Tag Archives: Palantir

nexus

nexus

OPINION: Media have chance to look in mirror as Trump continues attacks

By Walter Bird Jr. – February 18, 2017

It is beyond easy to assail Donald Trump’s position on the news media. His war with “the enemy” is filled with so much bombast, so much rhetoric, it takes neither a Pulitzer Prize winner nor a seasoned journalist to note just how ridiculous his war is.

It also takes attention away from a very real and disturbing truth: some in the media, long before Donald Trump every became president, were cheaters. Liars. Fabricators. Plagiarists.

To suggest the media as a whole have been beacons of purity, whose sole mission is to inform the people who consume their product, is beyond foolish. It is flat out wrong.

And if we in the media ourselves cannot hold ourselves accountable for the myriad ways in which we have sullied our profession, then did we not, in some way, create the juice for the anti-media venom now flowing so freely from our 45th president?

It is not to say the entire news media universe indulges in “fake news.” But the list of utter falsehoods initially passed off as truths by many respected media sources is, indeed, not a short one. Worse still, in some of the cases, there were very real and tragic consequences of the false reporting.

•As Dale Jacquette wrote in, “Journalistic Ethics: Moral Responsibility in the Media,” Newsweek, in May 2005 published a story in which it was reported that soldiers at Guantanamo Bay, Cuba, had placed copies of the Koran on toilets, in one cases flushing a copy down. That story turned out to be baseless and unsubstantiated. The damage, however, had been done. Several Islamic protests broke out. In Afghanistan, Jacquette wrote, citing the Associated Press, 14 people died in one such protest.

•Jayson Blair in 2003 resigned as a reporter at The New York Times after it was found he had fabricated or plagiarized in a number of his stories. He has done nothing of relevance as a writer since, outside of a memoir that fared rather poorly.

•In 2004, the Boston Globe published pictures from a porn web site, and passed them off as images of U.S. soldiers raping Iraqi women. The photos were quickly exposed as fake.

•Janet Cooke won the Pulitzer Prize for her 1980 story in The Washington Post about an 8-year-old heroin addict. The day after she received her award, she admitted she had made up the youthful subject of the story, “Jimmy.”

•Dan Rather reported in 2004 that George W. Bush had failed to fulfill his service to the National Guard. His report was based on documents that were later found to have been forged. Rather ended up retiring a year earlier than planned.

•Doris Kearns Goodwin was found to have plagiarized several parts of her bestselling book, “The Fitzgeralds and the Kennedys.”

•Former Boston Globe columnist Mike Barnicle resigned in 1998 after some of the facts and words in two of his columns came into question. In one, a few lines were similar to those in George Carlin’s 1997 book, “Brain Droppings.”

(Note: some of the above information was culled from the Huffington Post and Boston Globe.)

It is fair to say the “fake” in “fake news” was there long before Trump became president. What the new president has done, however, is sought to lump almost all mainstream news media into one giant pot of falsehoods and corruption. He has found among his base a rabid distrust of the media; rather, he has put together a recipe that has cooked up a hatred and disdain for many of us in the media.

The unpleasant reality is Trump is not wrong in that there are more than just the above examples of fraudulent journalism and misplaced ethics. One need not go too far back in time to see that. Donna Brazile resigned from CNN last year after leaked emails showed she had fed debate questions ahead of time to Hillary Clinton.

Where Trump falters is his blanket generalization of “fake news.” He is hardly the first to paint with a broad brush, but just as there were serious consequences as a result of some of those who committed the cardinal sin of plagiarizing or making up stories, so too is there the risk of serious damage to the public’s right to know by Trump’s no-holds-barred verbal assault on the press.

Trump would be wise to tone down the rhetoric, stop with the generalizations and not try to divide the news media and the very people they have been keeping informed for years.

At the same time, many of us in the media would do just as well to come down off our high horses, look in the mirror and admit that, on many occasions, we have lived in glass houses.

The very fate of journalism and the continued and unfettered dissemination of information to the public may well hang in the balance.

https://worcestermag.com/2017/02/18/opinion-media-chance-look-mirror-trump-continues-attacks/49475 

[&&]{**}[##]

Why Americans Don’t Trust Main Stream Media

THE MSM MUST DEAL WITH A PRESIDENT WHO CALLED THEM OUT ON THEIR “FAKE NEWS”

February 20, 2017 Frosty Wooldridge

The MSM is becoming irrelevant as more and more Americans turn to alternative media to get the real story on issues that concern them

After 30 years of slanted, biased and false news reporting from major players in the Main Stream Media (MSM) —Americans turn toward more reliable sources—such as citizen journalists writing for Internet news services.  Social media features speakers like British speaker Pat Condell telling hungry audiences what’s really happening with the Muslim invasion of Europe.

Whistleblowers such as Julian Assange and Edward Snowden exposed deeper layers of fraud and deception continuing in Washington DC and in Europe.

One look at the talking heads at CBS, NBC, ABC, NPR and CNN shows untenable bias and false reporting on multiple levels.  In the past 20 months, prominent news anchors pretty much cut off their noses to spite their faces.  Their election polls showed Hillary Clinton winning the White House while major pundits predicted Trump’s collapse.

Pelley, Muir and Holt downplayed Islamic terrorism in America by reporting “lone wolf” Muslims as mentally ill or suffering from depression—when in fact, those terrorists followed the dictates of the Quran while exacting violence.  Similar examples abound everyday in the USA and Europe, i.e., rapes, honor killings, female genital mutilation, gay killings and arranged marriages.

For the past 15 years, the anchors at NBC, CBS, ABC, NPR told the American people that 11,000,000 illegal aliens inhabited the United States.  After extensive research as to U.S. Census Bureau data by Ann Coulter in her book, Adios Amigo, she noted 31,000,000 (million) illegal migrants living, working and violating America’s laws.

All the while, Dr. Steven Camarata, researcher for Center for Immigration Studies,www.cis.org, discovered that 500,000 illegal aliens jump America’s borders annually.  His research shows the illegal population in America exceeds anything the mainstream press purports.

Additionally, while the MSM hounded General Flynn out of a job as National Security Advisor, they decline to report on 22 Islamic terrorist training camps operating in America from New York through Michigan and on to Oregon and California. Would you like to hear about these training camps concerning your family’s protection?

Host Bill O’Reilly reports explicit footages of 22 Islamic jihadist training camps in the USA in this video:

100% Video Proof of Radical Muslim Terrorist Training Camps in America – Bill O’Reilly

https://www.youtube.com/watch?v=M37z1MBvT7k [six minutes]

[Ed.: Note too that the video is posted on the channel of Forida Guns Classified.]

Clarion Project: http://www.clarionproject.org 

 

You would never hear about those terror camps from NBC, CBS, ABC, NPR or CNN.  Those camps train terrorists to kill you and your family— in your own country.  Of course, once they strike and kill countless Americans in Orlando, San Bernardino, Chattanooga or Ohio State, the MSM reports the aftermath of the massacres.

Notice the Boston Marathon bombings:  those two Tsarnaev brothers enjoyed major support from other Muslims and the imams at their Boston Mosque, but the MSM assured that no one knew anything about the brothers’ support team.

“Opposition to Islam is no different than opposition to communism, fascism, Nazism or any other belief system that seeks to control human conduct. Every American/Canadian (indeed, every human being on Earth) has basic human rights — the unalienable rights to life, liberty, and property — and every belief system with principles that violate these rights is unjust. In short, anti-communism, anti-fascism, and anti-Islam are the logical justice, whether in America/Canada or anywhere else in the world.” ~ Paul Pauker ~

While we face upwards of 31 million illegal aliens costing taxpayers $113,000,000,000.00 (billion) annually across 15 federal agencies, the MSM refuses to report on thousands of rapes, house break-ins, homicides, drug gangs, shoplifting into the millions of dollars daily, drunk driving deaths and sex-trafficking across this nation.  Do you recall MSM regularly reporting on widespread crime committed by illegal migrants?  Of course not!

Have you seen investigative journalism exposing employers of illegals such as: Chipotle’s, McDonald’s, Marriott Hotels, Tyson Chicken, Hormel Foods, Holiday Inns and restaurants because somebody pays big bucks to keep the laws from being enforced?  How much money keeps mouths shut?

As to the Syrian refugees, you won’t hear anything other than “puff” pieces by 60 Minutes or David Muir or Lester Holt, but average communities like Lewiston, Maine and Minneapolis, Minnesota all the way to Twin Falls, Idaho face massive financial and sociological impact in their cities via violent, illiterate and welfare-abusing immigrants.

Much like the false bias in the election polls showing Trump losing the presidential election, after only 30 days in office, Chuck Todd of “Meet the Press” gleefully showed 79 percent stressed democrats and 59 percent stressed republicans as to our nation’s situation.  Chuck Todd, pretending to be a journalist, demonstrates his bias at every juncture.

On “Face the Nation”, John Dickerson repeatedly reported chaos in the White House by choosing “they” and “other sources” to depict Trump as inept.  Reince Priebus, chief of staff, sternly corrected Dickerson for giving unnamed sources for such false and hollow stories.

“The real disunity is between a doomed Status Quo and those willing to deal with reality. Right now those willing to deal with reality are few, but they have the distinct advantage of reality on their side, while the Status Quo has only propaganda, artifice, phony political theater and empty promises….Every attempt to lead the public toward the realization that the present is unsustainable will be crushed by a frantic assault of the fiefdoms, cartels and players who will lose power and profits when the Status Quo crumbles under its own weight.”—Charles Hugh Smith “The Shape of Things To Come”

The MSM continues its directive to undermine, delegitimize and destabilize the Trump administration.  A report this past week indicated that Trump suffers from mental illness.  Intriguing statement, when in fact, President Trump accomplished ten major items of his campaign promises.

President Trump’s first four weeks proved the most active in recent history:

▪Executive order to stop Muslim immigration loaded with jihadists coming into America. Creating extreme vetting.

▪Stopped the Trans Pacific Partnership.

▪Put coal miners back to work.

▪Met with three top foreign leaders.

▪Started the process for building a wall to stop illegal drugs and migrants from crossing U.S. border with Mexico.

▪Increased the Border Patrol by 5,000 agents to stop the $50,000,000,000.00 (billion) in drugs crossing our borders annually from Mexico and 500,000 illegal migrants.

▪Negotiated with top CEOs to keep jobs in America.

▪Created confidence so much so the Stock Market stands at its highest in months.

▪Started rounding up and deporting criminal illegal aliens as promised.

▪Moved to replace the failed Obamacare health system that would have collapsed within several years.

▪Carried through on his promise to stop funding cities who maintain sanctuary status for illegal alien migrants.

▪Selected Neil Gorsuch for Supreme Court Judge.

When you look at the big picture, Congress and the ruling elite of DC enjoyed so much easy corruption for the past 30 years, they think it’s normal to make big bucks and cheat American taxpayers out of money and jobs. They failed to enforce our immigration laws, never passed beneficial trade laws for American jobs and did little for African-Americans as to jobs, education and training.

The elites in Congress failed to stop 350,000 anchor babies being born annually at our expense for food, housing and K-12 education.  They cried job creation while pumping 1,000,000 legal and 500,000 illegal immigrants into our country annually without rescinding the 1965 Immigration Reform Act.  Meanwhile, they jumped our federal debt to $19.5 trillion.

All of a sudden, they must deal with a president who called them out on their “fake news”.   To reporter Jim Acosta of CNN, “…very fake news.”  The American people call out those in the MSM to report the facts to us or find yourselves irrelevant.

This is what the press said about President Lincoln in 1861:  “Had we any respect for Mr. Lincoln, as a man, or as President-elect of the United States…the final escapade by which he reached the capital would have utterly demolished it…. He might have entered Willard’s Hotel with a headspring and a summersault, and the clown’s merry greeting to Gen. Scott. Here we are! And we should care nothing about it, personally. We do not believe the Presidency can ever be more degraded by any of his successors than it has by him, even before his inauguration.” November 21, 1861

In reality, Trump proves himself a workaholic for the American people.  When they tore down Lincoln, he remained steadfast for the immense mayhem of those times.  President Trump remains dedicated to the task ahead.

© Copyright by Frosty Wooldridge, 2017. All rights reserved.

http://www.capitolhilloutsider.com/americans-dont-trust-main-stream-media/ 

[&&]{**}[##]

https://gse.gmu.edu/assets/images/tr/triangle200.jpg

[Ed.: Triangulate the convergence of Doug Valentine’s remarks on Operation Phoenix, the George Webb video series with respect to Dyncorp, and the articles on Palantir et al in “Nexus”.]

[&&]{**}[##]

HOW PETER THIEL’S PALANTIR HELPED THE NSA SPY ON THE WHOLE WORLD

Sam Biddle

February 22 2017, 6:06 a.m.

DONALD TRUMP HAS inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.

Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.

Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.

“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.

https://www.youtube.com/watch?v=yAJv0EvHt_I

Palantir government 3.0

https://www.youtube.com/watch?v=yAJv0EvHt_I 

Despite all the grandstanding about lucrative, shadowy government contracts, co-founder Karp does not shy away from taking a stand in the debate over government surveillance. In a Forbes profile in 2013, he played privacy lamb, saying, “I didn’t sign up for the government to know when I smoke a joint or have an affair. … We have to find places that we protect away from government so that we can all be the unique and interesting and, in my case, somewhat deviant people we’d like to be.” In that same article, Thiel lays out Palantir’s mission with privacy in mind: to “reduce terrorism while preserving civil liberties.” After the first wave of revelations spurred by the whistleblower Edward Snowden, Palantir was quick to deny that it had any connection to the NSA spy program known as PRISM, which shared an unfortunate code name with one of its own software products. The current iteration of Palantir’s website includes an entire section dedicated to “Privacy & Civil Liberties,” proclaiming the company’s support of both:

Palantir Technologies is a mission-driven company, and a core component of that mission is protecting our fundamental rights to privacy and civil liberties. …

Some argue that society must “balance” freedom and safety, and that in order to better protect ourselves from those who would do us harm, we have to give up some of our liberties. We believe that this is a false choice in many areas. Particularly in the world of data analysis, liberty does not have to be sacrificed to enhance security. Palantir is constantly looking for ways to protect privacy and individual liberty through its technology while enabling the powerful analysis necessary to generate the actionable intelligence that our law enforcement and intelligence agencies need to fulfill their missions.

It’s hard to square this purported commitment to privacy with proof, garnered from documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSA’s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSA’s arsenal.

According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSA’s own admission its “widest reaching” program, capturing “nearly everything a typical user does on the internet.” A subsequent report by The Intercept showed that XKEYSCORE’s “collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.

But how do you make so much data comprehensible for human spies? As the additional documents published with this article demonstrate, Palantir sold its services to make one of the most powerful surveillance systems ever devised even more powerful, bringing clarity and slick visuals to an ocean of surveillance data.

PALANTIR’S RELATIONSHIP WITH government spy agencies appears to date back to at least 2008, when representatives from the U.K.’s signals intelligence agency, Government Communications Headquarters, joined their American peers at VisWeek, an annual data visualization and computing conference organized by the Institute of Electrical and Electronics Engineers and the U.S. National Institute of Standards and Technology. Attendees from throughout government and academia gather to network with members of the private sector at the event, where they compete in teams to solve hypothetical data-based puzzles as part of the Visual Analytics Science and Technology (VAST) Challenge. As described in a document saved by GCHQ, Palantir fielded a team in 2008 and tackled one such scenario using its own software. It was a powerful marketing opportunity at a conference filled with potential buyers.

In the demo, Palantir engineers showed how their software could be used to identify Wikipedia users who belonged to a fictional radical religious sect and graph their social relationships. In Palantir’s pitch, its approach to the VAST Challenge involved using software to enable “many analysts working together [to] truly leverage their collective mind.” The fake scenario’s target, a cartoonishly sinister religious sect called “the Paraiso Movement,” was suspected of a terrorist bombing, but the unmentioned and obvious subtext of the experiment was the fact that such techniques could be applied to de-anonymize and track members of any political or ideological group. Among a litany of other conclusions, Palantir determined the group was prone to violence because its “Manifesto’s intellectual influences include ‘Pancho Villa, Che Guevara, Leon Trotsky, [and] Cuban revolutionary Jose Martí,’ a list of military commanders and revolutionaries with a history of violent actions.”

The delegation from GCHQ returned from VisWeek excited and impressed. In a classified report from those who attended, Palantir’s potential for aiding the spy agency was described in breathless terms. “Palantir are a relatively new Silicon Valley startup who are sponsored by the CIA,” the report began. “They claim to have significant involvement with the US intelligence community, although none yet at NSA.” GCHQ noted that Palantir “has been developed closely internally with intelligence community users (unspecified, but likely to be the CIA given the funding).” The report described Palantir’s demo as “so significant” that it warranted its own entry in GCHQ’s classified internal wiki, calling the software “extremely sophisticated and mature. … We were very impressed. You need to see it to believe it.”

The report conceded, however, that “it would take an enormous effort for an in-house developed GCHQ system to get to the same level of sophistication” as Palantir. The GCHQ briefers also expressed hesitation over the price tag, noting that “adoption would have [a] huge monetary … cost,” and over the implications of essentially outsourcing intelligence analysis software to the private sector, thus making the agency “utterly dependent on a commercial product.” Finally, the report added that “it is possible there may be concerns over security — the company have published a lot of information on their website about how their product is used in intelligence analysis, some of which we feel very uncomfortable about.”

Click on link:

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/Palantir_Solution-1487021968-1000×773.png

A page from Palantir’s “Executive Summary” document, provided to government clients.

However anxious British intelligence was about Palantir’s self-promotion, the worry must not have lasted very long. Within two years, documents show that at least three members of the “Five Eyes” spy alliance between the United States, the U.K., Australia, New Zealand, and Canada were employing Palantir to help gather and process data from around the world. Palantir excels at making connections between enormous, separate databases, pulling big buckets of information (call records, IP addresses, financial transactions, names, conversations, travel records) into one centralized heap and visualizing them coherently, thus solving one of the persistent problems of modern intelligence gathering: data overload.

A GCHQ wiki page titled “Visualisation,” outlining different ways “to provide insight into some set of data,” puts succinctly Palantir’s intelligence value:

Palantir is an information management platform for analysis developed by Palantir Technologies. It integrates structured and unstructured data, provides search and discovery capabilities, knowledge management, and collaborative features. The goal is to offer the infrastructure, or ‘full stack,’ that intelligence organizations require for analysis.

Bullet-pointed features of note included a “Graph View,” “Timelining capabilities,” and “Geo View.”

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/BehaviouralAnalysis_IA11-1487274060-1000×750-1487705651-1000×710.png

A GCHQ diagram indicates how Palantir could be used as part of a computer network attack.

Under the Five Eyes arrangement, member countries collect and pool enormous streams of data and metadata collected through tools like XKEYSCORE, amounting to tens of billions of records. The alliance is constantly devising (or attempting) new, experimental methods of prying data out of closed and private sources, including by hacking into computers and networks in non-Five Eyes countries and infecting them with malware.

A 2011 PowerPoint presentation from GCHQ’s Network Defence Intelligence & Security Team (NDIST) — which, as The Intercept has previously reported, “worked to subvert anti-virus and other security software in order to track users and infiltrate networks” — mentioned Palantir as a tool for processing data gathered in the course of its malware-oriented work. Palantir’s software was described as an “analyst workspace [for] pulling together disparate information and displaying it in novel ways,” and was used closely in conjunction with other intelligence software tools, like the NSA’s notorious XKEYSCORE search system. The novel ways of using Palantir for spying seemed open-ended, even imaginative: A 2010 presentation on the joint NSA-GCHQ “Mastering the Internet” surveillance program mentioned the prospect of running Palantir software on “Android handsets” as part of a SIGINT-based “augmented reality” experience. It’s unclear what exactly this means or could even look like.

Above all, these documents depict Palantir’s software as a sort of consolidating agent, allowing Five Eyes analysts to make sense of tremendous amounts of data that might have been otherwise unintelligible or highly time-consuming to digest. In a 2011 presentation to the NSA, classified top secret, an NDIST operative noted the “good collection” of personal data among the Five Eyes alliance but lamented the “poor analytics,” and described the attempt to find new tools for SIGINT analysis, in which it “conducted a review of 14 different systems that might work.” The review considered services from Lockheed Martin and Detica (a subsidiary of BAE Systems) but decided on the up-and-comer from Palo Alto.

Palantir is described as having been funded not only by In-Q-Tel, the CIA’s venture capital branch, but furthermore created “through [an] iterative collaboration between Palantir computer scientists and analysts from various intelligence agencies over the course of nearly three years.” While it’s long been known that Palantir got on its feet with the intelligence community’s money, it has not been previously reported that the intelligence community actually helped build the software. The continuous praise seen in these documents shows that the collaboration paid off. Under the new “Palantir Model,” “data can come from anywhere” and can be “asked whatever the analyst wants.”

 

Along with Palantir’s ability to pull in “direct XKS Results,” the presentation boasted that the software was already connected to 10 other secret Five Eyes and GCHQ programs and was highly popular among analysts. It even offered testimonials (TWO FACE appears to be a code name for the implementation of Palantir):

[Palantir] is the best tool I have ever worked with. It’s intuitive, i.e. idiot-proof, and can do a lot you never even dreamt of doing.

This morning, using TWO FACE rather than XKS to review the activity of the last 3 days. It reduced the initial analysis time by at least 50%.

Enthusiasm runs throughout the PowerPoint: A slide titled “Unexpected Benefits” reads like a marketing brochure, exclaiming that Palantir “interacts with anything!” including Google Earth, and “You can even use it on a iphone or laptop.” The next slide, on “Potential Downsides,” is really more praise in disguise: Palantir “Looks expensive” but “isn’t as expensive as expected.” The answer to “What can’t it do?” is revealing: “However we ask, Palantir answer,” indicating that the collaboration between spies and startup didn’t end with Palantir’s CIA-funded origins, but that the company was willing to create new features for the intelligence community by request.

On GCHQ’s internal wiki page for TWO FACE, analysts were offered a “how to” guide for incorporating Palantir into their daily routine, covering introductory topics like “How do I … Get Data from XKS in Palantir,” “How do I … Run a bulk search,” and “How do I … Run bulk operations over my objects in Palantir.” For anyone in need of a hand, “training is currently offered as 1-2-1 desk based training with a Palantir trainer. This gives you the opportunity to quickly apply Palantir to your current work task.” Palantir often sends “forward deployed engineers,” or FDEs, to work alongside clients at their offices and provide assistance and engineering services, though the typical client does not have access to the world’s largest troves of personal information. For analysts interested in tinkering with Palantir, there was even a dedicated instant message chat room open to anyone for “informally” discussing the software.

https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2017/02/Screen-Shot-2017-02-15-at-12.48.10-PM-1487180948-540×536.png

The GCHQ wiki includes links to classified webpages describing Palantir’s use by the Australian Defence Signals Directorate (now called the Australian Signals Directorate) and to a Palantir entry on the NSA’s internal “Intellipedia,” though The Intercept does not have access to copies of the linked sites. However, embedded within Intellipedia HTML files available to The Intercept are references to a variety of NSA-Palantir programs, including “Palantir Classification Helper,” “[Target Knowledge Base] to Palantir PXML,” and “PalantirAuthService.” (Internal Palantir documents obtained by TechCrunch in 2013 provide additional confirmation of the NSA’s relationship with the company.)

One Palantir program used by GCHQ, a software plug-in named “Kite,” was preserved almost in its entirety among documents provided to The Intercept. An analysis of Kite’s source code shows just how much flexibility the company afforded Five Eyes spies. Developers and analysts could ingest data locally using either Palantir’s “Workspace” application or Kite. When they were satisfied the process was working properly, they could push it into a Palantir data repository where other Workspace users could also access it, almost akin to a Google Spreadsheets collaboration. When analysts were at their Palantir workstation, they could perform simple imports of static data, but when they wanted to perform more complicated tasks like import databases or set up recurring automatic imports, they turned to Kite.

Kite worked by importing intelligence data and converting it into an XML file that could be loaded into a Palantir data repository. Out of the box, Kite was able to handle a variety of types of data (including dates, images, geolocations, etc.), but GCHQ was free to extend it by writing custom fields for complicated types of data the agency might need to analyze. The import tools were designed to handle a variety of use cases, including static data sets, databases that were updated frequently, and data stores controlled by third parties to which GCHQ was able to gain access.

This collaborative environment also produced a piece of software called “XKEYSCORE Helper,” a tool programmed with Palantir (and thoroughly stamped with its logo) that allowed analysts to essentially import data from the NSA’s pipeline, investigate and visualize it through Palantir, and then presumably pass it to fellow analysts or Five Eyes intelligence partners. One of XKEYSCORE’s only apparent failings is that it’s so incredibly powerful, so effective at vacuuming personal metadata from the entire internet, that the volume of information it extracts can be overwhelming. Imagine trying to search your Gmail account, only the results are pulled from every Gmail inbox in the world.

 

MAKING XKEYSCORE MORE intelligible — and thus much more effective — appears to have been one of Palantir’s chief successes. The helper tool, documented in a GCHQ PDF guide, provided a means of transferring data captured by the NSA’s XKEYSCORE directly into Palantir, where presumably it would be far easier to analyze for, say, specific people and places. An analyst using XKEYSCORE could pull every IP address in Moscow and Tehran that visited a given website or made a Skype call at 14:15 Eastern Time, for example, and then import the resulting data set into Palantir in order to identify additional connections between the addresses or plot their positions using Google Earth.

Palantir was also used as part of a GCHQ project code-named LOVELY HORSE, which sought to improve the agency’s ability to collect so-called open source intelligence — data available on the public internet, like tweets, blog posts, and news articles. Given the “unstructured” nature of this kind of data, Palantir was cited as “an enrichment to existing [LOVELY HORSE] investigations … the content should then be viewable in a human readable format within Palantir.”

Palantir’s impressive data-mining abilities are well-documented, but so too is the potential for misuse. Palantir software is designed to make it easy to sift through piles of information that would be completely inscrutable to a human alone, but the human driving the computer is still responsible for making judgments, good or bad.

A 2011 document by GCHQ’s SIGINT Development Steering Group, a staff committee dedicated to implementing new spy methods, listed some of these worries. In a table listing “risks & challenges,” the SDSG expressed a “concern that [Palantir] gives the analyst greater potential for going down too many analytical paths which could distract from the intelligence requirement.” What it could mean for analysts to distract themselves by going down extraneous “paths” while browsing the world’s most advanced spy machine is left unsaid. But Palantir’s data-mining abilities were such that the SDSG wondered if its spies should be blocked from having full access right off the bat and suggested configuring Palantir software so that parts would “unlock … based on analysts skill level, hiding buttons and features until needed and capable of utilising.” If Palantir succeeded in fixing the intelligence problem of being overwhelmed with data, it may have created a problem of over-analysis — the company’s software offers such a multitude of ways to visualize and explore massive data sets that analysts could get lost in the funhouse of infographics, rather than simply being overwhelmed by the scale of their task.

If Palantir’s potential for misuse occurred to the company’s spy clients, surely it must have occurred to Palantir itself, especially given the company’s aforementioned “commitment” to privacy and civil liberties. Sure enough, in 2012 the company announced the formation of the Palantir Council of Advisors on Privacy and Civil Liberties, a committee of academics and consultants with expertise in those fields. Palantir claimed that convening the PCAP had “provided us with invaluable guidance as we try to responsibly navigate the often ill-defined legal, political, technological, and ethical frameworks that sometimes govern the various activities of our customers,” and continued to discuss the privacy and civil liberties “implications of product developments and to suggest potential ways to mitigate any negative effects.” Still, Palantir made clear that the “PCAP is advisory only — any decisions that we make after consulting with the PCAP are entirely our own.”

What would a privacy-minded conversation about privacy-breaching software look like? How had a privacy and civil liberties council navigated the fact that Palantir’s clientele had directly engaged in one of the greatest privacy and civil liberties breaches of all time? It’s hard to find an answer.

Palantir wrote that it structured the nondisclosure agreement signed by PCAP members so that they “will be free to discuss anything that they learn in working with us unless we clearly designate information as proprietary or otherwise confidential (something that we have rarely found necessary except on very limited occasions).” But despite this assurance of transparency, all but one of the PCAP’s former and current members either did not return a request for comment for this article or declined to comment citing the NDA.

The former PCAP member who did respond, Stanford privacy scholar Omer Tene, told The Intercept that he was unaware of “any specific relationship, agreement, or project that you’re referring to,” and said he was not permitted to answer whether Palantir’s work with the intelligence community was ever a source of tension with the PCAP. He declined to comment on either the NSA or GCHQ specifically. “In general,” Tene said, “the role of the PCAP was to hear about client engagement or new products and offerings that the company was about to launch, and to opine as to the way they should be set up or delivered in order to minimize privacy and civil liberties concerns.” But without any further detail, it’s unclear whether the PCAP was ever briefed on the company’s work for spy agencies, or whether such work was a matter of debate.

There’s little detail to be found on archived versions of Palantir’s privacy and civil liberties-focused blog, which appears to have been deleted sometime after the PCAP was formed. Palantir spokesperson Matt Long told The Intercept to contact the Palantir media team for questions regarding the vanished blog at the same email address used to reach Long in the first place. Palantir did not respond to additional repeated requests for comment and clarification.

A GCHQ spokesperson provided a boilerplate statement reiterating the agency’s “longstanding policy” against commenting on intelligence matters and asserted that all its activities are “carried out in accordance with a strict legal and policy framework.” The NSA did not provide a response.

Anyone worried that the most powerful spy agencies on Earth might use Palantir software to violate the privacy or civil rights of the vast number of people under constant surveillance may derive some cold comfort in a portion of the user agreement language Palantir provided for the Kite plug-in, which stipulates that the user will not violate “any applicable law” or the privacy or the rights “of any third party.” The world will just have to hope Palantir’s most powerful customers follow the rules.

Documents published with this article:

GCHQ VisWeek 2008 Conference Report

Palantir Executive Summary

NDIST Cyber Defence

Mastering the Internet

The Tale of Two Sources

TWO FACE on GCHQ Wiki

XKEYSCORE Helper Notes

SDSG Integrated Analytics Workshop

https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/ 

[##]

See also the previous entries here at The Sullen Bell which have discussed Palantir. 

See also

from February 2014

Peter Thiel’s Newest Obsession: Nanotechnology

https://www.entrepreneur.com/article/231660 

[&&]{**}[##]

WAYNE MADSEN | 24.02.2017 | OPINION

The Three Trump Administrations

Foreign and national defense ministries around the world, as well as embassies in Washington, DC, are struggling to ascertain who is actually in charge of the U.S. government one month after Donald Trump was sworn in as president of the United States. It is a fair question, considering the conflicting statements issuing forth from the White House, State Department, and the Pentagon.

Suffice to say, there are, essentially, three Trump administrations, all with varying degrees of power.

The first administration and the most visibly powerful is Trump’s inner circle. At the present time, this consists of Trump, chief strategist Stephen Bannon, Trump daughter Ivanka Trump and her husband Jared Kushner, special assistant to the president Stephen Miller, and Attorney General Jeff Sessions. Although Bannon came to Trump from the presidential campaign of Senator Ted Cruz, the former Breitbart News publisher has become a virtual «Svengali», influencing Trump on foreign and domestic policies.

The second administration represents the establishment Republicans who endorsed Trump after he secured the Republican presidential nomination. This circle includes White House chief of staff Reince Priebus, the former Republican National Committee chairman, and Sean Spicer, Trump’s press secretary who had the same job at the Republican National Committee under Priebus. Trump’s counselor and former presidential campaign manager Kellyanne Conway, who, like Bannon, came from the Cruz campaign, funds herself often on the outside of the Trump inner circle and more in the company of establishment Republicans Priebus and Spicer. Priebus and Conway, and, to a lesser extent, Spicer, are the eyes and ears of congressional Republicans like Senate Majority Leader Mitch McConnell and Speaker of the House of Representatives Paul Ryan in the White House.

The third administration represents the longtime «deep state» interests and is a combination of George W. Bush/Ronald Reagan administration neoconservative activists and powerful Wall Street and Houston/Dallas oil business moguls traditionally linked to Republican politics. While the neocons and business interests do not agree on much, they are taking advantage of the disorganization of the Trump administration to secure their own power centers. Recently, officials of this «third» administration were seen vying for influence and stature at the 2017 Munich Security Conference.

It is clear that the third Trump administration is the one that hopes to take the reins of power if either Trump is forced out of the presidency as a result of impeachment and conviction or ill-health. Representing the international status quo, the third Trump administration, represented chiefly by Vice President Mike Pence and Defense Secretary James Mattis, was very active in promoting NATO, the European Union, and continued sanctions on Russia at Munich. The statements by Pence and Mattis ran counter to the opinions previously aired by Trump. Secretary of State Rex Tillerson, opting not to attend the Munich conference, attended a G20 foreign ministers’ summit in Bonn held before the gathering in Munich. This leg of the Trump triad is the one with which the global elites feel most comfortable.

Tillerson, a Texas native and friend of the Bush family and former Secretary of State James Baker, showed that the neocons continue to have clout inside the Trump administration when he dared propose Elliott Abrams, an Iran-contra felon from the Reagan administration, to be his deputy Secretary of State. Abrams’s campaign rhetoric, in which he criticized Trump, resulted in the president vetoing Abrams for the State Department’s number two position. But that did not stop another arch-neocon, the never-confirmed former U.S. ambassador to the UN John Bolton, from being considered for number two at State and, more recently, as Trump’s national security adviser.

Tillerson’s ambassador to the United Nations, former South Carolina Governor Nikki Haley, has publicly condemned Russia over the Ukraine situation, even though Trump has indicated he wants a rapprochement with Russia. The third Trump administration is full of similar contradictions, with paleo-conservatives like Tillerson willing to hire on neocons like Abrams. Other deep state players within this third leg of the Trump triad include Central Intelligence Agency director Mike Pompeo, who wasted no time traveling to Turkey and Saudi Arabia to pay homage to the vested political interests of both nations, and Director of National Intelligence director-designate, former Senator Dan Coats of Indiana, a longtime friend of Pence.

Former national security adviser Michael Flynn, the former director of the Defense Intelligence Agency and a retired three-star general, was never a member of the Trump inner circle. In fact, Flynn was closer to the neocons worming their way into the Trump administration. Flynn was the co-author of the book titled «The Field of Flight: How We Can Win the Global War Against Radical Islam and Its Allies», with one of the most dangerous neocons around, Michael Ledeen, an Iran-contra co-conspirator of Abrams and another neocon vying for influence in the Trump White House, Frank Gaffney.

Ensconced with Pence and Mattis in Munich were the two most hawkish Republican senators who would have Trump adopt even more drastic sanctions against Russia: Senators John McCain, the chairman of the Senate Armed Services Committee, and fellow committee member Lindsey Graham. McCain used Munich to not only bash Russia but also Trump, while his close friend Graham promised that 2017 would be «the year of kicking Russia in the ass.» The mere fact that McCain and Graham were permitted to represent at Munich a hawkish policy at loggerheads with that of Trump, while Pence remained silent and Mattis championed America’s commitments to NATO and the EU, shows the world that the United States government now speaks through different voices. Joining McCain and Graham to reinforce U.S. defense and financial commitments was Senate Foreign Relations Committee chairman Bob Corker and former NATO commander and proposed Trump national security adviser General David Petraeus, previously disgraced by a sex scandal.

Munich provided the third Trump administration with a platform from which to reinforce the «world order» that Trump campaigned against. Governments that had donated handsomely to the Clinton Foundation and made no secret of their abhorrence of Trump as a candidate, were on hand in Munich to warmly embrace Pence and Mattis. Among those in attendance were Saudi Arabia’s wily anti-Iranian foreign minister and former ambassador in Washington Adel bin Ahmed al-Jubeir, Saudi Arabia’s more slyer former intelligence chief Prince Turki al-Faisal bin Abdulaziz, Qatari foreign minister Shaikh Mohammed bin Abdulrahman al-Thani and defense minister Khalid bin Mohammed al-Attiyah, Bahraini foreign minister Shaikh Khalid bin Ahmed bin Mohammed al-Khalifa, Kuwaiti deputy prime minister Shaikh Khaled al Jarrah al-Sabah, and Moroccan royal cabinet minister Youssef Amrani and the Moroccan king’s counselor André Azoulay. Undoubtedly, these Arab potentates will soon bestow their largesse upon members and corporate contrivances of the Trump family.

Pence and Mattis also rubbed shoulders at Munich with such influential anti-Trump personages as Bono, the U-2 rock band celebrity; former U.S. Secretary of State Madeleine Albright; former Homeland Security Secretary Michael Chertoff; Ohio Governor John Kasich; former Defense Secretary William Cohen; Microsoft founder Bill Gates; Woodrow Wilson Center director Jane Harman; Robert Kagan of the Brookings Institution and his wife and chief architect of the 2014 Ukrainian Coup Victoria Nuland; former Senator Joseph Lieberman; International Rescue Committee director David Miliband; Nebraska Republican Senator Ben Sasse; ranking Democrat on the House Intelligence Committee Adam Schiff; and Frank Wisner, Jr., a longtime U.S. diplomat with deep state ties and the son of Frank Wisner, Sr., the CIA’s original crafter of «fake news», CIA propaganda disguised as actual news.

And if Trump’s avid anti-globalist supporters believe that their president is «draining the swamp» of their bitterest of foes, they might be surprised that Pence and Mattis were in the company in Munich of Lady Lynn Forester de Rothschild, Trilateral Commission deputy chairman Michael Fuchs, and global political troublemaker George Soros.

The third Trump administration of Pence, Mattis, and Tillerson signaled the world that the actual Trump administration, the one representing America’s «deep state», will continue to run the U.S. government. This is the part of the Trump administration that will continue to conspire with the world’s elite at places like Bilderberg, Davos, Bohemian Grove, Cernobbio, APEC, and G-7. Trump has not «drained the swamp» as he promised. He has merely joined the reptiles already in it. In fact, Eric and Donald Trump Jr., who now head up the Trump Organization, recently opened a luxurious Trump golf course in Dubai. That set the ground for a very amiable meeting at the G20 meeting in Bonn between Tillerson and his counterpart from the United Arab Emirates. The French have a saying for Trump’s «revolution» – «plus ca change, plus c’est la meme chose» or «the more things change, the more they stay the same».

http://www.strategic-culture.org/news/2017/02/24/three-trump-administrations.html 

[&&]{**}[##]

https://www.youtube.com/watch?v=pni_kDv9BsU 

Published on Feb 9, 2016

In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal government. Don’t miss out on learning her methodologies in spotting deception.

Speaker:

Susan Carnicero, Author of Spy the Lie and founding partner, Qverity

[&&]{**}[##]

US Military Megacity Pacification and Assault Planning Videos (for educational purposes of course)

Posted on February 24, 2017 by willyloman

by Scott Creighton

[&&]{**}[##]

https://imgs.xkcd.com/comics/location_reviews.png 

[&&]{**}[##]

https://www.youtube.com/channel/UCrQ-wHKVi0JDWjQGcuoYnew 

[Ed.: I’ve caught up through Day 123; have you?.

If you need to go back to go forward, you can start at the bottom of investigative pointillism.]

[&&]{**}[##]

From 2008:

“U.S. warfighters are finding that human intelligence, or HUMINT, is more important than ever in the war on terrorism. The Defense HUMINT Management Office (DHMO) is working to produce new technologies to aid the warfighter in the quest for effective HUMINT collection and dissemination.

Trench coats have given way to optical collectors.

Intelligence technology research normally focused on electronics-related disciplines increasingly is being applied to improving human intelligence capabilities. These capabilities, which range from intelligence collection to distribution, define human intelligence activities in the war on terrorism.

Human intelligence, or HUMINT, is increasing in importance as allied forces in Iraq and Afghanistan deal with terror networks moving about the general populace. Preventing attacks on innocent civilians in Southwest Asia as well as the West may depend on being able to gather information using HUMINT assets and techniques.

The U.S. Defense Department has organized its Defense HUMINT Management Office (DHMO) to support HUMINT operators in the field. Much of this support includes tapping conventional and nontraditional sources for technologies that aid HUMINT collection, processing and dissemination.

Drew Bewick is the chief of technology tradecraft at the DHMO. Bewick’s office represents the HUMINT elements in the military services, the combatant commands and the Defense Intelligence Agency (DIA). He is tasked with finding new HUMINT technologies and capabilities and speeding them to the field in the war on terrorism.

“To win this war on terrorism and to find people, HUMINT is first among equals,” Bewick declares.

The DHMO has four organizational pillars: plans and policies; operations and assessments; training, including training standards and career paths; and technology tradecraft. For its activities, the office has two focus areas. One is to develop key technologies that enable the department to penetrate difficult targets. The other is to integrate HUMINT data into the joint and coalition intelligence, surveillance and reconnaissance (ISR) picture. This requires correlating HUMINT data with that of signals intelligence (SIGINT), geospatial intelligence (GEOINT) and measurement and signatures intelligence (MASINT), for example. How the HUMINT data helps the commander in the field is a key criterion for generating the right knowledge, Bewick allows.

The DHMO is aiming to improve collection, processing and dissemination equally as it strives to apply technologies for better HUMINT. For example, Bewick relates that as DHMO personnel visit the commands in the field, they often find that HUMINT technology tool sets are nothing more than stubby pencils and paper. Even improving how HUMINT data is reported will have a major effect. “You didn’t see James Bond writing too many reports,” he analogizes. “Yet, HUMINTers in the Defense Department spend an awful lot of time writing reports.” Providing new capabilities to help them report data is vital to the success of HUMINT, he declares.

“If it were possible to develop only capabilities for HUMINT collectors in the field, that would be awesome—that would help them do their job of penetrating difficult targets,” he continues. “But equally, to help them share that data with whomever needs it is just as important.”

HUMINT comprises a broad spectrum of activities and data. The result is a story that often is in the form of textual information, Bewick offers. That may change as intelligence takes new forms. The office has established a limited partnership with In-Q-Tel (SIGNAL Magazine, April 2001) that Bewick describes as “terrific.” Through In-Q-Tel, the DHMO invested in the video game company Destineer, based in Plymouth, Minnesota. The DHMO is seeking modeling and simulation for teaching tactics, techniques and procedures, especially for integrating HUMINT data. Finding people involves social network analysis, but when HUMINT data is correlated with other data, the information that results is no longer textual.

The DHMO’s team works with In-Q-Tel and with partners in other corporations and government agencies to find the talent that can offer solutions to its technology needs. Many entrepreneurs have good ideas that the DHMO wants to leverage.

“What we really do is save the lives of good ideas,” he declares.

Bewick continues that his office wanted to adapt the In-Q-Tel approach to its own operating environment. So it added a venture capital model that focuses on understanding the warfighter. The DHMO formed working groups of a user board, and these groups are queried when the office encounters a potential solution. These users may offer a way of altering the innovative technology to make it more effective.

The DHMO’s efforts already have borne fruit. One technology that has been accelerated is the mobile immersive video-ground, or MID-G. It comprises a 360-degree full-motion video capability that can collect visual information from all directions simultaneously. Bewick offers that it helps with mission planning for attacking terrorist objectives. “There are places that we are asked to go to that are dangerous; we only want to go once and get as much information as we can. It is incredibly valuable, when operationalizing our human capabilities, to get an understanding of what it feels and looks like on the ground from the human perspective.

“You couldn’t do this before.”

The DHMO currently is testing MID-G and transferring it to the field. Bewick notes that the office has driven its commercial cost down by a factor of 10 in only eight months. He adds that for every dollar invested by the office through In-Q-Tel, anywhere from $8 to $11 are matched by the venture capital community. That sustainment by the commercial marketplace is vastly different from the traditional government contracting model, he points out.

 

Among the vital HUMINT technologies that the DHMO is speeding to the field are handheld Arabic-to-English translation devices.

Another key technology comes from Palantir Technologies Incorporated, Palo Alto, California. The founders of this company are the original developers of PayPal, the online payment system acquired by eBay. Having developed algorithms to detect fraud, they have been asked by the DHMO to develop a means to discover information about a social network—largely to help find people.

This touches upon the vitally important task of understanding network threats. It encompasses how people are connected and through what kind of structures, as well as how a group stays cohesive.

On a more esoteric level, some technology basic research can lead to improvements in HUMINT collection capabilities. One important area is microfluidic lenses. Imagery collection, from ubiquitous picture cell phones to specialized advanced sensing systems, largely uses mechanical lenses. A small microfluidic lens can change its shape to be telescopic and zoom in on a distant object. The DHMO has found several companies working on this technology, which may first emerge commercially in picture cell phones.

But an emerging technology need not have an immediate battlefield impact to serve the defense HUMINT community. “Our measure of success is not that everything we make an investment in has a high mission impact,” Bewick offers. “If it were, my concern would be that we were not setting ourselves up for the next conflict.

“So the metric I have is that 50 percent of our portfolio should be high mission impact, and 50 percent of our portfolio should involve taking some risks. Our CENTCOM [U.S. Central Command] executors don’t want to hear what we’ll be giving them two years from now; they want to know what we have that will help them now. But the hypothesis is that while we have to do that, we also have to get ready for the next kinds of challenges that we will have to face,” he concludes.

Among the risky technologies is identity management. Bewick cites the need for a mobile DNA fingerprinting capability to ensure proper identification of terrorists among innocents. This can make the difference between detaining a terrorist and inadvertently freeing one.

Not all technologies involve laboratory technologies. Bewick observes that operators using HUMINT databases can benefit from knowledge discovery search engines that turn up vital information. The DHMO has worked with Endeca Technologies Incorporated, Cambridge, Massachusetts—which is an In-Q-Tel company that has a guided navigation capability used by Walmart.com and BarnesandNoble.com—to develop a search capability for finding information already collected. It already has been adopted by the DIA, he notes. “You see knowledge immediately,” he explains. “This has been remarkably powerful, and we are moving it out to the field.”

The DHMO’s technology tradecraft office also has an objective to operationalize HUMINT. This will require synchronizing HUMINT activities, which is a capability that is lacking today. A synchronization matrix capability must be developed to correlate with other intelligence so that a commander in the field can see the time frame for earliest value and least value for intelligence. This has been attained for other intelligence disciplines, but it has not been achieved for HUMINT. The DHMO is accelerating its development, and Bewick is hopeful that this will produce some capability next year.

With the DHMO’s focus on operators in the field, the near-term technology that is most prominent on the office’s radar is communications. Bewick notes a sense of urgency for near person-to-person links or over-the-horizon connectivity. Interoperability is a must, which affects whether other government communications technologies can be transferred to defense HUMINT.

For the longer term, nanotechnology looms large in potential HUMINT applications. The mobile DNA fingerprinting capability, for example, could be optimized by nanotechnologies. Other biometric technologies as well as communications could benefit. The DHMO also is investing in alternative power sources, Bewick relates.

The other focus area, data integration, is no less important than technology-driven collection. “Our challenge is to convert data into knowledge rapidly,” Bewick says. “Given what we’re asked to do, we must integrate human intelligence data like we never did before.” This requires joint and coalition ISR interoperability. HUMINT now is being integrated into the Global Information Grid (GIG). So, the DHMO is emphasizing the need to plan for HUMINT data in building the GIG. As Joint Intelligence Operations Centers are emerging at the theater level (SIGNAL Magazine, October 2005, page 44), the office must integrate human data at that level. This supplements existing data integration efforts at joint task force level and below.

“Our mission is from tactical to national,” Bewick says. “We take a departmental level view, not only of the research and development effort but also of the interoperability picture for the department.”

This effort also sends the office to other government agencies to determine how they would use HUMINT data. Bewick cites the Joint Improvised Explosive Device (IED) Defeat Organization, which is designed to overcome IEDs. The DHMO is determining whether it can contribute its own science and technology or add its data to be integrated with other intelligence data.

“What we find ourselves doing is building bridges,” he says. “We are trying to bridge this valley of death where we are finding [that] technologies are dying on the vine.” Many organizations develop technologies and capabilities in their science and technology elements that reach a certain stage but progress no further. The DHMO has “boots on the ground” and communities reaching out to these other organizations.

The office has established a JointDefensewideHUMINTInnovationCenter structure that is based on finding technologies and capabilities developed among businesses or other government organizations. This portfolio management approach is based on “the serendipity of finding what has been developed elsewhere for the end user who says, ‘I need it, I’ll do an operational test of it, I’ll even commit to putting it in my POM [program objective memorandum] if you can get it to me right now.’ That’s kind of the value add that we have,” Bewick states.

 

The DHMO is embedding support personnel at select commands and agencies—such as those that are adept at tagging, communications or data management— who can transfer solutions to the field. Combined with user groups, these experts can help speed new technologies to the operator.

Bewick relates that recently the I Marine Expeditionary Force (MEF) in Iraq sent the DHMO an urgent-need statement for language translation capabilities. Within 24 hours, the office and its partners tapped existing expertise to provide the MEF with a solution that came with operational instruction on how to use the capability. The user never knew that this capability existed and was obtainable off the shelf until the DHMO provided it.

The DHMO established a Defense Department tradecraft technology board in March 2005, and it included representatives from the combatant commands, the DIA and the military services. The office asked this board to define the most critical challenges facing HUMINT operatives in the field. While this query was framed in a technology perspective, it emerged in a capability perspective.

The DHMO compared those responses, and when a similar—hence a joint—problem was apparent, the office made it a DHMO problem set. A total of nine problem sets were established, including biometrics, tagging, communications, language translation, data management, remote sensing and novel power sources.

For integrating HUMINT data and sharing information, the undersecretary of defense for intelligence asked the office to establish a HUMINT integrated product team (IPT) under the Distributed Common Ground Surface System, which is the collection system for intelligence at joint task force and below. Bewick chairs this HUMINT IPT, which also includes representatives from the services and the commands.

Among the points that emerged from these two efforts was that the DHMO would take a portfolio management approach to these targeted areas. So, the DHMO established two paths. In one would go capabilities that the department already does well but can do better. The other would comprise capabilities that are not done or are not done well today but that must be available in the next few years. Among these are biometrics and person location through a social network, Bewick offers. The office is issuing its first Defense Department HUMINT metadata standards, which are emerging in part from work performed with SAIC at the JointDefensewideHUMINTInnovationCenter. People who need to find HUMINT will be able to generate a user-defined operating picture. “Our measure for interoperability will be to make HUMINT data accessible, visible, available to whomever has a need for it wherever they are [and] whenever they need it,” Bewick declares.

The DHMO also established its own metric for determining whether an innovation is worthy of investment. This metric entails assessing the return on intelligence based on a predictive mission impact measure. Bewick explains that the DHMO frames it in terms of values and risk tradeoff.

The values it keys on are military advantage; end-user urgency or enthusiasm, especially where users have requested this type of innovation or have existing related programs of record; jointness, particularly whether there is more than one user among the services and the commands; and strategic policy alignment.

For risk assessment, the office considers operational risk. If someone uses a capability, might it fail and result in friendly fatalities? The office seeks to determine the effects if it does not work as well as its defined uncertainty. Another risk involves the defense infrastructure—will it require considerable changing? A solution must be compatible—and interoperable—with the existing infrastructure.

And, technological functional risk is an issue. A technology solution may require new unproven innovations. While this and the other issues weigh heavily in the decision, alone they do not necessarily determine the adoption of a solution, Bewick notes.

 

Web Resources

Destineer: www.destineerstudios.com

Palantir Technologies: www.palantirtech.com

Endeca: http://endeca.com

http://www.afcea.org/content/?q=defense-humint-needs-technology-too 

[&&]{**}[##]

THE DARK NEXUS OF MIND CONTROL AND ARTIFICIAL INTELLIGENCE

Published: January 30, 2015

Is Alice’s nightmare world becoming a reality? Note that Alice in Resident Evil is subjected to mind control and genetic manipulation by a secretive corporation that controls governments, the Umbrella Corp.

In researching the MK ULTRA programs and their various offshoots, I came across an interesting connection to the coming SmartGrid.  Under Dr. Ewan Cameron, a prison tracking device known as the Schwitzgebel Machine was utilized to monitor inmates locations, heart rate and other personal details that were reciprocally transmitted to the good doctors.  What comes to the fore is the similarity with the development of the Smartphone and its new capabilities for monitoring heart rate, health, etc., as well as basically anything else.  Is there a connection between mind control and the coming A.I. takeover?  While this may sound like the ultimate paranoiac tin foliage, I suspect more at work here.

In my analysis, the rollout of the great technological utopia we are being sold was not the result of mere organic market forces that competed to produce harder, better, faster and stronger products.  The average libertarian, for example, believes this deception, presuming the “invisible hand” of the market results in a natural advancement, while any other economic model retarded growth and “progress.”  On the contrary, much of the technological progress we have seen in the last few decades is not the result of independent, competing ideas, but is rather the strategically timed and intentional release of the military industrial tech complex, given to an idiot public for the purpose of long term enslavement and depopulation.

The connection to MK ULTRA arises in relation to experiments with jc manipulation which I have already highlighted in regard to Dr. Michael Aquino and his infamous essay, “From PSYOP to MindWar: The Psychology of Victory,” where the combination of ELF/VLF and various RF manipulation is discussed in detail towards the end.  A Nexus Magazine article “Techniques Used by Governments for Mind Control,” by Sid Taylor outlines the RF experimentation in the MK programs:

“MK ULTRA SUBPROJECT-68

This was Dr. Cameron’s ongoing “attempts to establish lasting effects in a patient’s behaviour” using a combination of particularly intensive electroshock, intensive repetition of prearranged verbal signals, partial sensory isolation, and repression of the driving period carried out by inducing continuous sleep for seven to ten days at the end of the treatment period. During research on sensor deprivation, Cameron experimented with the use of Curare, (the deadly poison used by South American Indians to tip their arrow heads), to immobilise his patients.

After one test he noted: “Although the patient was prepared by both prolonged sensory isolation (35 days) and by repeated depatterning, and although she received 101 days of positive driving, no favourable results were obtained.” Patients were regularly treated with hallucinogenic drugs, long periods in the “sleep room”, and testing in the Radio Telemetry Laboratory that was built by Rubinstein under Dr. Cameron’s direction. Here, patients were exposed to a range of RF and electromagnetic signals and monitored for changes in behaviour. It was later stated by other staff members who had worked at the Institute that not one patient sent to the Radio Telemetry Lab showed any signs of improvement afterwards.”

When we consider the intersect with drug experimentation, the cocktail of brainwashing, “imprinting” and RF frequency technology becomes clear as something engineered by design.  Taylor continues, echoing something akin to a mondo Faces of Death flick:

“There were an enormous number of MKUltra operations. The project farmed out work to eighty institutions, of which forty-four were colleges or universities, fifteen research facilities or private companies, twelve hospitals and three prisons. The estimated total cost of the operation was 10-25 million dollars.

Prisoners were used in experiments conducted at the California Medical Facility in Vacaville State Prison by Dr. James Hamilton. Funded by another chain of front organisations, Dr. Hamilton conducted “clinical testing of behavioural control materials.” In New Jersey, testing was conducted by Dr. Carl Pfieffer at the Borden Reformatory, on similar materials. At Holmesburg State Prison in Philadelphia volunteers were used to test a particularly violent incapacitating drug. Around the same time as these tests were being conducted by the CIA the US Army initiated two projects, THIRD CHANCE and DERBY HAT. They conducted experiments both home and abroad, and at one time the New York State Psychiatric Institute was conducting research under contract to the Army. Between 1955 and 1958 the Army also tested LSD on 1,000 volunteer US servicemen at Fort Bragg and the Army’s Chemical Warfare Laboratories at Edgewood….

In this MKSearch sub-project the isolation chamber that had been constructed earlier by Dr. Cameron at the Allan Memorial Institute was rebuilt at a laboratory of the National Institutes of Mental Health. This time, instead of humans, apes were to be subjected to a cruel combination of treatments. After first being lobotomised, the animals were kept in total isolation. The radio telemetry techniques developed earlier by Leonard Rubenstein were adapted so that radio frequency energy could be beamed into the brains of the highly disturbed animals. Many were then decapitated and their heads would be transplanted onto another body to see if the RF energy would bring them back to life. The apes that were not killed in this way were later bombarded with radio waves until they fell unconscious. Autopsies revealed that their brain tissue had literally been fried. These experiments were conducted around 1965/66, so it is a frightening reality that it is around 25 years since intelligence agencies covertly started experimenting with the use of radiated energy to control behavior….

THE SCHWITZGEBEL MACHINE

After consultation with the DCI, Richard Helms, Dr. Gottlieb hired the former director of the Agency’s Office of Scientific Intelligence, Dr. Stephen Aldrich, and set him up in a safe house where a KGB defector had recently been interrogated and tortured continuously for almost three years, so that he could experiment with a device known as the Schwitzgebel Machine. This was a ‘Behavioural Transmitter-Reinforcer’ (BT-R) fitted to a body belt that received signals from, and transmitted signals to, a radio module. The machine was “linked to a missile tracking device which graphs the wearer’s location and displays it on a screen.” It was developed by Ralph K. Schwitzgebel in the Laboratory of Community Psychiatry at Harvard Medical School. [ https://www.abebooks.com/book-search/author/schwitzgebel-ralph/ ]His brother, Robert, subsequently modified the prototype into a more refined final product. The machine drew enthusiastic praise from criminologists who were supportive of ORD’s concepts for the intelligence techniques of the new world order. [ https://www.goodreads.com/book/show/3508334-psychotechnology-electronic-control-of-mind-and-behavior ]

On December 10th 1972, Helmes cancelled Operation Often. The memo sent to Dr. Gottlieb to notify him was marked READ DESTROY. Dr Gottlieb resigned from the agency in January 1973. Before he left he was ordered by Helmes to shred all records from MKUltra – MKSearch.

130 boxes would later be discovered in the Langley archives that inexplicably, Dr Gottlieb had failed to destroy. It was thought that the records had been misfiled and would have been destroyed if Helms and Gottlieb had been aware of them.”

https://jaysanalysis.files.wordpress.com/2015/01/511jkk5m0ol__sy344_bo1204203200_.jpg?w=200&h=300

With all that madness in mind, when we consider the Smartphone, we see a device that utilizes RF and tracks your every move, desire and taste, with all of that data being transferred to mysterious third parties which are sold and stored in vast data centers around the globe.  In line with JC Collins’ thought, as well as NSA whistleblower William Binney, I have opined that this is all being stored with the intent of a global SmartGrid control system.  While it is true that one level competition between Silicon Valley tech companies may be permitted, the reality was elucidated years ago in former CIA operative Melissa Mahle’s 2004 autobiography, Denial and Deception: An Insider’s View of the CIA, where she explained the origins of In-Q-Tel:

“Rather than run a full in-house R&D program, Tenet authorized the directorate to create a technology-incubation organization, In-Q-Tel, to serve as an information technology portal from the private sector to the intelligence community…With an initial funding of 28.5 million in CIA funds, the venture focused on building productive relationships with small firms involved in IT innovation, In-Q-Tel concentrated on technologies that integrate Internet technology and applications to intelligence work, that develop new security and privacy technologies, and nurture data-mining technologies to take better advantage of the CIA’s vast storehouse of records, and modernize the CIA’s computer systems. (pg. 267)

In-Q-Tel was also instrumental in some other names you might recognize, like Google and Facebook.  James Corbett’s piece on this connection gives an excellent summary of these pseudo-free market firms:

For decades, the Defense Advanced Research Projects Agency, or DARPA, has been the American governmental body tasked with conducting high-risk, high-payoff research into cutting edge science and technology. Responsible most famously for developing the world’s first operational packet switching network that eventually became the core of the Internet, DARPA tends to garner headlines these days for some of its more outlandish research proposals and is generally looked upon a a blue-sky research agency whose endeavours only occasionally bear fruit….

Two of the names that come up most often in connection with In-Q-Tel, however, need no introduction: Google and Facebook.

The publicly available record on the Facebook/In-Q-Tel connection is tenuous. Facebook received $12.7 million in venture capital from Accel, whose manager, James Breyer, now sits on their board. He was formerly the chairman of the National Venture Capital Association, whose board included Gilman Louie, then the CEO of In-Q-Tel. The connection is indirect, but the suggestion of CIA involvement with Facebook, however tangential, is disturbing in the light of Facebook’s history of violating the privacy of its users….

Google’s connection to In-Q-Tel is more straightforward, if officially denied. In 2006, ex-CIA officer Robert David Steele told Homeland Security Today that Google “has been taking money and direction for elements of the US Intelligence Community, including the Office of Research and Development at the Central Intelligence Agency, In-Q-Tel, and in all probability, both the National Security Agency (NSA) and the Army’s Intelligence and Security Command.” Later that year, a blogger claimed that an official Google spokesman had denied the claims, but no official press statement was released.”

So what about my claims about the same strategic goal associating all of this with mind control?  You’ll note that much of the very secret covert work pertains to nanotechnology, cancer and producing human resistance to the radioactive effects of all of this frequency pollution.  According to Business Insider, CIA startups are intimately connected to WiFi R&D, as well as with transhumanist Bilderberg attendee, Peter Thiel, stating:

“We’ve talked about Palantir before and the impact it is having on the Army intelligence community.  What we didn’t go into as much was the fact that In-Q-Tel was an early investor in the technology on behalf of the Central Intelligence Agency.  Palantir makes software that integrates data together from a wide array of resources and databases.

It’s one of the best programs at coordinating the vast databases accumulated by the U.S. intelligence apparatus. It assembles comprehensive dossiers on objects of interest, collated from the sprawling databases of intelligence agencies.”

And Corbett makes this connect to nanotech and bio-engineering and biometrics, illustrating further the danger these corporate-government mergers represent (operating under the guise of being private sector):

“The In-Q-Tel website currently lists two “practice areas,” “Information and Communication Technologies” and “Physical and Biological Technologies.” The latter field consists of “capabilities of interest” such as “The on-site determination of individual human traits for IC purposes” and “Tracking and/or authentication of both individuals and objects.” In-Q-Tel also lists two areas that are “on its radar” when it comes to biotech: Nano-bio Convergence and Physiological Intelligence. Detailed breakdowns of each area explain that the intelligence community is interested in, amongst other things, self-assembling batteries, single molecule detectors, targeted drug delivery platforms, and sensors that can tell where a person has been and what substances he has been handling from “biomarkers” like trace compounds in the breath or samples of skin.”

Thus the intersect of advanced technology, intelligence agencies and mind control is not far-fetched.  The reality is, all of this is war gamed and planned for implementation by an establishment that long ago adopted the panopticism model of Jeremy Bentham and the Malthusian Royal Society.  The goals have nothing to do with creating a tech utopia for you and your progeny, where you will fly off to floating moonbases and partake of Elysium-style healing machines with Matt Damon.

The same establishment that is publicly determined to destroy humanity en masse and implement the A.I. kill grid is rolling out their designs even faster than we “conspiracy theorists” expected!  In fact, this week mainstream news is reporting that IBM’s Watson, the famed Jeopardy-playing A.I. bot will play a role in determining health care!

Forbes writes, trying to dissuade fears of the bots making the decision on your care, but this ignores an important fact – the article itself touts Watson’s superiority to human decision making, which will inevitably lead to the conclusion the bots are a better option than the human, and on top of that, the establishment interested in fostering all this are committed to dysgenics (not actually eugenics), which is the destruction of the human genome:

“Watson has made huge strides in its medical prowess in two short years. In May 2011 IBM had already trained Watson to have the knowledge of a second-year medical student. In March 2012 IBM struck a deal with Memorial Sloan Kettering to ingest and analyze tens of thousands of the renowned cancer center’s patient records and histories, as well as all the publicly available clinical research it can get its hard drives on. Today Watson has analyzed 605,000 pieces of medical evidence, 2 million pages of text, 25,000 training cases and had the assist of 14,700 clinician hours fine-tuning its decision accuracy. Six “instances” of Watson have already been installed in the last 12 months.”

If you played Nintendo in the 80s like I did as a kid, you’ll recall Mother Brain, the ill-tempered A.I. behemoth from Metroid.

Metroid was actually far more accurate in its description of the actual “Mother” that is being erected and sold as a sexy Scarlett Johansson (as in Spike Jonze’s Her).  Mother Brain, like the Red Queen in Resident Evil and Skynet in Terminator is given a distinctly feminine quality because she functions as a synthetic anima mundi.  The system is selling her as sexy, but I assure you, this is anything but. [See https://qz.com/911681/we-tested-apples-siri-amazon-echos-alexa-microsofts-cortana-and-googles-google-home-to-see-which-personal-assistant-bots-stand-up-for-themselves-in-the-face-of-sexual-harassment/ ]

This week the BBC is reporting that a Swedish firm is offering employees to be RF microchipped, and the wage slaves willingly complied.  I have highlighted the microchipping plan as something decades old, which shows the rollout of all this is clearly planned years in advance and is not an organic market development.  It is with the microchip that we can see the clear connection between the mind control programs of MK ULTRA and the rise of the A.I. grid, as well as the mind control of marketing employed in selling everyone on this trap.  As I outlined in numerous previous analyses (and here), when we consider the T Phage nanotech the Royal Society finds appealing,  one wonders if the T Virus and the Red Queen aren’t real, and out for blood.

http://www.blacklistednews.com/The_Dark_Nexus_of_Mind_Control_and_Artificial_Intelligence 

[&&]{**}[##]

https://jaysanalysis.com/2015/06/08/bilderberg-implementation-of-the-a-i-grid/ 

[&&]{**}[##]

insert book graphic

The audio of Wednesday night’s 9/11 and Other Deep State Crimes Teleconference is available here:

http://houston911truth.net/audio/22217.mp3

It features, amoing other things, a presentation by Doug Valentine a definitive study of the infamous “Phoenix Program,” responsible for the deaths of so many innocent victims in Vietnam but, according to Doug, refined and used as a template ever since in various forms. That book and this excellent article in Thursday’s Huffington Post provides readers a good sense of Doug’s work and influence.

 [&&]{**}[##]

Published on Feb 22, 2017

The next gen of vaccine horror is here. You better pay EXTREMELY close attention to this conversation. ‘Science’ has announced that vaccines are moving away from traditional formats and will now be composed of viruses that will carry entirely new forms of DNA right into your cells where they will REPLACE or join your body’s existing, God-given NATURAL DNA with this new SYNTHETIC DNA. This new DNA will allegedly confirm protection on you from various viruses that each new DNA type is created to kill. However, this new virus-delivered  SYNTHETIC DNA can be created to do almost ANYTHING to you…permanently and forever. This fake DNA can CHANGE ANY PART OF YOUR BEING…from intellectual and emotional processes to all physical traits that are created and regulated by our natural DNA. We are entirely governed by our birth DNA but soon, according to one scientist, ‘EVERYONE WILL HAVE SYNTHETIC DNA.’ We are talking about ABSOLUTE CONTROL of the human species through synthetic, DNA. This is a monumentally important video.

https://www.youtube.com/watch?v=o7aMlMs-51Y 

[45 minutes]

investigative pointillism?

investigative pointillism?

We live in a world that is basted regularly in the electric media which, given a shortened attention span on the part of its viewers, must elevate and conflate in order to keep you tuned in — http://www.inquisitr.com/3916823/lena-nersesian-sex-tape-photos-video-of-youtube-star-lena-the-plug-go-viral-after-her-promise-to-fans/  — so you’ll buy the messages and the content and the Kool-Aid. 

[I wonder how many people are aware of the patented technology for the transmission of silent sound in HD TV transmissions. What are they whispering into our subconsciousness by opening our built-in filter door with brain-wave technologies?]

So when Sports Illustrated uses the already-controversial New England Patriots (because the franchise and its QB are the chosen target of the NFL) to bash Donald Trump some more—  http://www.si.com/nfl/2017/01/24/tom-brady-donald-trump-friendship-electionif you want to know more about Time, Inc., the folks who own SI, then read Kris Millegan’s “Fleshing Out Skull and Bones” and George Michael Evica’s “A Certain Arrogance” (especially the part about C. D. Jackson and Time’s role in the cover-up of the assassination of the man who gave a speech warning the press about “a monolithic and ruthless conspiracy that relies on covert means for expanding its sphere of influence”  —  it becames necessary to throw some cold water on your face in the hopes that you will snap out of your stupor

[&&]{**}[##]

‘Scientology knock-off’: Whistleblower exposes ‘cult’ that thinks ‘children are sexy’ (EXCLUSIVE)

Published time: 25 Jan, 2017 09:26

Edited time: 25 Jan, 2017 13:45

“… Speaking exclusively to RT, one ex-Accessory, known here as Jane, says the group “programs its members to think like robots.” She says Access works to change its members’ “points of references” on ingrained ideas around sex, intimacy and family.

Members who ask too many questions can be rebuked, Jane says.

“You are trapped and you are afraid to say anything that is seen as judgement of Access.

“It is very clever how it is done. Because it’s not like any other ‘cult’ but it is mind control, very much mind control, and it’s very much, ‘Do as I tell you although I’m not telling you.’”

“People think that they are free, but mentally they are not free.”….”

More in this long, multi-video, multi-media article:

https://www.rt.com/uk/375002-access-consciousness-scientology-cult/ 

[&&]{**}[##]

George Orwell Explains How “Newspeak” Works, the Official Language of His Totalitarian Dystopia in 1984

in Literature| January 25th, 2017

 

https://www.youtube.com/watch?v=R7Pkcg3DdOY 

 

As we noted yesterday, and you likely noticed elsewhere, George Orwell’s classic dystopian novel 1984 shot to the top of the charts—or the Amazon bestseller list—in the wake of “alternative facts,” the latest Orwellian coinage for bald-faced lying. The ridiculous phrase immediately produced a barrage of parodies, hashtags, and memes; healthy ways of venting rage and disbelief. But maybe there is a danger there too, letting such words sink into the discourse, lest they become what Orwell called “Newspeak.”

It’s easy to hear “Newspeak,” the “official language of Oceania,” as “news speak.” This is perfectly reasonable, but it gives us the impression that it relates strictly to its appearance in mass media. Orwell obviously intended the ambiguity—it is the language of official propaganda after all—but the portmanteau actually comes from the words “new speak”—and it has been created to supersede “Oldspeak,” Orwell writes, “or Standard English, as we should call it.”

In other words, Newspeak isn’t just a set of buzzwords, but the deliberate replacement of one set of words in the language for another. The transition is still in progress in the fictional 1984, but is expected to be completed “by about the year 2050.” Students of history and linguistics will recognize that this is a ludicrously accelerated pace for the complete replacement of one vocabulary and syntax by another. (We might call Orwell’s English Socialists “accelerationsts.”) Newspeak appears not through history or social change but through the will of the Party.

The purpose of Newspeak was not only to provide a medium of expression for the world-view and mental habits proper to the devotees of Ingsoc, but to make all other modes of thought impossible.

It’s entirely plausible that “alternative facts,” or “altfacts,” would fit right into the “Ninth and Tenth Editions of the Newspeak Dictionary,” though it might easily fall out of favor and “be suppressed later.” No telling if it would make the cut for “the final, perfected version” of Newspeak, “as embodied in the Eleventh Edition of the Dictionary.”

These quotations come not from the main text of 1984 but from an appendix called “The Principles of Newspeak,” which you can hear read at the top of the post. Here, Orwell dispassionately discusses the “perfected” form of Newspeak, including its grammatical “peculiarities,” such as “an almost complete interchangeability between different parts of speech” (an issue current translators have encountered). He then introduces its vocabulary, divided into “three distinct classes,” A, B, and C.

The A class contains “everyday life” words that have been mutated with cumbersome prefixes and intensifiers: “uncold” for warm, “pluscold and doublepluscold” for “very cold” and “superlatively cold.” The B class contains the compound words: sinister doublethink coinages like “joycamp (forced-labor camp)” and “Minipax (Ministry of Peace, i.e. Ministry of War).” These, Orwell explains, are similar to “the characteristic features of political language… in totalitarian countries” of the early 20th century.

The citizen of Oceana, Orwell tells us, must have “an outlook similar to that of the ancient Hebrew who knew, without knowing much else, that all nations other than his own worshipped ‘false gods’…. His sexual life, for example, was entirely regulated by the two Newspeak words sexcrime (sexual immorality) and goodsex (chastity).” The latter included only “intercourse between man and wife, for the sole purpose of begetting children, and without physical pleasure on the part of he woman: all else was sexcrime.

The C class of words may be the most insidious of all. While it “consisted entirely of scientific and technical terms” that “resembled the scientific terms in use today,” the Party took care “to define them rigidly and strip them of undesirable meanings.” For example,

There was no vocabulary expressing the function of Science as a habit of mind, or a method of thought irrespective of its particular branches. There was, indeed, no word for ‘Science,’ any meaning that it could possibly bear being already sufficiently covered by the word Ingsoc.

Orwell then goes on to discuss the difficulty of translating the work of the past into Newspeak. He uses as an example the Declaration of Independence: “All mans are equal was a possible Newspeak sentence,” but only in that “it expressed a palpable untruth—i.e. that all men are of equal size, weight, or strength.” As for the rest of Thomas Jefferson’s rousing preamble, “it would have been quite impossible to render this into Newspeak,” writes Orwell. “The nearest one could come to doing so would be to swallow the whole passage up in the single word crimethink.”

Related Content:  

George Orwell’s 1984 Is Now the #1 Bestselling Book on Amazon

Hannah Arendt Explains How Propaganda Uses Lies to Erode All Truth & Morality: Insights from The Origins of Totalitarianism

Huxley to Orwell: My Hellish Vision of the Future is Better Than Yours (1949)

Josh Jones is a writer and musician based in Durham, NC. Follow him at @jdmagness

http://www.openculture.com/2017/01/george-orwell-explains-how-newspeak-works.html 

via

http://www.blacklistednews.com

[&&]{**}[##]

https://2.bp.blogspot.com/-dvXe_XA0I2Y/WIwe1qcaAXI/AAAAAAACdlI/MsnHIyq68e066sksX69Eb3WNYe_WmDaWwCLcB/s1600/fakepg-large.jpg

[&&]{**}[##]

https://www.youtube.com/watch?v=al3anBiHwmI 

https://en.wikipedia.org/wiki/The_Whistleblower

[&&]{**}[##]

REVERSE ENGINEERING: THE (INFORMATION) REBELLION’S ONLY ROAD TO VICTORY

Posted by   IRIS HQ   |   Categories :   Rebel News

IRIS · ir-is.org · January 28, 2017

Here’s how you can not win a war against a propaganda and war machine that can rely on endless supplies of funding and resources:

First. You can’t win from within. You can’t change the system on the inside. It was built to operate the way it does now. So any attempt to install a new president – for instance – who is allegedly on the side of the people makes great content for bedtime stories – but nothing more.

Second. You can’t be posting your great ideas in public forums and in online discussions on social media websites and networks. It doesn’t work like that. Any such communication will result in the co-opting of your idea and your following. You don’t give the specific details of any strategy or technique that you have. You keep it secret or at least communicate about it away from public eyes. Email at least puts a layer of secrecy, although not an ideal solution when you are planning to take down an entire government for instance. Although governments HAVE been toppled largely through Twitter messaging. Lessons have been learned from that since at least 2009 during OP Iran.

Here’s how you CAN win:

You build a new society. Parallel with today’s global civilization. You limit or ban altogether any links with it. For instance, you do not connect your banking system with SWIFT or VISA or MasterCard and so on. This is one of the reasons why Bitcoin and all other similar crypto currencies will never be truly decentralized and independent. Any real crypto currency that seeks unconditional autonomy for the people MUST stay away from the central banks and all the currencies that these banks print. The same goes for any other branch of your new and parallel society. You HAVE TO keep it sterile. Allowing even one gateway into your new system – your new society – will render it compromised eventually. All of this is, however, pretty much contemplating about an utopia since a completely detached new society would have to be started away from the internet, which  would seriously limit the number of people who would know about it or can contribute to it. Although there are options available that keep this utopia a potential and not an impossibility.

Setting the former aside for now, since we are going to be locked within the current system anyway for many years more, there is a way that we can tip the balance of justice in our favor.

There is a way we too  – as a rebellion – can actually perpetually exist and be victorious at least as many times and to at least the same extents as the powers that want to be, instead of constantly losing battles and losing ground as has been happening during the past decades. During which the international rebellion has effectively been reduced to, relatively, a handful of pockets of resistance that never work together as a destructive force of nature. The potential is there though. It has just never been utilized to its full capacities.

The key to both that new parallel system, as described above, and a successful rebellion is reverse engineering.

We have to reverse engineer our current society and we have to reverse engineer the powers that want to be and their power structure and information and hot war arsenals.

Their system is all around us. Their news and entertainment media. Their internet. Their banking. Their military. Their clans and their dynasties. Their schools. Their governments. Their taxes. Their industry. Their rules. Their history. Their future.

What about OUR news and entertainment media? OUR internet. OUR banking. OUR military. OUR clans and OUR dynasties. OUR schools. OUR governments. OUR taxes. OUR industry. OUR rules. OUR history. OUR future.

Reverse engineering on this scale is of course an enormous task that we would put on our shoulders but it is the only way forward for us if we are even remotely serious about what we are doing and saying as a rebellion.

Reverse engineering an entire society and propaganda and war machine is what we must do. It can be done.

They have spent hundreds of years crafting their oppressive system so it will at least take the same time and double the efforts from us to merely counter theirs. Let alone topple and remove it altogether.

That is why we haven’t got a minute to waste. What are YOU waiting for?

[&&]{**}[##]

 

Recently at Occurrences, I noted the continuous updating of George Webb’s previously-noted video series on the saga of Eric Braverman; here’s the link to his channel: https://www.youtube.com/channel/UCrQ-wHKVi0JDWjQGcuoYnew

Note how he has changed the title as progress in research was made. 

Note too that he now updates his list of sources and his slides are archived here on at least an occasional new video.

Here’s a time-saving tip: Click on the wheel just to the right of “CC” and change the playback speed to 1.25x or even 1.5x. The speech is still understandable. 

The video noted in my recent news digest has been updated several times; the description of how the CIA harnesses religious groups can be seen historically in George Michael Evica’s book “A Certain Arrogance”.  The description — starting at the 14-minute mark — of the means for a slow and silent assassination technique was chilling. [See this as an example. ] 

I’m spent a good part of the weekend catching up with the series.

I went back six days to the end of day 90 for this demonstration of how he used a software package for collaboration to document things. He provides a mechanism for others to add content: 

https://trello.com/b/RMx1r5dG 

On Day 91 (Part 1), after the 8-minute mark, there are some dots connected, but here’s the question: Is this entire series by Webb a masterpiece of citizen investigation journalism in which he has taken dot-connecting to the level of pointillism? 

Some quotes:

“This is happening on a massive [industrial] scale.” 

“All this stuff got started in NATO.”

“This is not a Hillary witch hunt.”

“It’s all one thing….”

“We’re going in a bad direction….”

Day 91, part 3 puts teddy bears in a new category.

“This is a blood network…”  “There’s always a big move that covers a small move.” 

Day 91, part 3 puts costume in a new category.

Day 92(1): Ehud Barak ties to Epstein’s island… 

Day 92(2): Was “invasion by disaster” what happened during Katrina? 

Here’s the discussion on Team Rubicon.

Was the flyover used of incapacitating agent first tested during the infamous le pain maudit” event that was linked to the death of Olson?

From 8:05 through 14:00, an explanation of Palantir, the tracking of “quantum dots” by satellite… 

Is the same “eye of God” mentioned at the end of 92(2) the same “eye of God” that is being fitted into F35 jet aircraft?

Day 92(3): Is the multi-phase process what is envisioned for the military troops being assembled on the borders of Russia?

Day 92(4): He explains that the numbering system he uses has been changed by someone else.

Day 93(2): Sanctuary cities?

Here I jumped ahead. but I will go back and fill in the gaps.

Day 97(2):  Homan Square? Mining. 

Day 97(3): Last summary to date. Chicago, Boston, Baltimore, Philadelphia named as future centers for organ harvesting. [The same cities that have seen urban riots in the past?]

 

 

Update: 

George Webb has a great series where he’s figured out what’s actually going on. This is part 8 of “cliff notes” on George Webb’s video series. This is my attempt to drink from the firehose of George Webb’s material by taking notes on it. https://www.reddit.com/r/conspiracy/comments/5qsubd/part_8_cliff_notes_on_george_webbs_series/

Here are previous versions:

techno-tyranny

Palantir Technologies Raises $450 Million in New Fundraising Effort

New valuation of $20 billion would make company fourth most highly valued startup

By ELIZABETH DWOSKIN

Updated July 23, 2015 6:45 p.m. ET

Palantir Technologies, a Silicon Valley startup that focuses on data mining, has raised $450 million in a new fundraising round, the company announced Thursday in a filing with the U.S. Securities and Exchange Commission.

More:   http://www.wsj.com/articles/palantir-technologies-raises-450-million-in-new-fundraising-effort-1437690978 

[&&]{**}[##]

Speaking of data-mining, did you know that General Wesley Clark, the fellow who recently called for the indefinite internment of vaguely-defined individuals during the ongoing endless war on terror, was — back in late 2001 — at about the same time he was campaigning for the Democratic presidential nomination “had been hired as a board member and lobbyist for Acxiom, an Arkansas company that manages data collected by large businesses on millions of Americans. Weeks after the Sept. 11 attacks, the company developed a computerized system that would perform instant identity checks on airline passengers. The company paid Clark — as well as other Washington lobbyists — to “use some of his connections to make sales calls to the government,” says Jennifer Barrett, Acxiom’s chief privacy officer.”

CounterPunch reported in October 2003:

“… According to the Wall Street Journal, Clark “joined the board of the Nasdaq-traded company in December 2001, as the company started to market its customer-database software to federal agencies eager to hunt for terrorists by scanning and coordinating the vast cyberspace trove of citizen information.” Fortune magazine reported that Clark “is spearheading the company’s pursuit of contracts with the federal government.….”

The CounterPunch article also noted the company’s involvement with the no-fly list and its relationship with Torch, Inc.., “a military contractor working on designing an updated version of the “Computer-Assisted Passenger Pre-Screening System” known as (CAPPS-II), one of the few programs that survived the Congressional shutdown of the “Total Information Awareness” program at the Pentagon. It is essentially a passenger profiling system. According to the Electronic Privacy Information Center, “The basic structure of passenger profiling is to use an algorithm to determine indicators of characteristics or behavior patterns that are related to the occurrence of certain behavior…..”

Check out the company’s current list of corporate”partners”.

Note the comment at the end of this NY Times article from three years ago about “the unseen cyber-Nazi”.

According to https://en.wikipedia.org/wiki/Acxiom:

“… In 2003, the Electronic Privacy Information Center filed a complaint before the Federal Trade Commission against Acxiom and JetBlue Airways, alleging the companies provided consumer information to Torch Concepts, a company hired by the United States Army “to determine how information from public and private records might be analyzed to help defend military bases from attack by terrorists and other adversaries.”

According to the complaint, Acxiom’s activities constituted unfair and deceptive trade practices, as “Acxiom has publicly represented its belief that individuals should have notice about how information about them is used and have choices about that dissemination, and has stated that it does not permit clients to make non-public information available to individuals,” yet Acxiom proceeded to sell information to Torch Concepts without obtaining consent, an ability to opt out, or furnishing notice to the affected consumers.

The FTC took no action against Acxiom, which had responded that it had followed its privacy principles and was not deceptive in its business practices. “Torch Concepts was acting under contract to the Department of Defense in their efforts to research ways to improve military base security,” a company spokesman said. “Our policy clearly states that we ‘provide information products which include financial information, Social Security number and other related information where permitted by law,’ and that this information is ‘provided to government agencies for the purposes of verifying information, employment screening and assisting law enforcement.’”

Acxiom has a history of making it difficult for consumers to remove themselves from Acxiom’s marketing lists.

In 2005 Acxiom was a nominee for the Big Brother Awards for Worst Corporate Invader for a tradition of data brokering.[

In 2013 Acxiom was among nine companies that the Federal Trade Commission is investigating to see how they collect and use consumer data….”

[&&]{**}[##]

July 22-23, 2015 — Sinaloa Cartel chief “El Chapo” guest at 2011 Mexican governors’ confab

http://www.waynemadsenreport.com/articles/20150721_3 

PDF: Madsen on Sinaloa chief %22El Chapo%22

[&&]{**}[##]

Liberty Movement Needs More Innovations To Counter Technological Tyranny

Wednesday, 22 July 2015 04:39 Brandon Smith

The great lesson from history that each consecutive generations seems to forget is that the tools of tyranny used outward will inevitably be turned inward. That is to say, the laws and weapons governments devise for supposed enemies abroad will ALWAYS and eventually be used against the people they are mandated to protect. There is no centralized system so trustworthy, no political establishment so free of corruption that the blind faith of the citizenry is warranted. If free people do not remain vigilant they will be made slaves by their own leadership. This is the rule, not the exception, and it applies to America as much as any other society.

The beauty of the con game that is the “war on terror” is that such a war is ultimately undefinable. An undefinable war has no set enemy; the establishment can change the definition of the “enemy” at will to any culture, country, or group it wishes. Thus, the war on terror can and will last forever. Or, at least, it will last as long as corrupt elitists remain in positions of power.

As I have outlined in past articles, most terror groups are creations of our nation’s own covert intelligence apparatus, or the covert agencies of allied governments.

ISIS is perhaps the most openly engineered terror organization of all time (surpassing Operation Gladio), with U.S. elites and purported anti-Muslim terror champions like Sen. John McCain and Gen. Paul Vallely making deals with “moderate” Free Syrian Army rebels who immediately turn out to be full fledged ISIS fighters (I’m sure they were not “surprised” by this outcome) and the Obama Administration blatantly funding and arming more “moderates” which again in turn seem to be crossing over into the hands of ISIS. Frankly, the whole idea that there is a moderate front in places like Syria where alphabet agencies reign supreme is utterly absurd.

The bottom line – our political leadership, Republican and Democrat alike, created ISIS out of thin air, and now the American people are being expected to relinquish more individual liberties in the name of stopping this fabricated threat. Apparently, the Orwellian police state structures built under the auspices of the Patriot Act, the AUMF, the NDAA, FISA, etc. have not been enough to stop events like the Chatanooga shooting from occurring. So, what is the answer? Well, certainly not a reexamination of our insane foreign policy or an investigation into government funded false flag terrorism; that would make too much sense.

Instead, the establishment claims we need MORE mass surveillance without warrants, tighter restrictions on individual freedoms, and even, according to retired General Wesley Clark, internment camps designed to separate and confine “disloyal” Americans from the rest of the population.

https://www.youtube.com/watch?feature=player_embedded&v=eaPwqokBn9M

Remember, all of this is being suggested in the name of stopping ISIS, but the language being used by political elites does not restrict such actions to ISIS related “extremists”. Once again, the war on terror is an ambiguous war, so ambiguous that internment camps supposedly meant for those the government labels POTENTIAL Islamic extremists could also be used for potential extremists of any group. Once the fuse is lit on the process of rendition, black bagging, internment, and assassination of citizens, any citizens, without trial, there will be no stopping the powder keg explosion to follow.

I believe that the power brokers that dictate legal and political developments within our country are preparing to turn the full force of the police state machine against the American people, all in the name of protecting us, of course. I do not need their brand of “protection”, and neither does anyone else.

It comes down to this – in the face of an increasingly advanced technological control grid, either liberty movement activists and freedom fighters must develop our own countermeasures, or, we will lose everything, and every generation after us will blame us for our inaction, if they remember us at all.

Keep in mind a countermeasure must be decentralized. Bitcoin, for instance, is NOT a practical countermeasure being that it relies on a centralized and monitored global internet in order to function. It also does not encourage any tangible production capabilities or skill sets. Therefore, it does not provide for the function of a true alternative economy. It is a false solution and a useless countermeasure to a fiat currency based economy.

A real countermeasure to a controlled economy, for instance, would be a localized barter economy in which people must develop ways to produce, rather than play make believe with digital cryptocurrencies.

Countermeasures do not always have to be high tech. In fact, I am a staunch believer in the advantages of low tech solutions to high tech tyranny. As many are already aware, with the aid of Oath Keepers I recently developed a long term wearable cloak system which defeats FLIR thermal imaging, including military grade thermal imaging. Something which has never been offered on the civilian market before.

But this is only one countermeasure to one major threat. I will continue to work on defenses in other areas in which I feel I am best qualified, however, the movement needs more R&D, and we need it NOW before it is too late. I would like to suggest some possible dangers, and how people with far more knowledge than myself could create tools for defeating tyranny. I would also like to examine some simple organizational countermeasures which EVERYONE should be undertaking right now.

Community Defense

This is an amazing countermeasure for the liberty movement because it removes the monopoly of state control over individual security. Nothing pisses off the establishment more than people taking individual and community defense into their own hands. Fear is the greatest weapon of a corrupt government, and if they can’t keep you afraid because you are your own security, then they have lost considerable leverage over you.

This dynamic is represented perfectly in the Oath Keepers Community Preparedness Team model, which has been utilized successfully in places like Ferguson, MO. Today, in the wake of the Chatanooga shootings, Oath Keeper teams are volunteering across the nation to stand guard (discreetly) at military recruiting offices. The recruiters themselves, who are forced to remain disarmed by the DoD, appear to be thankful for the Oath Keeper presence. This kind of effort shows those in the military that the liberty movement is not the great homegrown monster that the government and the SPLC have made us out to be. It also throws a monkey wrench into the use of false flag terrorism or terrorism funded by covert agencies (as ISIS is) as a means to herd the masses into totalitarianism in the name of safety.

You might not be an engineer, or a tactician, but anyone can and should be organizing security teams for the places they live. Nothing could be more important.

Community Food Reserve

Am I talking about feeding your entire neighborhood or your entire town during a crisis? No, not necessarily. But, if you found an innovative way to make that possible, the rest of the movement would surely be grateful. Preppers do what they can for themselves and their families, but the bottom line is, if you are isolated and unorganized, all your prepping will be for naught. You are nothing more than an easy target and no amount of “OPSEC” is going to hide the fact that you will look well fed and healthy while everyone else doesn’t. The solution to this is to organize community defense, as stated above, but to also organize a community food reserve.

I highly suggest approaching already existing groups, like your local churches if they are willing to listen, and discussing the idea of food stores, water filtration, and shelter scenarios. If you can convince at least one community group to make preparations, you have just potentially saved numerous lives and stopped the exploitation of food scarcity as a means to dominate your local population during disaster.

WiFi Radar

Active WiFi based radar systems have been developed over the past several years which can see through walls (to a point) and potentially detect persons hiding in an urban environment. The number of radio frequency based radar projects coming out of the dark recesses of DARPA have been numerous, and each project appears to revolve around the goal of complete surveillance ability, or total information awareness. Such measures are not as effective against a technologically advanced opponent, but they could be very effective in dominating a lower tech civilian population.

WiFi radar in particular is a rather disturbing concept, and not a field that I am personally well versed. I have seen some examples of radio-wave based personnel tracking and have not been all that impressed with the visual results, but this is only what has been made available to the public. Sometimes, the DoD will present a technology that does not work as well as they claim in order to strike fear in the minds of their enemies. That said, sometimes they also use tech tools that work far better than they let on.

Luckily, radar countermeasure information is widely available to the public, and WiFi blocking and absorbing materials exist also. Liberty champions would do well, though, to look into active countermeasures along with passive, and devise methods for jamming WiFi radar altogether.

RFID Matrix

RFID chips are a passive technology but rather dangerous under certain conditions. With a grid of RFID readers in place in an environment such as a city, or a highway, a person could be tracked in real time every second of every day. He might not even know he is carrying a chip or multiple chips, the trackers being so small they could be sewn behind the button of a shirt.

This is one threat which would probably have to be solved with higher technology. I have seen RFID jamming and “spoofing” done by civilian computer engineers, mostly from foreign countries. But, this should not just be a hobby for computer experts in technical institutes. The Liberty Movement needs portable RFID jamming and spoofing capability to ensure that these chips, which are set to be ingrained in almost every existing product in the near future from clothing to cars to credit cards, can be rendered useless.

Drones Vs. Drones

The predator drone is not the biggest threat on the block anymore in terms of surveillance ability. DARPA has been working on other drone designs similar to the A160 Hummingbird and the MQ-8 Fire Scout; lightweight helicopter-style UAVs that can stay in the air for up to 24 hours and provide overwatch in a 30 mile area. And lets not forget about JLENS surveillance blimps (also ironically referred to as “ISIS” Integrated Sensor Is The Structure project) which can and are outfitted with high grade cameras and radar that can be used to track people from 10,000 feet up in the sky.

This is the future of combat operations and the lockdown of populations. Standard military units will be reduced as much as possible while UAVs will be deployed en masse. Air power has always been the biggest weakness of civilians seeking to counter corrupt governments, but this is actually changing.

While they may be lower tech in certain respects, civilian based drones are actually keeping pace with military projects, if only because military projects are restricted by bureaucracy and red tape while civilians are encouraged and emboldened by profit motive. Range and elevation limitations in the civilian market are purely legal right now, and such limitations will be of no concern once the SHTF. For the first time in history, common people now have the ability to field an aerial defense.

The DoD is well aware of this, and is already working on measures to counter enemy drones through their Black Dart and Switchblade program. The Liberty Movement needs its own Black Dart program.

Long Distance Radio And Codes

Regardless of the region they live, liberty activists should be developing their own radio code methods for secure communications. There are a few existing frequency hopping and coded radio systems out there on the civilian market, but these are short range units usually with around 1 watt of power. This makes them ideal for quick operational comms and difficult to listen in on simply because their range is so limited. That said, longer range radio communication will likely be essential for the spread of information from one region to the next, and no one should assume that regular phone and internet will be available in the future. News must travel somehow.

This means HAM radio, using mobile repeaters to avoid triangulation, and old school coded messages. The R&D portion of this issue I believe needs to be in the use of an Automatic Packet Reporting System (APRS) for the liberty movement regionally and nationwide. This is a kind of “texting” through HAM radio, and combining this with traditional low tech cipher coding may be our best bet for long range secure comms. It could also help defeat drones that intercept standard messages and use voice recognition software to identify targets.

Decentralized Internet

Information sharing makes or breaks a society. Without the web, the liberty movement would not have found the success it has today, and the alternative media would not exist, let alone be outmatching the readership ratings of mainstream media sources that have otherwise dominated news flow for decades. Unfortunately, the web is NOT a “creative commons” as many people believe. It is, as Edward Snowden’s revelations on the NSA proved, a highly controlled and monitored network in which there is essentially no privacy, even with the existence of cryptography.

The great threat to the establishment is the possibility that people will begin building an internet separate from the internet; a decentralized network. Recently, an inventor named Benjamin Caudill was slated to release a device called “Proxyham”, designed to reroute wifi signals and remove the possibility of government monitoring of digital communications. Strangely, just before the release of Proxyham, Caudill pulled all devices with the intent to destroy them, and will not be releasing the source code and blueprints to the public as planned.

Clearly, something or someone scared the hell out of Caudill, and he is rushing to appease them. We don’t know who for certain, but my vote is the NSA. And if this is the case, it means his project and others like it are a threat to the surveillance state, and must be released to the public ASAP. If Caudill doesn’t have the guts to do it, then the liberty movement must.

An alternative internet would be a holy grail in the fight against tyranny, if only to show the world that people can indeed decouple from the system and create advanced networks themselves, and do it better than the establishment.

These are just a few of the areas that require immediate attention from those with ingenuity in the liberty movement. The time for talk is over. The time for tangible action has begun. Beyond the need for immediate local organization by those preparing for social and economic breakdown, there is a desperate need for out-of-the-box thinkers to develop countermeasures to technological fascism. It’s time for the movement to go beyond mere intellectual analysis and provide concrete solutions. There is nothing left but this.

http://www.alt-market.com/articles/2648-liberty-movement-needs-more-innovations-to-counter-technological-tyranny 

[&&]{**}[##]

https://firstlook.org/theintercept/ had a field day yesterday with articles about

Homeland Security, Jeh Johnson and surveillance

the DOJ’s isolation of its own watchdog on the topics of wiretaps and national security letters;

“… The department’s Office of Legal Counsel issued a 68-page opinion Thursday saying that Inspector General Michael E. Horowitz’s office should not be granted access to several different kinds of typically confidential material unless there is a clear law-enforcement or counterintelligence purpose — and that the department’s lawyers, not the inspector general’s, would make that determination…..”

the private prison companies that are raising money for Hilary;

the GOP Presidential candidates booked to appear at an event hosted by Frank Gaffney’s think tank;

NBC’s “long-awaited trailer for its summer horror film about ISIS”, written by GreenwaldThe video is apparently no longer available, but see http://www.nbcnews.com/storyline/isis-terror/isis-poses-bigger-threat-u-s-al-qaeda-fbi-chief-n396981 

But the lead article as of midnight Thursday was about “el-chapo”:

“… According to leading Mexican investigative newsmagazine Proceso, the agents who arrested Guzmán weren’t Mexican at all — they were Americans, members of the Drug Enforcement Administration and the U.S. Marshals Service, dressed as Mexican marines, working alongside one or more unidentified U.S. intelligence agencies.

Government officials from Mexico and the U.S. have yet to dispute the accuracy of the story, published in the magazine’s July 18 issue, eight days after the world’s most powerful drug trafficker escaped from Mexico’s top maximum security prison, though former officials from both sides of the border expressed their doubts to The Intercept. The magazine’s special features are behind a paywall online.

The Proceso article, by J. Jesús Esquivel, a veteran reporter who has written two books on the history of the DEA and CIA in Mexico, follows anonymous claims from U.S. officials to U.S. media outlets asserting that Guzman’s escape was foretold in warnings provided to authorities in Mexico. Mexican officials have denied these claims.

Filed from Washington D.C., Proceso’s account of Guzmán’s capture is sourced to two U.S. officials whose positions in government are not revealed. Together they claim that his arrest — and much of the intelligence that led to it — was kept secret from Mexican officials until after he was apprehended.

The Mexican constitution places strict limits on the operations of foreign law enforcement, military personnel and intelligence agencies on Mexican soil. In recent years, however, joint U.S. and Mexican counternarcotics operations have pushed those constraints to the brink, with Americans more deeply embedded in the so-called drug war in Mexico than ever before. If true, the Proceso account would represent one of those operations taken to the extreme — with Americans keeping their Mexican counterparts in the dark in order to drive an armed operation to capture Mexico’s most wanted man, in potential violation of Mexican law.

According to Proceso’s sources, U.S. marshals and DEA agents had “perfectly” zeroed in on Guzmán’s “movements” through “interception systems” including satellite tracking in the three weeks prior to his arrest; they were waiting for the right moment to strike…..”

Much more, of course, at the link.

[&&]{**}[##]

In this week’s [32-minute] Radio WhoWhatWhy Podcast, Guillermo Jimenez talks to Ioan Grillo, a journalist based in Mexico City with over 15 years experience covering crime in the country, and the author of the book El Narco: Inside Mexico’s Criminal Insurgency. In this casual conversation, they explore a range of possibilities related to this colossal “blunder.”

(For background on El Chapo and on the US government’s unusual stance toward him, see this WhoWhatWhy article and this and this.)

http://whowhatwhy.org/2015/07/23/radiowhowhatwhy-if-you-think-you-know-whats-going-on-in-mexico-youre-misinformed/ 

[&&]{**}[##]

http://www.washingtonsblog.com/2015/07/congress-will-vote-today-to-destroy-states-rights-regarding-healthy-foods.html 

&&

“The U.S. House of Representatives on Thursday passed a hotly debated measure that blocks any mandatory labeling of foods made with genetically engineered crops, including pre-empting a state law set to take effect next year in Vermont.

Dubbed the Safe and Accurate Food Labeling Act by supporters, but the “Deny Americans the Right to Know” or DARK Act, by opponents, the measure was approved 275-150 with 45 Democrats voting for the bill.

House passage marks a victory for food and agricultural companies that have lobbied for the bill, and a blow to opponents, which include consumer, health and environmental groups and organic food industry players.

House members had a heated debate ahead of the vote with supporters claiming GMOs are proven safe. They said mandatory labeling would burden the food industry with unwieldy and costly requirements…..”

More at the link:

http://www.reuters.com/article/2015/07/23/us-usa-gmo-labeling-idUSKCN0PX17920150723 

[&&]{**}[##]

http://www.washingtonsblog.com/2015/07/5-minute-music-videos-one-love-ripples-dances-around-the-world-as-the-demanded-economic-political-context.html 

[&&]{**}[##]

 

Many similar reports logged here:

 http://oathkeepers.org/ 

[&&]{**}[##]

SOURCE: THE GATE PUNDIT

As private citizens stand guard at military recruiting centers across the nation, the Army has released a warning to its personnel and recruits, stating that armed citizens should be treated as a “security threat”.

Travis Tritten of Stars & Stripes reports:

The Army has warned its recruiters to treat the gun-toting civilians gathering at centers across the country in the wake of the Chattanooga, Tenn., shooting as a security threat.

Soldiers should avoid anyone standing outside the recruiting centers attempting to offer protection and report them to local law enforcement and the command if they feel threatened, according to a U.S. Army Recruiting Command policy letter issued Monday.

“I’m sure the citizens mean well, but we cannot assume this in every case and we do not want to advocate this behavior,” according to the Army Command Operations Center-Security Division letter, which was authenticated by the service.

Recruiters were ordered not to interact or acknowledge the armed civilians, who have been greeted by a mix of concern, indifference and gratitude by the public.

“If questioned by these alleged concerned citizens, be polite, professional and terminate the conversation immediately and report the incident to local law enforcement …,” the command advised.

As the incidents crop up around the country, police could be asked to confront the civilians with guns on the Army’s behalf.

“Ensure your recruiters clearly articulate to local police the civilian may be armed and in possession of a conceal/carry permit,” it told the centers.

The command said recruiters should also immediately fill out an Army security report.

http://www.blacklistednews.com/Army_Says_Armed_Citizens_Are_Security_Threat_At_Recruiting_Stations/45163/0/38/38/Y/M.html 

[&&]{**}[##]

SOURCE: POLICE STATE USA

Sen. Mike Lee gives a look at the corrupt workings of the legislature.

WASHINGTON, D.C. — U.S. Senator Mike Lee (R-UT) gave America a disturbing look at what happens behind-the-scenes in the legislature.  While a printer worked furiously behind him, Lee explained how the Senate was just given under 1 hour to read and comprehend a massive spending bill before the scheduled vote.

Here is Senator Lee’s message from July 21st, 2015:

LEE:  We received this bill at 3:07 p.m.  The bill is 1,033 pages long. We’re being called on to vote on it at 4 o’clock.  We’re only up to about page 500 in printing it off.  I’m pretty sure that its going to be hard to read the whole bill in its entirety and understand it in the roughly 30 minutes between now and when we have to vote on the bill.

If I don’t have time to read legislation before voting on it, my default vote is no. We received the highway bill today at 3:06 p.m., and it is over 1,000 pages long. Our first vote on this legislation is scheduled for 4:00 p.m.

Posted by United States Senator Mike Lee on Tuesday, July 21, 2015

 

“If I don’t have time to read legislation before voting on it, my default vote is no,” Senator Lee commented on his video. That’s a principle endorsed by Police State USA in a 2013 article, A Pro-Liberty Approach to Lawmaking.

Responsibility for the rush-to-vote ultimately lies with the Senate Majority leader, Mitch McConnell (R-KY).  McConnell reportedly had just reached a deal with Senator Barbara Boxer (D-CA) on six years of federal spending and wanted to ram it through with little debate and no amendments.  The schedule made it sot that effectively no one aside from the authors would know for sure what was buried in the massive bill.

It goes without saying that if the Senators themselves don’t have a chance to read a bill, then neither does the voting public have a chance to analyze it and give feedback to their representatives.  The very idea of voting on bills without debate is undemocratic and incompatible with a free society.

Unfortunately, this is not the first time we have seen egregious abuse of power from majority leaders.  Last session, House leader John Boehner successfully pushed through a federal gun-ban with only 10 (out of 435) members present!

Fortunately, McConnell’s treacherous maneuver was unsuccessful, this time.  Riled opponents rejected a motion to begin debate, 41-56.

Despite the setback, McConnell intends to pressure a vote as soon as possible, even if it means keeping the Senate in session over the weekend.  Even with a few extra days, who can realistically read, digest, and understand 1,033 pages of legalese in under a week?

When Americans correctly understand the level of corruption in the legislature, there can be no wondering about the source of the bad laws and injustices we lament so frequently on this website.  The only remedy is more exposure and political pressure, but the vast majority of voters are too wrapped up with sports and Reality TV to be bothered with political activism.

http://www.blacklistednews.com/Senators_given_under_60_minutes_to_read_1000-page_bill_before_vote/45154/0/38/38/Y/M.html 

[&&]{**}[##]

SOURCE: MASS PRIVATE I

Every student is given a “THREAT ASSESSMENT” by police and school administrators!

Schools and police are using V-STAG to assess a students threat level:

“The Virginia Student Threat Assessment Guidelines (V-STAG) is a school-based manualized process designed to help school administrators, mental health staff, and law enforcement officers assess and respond to threat incidents involving students in kindergarten through 12th grade and prevent student violence.”

The war on terror is out of control! Watch out that kindergarten kid could be a threat!

Did you know, police are giving American addresses color coded threat ratings?  And our govt. has also assigned you a threat assessment while travelling inside the U.S.

V-STAG was developed by the Federal Bureau of Investigation, the U.S. Secret Service, and the U.S. Department of Education.

Although both the FBI and Secret Service reports made a compelling case for student threat assessment, schools had no experience with this approach and there were many questions concerning the practical procedures that should be followed. In response, researchers at the University of Virginia developed a set of guidelines for school administrators to use in responding to a reported student threat of violence.”

The Secret Service has the audacity to call threat assessing of kindergarten students a safety concern. “The Final Report And Findings Of The Safe School Initiative.”

The Safe School Initiative” was implemented through the Secret Service’s National Threat Assessment Center and the Department of Education’s Safe and Drug-Free Schools Program.

Every student is being PROFILED and given a risk assessment rating, according to the Secret Services article titled “Evaluating Risk For Targeted Violence In Schools: Comparing Risk Assessment, Threat Assessment and Other Approaches.”

“We then review the three assessment approaches that have been advocated and used in some jurisdictions (profiling, guided professional judgment, automated decision-making) and demonstrate why they are inappropriate and potentially harmful in preventing planned school-based attacks.”

“In this article, we attempt to lay a foundation for developing an effective assessment approach to evaluate the risk of targeted violence in schools by addressing four issues. First, we delineate the contours of the problem of targeted violence by distinguishing the fear of this violence from its actual probability and by distinguishing targeted violence from other forms of aggression in youth. Second, we examine and critique three assessment approaches—profiling, guided professional judgment, and automated decision making…”

V-STAG is also designed to provide students involved in threat incidents with appropriate mental health counseling services, with parental involvement, and reduce the numbers of long-term school suspensions or expulsions and alternative school setting placements.

What’s really being said is police and school administrators can put your kid(s) into mental health counseling which will follow them throughout their adult lives! Oddly there isn’t any mention of the school-to-prison pipeline!

The V-STAG, threat assessment team will be used even if a student is alleged to have committed a crime and can’t be identified:

“Through V-STAG, the threat assessment team aims to prevent student violence by (1) taking immediate protective action in the most serious substantive cases (i.e., instances when there is a genuine intent to cause bodily harm or when the intent of the student making the threat cannot be clearly identified and resolved)”

Any threat that cannot be clearly identified and resolved as transient is treated as a substantive threat. Substantive threats always require protective action to prevent the threat from being carried out. The remaining four steps guide the team through more extensive assessment and response based on the seriousness of the threat. In the most serious cases, the team conducts a safety evaluation that includes both a law enforcement investigation and a mental health assessment of the student.

Many schools also use the “Student Threat Assessment Program” to look for disruptive students.

Did you know there’s an Association of Threat Assessment Professionals (ATAP) who ironically, will be holding their conference at the Disneyland Hotel in California. How many troubling, disruptive, threatening kids will be in Disneyland?

In the conference brochure the LAPD’s Threat Management (Assessment) Unit is listed prominently because they founded the ATAP!  If you guessed the ATAP has close ties to DHS give yourself a gold star, click here & here to read more.

“The ATAP is a diverse association comprised of professionals such as law enforcement officers, prosecutors, mental health professionals, and corporate security experts.”

Is that supposed to be a joke? The people making threat assessments all stand to gain financially:

“… the increase of workplace violence incidents and terrorism has created a need to combine forces with the private sector.”

There’s also a “National Behavioral Intervention Team Association” (NaBITA) dedicated to giving  students threat assessments. It has more than 800 active members from colleges, universities, schools and workplaces.  If you guessed the NaBITA has close ties to DHS give yourself another gold star, click here & here to read more.

Threat assessments are also being given to college students, they’re just using a different name calling them ‘Campus Safety Teams.’

“While the prevention of campus violence may have been the catalyst for improving coordination and communication across campus departments with the creation of Campus Teams.” 

The creation of Campus Teams that identify and monitor students whose behaviors may be troubling is an opportunity to engage them sooner rather than later, so that they can receive needed referrals or other appropriate assistance and treatment.”

To find out more about ‘Campus Teams’ read “Balancing Safety On Campus: A Guide For Campus Safety Teams.” Some colleges like Youngstown State University have created a “Student Threat Assessment Team (STAT). ”

The NaBITA has created a “Threat Assessment Tool” with NINE levels of Aggression.

The ‘MILD’ levels allege students might be emotionally troubled if the school considers his or her debating harmful!

Doesn’t that make you feel all warm and fuzzy knowing a team of school administrators and police are profiling every student!

In general, the mission and purpose of ‘Campus Teams’ encompasses:

Gathering information about students of concern. This may specifically focus on threats with the

potential to become violent (as is the case with threat assessment teams) or a broader range of behaviors. As noted below, this may also expand to include behaviors by others on or off campus, besides students.

Assessing the information about each case in a systematic way to determine the most effective

response for that particular person and situation.

• Defining the plan/response to address the needs of both the student and the safety of the community. The plan should consider specifics about who, when, where, and how the response will occur.

• Implementing the response in a way that de-escalates a potential crisis, reduces or removes threats, and attends to the needs of the individual who is demonstrating disturbed and/or disturbing behavior. Note that for many campus teams, the actual implementation of a response may be carried out by other individuals or departments; the team itself often acts in an advisory and coordinating role.

Monitoring the disposition of the case to gauge whether any additional follow-up is needed, whether the response was effective, and what lessons may be learned for future cases, especially in terms of implications for school policies and procedures.

The dual purpose of housing these functions under one team’s purview is:

• to prevent any particular instance of disturbed or disturbing behavior from falling through the

organizational cracks; and

to connect disparate (and therefore seemingly innocuous or less troubling) pieces of information that may indicate a more serious or acute problem, in the hope of preventing a dangerous or critical outcome or event.

Colleges nationwide are using ‘Campus Teams’ to give their students sexual threat assessments, there is a “Legal Compliance and Sexual Violence Prevention Training” being held in Boston this July 27, 28th.

“This training will address the critical intersection between compliance with federal laws to address sexual and intimate partner violence, and the role that threat assessment can play in effectively addressing these issues.”

Colleges are also using,The Structured Interview For Violence Risk Assessment (SIVRA-35)” by Brian Van Brunt, Ed.D.,

Our government has been using rare on campus shootings as a justification for schools and colleges to give students risk assessments.

“After the tragedies at Virginia Tech and Northern Illinois University, there was a natural inclination to form Campus Teams with a specific focus on threat assessment and management.”

“Campus Teams can facilitate the flow, processing, and synthesis of safety related information, which in turn helps decision-makers identify foreseeable risks and construct and implement reasonable responses.”

Our government want us to believe that EVERY student is a potential threat and we need threat assessments to stop them.

The fact is student homicides are RARE:

With nearly 106,000 public and private schools in the U.S., there were shootings at only 0.009% of schools since December 2012. According to the National Center for Education Statistics’ 2013 “Indicators of School Crime and Safety” report, from the 1992-93 school year until the 2010-11 school year, there were between 11 and 34 homicides of youths ages 5-18 at schools each year (including attacks with weapons other than firearms), with an average of about 23 homicides per year.

Compare that to NCES’s enrollment statistics, about 0.000044% of public and private K-12 students were killed at school per year between 1992-93 and 2010-11. That’s about one out of every 2,273,000 students per year. By contrast, the odds of being hit by lightning in a given year is one out of 700,000 according to National Geographic. For more information read the “Youth Violence Fact Sheet

To find out more about how the Secret Service and the FBI are using threat assessments, read the following articles:

Threat Assessment: An Approach to Prevent Targeted Violence“.

Threat Assessment: Defining an Approach for Evaluating Risk of Targeted Violence

http://www.blacklistednews.com/American_students_are_now_being_given_threat_assessments/45152/0/38/38/Y/M.html 

[&&]{**}[##]

SOURCE: COLLECTIVE EVOLUTION

“I am in the camp that is concerned about super intelligence. First, the machines will do a lot of jobs for us and not be super intelligent. That should be positive if we manage it well. A few decades after that, though, the intelligence is strong enough to be a concern.” ~ Bill Gates

AI isn’t science fiction any longer. Mainstream news doesn’t often report that artificial intelligence may be running the world. Was the Oracle in the movie the Matrix, for example, really just a renegade AI program? Even Bill Gates, the man who owns Monsanto stock and tries to push vaccines on innocent tribal children in India, has warned about artificial intelligence and the threat of smart machines.

Sometimes little snippets of what is actually possible leak through – like the recent news item touting the self-awareness of a tiny, “cute” robot.

The ability for something to be able to recognize that it is an individual, separate and with its own consciousness, is one of the classic signs of self-awareness.

Researchers at the Rensselaer Polytechnic Institute AI and Reasoning Lab in New York have adapted the classic inductive reasoning puzzle known as The King’s Wise Men and posed the problem to a trio of robots. One of them passed their little test.

The chairman of the department of cognitive science at the Institute, Selmer Bringsjord, programmed French robotics, namely Aldebaran’s humanoid design called a Nao robot. It is only 58 centimeters tall. The Nao robots were programmed with a proprietary algorithm called Deontic Cognitive Event Calculus, which enables the machines to carry out reasoning.

The robots were told that two of them were given “dumbing” pills which made them unable to speak, and one a placebo – even though all that was really done is a button was pushed on top of their heads.

When asked if they were given dumbing pills or the placebo, there is an awkward silence and then one robot stands up and says “I don’t know.”

What happens next is amazing. The robot then raises its hand like a child in a class room, and offers a correction: “Sorry, I know now. I was able to prove that I was not given the dumbing pill.”

Watch for yourself below.

https://www.youtube.com/watch?v=MceJYhVD_xY

http://www.blacklistednews.com/Artificial_Intelligence_Advances%3A_Robot_Shows_Signs_of_Self-Awareness/45161/0/38/38/Y/M.html 

[&&]

http://www.cnet.com/news/cute-robot-politely-shows-self-awareness/ 

[&&]{**}[##]

If a spy satellite is attacked, who will command America’s response — the head of Strategic Command or the Director of National Intelligence? If an Air Force satellite is attacked first, who would command America’s response? These questions are being hotly — but very quietly –debated at the highest reaches of the U.S. government.

Since an attack on our most sophisticated spy satellites would almost certainly be among the first sign of war it is crucial that any response be coordinated between the military and the Intelligence Community. But I hear that few military senior commanders have been willing to accept that the DNI or another senior intelligence official — perhaps the NRO director? —  might command both spy and military satellites. However, in the first minutes or hours of an attack, the IC would probably know more about what’s happening and someone would need to decide whether to move satellites or take other actions. Also, the ambiguous and often uncertain ability to discern what is actually happening to a satellite — is it being attacked by man or nature — make these decision even more fraught and their repercussions difficult to predict.

It’s not that the senior military leaders do not want the IC to command. The problem is more fundamental. Since senior American policymakers have long assumed that space would not be the center of a shooting war, we have never categorically detailed who would do what in the event of an attack in space. That is changing.

The debate appears to have begun as the Intelligence Community and the Pentagon began discussing construction of the first “joint interagency and combined space operations in which both the IC and DoD sit,” as Deputy Defense Bob Work put it on June 23 when we first learned about the center.

The highly classified command center — about which we know very few details — should be operational by the end of the year, he said.

All this has been prompted by recent Chinese and Russian efforts to build effective anti-satellite capabilities.

The Chinese have made at least two major anti-satellite tests in the last decade and the Russians are engaged in similar efforts. Air Force Lt. Gen. Jay Raymond told an overflow audience at the annual Warfighters Lunch at the annual Space Symposium that American and allied satellites were no longer safe. “Soon every satellite in every orbit will be able to be held at risk,” the head of the 14th Air Force said.

One of the other Chinese actions that prompted high-level concerns in the US was the May 2013 Chinese “science experiment,” which many senior officials and independent analysts believe was an ASAT test near geosynchronous orbit, where some spy satellites live.

“This was the first time the Intelligence Community really got a scare, because up to that time, they considered that their satellites were relatively safe because they orbit in very high altitudes. The Chinese test shattered those illusions,” Theresa Hitchens,  a scholar at the University of Maryland’s Center for International and Security Studies and former director of the United Nations Institute for Disarmament Research in Geneva, says.

China has claimed its test in July last year was for missile defense and noted that nothing was destroyed in the test and the Chinese have never admitted publicly that the 2013 test was connected with the military.

Faced with the Chinese and Russian work, the United States military has begun to make a fundamental strategic shift. Work outlined the changes at this year’s Space Symposium in Colorado Springs. Breaking D readers will remember — because we broke the story — that Work said in a classified speech that the US military “must be able to respond in an integrated, coordinated fashion” to attacks on US space assets and he used the charged term “space control” in making his argument. This is because space is no longer a sanctum free from war. In fact, space is considered by many experts to be where the next major war would begin.

“While we rely heavily on space capabilities, in both peace and war, we must continue to emphasize space control as challenges arise,” he said. “To maintain our military dominance we must consider all space assets, both classified and unclassified, as part of a single constellation (emphasis added). And if an adversary tries to deny us the capability, we must be able to respond in an integrated, coordinated fashion.”

But that is not how we fight now. As things stand today, the head of Strategic Command (STRATCOM) would command military space forces through Air Force Space Command’s Joint Space Operations Center (JSPOC). That is also where a small number of allied space officers work, coordinating with their national governments and with NATO.

On the military side of the fence, STRATCOM created a “Joint Space Doctrine and Tactics Forum,” which first met in February,, to create new doctrine and figure out some of these thorny issues.

I’ve tried speaking with a number of intelligence community sources since I first heard about this debate more than five months ago, but none of them were willing to address the issue.

Then the presumptive new chairman of the Joint Chiefs, Gen. Joseph Dunford, was asked this question by the Senate Armed Services Committee in the written questions submitted before his nomination hearing:

What is your understanding and assessment of the authorities and agreements which are in place to allow U.S. military personnel to carry out missions under the authorities contained in title 50, United States Code? Do you believe any modifications to these authorities are necessary?

Dunford’s response to the committee appears to signal that he is willing to let the Intelligence Community command military forces if needs be. “While I believe that our military forces are generally most effective when they operate under a military chain of command, there are circumstances in which exceptions to this general rule are appropriate; authorities and agreements exist to facilitate the granting of such exceptions,” he told the SASC.

I’ve spoken to several space experts who knew of the IC-DoD debate about command authorities and they believe Dunford is addressing this issue in his reply. He cites Section 3038 of Title 50, the law governing the Intelligence Community. That is the section dealing with the three intelligence agencies who dominate space operations: the National Reconnassance Office (NRO), the National Security Agency (NSA) and the National Geospatial Intelligence Agency (NGA). The NRO is the key agency in the IC in terms of command authorities as it flies the nation’s spy satellites.

Space analyst Brian Weeden, an expert at the Secure World Foundation and former Air Force officer in the JSPOC, is skeptical of the administration’s claims about an increased threat in space.

“It is difficult to determine how much of this increase in rhetoric from the US military is driven by the budget debate, and their fear about being held to the sequestration budget caps. We have some evidence of China and Russia working on ASAT capabilities, but it’s very hard to tell how serious that threat is because the US government is not being forthcoming with details,” he said in an email.

He finds it “absurd” that the Indtelligence Community might know something is happening in space and not share it with STRATCOM. “But, unfortunately, this is not a new situation, and it’s not unique to space. For example, it’s been something they’ve been struggling with in targeted drone killings,” he says.

He also notes that the Air Force has long assumed space would be a center of conflict in a war, though it’s clear from policymakers’ recent statements that they believe a fundamental shift is occurring in terms of US vulnerability to attack.

“Policymakers have NOT always assumed space would be free from conflict. When I was on crew in Cheyenne Mountain we had a crew position called the Space Battle Manager and two others called the Space Defense Director and Space Defense Analyst. That’s half of the military positions on the crew dedicated to detecting and characterize threats to US national security space systems. We had TTPs (Tactics, Techniques and Procedures) in place to train for, and response to, attacks on US space systems,” Weeden says, adding that the, “specific type of threats have changed since then, but there was always an assumption space would be contested.”

One issue that comes to mind is what the potential legal implications are of the IC characterizing Weeden sees two primary policy issues at play in the current debate. Who decides what constitutes a threat in space and who decides what should be done about those threats: the IC or the military?

“Another is the inherent conflict between the who is ‘warning’ about an attack and who is the ‘shooter’ deciding on a response. If both of those missions are given to the same entity, you have incentives for escalation,” he writes. “This is the reason that NORAD is the military entity charged with detecting and warning about attacks on North America, while USSTRATCOM is charged with the execution of nuclear forces in response.”

Here’s Dunford’s response to the SASC in full:

“Title 50 of the U.S. Code tasks the Secretary of Defense to ensure that the military departments maintain sufficient capabilities to collect and produce intelligence to meet requirements of the DNI, Secretary of Defense, CJCS, and COCOMs. Title 50 of the U.S. Code also authorizes the Secretary to use such elements of the DOD as may be appropriate for the execution of the national intelligence program functions described in Section 3038 of Title 50. While I believe that our military forces are generally most effective when they operate under a military chain of command, there are circumstances in which exceptions to this general rule are appropriate; authorities and agreements exist to facilitate the granting of such exceptions. In some cases, the Secretary of Defense may approve this exception and in other cases only the President has approval authority. I believe the current authorities strike the appropriate balance between enabling DoD to operate within its independent Title 50 authorities, providing necessary and appropriate support to other agencies of the U.S. government under Title 50, and ensuring critical oversight of sensitive operations.”

(If, dear readers, you know more about this debate and are willing to discuss it sotto voce — on background or deep background– just click here or on our Tips button at the top of the page and I will get your email.)

Topics: 14th Air Force, AFSPC, air force, allies, Bob Work, Cheyenne, Cheyenne Mountain, China, Chinese ASAT test, Deputy Defense Secretary, DNI, Gen. Jay Raymond, intelligence community, Joint Space Doctrine and Tactics Forum, Joint Space Operations Center, JSPOC, National Space Symposium, NATO, NGA NSA NRO, NRO, Russia, Space Symposium 2015, space war, STRATCOM, Strategic Command

http://breakingdefense.com/2015/07/would-spies-command-in-a-space-war-dunford-says-maybe/ 

[&&]{**}[##]

The Dawn of Privacy-Driven Social Networks | 17 June 2015 | Privacy concerns in the wake of Edward Snowden disclosures have prompted new social networks to offer alternatives with a focus on user privacy. These companies are abstaining from selling user data and offering encrypted apps for their customers’ communications. Manhattan-based Minds, which has run an alternative social media website for two years, just launched a lightweight social-network app for mobile…that encrypts all communications – so they are secure and anonymous (able to be read only by the intended recipient).

sinister designs

I went back to that link I put up in the last Occurrences post, the one from James Fetzer about Jade Helm going live with an EMP tomorrow in Texas. Because I set it aside hastily for future review, I did not realize the enormous length of audio material we are asked to listen to.  

It seems that if Fetzer (who seems confortable with audio and video technologies) wants us to understand something quickly, it is incumbent upon him to summarize and edit.  Fetzer is a professor emeritus, as he reminds everyone regularly, with credentials  in critical thinking, and was once a US Marine Corps officer.

I want to like Jim Fetzer and generally I think he makes his points well with regard to JFK/Dealey Plaza, the Wellstone murder, and other more recent state crimes against democracy, but in the audio method he uses, we are to listen to two people agree with one another and repeat reams of information we  most likely already know about.  If he is trying to reach people who are ignorant or in denial, he needs to turn and face the congregation, not the choir. If you are going to attend his particular church, you’re neither ignorant nor in denial.

The first link inside his package was to a Project Camelot interview:

https://www.youtube.com/watch?t=23&v=lAFsXL1fe4A (34:25)

It contains the following key phrases and concepts: normalcy bias, retro-causality, “the Rabbit Hole”, the prior proven existence of drills going live, the existence of Presidential declarations regarding emergency powers, take five minutes of the day to look it up, and Operation Condor. You get to resonate within yourself privately as to whether this has credibility.  

(If you don’t know about Operation Condor, consult  http://www.latinamericanstudies.org/chile/operation-condor.htm

and

https://en.wikipedia.org/wiki/Operation_Condor. )

Reference is made to an earlier interview with Dale Lewis which is here: https://www.youtube.com/watch?v=xzq9rlsmlUQ

but I don’t think you need to watch that if you’ve watched the one which is chronologically later but posted here earlier.  It does contain enough summary and reference.

 

As an aside, let me say that I generally don’t go near Facebook and I’ve posted a lot of information about how Facebook itself is a platform for psy op games. I do not have a Facebook page and I don’t post on Facebook.  Other people have linked to my blog on Facebook and that’s okay; I have no control over what other people do.  I have enough work to make sure I am doing my own homework and remain as accurate and credible as possible. I stand behind my work, or stand to be corrected or informed better.

I did meditate briefly on the trapezoidal pathology of paranoia, surveiilance, and the nature of being control freaks. I thought maybe I should find again that book by Draffan and Jensen entited Welcome to the machine; if it is not on your bookshelf, it should be.  I also have read and strongly recommend the other books noted at the bottom of that link,  That comment will get me another tick on the checklist next to my name in the big database out in Utah.

 

 

https://www.youtube.com/watch?v=ewJL0Yeqq9g 

The two-hour interview linked right above is breathless and regurgitant in nature and gets to the Walmart question at the half-hour mark.  The Real Deal broadcast(s?) sometimes strike me as a mechanism that allows two people to rant and one to demonstrate how smart he is. But at about the 40-minute mark, Fetzer shows us how smart he is by making a powerfully-insightful point about military logistics and POL and he and his guest note that the drills include practice (using crisis actors) on repressing crowds demanding food and water. The slides, which are fuzzy and not always clearly sourced, beginning at the 43-minute mark, go back to the Walmart question. “Anyone who’s capable of reflection”, the cognitive dissonance of denial, “Winter Soldier”  and sinister designs become functionally-key phrases. 

“It’s all taking on a sinister design as we put more and more pieces together.” 

“When you look at the vast array of data points…”  

There is commentary about unreasonable search and seizure and a list of questions you can raise as they come knocking on your door, but when there are five or more people carrying advanced weapons and who are armored and wired at your doorstep who may or may not have used flash bangs or tear gas, I don’t think it’s a time to say “excuse me, but can I go and get the list of questions I set aside?”.  

How is it rational that we respond in a lawful and civil manner when the people at the door are acting in an unlawful and uncivil manner? 

http://allnewspipeline.com/images/seperate-military-and-police.jpg 

At the 1:06:00 mark, “Al” makes an important point about going outside one’s normal or chosen field of expertise to seek information and knowledge. 

This particular show’s focus switches frorm Jade Helm to the JFK assassination at about the 1:12:00 mark.  I didn’t watch the rest, or the other.  

 

The idea of being legally right and having the ability to sue after the fact in the middle of an illegal home invasion by armed military/police representatives of a power structure that has no real basis in legality and has been assumed by a series of coups d’etat, assassinations and subterfuge and maintained by intimidation, blackmail and corruption seems to be an exercise that is not worth my time (or yours). Talk about cognitive dissonance… 

If you can no longer participate within the system (and there are arguments for both sides), then what?

If you try to participate within the system but are ostracized because you have already done sufficient homework to know — for example — that steel frame buildings don’t melt, or if you are intimidated, put into a situation where you lose your income or have to engage an expensive lawyer to fight a trumped-up charge, then the system is not going to be responsive.  

[You can’t call people on their BS and their lies or else you get your ass handed to you.  I know this because I once documented to the Vice President for Procurement for Raytheon that the reason he didn’t get the newsletter was not because I failed to send it out properly but because his own mailroom threw it in the trash on arrival. [That’s where it belonged, given the degree to which the Board didn’t want to be terribly aggressive in addressing issues.] I was relieved of duty due to “administrative deficiencies” from the best-paying job of my life.]

What are your choices when the system locks you out of responsibility? (Jack Kennedy has a famous quote about this, but look where his passion and virtue got him.) Confrontational violence, or quiet preparation for same? But then you are already known, in jeopardy, or subject to harassment and seizure, imprisonment or death.

If death is the seemingly inevitable ending, then you need to read    

this

His other books on “unspeakable” things are among the best educational investments you can make. And they all point to the same “perps”, the very same ones at work behind Jade Helm. 

 

As I also noted in that last occurrencesforeigndomestic post, one possibility still left open is the path of dialogue and community. Then the question becomes this: How can a community and its members functionally communicate in a manner that is not subject to the surveillance, interference or harassment by an illegitimate system of authority?  

The Russians did it with samizdat in the repressive Communist era. The Iranians did it with cassette tapes during the reign of the Shah and SAVAK. People do it today via the Internet, although that is still subject to surveillance, interference and harassment. Some, even the authorities, have investigated paranormal means of communication; the transmission by thought alone is practiced, and it is also the subject of research to see how it can be circumvented, crominalized or weaponized. The Sons of Liberty met in back rooms over a pint of ale, penned correspondence, sent riders, and published political cartoons. 

It is late, on the real clock and metaphorically. Tomorrow arrives soon enough.  

We will know, I guess, whether an EMP event went down in Texas. There is an argument that says that publishing about possible or forthcoming false flag attacks or other similar incidents before they happen prevents them. Good thought, but difficult indeed to prove. On the other hand, we must ask how the continual cry of “Wolf!” helps.  

I think Fetzer is, on a broad basis, very right in saying that there have been enough data points that it is no longer deniable that something evil this way comes, that we are engaged in a battle with a hidden cabal of evil-doers and evil-enablers.  The only meaningful question is quickly becoming this one:

What are we going to do about it?

There needs to be a discussion among a number of people who command high levels of evidence (those who have collected the data points), those who command a good deal of social capital (i.e., have followers and effective methods for information dissemination, or who understand these technologies), etc.  

If the Special Ops soldiers who are practicing their craft are being armed with the latest in technoiogies — http://cryptome.org/2015/06/sof-wearables.pdf  — to harness the Internet, what kinds of aps do you have on your SmartPhone?  What kinds of abilities do you maintain inside your cranium?  Have you seen my e-book on how to use your mind over at http://boydownthelane.com/2015/05/13/summon-the-magic/?   Are you up-to-date on Dr. Joe Dispenza and Dr. Bruce Lipton? on knowing how to program your own mind?

I’ll go back to that paper I wrote years ago on coalescing disaster response through communities of practice and change the parameters.

We need:

  • people to sample for and verify evidence;
  • ethicists to grasp and communicate the human dimension;
  • strategists who can provide and assess options;
  • organizers to marshal and link resources and people;
  • someone to examine and appraise choices and the consequences of those choices;
  • someone with a good handle on group dynamics; and
  • seers and prophets who can peer into the future, perhaps only by examining the past.

And they have to figure out a way to share power. 

Brandon Smith, who probably qualifies for a seat at the table in that mythical panel discussion I noted, penned a nice piece on the moral-code-for-the-post-collapse-world.  I’ve posted it previously, I think, but you ought to take a moment and read it. 

His thoughts on offering aid to those who might not deserve it is echoed beautifully in that film “The Impossible” when a badly-injured individual with responsibilities not only to herself but to her son and her missing sons and husband stops to rescue someone else. And he says:

“There is no problem we cannot solve and no opponent too large. We do not know the meaning of the word “impossible.” We operate best under pressure and during disaster. We move to disrupt crisis before it begins when possible, and we refuse to stand back as spectators when crisis does develop. We work diligently to master all knowledge and training that could be used to achieve our goal, which is a free, prosperous and independent citizenry. We do not seek leadership over others; we only wish to teach others how to lead themselves. We will not stop until this goal is accomplished or until we are no longer breathing. We are not mutable or flexible where tyranny is concerned. We are entirely uncompromising.”

I was searching around for the graphic I was going to put up top and, in the search, I found the one that appears above in the middle of the text above and it from a web link I noticed was in Fetzer’s slide group.

 So I found that web site and poked around (turned over a few rocks as it were) and what I found in here made me sit up straight, and then go and make a cup of coffee: the night was suddenly gonna go a little longer.

“… according to the Palantir Blog, there are now more than 21 million American Veterans across the country; men and women who have served America in uniform in wars including WW2, the Gulf wars, Vietnam and Korea. According to the 1st map above left taken from the Palantir Blog, those US Vets are now living largely in ‘sun belt’ areas of the US including Southern California, Nevada, Arizona, Texas and Florida.

Coincidentally, or not, many of those same states are now being targeted by Jade Helm 15… Coincidentally, or not, many of those same states are now being targeted by Jade Helm 15 as seen in the map on top right showing states that have been linked to JH15 and, as radio show host Pete Santilli shares with us in the 1st and 2nd videos below, two Bilderberg attendees’ ‘Veterans Database’ from Palantir matches the ‘Jade Helm’ map as seen directly below, superimposed over ‘Veterans by Geography’ map, almost perfectly.  Beginning at the 2:45 mark of the 1st video, Santilli asks that this information be spread far and wide, especially amongst US Veterans, as we learn that two attendees of Bilderberg,  Peter Thiel and Alex Karp,  have created the database on US Veterans at Palantir that has so infuriates Santilli as he tells us in the video below. Why would Thiel’s database targeting US Veterans match up nearly perfectly with Jade Helm 15’s geography? Is this more proof US Vets are being targeted?”

Well, folks, this makes what I have already posted about Palantir [see created by elves ] come into sharp focus. It looks like the apps for SmartPhones created by DARPA, the same folks behind the pdf at the Cryptome link above, were given a test run at the Boston Marathon bombing. Maybe they were concerned that the minute men of the current day would be responding to the mass state police presence (pardon the pun). 

That’s what you’re up against. 

How smart is your phone? How smart is the fellow carrying your phone? 

I’m still shivering over the remarks by the CEO of Beth Israel hospital who commandeered in photo-bomb fashion the press conference telling the world about the status of the Tsarnaev brother who was killed. 

 

 

 

Added three hours after posting:

http://rt.com/usa/267163-texas-cuero-explosion-fire/  [photos, video, tweets]

The explosion took place at around 8:30 pm Sunday …imagine that.

https://en.wikipedia.org/wiki/Cuero,_Texas 

 

 

 

created by elves

Thanks in great part to the late, great Kenny, in whose comments section in his own sideshow often grew (but not often enough!) some sense of camaraderie and collaboration, I grew interested in the tale of a certain software created by elves.  

The inquiry grew out of curiosity and intuition.  

Kenny would often bird-dog a story or incident which attracted a select group from within his neighborhood of people who had a skeptical penchant, an ability to conduct some quick open source research, the ability to recall things they’d seen or noticed previously, etc.  This would often convene itself as a good repartee in Kenny’s comments, sometime bouncing off entries in blogs other than Kenny’s or perhaps a later continuation.  

Kenny, alas, left us shortly after this blog entry was created; its link provide the background context on the death of Major General Greene in Afghanistan, and the lesser links direct you to my own comments:

http://kennysideshow.blogspot.com/2014/08/too-bad-for-general-live-by-sword.html 

Ed(itor)August 6, 2014 at 1:08 PM

Ed(itor)August 6, 2014 at 2:11 PM

Ed (itor)August 6, 2014 at 10:46 PM

Ed (itor)August 7, 2014 at 11:32 AM

 

https://www.youtube.com/watch?v=N2SUfIyTItk

My inquiry into the tale of a certain software grew and eventually re-appeared in blog entries. Here’s an example of something that got folded into my news blog, along with the lead graphic for the whole entry:

http://www.occurrencesforeigndomestic.com/wp-content/uploads/2014/08/Boston-Marathon-SmartPhone-604×270.png 

A smartphone system developed by the blue-sky research arm of the Pentagon was implemented at the 2014 Boston Marathon.

The Pentagon launched the Transformative Apps program under the DARPA umbrella. The TransApp mission, as stated on DARPA’s website, is to “develop a diverse array of militarily-relevant software applications using an innovative new development and acquisition process.” The hardware itself is basically the same as what everyday Americans are walking around with every day. The big difference comes in how they’re connected. Since civilian networks can’t be trusted, soldiers must constantly set up secure networks on the fly using a suite of radios and networking equipment .

So the Pentagon launched the Transformative Apps program under the DARPA umbrella. The TransApp mission, as stated on DARPA’s website, is to “develop a diverse array of militarily-relevant software applications using an innovative new development and acquisition process.” The hardware itself is basically the same as what everyday Americans are walking around with every day. The big difference comes in how they’re connected. Since civilian networks can’t be trusted, soldiers must constantly set up secure networks on the fly .

Accordingly, TransApp developed a system that soldiers could plug smartphones into and gain basic connectivity. The corresponding apps are also designed to maintain functionality, even when they go offline.

The DARPA program manager responsible for TransApp, Doran Michels, told Gizmodo how the program developed and eventually came to be used in Boston:

Doran told Adam Clark Estes the history of TransApp the way a proud father talks about his family. The program started in 2010 with a budget of nearly $79 million over four years. (That’s not a lot of money for a military with a total budget of over half a trillion dollars.) Transapps saw its first action in 2011, when 3, 000 systems were deployed in Afghanistan, where Doran says the program received overwhelmingly positive feedback. The Army troops that were testing the apps used a variety of different devices depending on the specific tasks, but Doran told me the military settled on consumer-ready smartphones, rather than going through the rigamarole of designing their own proprietary technology. All of the devices Doran showed Estes in the TransApps office were Samsung.

In the years since, TransApps has been used for everything from training soldiers to improving security at the Boston Marathon and Presidential Inauguration. Doran’s particularly proud of the integration in Boston a few months ago, since the high-profile event depends on the complicated coordination of several local and national agencies. Everyone from the FBI to the Boston Fire Department needed to know what everyone else is doing, and the same types of apps that keep soldiers organized in the battlefield worked perfectly there.

You can see from a screenshot of the app they were using, where the specific units and checkpoints are located and how an officer in the field could search and sort for more granular information.

More….:

http://massprivatei.blogspot.com/2014/08/darpas-smartphone-app-implemted-at-2014.html  via http://blacklistednews.com

http://www.occurrencesforeigndomestic.com/2014/08/08/false-flag-situation-awareness/ 

 

More inquiry was done, first just after the turn of the year last January, and then about seven weeks later: 

http://boydownthelane.com/2015/01/06/mythical-software/ 

http://www.thesullenbell.com/2015/02/26/media-mumbles-and-tsarnaev/ 

 

 

https://www.youtube.com/watch?v=y4CVxSGPWyo 

 

Here is even more:

Palantir, the War on Terror’s Secret Weapon

By Ashlee Vance and Brad Stone November 22, 2011

“… Karp had spent years studying in Germany under Jürgen Habermas, the most prominent living representative of the Frankfurt School, the group of neo-Marxist philosophers and sociologists….. In the early days, Palantir struggled to sell its message and budding technology to investors. Big-name venture capital firms such as Kleiner Perkins Caufield & Byers, Sequoia Capital, and Greylock Partners all passed. Lonsdale says one investor, whom he won’t name, actually started laughing on the phone at Karp’s nonbusiness academic credentials. Overlooked by the moneyed institutions on Sand Hill Road, Thiel put up the original funds before enticing In-Q-Tel, the investment arm of the CIA, to invest as well…..

Palantir’s name refers to the “seeing stones” in Lord of the Rings that provide a window into other parts of Middle-earth. They’re magical tools created by elves that can serve both good and evil. Bad wizards use them to keep in touch with the overlord in Mordor; good wizards can peer into them to check up on the peaceful, innocent Hobbits of the Shire. As Karp explains with a straight face, his company’s grand, patriotic mission is to “protect the Shire.”

Most of Palantir’s government work remains classified, but information on some cases has trickled out. In April 2010, security researchers in Canada used Palantir’s software to crack a spy operation dubbed Shadow Network that had, among other things, broken into the Indian Defense Ministry and infiltrated the Dalai Lama’s e-mail account. Palantir has also been used to unravel child abuse and abduction cases. Palantir “gives us the ability to do the kind of link-and-pattern analysis we need to build cases, identify perpetrators, and rescue children,” says Ernie Allen, CEO of the National Center for Missing and Exploited Children. The software recently helped NCMEC analysts link an attempted abduction with previous reports of the suspect to the center’s separate cyber-tip line—and plot that activity on a map. “We did it within 30 seconds,” Allen says. “It is absolutely a godsend for us.”

In Afghanistan, U.S. Special Operations Forces use Palantir to plan assaults. They type a village’s name into the system and a map of the village appears, detailing the locations of all reported shooting skirmishes and IED, or improvised explosive device, incidents. Using the timeline function, the soldiers can see where the most recent attacks originated and plot their takeover of the village accordingly. The Marines have spent years gathering fingerprint and DNA evidence from IEDs and tried to match that against a database of similar information collected from villagers. By the time the analysis results came back, the bombers would be long gone. Now field operatives are uploading the samples from villagers into Palantir and turning up matches from past attacks on the spot, says Samuel Reading, a former Marine who works in Afghanistan for NEK Advanced Securities Group, a U.S. military contractor. “It’s the combination of every analytical tool you could ever dream of,” Reading says. “You will know every single bad guy in your area.”

Palantir has found takers for its data mining system closer to home, too. Wall Street has been particularly receptive. Every year, the company holds a conference to promote its technology, and the headcount swelled from about 50 people at past events to 1,000 at the most recent event in October.

“I saw bankers there that don’t go to any other conferences,” says Gartner’s Litan. The banks have set Palantir’s technology loose on their transaction databases, looking for fraudsters, trading insights, and even new ways to price mortgages. Guy Chiarello, chief information officer for JPMorgan Chase (JPM), says Palantir’s technology turns “data landfills into gold mines.” The bank has a Palantir system for fraud detection and plans to use the technology to better tailor marketing campaigns to consumers. “Google (GOOG) unlocked the Internet with its search engine,” Chiarello says. “I think Palantir is on the way to doing a similar thing inside the walls of corporate data.”

One of the world’s largest banks has used Palantir software to break up a popular scam called BustOut. Criminals will steal or purchase access to thousands of people’s online identities, break into their bank and credit-card accounts, then spend weeks watching. Once they spot a potential victim purchasing a plane ticket or heading out on a holiday, they siphon money out of the accounts as fast as they can while the mark is in transit. The criminals hide their trails by anonymizing their computing activity and disabling alert systems in the bank and credit-card accounts. When the bank picks up on a few compromised accounts, it uses Palantir to uncover the network of thousands of other accounts that have to be tapped…..

To get a job at the company, an applicant must pass a gauntlet of brain teasers. An example: You have 25 horses and can race them in heats of 5. You know the order the horses finished in, but not their times. How many heats are necessary to find the fastest? First and second? First, second, and third? (Answers: six, seven, and seven.) If candidates are able to prove themselves as what Karp calls “a software artist,” they’re hired. The company gives new arrivals some reading material, including a guide to improvisational acting, a lecture by the entrepreneur Steve Blank on Silicon Valley’s secret history with the military, and the book The Looming Tower: Al-Qaeda and the Road to 9/11. ….

Using Palantir technology, the FBI can now instantly compile thorough dossiers on U.S. citizens, tying together surveillance video outside a drugstore with credit-card transactions, cell-phone call records, e-mails, airplane travel records, and Web search information. Christopher Soghoian, a graduate fellow at the Center for Applied Cybersecurity in the School of Informatics and Computing at Indiana University, worries that Palantir will make these agencies ever hungrier consumers of every piece of personal data. “I don’t think Palantir the firm is evil,” he says. “I think their clients could be using it for evil things.” ….

http://www.bloomberg.com/bw/magazine/palantir-the-vanguard-of-cyberterror-security-11222011.html 

Vance is a technology writer for Bloomberg Businessweek in Palo Alto, Calif. He is the author of Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future (HarperCollins, May 2015). Follow him on Twitter @valleyhack.

Stone is a senior writer for Bloomberg Businessweek in San Francisco. He is the author of The Everything Store: Jeff Bezos and the Age of Amazon (Little, Brown; October 2013). Follow him on Twitter @BradStone.


 

Can you say “super-empowered government agent”? Are you interested in the intersection of governmental surveillance and computer software? Does this have potential or actual use by “rogues” for covert ops?

“… It’s not a mystery that when using Palantir technology, US intelligence agencies and law enforcement can instantly profile any US citizen, its platform is able to query a huge quantity of data sources including surveillance video data collected everywhere in the country…..”

http://resources.infosecinstitute.com/the-palantir-technologies-model-lights-and-shadows-on-a-case-of-success/ 

https://www.palantir.com/2013/07/palantir-sync-brings-together-investigative-regulatory-and-prosecutorial-communities-to-discuss-how-technology-can-revolutionize-their-missions/ 

There are five videos at that link, totaling 90 minutes; here they are, separated out for you:

The Intro

https://www.youtube.com/watch?t=71&v=jzJUhxUf1H0 (10:00)

THE EVOLVING ROLE OF TECHNOLOGY IN THE WORK OF LEADING INVESTIGATORS AND PROSECUTORS

https://www.youtube.com/watch?v=Nd2fZZhxuzQ (19:42)

{Ed.: Remember PROmis? The prosecutor’s management information system}

Patrick Fitzgerald, former US States Attorney for the Northern District of Illinois, walks through the evolution of technology over the past 20 years. He describes his work 20 years ago when running a query on a computer was considered reckless. He speaks to the dramatic shift in process, practice, and perspective that has now led to greater information sharing between agencies in an age of endless information and data—a shift facilitated by technology like Palantir’s that allows for integration of a vast amount of different types of data, audit trail analysis, and robust access controls.

BUILDING A HUMAN TRAFFICKING CASE FROM A LEAD TO ARRESTS

https://www.youtube.com/watch?v=gS1IMB–3dw (20:20)

Published on Jul 15, 2013

Timothy Wargo | Unit Chief | Information Sharing and Infrastructure Management | Homeland Security Investigations | Immigration and Customs Enforcement

Ryan Beiermeister | Forward Deployed Engineer | Palantir

Palantir’s work with the U.S. Immigration and Customs Enforcement began over two years ago as part of Operation Fallen Hero, which was ICE’s response to two of their agents being ambushed on an operation in Mexico. Today, ICE uses Palantir’s software across the enterprise for case management and investigative work, including human trafficking cases. Following an introduction to our work with ICE, Ryan Beiermeister demonstrates how Palantir Gotham is used to build a human trafficking case.

USING A MOBILE DATA PLATFORM FOR FIELD OPERATIONS

https://www.youtube.com/watch?v=jYGO95ifaW4 

(19:02)

Published on Jul 15, 2013

Kathleen McGee | Director | New York City Mayor’s Office of Special Enforcement
Logan Rhyne | Forward Deployed Engineer | Palantir

The New York City Mayor’s Office of Special Enforcement is responsible for coordinating efforts across City’s agencies to investigate and solve quality-of-life issues city-wide, including lawless clubs and counterfeit trademark activity. The Office conducts investigations in the field in response to complaints, handles the subsequent mid-level litigation, and develops policy to address the city’s issues. See how Palantir Gotham is used as the Office’s platform for data analysis and how Palantir Mobile is used to collect data and execute operations in the field.

PROSECUTING BIG DATA CASES FROM INSIDER TRADING TO HEALTHCARE FRAUD

https://www.youtube.com/watch?t=10&v=7ANMz89nfoU 

(19:09)

Ryan Taylor, Palantir’s Legal Counsel, walks through how the Gotham platform was leveraged in a number of real criminal and civil cases, including insider trading, money laundering, insider trading, and health fraud.

These YouTube videos come from within the Palantir channel, so look down to your right for more which are related and may be of further interest., like these:

Palantir Databridge – New York City

 https://www.youtube.com/watch?v=-dc53DUPcso (4:16)


 

 

Using Palantir To Uncover Hidden Links In Missing And Exploited Children Cases

https://www.youtube.com/watch?v=TKpam_iy3Fo (27:05)


 Railgun: Leveraging Palantir Gotham as a Command and Control Platform 

https://www.youtube.com/watch?v=ZSB0wOMINhg (40:18)

Basic situational awareness requires an answer to the question, “Where are my units?” Complete situational awareness requires information along many more dimensions: What is a unit’s current task? Who is in charge of that unit? Do they have the resources to complete their task? Can the commander talk to them? Timely, accurate answers to these questions are difficult to acquire, and even harder to come by in harsh conditions or during live operations. In this session we present a new capability for such complete blue force awareness. We will demonstrate how commanders can employ Palantir Gotham across disparate military data domains to collect, explore, and monitor the rapidly changing information vital to their mission. 


 

https://www.youtube.com/watch?v=ts0JV4B36Xw (10:30)

 

 

Dr. Asher Sinensky explains what they mean when they say Dynamic Ontology and considers what this enables in a real world deployment. 

https://www.youtube.com/watch?v=f86VKjFSMJE (40:01)

For those who are completely new to the Palantir Platform or could simply use a refresher, this talk will start from scratch and provide a broad overview of Palantir’s origins and mission. A live demonstration of the product will help to familiarize newcomers with Palantir’s intuitive graphical interface and revolutionary analytical functionality, while highlighting the major engineering innovations that make it all possible.


 

Prepare, Detect, Respond, And Harden: 

Palantir Cyber In Action

https://www.youtube.com/watch?v=6mIQmL2Lapw 

(25:23)