestic) policy;

– Attacked the USS Liberty in 1967 (even though the US and Israel were supposed allies at the time) with unmarked aircraft;

– Was intimately involved in the planning and execution of the 9/11 false flag operation;

– Has consistently lied and exaggerated the threat of the Iranian nuclear intentions, while harboring a nuclear arsenal of its own, and refusing to sign the nuclear non-proliferation treaty;

– Is behind the invention and creation of radical Islam, Islamic terrorism, Islamophobia and the demonization of Islam.

Given all that and much more, how much of a surprise is it that Israel controls ISIS too?

The ISIS Psy-op Has Come Unravelled

Much like the single Islamic terrorist bogeyman Osama Bin Laden, and the Islamic terrorist group bogeyman Al-Qaeda, ISIS is another psy-op (psychological operation) designed to prop up the failing and fake war on terror. We know that the Bushes were close buddies with the Bin Ladens; we know that Al-Qaeda was a CIA creation and literally means “the database” in Arabic. Remember what Former British Foreign Secretary Robin Cook said:

“The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the TV watcher to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US . . .”

ISIS is the latest installment of deceptive propaganda, but it’s not working. Many have seen right through it. We know, with proof, that Israel controls ISIS. How long until a critical mass realizes it and looks instead at the real puppet-master Israel?

http://www.blacklistednews.com/Israel_aids_ISIS_-_Israel_chief_of_staff_gets_hacked/ 

[&&]{**}[##]

Iron Man, Not Terminator: The Pentagon’s Sci-Fi Inspirations

By SYDNEY J. FREEDBERG JR.

on May 03, 2016 at 1:28 PM

WASHINGTON: “When most people when they hear me talk about this, they immediately start to think of think of Skynet and Terminator,” said the deputy secretary of defense. “I think more in terms of Iron Man.” The Pentagon wants artificial intelligence, said Bob Work, but it doesn’t want “killer robots that roam the battlefield” without human control.

Instead, Work said told an Atlantic Council conference, citing half-a-dozen science fiction stories from Iron Man to Stark Trek to Ender’s Game, the goal is something like the JARVIS software that runs Tony Stark’s fictional super-suit: “a machine to assist a human where the human is still in control in all matters, in all matters, but the machine makes the human much more powerful and much more capable.”

A Marine Corps artilleryman turned national security intellectual, Bob Work is lead architect of the Defense Department’s high-tech “offset strategy,” which seeks to offset the always superior numbers and growing technological sophistication of Russia, China, and other adversaries by developing new tools and tactics. While electromagnetic railguns, lasers, hypersonic weapons, and more are all being funded and developed, artificial intelligence has increasingly become the unifying idea of the offset.

“The Third Offset is really kind of simple at its core,” Work said. (The first offset was nuclear weapons, the second smart weapons). “It basically hypothesizes that the advances in artificial intelligence and autonomy [are] going to lead to a new era of human-machine collaboration and combat teaming.”

Smart weapons of a sort have been around since 1943, when the Germans launched the first acoustic homing torpedo and first radio-guided missile. But there’s no precedent for artificial intelligence, which means many of the people who’ve thought hardest about it aren’t strategists or scientists, but science fiction writers.

“People have been thinking about this for quite some time and you can learn very interesting things [from] A lot of the stuff that you read in science fiction,” Work said.

So what is Work’s favorite food for thought? Besides Iron Man and Terminator, he praised the Atlantic Council’s “Art of Future Warfare” project (to which I contributed a fictional Russian invasion of Estonia) and promised to read the next anthology of offset strategy-themed stories. But he also identified an array of sci-fi classics, from multi-media franchises like Iron Man to relatively obscure texts like the Bolo stories, “one of my favorite book series.”

Air Force officer and diplomat turned author Keith Laumer‘s best-known stories concern the Bolos, gigantic robot tanks with planet-shaking weapons. The twist is that Laumer’s artificially intelligent war machines are loyal, moral, and honorable — often more so than their human masters, which drives much of the conflict in the series. Work singled out the loyal way Bolos work with and for human officers as a model for real-world artificial intelligence to aspire to.

Work also extolled Orson Scott Card’s Ender’s Game — “I didn’t think was all that good of a movie but it was a heck of a book” — for its depiction of a commander directing far-flung forces via computer networks. The story also shows the psychological toll that even such abstract, remote warfare takes on those who lead it.

Worse yet, in Ender’s Game the commanders are pre-pubescent children picked for their adaptability and agility of mind. As the pace of technological change accelerates, Work wondered aloud, will we need to take Ender as our model and have “younger and younger and younger commanders?”

In addition, Work cited David Weber’s space-battles stories — a kind of sci-fi version of Admiral Nelson and Horatio Hornblower, where the commander’s personality is crucial to victory. He also invoked John Ringo’s Posleen stories where future soldiers, like Iron Man, wear powered armor that not only protects but boosts their strength, speed, and senses. (This trope originated with Robert Heinlein’s novel Starship Troopers, which bears almost no resemblance to the film of the same name).

Then there was Star Trek, the mothership that made science fiction (relativel) mainstream in American culture. Work cited William Shatner’s famously cantankerous captain for his willingness to get creative and break the rules when necessary, as when Kirk hacked the Star Fleet Academy simulator to win the unwinnable Kobayashi Maru scenario.

“I don’t believe that the commander who listens to the machine all the time is going to be the best commander,” Work said.

Sometimes, he continued to laughter, “it’s going to be like James T. Kirk on the Kobayashi Maru where he says, okay, I understand the rules of the game, but I’m going to change the rules.”

What future military training — and reading science fiction — needs to teach young officers, Work said, is “never ever believe that the computer is always going to be write. Trust your judgment — and then we have to train them to operate [in that environment] and to cheat if necessary.”

http://breakingdefense.com/2016/05/iron-man-not-terminator-the-pentagons-sci-fi-inspirations/ 

[&&]{**}[##]

https://www.youtube.com/watch?v=KV5Jjd0ww5Q 

Posted in False Flag Operations, Rise of the Machines, Technology, UFOs

[&&]{**}[##]

If you’ve got nothing to hide, why worry about warrantless mass surveillance? One reason among many: The people who have access to your private communications may not have your—or your child’s—best interest at heart.

NextGov reports that officials at a recent Intelligence and National Security Alliance symposium in Chantilly, Virginia discussed the widespread storage of child pornography on NSA and other military computer systems. Daniel Payne, director of the Pentagon’s Defense Security Service, reportedly said that “the amount of child porn [he sees on government devices] is just unbelievable.” An NSA official agreed, saying “what people do is amazing.”

It’s often difficult for us to pinpoint direct, personal harms from warrantless dragnet spying. Sure, policies like those established after 9/11 may threaten democratic, open society, freedom of speech, and due process. But for many of us, drawing a direct line between the erosion of democratic norms and our day-to-day lives can be challenging, if not impossible. It’s not hard, on the other hand, to imagine a government employee using his access to warrantless surveillance data to fish for bath-time photos of our naked children.

Don’t forget: The surveillance systems Snowden exposed may seem too big to comprehend, but the individual people behind them are just as real (and flawed) as you or me.

According to these officials and older reports, sexual abuse of children is rampant in the military and intelligence worlds. That’s yet one more reason why we shouldn’t ever give government institutions and the people who run them nearly limitless power to exercise in the dark.

https://privacysos.org/blog/unbelievable-amount-child-porn-us-military-intelligence-computers/ 

via

http://www.blacklistednews.com/Just_trust_them  

[&&]{**}[##]

“… ‘A common and natural result of an undue respect for law is, that you may see a file of soldiers, colonel, captain, corporal, privates, powder-monkeys, and all, marching in admirable order over hill and dale to the wars, against their wills, ay, against their common sense and consciences, which makes it very steep marching indeed, and produces a palpitation of the heart. They have no doubt that it is a damnable business in which they are concerned; they are all peaceably inclined. Now, what are they? Men at all? or small movable forts and magazines, at the service of some unscrupulous man in power? Visit the Navy-Yard, and behold a marine, such a man as an American government can make, or such as it can make a man with its black arts, — a mere shadow and reminiscence of humanity, a man laid out alive and standing, and already, as one may say, buried under arms with funeral accompaniments.’ . . .”

http://www.washingtonsblog.com/2016/05/three-centuries-u-s-writing-war.html#more-56368 

[&&]{**}[##]

Editors’ Note: It is appropriate to announce in advance that these three blogs will undergo some change in the not-too-distant future. I speak mostly of Occurrences, but also its siblings The Sullen Bell and BoyDownTheLane

While I will continue to be interested in news and politics, and will probably remain active in writing about them, transition is upon us, and me in particular. 

The world of social media and the Internet is undergoing significant centralization and compression; one lone individual canot have much impact against the combined weight of the US government and its corporate/intel complex, the social engineering thrusts of the Tavistock crowd, or the stupidly unwavering commitment to warfare and other forms of militancy. 

The continuation of a news aggregating entity like Occurrences must involve others, higher IT skills, some automation, more voices, the next higher level of creativity and interaction, fresh ideas, sale of the web site(s), or abandonment. 

I invite suggestions and input via the contact pages at any of the three sites.

morning light

Morning Light

Everybody I talk to is ready to leave with the light of the morning

They’ve seen the end coming down long enough to believe

That they’ve heard their last warning

Standing alone each has his own ticket in his hand

And as the evening descends I sit thinking ’bout everyman

Seems like I’ve always been looking for some other place to get it together

Where with a few of my friends I could give up the race

Maybe find something better

But all my fine dreams well though out schemes to gain the motherland

Have all eventually come down to waiting for everyman

Waiting here for everyman

Make it on your own if you think you can

If you see somewhere to go I understand

Waiting here for everyman

Don’t ask me if he’ll show baby I don’t know

Make it on your own if you think you can

Somewhere later on you’ll have to take a stand

Then you’re going to need a hand

Everybody’s just waiting to hear from the one

Who can give them the answers

Lead them back to that place in the warmth of the sun

Where sweet childhood still dances

Who’ll come along and hold out that strong and gentle father’s hand?

Long ago I heard someone say something ’bout everyman

Waiting here for everyman

Make it on your own, make it if you think you can

If you see somewhere to go I understand

I’m not trying to tell you that I’ve seen the plan

Turn and walk away if you think I am

But don’t think too badly of one who’s left holding sand

He’s just another dreamer, dreaming ’bout everyman

http://www.songlyrics.com/jackson-browne/for-everyman-lyrics/ 

https://www.youtube.com/watch?v=c-TZ9zY3p28 

 

[&&]{**}[##]

 

http://www.globalresearch.ca/homegrown-terrorists-new-us-draconian-laws-usher-in-the-new-world-order/5469375

[Joachim Hagopian]

 

[&&]{**}[##]

Sailors, marines and naval air pilots of the two countries will be training together in combined operations in an amphibious assault exercise.

http://www.rt.com/news/312582-russia-china-naval-drills/ 

 

[&&]{**}[##]

 

https://www.youtube.com/watch?t=80&v=OcFOWIq3cIc  

Published on Aug 15, 2015

+ Russ Tedrake – Director, Center for Robotics, MIT Computer Science and Artificial Intelligence Lab

+ Sangbae Kim – MIT Biomimetic Robotics Lab

+ Mick Mountz – Founder, Kiva Systems

+ Gill Pratt – Program Manager, DARPA Robotics Challenge, DARPA Defense Sciences

+ Marc Raibert – Founder, Boston Dynamics

  • Radhika Nagpal – Self-organizing Systems Research and Robotics Group, Harvard University

Fab11: Making Robots 

http://www.cryptogon.com/?p=47078 

 

[&&]{**}[##]

 

Must read: 8 Reasons to turn your lawn into a farm and help change the world

In Puerto Rico, Water Has Been Cut Off  

Permanent Link posted by Rice Farmer @ 7:09 PM 

 

[&&]{**}[##]

 

http://truthinmedia.com/oath-keepers-americans-false-choice-ferguson-tension/  

 

[&&]{**}[##]

 

Political Discourse in America

[Ed.: Newspeak is upon us.  Cognitive infiltration is well underway if a questionable alternative media outlet media, citing a sherriff who supports the SPLC, can paint a group of people who swear to uphold the Constitution as being interested in overthrowing the government. 

The coup must be solidified.]

http://www.infowars.com/sheriff-compares-constitutionalists-to-isis/ 

 

[&&]{**}[##]

 

http://oathkeepers.org/oktester/threatened-domestic-attack-on-service-members-and-families-by-islamic-state-a-direct-concern-for-oath-keepers/ [David Codrea]

{**}

http://www.thetruthaboutguns.com/2015/08/david-codrea/waco-biker-autopsies-released-without-ballistics-reports/ [David Codrea]

 

[&&]{**}[##]

 

NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help’

August 15th, 2015 by Kevin

NSAT&T: Since 1985.

Via: ProPublica:

The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T.

While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”

AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T has given the NSA access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&T.

The NSA’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, according to the documents. The company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. And its engineers were the first to try out new surveillance technologies invented by the eavesdropping agency.

One document reminds NSA officials to be polite when visiting AT&T facilities, noting: “This is a partnership, not a contractual relationship.”

Fairview is one of its oldest programs. It began in 1985, the year after antitrust regulators broke up the Ma Bell telephone monopoly and its long-distance division became AT&T Communications. An analysis of the Fairview documents by The Times and ProPublica reveals a constellation of evidence that points to AT&T as that program’s partner. Several former intelligence officials confirmed that finding.

Flashback 2007: AT&T Invents Programming Language for Mass Surveillance

Posted in Covert Operations, Surveillance, Technology

 

[&&]{**}[##]

 

NSA Preparing Quantum Resistant Encryption Algorithms

August 15th, 2015 by Kevin

Via: National Security Agency:

IAD recognizes that there will be a move, in the not distant future, to a quantum resistant algorithm suite. Based on experience in deploying Suite B, we have determined to start planning and communicating early about the upcoming transition to quantum resistant algorithms. Our ultimate goal is to provide cost effective security against a potential quantum computer. We are working with partners across the USG, vendors, and standards bodies to ensure there is a clear plan for getting a new suite of algorithms that are developed in an open and transparent manner that will form the foundation of our next Suite of cryptographic algorithms.

Until this new suite is developed and products are available implementing the quantum resistant suite, we will rely on current algorithms. For those partners and vendors that have not yet made the transition to Suite B algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum resistant algorithm transition.

For those vendors and partners that have already transitioned to Suite B, we recognize that this took a great deal of effort on your part, and we thank you for your efforts. We look forward to your continued support as we work together to improve information security for National Security customers against the threat of a quantum computer being developed. Unfortunately, the growth of elliptic curve use has bumped up against the fact of continued progress in the research on quantum computing, necessitating a re-evaluation of our cryptographic strategy.

Related: Microsoft: Securing Today’s Data Against Tomorrow’s Quantum Computers

Posted in Covert Operations, Surveillance, Technology

 

[&&]{**}[##]

 

Remember that Space-War Center? In June Deputy Defense Secretary Robert Work touted a new space operations center that would serve as a backup to an existing facility at Vandenberg Air Force Base in California. Turns out the new ops center might become the primary one, Space News‘ Mike Gruss reports from the Space and Missile Defense Symposium in Huntsville, Ala. Unlike the Vandenberg center, the new one “will draw more heavily on intelligence community and allied surveillance assets,” Gruss writes. More here

 

[&&]{**}[##]

 

COULD GOOGLE SWING THE NEXT ELECTION?

I have no idea, but that’s the question Wired magazine asks, though more ominously that I put it:

Google’s Search Algorithm Could Steal the Presidency

IMAGINE AN ELECTION—A close one. You’re undecided. So you type the name of one of the candidates into your search engine of choice. (Actually, let’s not be coy here. In most of the world, one search engine dominates; in Europe and North America, it’s Google.) And Google coughs up, in fractions of a second, articles and facts about that candidate. Great! Now you are an informed voter, right? But a study published this week says that the order of those results, the ranking of positive or negative stories on the screen, can have an enormous influence on the way you vote. And if the election is close enough, the effect could be profound enough to change the outcome.

In other words: Google’s ranking algorithm for search results could accidentally steal the presidency. “We estimate, based on win margins in national elections around the world,” says Robert Epstein, a psychologist at the American Institute for Behavioral Research and Technology and one of the study’s authors, “that Google could determine the outcome of upwards of 25 percent of all national elections.”

Read the whole thing if you have time. I have no idea if there’s much to this, but beyond the techniques of “data mining” implied here, it should be filed away that Silicon Valley, and Google in particular, lean to the left, and even when not consciously left, tend toward an authoritarian elitism that is troubling. If Google could swing an election, there’s no doubt which way they’d swing it.

http://www.powerlineblog.com/archives/2015/08/135113.php 

via

http://www.strike-the-root.com/ 

POSTED ON AUGUST 9, 2015 BY STEVEN HAYWARD IN 2016 PRESIDENTIAL ELECTION

 

]Ed.: Did you know that Google leases an old military airfield with two giant hangars just miles from its HQ?]

 

[&&]{**}[##]

 

country3edited

 

[&&]{**}[##]

http://boydownthelane.com/2015/08/16/inside-out/ 

meta description: emotional dishonesty, parenting, childhood, dysfunctional family, misogyny, domestic violence, abusive behavior, personal development, culture, society

communication and social conflict

Music audio:

The Philarmonics – Dvořák’s New World Symphony/Largo (Jazz Version 1977)

https://www.youtube.com/watch?v=KJTAo9AexdU (4:31)

{##} {&&&} {##}

I went through the archives of some old blogs from the days when I was on Blogger’s Blogspot.  The first batch is from the first week of July, 2013, so we’re looking back almost a year.

In early July, tends of thousands were in the streets of Egypt, when Chris Floyd said:

“… the sinister machinations of the literally machine-hearted Dick Cheney and his chump of a frontman, the noted naked self-portraitist, George W. Bush. For as Fred Branfman reminds us in a powerful new piece, the Executive Branch of the United States government has murdered, maimed and dispossessed many millions of innocent people in the past few decades alone in senseless, pointless, criminal actions. It is a long and richly detailed piece, and should be read in full….”

Superiority Complex: The Reach and Roots of America’s Stasi Regime

{##} {&&&} {##}

Wayne Madsen, a former US navy lieutenant who first worked for the NSA in 1985 and over the next 12 years held several sensitive positions within the agency, named Denmark, the Netherlands, France, Germany, Spain and Italy as having secret deals with the US. http://archive.today/SdLeW 

Madsen said the countries had “formal second and third party status” under signal intelligence (sigint) agreements that compels them to hand over data, including mobile phone and internet information to the NSA if requested.

{##} {&&&} {##}

“…. The power of truth-tellers like Bradley Manning, Julian Assange, and Edward Snowden is that they dispel a whole mythology carefully constructed by the corporate cinema, the corporate academy and the corporate media. WikiLeaks is especially dangerous because it provides truth-tellers with a means to get the truth out. This was achieved by ‘Collateral Murder’, the cockpit video of an US Apache helicopter allegedly leaked by Bradley Manning. The impact of this one video marked Manning and Assange for state vengeance. Here were US airmen murdering journalists and maiming children in a Baghdad street, clearly enjoying it, and describing their atrocity as “nice”. Yet, in one vital sense, they did not get away with it; we are witnesses now, and the rest is up to us.”

http://johnpilger.com/articles/understanding-the-latest-leaks-is-understanding-the-rise-of-a-new-fascism 

{##} {&&&} {##}

Kevin Flaherty, who has forgotten more about information technology than most of the rest of know, had some brilliant insights here: http://www.cryptogon.com/?p=35884

He looked back into the past as well and came up with Room 641A and the placement of beam splitters

“One of [his] long standing theories is that the NSA intercepts represent the front end of something like Synthetic Environments for Analysis and Simulation system. What are they doing with these simulations? [See next, and next.]

I would like to know more about MAIN CORE.

I’m pretty confident that realtime geolocation data from mobile phones/license plate readers/cameras/??? are being used as a sort of invisible tripwire. If people on the MAIN CORE list happen to stray too close to certain physical locations (critical infrastructure, corporate headquarters, government installations, etc.), that could trigger… shall we say, a variety of responses. This would be very, very trivial to implement.

Is there an automatic mechanism that adds individuals to MAIN CORE? Book purchases, Google searches, websites visited, movie or television watching habits, the number of firearms at a residence???

What is the nature of the quantum computing systems to which NSA has access?….”

Flaherty mentioned Main Core; in the comments at that link to his own blog, he mentioned another entry: 

http://cryptogon.com/2006_10_15_blogarchive.html#116113782172259609 (about fusion centers and more):

“…Back in 1995, the few of us who studied information warfare read this in a Pentagon document: “The Internet could also be used offensively as an additional medium in psychological operations campaigns and to help achieve unconventional warfare objectives….”

BOSTON (Reuters) – Disaffected people living in the United States may develop radical ideologies and potentially violent skills over the Internet and that could present the next major U.S. security threat, U.S. Homeland Security Secretary Michael Chertoff said on Monday.

“We now have a capability of someone to radicalize themselves over the Internet,” Chertoff said on the sidelines of a meeting of International Association of the Chiefs of Police.

{##} {&&&} {##}

Main Core is something I’ve read extensively about.  At one point, the late great Ed Encho (author of a major four-part series on the topic) riffed back and forth on the topic. He and I talked about the possibility of doing a blog jointly, but I insisted on knowing his full accurate name and address and phone number, and he was being hassled by an Internet troll, and he slipped beneath the waves inside the tubes.  He’s resurfaced as Donn Marten and holds court at http://carryingaflag.blogspot.com/ where just today he’s posted NSA Reform is Dead: Tech Companies Must Act to Protect Us Now.

{##} {&&&} {##}

Music audio:

Stan Kenton and his Orchestra (5:10)

https://www.youtube.com/watch?v=veKsxNFatYo

{##} {&&&} {##}

http://r3.cygnuspub.com/files/cygnus/image/EMSR/2011/OCT/600×400/urbanshield2011021_10440470.png 

On the basis of those synthetic environments for analysis and simulation and the research I’d done on simulation, I simply hold up a four-card flush:

a 3D visualization interface that could enable human virtual omnipresence (http://teamcore.usc.edu/papers/2005/SS105SchurrN.pdf ); 

the Urban Shield series of exercises that have been run in a number of cities including Boston (http://www.bostonglobe.com/metro/2013/06/07/before-police-could-plan-for-terrorist-attack-real-thing-happened/ufxjb9O0RXyzVZNPFyGkiI/story.html );

the creation of a realistic 3D model of the entire Los Angeles basin (“A Real Time Visualization System for Large Scale Urban Environments”, William Jepson and Scott Friedman, UCLA Urban Simulation Team (http://www.ust.ucla.edu/~bill/UST.html but the link no longer works); 

and that famous quote:

Today Americans would be outraged if U.N. troops entered Los Angeles to restore order; tomorrow they will be grateful! This is especially true if they were told there was an outside threat from beyond whether real or promulgated, that threatened our very existence. It is then that all peoples of the world will pledge with world leaders to deliver them from this evil. The one thing every man fears is the unknown. When presented with this scenario, individual rights will be willingly relinquished for the guarantee of their well being granted to them by their world government.


– Henry Kissinger in an address to the Bilderberger meeting at Evian, France, May 21, 1992, as transcribed from a tape recording made by one of the Swiss delegates.

pastedGraphic.png Henry Kissinger quotes (American Political scientist. b.1923)

{##} {&&&} {##}

http://stuffpoint.com/memes/image/131554-memes-what-if-i-told-you-.jpg 

{##} {&&&} {##}

Robin Westenra at SeeMoreRocks brought us this:

Professor David Morris of George Washington University explains the psychopathy ruling our nation, and the world, at the present moment.

http://www.youtube.com/watch?feature=player_embedded&v=KGfVYTxrK7Y (8:34)

{##} {&&&} {##}

There were several articles about “World War Z”, a 55-minute YouTube on the Rothschild family, and an article detailing research on the topic of Phillip Marshall and his investigation into the role that the Pinal Air Park/Marana Airfield outside of Tucson, Arizona played in the 9/11 attack. The story has now been made into a movie; there were 16 articles.

There were reviews of Radley Balko’s “Rise of the Warrior Cop” [ “a creeping battlefield mentality has isolated and alienated American police officers and put them on a collision course with the values of a free society” ][you’re keeping up with the many reports about increasing police brutality, I trust], and “Stalin’s Secret Agents: The Subversion of Roosevelt’s Government”

In the latter: 

“… The facts presented here expose shocking cover-ups, from the top FDR aides who threatened internal security and free-world interests by exerting pro-Red influence on U.S.policy, to the grand juries that were rigged, to the countless officials of the Roosevelt and Truman administrations who turned a blind eye to the penetration problem…..”

“… A central message of the book – never explicitly stated – is that there was an international conspiracy to, in effect, overthrow Western civilization. (The authors would never point it out, but readers of the book will notice that a high percentage of the people involved were Jewish. Readers of this review will notice, as well, that some of the key brave people sounding the alarm over this subversion were also Jewish.) Not only was the U.S. government penetrated at the highest level, but this organized Communist network also apparently controlled key positions in the U.S. opinion-molding business…..”

http://archive.lewrockwell.com/orig13/martin-david2.1.1.html 

 [See below…]

I also forecast my acquisition and consumption of Kevin Ryan’s Another Nineteen: Investigating Legitimate 9/11 Suspects, and Bob Tuskin had called in on an NPR show and got cut off when he mentioned WTC7. By that time, Snowden had holed up in Moscow.

http://m.ruvr.ru/2010/03/31/1238312922/RIA-503882-Preview.jpg.1000x297x1.jpg 

http://en.wikipedia.org/wiki/The_Terminal_Man 

 

http://en.wikipedia.org/wiki/The_Terminal_Man_(film

Hoping to cure his violent seizures, a man agrees to a series of experimental microcomputers inserted into his brain but inadvertently discovers that violence now triggers a pleasurable response his brain. [ http://www.imdb.com/title/tt0072267/ ]

 

Terrence Malick, the director of Badlands, wrote to Hodges expressing how much he loved watching The Terminal Man, saying “Your images make me understand what an image is.”[3]

 

http://en.wikipedia.org/wiki/The_Terminal 

 

Steven Spielberg traveled around the world to find an actual airport that would let him film for the length of the production, but could not find one. The Terminal set was built in a massive hangar at the LA/Palmdale Regional Airport. The hangar, part of the U.S. Air Force Plant 42 complex was used to build the Rockwell International B-1B bomber. The set was built to full earthquake construction codes and was based on the Düsseldorf International Airport. The shape of both the actual terminal and the set viewed sideways is a cross section of an aircraft wing. The design of the set for The Terminal, as noted by Roger Ebert in his reviews and attested by Spielberg himself in a feature by Empire magazine, was greatly inspired by Jacques Tati‘s classic film Play Time.

 

http://i2.cdn.turner.com/cnn/dam/assets/130626102131-01-moscow-airport-horizontal-gallery.jpg 

{##} {&&&} {##}

 

 

http://prorev.com/1306highpay.jpg 

{##} {&&&} {##}

You will have to decide weather or not this is pertinent to wassappenin.

One or about July 7, 2008, The Weather Channel was purchased by [GE Owned NBC] for $3.2 Billion, with Britain’s Queen as a major shareholder and by two equity firms; 1 is [Bain Capital owned by Romney and 2 Blackstone which is a big illuminati company] as the Chairman of the Board proves, he is a khazar CFR player, (probably representing Rothschilds interests) AND was managing director of Lehman Bros. Wow, a true insider.

http://tinyurl.com/politicslvelcraft 

 

Weather Services International (WSI), part of the Weather Channel, announced that it will acquire Weather Central in a deal that further consolidates the  Weather Channel’s grip on weather-related technology for both professional and consumer applications. Terms of the deal were not disclosed.

This is the second M&A deal in the last 2 months for the Weather Channel.   In July of 2012 the Weather Channel acquired Weather Underground for an undisclosed price.

The transaction is a relatively quick, and presumably profitable, deal for private equity firm E.L. Rothschild LLC, who in January 2011 bought a 70% stake in Weather Central.  At that time, Weather Central had 180 employees, including 70 meteorologists, and said it had more than 400 broadcast television clients in 21 countries worldwide, including a 46% market share of North America’s weather information delivery market for broadcast and media.

“The acquisition of Weather Central enables us to immediately expand the range of products we offer to each company’s business clients in television, wind energy, insurance and retail, as well as increase the speed at which we can develop new innovations,” said Mark Gildersleeve, president of WSI. “Our goal is to make the best products available to our collective customer base. Every broadcast customer, for example, will gain access to new tropical data, radar data, forecast models, and severe weather tracking tools within the first thirty days at no charge. In addition, we are offering a wider suite of products in the interactivity, social, news, traffic, web, mobile and video categories.”

.

Related Content:

Press Release: Weather Services International Acquires Weather Central

The Weather Channel Acquires Weather Underground

Press Release: E.L. Rothschild LLC Acquires a Majority Stake in Weather Central, LP

There was a third source for the same content but it has been taken down, but another popped up soon enough.

.

What’s your forecast? 

 

Here’s one of their advertisers: 

http://www.511tactical.com/?utm_source=AdRoll&utm_medium=banner&utm_content=300×250&utm_campaign=craft 

Gonna have to get me some of them there tactical pants and a couple of pouches and a backpack. They’ll come in right handy in the coming storms.

 

{##} {&&&} {##}

 

http://en.mchs.ru/media/img/en_logo.png 

 

You know the bidness going on currently between Russia and the US?  

On July 1, 2013, Paul Joseph Watson over at infowars.com reported:

As part of a deal signed last week in Washington DC between the Russian Emergency Situations Ministry and FEMA, Russian officials will provide “security at mass events” in the United States, a scenario that won’t sit well with Americans wary of foreign assets operating on US soil.

According to a press release by the Ministry of the Russian Federation for Civil Defense and Emergencies, US and Russian officials met on June 25 at the 17th Joint U.S.-Russia Cooperation Committee on Emergency Situations.

In addition to agreeing with FEMA to “exchange experts during joint rescue operations in major disasters,” the Russian Emergency Situations Ministry will also be providing “security at mass events” in the United States.

This suggests that events designated as “National Special Security Events” by the Department of Homeland Security, which include the Super Bowl, international summits such as the G8 and presidential inaugurations, will now rely partly on Russian authorities to provide security.

Russia immediately denied this http://en.ria.ru/world/20130702/182017287/No-Russian-Security-Guards-at-American-Mass-Events–US-Agency.html and FEMA insisted they still share information on “best practices”. 

“… Mass casualty attacks and disasters generate domestic political pressure to “do something,” and Hurricane Katrina gained worldwide attention to the apparent inability of the most advanced industrialized nation in the world to respond to natural disaster of this scope after having remade much of its emergency management after September 11 (Cooper & Block, 2006). And while most large “focusing events” can reveal a range of policy failures and prospects for learning (Birkland, 1998; May, 1992), it is important to consider whether and to what extent the “correct” lessons were learned. Two “lessons” that policy makers derived from the September 11 attacks were the putative need to create what became the Department of Homeland Security, or DHS, and, once such an idea gained acceptance, the “need” for the Federal Emergency Management Agency (FEMA) to be a part of that agency…..” http://cstl-cla.semo.edu/wmiller/ps691/Birkland%202.pdf

I am reminded, too, of the not-widely-known secret meeting of Dick Cheney et al after the Iran-Contra affair to review the “lessons learned”.  Cheney was in charge of all drills and exercises in the run-up to and during 9/11.

“… they had a meeting after 9/11 of the people who were in, in the White House, who worked in Iran-Contra–that would be Abrams and Cheney, and there were others involved who were also in the White House and they had a meeting of lessons learned, I’m telling you literally took place. They had a meeting with a small group of people who worked for Reagan and for George Bush when he was Vice President, his father, George Herbert Walker Bush, anyway.

And at the meeting, here were some of the conclusions: that the Iran-Contra thing, despite the disasters, proved you could do it, you could run operations without Congressional money and get away with it…..”

http://emptywheel.firedoglake.com/2009/03/23/cheneys-assassination-squads-and-iran-contra-and-findings/ 

{##} {&&&} {##}

North Carolina National Guard Rapid Reaction Force Civil Unrest Training Photos

July 3, 2013 in Headline

The following photos depict soldiers from the 252nd Combined Arms Battalion training in June for their role as a “rapid reaction force” capable of responding anywhere in the state of North Carolina within “four to eight hours with additional forces arriving within 24 to 36 hours.”  The same unit trained in March to respond “to an emergency ahead of federal assets by providing site security, establishing roadblocks or checkpoints, and assisting civilian authorities in controlling civil disturbances.”

The exercises depicted below were held from June 10-14 at an abandoned shopping mall and a water treatment facility in Charlotte.  Soldiers trained to suppress protesters who perform a sit-in as part of a fictional group called “The Pink Panthers.”  According to the North Carolina National Guard, the exercise at the water treatment facility tests soldiers’ “ability to use nonlethal force to disperse a crowd of aggressors.”  Photos of the exercise show soldiers operating from Be On the Look Out (BOLO) notices with the identities of specific individuals in the crowd, listed as “AIN Members,” that are to be targeted for arrest.

Photos via North Carolina National Guard and Grant Baldwin Photography.

Research Credit: HongPong

{##} {&&&} {##}

As the grills and fireworks and the Fourth were getting warmed up, we saw evidence of ‘Imperial Skyjacking’ with Evo Morales being suspected of transporting Snowden, an act which echoed recently in the Ukraine.  History shows us other assassinations by shoot-down (Yamamoto, Wellstone, and perhaps others). The National Security Archive had something on The Israel-Argentina Yellowcake Connection, and according to Zero Hedge citing china.org.cn, the Chinese and the Russians were conducting joint naval drills, and Intellihub had a good review of the laws on “accessory” as they pertain to the media cover-up of 9/11 (but those links have disappeared now too). 

There was (and still is) a YouTube video on the world’s scariest drug (scopolamine), a healthy dose of which was once recommended for me by a violinist who supported Mike Ruppert’s POV on his discussion board about “collapse”.  

{&&&}

http://fauquierfreecitizen.com/seventy-two-killed-resisting-gun-confiscation-in-boston/ 

{##} {&&&} {##}

Traveling With Bernays 

( http://en.wikipedia.org/wiki/Edward_Bernays )

Sky Deutschland has developed technology to transfer advertisements from train windows directly and silently into commuters’ heads.

http://www.youtube.com/watch?v=azwL5eoE5aI (1:26)

http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/media/10158311/Sky-Deutschland-to-broadcast-adverts-directly-into-train-passengers-heads.html 

{##} {&&&} {##}

Speaking of trains, the Lac-Megantic event occurred  on July 6th http://globalnews.ca/news/767745/timeline-of-events-in-lac-megantic-disaster/ and the Israeli Medical Association was called in to consult on methods of handling the hunger strikers at Gitmo. 

The Michael Hastings crash was on the minds of a few (and it still is this week ), the Bin Laden Raid Files Moved from Pentagon to CIA to More Easily Shield Them from Public Scrutiny, and the criminal probe into Jon Corzine and MF Global was dropped due to lack of evidence. Egypt and the debate about metadata both exploded, and HongPong brought us this photo:

http://hongpong.com/files/tumblr_mpmf8mqcx41s7r7rso1_1280.jpg  

 

{##} {&&&} {##}

 

Finally, when fishing around in the archives, I found this:

 

 

The purportedly “scientific” application of propaganda, terror, and state pressure as a means of securing an ideological victory over one’s enemies

“Worldview Warfare” and The Science of Coercion

by Christopher Simpson

Excerpts from The Science of Coercion, Oxford University Press, 1994

www.globalresearch.ca   23 November 2003

 

The URL of this article is: http://globalresearch.ca/articles/SIM311A.html

 

During the second half of the 1930s, the Rockefeller Foundation underwrote much of the most innovative communication research then under way in the United States. There was virtually no federal support for the social sciences at the time, and corporate backing for the field usually remained limited to proprietary marketing studies. The foundation’s administrators believed, however, that mass media constituted a uniquely powerful force in modem society, reports Brett Gary, 28 and financed a new project on content analysis for Harold Lasswell at the Library of Congress, Hadley Cantril’s Public Opinion Research Project at Princeton University, the establishment of Public Opinion Quarterly at Princeton, Douglas Waples’ newspaper and reading studies at the University of Chicago, Paul Lazarsfeld’s Office of Radio Research at Columbia University, and other important programs.

As war approached, the Rockefeller Foundation clearly favored efforts designed to find a “democratic prophylaxis” that could immunize the United States’ large immigrant population from the effects of Soviet and Axis propaganda. In 1939, the foundation organized a series of secret seminars with men it regarded as leading communication scholars to enlist them in an effort to consolidate public opinion in the United States in favor of war against Nazi Germany — a controversial proposition opposed by many conservatives, religious leaders, and liberals at the time — and to articulate a reasonably clear-cut set of ideological and methodological preconceptions for the emerging field of communication research. 29

Harold Lasswell, who had the ear of foundation administrator John Marshall at these gatherings, over the next two years won support for a theory that seemed to resolve the conflict between the democratic values that are said to guide U.S. society, on the one hand, and the manipulation and deceit that often lay at the heart of projects intended to engineer mass consent, on the other. Briefly, the elite of U.S. society (“those who have money to support research,” as Lasswell bluntly put it) should systematically manipulate mass sentiment in order to preserve democracy from threats posed by authoritarian societies such as Nazi Germany or the Soviet Union.

One Rockefeller seminar participant, Donald Slesinger (former dean of the social science at the University of Chicago), blasted Lasswell’s claims as using a democratic guise to tacitly accept the objectives and methods of a new form of authoritarianism. “We [the Rockefeller seminar] have been willing, without thought, to sacrifice both truth and human individuality in order to bring about given mass responses to war stimuli,” Slesinger contended. “We have thought in terms of fighting dictatorships- by-force through the establishment of dictatorship-by-manipulation. 30 Slesinger’s view enjoyed some support from other participants and from Rockefeller Foundation officers such as Joseph Willits, who criticized what he described as authoritarian or even fascist aspects of Lasswell’s arguments. Despite this resistance, the social polarization created by the approaching war strongly favored Lasswell, and in the end he enjoyed substantial new funding and an expanded staff courtesy of the foundation. Slesinger, on the other hand, drifted away from the Rockefeller seminars and appears to have rapidly lost influence within the community of academic communication specialists.

World War II spurred the emergence of psychological warfare as a particularly promising new form of applied communication research. The personal, social, and scientific networks established in U.S. social sciences during World War II, particularly among communication researchers and social psychologists, later played a central role in the evolution (or “social construction”) of U.S. sociology after the war. A detailed discussion of U.S. psychological operations during World War 11 is of course outside the scope of this book. There is a large literature on the subject, which is discussed briefly in the Bibliographic Essay at the end of this text. A few points are worth mentioning, however, to introduce some of the personalities and concepts that would later play a prominent role in psychological operations and communication studies after 1945.

The phrase “psychological warfare” is reported to have first entered English in 1941 as a translated mutation of the Nazi term Weltanschauungskrieg (literally, worldview warfare), meaning the purportedly scientific application of propaganda, terror, and state pressure as a means of securing an ideological victory over one’s enemies. 31 William “Wild Bill” Donovan, then director of the newly established U.S. intelligence agency Office of Strategic Services (OSS), viewed an understanding of Nazi psychological tactics as a vital source of ideas for “Americanized” versions of many of the same stratagems. Use of the new term quickly became widespread throughout the U.S. intelligence community. For Donovan psychological warfare was destined to become a full arm of the U.S. military, equal in status to the army, navy, and air force. 32

Donovan was among the first in the United States to articulate a more or less unified theory of psychological warfare. As he saw it, the “engineering of consent” techniques used in peacetime propaganda campaigns could be quite effectively adapted to open warfare. Pro-Allied propaganda was essential to reorganizing the U.S. economy for war and for creating public support at home for intervention in Europe, Donovan believed. Fifth-column movements could be employed abroad as sources of intelligence and as morale-builders for populations under Axis control. He saw “special operations — meaning sabotage, subversion, commando raids, and guerrilla movements — as useful for softening up targets prior to conventional military assaults. “Donovan’s concept of psychological warfare was all-encompassing,” writes Colonel Alfred Paddock, who has specialized in this subject for the U.S. Army War College. “Donovan’s visionary dream was to unify these functions in support of conventional (military) unit operations, thereby forging a ‘new instrument of war.'” 33

Donovan, a prominent Wall Street lawyer and personal friend of Franklin Roosevelt, convinced FDR to establish a central, civilian intelligence agency that would gather foreign intelligence, coordinate analysis of information relevant to the war, and conduct propaganda and covert operations both at home and abroad. In July 1941 FDR created the aptly named Office of the Coordinator of Information, placing Donovan in charge. 34

But that ambitious plan soon foundered on the rocks of Washington’s bureaucratic rivalries. By early 1942 the White House split the “white” (official) propaganda functions into a new agency, which eventually became the Office of War Information (OWI), while Donovan reorganized the intelligence, covert action, and “black” (unacknowledgeable) propaganda functions under deeper secrecy as the OSS. Officially, the new OSS was subordinate to the military leadership of the Joint Chiefs of Staff, but the relationship between the military and the civilian OSS was never smooth. Donovan frequently used his personal relationship with FDR to sidestep the military’s efforts to restrict the OSS’s growing influence. 35

Similar innovations soon spread through other military branches, usually initiated by creative outsiders from the worlds of journalism or commerce who saw “psychological” techniques as a means to sidestep entrenched military bureaucracies and enhance military performance. Assistant Secretary of War John J. McCloy, a longtime Wall Street colleague of Donovan, established a small, highly secret Psychologic Branch within the War Department General Staff G-2 (Intelligence) organization. (McCloy is probably better known today for his later work as U.S. high commissioner of Germany, chairman of the Chase Bank, member of the Warren Commission, and related posts). 36 McCloy’s Psychologic Branch was reorganized several times, briefly folded in the OSS, shifted back to military control, and renamed at least twice. The Joint Chiefs meanwhile established a series of high-level interagency committees intended to coordinate U.S. psychological operations in the field, including those of the relatively small Psychological Warfare Branches attached to the headquarters staffs of U.S. military commanders in each theater of war. If this administrative structure was not confusing enough, the psychological warfare branch attached to Eisenhower’s command in Europe soon grew into a Psychological Warfare Division totaling about 460 men and women. 37

These projects helped define U.S. social science and mass communication studies long after the war had drawn to a close. Virtually all of the scientific community that was to emerge during the 1950s as leaders in the field of mass communication research spent the war years performing applied studies on U.S. and foreign propaganda, Allied troop morale, public opinion (both domestically and internationally), clandestine OSS operations, or the then emerging technique of deriving useful intelligence from analysis of newspapers, magazines, radio broadcasts, and postal censorship intercepts.

The day-to-day war work of U.S. psychological warfare specialists varied considerably. DeWitt Poole — a State Department expert in anticommunist propaganda who had founded Public Opinion Quarterly while on sabbatical at Princeton before the war-became the chief of the Foreign Nationalities Branch of the OSS. There he led OSS efforts to recruit suitable agents from immigrant communities inside the United States, to monitor civilian morale, and to analyze foreign- language publications for nuggets of intelligence. Sociologists and Anthropologists such as Alexander Leighton and Margaret Mead concentrated on identifying schisms in Japanese culture suitable for exploitation in U.S. radio broadcasts in Asia, while Samuel Stouffer’s Research Branch of the U.S. Army specialized in ideological indoctrination of U.S. troops. Hadley Cantril meanwhile adapted survey research techniques to the task of clandestine intelligence collection, including preparations for the U.S. landing in North Africa. 38

There were six main U.S. centers of psychological warfare and related studies during the conflict. Several of these centers went through name changes and reorganizations in the course of the war, but they can be summarized as follows: (1) Samuel Stouffer’s Research Branch of the U.S. Army’s Division of Morale; (2) the Office of War Information (OWI) led by Elmer Davis and its surveys division under Elmo Wilson; (3) the Psychological Warfare Division (PWD) of the U.S. Army, commanded by Brigadier General Robert McClure; (4) the Office of Strategic Services (OSS) led by William Donovan; (5) Rensis Likert’s Division of Program Surveys at the Department of Agriculture, which provided field research personnel in the United States for the army, OWI, Treasury Department, and other government agencies; and (6) Harold Lasswell’s War Communication Division at the Library of Congress.

Dozens of prominent social scientists participated in the war through these organizations, in some cases serving in two or more groups in the course of the conflict. The OWI, for example, employed Elmo Roper (of the Roper survey organization), Leonard Doob (Yale), Wilbur Schramm (University of Illinois and Stanford), Alexander Leighton (Cornell), Leo Lowenthal (Institut fur Sozialforschung and University of California), Hans Speier (RAND Corp.), Nathan Leites (RAND), Edward Barrett (Columbia), and Clyde Kluckhohn (Harvard), among others. 39

(The institutions in parentheses simply indicate the affiliations for which these scholars may be best known.) OWI simultaneously extended contracts for communications research and consulting to Paul Lazarsfeld, Hadley Cantril, Frank Stanton, George Gallup, and to Rensis Likert’s team at the Agriculture Department. 40 OWI contracting also provided much of the financial backbone for the then newly founded National Opinion Research Center. 41

In addition to his OWI work, Nathan Leites also served as Lasswell’s senior research assistant at the Library of Congress project, as did Heinz Eulau (Stanford). 42 Other prominent contributors to the Lasswell project included Irving Janis (Yale) and the young Ithiel de Sola Pool (MIT), who, with Leites, had already begun systematic content analysis of communist publications long before the war was over. 43 Lasswell’s Library of Congress project is widely remembered today as the foundation of genuinely systematic content analysis in the United States. 44

At the Army’s Psychological Warfare Division, some prominent staffers were William S. Paley (CBS), C. D. Jackson (Time/Life), W. Phillips Davison (RAND and Columbia), Saul Padover (New School for Social Research), John W. Riley (Rutgers), Morris Janowitz (Institut fur Sozialforschung and University of Michigan), Daniel Lerner (MIT and Stanford), Edward Shils (University of Chicago), and New York attorney Murray Gurfein (later co-author with Janowitz), among others. 45 Of these, Davison, Padover, Janowitz, and Gurfein were OSS officers assigned to the Psychological Warfare Division to make use of their expertise in communication and German social psychology. 46 Other prominent OSS officers who later contributed to the social sciences include Howard Becker (University of Wisconsin), Alex Inkeles (Harvard), Walter Langer (University of Wisconsin), Douglas Cater (Aspen Institute), and of course Herbert Marcuse (Institut fur Sozialforschung and New School). 47 0SS wartime contracting outside the government included arrangements for paid social science research by Stanford, the University of California at Berkeley, Columbia, Princeton, Yale’s Institute of Human Relations, and the National Opinion Research Center, which was then at the University of Denver. 48 Roughly similar lists of social scientists and scholarly contractors can be discovered at each of the government’s centers of wartime communications and public opinion research. 49

The practical significance of these social linkages has been explored by social psychologist John A. Clausen, who is a veteran of Samuel Stouffer’s Research Branch. Clausen made a systematic study during the early 1980s of the postwar careers of his former colleagues who had gone into the fields of public opinion research, sociology, and psychology. 50 Some twenty-five of twenty-seven veterans who could be located responded to his questionnaire; of these, twenty-four reported that their wartime work had had “lasting implications” and “a major influence on [their] subsequent career.” Clausen quotes the reply of psychologist Nathan Maccoby (Stanford): “The Research Branch not only established one of the best old-boy (or girl) networks ever, but an alumnus of the Branch had an open door to most relevant jobs and career lines. We were a lucky bunch.” Nearly three-fifths of the respondents indicated that the Research Branch experience “had a major influence on the direction or character of their work in the decade after the war,” Clausen continues, “and all but three of the remainder indicated a substantial influence…. [F]ully three-fourths reported the Branch experience to have been a very important influence on their careers as a whole.” 51

Respondents stressed two reasons for this enduring impact. First, the wartime experience permitted young scholars to closely work with recognized leaders in the field — Samuel Stouffer, Leonard Cottrell, Carl Hovland, and others-as well as with civilian consultants such as Paul Lazarsfeld, Louis Guttman, and Robert Merton. In effect, the Army’s Research Branch created an extraordinary postgraduate school with obvious scholarly benefits for both “students” and the seasoned “professors.”

Second, the common experience created a network of professional contacts that almost all respondents to the survey found to be very valuable in their subsequent careers. They tapped these contacts later for professional opportunities and for project funding, according to Clausen. “Perhaps most intriguing” in this regard, Clausen writes,

was the number of our members who became foundation executives. Charles Dollard became president of Carnegie. Donald Young shifted from the presidency of SSRC [Social Science Research Council] to that of Russell Sage, where he ultimately recruited Leonard Cottrell. Leland DeVinney went from Harvard to the Rockefeller Foundation. William McPeak … helped set up the Ford Foundation and became its vice president. W. Parker Mauldin became vice president of the Population Council. The late Lyle Spencer [of Science Research Associates] . . . endowed a foundation that currently supports a substantial body of social science research. 52

There was a somewhat similar sociometric effect among veterans of OWI propaganda projects. OWI’s overseas director Edward Barrett points out that old-boy networks rooted in common wartime experiences in psychological warfare extended well beyond the social sciences. Among OWI alumni,” he wrote in 1953, are

the publishers of Time, Look, Fortune, and several dailies; editors of such magazines as Holiday, Coronet, Parade, and the Saturday Review, editors of the Denver Post. New Orleans Times-Picayune, and others; the heads of the Viking Press, Harper & Brothers, and Farrar, Straus and Young; two Hollywood Oscar winners; a two-time Pulitzer prizewinner; the board chairman of CBS and a dozen key network executives; President Eisenhower’s chief speech writer; the editor of Reader’s Digest international editions; at least six partners of large advertising agencies; and a dozen noted social scientists. 53

Barrett himself went on to become chief of the U.S. government’s overt psychological warfare effort from 1950 to 1952 and later dean of the Columbia Graduate School of Journalism and founder of the Columbia Journalism Review. 54

It is wise to be cautious in evaluating the political significance of these networks, of course. Obviously Herbert Marcuse drew quite different political conclusions from his experience than did, say, Harold Lasswell, and it is well known that even some of the once closely knit staff of the Institut fur Sozialforschung who emigrated to the United States eventually clashed bitterly over political issues during the cold war. 55 Nevertheless, the common experience of wartime psychological warfare work became one step in a process through which various leaders in the social sciences engaged one another in tacit alliances to promote their particular interpretations of society. Their wartime experiences contributed substantially to the construction of a remarkably tight circle of men and women who shared several important conceptions about mass communication research. They regarded mass communication as a tool for social management and as a weapon in social conflict, and they expressed common assumptions concerning the usefulness of quantitative research-particularly experimental and quasi- experimental effects research, opinion surveys, and quantitative content analysisas a means of illuminating what communication “is” and improving its application to social management. They also demonstrated common attitudes toward at least some of the ethical questions intrinsic to performing applied social research on behalf of a government. The Clausen study strongly suggests that at Stouffer’s Research Branch, at least, World War II psychological warfare work established social networks that opened doors to crucial postwar contacts inside the government, funding agencies, and professional circles. Barrett’s comments concerning the Psychological Warfare Division suggest a similar pattern there. As will be discussed in more depth in the next chapter, the various studies prepared by these scientists during the war — always at government expense and frequently involving unprecedented access to human research subjects — also created vast new data bases of social information that would become the raw material from which a number of influential postwar social science careers would be built.

The CIA and the Founding Fathers of Communication Studies

Turning to a consideration of CIA-sponsored psychological warfare studies, one finds a wealth of evidence showing that projects secretly funded by the CIA played a prominent role in U.S. mass communication studies during the middle and late 1950s. The secrecy that surrounds any CIA operation makes complete documentation impossible, but the fragmentary information that is now available permits identification of several important examples.

The first is the work of Albert Hadley Cantril (better known as Hadley Cantril), a noted “founding father” of modem mass communication studies. Cantril was associate director of the famous Princeton Radio Project from 1937 to 1939, a founder and longtime director of Princeton’s Office of Public Opinion Research, and a founder of the Princeton Listening Center, which eventually evolved into the CIA-financed Foreign Broadcast Information Service. Cantril’s work at Princeton is widely recognized as “the first time that academic social science took survey research seriously, and it was the first attempt to collect and collate systematically survey findings.” 70 Cantril’s The Psychology of Radio, written with Gordon Allport, is often cited as a seminal study in mass communication theory and research, and his surveys of public opinion in European and Third World countries defined the subfield of international public opinion studies for more than two decades.

Cantril’s work during the first decade after World War II focused on elaborating Lippmann’s concept of the stereotype the “pictures in our heads,” as Lippmann put it, through which people are said to deal with the world outside their immediate experience. Cantril specialized in international surveys intended to determine how factors such as class, nationalism, and ethnicity affected the stereotypes present in a given population, and how those stereotypes in turn affected national behavior in various countries, particularly toward the United States. 71 Cantril’s work, while often revealing the “human face” of disaffected groups, began with the premise that the United States’ goals and actions abroad were fundamentally good for the world at large. If U.S. acts were not viewed in that light by foreign audiences, the problem was that they had misunderstood our good intentions, not that Western behavior might be fundamentally flawed.

Cantril’s career had been closely bound up with U.S. intelligence and clandestine psychological operations since at least the late 1930s. The Office of Public Opinion Research, for example, enjoyed confidential contracts from the Roosevelt administration for research into U.S. public opinion on the eve of World War 11. Cantril went on to serve as the senior public opinion specialist of the Office of the Coordinator of Inter-American Affairs (an early U.S. intelligence agency led by Nelson Rockefeller and focusing on Latin America), of the World War II Office of War Information, and, in a later period, as an adviser to President Eisenhower on the psychological aspects of foreign policy. During the Kennedy administration, Cantril helped reorganize the U.S. Information Agency. 72

According to the New York Times, the CIA provided Cantril and his colleague Lloyd Free with $1 million in 1956 to gather intelligence on popular attitudes in countries of interest to the agency. 73 The Rockefeller Foundation appears to have laundered the money for Cantril, because Cantril repeatedly claimed in print that the monies had come from that source. 74 However, the Times and Cantril’s longtime partner, Lloyd Free, confirmed after Cantril’s death that the true source of the funds had been the CIA. 75

Cantril’s first target was a study of the political potential of “protest” voters in France and Italy, who were regarded as hostile to U.S. foreign Policy. 76 That was followed by a 1958 tour of the Soviet Union under private, academic cover, to gather information on the social psychology of the Soviet population and on “mass” relationships with the Soviet elite. Cantril’s report on this topic went directly to then president Eisenhower; its thrust was that treating the Soviets firmly, but with greater respect — rather than openly ridiculing them, as had been Secretary of State John Foster Dulles’ practice — could help improve East-West relations. 77 Later Cantril missions included studies of Castro’s supporters in Cuba and reports on the social psychology of a series of countries that could serve as a checklist of CIA interventions of the period: Brazil, the Dominican Republic, Egypt, India, Nigeria, Philippines, Poland, and others. 78

An important focus of Cantril’s work under the CIA’s contract were surveys of U.S. domestic public opinion on foreign policy and domestic political issues — a use of government funds many observers would argue was illegal. 79 There, Cantril introduced an important methodological innovation by breaking out political opinions by respondents’ demographic characteristics and their place on a U.S. ideological spectrum he had devised — a forerunner of the political opinion analysis techniques that would revolutionize U.S. election campaigns during the 1980s. 80

A second-and perhaps more important — example of the CIA’s role in U.S. mass communication studies during the 1950s was the work of the Center for International Studies (CENIS) at MIT. The CIA became the principal funder of this institution throughout the 1950s, although neither the CENIS nor the CIA is known to have publicly provided details on their relationship. It has been widely reported, however, that the CIA financed the initial establishment of the CENIS; that the agency underwrote publication of certain CENIS studies in both classified and nonclassified editions; that CENIS served as a conduit for CIA funds for researchers at other institutions, particularly the Center for Russian Research at Harvard; that the director of CENIS, Max Millikan, had served as assistant director of the CIA immediately prior to his assumption of the CENIS post; and that Millikan served as a “consultant to the Central Intelligence Agency,” as State Department records put it, during his tenure as director of CENIS. 81 In 1966, CENIS scholar Ithiel de Sola Pool acknowledged that CENIS “has in the past had contracts with the CIA,” though he insisted the CIA severed its links with CENIS following a bitter scandal in the early 1960s. 82

CENIS emerged as one of me most important centers of communication studies midway through the 1950s, and it maintained that role for the remainder of the decade. According to CENIS’s official account, the funding for its communications research was provided by a four- year, $850,000 grant from the Ford Foundation, which was distributed under the guidance of an appointed planning committee made up of Hans Speier (chair), Jerome Bruner, Wallace Carroll, Harold Lasswell, Paul Lazarsfeld, Edward Shils, and Ithiel de Sola Pool (secretary). 83 It is not known whether Ford’s funds were in fact CIA monies. The Ford Foundation’s archives make clear, however, that the foundation was at that time underwriting the costs of the CIA’s principal propaganda project aimed at intellectuals, the Congress for Cultural Freedom, with a grant of $500,000 made at CIA request, and that the Ford Foundation’s director, John McCloy (who will be remembered here for his World War II psychological warfare work), had established a regular liaison with the CIA for the specific purpose of managing Ford Foundation cover for CIA projects. 84 Of the men on CENIS’s communication studies planning committee, Edward Shils was simultaneously a leading spokesman for the CIA-backed Congress for Cultural Freedom Project; Hans Speier was the RAND Corporation’s director of social science research; and Wallace Carroll was a journalist specializing in national security issues who had produced a series of classified reports on clandestine warfare against the Soviet Union for U.S. military intelligence agencies. 85 In short, CENIS communication studies were from their inception closely bound up with both overt and covert aspects of U.S. national security strategy of the day.

The CENIS program generated the large majority of articles on psychological warfare published by leading academic journals during the second half of the 1950s. CENIS’s dominance in psychological warfare studies during this period was perhaps best illustrated by two special issues of POQ published in the spring of 1956 and the fall of 1958. Each was edited by CENIS scholars-by Ithiel de Sola Pool and Frank Bonilla and by Daniel Lerner, respectively — and each was responsible for the preponderance of POQ articles concerning psychological warfare published that year. The collective titles for the special issues were “Studies in Political Communications” and “Attitude Research in Modernizing Areas.” 86

CENIS scholars and members of the CENIS planning committee such as Harold Ina”, Y. B. Damle, Claire Zimmerman, Raymond Bauer, and Suzanne Keller 87 and each of the special issue editors” provided most of the content. They drew other articles from studies that CENIS had contracted out to outside academics, such as a content analysis of U.S. and Soviet propaganda publications by Ivor Wayne of BSSR and a study of nationalism among the Egyptian elite by Patricia Kendall of BASR that was based on data gathered during the earlier Voice of America studies in the Mideast. 89

The purported dangers to the United States of “modernization” or economic development in the Third World emerged as the most important theme of CENIS studies in international communication as the decade of the 1950s drew to a close. Practically without exception, CENIS studies coincided with those issues and geographic areas regarded as problems by U.S. intelligence agencies: “agitators” in Indonesia, student radicals in Chile, “change-prone” individuals in Puerto Rico, and the social impact of economic development in the Middle East. 90 CENIS also studied desegregation of schools in Little Rock, Arkansas, as an example of “modernization.” 91

In these reports, CENIS authors viewed social change in developing countries principally as a management problem for the United States. Daniel Lerner contended that “urbanization, industrialization, secularization [and] communications” were elements of a typology of modernization that could be measured and shaped in order to secure a desirable outcome from the point of view of the U.S. government. “How can these modernizing societies-in-a-hurry maintain stability?” Lerner asked. “Whence will come the compulsions toward responsible formation and expression of opinion on which a free participant society depends?” 92

In The Passing of Traditional Society and other texts, Lerner contended that public “‘participation’ [in power] through opinion is spreading before genuine political and economic participation” in societies in developing countries 93 — a clear echo of Lippmann’s earlier thesis. This created a substantial mass of people who were relatively informed through the mass media, yet who were socially and economically disenfranchised, and thus easily swayed by the appeals of radical nationalists, Communists, and other “extremists.” As in Lippmann’s analysis, mass communication played an important role in the creation of this explosive situation, as Lerner saw it, and in elite management of it. He proposed a strategy modeled in large part on the campaign in the Philippines that combined “white” and “black” propaganda, economic development aid, and U.S.-trained and financed counterinsurgency operations to manage these problems in a manner that was “responsible” from the point of view of the industrialized world.

This “development theory,” which combined propaganda, counter- insurgency warfare, and selective economic development of targeted regions, was rapidly integrated into U.S. psychological warfare practice worldwide as the decade drew to a close. Classified U.S. programs employing “Green Beret” Special Forces troops trained in what was termed “nation building” and counterinsurgency began in the mountainous areas of Cambodia and Laos. 94 Similar projects intended to win the hearts and minds of Vietnam’s peasant population through propaganda, creation of “strategic hamlets,” and similar forms of controlled social development under the umbrella of U.S. Special Forces troops can also be traced in part to Lerner’s work, which was in time elaborated by Wilbur Schramm, Lucian Pye, Ithiel de Sola Pool, and others. 95 Lerner himself became a fixture at Pentagon-sponsored conferences on U.S. psychological warfare in the Third World during the 1960s and 1970s, lecturing widely on the usefulness of social science data for the design of what has since come to be called U.S. -sponsored low-intensity warfare abroad. 96

The Special Operations Research Office’s 1962 volume The U.S. Army’s Limited-War Mission and Social Science Research and the well-publicized controversy surrounding Project Camelot 97 show that the brutal U.S. counterinsurgency wars of the period grew out of earlier psychological warfare projects, and that their tactics were shaped in important part by the rising school of development theory. 98 Further, the promises integral to that theory — namely, that U. S. efforts to control development in the Third World, if skillfully handled, could benefit the targets of that intervention while simultaneously advancing U.S. interests — were often publicized by the USIA, by the Army’s mass media, at various academic conferences, and in other propaganda outlets. In other words, as the government tested in the field the tactics advocated by Lerner, Pool, and others, the rationalizations offered by these same scholars became propaganda themes the government promoted to counter opposition to U.S. intervention abroad. 99

The important point with regard to CENIS is the continuing, inbred relationship among a handful of leading mass communication scholars and the U.S. military and intelligence community. Substantially the same group of theoreticians who articulated the early cold war version of psychological warfare in the 1950s reappeared in the 1960s to articulate the Vietnam era adaptation of the same concepts. More than a half-dozen noted academics followed this track: Daniel Lerner, Harold Lasswell, Wilbur Schramm, John W. Riley, W. Phillips Davison, Leonard. Cottrell, and Ithiel de Sola Pool, among others. 100

 

* Excerpts from The Science of Coercion: Communication Research and Psychological Warfare 1945-1960, by Christopher Simpson (Oxford University Press, 1994)

“Worldview Warfare” and World War II (pp.22-30)

The CIA and the Founding Fathers of Communication Studies (pp. 79-85)

Footnotes:

28. Brett Gary, “Mass Communications Research, the Rockefeller Foundation and the Imperatives of War 1939-1945,” Research Reports from the Rockefeller Archive Center (North Tarrytown, NY, Spring 1991), p. 3; and Brett Gary, “American Liberalism and the Problem of Propaganda,” Ph.D. diss., University of Pennsylvania, 1992. Gary’s work is the first thorough study, so far as I am aware, of the important role of the Rockefeller Foundation in crystallizing paradigms for communication studies.

29. John Marshall (ed.), “Needed Research in Communication” (1940), folder 2677, box 224, Rockefeller Archives, Pocantico Hills, NY, cited in Gary, American Liberalism.

30. Gary, “American Liberalism and the Problem of Propaganda.”

31. Ladislas Farago, German Psychological Warfare (New York: Putnam, 1941). For a history of the origin of the term, see William Daugherty, “Changing Concepts,” in Daugherty and Janowitz, Psychological Warfare Casebook, p. 12.

32. Paddock, U.S. Army Special Warfare, pp. 5-8, 23-37.

33. Ibid., p. 6.

34. Anthony Cave Brown (ed.), The Secret War Report of the OSS (New York: Berkeley, 1976), pp. 42-63. There is a large literature on the OSS. For a reliable overview of the agency’s activities, including basic data on its establishment and leadership, see Richard Harris Smith, OSS (Berkeley: University of California Press, 1972).

35. Paddock, U.S. Army Special Warfare, pp. 7-14; and Edward Lilly, “The Psychological Strategy Board and Its Predecessors: Foreign Policy Coordination 1938-1953,” in Gaetano Vincitorio (ed.), Studies in Modern History (New York: St. Johns University Press, 1968), p. 346.

36. Kai Bird, The Chairman: John J. McCloy (New York: Simon & Schuster, 1992).

37. Paddock, U.S. Army Special Warfare, pp. 8-18; for an extended discussion, see Daniel Lerner, Sykewar: Psychological Warfare Against Germany, D-Day to VE-Day (New York: George Stewart, 1948).

38. On Poole’s role in the establishment of Public Opinion Quarterly, see Harwood Childs, “The First Editor Looks Back,” POQ, 21, no. I (Spring 1957): 7-13. On Poole’s work at the Foreign Nationalities Branch of the OSS, see (Anthony Cave Brown (ed.), Secret War Report of the OSS (New York: Berkley, 1976), chapter 2. On Leighton, see Alexander Leighton, Human Relations in a Changing World (New York: Dutton, 1949). On Mead, see Carleton Mabee, “Margaret Mead and Behavioral Scientists in World War II: Problems of Responsibility, Truth and Effectiveness,” Journal of the History of the Behavioral Sciences 23 (January 1987Y On Stouffer, see now 49 Mom On Cantril, see Hadley Cantril, “Evaluating the Probable Reactions to the Landing in North Africa in 1942: A Case Study,” POQ, 29, no. 3 (Fall 1965): 400-410.

39. On Roper and on Elmo Wilson, also of the Roper organization, see Jean Converse, Survey Research in the United States (Berkeley: University of Califomia Press, 1987), pp. 171-72. On Doob and Leites, see Daniel Lerner (ed.), Propaganda in War and Crisis (New York: George Stewart, 1951), pp. vii-viii. On Kluckhohn, Leighton, Lowenthal, and Schramm, see Daugherty and Janowitz, Psychological Warfare Casebook, pp. xiii-xiv. On Speier, Contemporary Authors, Vol. 21-24, p. 829. On Barrett, Edward Barrett, Truth Is Our Weapon (New York: Funk & Wagnalls, 1953), pp. 31-32. After his death, the Associated Press identified Barrett as a former member of the OSS, though Barrett omitted that information from biographical statements published during his lifetime; see “Edward W. Barrett Dies; Started Columbia Journalism Review,” Washington Post, October 26, 1989. For more on the OWI, see also Allan Winkler, The Politics of Propaganda: The Office of War Information 1942-1945 (New Haven: Yale University Press, 1978); and Leonard Doob, “Utilization of Social Scientists in the Overseas Branch of the Office of War Information,” American Political Science Review, 41, no. 4 (August 1947): 49-67.

40. Converse, Survey Research in the United States, pp. 163, 172.

41. Ibid., p. 309.

42. On Leites and Eulau, see Wilbur Schramm, “The Beginnings of Communication Study in the United States,” in Everett Rogers and Francis Balle (eds.), The Media Revolution in America and Western Europe (Norwood, NJ: Ablex, 1985), p. 205; and Harold Lasswell and Nathan Leites, Language of Politics (New York: George Stewart, 1949), p. 298.

43. Nathan Leites and Ithiel de Sola Pool, “The Response of Communist Propaganda,” in Lasswell and Leites, Language of Politics, pp. 153, 334.

44. Roger Wimmer and Joseph Dominick, Mass Media Research (Belmont, CA: Wadsworth, 1987Y p. 165.

45. On Paley, Jackson, Padover, Riley, Janowitz, Lerner, and Gurfein, see Lerner, Sykewar, pp. 439-43. On Davison, see Daugherty and Janowitz, Psychological Warfare Casebook, p. xii. On Shils, see Lerner, Propaganda in War, p. viii.

46. On Davison and Padover, see Daugherty and Janowitz, Psychological Warfare Casebook, pp. xii-xiii. On Gurfein and Janowitz, see Smith, OSS, pp. 86, 217.

47. On Langer, Cater, and Marcuse, see Smith, OSS, pp. 17, 23, 25, 217. On Barrett, see -Edward I Barren Dies; Started Columbia Journalism Review.” On Becker and Inkeles, see Daugherty and Janowitz, Psychological Warfare Casebook, pp. xi-xii. For a fascinating early memoir of the role of psychology and social psychology in OSS training and operations, see William Morgan, The OSS and I (New York: Norton, 1957).

48. Robin Winks, Cloak and Gown: Scholars in the Secret War, 1939-1961 (New York: Morrow, 1987), pp. 43-44, 79.

49. On Samuel Stouffer’s Morale Branch, see Samuel Stouffer, Arthur Lumsdaine, Marion Lumsdaine, Robin Williams, M. Brewster Smith, Irving Janis, Shirley Star, and Leonard Cottrell, The American Soldier (Princeton, NJ: Princeton University Press, 149Y pp. 3-53; and John Clausen, “Research on the American Soldier as a Career Contingency,” Social Psychology Quarterly 47, no. 2 (1984): 207-13. On the OSS, see Barry Katz, Foreign Intelligence: Research and Analysis in the Office of Strategic Services, 1952-1945 (Cambridge, MA: Harvard University Press, 1989): and Bernard David Rifkind, “OSS and Franco-American Relations 1942-1945” Ph.D. diss., George Washington University, 1983, pp. 318-36. On psychological operations in the Pacific theater, see Leighton, Human Relations in a Changing World.

50. Clausen, “Research on the American Soldier.”

51. Ibid., p. 210.

52. Ibid., p. 212.

53. Barrett, Truth, p. 31fn.

54. “Edward W. Barrett Dies; Started Columbia Journalism Review.”

55. Martin Jay, The Dialectical Imagination: A History of the Frankfurt School and the Institute for Social Research, 1923-1950 (Boston: Little, Brown, 1973); and Katz, Foreign Intelligence, pp. 29ff.

70. Information on Cantril in this paragraph is from “Cantril, [Albert] Hadley,” National Cyclopedia of American Biography, Vol. 55, pp. 211-12.

71. See, for example, William Buchanan and Hadley Cantril, How Nations See Each Other (Westport, CT: Greenwood, 1972), pp. 91-101; or Hadley Cantril, The Politics of Despair (New York: Basic Books, 1958).

72. “Cantril, [Albert] Hadley. See also collection of Psychological Strategy Board correspondence with Cantril, including Cantril’s oblique reference to what appears to be clandestine CIA sponsorship and editing of his pamphlet The Goals of the Individual and the Hopes of Humanity (1951; published by Institute for Associated Research, Hanover, NH) in Cantril note of October 22, 195 1; in Hadley Cantril correspondence, Psychological Strategy Board, Truman Library, Independence, MO.

73. John M. Crewdson and Joseph Treaster, “Worldwide Propaganda Network Built by the CIA” New York Times, December 26, 1977.

74. Hadley Cantril, The Human Dimension: Experiences in Policy Research (New Brunswick, NJ: Rutgers University Press, 1967), pp. 131-32, 145.

75. Crewdson and Treaster, “Worldwide Propaganda Network.”

76. Hadley Cantril and David Rodnick, Understanding the French Left (Princeton: Institute for International Social Research, 1956).

77. Cantril, The Human Dimension, pp. 134-43.

78. Cantril, The Politics of Despair; Cantril, The Human Dimension, pp. 1-5, 144.

79. Lloyd Free and Hadley Cantril, The Political Beliefs of Americans (New Brunswick, NJ: Rutgers University Press, 1967). On the question of legality, note that the CIA’s charter bars the agency from “police, subpoena, lawenforcement powers or internal security functions,” a phrase that most observers contend prohibits the CIA from collecting intelligence on U.S. citizens inside the United States. On this point, see Thomas Powers, The Man Who Kept the Secrets: Richard Helms and the CIA (New York: Pocket Books, 1979), pp. 315-17, 367-70, concerning the CIA’s Operation Chaos.

80. For an example of a similar, later technique, see “Redefining the American Electorate,” Washington Post, October 1, 1987, p. At 2, with data provided by the Times Mirror-Gallup Organization.

81. On CIA funding of CENIS, see Victor Marchetti and John Marks, The CIA and the Cult of Intelligence (New York: Dell, 1974), p. 181; and David Wise and Thomas Ross, The Invisible Government (New York: Vintage, 1974), p. 244. On CIA funding of studies, see Marchetti and Marks, The CIA, p. 18 1. For an example of a major study reported to have been underwritten by the CIA, see W. W. Rostow and Alfred Levin, The Dynamics of Soviet Society (New York: Norton, 1952). On CENIS as a conduit of CIA funds, see Wise and Ross, The Invisible Government, p. 244. On Millikan’s role, see U.S. Department of State, Foreign Service Institute, “Problems of Development and Internal Defense” (Country Team Seminar, June 11, 1962).

82. Ithiel de Sola Pool, “The Necessity for Social Scientists Doing Research for Governments,” Background 10, no. 2 (August 1966): 114-15.

83. Massachusetts Institute of Technology, Center for International Studies, A Plan for Research in International Communications World Politics, 6, no. 3 (April 1954): 358-77; MIT, CENIS, The Center for International Studies: A Description (Cambridge: MIT, July 1955).

84. Don Price Oral History, pp. 61-70, and Don Price memo, May 21, 1954 (appendix to oral history), Ford Foundation Archives, New York. The archival evidence concerning this aspect of the Ford Foundation’s relationship with the CIA was first brought to light by Kai Bird.

85. On Shils, see Peter Coleman, The Liberal Conspiracy (New York: Free Press, 1989), pp. 98-209 passim. On Speier, see, Hans Speier, “Psychological Warfare Reconsidered,” RAND paper no. 196, February 5, 1951; Hans Speier, “International Political Communication: Elite and Mass,” World Politics (April 1952 [RAND paper no. P-270], Hans Speier and W. Phillips Davison, “Psychological Aspects of Foreign Policy,” RAND paper no. P-615, December 15, 1954. Speier’s other contemporary work that has since come to light includes several studies of Soviet response to West German rearmament, Soviet political tactics involving nuclear threats, a report on the American Soldier series, and a commentary on political applications of game theory. Speier died February 17, 1990, in Sarasota, Florida; see “Hans Speier, Sociologist,” Washington Post, March 2, 1990. On Carroll, see Wallace Carroll, The Army’s Role in Current Psychological Warfare (top secret, declassified following author’s mandatory review request), February 24, 1949, box 10, tab 61, entry 154, RG 319, U.S. National Archives, Washington, DC; Wallace Carroll, “It Takes a Russian to Beat a Russian,” Life, December 19, 1949, pp. 80-86; “CIA Trained Tibetans in Colorado, New Book Says,” New York Times, April 19, 1973.

86. Ithiel de Sola Pool and Frank Bonilla (eds.), “A Special Issue on Studies in Political Communication,” 20, no. I (Spring 1956); Daniel Lerner (ed.), “Special Issue: Attitude Research in Modernizing Areas,” 22, no. 3 (Fall 1958).

87. In 20, no. I (Spring 1956): Harold Isaacs, “Scratches on Our Minds,” p. 197; Y. B. Damle, “Communication of Modem Ideas and Knowledge in [East] Indian Villages,” p. 257; Claire Zimmerman and Raymond Bauer, “The Effect of an Audience upon What Is Remembered,” p. 238; Suzanne Keller, “Diplomacy and Communication,” p. 176; and Harold Isaacs, “World Affairs and U.S. Race Relations: A Note on Little Rock,” 22, no. 3 (Fall 1958): 364.

88. Ithiel de Sola Pool, Suzanne Keller, and Raymond Bauer, “The Influence of Foreign Travel on Political Attitudes of U.S. Businessmen,” p. 161; Frank Bonilla, “When Is Petition ‘Pressure’?” p. 39; Daniel Lerner, “French Business Leaders Look at EDC,” p. 212 — all in 20, no. 1 (Spring 1956); and Daniel Lerner, “Editors Introduction,” p. 217; Ithiel de Sola Pool and Kali Prasad, “Indian Student Images of Foreign People,” p. 292; Frank Bonilla, “Elites and Public Opinion in Areas of High Social Stratification,” p. 349; all in 22, no. 3 (Fall 1958).

89. Ivor Wayne, “American and Soviet Themes and Values: A Content Analysis of Themes in Popular Picture Magazines,” p. 314; Patricia Kendall, “The Ambivalent Character of Nationalism among Egyptian Professionals,” p. 277 — all in 20, no. I (Spring 1956).

90. Guy Pauker, “Indonesian Images of Their National Self,” p. 305; Lucian Pye, “Administrators, Agitators and Brokers,” p. 342; Alain Girard, “The First Opinion Research in Uruguay and Chile,” p. 251; Kurt Back, “The ChangeProne Person in Puerto Rico,” p. 330; Robert Carlson, “To Talk with Kings,” p. 224; Herbert Hyman et al., “The Values of Turkish College Youth,” p. 275; Raymond Gastil, “Middle Class Impediments to Iranian Modernization,” p. 325; Gorden Hirabayashi and M. Fathalla El Kbatib, “Communication and Political Awareness in the Villages of Egypt,” p. 357; A. J. Meyer, “Entrepreneurship and Economic Development in the Middle East,” p. 391; Richard Robinson, “Turkey’s Agrarian Revolution and the Problem of Urbanization,” p. 397; Lincoln Armstrong and Rashid Bashshur, “Ecological Patterns and Value Orientations in Lebanon,” p. 406 — all in 22, no. 3 (Fall 1958).

91. Isaacs, “World Affairs and U.S. Race Relations,” p. 364.

92. Lerner, “Editor’s Introduction,” pp. 218, 219, 221.

93. Lerner and Pevsner, The Passing of Traditional Society, p. 396. Emphasis added.

94. Special Operations Research Office, The U.S. Army’s Limited-War Mission, pp. 59-63, 69-77; Blum, The CIA, pp. 133-62.

95. On communications theorists’ contributions to counterinsurgency, see Special Operations Research Office, The U.S. Army’s Limited-War Mission, pp. 159-69 (Pye) and 199ff (Pool). See also Ithiel de Sola Pool (ed.), Social Science Research and National Security (Washington, DC: Smithsonian Institution [Office of Naval Research Project], 1963), pp. 1-25 (Pool), 46-74 (Schramm), 148-66 (Pye).

96. Special Operations Research Office, The U.S. Army’s Limited-War Mission, pp. 282ff; see also U.S. Department of the Army, Art and Science of Psychological Operations, pp. xvii, 47-53.

97. The Camelot Affair precipitated the first genuinely public discussion of the collision between the professed humanitarian values of modem social science and the actual ends to which it had been put in the world political arena. In 1964, the U.S. Army hired private U.S. social scientists to conduct a series of long-term inquiries into the social structures, political and economic resources, ethnic rivalries, communication infrastructures, and similar basic data concerning developing countries considered likely to see strong revolutionary movements during the 1960s. The project exploded when nationalist and left-wing forces in Chile and other targeted countries protested, labeling Camelot a de facto espionage operation. Camelot contractors, notably sociologist Jesse Bernard of American University, replied that the criticism was “laughable” because Camelot’s had been “designed as a scientific research project” in which me countries selected for study made “no difference.” The argument escalated from there. See House Committee on Foreign Affairs, Behavioral Sciences and the National Security, Report No. 4, 89th Cong. 1st sess. (Washington, DC: GPO, 1965); Jesse Bernard, “Conflict as Research and Research as Conflict,” in Irving Louis Horowitz, The Rise and Fall of Project Camelot, rev. ed. (Cambridge, MA: MIT Press, 1974), p. 129n.

98. Special Operations Research Office, The U.S. Army’s Limited-War Mission, pp. 282ff; see also U.S. Department of the Army, Art and Science of Psychological Operations, pp. xvii, 47-53.

99. For example, Executive Office of the President, “NSAM No. 308: A Program to Promote Publicly U.S. Policies in Vietnam” (June 22, 1964); McGeorge Bundy, “NSAM No. 328: Military Actions in Vietnam” (April 6, 1965); “NSAM No. 329: Establishment of a Task Force on Southeast Asian Economic and Social Development” (April 9, 1965); and “NSAM No. 330: Expanded Psychological Operations in Vietnam” (April 9, 1965); each was obtained via the Freedom of Information Act from the U.S. Office of the Comptroller General.

100. On Lerner, Riley, Davison, Cottrell, and Pool, see Special Operations Research Office, The U.S. Army’s LimitedWar Mission, pp. xvi, 151-59, 199-202, 282-86. On Pool, Davison, and Schramm, see Pool, Social Science Research and National Security, pp. 1-74. On Lasswell, see Harold Lasswell, World Revolutionary Elites: Studies in Coercive Ideological Movements (Cambridge: MIT Press, 1966).

© Copyright C. Simpson 2003  For fair use only/ pour usage équitable seulement.

 

Surveillance

What follows is a file of information on the topic of surveillance that was collected over the course of the last two weeks or so. 

http://www.cjournal.info/wp-content/uploads/2013/11/USSpying-150×150.jpg

Spies worry over ‘doomsday’ cache stashed by ex-NSA contractor Snowden 25 Nov 2013 British and U.S. intelligence officials say they are worried about a “doomsday” cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.

Report: NSA director offered resignation 25 Nov 2013 The National Security Agency’s director, Gen. Keith Alexander, offered to resign from his post shortly after Edward Snowden began leaking classified government documents, according to The Wall Street Journal. According to the report, the Obama administration rejected his offer. Snowden, a former NSA contractor, began disclosing documents detailing the agency’s surveillance programs in June.

@ http://www.legitgov.org/

zxcvb

23 November 2013NSA TreasureMap

 

http://cryptome.org/2013/11/nsa-treasuremap.htm

zxcvb

http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work 

A slice: 

The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU.

But interviews with current and former law enforcement officials, as well as technology industry representatives, reveal that the unit is the FBI’s equivalent of the National Security Agency and the primary liaison between the spy agency and many of America’s most important technology companies, including Google, Facebook, YouTube, and Apple.”

zxcvb

DARPA’s iXo A.I. Control Grid: ‘The Official Version’

http://www.youtube.com/watch?v=MuTIyBvfcHs&feature=player_embedded 

zxcvb

http://xymphora.blogspot.com/2013/08/newspapers-tor-nsa-saic-chertoff.html 

zxcvb

American government enabling of terrorists and gangsters: “Schneier tells Washington NSA broke Internet’s security for everyone”:

“At a presentation in a conference room inside the US Capitol on Friday, Schneier—who has been helping The Guardian review the trove of documents provided by Snowden—said that in its haste to “weaponize” the Internet, the NSA has broken its mechanisms of security. And those breaks—including the backdoors that the NSA convinced or coerced software developers to put into the implementations of their encryption and other security products, are so severe that it is now just a matter of time before others with less-noble causes than fighting terrorism will be able to exploit the holes the NSA has created.”

AT 11/20/2013 04:48:00 AM

zxcvb

http://rinf.com/alt-news/breaking-news/supreme-court-denies-bid-against-nsa/ 

zxcvb

NSA Boundless Informant explicated – for moar efficient flat databases of all yr phone records

Submitted by HongPong on Tue, 2013-11-26 01:21

Just had to crosspost this relatively down-to-earth explanation of how all the cell phone data is hoarded in the NSA mass data mining system. What this lacks in documentation it makes up for with relative plausibility & general lack of fancifulness.

SOURCE: Cryptome.org : http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm

zxcvb

Private Firms Selling Mass Surveillance Systems Around World

November 19th, 2013

Via: Guardian:

Private firms are selling spying tools and mass surveillance technologies to developing countries with promises that “off the shelf” equipment will allow them to snoop on millions of emails, text messages and phone calls, according to a cache of documents published on Monday.

The papers show how firms, including dozens from Britain, tout the capabilities at private trade fairs aimed at offering nations in Africa, Asia and the Middle East the kind of powerful capabilities that are usually associated with government agencies such as GCHQ and its US counterpart, the National Security Agency.

Posted in Covert Operations, Dictatorship, Infrastructure, Surveillance, Technology

zxcvb

NSA Links to St Petersburg Florida Drug Ring

November 17th, 2013

Via: Mad Cow Morning News:

Skyway Global LLC, the St. Petersburg, FL company that owned the DC-9 airline busted in Mexico carrying 5.5 tons of cocaine, made its headquarters in a 79,000 sq ft building owned by Verint Systems (NASDAQ: VRNT), a foreign tele-communications company with a contract to wiretap the U.S. for the NSA through the communication lines of Verizon, which handles almost half of all landline and cell phone calls in the U.S.

Verint’s founder and CEO, Jacob “Kobi” Alexander, is a former Israeli intelligence officer who is today a fugitive from justice living in Namibia, where he has for several years been fighting extradition to the U.S.

On Verint’s Board of Directors is Lieutenant General Kenneth A. Minihan, former director of the NSA, which has led to speculation that the company today is a joint NSA-Mossad operation. 

zxcvb

http://3.bp.blogspot.com/-iiXn1zbk3Is/UoOuQzSDq7I/AAAAAAAAOGs/eNXx_wHskOU/s1600/gd4.jpg

zxcvb

Americans’ Personal Data Shared with CIA, IRS, Others in Security Probe

November 14th, 2013

Via: McClatchy:

U.S. agencies collected and shared the personal information of thousands of Americans in an attempt to root out untrustworthy federal workers that ended up scrutinizing people who had no direct ties to the U.S. government and simply had purchased certain books.

Federal officials gathered the information from the customer records of two men who were under criminal investigation for purportedly teaching people how to pass lie detector tests. The officials then distributed a list of 4,904 people – along with many of their Social Security numbers, addresses and professions – to nearly 30 federal agencies, including the Internal Revenue Service, the CIA, the National Security Agency and the Food and Drug Administration. Although the polygraph-beating techniques are unproven, authorities hoped to find government employees or applicants who might have tried to use them to lie during the tests required for security clearances. Officials with multiple agencies confirmed that they’d checked the names in their databases and planned to retain the list in case any of those named take polygraphs for federal jobs or criminal investigations.

It turned out, however, that many people on the list worked outside the federal government and lived across the country. Among the people whose personal details were collected were nurses, firefighters, police officers and private attorneys, McClatchy learned. Also included: a psychologist, a cancer researcher and employees of Rite Aid, Paramount Pictures, the American Red Cross and Georgetown University.

Moreover, many of them had only bought books or DVDs from one of the men being investigated and didn’t receive the one-on-one training that investigators had suspected. In one case, a Washington lawyer was listed even though he’d never contacted the instructors. Dozens of others had wanted to pass a polygraph not for a job, but for a personal reason: The test was demanded by spouses who suspected infidelity.

The unprecedented creation of such a list and decision to disseminate it widely demonstrate the ease with which the federal government can collect and share Americans’ personal information, even when there’s no clear reason for doing so.

The case comes to light amid revelations that the NSA, in an effort to track foreign terrorists, has for years been stockpiling the data of the daily telephone and Internet communications of tens of millions of ordinary Americans. Though nowhere near as massive as the NSA programs, the polygraph inquiry is another example of the federal government’s vast appetite for Americans’ personal information and the sweeping legal authority it wields in the name of national security.

“This is increasingly happening – data is being collected by the federal government for one use and then being entirely repurposed for other uses and shared,” said Fred Cate, an Indiana University-Bloomington law professor who specializes in information privacy and national security. “Yet there is no constitutional protection for sharing data within the government.”

Posted in Books, Dictatorship, Surveillance

zxcvb

Las Vegas Installs “Intellistreets” Light Fixtures Capable Of Audio Recording

zxcvb

http://www.dailypaul.com/305137/snowden-level-breaking-news-tsa-dhs-has-realtime-voice-print-spy-grid-seattle-city-govt-confirms 

zxcvb

Important stuff

http://beforeitsnews.com/alternative/2013/11/google-tracks-everything-you-do-even-offline-2820826.html 

http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/ 

http://www.virtualthreat.com

zxcvb

Scared Silent: NSA Surveillance has ‘Chilling Effect’ on American Writers

http://rinf.com/alt-news/breaking-news/scared-silent-nsa-surveillance-has-chilling-effect-on-american-writers/ 

Recent disclosures of the NSA‘s widespread dragnet program coupled with its frequent targeting of journalists are having a ‘chilling effect’ on American writers, stifling their freedom of expression at great detriment to society, says a new report Chilling Effects: NSA Surveillance Drives U.S. Writers to Self Censor.

Published Tuesday by the group PEN America—an organization of writers dedicated to advancing literature and promoting free speech for writers around the world—surveyed 520 American writers and found they are “not only overwhelmingly worried about government surveillance, but are engaging in self-censorship as a result.”

More at the link…

http://www.pen.org/sites/default/files/Chilling%20Effects_PEN%20American.pdf 

http://www.pen.org

640K ought to be enough for anyone. — Bill Gates, 1981 

zxcvb

November 11-12, 2013 — The NSA backdoor into the PLO’s encrypted communications

Although National Security Agency whistleblower Edward Snowden’s revelations about the agency’s “back doors” into encryption systems, along with the signals intelligence (SIGINT) sharing relationship between NSA and the Israel SIGINT National Unit or “Unit 8200,” recently grabbed headlines, the NSA-Israeli relationship has even older roots, according to a former U.S. intelligence agency source.

Long before NSA had the capability to decrypt encrypted communications, including that which relied on the RSA encryption system, through its BULLRUN program, NSA relied on earlier back doors installed in electro-mechanical Crypto AG encryption units manufactured in Switzerland. The UK Government Communications Headquarters’s (GCHQ) version of the BULLRUN back door program is code named EDGEHILL.

After the Palestine Liberation Organization was expelled from Lebanon in 1982 after Israeli forces invaded and occupied the country, the PLO re-established its headquarters in Tunis, the capital of Tunisia. The government of then-Tunisian President Habib Bourguiba arranged for the PLO to use spare Crypto AG equipment that had been in use by the Tunisian government to encrypt its sensitive diplomatic and military communications.

The PLO not only used the Crypto AG equipment while it was headquartered in Tunis but continued to use it after relocating its headquarters to Ramallah on the West Bank in 1993 up until PLO president Yasir Arafat’s death in November 2004. A Swiss scientific examination of Arafat’s remains strongly indicates that the Palestinian leader was poisoned by radioactive polonium and Palestinian officials claim only Israel had the means and the access to Arafat’s compound in Ramallah to assassinate him by radioactive poisoning.

According to our source, NSA was able to decrypt and read all the PLO’s communications traffic during the 1980s and some of the SIGINT on the PLO was shared with Israel’s Unit 8200. On October 1, 1985, the Israelis launched Operation Wooden Leg, an air attack on PLO headquarters in Tunis. By reading the PLO’s classified traffic, the Israelis hoped to kill as many senior PLO leaders as possible. Sixty people, mostly PLO officials, were killed in the attack, but PLO chairman Yasir Arafat escaped assassination then by the Israelis.

NSA and Israel had back door access into Yasir Arafat’s encrypted communications from his Ramallah headquarters, providing Israel with the necessary sensitive information facilitating the assassination of the Nobel Peace Prize laureate in a radioactive polonium attack.

However, the Palestinian Authority’s continued use of the tampered Crypto AG equipment provided to it by Tunisia, gave the NSA and Israelis the back door access required to penetrate whatever classified internal security measures Arafat relied upon while he was trapped by the surrounding Israeli military forces in his Ramallah compound.

The editor broke the Crypto AG back door story in the late 1990s:

“The secret Crypto A.G. – NSA relationship remained relatively covert until March 1992 when Hans Buehler, Crypto A.G.’s Swiss marketing representative for Iran, was arrested in Teheran on his twenty-fifth sales trip and charged with espionage by the Iranian military counter-intelligence service. His Iranian captors accused the tall, fiftyish businessman and former radio officer in the Swiss merchant marine, of spying for the ‘intelligence services of the Federal Republic of Germany and the United States of America.’ Buehler denied all of the Iranian charges.

Buehler, who spent nine months blindfolded in solitary confinement in a Teheran prison  was questioned daily by his Iranian interrogators for five months. The Iranians claimed to know that Crypto A.G. was a ‘spy center’ and that the company worked together with foreign intelligence services. They also claimed that Crypto’s cipher machines were manipulated in some way to make it easy for them to be decrypted . . .

The Iranians, had, for some time, suspected a problem with their Crypto cipher units. Based on previous Libyan and Syrian suspicions concerning the security of their Crypto A.G. equipment, the Iranians had ample reason to believe that their units had somehow been rigged. Iran first became suspicious about their cipher units when it was reported, in 1987, that the NSA had intercepted coded Iranian diplomatic cables between Teheran and the Hezbollah (Party of God) terrorist group in Lebanon via Iran’s embassies in Beirut and Damascus. U.S. officials revealed that the intercepts yielded ‘conclusive evidence that Iran ordered the kidnapping’ of ABC News Beirut correspondent Charles Glass . . .

Some Crypto A.G. engineers contend that NSA prevailed on Crypto A.G. to sell their cipher machines to Iran not only because NSA wanted to be able to listen in on encrypted Iranian government communications but also because they viewed Crypto A.G. as a ready, willing, and very cooperative re-engineering ‘pass through.’  Pakistan was allegedly granted American military credits with only one provision, that it buy its encryption equipment from Crypto A.G.

One former Crypto A.G. chief engineer stated that he knew that the German and American SIGINT agencies were involved in manipulating Crypto cipher machines and that NSA used one of its major contractors, Motorola, to perform the actual technical alterations. He also said that he was personally involved in the manipulation process. Juerg Spoerndli, another former Crypto A.G. engineer who was responsible for designing encryption equipment, said that in the late 1970s he weakened the strength of his cipher units. He stated he was ‘ordered to change algorithms under mysterious circumstances.’

Spoerndli’s contentions are supported by American cryptographic experts. One former Racal cryptographer confided that such NSA manipulation of commercial encryption equipment is widespread, affecting not only Crypto A.G. gear but also that of his old firm, Racal. This should come as no surprise considering that firm’s close ties with GCHQ. The former Racal specialist claims that the NSA manipulation is very formal and consists of the following steps:

1. NSA schedules to have its personnel come to the site of the cryptographic company to conduct an inspection of new encryption equipment.

2. NSA cryptographic experts examine each cryptographic application including algorithms.

3. NSA approves each algorithm for use.

4. NSA technicians record encrypted sessions, including cryptographic key exchanges.

5. When NSA feels that it is able to decrypt the communications of the encryption unit in question, it permits export.

NSA ensures that its ‘tampered’ products receive favorable treatment in the granting of U.S. Foreign Military Sales to the armed services of other countries. According to the Racal engineer, the NSA forced U.S. contractors to use Crypto A.G. equipment in the Saudi Navy Expansion Program, giving NSA a back door into future Saudi encrypted naval communications.

From the German side, Siemens Defense Electronics Group also provided technical assistance for the machine manipulation process. In fact, Crypto A.G. has been called a ‘secret Siemens daughter’ by a previous director of the encryption firm. The manipulated cipher machines were apparently rigged so that when some 120 countries that were Crypto A.G. customers used them, the random encryption key could be automatically and clandestinely transmitted with the enciphered message.

The BND and NSA codebreakers then used the transmitted key to decrypt the message. In older, mechanical cipher machines an extra lever allows the secret key to be sent with the encrypted message. These messages were easily decrypted by NSA and BND. One previous Crypto A.G. employee contends that all developmental Crypto A.G. equipment had to be sent to the German Central Cipher Bureau (Zentralstelle für Chiffrierung [ZfCH]), now the Federal Information Security Agency (Bundesamt für Sicherheit in der Informationstechnik [BSI] which is also Department 62 of the BND) in Bad Godesburg near Bonn and NSA for approval . . .

The NSA and GCHQ were  cooperating in the secret Crypto A.G. manipulation program. Apparently, GCHQ was intercepting coded Egyptian traffic from Cairo’s embassy in London as early as 1958. It also turns out that the Egyptians were using Crypto A.G. cipher machines. GCHQ cryptanalysts in Cheltenham were able to detect new settings on ciphers at the Egyptian embassy in London through a process called ‘leading the machine. ENGULF was the code name assigned to the GCHQ special program that collected technical  cryptographic intelligence on cipher machines, including those of  Crypto A.G. NSA was still deciphering Egyptian government communications after President Anwar Sadat steered Egypt firmly into the western camp. During the transition between the Carter and Reagan administrations, outgoing CIA director Stansfield Turner told his successor, William Casey, that ‘the NSA had the Egyptian government wired electronically.’

GCHQ’s technical collection program benefited from the work of Britain’s Secret Intelligence Service or MI6 in positioning listening equipment in key locations throughout GCHQ’s area of coverage, especially in the Middle East. SIS microwave wiretaps in Libya during the 1960s enabled GCHQ and NSA to listen in on all the telephone conversations of Libya’s King Idris. During the same time period., hidden microphones installed in China’s new embassy in Mogadishu, Somalia and the Soviet embassy in Khartoum,  Sudan, courtesy of less than attentive local security services in both countries, permitted the analysts at GCHQ and NSA to gauge the geopolitical intentions of both Communist countries in the volatile Middle East.

Aware that in the early 1980s the Irish government had purchased cipher equipment from Crypto A.G., the GCHQ began intercepting messages from the Irish embassy in London to the Foreign Ministry in Dublin. During sensitive bilateral negotiations that led to the signing of the Anglo-Irish Agreement in November 1985, GCHQ intercepted encrypted Irish government messages and passed the plaintext on to senior British officials in the Foreign Office, the Northern Ireland Office and No.10 Downing Street. The Irish government, being tipped off about the hole in their cryptographic security, began to send classified information between London and Dublin either by diplomatic courier or by Aer Lingus pilots . . .

The Swiss government apparently went along with the BND-NSA-Crypto A.G. manipulation operation so long as Crypto A.G. did not sell bugged units to Swiss government agencies. BND and NSA apparently agreed to this demand and Crypto received permission to sell ‘clean’ encryption units, for example, to the Swiss army.

The procedure by which NSA and their BND counterpart manipulated the Crypto cipher units is considered clever from an engineering viewpoint. The manipulated equipment automatically broadcasts to NSA and the BND the user’s cipher keys and computer settings within the encrypted text of the message. When they obtained the key settings, the NSA and BND could decrypt the message and read its contents. Although Crypto A.G. officially denied this, it seems to be a continuation of the original deal made between [NSA lead cryptographer William] Friedman and [Crypto AG founder Boris] Hagelin, Sr. in the 1950s.”

http://www.waynemadsenreport.com/articles/20131110 

zxcvb

Big Brother’s New Crystal Ball: Washington Develops Online Data Mining Program to Predict Global Political Unrest

Posted on November 11, 2013 by rowan wolf

By Cyril Mychalejko. Republished from Towards Freedom.

zxcvb

SUNDAY, NOVEMBER 10, 2013

The Dark Road from the Clipper Chip to PRISM Reveals ‘Crypto Wars’ Never Ended 

zxcvb

Israel Pulling Strings of NSA Surveillance Program

ZXCVB: Just added Tues 10:29 PM

Snowden’s “Doomsday” Cache

November 26th, 2013Via: Reuters:

British and U.S. intelligence officials say they are worried about a “doomsday” cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud.

The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.

The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.

The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.

Spokespeople for both NSA and the U.S. Office of the Director of National Intelligence declined to comment.

One source described the cache of still unpublished material as Snowden’s “insurance policy” against arrest or physical harm.

U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories.

“The worst is yet to come,” said one former U.S. official who follows the investigation closely.