drones

Police State Amerika II: No-Knock Raids

“Police violently broke in on a couple of men watching television, exploded concussion grenades, and shot one man roughly a second after entry. The fatal, under-investigated raid yielded no arrests and led to the shooter being named “Officer of the Year.” All because someone was suspected of getting high without government permission.”

– Police State USA


During the April 2013 Boston Bombings and the hunt for Dzhokhar Tsarnaev, Boston suburbia was effectively in lock-down with thousands of National Guard troops, FBI and other federal agents, state and local police, all creating virtual martial law in a matter of hours. Units conducted house to house searches, often heavily armed whilst residents were told to stay inside with their doors locked and not open them to anyone but identified police officers. This was part of an official order called “shelter in place” enacted by Massachusetts Governor Deval Patrick and which was gradually extended over 100 square miles of the Boston metropolitan area, housing over 1 million people. Local reporters compared the scene to videos of US-occupied Baghdad.  [1]

It seems this was a taste of what was to come. With an operation such as this, following hot on the heels of a so-called terrorist attacks with a tragic loss of life, one might say that such martial law was justified in order to catch the perpetrators. Yet, even if we were to discard evidence that the Tasarnaev brothers were set up, the same patterns of deception found similar to every false flag operation, we would surely have to arrive at the conclusion that this was an utterly over-the-top response. What this military deployment did achieve, was to stoke the fear of authority and its capabilities. There has never been a more dangerous time to be poor, elderly or the recipient of SWAT teams’ persistent encroachment into civilian life. For every one of these examples – whether black, white, Army veteran, elderly man or woman, babies, children or the mentally disabled – there are hundreds of similar cases.

SWAT raids are truly terrifying for those unfortunate enough to experiences them. Arriving in armoured personnel carriers, usually in the dead of night or early morning, a team of 8-10 heavily armed, andrenalin-pumped young men break down your door, and/or smash your windows, hurl incendiary devices into the interior regardless of the presence of children or elderly folk and frequently move to kill your pets.  Whilst securing the house and if you are not dead already, you are made to lie face down in blood and glass with your arms tied behind your back. Armour-clad soldiers carrying sub-machine guns shout at you to remain where you are, often during the aftermath of a violent physical assault. It is not uncommon for SWAT members to brutalise homeowners in their search for suspects.

But what of the individual cases? How far has this phenomena encroached into everyday American lives?

swat1

SWAT team smashes into a grandmother’s home Image credit: offthegridnews.com

“Not having proper security on your Wi-Fi router can lead to a SWAT team raid on your house, as one family in Evansville, Indiana, discovered. Louise Milan learned this the hard way when SWAT officers smashed through her door and threw flash-bang grenades into her house in a case that is getting attention again because of court action this month in a lawsuit.” – David Jennings, Off the Grid News, August 2014.

We will start off this brief survey with a tragedy that occurred in 2008, when homeowner Ronald Terebesi was relaxing in his living room with friend, 33-year-old Gonzalo Guizan. The peace was shattered by a nine man SWAT team with a “no-knock search warrant for narcotics”. After police had tossed in three flash-bang grenades through the windows the team battered down the door and after almost 2 seconds inside Mr. Guizan had been shot six times and Terebesi hit with a rifle butt and pinned to the floor. The rest of the team trashed the house looking for concealed drugs.

It became apparent that the SWAT team had burst in so quickly that a grenade denoted in close proximity to the officers causing its fragments to hit Officer Sweeney who claimied he’d been hit, therey firing a volley of bullets into Guizan. According to later testimonies by Sweeny, Terebesi and Guizan had tried to attack him despite the absence of any corroborating evidence. Since the whole event lasted less around 2 seconds it seems like a feeble allegation to cover up incompetence. The Connecticut Post reported attorney for Terebesi Gary Mastronardi stating: “There is undisputed evidence Guizan and Terebesi were huddled in a corner when police shot,” which makes Sweeney’s claims even more unlikely.

Neither man had criminal records. Their only “crime” was to enjoy a small quantity of drugs for personal use, but it was enough to cause a SWAT team to burst into their own home, murder one man and assault another. Terebesi is still seeking compensation for “emotional suffering” while Guizan’s family received a $3.5 million pay out in February 2013.  [2]


“It looked like the Russian army had approached,” … “This was overkill.”

neighbor of Terebsi, Drew Clark


If a police team is out and about and your house has been targeted – prepare to pray.

In 2013, an 80 year-old retiree barely had time to do that before being shot six times as he lay in his bed. The reason? Los Angeles County Sheriffs Department deputies thought they could smell a meth lab. In fact, when no meth operation was found they decided to clutch at the fact that a small quantity of marijuana was discovered in another part of the property. A $50 million civil lawsuit was served by the widow Tonya Pate and her attorney James Bergener. County sheriffs say that the deceased, Eugene Mallory had raised a gun at deputies whilst his wife is adamant that her husband, a former engineer at Lockheed Martin would never have taken such action. “He was shot in his bed before there was any warning given,” Bergener said. [3]

From an old age pensioner to a mentally disabled youth found dead after strong-arm tactics by police officers.

Robert Ethan Saylor was found to have suffered a fractured throat cartilage after being suffocated to death by police officers who sought to remove him from a cinema. Saylor, who had Downs Syndrome and a low IQ had thoroughly enjoyed the film he had been watching and wanted a repeat performance. Saylor and his caretaker did not have enough money and since he did not understand the concept of tickets, he became upset and refused to leave. Though the caretaker pleaded for patience and warned that he was very sensitive to being touched, in the end police moved in. As he was wrestled to the ground not understanding what was going on, there were reports from witnesses that officers told Saylor that he was going to jail, as he struggled in obvious pain. He last words were: “Mommy! It hurt!” as he died of asphyxiation.  [4]

Although the death was ruled a homicide, the 3 police deputies in question received no criminal charges and remained on active duty. They were however, enrolled on a training class to learn how to interact with people with low intelligence. Somehow such a move won’t be much consolation for Saylor’s mother nor will it make the slightest difference to the police in question.

Iraq veterans are also at risk.

We go back a few years to May 5, 2011 and the case of Jose Guerena. The former marine was shot and killed by SWAT team members when they raided his house.

After working the night shift at the local copper mine he and his wife were awakened by voices and loud noises. Assuming that there were intruders he retrieved his rifle and hid his wife Vanessa and his 4-year old son in the closet. He then checked the house. As he stood in the hallway the SWAT team fired off 71 rounds and hit Guerena 22 times. His wife and child were unharmed. No drugs were found.

dreamstime_m_40957630© Zabelin | Dreamstime.com – SWAT Team Photo

Fancy meeting these guys in your living room? Your friendly neighbourhood SWAT team on a street or home near you.

By all accounts, Guerena had no idea that this was the police, nor did he realise that the detonation of concussion grenades in their back yard were the cause of his awakening. Seconds before an armoured truck had arrived in their front yard and a SWAT team was already preparing to break down his door. To compound the tragedy, as he lay  bleeding in the hallway, it appears the police did everything they could to prevent ambulance services from reaching Guerena. According to an ABC News report his wife claimed she called 9-1-1 for an ambulance yet it was over one hour 14 minutes before any paramedics could get to Guerena. This was due to the evacuation of neighbouring houses and the deployment of two robotic drones to check the house interior. One wasn’t enough it seems. The clock ticked by. After that, the bomb squad was called in and the deployment of robotic scouts was set in motion. Only then did the SWAT team re-enter the house to sweep the rooms. By this time, Jose Guerena had bled to death. Deputy Tracy Suitt on behalf of the The Pima County Sheriff’s Department strongly believed: “… the events of May 5, 2011, were unfortunate and tragic, but the officers performed that day in accordance with their training and nationally recognized standards…”.  [5]

These “Nationally recognised standards” were employed with the shooting of two members of Vanessa Guerena’s sister-in-law’s family, Cynthia and Manny Orozco, last year. A small bag of pot was discovered along with $94,000. Though members of the family were allegedly involved with the smuggling of marijuana, such a case requires due diligence and extreme caution which was clearly not the case here. Raids with trigger-happy teams of paramilitary men storming suburbia is common place. Once again, no reprimands or arrests were forthcoming. The Guerena family proceeded with a civil lawsuit and settled at $3.4 million dollars. It seems one can survive two tours in Iraq but not your own law enforcement.

Next in line for raid treatment were two grand-parents shot by DEA agents in their own homes, one fatally and within one month of each other.

In August 2014, New Hampshire Grandmother Lilian Alonzo was looking after her grandchildren aged, 1, 4 and 10 years old. At around 7.00pm the door was opened by a family member and the DEA raided the third story apartment looking for drugs. Alonzo was fired at twice by an agent and was hit in the torso by one of the bullets. The Grandmother’s son later told reporters that all she had been attempting to do was to pick up the baby, a natural reaction one might think when a group of strangers barge into your home. Ms. Alonso had no criminal or previous arrest record and was not arrested or charged following the raid.

Why was this grandmother put in hospital?

It was apparently part of a series of 13 raids carried out: “… to investigate several people allegedly selling prescription painkillers without government authorization.” [6]

Painkillers.

Nor is this an isolated incident. From one of many incidences, Three people were killed and four wounded in October 2013 when yet another no-knock raid turned to tragedy. Reason? The illegal distribution of prescription pills.

From tracking those dastardly crimes of painkiller users, to taking the word of a meth addict and thief in order to raid a Grandfathers home, unannounced.

In September 2014, David Hooks, 59, was awakened by his wife who said the thieves who had earlier stolen their SUV were back. Hooks picked up his gun in order to protect his wife and his home from further intruders. Little did he know that Rodney Garrett had stolen their vehicle, the same man who had tipped off the police that he had seen illegal drugs on the Hooks’ property. Meanwhile, a SWAT team of sheriff deputies broke down the door, firing sixteen shots leaving David Hooks dead. No drugs were found. According to the widow’s lawyer, the Sheriff’s Department then “mislead the public” about the shooting and raid. [7]

Finally, the killing of a 7 year-old girl in a raid by the Detroit Police Department in May, 2010.

Looking for a wanted man on the evening of May 16, 2010, the Detroit Police Department’s Special Response Team (SRT) were preparing for a dawn no-knock raid on a duplex where the man was said to live. The house having been under close surveillance throughout the day, the police nonetheless disregarded any safety measures for the likelihood of children being present at the address, even though children’s toys were littered around the front of the residence. With a warrant to arrest Chauncey Owens and armed with MP5 sub-machine guns and even a Reality TV crew, the SRT team approached the house.

A pedestrian out walking his dog was held back by police and unnecessarily pinned to the ground with police boots on his neck and back. (Gosh, those brave, virile policeman putting on a real show for reality TV). Despite this, he repeatedly told officers that there were children in the house. Bizarrely, officers broke into two locations: the suspect’s and the next door neighbour’s downstairs apartment. Windows were smashed, a concussion grenade thrown which lit up the porch. The door was kicked down and after just over 30 seconds from the start of the raid, a gunshot was heard and Aiyana Stanley-Jones lay dead from a bullet through he neck. It took only six seconds for the girl to be killed from the moment the police entered the home.


 “They blew my granddaughter’s brains out,” …  “They killed her right before my eyes. I watched the light go out of her eyes.”

Ms. Mertilla Jones, Grandmother of  Aiyana Stanley-Jones


She had been sleeping on a couch next to her Grandmother Mertilla Jones who had dived to the floor when the grenade had hit the couch, scorching it in the process. It is then that the police began to lie about the events of that early morning preferring to blame the Grandmother by saying that the man responsible for discharging his weapon – 37-year-old Officer Joseph Weekley – had lost control of his weapon due to contact with Ms. Jones whom, he said, had tried to grab the gun. The Grandmother’s story is the exact opposite to the officer’s and much more believable. She explained that she tried to protect Aiyana after being shocked awake by the grenade and the sound of broken glass. She reached for the girl and made no contact with the officer or his gun. This was later corroborated by the absence of Jones’ fingerprints on the weapon.

Although Weekly had a dubious record of hyper-aggression against children and the shooting of animals during no-knock raids, he was to escape any punishment for this latest tragedy. Both trials in 2013 and 2014 were eventually declared mistrials, as the juries on both occasions were unable to reach unanimity. Finally, in January 2015, the case was dismissed and the Jones family had to pay costs. A civil suit has been filed and an appeal to the U.S. attorney general. [8]

Family spokesman Ron Scott commented on the injustice of the law: “Weekley doesn’t have to pay but the family that lost a child has to pay,” I think it’s abominable. I think it’s evil. I think it’s one of the lowest things I have ever seen.” [9]

(For more on this story go here.)

aiyana-stanley-jones1

7 year-old Aiyana Stanley-Jones killed by Detroit Police Department’s Special Response Team (SRT)

DominikaStanleycharlesJones1

In a photograph from May 2010, Dominika Stanley and Charles Jones hold a picture of their daughter, Aiyana Stanley-Jones, in a Detroit courtroom.” Source: Guardian|Photograph: Mandi Wright/AP.

As you can now imagine, there are hundreds of these stories. The following are just a selection of “no-knock raids”  conducted by police, SWAT, SRT’s and DEA teams taken from the last two years with similar catastrophic results.

No-knock SWAT raid leaves Texas father dead, family traumatized

“When they came in, they had their weapons drawn like we were members of a drug cartel.”

Police burst into wrong apartment, shoot innocent woman hiding in closet

“I told them I was afraid and do not shoot me, and one officer screamed at me to put my hands above my head… That’s when I heard the shot.”

Innocent homeless family’s wooden shack raided by police

Victim, shot at 15 times: ‘They just continued to fire’

Trooper cleared after stomping on innocent man’s skull while handcuffed

“I saw him lift his head and spit blood and teeth onto the kitchen floor.”

Mother and 4 children terrified during late night police raid on wrong apartment

A young mother explains how her evening bath was disturbed by armed men who forced her to the floor half-naked.

Empty home destroyed in 4-hour SWAT siege, innocent woman left with $100,000 in damages

“They wiped my whole life from underneath me and now I’m trying to pick it up and move on.”

SWAT team throws concussion grenade into baby playpen during no-knock raid

“Bad things happen to good people,” says the Sheriff, with every intention of continuing the raids.

Feds perform guns-drawn SWAT raid while investigating campaign finance allegation

“If they’ll do it to me, they’ll do it to anybody,” said the former attorney general.

Texas grandmother, autistic man held at gunpoint in wrong-door police raid

“They had guns directly at me and my son…There were guns everywhere. I mean, the long guns with lights on them. I was crying hysterically.”

DHS ransacks Florida couple’s home without explanation, strips woman naked

“They busted in like I was a terrorist or something.”

Texas SWAT team brutalizes innocent man in no-knock wellness check, concocts charges

“These cops are out of control. They are ruining good people’s lives.”

Utah rave party raided by SWAT team, helicopter, police dogs

A chopper hovered overhead as soldier-wannabes violently shut down the “illegal mass gathering.”


“They told me that they had taken my baby to the hospital. They said he was fine he had only lost a tooth, but they wanted him in for observation,” Phonesavanh said. When she got to the hospital she was horrified by what she saw. Bou Bou was in a medically-induced coma in the intensive care unit of Brady Memorial hospital. “His face was blown open. He had a hole in his chest that left his rib-cage visible.”

victim of SWAT raid Alecia Phonesavanh whose baby, 18-month-old Bou-Bou was on the receiving end of flash-bomb which was thrown into his cot. TheSWAT team who executed a no-knock warrant on their Georgia property on May 28 will face no charges. | Source: ‘Outrage as SWAT officers who disfigured toddler with grenade in botched drug raid will face NO charges’ Daily Mail.

bou-phonesavanh

Bou Bou Phonesavanh who is now thankfully recovering image credit: Justiceforbabyboubou.com


Rather than some overseas combat zone Americans can expect this ordeal to occur all over the United States an estimated 45,000 times every year, mostly in the search for drugs and disproportionately focused within minorities. [10]  Although the failure of the “War on Drugs” was always a certainty and remains deeply unpopular, it was never designed to be a genuine solution to a criminal enterprise, since the traditional role of intelligence agencies and law enforcement has been to profit from the support and sale of drugs on the street. 

swat-search-warrants

The creation of SWAT teams originated in the 1960s, the brainchild of the Los Angeles Police Department who were seeking ways to assist officers in high-risk situations such as a lone shooter, riots and hostage-taking. In the 21st Century they are no longer used for such specialised situations but for the average citizen and the search for drugs. According to a new study of 800 such raids conducted by the American Civil Liberties Union (ACLU) 79% of raids were focused on private homes and: “… only 7% of the time were heavily armed SWAT teams used for their original purposes: hostage and barricade situations.” [12]

And the reason for this explosion in state-mandated home invasions?

Aside from the aforementioned militarisation of law enforcement [8] it is partly to habituate the idea of the State as ultimate authority and the acquiescence required to justify its existence. It isn’t about finding a solution as we have surely surmised by now, it is about extending conflict in perpetuity so that the human spirit is further fragmented and broken. Secondly, as the ACLU points out, Departments of Justice, Defence, and Homeland Security make sure billions of dollars are lavished on law enforcement in order for it to complete the loop of weapons and associated military hardware contracts. The government is now merely another corporation, after all.

Tragedy and brutalisation breeds fear and compliance for some sectors of the population. For others, it ensures the propagation of the revolution meme which in turn, demands martial law and unleashing of the power of the state to enforce a return to “social cohesion.”

Continuing our look at post-9/11 rise of the police state in America, the next post will explore the use of tasers and the fallacy of non-lethality.

 


Notes

[1] ‘Bombing suspect captured after military-police lockdown of Boston’ By Alex Lantier and Kate Randall WSWS, 20 April 2013.
[2] ‘$3.4M settlement in deadly 2011 SWAT raid near Tucson’ By Joe Ferguson, Arizona Daily Star, September 20, 2013.
[3] ‘Widow to Sue Over Fatal Shooting of Husband, 80, by Sheriff’s Deputies’ KTLA, October 10 2013.

[4] ‘Grand jury rejects criminal charges in death of Robert Saylor, man with Down syndrome’ Washington Post, By Theresa Vargas March 22, 2013.
[5] ‘Arizona SWAT Team Defends Shooting Iraq Vet 60 Times’, By Ellen Tumposky, ABC News, May 20, 2011.

[6] ‘Woman Shot during Beech Street drug raid’ by: Carol Robidoux, August 29, 2014. Manchester inklink.com
[7] ‘SWAT Team Shot David Hooks At Home After Tip From Meth Addict’ by Michael McLaughlin The Huffington Post, 10 August, 2014.
[8] Family grieves death of girl, 7, in police raid’  Doug Guthrie and Valerie Olander, The Detroit News, May 17, 2010.
[9] ‘’She was only a baby’: last charge dropped in police raid that killed sleeping Detroit child, The Guardian,  “Aiyana Stanley-Jones was 7 years old when she was killed by a single bullet to the head. As officer Joseph Weekley walks free, another community is demanding answers about the increasing militarisation of law enforcement.” By Rose Hackman, Saturday 31 January 2015.
[10] ‘Another Day, Another 124 Violent SWAT Raids’ By Kara Dansky, American Civil Liberties Union, http://www.aclu.org/ June 26, 2014.
[11] Cocaine Politics: Drugs, Armies, and the CIA in Central America By Peter Dale-Scott (Updated Edition Paperback – April 10, 1998) University of California Press. ISBN-10: 0520214498. |Gary Webb’s Dark Alliance Stories on Establishment drug corruption: http://www.narconews.com/darkalliance/drugs/start.htm |’CIA funnels drugs into poor US neighborhoods’: http://rt.com/usa/usa-cia-drugs-poor-americas/
[12] op.cit Dansky.

[13] ‘War Comes Home: The Excessive Militarization of American Police June 2014: Report: https://www.aclu.org/criminal-law-reform/war-comes-home-excessive-militarization-american-police-report

Advertisements

Technocracy VII: DARPA’s Technophilia (1)

By M.K. Styllinski

 “Fifty years is ample time in which to change a world and its people almost beyond recognition. All that is required for the task are a sound knowledge of social engineering, a clear sight of the intended goal – and power.”

Arthur C. Clarke


In 1964 the director of the CIA Richard Helms who was overseeing much of the experiments in mind control came out with a statement in his memo to the US senate and the Warren Commission which said: “Cybernetics can be used in ‘moulding of a child’s character, the inculcation of knowledge and techniques, the amassing of experience, the establishment of social behavior patterns … all functions which can be summarized as control of the growth process of the individual.’”

Such a wish to mould the masses has not been relinquished.

The human enhancement – or “optimization,” as the military now like to call it – has been a trenchant fantasy for decades. Recall Hollywood movies such as The Terminator (1984) Robocop (1987) and Universal Soldier (2001) which explore the idea of a comic-book annihilator dispensing justice and vengeance against those who don’t have a taste for American culture. Making soldiers into a literal army of unquestioning, bio-genetic, pharmaceutically-enhanced killing machines has proved problematic to say the least. This is partly due to the fact that while huge numbers of soldiers are suffering from Post-Traumatic Stress Disorder (PTSD) and record numbers committing suicide on duty and during their return to civilian life, they understandably don’t fancy having their body transformed into a Captain America cyborg, even if their emotional body has been put through the shredder.

However, Pentagon financing keeps rolling in to the Defence Advanced Research Projects Area (DARPA) with national-security goals and the War on Terror acting as guidelines for military R&D and the convergence of nanotech. (Their website features competitions and public-friendly history lessons on how essential these types of innovations are to our human survival). Artificial systems including neuro-functional implants and ‘biological input/output devices’ will form the basis of a modified biochemistry to counter sleep deprivation, muscle fatigue, reaction time and endurance. This would be complemented by nano-medical monitoring of the soldier’s performance and the administering of therapeutic drugs and hormones according to programmed cycles of release. Other enhancements are possible. Electrodes might be connected to sensory organs, sensory nerves, motor nerves or muscles and appropriate brain-cortex areas. [1]Layered over the fleshly part of this “Terminator” would be a finely-tuned integrated system of equipment, body armour and uniform designed to achieve optimum levels of combat (and carnage) capability if required.

Indeed, in 2015 the DARPA boys have been using gene modifying optical technology to develop a ” ‘cortical modem’ which plugs directly into a person’s DNA and visual cortex.”  Thus, according to online journal CNET: Not only does this unique device help someone overcome blindness or poor eyesight, it generates a built-in heads-up display (HUD) that appears right in before their very eyes.  The implants create an augmented reality projection that appears like magic in your natural vision and without the need for helmets or special eyeglasses.” [2]

Undoubtedly, this new technology named optogenetics has positive implications for the blind and visually impaired. So too, it may prove an exciting prospect for virtual reality enthusiasts and computer gamers with an upgrade that would go beyond and integration of the virtual and material world never before experienced.

Mouse OptogeneticsMouse Optogenetics | Source: Guardian

Whenever there is a public and political reaction to transhumanist philosophy military or otherwise, the PR adapts and words change. Though $4 billion dollars has been syphoned away from cyborg soldier research to the SMART technology of unmanned drone warfare, R & D is still going on in the background. [3]The spiralling growth in military spending has long been out of control with over $152 billion going unaudited each year – and that’s not including CIA funded black operations under the radar of Congress. The outer layer of fraud, abuse and overtly criminal behaviour that’s going about its business behind such contracts is being missed by the Defence Department’s Inspector General. A 2008 report to Congress described: “undetected or inadequately investigated criminal activity and significant financial loss,” where: “personnel, facilities and assets are more vulnerable to terrorist activities.” [4]

Yeah and we know who the real terrorists are…

Part of the U.S. Department of Defence and created 50 years ago in response to the Soviets’ launch of Sputnik, DARPA are clearly dedicated to countering asymmetric warfare. They also acquire significant amounts of tax-payers cash to do it. The team are particularly excited to be re-designing our notions of what it means to be human, using the guinea-pigs of the US military as the model. Though no longer listed on DARPA’s website and only included those projects safe for public eyes, we can go back just a few years and read about all sorts of whacky “breakthroughs” such as the $4.5 million attempt to build a miniature, unmanned Osprey that can perch discreetly on trees, rooftops and flagpoles to spy on “foes” (or civilians, which is essentially the same thing.) $5 million was given to work laser-guided bullets able to turn at a 90 degree angle and “with a greater than 2km range.” Not forgetting the “cognitive swarm recognition technology” which is part of a program to spot rocket-propelled grenades before they are actually launched. Apparently this might involve a crossover project called “transparent displays” which exploits “… the optical plasmon phenomenology characteristics of nano-scale structures.” [5]

Perhaps the most disturbing aspect of DARPA’s modus operandi is the delving into the world of psychology and neurology in order to produce an invincible human fighting machine. Mind reading, cognitive enhancement, pharmaceutically-based mind control, and brain-machine interfaces all offer avenues of million dollar research contracts sourced from the same MKULTRA influences which have changed little over the past fifty years. Adaptation and synthesising of the hapless soldier’s brain is a primary target of research. As a 2003 Wireless News report stated: “Direct neural control of complex machines is a long-term U.S. military goal. DARPA has a brain-machine interface program aimed at creating next-generation wireless interfaces between neural systems and, initially, prosthetics and other biomedical devices.” [6]Or the $3 million funded Systems of Neuro-Morphic Adaptive Plastic Scalable Electronics, or SyNAPSE, a program that will: “… develop a brain inspired electronic ‘chip’ that mimics that function, size, and power consumption of a biological cortex,” … “If successful, the program will provide the foundations for functional machines to supplement humans in many of the most demanding situations faced by war fighters today.” [7]

The latest experiments have called for the next step in understanding the portion of the brain called the neo-cortex which is used for sensory and motor commands, spatial reasoning, language and those requiring conscious thought. In other words, higher brain functions. On September 19, 2013, Networld reported that DARPA is most interested in: “… new concepts and technologies for developing what it calls a ‘Cortical Processor’ based on Hierarchical Temporal Memory.”

In April of the same year, the Obama Administration announced a project called “Brain Research through Advancing Innovative Neurotechnologies” or the BRAIN Initiative which was funded by the 2014 budget. With DARPA lurking in the background and giving “support,” the initiative involves the collaboration of several science foundations and organisations. Dr. Francis Collins, the Director of the National Institutes of Health who shared his enthusiasm in a White House statement explained how: “… the BRAIN Initiative will focus largely on realizing new tools for imaging, recording, and eventually controlling neurons.” He said that project stresses the: “Great promise for developing such technologies” including: “… intersections of nano-science, imaging, engineering, informatics, and other rapidly emerging fields of science and engineering.” [8]

This research falls under the $3bn allocated by the Obama White House to develop technology identifying brain circuits, with financial assistance once again, from National Institute of Mental Health, who has: “… promised to move its seven-figure funding away from research into conditions such as schizophrenia and depression towards a system that looks at how brain networks contribute to difficulties that are shared across diagnoses.” The project is called Research Domain Criteria or the RDoCProject, rumoured to be an “… eventual replacement for the diagnostic system used by current-day psychiatrists.” The identification and modification of key brain circuits is the overwhelming interest in this field. [9]

KONICA MINOLTA DIGITAL CAMERA© infrakshun

There is no question that medical advances involving nanotechnology, neurology and neuropharmacology are destined to improve those suffering from disabilities and diseases ranging from blindness to multiple sclerosis and Alzheimer’s disease. In this context, the medical future is bright. Whether the desire to achieve a healthier and happier humanity will achieve pole position is a moot point at this stage. It is exactly the same mentality behind DARPA and the MKULTRA programs of mind experimentation of the 1940s-1970s which provides the majority of financial support and thus the continuation of that mind-set, with their attendant goals. The pace of change is awe-inspiring in the field of neuroscience and outsourced military applications spreading tentacle-like through Big Pharma, medical and educational institutions. Scientists have reached the point where computers can analyse MRI data from the brain and reconstruct thoughts, while others have broken new ground in making the first brain-to-brain interface. Rats were the primary focus followed by the human subjects using  Transcranial Magnetic Stimulation. [10]

Although almost all advances in neuroscience necessarily feed into the military-intelligence apparatus, the real action can be found in the marriage of cybernetics, biology and artificial intelligence. For instance, though it might seem like trying to count the flames in an inferno, one of the avenues of exploration currently occupying scientists is how to unlock memories stored in the brain in order to create a fully autonomous brain – housed in a robot.

In 2008, Kevin Warwick, a professor at the United Kingdom’s University of Reading explained in an Agence-France Presse report that the robot (named Gordon) has a brain which is: “… composed of 50,000 to 100,000 active neurons. Once removed from rat foetuses and disentangled from each other with an enzyme bath, the specialised nerve cells are laid out in a nutrient-rich medium across an eight-by-eight centimetre (five-by-five inch) array of 60 electrodes.”

The report continued:

“This ‘multi-electrode array’ (MEA) serves as the interface between living tissue and machine, with the brain sending electrical impulses to drive the wheels of the robots, and receiving impulses delivered by sensors reacting to the environment.

Because the brain is living tissue, it must be housed in a special temperature-controlled unit — it communicates with its ‘body’ via a Bluetooth radio link. The robot has no additional control from a human or computer. From the very start, the neurons get busy. ‘Within about 24 hours, they start sending out feelers to each other and making connections,’ said Warwick.

‘Within a week we get some spontaneous firings and brain-like activity’ similar to what happens in a normal rat — or human — brain, he added. [11]

Across the pond four years later, Brown University based in Rhode Island had created the first wireless, implanted, brain-computer interface. The wireless BCIs were implanted in pigs and monkeys for just over a year. The opportunities to test human subjects is imminent.  Not wishing to be outdone by their colleagues down the road, the University of Rochester Medical Centre in New York have carried out revolutionary work in the diagnosis and treatment of brain disorders. They hope their latest research will push new boundaries – ethical constraints notwithstanding. In the same year, scientists successfully grafted human glial cells into the brains of mice, thereby sharply enhancing their cognitive capacities. Improvements were seen across most brain operations such as memory, learning, and adaptive conditioning. The fact that scientists created human chimeric mice which is open to public scrutiny should give you some idea as to what is happening with those fully-funded projects which are conveniently away from public and judicial oversight. [12]

Just in case chimeric mice become passé then it will no doubt come as a relief to those whose bread and butter relies on such innovation that they can just grow their own brains in test tubes. At least, according to the Institute of Molecular Biotechnology in Vienna. On August 28, 2013 it was reported by the UK’s Independent about a beakthrough which saw scientists “grow a brain in a laboratory for the first time.” Affectionately named: “cerebral organoids” these miniature human brains were grown from skin cells in a laboratory and are no more than 4mm and: “… equivalent in development to the brain of a human foetus at about nine weeks’ gestation, and even have the complex three-dimensional structure of a real embryonic brain.” [13]  Brain resource issues may not be a problem for the Post Human.

DARPA has pooled its own resources to come up with yet another deterrent against the (largely non-existent) threat to the techno-military complex. The idea is to combine brain data from human sentry duty with machine-vision systems. Named logically as The Cognitive Technology Threat Warning System (CTTWS) it consists of: “… a wide-angle camera and radar which collects imagery for humans to review on a screen, and a wearable electroencephalogram device that measures the reviewer’s brain activity. This allows the system to detect unconscious recognition of changes in a scene—called a P300 event.” [14]

800px-Actroid-DER_01

“The Intelligent Robotics Lab, directed by Hiroshi Ishiguro at Osaka University, and Kokoro Co., Ltd. have demonstrated the Actroid at Expo 2005 in Aichi Prefecture, Japan and released the Telenoid R1 in 2010. In 2006, Kokoro Co. developed a new DER 2 android. The height of the human body part of DER2 is 165 cm. There are 47 mobile points. DER2 can not only change its expression but also move its hands and feet and twist its body. The ‘air servosystem'” (wikpedia)

Distinct from artificial intelligence systems which rely on standard computer programming, researchers have complemented cerebral organoids by constructing a tiny machine that “looks and thinks” like a human brain allowing robots to act independently. Substantial amounts of data from decades of studies into electrical activity in the brain, otherwise known as electroencephalography (EEG) played a vital part in advancing robotics to the next level. Teams based in various locations over America have managed to create robots which, according to James K. Gimzewski, professor of chemistry at the University of California: “… will be able to be able to learn and explore the terrain and work its way through the environment without human intervention.” Using the cybernetic and systems theory concepts of self-organisation this led the researchers to the creation of: “… nano-scale interconnected wires that perform billions of connections like a human brain, … capable of remembering information” thus processing data transcends current notions of computer capability. Gimzewski believes: “This could represent a revolutionary breakthrough in robotic systems.” [15]

DARPA’s continuing quest to find the perfect cyborg has resulted in the Darpa Robotics Challenge started in 2013. That challenge consists of developing software to bring to life a 330Ib cyborg named Atlas with a funding tag of $34m available to the winning team. According to The Guardian, copies of the Atlas Cyborg were given to teams that will: “… compete to win military prizes for designing the best software to bring Atlas to life. Already Atlas, and its predecessors, can rapidly climb stairs, do more push-ups than any human, and even pass for a person while donning a chemical protection suit.”

atlas

Atlas Robot developed by DARPA Source: http://makezine.com/

The Pentagon is as coy as can be about the future applications for a number of reasons, not least because they are a dangerous liability and ethically dubious. CIA drone attacks in Pakistan have killed up to 3,587 people since 2004, up to 884 of them civilians. Human Rights Watch has created a campaign to raise awareness about the rise of drone warfare based on the unethical premise of machines. According to the organisation robots will have: “… the power to make their own decisions about killing humans” which is not exactly a pleasant thing to consider. An international coalition has now formed which hopes to: “… call for a global treaty that would impose a ‘pre-emptive and comprehensive ban’ on artificially intelligent weapons before they are developed.” [16] This has led to the formation of the International Committee for Robot Arms Control (ICRAC).

As Obama’s drones are increasingly deployed in the skies over many American cities and happily carving up civilians with asymmetric glee, we can be sure that this is a revolution of sorts. Officials thought it prudent to throw an “official statement” to assuage the minds of those ready for such meaningless PR, and stated in Nov. 2012 Defence Department policy statement: “Autonomous and semi-autonomous weapon systems shall be designed to allow commanders and operators to exercise appropriate levels of human judgment over the use of force.” The document added further that: “complete engagements in a time-frame consistent with commander and operator intentions and, if unable to do so, [must] terminate engagements or seek additional human operator input before continuing the engagement.”


See also: “The Pentagon is building a ‘self-aware’ killer robot army fueled by social media” By Nafeez Ahmed


The above essentially means that the military will be permitted to do as they please with their new toys. If the machines don’t do as they are told then humans will take over to complete the missions. Exercising “judgment” seems to be the fail safe, which is even less reassuring considering the woeful legacy of the US military.

If you imagine getting machines to think like humans in a military setting is disturbing, medical discoveries will continue to surge ahead nonetheless, serving to buffer the disquiet forming in most minds – outside of DARPA, that is. Apparently, the excitement of the challenge is paramount, regardless of the consequences. The idea is to create machines which are as close to functioning humans as possible with the added bonus that they will kill on command. This will take us further down a road of mind control research in programmed assassins which characterised the post-World War II and Cold War machinations. This time, with the added dimension of cybernetic, bio-engineering. After all, developing cyborgs are much less expensive than fully automated robots and far more predictable than the fallibility of hypno-programmed humans. A blend of the two brings expendability to new levels.

What if the government could change people’s moral beliefs or stop political dissent through remote control of people’s brains? A leaked document reveals that the US government, through DARPA research, is very close to accomplishing this. (See The Manchurian Reality for the historical background)

A program using “Transcranial Magnetic Stimulation” (TMS) where the temporal lobe of the brain is stimulated with electromagnetic fields, continues the tradition. The objective in this particular example is: “… to remotely disrupt political dissent and extremism by employing in tandem with sophisticated propaganda based on this technology.” Such research is given the PR gloss that its focus is foreign war games when in fact, it is more likely to target a domestic populace as social and economic strife increases. According to phase 3 of the study paper entitled: entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects,” the ideal is to terminate lines of thinking in favour of thoughts they we would not normally be prepared to believe. In a military context we can assume that this is not about persuading people to see through Establishment deceptions – quite the opposite. [17]

Electro-stimulation and ultrasound technology have a long history in mind control experimentation upon which DARPA has eagerly capitalised. As part of its Faculty Award Program, the department kindly made a grant available to Dr. William J. Tyler, Assistant Professor in the School of Life Sciences at Arizona State University and co-founder and the CSO of SynSonix, Inc. With initial work supported by the U.S. Army Research, Development and Engineering Command (RDECOM) Army Research Laboratory (ARL). So, we know that medical uses are secondary here. After addressing the undoubtedly welcome potential for curing neurological diseases and brain injury, the professor informs us in a US Dept. of Defence article that: “… we have been working to develop methods for encoding sensory data onto the cortex using pulsed ultrasound.” He explains that a new technology has been developed: “… which implements trans-cranial pulsed ultrasound to remotely and directly stimulate brain circuits without requiring surgery. Further, we have shown this ultrasonic neuro-modulation approach confers a spatial resolution approximately five times greater than TMS and can exert its effects upon subcortical brain circuits deep within the brain.”

The upshot of this work and other research into brain circuitry is that it will be applied to US war-fighters where the professor states he will be putty in his benefactor’s hands looking forward: “… to developing a close working relationship with DARPA and other Department of Defense and U.S. Intelligence Communities to bring some of these applications to fruition over the coming years depending on the most pressing needs of our country’s defense industries.” [18]

I think we already know what those “pressing needs” are.

What is effectively a “Helmet of obedience” opens itself to a wide range of applications. Tyler is a busy worker bee. He has also created another plaything for military loons on his website MyBrainCloud.net which offers: “… a concept application of non-invasive brain stimulation using pulsed ultrasound, which is likely to emerge in the future. The concept is essentially to provide individual users with a personalized connection port through which various brain stimulation protocols can be administered in an open access manner using cloud computing. This technology has many broad applications ranging from at-home medicine to recreational applications such as interactive video gaming and virtual experience downloading.” [19]

The page has since been taken down.

HAARPHigh Frequency Active Auroral Research Program (HAARP)

At this point, we might usefully remind ourselves of the relatively modern use of High Frequency Active Auroral Research Program (HAARP).

Before it was apparently “closed down” it was based in Garkona, Alaska, and jointly funded by the U.S. Navy, the U.S. Air Force, the University of Alaska, and DARPA. HAARP was officially designated as an advanced weather research project focused on the ionosphere. It has been cloaked in mystery as to its true nature, in part due to an official stance of “national security” and the repellent legacy of US experimentation in the field of technotronic warfare and mind control. It seems part of the experimentation involved the use of electromagnetic frequencies and directed energy beams pulsed into the delicate upper layer of the atmosphere called the ionosphere around 1000 km above the Earth’s surface. The aim was/is to heat up specific areas which can create lenses of magnified effects. On the official website at http://www.haarp.alaska.edu/we can read: “HAARP is a scientific endeavor aimed at studying the properties and behavior of the ionosphere, with particular emphasis on being able to understand and use it to enhance communications and surveillance systems for both civilian and defense purposes.”

Though there is very little to go on regarding the nature, development and future direction of HAARP, Physicist Dr. Bernard Eastlund has given a lot of food for thought from his 1985 US patent entitled: “Method and apparatus for altering a region in the earth’s atmosphere, ionosphere, and/or magnetosphere” filed in 1985. If such a patent can be made available publicly you can be sure classified research is well in advance of similar prototypical research. From this patent, he states:

[The] temperature of the ionosphere has been raised by hundreds of degrees in these experiments.

A means and method is provided to cause interference with or even total disruption of communications over a very large portion of the earth. This invention could be employed to disrupt not only land based communications, both civilian and military, but also airborne communications and sea communications. This would have significant military implications.

It is possible … to take advantage of one or more such beams to carry out a communications network even though the rest of the world’s communications are disrupted.

[This invention] can be used to an advantage for positive communication and eavesdropping purposes.

Exceedingly large amounts of power can be very efficiently produced and transmitted.

This invention has a phenomenal variety of … potential future developments. Large regions of the atmosphere could be lifted to an unexpectedly high altitude so that missiles encounter unexpected and unplanned drag forces with resultant destruction or deflection. Weather modification is possible by, for example, altering upper atmosphere wind patterns or altering solar absorption patterns by constructing one or more plumes of atmospheric particles which will act as a lens or focusing device. Ozone, nitrogen, etc. concentrations in the atmosphere could be artificially increased.

Electromagnetic pulse defenses are also possible. The earth’s magnetic field could be decreased or disrupted at appropriate altitudes to modify or eliminate the magnetic field.

Though differing in scope and logistical capabilities this is exactly the type of experimentation which HAARP may still be carrying out, albeit under a entirely different set up.

Though many researchers posit HAARP was indeed a vast geo-engineering project linked to reducing climate change by saturating the atmosphere with specific chemicals – the infamous chemtrails controversy – it seems this was a sub-division of experimental research and a likely cover for something else. The evidence may surface that it is not restricted to weather but a continuation of experiments gained from mind control research, something which the Establishment has been interested in since the days of Nikola Tesla. The real action may stem from this long rumoured experimental mass mind control, in line with the US military’s goal of full-spectrum dominance by 2020.

Author and researcher Nick Begich Jr. and his influential book: Angels Don’t Play This HAARP, suggested that experiments in the ionosphere have advanced greatly to the extent that earthquakes, tsunamis and hurricanes can be triggered (Hurricane Katrina, 2005, Haitian earthquake of 2009) and localised as part of an on-going geostrategy. More importantly, he theorises that it is the product of decades of research which has resulted in a mind control device of considerable power.

Given that there has been decades of proven experiments in mind programming, huge advances in military technology such as Silent Sound Spectrum carried out by the US government, this is very far from outrageous. Begich’s claims and that of other researchers are supported by public patents relating to HAARP a sample of which follows:

  • C. W. Hansell (1945) “Communication system by pulses through the Earth”, U.S. Patent 2,389,432.;
  • R. L. Tanner (1965) “Extremely low-frequency antenna”, U.S. Patent 3,215,937;
  • G. F. Leydorf (1966) “Antenna near field coupling system”, U.S. Patent 3,278,937;
  • B. J. Eastlund (1987) “Method and apparatus for altering a region in the Earth’s atmosphere, ionosphere, and/or magnetosphere”, U.S. Patent 4,686,605;
  • B. J. Eastlund (1991) “Method for producing a shell of relativistic particles at an altitude above the earths surface”, U.S. Patent 5,038,664.

The history of DARPA’s main avenue of research has always been neuroscience, nanoscience and cybernetics adapted to military applications.  Though often designated as a classic conspiracy theory and therefore not worth investigating, it appears even the European Parliament expressed unease at the project in the document: “Minutes of 28/01/1999 – Final Edition, Environment, security and foreign affairs, A4-0005/1999: ‘Resolution on the environment, security and foreign policy’: stating that it: “… considers HAARP by virtue of its far-reaching impact on the environment to be a global concern and calls for its legal, ecological and ethical implications to be examined by an international independent body before any further research and testing.”

Good luck with that.

See also: Girl, 7, groomed online by ROBOT in shock case police can do nothing about


Notes

[1] op. cit. ‘Military Uses of Nanotechnology – European Commission’
[2]’DARPA implant could give people Terminator-like vision, coldorbit.com February 18, 2015
[3] ‘The Rise and Decline of Military Human Enhancement’ By Michael Burnham-Fink, Science Progress January 7, 2011. http://scienceprogress.org/2011/01/the-rise-and-decline-of-military-human-enhancement/
[4] ‘Pentagon Watchdogs Swamped by Military Spending; $152 Billion a Year  Goes Unaudited’ Wired May 2008.
[5] Ibid.
[6] ‘Toward a Brain-Internet Link,’ Rodney Brooks, WirelessNewsFactor, 10 December, 2003.
[7] ‘DARPA 2009: Brain On A Chip, Transparent Displays’ by Noah Shachtman, Wired February 2, 2008.

[8] ‘Obama has announced a $100-million brain mapping project’ io9.com, September 19, 2013.
[9] ‘Vaughan Bell: news from the borders of mental illness’ guardian/Observer September 29, 2013.
[10]’Computer can read letters directly from the brain’ Science Daily August 19, 2013.
[11] A ‘Frankenrobot’ with a biological brain, (AFP) Aug 13, 2008
[12] ‘First human brain-to-brain interface allows remote control over the internet, telepathy coming soon’, extremetech.com/ August 28, 2013
[13] ‘Scientists ‘grow’ a brain in a laboratory for the first time.’ by Steve Connor The Independent,August 28, 2013.
[14] ‘Sentry System Combines a Human Brain with Computer Vision’Lucas Laursen, MIT Tech Review, November 27, 2012.
[15] ‘DARPA Building Robots With ‘Real’ Brains’ http://www.nationaldefensemagazine.org 9 Apr 2013.
[15] ‘Rights group launches campaign to ban ‘killer robots” phys.org Apr 23, 2013 by Danny Kemp
[16] ‘Secret DARPA Mind Control Project Revealed: Leaked Document’ – Whistleblower Reveals Military Mind Control Project At Major University. Activist PostJuly 29 2013.
[17] ‘Remote Control of Brain Activity Using Ultrasound’ Armed with Science, http://www.science.dodlive.mil
[18] http://www.tylerlab.com/projects/ultrasound/future

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/