Tag Archives: prosecution

thunder of portent

thunder of portent

I stopped reading the book “Aberration in the Heartland of the Real” when I got to the point (roughly at page 400) when the author started going into the details of psychiatry and behavioral sciences and mind control.  I’d probably felt like I’d hit a wall again of having been “battered and shattered” (the phrase I woke up with in my mind while the rest of the world was beginning to read about Wikileaks Vault #7)(see Fat In The Fire).

It was probably that sense of being personally and psychologically overwhelmed with the depravities to which the human can succumb, which our government can inflict, about which much of our populace can be ignorant or at least apathetic. 

I’d been at that same place of feeling battered and shattered before; it’s starting to get annoyingly repetitive. 

It started perhaps with the act of getting hauled off by a woman much larger than me who grabbed me by the ear and yanked me to the location and position she wanted me in, whether to see the error of my acts and my failures or to position me for finishing the job of more completely weeding her flowerbed or cleaning her floor, or bringing to the site of whatever next chore she’d picked out for me. 

It continued with the act of watching grown-ups discuss amongst themselves, out of earshot of any of their adolescent charges, on that fateful extended weekend in Dallas.

It happened again when Bobby was shot, although at least then there was open weeping. I was in college at the time, and people were less reserved, less uptight, more hopeful of finding a way out of a war that was largely destructive, even of those who never got close to it. How many of us grew up wondering which family would next have to be told of the death of their son? Almost to a person, none of us knew the horrors of what was being done to another people, at least until we were told by citizen leaders who then had to pay a very severe price for speaking of it. In the end, you learn of those in the distance and those in the family who are left to rot to death because of the use of a sprayed poison.

Decades later, I was again shattered and battered with the knowledge that 3,000 souls can be killed in an single act on a morning, televised for the entire world to see, without anyone giving much thought to investigation or prosecution (except those few who signed their name to a petition or exercised the temerity of speaking up on an Internet discussion board). 

It showed up again when I revisited that narrative about the bulldozer assault during the Gulf War, no longer cleansed and polished for heroic salutation but later opened for examination in all its brutality.  

My feelings of being battered and shattered are, I suppose, a mild civilian form of PTSD.  I’ve never been in combat.  I’d probably have been the fellow who the general would have had to slap, or perhaps the one who ran AWOL, shrieking. Or perhaps the one who turned to embrace the violence and continue it. I had my moments in ROTC training when I was confronted with milder forms of violent reality, but that was mere pretense; I never saw any blood shed on purpose or by accident. But I had felt enough inside to know I couldn’t go down that path, and I didn’t. 

Some would say I was a pussy, a coward. 

I have a different perspective. 

When one thinks for a bit about the divisions and crises that face the nation today, that pregnant moment of the unknown that hangs inside the clouds of a dark storm building up slowly off in the distance, the sense of impending trouble, a vague echo of my own personal run-up to the election of 2000, the high RPM 3rd gear “blinking red” prodrome before 9/11 which eventually got tamped down and packed down by my own personal medical events wrapped around interpersonal stressors, it raises the possible specter of haunting and repetitive visititations. 

I’m no fan of Trump but the Clinton/Obama machinations are enough to make one sick. The Wikileaks revelations are the rumbles of thunder of portent.

over-the-horizon surety

over-the-horizon surety

https://www.911tap.org is an online portal to an event that event takes place from: Saturday, September 10, 2016 at 10:00am until Sunday, September 11, 2016 at 06:30pm at The Great Hall, Cooper Union in New York City, New York, United States.

More specifically, the agenda and speakers are noted  as well as the details about panel discussions, round-tables, full presentations, admission tickets, live-streaming, and more. Of note, the live streams will be uploaded to YouTube.

Of special interest to me is the focus on prosecution.


On the subject of 9/11, there is still a great deal of debate, argument, controversy and detail about methods, veracity, validity, the presence of disinformation agents, etc.  People are still calling other people nasty names and epithets, or are at least thinking about it.

I was (and still am) a signatory to prominent petitions calling for investigation and prosecution; I have written extensively (albeit in online obscurity) on the topic of what happened that day. I have read widely (but not yet widely enough).  I am not an expert; I do not have the technical gravitas to hold court; the informational agora has become cluttered and clouded.

I saw David Ray Griffin in public and publicly asked him a question.  [Did you know that he is a leading authority on the subject of evil?] I’ve made special note about the comments made by James Douglass at the very end of his study guide edition to JFK and the Unspeakable.

I withdrew from the process of presenting theory and speculation a long time ago and reverted to being an observer. I hold no position (and will not be forced or cajoled into any position) on the controversies of nuke vs. energy weapon, plane versus no plane, yada yada. As noted on multiple occasions, I subscribe to the Vincent Salandria perspective.

Assuming that there is in existence a reasonable list of indictable culprits, material witnesses, and people who will testify at a trial or trials [such lists have been done and are available at multiple places online], I have not yet seen any lists of people who have been approached on the subject of prosecution, nor have I seen anyone identified who has the necessary authority, troops, cojones and warrants to actually make an arrest. We can convene from now until eternity. Send me an e-mail when a perp walk has been scheduled.

I do see a lot of people who are gently tip-toeing (while positioning themselves at ringside) around the reality that actually arresting and detaining people to answer charges related to the mass murder of thousands of people (let alone the war-related and financial crimes that circulate within and around the case) will precipitate an earthquake-like schism in the socio-political cohesion of the United States and much of the world. I do not think that people who conceived and executed serial acts of dastardliness are going to submit in a docile fashion.

While some minor lip service has been given to the idea of a South Africa-like approach to reconciliation, I don’t see any leaders at any level (political, academic, legal, journalist/media, spiritual/cultural) who have begun to even think about the long view of secondary and tertiary sequelae of this process. This was identified in the past as “the cascade effect”.

“… you must go out at least three orders of implications to scout far enough into the future to find the big surprises. To ignore this pattern of thinking is to invite unintended consequences. By using cascade thinking, leaders can better identify the “unintended consequences” of a new idea before they implement the new idea. That gives them the “lay of the land” well before they roll the wagons.

Here is short list of topics for this kind of exploration: emerging trends, innovations, policy changes, new laws, strategic objectives and goals, and big events.

By scouting the future of such issues, leaders will see over the “time horizon,” gain insights into the pattern of implications, and understand the complexities ahead. This new pattern of thinking helps you to generate the cascade of consequences. Those who think this way will move more rapidly into the future with greater confidence. And that will make all the difference.

At a time when everything and everyone is under increased surveillance, when the major corporate players in the virtual worlds of the Internet are closely allied to those who are implicated in these crimes, when cyberwarfare is on the horizon and there is widespread involvement of mercenaries and corporations who are are tied financially and politically to the already-existant aftermath of 9/11, don’t incorrectly see the difficulty of the prospects of 9/11 prosecution and its long-term implications as a deterrent, an insurmountable hurdle, a reason to demur; instead, see them as a challenge to accomplish correctly, mindfully, with over-the-horizon surety.

created by elves

Thanks in great part to the late, great Kenny, in whose comments section in his own sideshow often grew (but not often enough!) some sense of camaraderie and collaboration, I grew interested in the tale of a certain software created by elves.  

The inquiry grew out of curiosity and intuition.  

Kenny would often bird-dog a story or incident which attracted a select group from within his neighborhood of people who had a skeptical penchant, an ability to conduct some quick open source research, the ability to recall things they’d seen or noticed previously, etc.  This would often convene itself as a good repartee in Kenny’s comments, sometime bouncing off entries in blogs other than Kenny’s or perhaps a later continuation.  

Kenny, alas, left us shortly after this blog entry was created; its link provide the background context on the death of Major General Greene in Afghanistan, and the lesser links direct you to my own comments:


Ed(itor)August 6, 2014 at 1:08 PM

Ed(itor)August 6, 2014 at 2:11 PM

Ed (itor)August 6, 2014 at 10:46 PM

Ed (itor)August 7, 2014 at 11:32 AM



My inquiry into the tale of a certain software grew and eventually re-appeared in blog entries. Here’s an example of something that got folded into my news blog, along with the lead graphic for the whole entry:


A smartphone system developed by the blue-sky research arm of the Pentagon was implemented at the 2014 Boston Marathon.

The Pentagon launched the Transformative Apps program under the DARPA umbrella. The TransApp mission, as stated on DARPA’s website, is to “develop a diverse array of militarily-relevant software applications using an innovative new development and acquisition process.” The hardware itself is basically the same as what everyday Americans are walking around with every day. The big difference comes in how they’re connected. Since civilian networks can’t be trusted, soldiers must constantly set up secure networks on the fly using a suite of radios and networking equipment .

So the Pentagon launched the Transformative Apps program under the DARPA umbrella. The TransApp mission, as stated on DARPA’s website, is to “develop a diverse array of militarily-relevant software applications using an innovative new development and acquisition process.” The hardware itself is basically the same as what everyday Americans are walking around with every day. The big difference comes in how they’re connected. Since civilian networks can’t be trusted, soldiers must constantly set up secure networks on the fly .

Accordingly, TransApp developed a system that soldiers could plug smartphones into and gain basic connectivity. The corresponding apps are also designed to maintain functionality, even when they go offline.

The DARPA program manager responsible for TransApp, Doran Michels, told Gizmodo how the program developed and eventually came to be used in Boston:

Doran told Adam Clark Estes the history of TransApp the way a proud father talks about his family. The program started in 2010 with a budget of nearly $79 million over four years. (That’s not a lot of money for a military with a total budget of over half a trillion dollars.) Transapps saw its first action in 2011, when 3, 000 systems were deployed in Afghanistan, where Doran says the program received overwhelmingly positive feedback. The Army troops that were testing the apps used a variety of different devices depending on the specific tasks, but Doran told me the military settled on consumer-ready smartphones, rather than going through the rigamarole of designing their own proprietary technology. All of the devices Doran showed Estes in the TransApps office were Samsung.

In the years since, TransApps has been used for everything from training soldiers to improving security at the Boston Marathon and Presidential Inauguration. Doran’s particularly proud of the integration in Boston a few months ago, since the high-profile event depends on the complicated coordination of several local and national agencies. Everyone from the FBI to the Boston Fire Department needed to know what everyone else is doing, and the same types of apps that keep soldiers organized in the battlefield worked perfectly there.

You can see from a screenshot of the app they were using, where the specific units and checkpoints are located and how an officer in the field could search and sort for more granular information.


http://massprivatei.blogspot.com/2014/08/darpas-smartphone-app-implemted-at-2014.html  via http://blacklistednews.com



More inquiry was done, first just after the turn of the year last January, and then about seven weeks later: 







Here is even more:

Palantir, the War on Terror’s Secret Weapon

By Ashlee Vance and Brad Stone November 22, 2011

“… Karp had spent years studying in Germany under Jürgen Habermas, the most prominent living representative of the Frankfurt School, the group of neo-Marxist philosophers and sociologists….. In the early days, Palantir struggled to sell its message and budding technology to investors. Big-name venture capital firms such as Kleiner Perkins Caufield & Byers, Sequoia Capital, and Greylock Partners all passed. Lonsdale says one investor, whom he won’t name, actually started laughing on the phone at Karp’s nonbusiness academic credentials. Overlooked by the moneyed institutions on Sand Hill Road, Thiel put up the original funds before enticing In-Q-Tel, the investment arm of the CIA, to invest as well…..

Palantir’s name refers to the “seeing stones” in Lord of the Rings that provide a window into other parts of Middle-earth. They’re magical tools created by elves that can serve both good and evil. Bad wizards use them to keep in touch with the overlord in Mordor; good wizards can peer into them to check up on the peaceful, innocent Hobbits of the Shire. As Karp explains with a straight face, his company’s grand, patriotic mission is to “protect the Shire.”

Most of Palantir’s government work remains classified, but information on some cases has trickled out. In April 2010, security researchers in Canada used Palantir’s software to crack a spy operation dubbed Shadow Network that had, among other things, broken into the Indian Defense Ministry and infiltrated the Dalai Lama’s e-mail account. Palantir has also been used to unravel child abuse and abduction cases. Palantir “gives us the ability to do the kind of link-and-pattern analysis we need to build cases, identify perpetrators, and rescue children,” says Ernie Allen, CEO of the National Center for Missing and Exploited Children. The software recently helped NCMEC analysts link an attempted abduction with previous reports of the suspect to the center’s separate cyber-tip line—and plot that activity on a map. “We did it within 30 seconds,” Allen says. “It is absolutely a godsend for us.”

In Afghanistan, U.S. Special Operations Forces use Palantir to plan assaults. They type a village’s name into the system and a map of the village appears, detailing the locations of all reported shooting skirmishes and IED, or improvised explosive device, incidents. Using the timeline function, the soldiers can see where the most recent attacks originated and plot their takeover of the village accordingly. The Marines have spent years gathering fingerprint and DNA evidence from IEDs and tried to match that against a database of similar information collected from villagers. By the time the analysis results came back, the bombers would be long gone. Now field operatives are uploading the samples from villagers into Palantir and turning up matches from past attacks on the spot, says Samuel Reading, a former Marine who works in Afghanistan for NEK Advanced Securities Group, a U.S. military contractor. “It’s the combination of every analytical tool you could ever dream of,” Reading says. “You will know every single bad guy in your area.”

Palantir has found takers for its data mining system closer to home, too. Wall Street has been particularly receptive. Every year, the company holds a conference to promote its technology, and the headcount swelled from about 50 people at past events to 1,000 at the most recent event in October.

“I saw bankers there that don’t go to any other conferences,” says Gartner’s Litan. The banks have set Palantir’s technology loose on their transaction databases, looking for fraudsters, trading insights, and even new ways to price mortgages. Guy Chiarello, chief information officer for JPMorgan Chase (JPM), says Palantir’s technology turns “data landfills into gold mines.” The bank has a Palantir system for fraud detection and plans to use the technology to better tailor marketing campaigns to consumers. “Google (GOOG) unlocked the Internet with its search engine,” Chiarello says. “I think Palantir is on the way to doing a similar thing inside the walls of corporate data.”

One of the world’s largest banks has used Palantir software to break up a popular scam called BustOut. Criminals will steal or purchase access to thousands of people’s online identities, break into their bank and credit-card accounts, then spend weeks watching. Once they spot a potential victim purchasing a plane ticket or heading out on a holiday, they siphon money out of the accounts as fast as they can while the mark is in transit. The criminals hide their trails by anonymizing their computing activity and disabling alert systems in the bank and credit-card accounts. When the bank picks up on a few compromised accounts, it uses Palantir to uncover the network of thousands of other accounts that have to be tapped…..

To get a job at the company, an applicant must pass a gauntlet of brain teasers. An example: You have 25 horses and can race them in heats of 5. You know the order the horses finished in, but not their times. How many heats are necessary to find the fastest? First and second? First, second, and third? (Answers: six, seven, and seven.) If candidates are able to prove themselves as what Karp calls “a software artist,” they’re hired. The company gives new arrivals some reading material, including a guide to improvisational acting, a lecture by the entrepreneur Steve Blank on Silicon Valley’s secret history with the military, and the book The Looming Tower: Al-Qaeda and the Road to 9/11. ….

Using Palantir technology, the FBI can now instantly compile thorough dossiers on U.S. citizens, tying together surveillance video outside a drugstore with credit-card transactions, cell-phone call records, e-mails, airplane travel records, and Web search information. Christopher Soghoian, a graduate fellow at the Center for Applied Cybersecurity in the School of Informatics and Computing at Indiana University, worries that Palantir will make these agencies ever hungrier consumers of every piece of personal data. “I don’t think Palantir the firm is evil,” he says. “I think their clients could be using it for evil things.” ….


Vance is a technology writer for Bloomberg Businessweek in Palo Alto, Calif. He is the author of Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future (HarperCollins, May 2015). Follow him on Twitter @valleyhack.

Stone is a senior writer for Bloomberg Businessweek in San Francisco. He is the author of The Everything Store: Jeff Bezos and the Age of Amazon (Little, Brown; October 2013). Follow him on Twitter @BradStone.


Can you say “super-empowered government agent”? Are you interested in the intersection of governmental surveillance and computer software? Does this have potential or actual use by “rogues” for covert ops?

“… It’s not a mystery that when using Palantir technology, US intelligence agencies and law enforcement can instantly profile any US citizen, its platform is able to query a huge quantity of data sources including surveillance video data collected everywhere in the country…..”



There are five videos at that link, totaling 90 minutes; here they are, separated out for you:

The Intro

https://www.youtube.com/watch?t=71&v=jzJUhxUf1H0 (10:00)


https://www.youtube.com/watch?v=Nd2fZZhxuzQ (19:42)

{Ed.: Remember PROmis? The prosecutor’s management information system}

Patrick Fitzgerald, former US States Attorney for the Northern District of Illinois, walks through the evolution of technology over the past 20 years. He describes his work 20 years ago when running a query on a computer was considered reckless. He speaks to the dramatic shift in process, practice, and perspective that has now led to greater information sharing between agencies in an age of endless information and data—a shift facilitated by technology like Palantir’s that allows for integration of a vast amount of different types of data, audit trail analysis, and robust access controls.


https://www.youtube.com/watch?v=gS1IMB–3dw (20:20)

Published on Jul 15, 2013

Timothy Wargo | Unit Chief | Information Sharing and Infrastructure Management | Homeland Security Investigations | Immigration and Customs Enforcement

Ryan Beiermeister | Forward Deployed Engineer | Palantir

Palantir’s work with the U.S. Immigration and Customs Enforcement began over two years ago as part of Operation Fallen Hero, which was ICE’s response to two of their agents being ambushed on an operation in Mexico. Today, ICE uses Palantir’s software across the enterprise for case management and investigative work, including human trafficking cases. Following an introduction to our work with ICE, Ryan Beiermeister demonstrates how Palantir Gotham is used to build a human trafficking case.




Published on Jul 15, 2013

Kathleen McGee | Director | New York City Mayor’s Office of Special Enforcement
Logan Rhyne | Forward Deployed Engineer | Palantir

The New York City Mayor’s Office of Special Enforcement is responsible for coordinating efforts across City’s agencies to investigate and solve quality-of-life issues city-wide, including lawless clubs and counterfeit trademark activity. The Office conducts investigations in the field in response to complaints, handles the subsequent mid-level litigation, and develops policy to address the city’s issues. See how Palantir Gotham is used as the Office’s platform for data analysis and how Palantir Mobile is used to collect data and execute operations in the field.




Ryan Taylor, Palantir’s Legal Counsel, walks through how the Gotham platform was leveraged in a number of real criminal and civil cases, including insider trading, money laundering, insider trading, and health fraud.

These YouTube videos come from within the Palantir channel, so look down to your right for more which are related and may be of further interest., like these:

Palantir Databridge – New York City

 https://www.youtube.com/watch?v=-dc53DUPcso (4:16)



Using Palantir To Uncover Hidden Links In Missing And Exploited Children Cases

https://www.youtube.com/watch?v=TKpam_iy3Fo (27:05)

 Railgun: Leveraging Palantir Gotham as a Command and Control Platform 

https://www.youtube.com/watch?v=ZSB0wOMINhg (40:18)

Basic situational awareness requires an answer to the question, “Where are my units?” Complete situational awareness requires information along many more dimensions: What is a unit’s current task? Who is in charge of that unit? Do they have the resources to complete their task? Can the commander talk to them? Timely, accurate answers to these questions are difficult to acquire, and even harder to come by in harsh conditions or during live operations. In this session we present a new capability for such complete blue force awareness. We will demonstrate how commanders can employ Palantir Gotham across disparate military data domains to collect, explore, and monitor the rapidly changing information vital to their mission. 


https://www.youtube.com/watch?v=ts0JV4B36Xw (10:30)



Dr. Asher Sinensky explains what they mean when they say Dynamic Ontology and considers what this enables in a real world deployment. 

https://www.youtube.com/watch?v=f86VKjFSMJE (40:01)

For those who are completely new to the Palantir Platform or could simply use a refresher, this talk will start from scratch and provide a broad overview of Palantir’s origins and mission. A live demonstration of the product will help to familiarize newcomers with Palantir’s intuitive graphical interface and revolutionary analytical functionality, while highlighting the major engineering innovations that make it all possible.


Prepare, Detect, Respond, And Harden: 

Palantir Cyber In Action