Homeland Security

Reality Change II: “Hope for the best, Prepare for the Worst.”

“Federal military commanders have the authority, in extraordinary emergency circumstances where prior authorization by the President is impossible and duly constituted local authorities are unable to control the situation, to engage temporarily in activities that are necessary to quell large-scale, unexpected civil disturbances.”

– ‘Defense Support of Civilian Law Enforcement Agencies’

***

“Don’t trust the banks. Most are bankrupt. Don’t put your gold and silver coins in the safe deposit box. Keep them at home and keep them secret. Don’t keep more cash in the bank than is necessary to cover about a month’s worth of bills. This is a flashing red alert. Many tens of thousands of people who have their trust in the government system (U.S. currency) are headed dead ahead into impoverishment.”

– Bob Livingston, Personal Liberty Digest


Not a pretty picture.

The above nebulous language introduced in recently amended regulations in the US code of military operations on domestic soil conveniently skipped over what these “activities” would be in order to quell civil disturbances. What it does do is give the US military carte blanche to do as they please in such a scenario which won’t exactly reassure American citizens that they are safe. Indeed, it suggests that the only “unexpected” thing here is just what the US military has planned in the face of the inevitable break down in social “order.” And when we factor in all kinds of natural disasters on the horizon you can understand why so many folks are leaving cities with high density populations and even leaving the country completely.

Not all of the disaster events in the last post will occur but since the main points on this list was first compiled in 2011, we are already seeing some of these scenarios playing out. And who knows? They may all arrive within a year… It really is a case of “Hope for the best and prepare for the worst,” as some bright spark once said …

Returning to our Machiavellian friend and insider Zbigniew Brzezinski, this man has had his finger on the pulse between pathocrat and the global public for several decades. Driven by an irrational and all-consuming hatred of Russia, Brzezinski is a master tactician and highly astute at deciphering the many possible futures currently jostling for supremacy.  If he is worried about the scope and depth of changes taking place, then you can be fairly certain he’ll telegraph his concerns to the pathocratic faithful so that contingencies can be updated.

(more…)

Advertisements

Chabadniks, Zionists & 9/11 Insiders (2)

““Megabucks, rather than forces of Cabala, move the events in the Middle East.”

– Israel Shamir


Once the security had been taken over then planning could proceed accordingly. When the Towers did come down then ALL the evidence had to be cleared away and dispensed with, which indeed it was. The 9/11 terror architects had to be very sure that their meticulous operation was not discovered in the aftermath. The steel had to be quickly cut up, shipped off to Asian smelters so that it could be dealt with far from the prying eyes of forensic investigators. Christopher Bollyn’s meticulous research detailed in his book Solving 9-11 (2010) pinpoints several characters who spirited away any damning evidence that would connect them to the scene of the crime, all of whom were surrounding New York Mayor Rudi Giuliani like spokes to a wheel.

The Hugo Neu Schnitzer company run by Robert Kelman received, processed and shipped almost 230,000 tons of steel from the World Trade Centre with some of the steel transported directly from ground zero to waiting barges which were then ferried to Kelman’s New Jersey junk-yard. It was here that everything was cut, mixed and shipped to Asia including countries such as Malaysia, China, South Korea and Japan. Hugo Neu processed 250,000 tons (88%) of WTC steel in a severely depressed scrap market. As Bollyn remarks: “The price of scrap steel for export in 2001-2003 was at its lowest level in 50 years, between $70-80 per ton. Why would a steel trader in New Jersey spend $25 per ton to ship the WTC steel to distant Asian smelters when it could have been shipped for a fraction of the cost to U.S. steel companies?” [1]

Ten years later Hugo Neu has major shares in Agua-Agro Fund, an Israeli venture capital outfit. Managed by Nir Belzer who is co-founder of Israel’s Millennium Materials Technologies Funds with Oren Gafri who is particularly interesting in light of nanotechnology:

From 1979 to 1989, Gafri served as an executive of the Israeli Aircraft Industries Ltd (IAI), Bedek Division, as the Manager of Materials and Process, in charge of the Chemical, Metallurgical, Composite and Non Destructive Testing (NDT) facilities, Labs and R&D. He trained at Israel’s Nuclear Research Center (Dimona) in the Negev Desert. Gafri is a specialist in energetic nano-composite coatings exactly like the one that pulverized the 220 acres of concrete floors in the World Trade Center. Belzer and Gafri’s MMT Fund is invested in several companies that produce such coatings. [2]

Hardly coincidental one would think.

us_wtc54

Evidence at Ground Zero being destroyed and shipped away as scrap metal (Source: 911research.wtc7.net)

Other less well-known individuals in the Giuliani Partners consulting company all seemed to play crucial roles in the cover up and destruction of evidence. Two of these players were: “Pasquale J. D’Amuro, the FBI inspector in charge of the 9/11 investigation, who supervised the ‘non-investigation’ at the World Trade Centre, and Richard Sheirer, the ‘Jewish knight’ who oversaw the removal and destruction of the crucial steel evidence by having it sent to Zionist-run scrapyards in New Jersey…” [3] The Mayor had been a long time Zionist tool and Neo-Conservative war-hawk on Iraq and Iran for some time, regularly back-slapping the Israeli lobby and ADL. As Paul Craig Roberts asserts: “… practically every Giuliani advisor is a member of the Lobby.”  [4] It is not an exaggeration to say that without Giuliani much of the 9/11 cover up could never have run as smoothly as it did.

At a press briefing on the recovery operations at the World Trade Centre disaster area September 21, 2001 at the Emergency Operations Centre in New York City, Giuliani was accompanied by then Jerusalem Mayor and future Prime Minister of Israel Ehud Olmert. Bollyn raises a vital question: when scores of Israeli agents were already being found to be running around military infrastructure of the United States, why did Giuliani hide: “… the fact that Olmert had been in New York City on the day before 9/11 and probably on the day itself.” And further: “Why was Olmert in New York City on 10 September 2001, and why has his visit been kept secret?” [5] (Since corruption is a normal state of affairs in politics, Olmert must have ruffled someone’s feathers since then, as he was given a six year sentence and fined $290,000 for accepting bribes).

olmert-giuliani=McCain

Ultra-right wing trio: Likud’s Ehud Olmert mayor of Jerusalem with mayor of New York City Rudy Giuliani and Republican Sen. John McCain at the Emergency Operations Center in New York on September 21, 2001. What was Olmert doing in a secret meeting one day before the 9/11 attacks? Why no mention of this apparent coincidence?

None of this would have been able to happen if Billionaire Chabad Lubavitcher Ronald Lauder of perfume corporation Estée Lauder had not been on the New York State Research Council on Privatization and lobbied for the privatization of the WTC.  [6] An active member of the Jewish National Fund, American Jewish Joint Distribution Committee, the ADL, Jewish Theological Seminary and elected President of the World Jewish Congress in June 2007, Ronald Lauder was well-placed within the sayanim support network. The MOSSAD’s use of the art world as cover crops up again with Lauder who, as former US Ambassador to Austria: “…has a fabulous collection of paintings that has made him one of the most envied and influential figures on the world art market.”  [7] Enter Lauder’s secretive mistress Daniella Luxembourg and her business partner Amalia Dayan, both from art auctioneers Phillips, de Pury & Luxembourg. Dayan is the grand-daughter of Moshe Dayan, Chief of Staff of the Israel Defence Forces in the 1950s and later Defence Minister and Foreign Minister of Israel.

Ronald_Lauder

Ronald Lauder

The descendants of PNAC, Foreign Affairs and Foreign Policy think tanks are part of Lauder’s ideological base. As is the case with all his colleagues – he has the financial and military intelligence clout to assist the MOSSAD machine. As another Bush supporter who praised his “ideological vision,” a principle of Chabadism that demands an active ideology to supplant all else, Lauder reiterates the force tabled by the Great Rebbe:

“I am convinced that Israelis desire, and have a right to ask for, such a newly-invigorating ideological vision. They demand it from their leaders. Israelis want to know – Jews the world over want to know! — not only how the army is going to be strengthened or the financial system reformed, but where Israel is going. Why we are going there. What do we believe in – and how this is manifested in policy. Israelis need to believe in the justness, correctness and moral superiority of their path, and this can only come from a shared and well-tended ideological vision.”  [8]

This “moral superiority” is still being “manifested in policy” to a most dangerous degree from the likes of Lauder and his immense political leverage within Zionist and Lubavitch circles. With close ties to Benjamin Netanyahu and family links to the Federal Reserve, the cosmetics magnate is currently president of the World Jewish Congress, with multiple interests in real estate and Israeli media. As a dedicated follower of Chabad Lubavitch, he helped set up many Lauder Chabad elementary and high schools in Vienna, Austria. In 2009, he inaugurated the first Jewish University in the city “with a curriculum drawing on methods and courses used at the Lauder Institute at the University of Pennsylvania” and which includes a heritage centre directed by a Chabad rabbi. One article on the Chabad Lubavitch website reported on dinner in his honour following the event where he stated: “… that he owes all of his accomplishments in establishing Jewish education to the merit of the Lubavitcher Rebbe, Rabbi Menachem Mendel Schneerson, of righteous memory. ‘Without me meeting his emissary, Rabbi Biderman, 20 years ago in this city (Vienna),’ said Lauder, ‘all of that I have done would not have happened.’”  [9]

It was also Lauder’s Chabadism which led him to endorse propaganda think-tank EMET which was aimed at buttressing support for Likudnik Ariel Sharon’s plans to scupper the Middle East peace process. Lauder: “… met with Sharon in September 2000—just before the latter staged his provocation at the Islamic holy sites on the Temple Mount/al-Haram al-Sharif in Jerusalem, triggering the on-going violence.” [10]

The foundation to EMET was drawn from billionaire members of the Zionist spy-group “Mega” headed by Edward Bronfman to which Lauder had direct links due to his fanatical devotion to the ideology of Lubavitch war. Or as Israel Shamir described: “The megabucks call themselves ‘Mega group.’ This name appeared in the media … as a name for the secret Israeli mole in the upper reaches of the U.S. establishment. It came up in an overheard phone conversation, later denied by the Israeli embassy in Washington, D.C. The newshounds and spook watchers got it wrong. ‘Mega’ was not an agent, Mega was the boss.”  [11]

Ronald_S_Lauder_-_Rally_against_anti-Semitism_-_Berlin_14_September_2014_-_1_-_c_MichaelThaidigsmann

President of the World Jewish Congress, Ronald Lauder in September 2014
(Photo: Michael Thaidigsmann via Wikimedia Commons)

It was in May 2001 at the Manhattan mansion of Edgar Bronfman, the head of the World Jewish Congress, where Lauder found himself amongst 50 of the “… richest and most powerful Jews of the U.S. and Canada. There was no press coverage, no limelight, just a few lines in the newspapers… They agreed to launch a PR program under the Orwellian codename of ‘Truth’ with the purpose of influencing American public opinion regarding Israeli policies.” Shamir goes on to say: “Megabucks, rather than forces of Caballa, move the events in the Middle East.” [12]  However, this would be to hugely underestimate the power of Zionism in the world today. Yes, there is a lot of money involved from the likes of 50 billionaires but this is only half the story as we consider the events of 9/11.

Not to be outdone by Frank Lowy’s Institute, Lauder founded the Lauder School of Government Diplomacy and Strategy based in Herzliya, Israel. It is one of the most prestigious Universities in Israel and the US. With a great emphasis on psychology and counter-terrorism. With more than an obvious Israeli bias it effectively acts as a recruitment university for the IDF and the MOSSAD whose headquarters are just down the road. Uzi Arad is director of the institute of policy and strategy at the school after being a senior official in MOSSAD for 25 years. [13]

As with so many Israeli software companies, Odigo’s Research and Development (R&D) centre is based in Herzliya, North of Tel Aviv. It was the Israeli Odigo company who received at least two warnings two hours before that the 9/11 attacks were imminent and failed to alert the authorities. In fact, South East Asia News Corp tells us that more than 4000 Hebrew-speaking persons were warned of the impending attacks by Odigo’s messaging system. Nationality and religion had nothing to do it, despite the ADL attempting to paint such “conspiracy theories” as anti-Semitic rants. According to Bollyn: “Shortly after 9/11, Odigo was taken over by Comverse Technology, another Israeli company. Within a year, five executives from Comverse were reported to have profited by more than $267 million from ‘insider trading.’” A former Israeli military officer, the CEO of Comverse, Jacob “Kobi” Alexander, was charged on several counts of fraud but allowed to escape. (This did not stop him wiring $7 million to his his account before absconding to Nambia). [14]

Jakob_1

Yakobi Alexander

As explored in The Z Factor series many scores of Israeli-based telecommunications and software companies are operating in the United States which are: “… sponsored by Mossad funding sources such as Cedar Fund, Stage One Ventures, Veritas Venture Partners, and others.”

Bollyn continues, that unsurprisingly:

“… the portfolios of these Mossad-linked funding companies contain only Israeli-based companies, such as Odigo. Reading through the strikingly similar websites of these Israeli ‘VC’ funds and their portfolio companies, one can’t help but notice that the key ‘team’ players share a common profile and are often former members of ‘Israel’s Intelligence Corps’ and veterans of the R&D Department of the Israel Air Force or another branch of the military. Most are graduates of Israel’s ‘Technion’ school in Haifa, Mossad’s Interdisciplinary Center (IDC) [15]

And under the Interdisciplinary Centre (IDC) also based in Herzliya, a private, non-profit university with a “research institute” which was headed by Shabtai Shavit, former head of the MOSSAD from 1989- 1996 is called the International Policy Institute for Counter-Terrorism. The Lauder school comes under its auspices. With assets like this straddling the telecommunications and software infrastructure of Israel and the US what other utilities were monopolised during 9/11?

Quite a lot, it seems.

Ptech Software systems had the FAA, NATO, USAF, Congress, the White House and virtually all US Federal departments as clients during September, 2001. MITRE an important defence contractor were deeply connected to CIA/ MOSSAD front outfits and dual nationality, Zionist personnel. In fact, it seems: “Ptech software [was] loaded with trapdoors and Trojan Horses … sold and loaded onto the MOST sensitive computer systems that failed miserably, or performed well (depending on your view), on September 11, 2001. Ptech was with the MITRE Corporation in the basement of the FAA for two years prior to 9/11. Their specific job was to look at inter-operability issues the FAA had with NORAD and the Air Force in the case of an emergency.”  [16]

index

NORAD emblem

It was the North American Aerospace Defence Command (NORAD) and the FAA who presided over so many delays and failures of procedure in tracking, intercepting and communicating the hijackings to relevant authorities. Claiming there were “oversights” or “errors of judgment” do not stand up to even the lightest scrutiny. NORAD has still not explained its role in the serious time lags and breakdown in protocol during the 9/11 attacks and remains one of the most suspect players in the whole charade. Chairman of the Senate Armed Services Committee; CFR member and Chabad supporter Sen. Carl Levin is of central importance on this issue. When Time Magazine named him “one of America’s 10 best senators” this was the moment that Levin had official Establishment approval, and it is not difficult to see why. The Michigan Senator is empowered with legislative oversight of the nation’s military, including military research and development, nuclear energy and the Department of Defence, National Security, military benefits and the Selective Service System. He is also an ex-officio on the Committee on Homeland Security and Governmental Affairs, and most importantly perhaps – the Select Committee on Intelligence. That’s a lot of power for a man who has publicly lauded Chabad Lubavitch in the Senate and has made a pastime of covering up Israeli financial transgressions. [17]  It appears these skills were honed during the 9/11 operation and beyond.

c-levin

Senator Carl Levin during a Senate confirmation hearing

On September 13, 2001, when Vice-Chairman of the JCS, Gen. Richard Myers, and NORAD Commander Ralph Eberhart were meant to be grilled as to why, how and what went wrong regarding the hijacked flights, it was Sen. Carl Levin’s committee that allowed them to walk away without so much as a reprimand. Caroline A. Valentine was one of the first to alert us to the behaviour of Levin and rightly points out that a major part of the 9/11 hearing was vectored away from finding the truth just as it was with every other tightly controlled internal “commission” and “inquiry.”

Valentine includes a letter in her 2002 article “Senator Carl Levin, NORAD, and Chabad Lubavitch” [18] from her fellow 9/11 investigator Dick Eastman who, on June 10, 2002 wrote an open letter to the editor of The Village Voice clearly showing how Levin “shielded” General Myers from critical questions from other panel members. General Myers appeared to be bumbling, unsure and could barely remember his name. But it was not a question of nervousness. Myers is not a delicate wall-flower but approved as one of the most capable men in the US military. Therefore, this was a case of intentional and disingenuous stalling fully aware of the stakes at hand. Valentine notes the discrepancy in her own forthright and humorous way:

Note how Levin jumped in to save Myers from Senator Nelson’s pointed questions getting at the heart of the matter of “what happened to the response of the defense establishment,” of WHAT THE HELL HAPPENED THAT THE MILITARY SUCKED EGGS FOR 40 MINUTES AFTER TOWER TWO WAS HIT LETTING THE PENTAGON EVENT HAPPEN. Levin very cleverly takes over the conversation — gets Myers off the spot — and diverts everything onto the trivial small picture detail question of the time of specific phone calls from Specific agencies — rather than the all-important broad system questions Nelson was going for. In fact, Levin, thinking that he was quicker than Myers, here jumped in with an answer that Myers could use to evade the really important and critical questions of Sen. Nelson. […] Senator Levin, you would not have jumped in with that remark if you were at all interested in getting to the bottom of the mystery of the 40 minute failure of the Air Force to intercept a plane attacking the Pentagon in Washington D.C. [19]

The dialogue effectively saved Myers from any more nonsensical blustering with Senator Levin’s remark drawing a line under any more questioning: “And in any event, but more important, if you could get us that information.” The subject of why jets were not scrambled; who phoned whom and when, and why NORAD did nothing as two jet-airliners cruised into the Twin Towers obviously wasn’t of sufficient importance for Myers to remember the basic facts. He was allowed to march happily away and criminality was set free. Needless to say, no other information was ever forthcoming, thanks to Levin.

Richard_Myers_official_portrait_2

Richard Bowman Myers, Chairman of the Joint Chiefs of Staff, in September 2002.

The fact that General Myers’ behaviour was so odd and the whole committee meeting a waste of time prompted another cardboard cut-out, military brass-tack to be shoved into the spot-light to provide a get-out clause for all the non-answers.

Lieutenant-General Ken Pennie, the French-Canadian second-in-command of the North American Aerospace Defence Command, suspected “… there might have been more than just the four aircraft involved.” Suspicions were drawn from the fact that: “… passengers left a grounded plane on Sept. 11, somewhere in North America.” And could the good Lieutenant-General provide the committee with answers as how 40 minutes of thumb-twiddling preceded two jet-airliners crashing into what should have been the most heavily defended location on globe? The General too, it seems, thought this quite normal stating: “From our perception, we think our reaction on that day was sufficiently quick that we may well have precluded at least one other hijacking. We may not have. We don’t know for sure.” [20]

One thing of which we can be sure, those “perceptions” didn’t include anything approaching the facts at the time of the attacks nor in front of the committee, which made the General’s testimony of no use at all. This may have been the real goal. But Pennie made another blunder. If, as the General mentioned: “In the minutes after the Sept. 11 attacks, control of the continent’s airspace was turned over to NORAD” and the last attack occurred at 9:38am, then as Valentine points out: “… it means NORAD did not respond until after the last hit, until after 9:38 a.m. Ahhh, so that means… Oui? Lt. Gen. Pennie thus contradicts American generals Myers and Eberhart. The operations officer at the time that control of North America’s airspace was transferred to NORAD happened to be a Canadian naval captain, Gen. Pennie said.” [21]

What was a Canadian Naval Captain doing responding to an air attack on the United States? The General wasn’t there just to look after his own skin but follow the implicit cues from Carl Levin, General  Myers and Ralph Eberhart.

Let us also remember that it was Senator Levin and co-conspirator John McCain who were given the job of drafting the National Defence Authorization Act bill, (NDAA) which permits the worldwide provision of indefinite detention without charge or trial of those far from any battlefield. The bill was passed in a closed-door committee meeting, without a single hearing. This gives us some idea as to whom such a bill would benefit: exactly the players who pulled off 9/11. [22] McCain’s lobbying companion Chabad-Zionist Joe Lieberman – who thankfully retired the Democratic party at the end of 2012 – is a supporter of the Iraq war and like all Likud accolytes, has urged action against Iran. Vehemently opposed to freedom of speech and any form of dissent, equating it with “terrorism” and drafting bills to hack away citizens’ rights, Lieberman was also famous for ordering search engine giant Google to flag blogs with a “terrorist content” icon. [23] Not content with supporting warrantless spy-tapping against American citizens, during a July 2012 press conference on Capitol Hill, Lieberman: “…urged fellow lawmakers to pass his Internet spying bill in order to prevent what he dubbed ‘a cyber 9/11 or a 9/11 Pearl Harbour.’” [24]

Joe Lieberman

Joe Lieberman

Where have we heard that before?

It was the actions of Levin and NORAD which prompted panel members Thomas Kean and Lee Hamilton to begin to question the whole premise of the 9/11 Commission Report. Kean stated: “We to this day don’t know why NORAD told us what they told us, it was just so far from the truth.” [25] Whilst senior counsel to the Report John Farmer, Jr. supported the misgivings of his colleagues going further by stating that “… what government and military officials had told Congress, the Commission, the media, and the public about who knew what when—was almost entirely, and inexplicably, untrue.” Farmer believed that “… the (NORAD) tapes told a radically different story from what had been told to us and the public.” [26]

Zionist appointees were scattered all over 9/11 panels, commissions and committees which sprang up immediately after the attacks, so it is not surprising that the heat remained directed toward Osama Bin Laden, Al-Qaeda and later the less than innocent Saudi Royal family. Meanwhile, Zionists and their relgious fanatics on the Chabad and Evangelical divide provide the perfect cover.

Continued…


Notes

[1] ‘Hugo Neu and the Giuliani Partners Who Destroyed the Steel of 9/11’ By Christopher Bollyn, April 18, 2011 |www.bollyn.com
[2] Ibid.
[3] Ibid.
[4] ‘Leaderless and Clueless: America Heads for the Trash Can of History’ By Paul Craig Roberts, Information Clearing House, November 28, 2007.
[5] Ibid.
[6] Governor George Pataki, Acting governor Di Francesco Laud Historic Port Authority Agreement to Privatize World trade Center, The Port Authority of New York and New Jersey, Jul 24, 2001, Press Release Number: 101-2001. http://www.panynj.gov/
[7] ‘Estee’s son and heir on the scent of a new life’ Daily Mail, March 14, 2006.
[8] Lecture Summary, 7th Conference 2007, Amb. Ronald S. Lauder, Founder, Lauder School of Government, Diplomacy and Strategy, IDC Herzliya. | http://www.herzliyaconference.org.
[9] ‘Cosmetics Magnate Inaugurates Vienna’s Only Jewish University’ By Shmulik Laster, http://www.chabad.org October 29, 2007.
[10] ‘Israeli Spies: ‘Mega Was Not An Agent; Mega Was the Boss’’by Jeffrey Steinberg, Aug. 31, 2001 issue of Executive Intelligence Review.
[11] ‘Kugel Eaters’ By Israel Shamir, May 6, http://www.mediamonitors.net
[12] Ibid.
[13] http://www.portal.idc.ac.il/
[14] ‘Mossad – The Israeli Connection To 9/11’ By Christopher Bollyn, Exclusive to American Free Press April 14 2005.
[15] Ibid.
[16] Ibid.
[17] ‘Senator Carl Levin’s,Arlen Specter’s ‘Naked Short Fannie Mae Theory’ vs JFK ‘Magic Bullet’ Assassination Theory’ by Tony Ryals, Philidelphia Independent Media Centre, August 20, 2009.
[18] ‘Senator Carl Levin, NORAD, and Chabad Lubavitch’ by Carol A. Valentine, President, Public Action, Inc. http://www.Public-Action.com June 15, 2002.
[19] Ibid.
[20] ‘General suspects Sept. 11 plot was wider’ By Tu Thanhha, Montreal, Globe and Mail, Jun. 13 2002 / Apr. 22 2009.
[21] op. cit Valentine.
[22] “On December 31, 2011, President Obama signed the National Defense Authorization Act (NDAA), codifying indefinite military detention without charge or trial into law for the first time in American history. The NDAA’s dangerous detention provisions would authorize the president — and all future presidents — to order the military to pick up and indefinitely imprison people captured anywhere in the world, far from any battlefield.” http://www.aclu.org/blog/tag/ndaa
[23] ‘Joe Lieberman Wants Terrorist Labels on Blogs’ http://www.unelected.org | http://www.unelected.org/joe-lieberman-wants-terrorist-label-on-blogs
[24] ‘Lieberman claims his Internet spying bill would prevent ‘a 9/11 Pearl Harbor’’ By Stephen C. Webster, The Raw Story, July 24, 2012.
[25] The Ground Truth: The Untold Story of America Under Attack on 9/11. By John Famer Jr.; Published by Riverhead Books. 2009. | ISBN 1-59448-894 (intro).
[26] Ibid. (p. 261) | ‘The Ground Truth’. By Harry Levins, St. Louis Post-Dispatch, September 6, 2009.

Chabadniks, Zionists & 9/11 Insiders (1)

By M.K. Styllinski

“To learn who rules over you simply find out who you are not allowed to criticise.”

– Voltaire


We have explored the influences of Dominionism and Authoritarianism in the United States, and there was also a brief look at  the powerful Jewish sect of Chabad Lubavitch presently embedded in Europe, the US government and part of the rising tide of religious extremism currently jostling for supremacy. Lubavitchers – or Chabadniks – draw their beliefs from the teachings of the Babylonian Talmud and other classical works of Judaism with a strong emphasis on apocalyptic redemption which they hope will pave the way for a distinctly Jewish theocratic World Order. Recall that many high-level US officials are still keen supporters of Chabad Lubavitch such as Paul Wolfowitz, Senator Joseph Lieberman, Senator / retired General Carl Levin, and Orthodox Jewish rabbi Dov Zakheim whom we met previously.

On March 11, 2002, Zakheim gathered with over 500 emissaries of Chabad from all corners of the world in order to celebrate the birthday of the late Rabbi Menachem Mendel Schneerson, the spiritual guru of Chabad. The big bash took place just opposite the Pentagon 9/11 crash site. Considering what we have discovered so far about Chabad Lubavitch and Zionism it is more than a little ironic that there was a party for a guru who extolled the virtues of a messianic Jewish theocracy hosted by insider Dov Zakheim who had managed to furnish Israel with more weapons than any other Jewish individual in the history of arms brokering. As Journalist and historian Caroline A. Valentine observes: “Islam is the most vigorous religious rival to Judaism. How does the ‘peace for Israel’ sung about in ‘Oseh Shalom’ relate to 9-11? Think back to the massive slaughter of Palestinians (and other Muslims) Israel has been able to effect since 9/11. There is no sweeter peace to be found than at the graveyard of one’s enemy …”  [1]

Let’s just remind ourselves of the nature of the “spirituality” being taught by Rabbi Menachem Mendel Schneerson whose beliefs remained consistent throughout his long life and which gave rise to the official Lubavitch-Hassidic doctrine so prominent in US politics and Chabad centres round the world. In his book Gatherings of Conversations (1965) we get to read exactly what the Rabbi believed.

The “Great Rebbe” states:

The difference between a Jewish and a non-Jewish person stems from the common expression: ‘Let us differentiate.’

index

Rabbi Menachem Mendel Schneerson

Thus, we do not have a case of profound change in which a person is merely on a superior level. Rather, we have a case of ‘let us differentiate’ between totally different species.

This is what needs to be said about the body: the body of a Jewish person is of a totally different quality from the body of [members] of all nations of the world…

…An even greater difference exists in regard to the soul. Two contrary types of soul exist, a non-Jewish soul comes from three satanic spheres, while the Jewish soul stems from holiness.

We therefore ask: Why should a non-Jew be punished if he kills even a non-Jewish embryo while a Jew should not be punished even if he kills a Jewish embryo? The answer can be understood by [considering] the general difference between Jews and non-Jews: A Jew was not created as a means for some [other] purpose; he himself is the purpose, since the substance of all [divine] emanations was created only to serve the Jews.” [2] [Emphasis mine]

There is little doubt that the vast majority of Jews have no idea what this man has been saying on their behalf. Yet, further analysis of these statements isn’t necessary since anyone who is able to to think rationally can see that the above takes the notion of Jewish tribal exclusivity and supremacy to new heights, specifically mentioning that anyone who isn’t Jewish naturally has one’s spiritual origins in “satanic spheres”. It will become apparent just how serious these statements are as we proceed.

In 1995, a year after the death of Schneerson the yearly commemorations took off with a posthumous award by Congress: the Congressional Gold Medal, the highest honour possible for a civilian in the United States. The Baltimore Jewish Times, (who it seems, were equally perplexed) reported: “More than a year of intensive lobbying by Chabad forces generated some 225 House co-sponsors of the authorizing legislation” which made it possible for Schneerson to become the first religious leader to be the recipient of the coveted award. Furthermore, it seems the lobbying had a financial incentive whereby: “Copies of the gold medal — which was underwritten by donations from admirers of Rabbi Schneerson — are being sold by the Treasury Department. According to Washington sources, that could be a big money-maker for the federal government.” [3]

Michael_Chertoff,_official_DHS_photo_portrait,_2007

Michael Chertoff, Homeland Security Chief, circa 2007.

In 2006, Chabad Lubavitch supporters and Zio-Conservative Michael Chertoff, then Homeland Security secretary and Joshua Bolton, the White House chief of staff had high-level talks with Chabad emissaries during a two-day commemoration of the 12th anniversary of Rabbi Menachem Mendel Schneerson’s death. Bolton and other White House officials “… assured Chabad representatives that President Bush would never force Israel to concede territory to the Palestinians without a quid pro quo,”… where Bolton admitted that: “Bush would follow Israeli Prime Minister Ehud Olmert’s lead in deciding what concessions to support.” [4] Since Olmert is a militant Zionist that wouldn’t give Palestinians much to hope for. One might also ask the question right there: if the preceding information wasn’t known, how it is that that an honour of this kind can be given to Schneerson who presided over a sect that is evidently, at its root, one of the most racist and fascist movements on the planet?

The only change which has occurred under Barack Obama is that Chabad Lubavitch has grown stronger.

The American Friends of Lubavitch (AFL) was set up by leading Chabad-Lubavitch Rabbi Abraham Shemtov, one of the closest aides to the late Menachem Mendel Schneerson. Shemtov’s interests are adopted by the National Security Council and the State Department in that he has regular access and contact with a few dozen ambassadors. [5] It is ostensibly a humanitarian, educational and Jewish facilitation hub, but in reality, it is a Chabad indoctrination outfit extending deep into the heart of international politics with its: “… 3000 affiliated centres across the country and around the world,” and where:“… requests for assistance from the Washington Office arrive in a steady stream, often urgent in nature.”  [6]

This urgency takes on new meaning when we recognise how much influence Israeli lobby groups an religious organisations have over American politics. If we are to believe the “Great Rebbe” Schneerson is revered as the New Jewish Messiah, then it is his doctrine that pervades Chabad Lubavitch’s religious imperative as the following statement by a Lubavitcher confirms:

“Our supreme obligation is to submit to the orders. Only later on we can ask for explanations. As was said at the Sinai mountain, we will do and then listen. […] Today, we should insist and demand and not to ask and try to convince or negotiate, but demand. Demand as much as it is possible to obtain, and the most difficult part is, everything that is possible to obtain, the more the better.”  [7]

In June 2012, the lobbying continued under the AFL conference named “The Living Legacy” which saw Congressional leaders and top Obama administration officials rubbing shoulders with “… several hundred Chabad emissaries from across the United States.” Rep. Eric Cantor (R-Va.), the majority leader in the US House of Representatives, Rep. Steny Hoyer (D-Md.), the House minority whip; lawmakers such as Jeremy Bash, the Chief of Staff to Defence Secretary Leon Panetta; Bruce Reed, Vice President Joe Biden’s chief were all in attendance and dolling out the required applause. [8] Most importantly, all this socialising was to make sure that the US administration kept the “… bipartisan commitment to the US-Israel relationship” firmly handcuffed to fiscal policy and the need to keep that money flowing. [9]

Rabbi_Abraham_Shemtov

Rabbi Abraham Shemtov speaks to supporters at the Hilton New York. (wikipedia)

In September 2001, Chabad Lubavitch already had its supporters in politics way before Bush or Obama and who may have proven to be crucial lynchpins in the 9/11 cover up. Remember Larry Silverstein, owner of Silverstein Properties, most of the World Trade Centre and close friend of Benjamin Netanyahu? Like Bibi, presently gunning for a conflagration with Iran as per Lubavitch prophecy, it seems Silverstein is also a closet Lubavitcher, at least when it benefits his financial goals. If Jewish businessmen and Chabad supporters suffered during 9/11 and the 2008 crash, after his billion dollar pay-out, Larry was certainly not amongst them. Nonetheless, never one to turn down a freebie, he turned up for some kosher nibbles at the Chabad House on Wall St. run by Rabbi Katz and his wife Rachel who, according to Chabad Lubavitch’s official website: “… maintains a dawn to midnight schedule of classes and tefillin regulars in some of New York City’s most high-powered corner offices. His Chanukah menorah lighting venues have become something of a legend.” Before 9/11, Rabbi Katz invited Silverstein to light the Chabad Wall St. Menorah (which must have been the most supremely ironic moment, even for Larry). This was followed by many other prominent Wall St. big-wigs showing their support for Chabad such as philanthropist George Rohr in the New York Stock Exchange boardroom and NYC Mayor Michael Bloomberg who hosted a menorah lighting ceremony in 2007.  [10]

Silverstein is just one part of a substantial network of Zionist-Lubavitcher businessmen who may have enabled the corporate-logistical elements of the 9/11 attacks to take place. They represent the “asset assistance” group for Zionist operations. Frank Lowy owner of Westfield America, one of the biggest shopping mall conglomerates in the world; Ronald Lauder of Estée Lauder fame and Lewis Eisenberg who was the Chairman of the Port Authority of New York and New Jersey during the attack on the World Trade Centre – all feature as businessmen whose wealth has been put to great use for the Chabad-Zionist cause in America.

FrankLowy

Frank Lowy 2011 (wikipedia)

Ranked as #2 in Forbes.com’s list of Australia and NZ’s richest individuals, ex-Goldman Sacs Lowy, partnered Silverstein in the 99 year leasing arrangement and rented a shopping concourse area called the Mall at the WTC. Made up of approximately 427,000 square feet of retail floor space it was just one in a number of retail outlets based in the US and Australasia. Bull-horned in one of their own press releases, Westfield America assets is: “… worth $59 billion, representing 124 shopping centres in four countries with over 10 million square meters of retail space. It is the world’s largest retail property group by equity market capitalization”. [11] Nothing unusual there, but it takes on a slightly different hue when we realise Lowy was also a member of the Jewish terrorist group Haganah and fought in the Israeli war of independence as a member of the Golani Brigade, one of the most highly decorated infantry units in the Israel Defence Forces – and the most questionable when it comes to Zionist fanaticism. [12]

With a military-corporate history like Lowy’s it will not come as a shock that he has fingers in both banking and politics. Having immigrated to Australia in the 1950s where he became chums with another tycoon Zionist Rupert Murdoch, he has been moving in banking circles for decades ending up on the board of Australia’s central bank, the Reserve Bank of Australia, which are effectively Australia’s Federal Reserve System and issuer of Australian dollars. Founded with his own money Lowy presides over the Israeli Institute for National Strategy and Policy, based at Tel Aviv University in Israel, an extension of the kind of academic Zionism that Richard Perle and Paul Wolfowitz would appreciate. Spending a few months of the year in Israel it gives him time to catch up with old friends which used to include Ariel Sharon and now Benyamin Netanyahu, Ehud Barak and Ehud Olmert, all of whom are Chabad supporters and right-wing Likud Party militants. It was Avinoam Brog, Barak’s brother, who told the Sydney Morning Herald that Lowy’s “influence is such that if he wanted to talk to any politician in Israel, then he could. And they will listen.”  [13]

While Lowy has kept a very low profile indeed in relation to his involvement with 9/11 he has been busy behind the scenes in gathering together those that would have benefited from the attacks. The Lowy Institute for International policy is another “who’s who” of Zio-Conservatives, military intelligence, banking, corporate directors CEOs and Elite families coming together to direct global policy from an Australian perspective. It is the Asian stronghold of Brezezinskian economics. The RAND corporation, Brookings Institute, JP Morgan, Chevron, former Goldman Sacs executives and Homeland Security officials – they’re all there and more besides. [14] Most notably, Martin Indyk, former US Ambassador to Israel, President and Director of the Foreign Policy Program at the pro-Israel Brookings Institution in Washington D.C. Indyk’s right to use classified information was re-instated by then Secretary of State Madeline Albright in 2000 citing the turmoil in Israel and the Gaza Strip and “…for compelling national security reasons.” Nonetheless, the FBI still considers Indyk to be one of the prime suspects in the hunt for the Israeli spy known as “Mega.”  [15]  [16]

Assuming that the hunt wasn’t compromised from the start…

Martin_Indyk_2

Martin Indyk

But should there be any PR problems then Likud supporter and media mogul Zionist Rupert Murdoch is always on hand. He has been associated with all three men and the recipient of awards from the ADL, the United Jewish Appeal (UJA), and the New York-based Museum of Jewish Heritage, mostly due to the substantial donations he has given to the organisations over the years.

Investigative journalist Christopher Bollyn quoted Sam Kiley, veteran journalist on the Middle East for the London Times who wrote about the mogul’s involvement of the newspaper:

“‘Murdoch is a close friend of Ariel Sharon.’ Kiley said Murdoch’s friendship with Sharon, led senior staff at the paper to rewrite important copy. ‘Murdoch’s executives were so afraid of irritating him that, when I pulled off a little scoop of tracking down and photographing the unit in the Israeli army that killed Mohammed al-Durrah, the 12-year-old boy whose death was captured on film and became the iconic image of the conflict, I was asked to file the piece ‘without mentioning the dead kid,’ ” Kiley wrote. “After that conversation, I was left wordless, so I quit.’  [17]

The visit with Sharon included a trip for Murdoch and his editors from New York and London that ‘took them on a bird’s-eye tour of Israel aboard a helicopter gunship, flying over the Golan Heights, West Bank and settlements.’” 

ARIEL-SHARON_R-MURDOCH

The late Ariel Sharon (left) and media tycoon Rupert Murdoch were close friends

Like Lowy, another employee on the Goldman Sacs cartel conveyor belt and currently working as a senior adviser at a private equity firm, Lewis M. Eisenberg is an ardent Zionist and member of the planning board of the United Jewish Federation pro-Israeli pressure group. A financial supporter of the Bush-Cheney campaign and Dov Zakheim’s 2012 presidential candidate Mitt Romney, Eisenberg is your classic PNAC, Zio-Conservative and Wall St. predator. He believes that bankers have had a hard rap and unfairly “demonised” which should give you some idea as to where his loyalties lie. [18]

The crucial role that Eisenberg played as New York Port Authority Chairman was to make sure that Silverstein Properties had an exclusive deal on the 99 year-old lease for the WTC, dropping at the last minute a higher bid from opposing company Vornado Realty Trust and imposing a news blackout to safeguard discussions. He managed to give his view immediately after the 9/11 attacks claiming: “I just saw my two towers fall. I’m devastated beyond belief. In many respects this is significantly worse than Pearl Harbor, and we don’t know who the enemy is.” [19]

An early example of the Pearl Harbour script once again…

Lewis Eisenberg former Chairman of the Port Authority of NY/NJ, Chairman at the time of the September 11, 2001 attack of the World Trade Centre. More importantly, he was man repsonsible for transferring the lease for World Trade Center to Larry Silverstein.

Lewis Eisenberg former Chairman of the Port Authority of NY/NJ, Chairman at the time of the September 11, 2001 attack of the World Trade Centre.

How devastating could it really be when Governor George Pataki appointed yet another Goldman Sacs chief John Whitehead in 2001 as chairman of the Lower Manhattan Redevelopment Corp., who then received a $2 billion of New York’s $8.2 billion federal aid? It was obvious from the start the rebuilding of lower Manhattan was a lucrative exercise for the Zionist tag teams, much to the dismay of civic groups, and the families of victims and survivors of the attack. Understandably, they thought Silverstein wanted to avoid their own development plan which may have limited his profits.

When Silverstein went ahead and begin construction on the site of WTC Building 7 in July of 2002, Eisenberg was appointed head of the LNRC in order to keep things in the family. [20] (It is also interesting to note that on Sep 10, 2001, the Tokyo branch of Goldman Sachs warned its American employees to steer clear of American buildings). MOSSAD explosives experts were crawling all over the site immediately after the destruction of the Twin Towers. Was the security management of the WTC complex designed to be in the hands of the controllers who could then allow access to all necessary areas of the WTC complex for preparation?

The attempt to gain control of the New York Port Authority (PA) had been an on-going project since at least the 1980s. Recalling Isser Harel’s “prescient” prediction in 1979, it was just seven years later that would see an intelligence team of senior agents – who had worked directly under Harel for decades – obtain the security contract for the Port Authority of New York. That company was Atwell Security from Tel Aviv. It was not to last however, when Edward J. O’Sullivan, director of the Office of Special Plans at the Port Authority of New York and New Jersey, cancelled the contract shortly thereafter when it was discovered that it was merely a front for the MOSSAD. [21] Even before the contract had been awarded, most of the board of directors of the PA were Jewish with Zionist affiliations.

The late Peter “Zvi” Malkin was the security consultant and intermediary between Atwell Security and the PA, negotiating on the company’s behalf. Malkin had long been known as an Israeli intelligence officer famous for kidnapping notorious Nazi Adolf Eichmann from Argentina in 1960. Bollyn surmises that: “Malkin’s artist disguise is probably the inspiration for the ‘art student’ operation to infiltrate DEA offices in 2001. … Michael Chertoff’s mother, Livia Eisen, one of the first MOSSAD agents, owned an art gallery in Elizabeth, New Jersey, when Malkin was posing as a painter in nearby New York”. [22]

Like so many Zionists involved in PA security and transport infrastructure, PA executive director Stephen Berger and later Stanley Brezenoff, (1990-1995) Deputy Mayor for Operations and First Deputy Mayor under Mayor Edward Irving Koch, must have been fully aware of Malkin’s background and Atwell Security’s history but allowed the contract through, nonetheless.

greenberg1

Maurice “Hank” Greenberg

The recipient of millions of dollars of taxpayer’s money for the bailout scam before it was sacrificed, AIG Corporation and its CEO Maurice “Hank” Greenberg joined forces with Silverstein buddy Israeli intelligence spook Jules Kroll and his investigative and security consulting firm Kroll Inc., becoming partner and co-owner in 1993. This took place prior to Greenberg forming a joint venture with the owner of MOSSAD run Amdocs telecommunications and provider of White House tele-software. [23] Greenberg is up to his neck in Chabad, Zionist and Israeli intelligence friends including Henry Kissinger who sat on the board of AIG and MOSSAD agent Shaul Eisenberg who had been responsible for the Asian division of Israel’s intel operations. He was also the owner of Atwell Security.

kroll1

Jules Kroll

Kroll Associates have many friendships and business connections, all of whom have links to Zionist think-tanks, Israeli intelligence fronts and Jewish organisations, in turn leading back to the Goldman Sacs cartel. It has thus been described as a “private CIA.” [24] Which makes it all the more suspect when, following the 1993 World Trade Centre bombing, Jules & Jeremy Kroll of Kroll Inc. was asked by the New York Port Authority to help design new security measures for the WTC complex paying them $2.5 million for the privilege. (Shades of the Silverstein formula?) Included in this massive overhaul was an extensive analysis of future terrorist threats and how they might be addressed, with assessments concluding that a second terrorist attack against the WTC was probable. Even more incredible, is the specific citing of terrorists deliberately flying a plane into the WTC towers.  [25]

John_O'Neill

John O’Neill, former New York FBI Counter terror chief responsible for the investigation into Osama bin Laden.

The managing director of Kroll at the time was militant Zionist Jerome M. Hauer who just happened to be the candidate chosen to run Mayor Rudy Giuliani’s office of emergency management (OEM) from 1996 to 2000. It was here that former FBI chief of counterterrorism and specialist on Al-Qaeda and Osama Bin Laden John O’Neill was invited by Hauer, then Managing director of the Kroll security, to be head of security for the World Trade Centre.

What makes this even more curious is that O’Neill was: 

“… Not only the world’s leading expert on bin Laden, but he was also regarded as a ‘loose cannon’, because of his record of working outside normal channels when normal channels were ‘blocked’. He knew FBI investigations into bin Laden and al-Q’aeda had been shut down in the summer of 2001 and it is extremely unlikely that he would have remained quiet about it. He also knew whether or not Osama bin Laden was capable of inflicting the amount of damage the US suffered on 9/11. In other words, if the conspirators were hoping to spread a Big Lie about Osama bin Laden, they would have had a short list of things they absolutely had to do.

Surely, one of the items on that list would be to silence John O’Neill.  And what better way than to entomb him at the scene of the crime?  [26]

O’Neill’s investigations into the roots of the 1993 World Trade Centre bombing, the 1996 Khobar Towers bombing in Saudi Arabia and the 2000 USS Cole bombing in Yemen – proven to have been carried out by MOSSAD – all led him into serious confrontations with the FBI and federal government. He was sacked from the Bureau in 2001 and by the end of the year he was dead, killed on his first day at work on September 11th. O’Neill is memorialised at the North Pool, on Panel N-63.

Not only was Hauer responsible for placing O’Neill in his own forensic crime scene and thus getting rid of a major detractor of the official story, he managed to be an “expert” on that official story even before it was public knowledge. On the morning of September 11th, 2001 Hauer read the same script to anchor man Dan Rather on CBS News, dutifully remembered though nervously imparted:

Dan Rather: Based on what you know, and I recognize we’re dealing with so few facts, is it possible that just a plane crash could have collapsed these buildings, or would it have required the, sort of, prior positioning of other explosives in the, uh, in the buildings? I mean, what do you think?

images

Jerome M. Hauer

Jerome Hauer: No, I, uh, my sense is just the velocity of the plane and the fact that you have a plane filled with fuel hitting that building, uh, that burned, uh, the velocity of that plane, uh, certainly, uh, uh, had an impact on the structure itself, and then the fact that it burned and you had that intense heat, uh, probably weakened the structure as well, uh, and I think it, uh, was, uh, simply the, uh, the planes hitting the buildings, and, and causing the collapse.

Dan Rather: What perspective can you give us? I mean, there have been these repeated reports that, well, yes, Osama Bin Laden, but some think he’s been over-emphasized as, as responsible for these kinds of events. I know many intelligence, uh, people at very high levels who say, listen, you can’t have these kinds of attacks without having some state, Iraq, Iran, Libya, Syria, somebody involved. Put that into perspective for us.

Jerome Hauer: Yeah, well I’m not sure I agree that, umm, this is necessarily state-sponsored. Umm, it, as I mentioned earlier, certainly has, umm, the, uh, fingerprints of somebody like Bin Laden.  [27]

A fairly shoddy example of the “Arabs-did-it” script backed up with the official story even before most people had barely the time to process these events. All presented by non-expert Hauer for prime-time TV.  After being brainwashed by these associations, what the public didn’t know was that Hauer was introduced to TV audiences as a former director of NYC’s Office of Emergency management (OEM). In fact, he was the managing director of the security company responsible for the Twin Towers.

Now, that would have been interesting to know.

Two months later, along with “peace” experts like Henry Kissinger, Jerome Hauer went on to capitalise on the all-knowing, all-seeing nature of his expertise by participating in the CFR sponsored white paper called “Independent Task Force on America’s Response to Terrorism.”

Their objectives were to explain:

“…our goals and rationale for the war in Afghanistan, and [outline] the evidence that the Al-Qaeda network was responsible for the 9/11 attacks; disseminate stories of particular victims to convey the range of people killed in the 9/11 attacks — stress range of religions, races, income levels, etc.; counteract [the] myth that Mossad was behind the attacks by showing Jews killed, etc.” and “Routinely monitor the regional press in real time to enable prompt responses.”

They did a fine job. We never hear any mention of Israel and 9/11 in the same sentence. And thanks to the ADL, B’Rin B’Raith and AIPAC, the spectre of anti-Semitism accusations and expert propaganda is a tight nut to unscrew.

 


Notes

[1] ‘Senator Carl Levin, NORAD, and Chabad Lubavitch’ by Carol A. Valentine, President, Public Action, Inc.
http://www.Public-Action.com June, 2002.
[2] The Lubavitcher Rebbe, Rabbi Menachem Mendel Schneerson quoted from pp.58-62; Jewish Fundamentalism in Israel by Israel Shahak and Norton Mezvinsky Published by Pluto Press, 1999.
[3] ‘Washington Honors Lubavitcher Rabbi,’ By James Besser, Baltimore Jewish Times, June 6, 1995, p.32.
[4] ‘White House to Chabad: Bush won’t press Israel.’ Jewish Telegraph Agency (JTA) June 27, 2006.
[5] The Jerusalem Post October 22, 2000.
[6] http://www.afldc.org/
[7] The Man and Century Lubavitcher Rebbe Menachem Mendel Schneerson
[8] ‘Chabad emissaries meet with lawmakers, Obama officials’ – The keynote speech was by Talmud scholar Rabbi Adin Steinsaltz., The Times of Israel, June 25, 2012.
[9] Ibid.
[10] ‘Chabad of Wall Street Moves On, Does Not Forget 9/11’ by R. C. Berman – NYC, NY, September 10, 2008, Chabad Lubavitch World HQ, http://www.lubavitch.com
[11] ‘The Westfield Group’s shopping centre portfolio is one of the largest in the world.” (Press release). Westfield Group. 20 August 2011.
[12] “Following the deployment of Golani soldiers in Hebron in December 2011, it has been reported that city residents have sensed a ‘manifest worsening of soldiers behavior’, as a result of ‘detention, intimidation, provocation and arrest of children and teenagers; arbitrary detention of Palestinians or blocking access to roads; beating or threatened beating of detained residents; religion-based provocation and insults; forcible entry into homes and violation of Palestinian property’ and ‘reprisals against local and international human rights activists.’” – ‘IDF brigade leaves an impression in Hebron’. Haaretz, By Amira Hass, Feb.13, 2012.
[13] ‘The quiet benefactor: Lowy’s close ties with Israel’ The Sydney Morning Herald, September 29, 2008.
|www.smh.com.au/business/the-quiet-benefactor-lowys-close-ties-with-israel-20080928-4ppd.html#ixzz2OI5bT7vW
[14] http://www.lowyinstitute.org/
[15] ‘U.S. Envoy to Israel Regains Clearance–for Duration of Crisis’ By Norman Kempster, Los Angeles Times, October 11, 2000
[16] ‘Israeli Spies: ‘Mega Was Not An Agent; Mega Was the Boss’ by Jeffrey Steinberg EIR, August 31 2001.
[17] ‘Media Mogul’s Sinister Links to September 11: The Aussie Connection’ to – Exclusive to American Free Press, By Christopher Bollyn, americanfreepress.com July 10, 2003.
[18] ‘Lewis Eisenberg, Major Romney Donor, Accuses Obama Of Demonizing Wall Street’ (video) Huffington Post
[19] ‘World Trade Center Deal Remains in Doubt’ By Charles V. Bagli, The New York Times, March 17, 2001.
[20] ‘Downtown Renewal Head Vows Independent Effort’ By Charles V. Bagli, The New York Times, December 20, 2001 | ‘Developer’s Pace at 7 World Trade Center Upsets Some’ By Charles V. Bagli, The New York Times, January 31, 2002.
[21] op. cit. Bollyn.
[22] p.156; Solving 9/11: The Deception that Changed the World. By Christopher Lee Bollyn. Published by Christopher Bollyn, 2012.
[23] Extract from Christopher Bollyn’s 2012 book: Solving 9-11: The Deception that Changed the World showing the dizzying connections of financial benefits accrued by the Kroll family prior to, during and after the events of 9/11:
• Maurice Greenberg and Jules Kroll became partners in 1993, the same year Kroll Associates “was chosen over three other companies to advise the Port Authority on a redesign of its security procedures.” “We have such confidence in them that I have followed every one of their recommendations,” Stanley Brezenoff, the Port Authority executive director, told the New York Times in 1994.
• Kroll controlled security at the World Trade Center complex in 2001 and was responsible for hiring John O’Neill, the former chief of counterterrorism for the FBI, who died on 9/11, reportedly his first day on the new job.
• Jerome M. Hauer, the former director of Mayor Giuliani’s Office of Emergency Management, was responsible for having the command bunker built in Larry Silverstein’s WTC 7. Hauer was a managing director for Kroll in 2001.
• Kroll revamped security at the World Trade Center after the 1993 terrorist bombing. Kroll was reportedly responsible for security at the World Trade Center on 9/11. “Over the last two years, the Port Authority of New York and New Jersey has paid Kroll $2.5 million to overhaul security at the World Trade Center and evaluate procedures at the agency’s bridges, tunnels and airports,” the New York Times reported on September 1, 1994.
• Kroll was hired by Kuwait in October 1990 to find the hidden wealth of Saddam Hussein.
• Kroll began profiting from the war in Iraq in April 2003 when it received contracts to provide protection and security for government agencies and companies in Iraq.
• Jeremy Kroll serves on the board of the Israel-based Challenge Fund with Israeli government officials from the highest level, including Israel’s National Security Advisor and Head of the National Security Council, a former head of Shin Bet, former Directors General of the Ministries of Foreign Affairs and Defense, former Commanders of the Israel Air Force, Central Command, and the Technology and Logistic Branch of the IDF, as well as the head of Boeing (Israel) and the son of Yitzhak Shamir. The Challenge Fund uses money raised through the Bronfman and Andreas (ADM) families to fund Israeli companies, like ViryaNet.
[24] op.cit Bollyn
[25] ‘The Secret Keeper: Jules Kroll and the world of corporate intelligence.’ by William Finnegan. The New Yorker, October 19, 2009. /www.newyorker.com/
[26] op. cit. Bollyn.
[27] ‘Meet Jerome Hauer, 9/11 Suspect Awaiting Indictment’ February 26, 2007 http://www.winterpatriot.com

Osama and Al-Qaeda IV: The Bogeyman

“I have already said that I am not involved in the 11 September attacks in the United States. As a Muslim, I try my best to avoid telling a lie. I had no knowledge of these attacks, nor do I consider the killing of innocent women, children and other humans as an appreciable act.”

– Osama bin Laden, October, 2001.


The hunt for Osama Bin Laden cost the US government about the same amount of time and money it took to send men to the moon: ten years and $100 billion. But for some, this is a conservative estimate with more probable figures reaching as high as a trillion dollars. [1] This makes the behaviour of successive US administrations even more inexplicable until that is you accept the high probability that Osama bin Laden – the former CIA asset in 1980s Afghanistan and whose oil-banking family did business with the Bush dynasty – almost certainly died in the latter half of September 2001 from kidney failure. [2] There was even a funeral announcement published in the December 26, 2001 in an edition of the Egyptian newspaper Al Wafdeven.  

Though clearly a faithful of supporter of a Holy War against the United States and Zionism he did not take responsibility for the September 11th attacks, and actually expressed contempt toward the actions of whoever did perpetrate the atrocity. As a follower of Qutbism, a violent resistance against what he saw as the moral and spiritual decadence of the United States was unavoidable in order to be true to the tenets of Islam. This did not however extend to civilians, the deaths of which are traditionally a state-sponsored action to gain needed emotional ammunition from its population.

113634012-HOsama bin Laden: CIA asset that was setup?

In a rare interview, in all probability shortly before his death, bin Laden stated:

I have already said that I am not involved in the 11 September attacks in the United States. As a Muslim, I try my best to avoid telling a lie. I had no knowledge of these attacks, nor do I consider the killing of innocent women, children and other humans as an appreciable act. Islam strictly forbids causing harm to innocent women, children and other people. Such a practice is forbidden even in the course of a battle. It is the United States, which is perpetrating every maltreatment on women, children and common people of other faiths, particularly the followers of Islam. All that is going on in Palestine for the last 11 months is sufficient to call the wrath of God upon the United States and Israel. There is also a warning for those Muslim countries, which witnessed all these as a silent spectator. What had earlier been done to the innocent people of Iraq, Chechnya and Bosnia? Only one conclusion could be derived from the indifference of the United States and the West to these acts of terror and the patronage of the tyrants by these powers that America is an anti-Islamic power and it is patronizing the anti-Islamic forces. Its friendship with the Muslim countries is just a show, rather deceit. By enticing or intimidating these countries, the United States is forcing them to play a role of its choice. Put a glance all around and you will see that the slaves of the United States are either rulers or enemies of Muslims. […]

… we are not hostile to the United States. We are against the system, which makes other nations slaves of the United States, or forces them to mortgage their political and economic freedom. This system is totally in control of the American-Jews, whose first priority is Israel, not the United States. It is clear that the American people are themselves the slaves of the Jews and are forced to live according to the principles and laws laid by them. So, the punishment should reach Israel. In fact, it is Israel, which is giving a blood bath to innocent Muslims and the U.S. is not uttering a single word. [3]

al-wafd02

Al-Wafd, Wednesday, December 26, 2001 Vol 15 No 4633 Translation of article title: “News of Bin Laden’s Death and Funeral 10 days ago”  Read more

Though many will not agree with the above sentiments and an argument can be made that bin Laden exhibits the traits of classic religious fanaticism, the above does not fit with the history of what we know of the real bin Laden. Many of his statements are grounded in fact. He knew very well the nature of Anglo-American governments and their business interests believing that “[The American system] sacrifices soldiers and populations to achieve the interests of the major corporations.” He was deeply cognizant of contemporary Western thinkers and praised liberal academics like Noam Chomsky stating: “Chomsky is amongst the greatest [thinkers] of the West.” Bin Laden expressed repugnance at what he saw as American hypocrisy masquerading as a global moral crusade while creating the exact opposite in the world. It was not that Muslims hated them for their freedoms but how a nation pretending to be a democracy was imposed on others. In bin Laden’s eyes the US was indeed “The Great Satan.” He stated: “A man with human feelings in his heart does not distinguish between a child killed in Palestine or in Lebanon, in Iraq or in Bosnia. So how can we believe your claims … while you kill our children in all of those places?” [4]

Contrary to attempts by US media to extract a “confession” from spurious interviews no evidence ever came to light that bin Laden was involved with the attacks on 9/11 which was why, despite being on the FBI’s “Most Wanted” list, no mention of 9/11 is made. There is no “hard evidence.” [5] However misguided and ruthless, bin-Laden was fully aware of the nature of the forces arraigned against him and his beloved Islam: “When people see a strong horse and a weak horse, they will naturally want to side with the strong horse. When people of the world look upon the confusion and atheism of the West, they see that Islam is the strong horse.” It was the strength of Islam viewed through his own beliefs which allowed his destiny to become the primary icon of CIA induced “blowback”; to be used as the perfect tool in a major false flag operation.

For a myth to continue to hold its power it must be injected with the requisite emotional ingredients and stirred for maximum effect, which is where PSYOPS comes in.

clapper-boardEveryone knows how easy it is to manipulate images. Whether using Photoshop for your holiday photos or the Computer Generated Images (CGI) of the Hollywood blockbusters which can literally create new worlds, reality can be malleable in ways undreamt of. In the hands of the military-intelligence apparatus with technological applications far in advance of the public market it is not just easy to align multi-media sophistication with public relations, but a necessity. No one can seriously entertain the idea that such possibilities are off limits to those without any scruples and who are willing to use technology to further their own desires.

The myth-making machine has been working over-time in relation to the Al-Qaeda and Osama bin Laden story with a blend of CIA-MOSSAD inspired PSYOPS. The nature of any kind of genuine fundamentalism – Islamic or otherwise – means that it reaches a crescendo of conflict where it is difficult to know what is fake and what is real. Jihad martyr videos are liberally uploaded to the internet, often after Intel agents have manipulated the content. Sleeper agents or unconscious dupes already integrated into Al-Qaeda cells can then carry out their duties on behalf of their paymasters – or Allah. It has never been easier to pull the wool over our eyes, even when video manipulation is shoddy in the extreme.

Recall the 1999 Washington Post article by William Arkin “When Seeing and Hearing isn’t Believing,” where he described the new technology of ‘voice morphing’ or ‘voice synthesizing’, explaining that, “if audio technicians have a recording of your voice, then they can create a tape in which your authentic voice says anything they wish.” [6] What we can be sure of is that a large proportion of videos circulated on the internet at politically opportune moments have proven to be fake.

In early 2003, Iraq provided another testing ground for not just planting stories in the world’s media but to create fake videos to keep the war on terror narrative alive in the public’s mind and therefore promote the objective of regime change and the toppling of Saddam Hussein. The CIA’s Iraq Operations Group floated ideas to show Hussein as a paedophile molesting a boy and “… to flood Iraq with the videos…” As cultural constraints made this concept unworkable, it was soon dropped. Other ideas included the interruption of Iraqi television programming with a fake special news bulletins and fake inserts or “crawls”—messages at the bottom of the screen—into Iraqi newscasts. The CIA also began playing with the idea of an Osama bin laden impersonator. The Washington Post reports that the CIA abandoned the projects leaving the way open for their revival in military circles. As one military official comments: “The military took them over,” due to the “… assets in psy-war down at Ft. Bragg,” at the Army’s Special Warfare Centre.[7] (One wonders how many paid bin Laden, Hussein and other high profile figures have been paraded for media consumption).

cia-logo

Hot on the heels of September 11th attacks, the CIA embarked on a massive propaganda campaign to fuse Osama bin Laden, Al-Qaeda and Saddam Hussein in order to justify the invasion of Iraq. With the help of Britain’s Tony Blair, the idea of Weapons of Mass Destruction (WMD) was cooked up as a further PR exercise.

This matches the production quality of subsequent videos which appeared on the scene as the CIA project was taken over by the Pentagon at some point after 2003. This is most evident in the video released just prior to the 2004 election and an obviously digitally manipulated duplicate from 2007, in which bin Laden is sporting a trimmed, dyed beard and a bottled sun-tan. It was not just Intel groups having fun with their video collections. At the level of the mainstream US and British media videos were often edited in line with government policy.

When Osama Bin Laden videos periodically surfaced throughout the Iraq war and up to his alleged Hollywood-esque death it was inevitable that they would be thoroughly cleansed of all references and remarks that might prove problematic to the accepted “Osama-under-the-bed” formula. Obviously doctored and fully fabricated videos would be given unfettered access to the mass media outlets, with the Bush Administration taking media propaganda to new heights. From 2001–2011 more than 30 audio and video recordings were released, most of which found their way to the internet.

In October 2001, bin Laden appeared on Al Jazeera, in a pre-recorded video statement shortly after US-led strikes on Afghanistan begin. It was the first time the Al-Qaeda leader had apparently spoken after the 9/11 attacks. Sitting in a flack-jacket next to his right hand man Ayman al-Zawahiri he proceeds to softly berate the United States. No responsibility for the 9/11 attacks is forthcoming. A common and frustrating characteristic of the video and subsequent offerings was the lack of date or time stamp which meant there was no way to know when and where it was made. Bin Laden states: “What the United States tastes today is a very small thing compared to what we have tasted for tens of years.” He praises those responsible, saying, “I ask God Almighty to elevate their status and grant them paradise.” [8] Zionist and Bush Administration Press Secretary wasted no time in drawing our attention to the obvious fact that bin Laden “virtually took responsibility” for 9/11, despite explicitly denying his involvement. This soon turned bin Laden into designated arch-terrorist No.1 commensurate with Zion-Conservative planning. [9]

Saudi-born alleged terror mastermind Osama bin Lad

Osama bin Laden speech released October 2001. Date of video: unknown (AFP/Getty Images)

On December 13, 2001, a home video was apparently filmed without his knowledge and conveniently found in a house in Jalalabad, Afghanistan. It was reportedly delivered to the CIA; by whom, no one knows. The video shows a conversation between Osama bin Laden, Ayman al-Zawahiri, Al-Qaeda spokesman Suliman abu Ghaith, and Al-Qaeda veteran Khaled al-Harbi. The Pentagon delivered what could be loosely called a “translation” to all major news outlets which was so in line with the official 9/11 story of the day and similarly riven with errors and fallacies as to be wholly unbelievable. The Bush Administration screamed from their Neo-Con pulpit that this was definitive proof, effectively calling for an end to any doubts as to the intent of Al-Qaeda and their culpable Commander-in-Chief. However, it wasn’t long before even some within the MSM began to have serious doubts about its authenticity. So many people began scratching their heads that Bush was forced to comment exclaiming in true reactionary form that it was: “preposterous for anybody to think this tape was doctored. Those who contend it’s a farce or a fake are hoping for the best about an evil man.” [10]

Apart from the obvious fact this video could easily have been faked by anyone, it is also true that previous videos had usually been given their formal consent by bin Laden and passed through to the Arabic Al-Jazeera network. It didn’t happen on that occasion and subsequently many others. More importantly, the person in the video is clearly not bin laden no matter how hard the Bush administration and 9/11 debunkers scream and shout that it is. As 9/11 journalist and Islamic studies historian Dr. Kevin Barrett noted, the person in the video is “at least 40 or 50 pounds heavier, and his facial features [are] obviously different…” all of which led the video to be dubbed the “Fatty Bin-Laden tape” and widely ridiculed. [11]

bin_laden_confession

A still from the “confession” video showing advisor Khaled al-Harbi speaking with “Osama bin Laden”. (historycommons.org)

Dr. David Ray Griffin offered another problem with the video by pointing out that:

“… its stocky bin Laden praised two of the alleged hijackers, Wail M. Al-Shehri and Salem al-Hazmi, by name, and yet both the London Telegraph and the Saudi embassy reported several days after 9/11 that al-Hazmi was still alive and working in Saudi Arabia. Given the fact that the earlier video in which Osama confessed was clearly a fake, we should be suspicious of this latest apparent confession.” [12]

We then come to what this imposter actually said. The latest “bin-Laden” gave a convenient up-date on the technical details of the 9/11 narrative as if to quell any criticism of the official story :

“[W]e calculated in advance the number of casualties from the enemy, who would be killed based on the position of the tower. We calculated that the floors that would be hit would be three or four floors. I was the most optimistic of them all… (inaudible)… due to my experience in this field, I was thinking that the fire from the gas in the plane would melt the iron structure of the building and collapse the area where the plane hit and all the floors above it only. This is what we had hoped for.” He continues: “We had notification since the previous Thursday that the event would take place that day. We had finished our work that day and had the radio on. It was 5:30 p.m. our time.… Immediately, we heard the news that a plane had hit the World Trade Center. We turned the radio station to the news from Washington.… At the end of the newscast, they reported that a plane just hit the World Trade Center … After a little while, they announced that another plane had hit the World Trade Center. The brothers who heard the news were overjoyed by it.” [13] [Emphasis mine]

The above passage is distinctive for its hackneyed attempts at creating a 9/11 script and placing it at the foot of bin Laden. Firstly, sentences in italics referring to the reasons and causes for the WTC destruction, are so closely aligned to the official story that it becomes far too pat. It is especially odd that “bin Laden” refers to the Twin Towers as made of iron rather than steel. For a trained civil engineer as he was, this is nonsensical. [14] The reference to not revealing information to the “brothers” until: “… just before they boarded the planes,” is also curious as all of the alleged hijackers bought their tickets for the 9/11 flights two weeks in advance, not forgetting flight training for the leaders. The pilots and the hijackers all knew each other and had contact with each other prior and during the flights which is the opposite to what is said in the video. [15]

clip_image002_thumb.jpg

Spot the Bin Laden. Clue: He isn’t on the left. Yet, US authorities would like you to believe that this is the same man captured on video in December 2001. Source: Reuters

A German TV show also confirmed that the translation provided by the Pentagon was seriously flawed. Professor Gernot Rotter, scholar of Islamic and Arabic Studies at the University of Hamburg found that the: “… tape is of such poor quality that many passages are unintelligible. And those that are intelligible have often been taken out of context, so that you can’t use that as evidence. The American translators who listened to the tape and transcribed it obviously added things that they wanted to hear in many places.”  [16]

Further incredulity was to arrive in January 2004, as research into several audio recordings allegedly made by bin Laden was carried out. Professor Richard Muller of Massachusetts Institute of Technology (MIT) concluded there was evidence of “cut and paste” editing from past recordings, believing that the audio examples are fake and bin Laden either “dead or injured.” He pointed the finger at Al-Qaeda’s difficulties in countering American counter-terrorism rather than CIA fabrication. [17]

In the same year on October 29, immediately prior to the US elections (a curiously common occurrence for Al-Qaeda audio and video messages) an alleged bin Laden video recording was

released which came to be known as the “Towers of Lebanon Speech” in which he explained his vengeful reasons for planning 9/11: “As I looked at those destroyed towers in Lebanon, it occurred to me to punish the oppressor in kind by destroying towers in America, so that it would have a taste of its own medicine and would be prevented from killing our women and children.” The individual also heavily criticised Bush by highlighting some of his bizarre actions on that day: “It did not occur to us that the commander in chief of the American armed forces would leave fifty thousand of his citizens in the two towers to face this great horror on their own, just when they needed him most. It seems that a little girl’s story about a goat and its butting was more important than dealing with airplanes and their butting into skyscrapers.” [18] This was referring to Bush’s behaviour when told that America was under attack he continued reading to the class of schoolchildren and sat in the class for another half an hour so as not to “scare them.” The speech also criticised security, corporate control and US–Israel imperialism.

Perhaps the most important question to ask is who benefited from this particular video at pre-election time? It is widely accepted at the time that rather than hurting Bush’s popularity it would actually help to ensure his re-election by stirring the memories of 9/11 and America under attack, thus fuelling the fires of religious nationalism. [19] Bush sailed on to victory with ghost runner and fellow Bonesman John Kerry left in his wake.

An audio recording from May 2006 arrived in the post claiming to be the latest sermon from Osama. It asserts that Guantanamo Bay terrorist Zacharias Moussaoui could not have been involved in 9/11, because he had personally assigned the 19 hijackers involved in those events. The latest bin-Laden therefore contradicts his original and authentic message of December 2001 and suddenly confesses his responsibility for orchestrating the attacks. [20]

Sure, he just forgot…

And what of the identities of the hijackers themselves? It seems that seven of those he ‘personally assigned’ had nothing at all to do with 9/11 and turned out to be alive and well. More coincidences? Or flaws in an extensive cover-up characterised by an ever-present ineptitude?

***

Previous releases of tapes by Intelcenter the U.S. monitoring group which describes its role as providing: “counterterrorism intelligence when, where & how you need it” extends to manufacturing and fabricating video tapes on behalf of “Al-Qaeda.” The company delivered several videos to the Western media press from 2006–2008, even selling them on their website at intelcenter.org. Most of the videos have been conclusively proven to be culled together from old footage dating from five years previously, yet they continue to be seen as authentic by the MSM. [21]

Intelcenter is an offshoot of IDEFENSE, a web security company that monitors intelligence from the Middle East. It is positively crawling with ex-military intelligence veterans, US Army and Defence Intelligence Agency individuals, many of whom have ties to Zio-Conservatives of the last Bush Administration. IntelCenter has been caught red-handed fabricating video evidence in order to attribute it to Al-Qaeda terrorist networks on a number of occasions. 

siteIt was on another anniversary on September 11th 2007 that we saw another video shunted off the Al-Qaeda-CIA home movie production line with a contribution credit to Intelcenter. The “video” consisted of a still picture of Osama “provided” by the controversial US-Based SITE Institute and given to Associated Press on 7 September of that year. Describing itself as an organization “that provides information related to terrorist networks to the government, news media, and general public,” SITE’s non-profit status has earned it more than $500,000 from the government”, with “over $273,000” coming directly from taxpayers in 2004. [22] But “the organization believes such work is consistent with its exempt purposes”, which of course it would, raking in that amount of money.  [23]

SITE Executive Director Rita Katz co-founded the intelligence company with her husband and senior analyst Josh Devon, both committed Zionists with links to Israeli intelligence. Having worked with former terrorism Czar Richard Clarke and his staff in the White House, the Department of Justice, Department of the Treasury, and the Department of Homeland Security garnering: “… wide attention by publicizing statements and videos from extremist chat rooms and Web sites, while attracting controversy over the secrecy of SITE’s methodology.” [24]  Professor Bruce Hoffman is also listed as a senior advisor and “currently a tenured professor in the Security Studies Program at Georgetown University’s Edmund A. Walsh School of Foreign Service, Washington, DC.” Not only has Hoffman residing at the notorious recruiting ground for the Liberal arm of the 3EM, but had a post as Corporate Chair in Counterterrorism and Counterinsurgency and a directorship
of the Rockefeller/Rothschild connected RAND Corporation, also conveniently in Washington DC. Recall that RAND has a long association with PSYOPS research. (Indeed, the description of the corporation’s successful PSYOPS implementation can be read in a 2007 178 page document originally prepared for the US Air Force titled: Project Air Force by Stephen T. Hosmer).

b2ap3_thumbnail_Rita-CNN

Rita Katz co-founder of the SITE Institute doing what she does best: keeping the war on terror narrative flowing by propagating (and possibly creating) numerous Al-Qaeda videos made fresh for the internet. BE AFRAID! Is the message. SITE is likely a PSYOPS front for MOSSAD masquerading as a legitimate intelligence gathering operation for mainstream media. By 2015, we have seen Katz getting behind the new bogeyman meme this time in the guise of ISIS/ISIL, better known as Islamic State, the new kids on the propaganda block designed to up the ante in emotional horror in the mass mind. 

Previous to her post as SITE director Katz worked as Research Director of “The Investigative Project on Terrorism” and served as a counsel for the plaintiffs—Families of victims of September 11 terrorist attacks who happen to be suing Saudi princes for $116 trillion of damages from the loss of life in September 11. She was also hired by 1,000 relatives of those who died on September 11th in order to research terrorism. A civil lawsuit was filed in 2002 against those suspected of financing terror plots. No doubt spurred on by the legacy of the Muslim Brotherhood, Katz however continued to earn substantial sums of money from the Homeland Security and intelligence raids on Muslim think tanks and institutions, much of it based on her own research alone.

She is also the author of Terrorist Hunter: The Extraordinary Story of a Woman who Went Undercover to Infiltrate the Radical Islamic Groups Operating in America published 2003 by HarperCollins, owned by ardent Israel supporter Rupert Murdoch. To say that this should be categorised as a work of fiction is an understatement. The breathless title gives you all you need to know as to the plot, and is thus utterly false since gender restriction means that fundamentalist gatherings would allow no woman to be present save Katz taking on some of the false beards and make-up seen in her own videos. Regardless, she has managed to create quite a money spinner. And like so many in the terror industry, the SITE Institute has much to gain financially by keeping the Intel flowing into American and Israeli military-security complex.

Katz and Devon are part of an outsourced unit that is effectively part of the Zio-Conservative and government intelligence apparatus. The website describes itself as a “monitoring service” on the Jihadist threat,” which is severely problematic considering the couple’s obvious lack of impartiality against anything associated with the Arab nationalism, let alone the war on terror. One might even say this is about as obvious an Israeli PSYOPS operation as its possible to be.  In other words, Katz’s handlers are MOSSAD.

With a fat new propaganda bogeyman in the guise of ISIL tearing up the Middle East it seems the SITE Institute’s PR role for the terror industry is set to continue. Geo-political analyst Professor James F. Tracey summed the sad state of affairs within the MSM: “Since mid-August 2014 major news organizations have conveyed videos allegedly found online by the SITE Intelligence Group. Unsurprisingly the same media have failed to closely interrogate what the private company actually is and whether the material it promotes should be accepted as genuine.” [25]

fake-bin-osama-laden-jihadi-jhn

From one fake brand to another: Osama to ISIL hatchet man “Jihadi John”

This manufacturing of threats and the subsequent erosion of civil liberties has been going on a long time now. Timothy H. Edgar, National Security Policy Counsel for the ACLU testified in April 2005 before the Subcommittee on Crime, Terrorism and Homeland Security of the House Committee on the Judiciary stating:

“… federal agents seized confidential files, computer hard drives, books, and other materials from some of the most respected Islamic think tanks and organizations in the United States and raided the homes of many of the leaders involved in those organizations. The search warrants targeted two entities whose main purpose involves activities at the core of the First Amendment: the Graduate School of Islamic Thought and Social Sciences (GSITSS), an institute of higher education, and the International Institute of Islamic Thought (IIIT), an Islamic research institute and think tank, as well as the private homes of a number of their employees and scholars,”

Apart from the danger of slipping into “witch-hunts” on a whim and therefore breaching civil rights, it seems the evidence against the organisations was less than substantial. Mr. Edgar pressed on to highlight the most important points:

“The complaint in the civil rights action says the affidavit in support of the search warrants contained fabricated material facts regarding non-existent overseas transactions. The complaint also says the search warrant affidavit was drafted with the help of private author and self-styled ‘terrorist hunter’ Rita Katz, who was paid $272,000 for her advice by the federal government and has made much more in a book deal and as a consultant for news organizations. According to federal investigators, Katz ‘lost the trust of some investigators from the FBI and Justice Department’ as a result in part of the ‘reckless conclusions’ she drew in her book, …” [Emphasis mine]

With SITE as the only source for the video and disregarding other influences, surely we could be forgiven for thinking there are not only are there severe conflict of interests but financial and public relation concerns that cast serious doubt on the authenticity of the recording.

What of the video itself? Needless to say, a few “problems” came to light.

It seems the devoutly religious and moral “Osama” has suddenly undergone a midlife crisis and sort refuge in a make-over for his adoring minions. This has resulted in a chocolate brown dyed hair and a beard suitably clipped into a more suburban, Muslim-terrorist-about-town style, topped off with a garish gold ring just to show that his taste in contemporary jewellery and his adherence to Islam do not clash. It appears the rationale of wearing of a ring which is forbidden by Muslim law, and the magical transformation of a left-handed Osama to a right-handed one is all perfectly understandable in the world that some analysts prefer to inhabit.

The SITE Institute happily made up the claim that it is “common practice” amongst Muslim men to dye their hair when in fact, the opposite is the case. According to one BBC report other analysts: “… have suggested that rather than being dyed, it may be actually false, and that to help avoid detection he is clean-shaven these days.”  [26]  Ah, of course, the old false beard trick. Works well in the caves of Afghanistan or the market streets of Pakistan. If he was a paid Osama look-alike then you have to go with what’s available. Times are hard, after all…

Given the satellite and surveillance technology that is at least sophisticated enough to read the newsprint as you sit on the John, it appears it isn’t up to the job of finding a Muslim terrorist dressed in yellow grab and a false beard. Of course, if a gaggle of Muslim terrorists are intelligent enough to pull off the biggest false flag in history and penetrate the most heavily defended region on Earth then it is probable that they would have thought about the idea of sophisticated surveillance. Yet, we asked to place our trust in the logic of a false beard nonetheless.

Moreover, the tape itself has been so hacked, chopped and generally messed around with, that it represents a frozen CGI image manipulated to give the illusion of a living, speaking human being. In the whole 26-minute recording, two short sections are sandwiched into the 26 minute recording where the man said to be bin Laden is seen talking: one at the beginning and one towards the middle. For the remaining 23 minutes of the tape we are invited to watch a still image of the speaker. (It is all the more extraordinary that no one in the MSM considers this odd. If they did, they weren’t about to say so, for obvious reasons). Apparent to anyone who has been exposed to the usual diet of a TV we can see cuts and edits all over the place, even the introduction of sections which appear to be from different recordings altogether. As noted by computer analyst Dr. Neal Krawetz of the University of Winnipeg: “… the new audio has no accompanying ‘live’ video and consists of multiple audio recordings… and there are so many splices that I cannot help but wonder if someone spliced words and phrases together. I also cannot rule out a vocal imitator during the frozen-frame audio. The only way to prove that the audio is really bin Laden is to see him talking in the video.”  [27]

That seems to be a tall order since Osama appears to have long since met his Maker.

 bin-laden-videos-2004-2007

(left) “Osama bin Laden” makes his Towers of Lebanon Speech in 2004 Source: Al-Jazeera | (right) A frame from “Osama bin Laden’s” 2007 video. Source: Intelcenter

Krawetz also noticed remarkably similar themes and technical details from bin Laden’s previous video, released in 2004, a few days before the US presidential election:

“[T]his is the same clothing [a white hat, white shirt and yellow sweater] he wore in the 2004-10-29 video. In 2004 he had it unzipped, but in 2007 he zipped up the bottom half. Besides the clothing, it appears to be the same background, same lighting, and same desk. Even the camera angle is almost identical.” Krawetz also comments, “if you overlay the 2007 video with the 2004 video, his face has not changed in three years—only his beard is darker and the contrast on the picture has been adjusted.”  [28]

If the Pentagon can concoct fake Al-Zarqawi letters boasting about suicide attacks and then leak them to The New York Times, to be printed on the front page the next day, it is much more than probable that videos would most certainly not be off limits.

Now, take this analysis and apply it to the present chaos that is ISIL. We have had mass civilian carnage on a scale all supported by extremely fake-looking videos, with hostages likely agreeing to stage mock set ups over a year before the televised “beheadings”. The first high profile beheading victim, journalist and anti-Assad James Foley is an example. A UK Times article reported on the findings of forensic analysts’ conclusion that the video of Foley’s beheading” was staged. Several points are made to explain why this is so, including:

  • The sounds made by Foley are not consistent with beheadings.foley1
  • There is no blood shed while ‘several cuts’ are made to the neck of Foley.
  • Foley’s words appear to have been scripted.
  • The analysis highlights a blip in the imagery that could indicate the journalist had to repeat a line.
  • Sounds made by Foley do not appear consistent with what might be expected.
  • The video begins with a clip of President Barack Obama. This footage appears to have been downloaded directly from the White House website. [29]

foley2

The propaganda video by ISIL with the victim James Foley 2014. His murder likely took place off camera.

Apart from embedded journalism which the first red flag, Foley also worked in Iraq for a known CIA front USAID in 2009. By 2011, he had been kidnapped by Gaddafi’s military and then happened to repeat a round of bad luck with his capture in Syria. As a hostage in Libya, then again in Syria and finally beheaded by ISIS. This is little far-fetched to say the least. As journalist Michael Krieger notes, his resume: “… reads more like a James Bond film script than that of a journalist with a teaching background.” Proof of complicity? Not really. It is usually a mix of lies and truth with the victims not even knowing they have been sacrificed until it is too late.

Regardless of whether some were CIA/MOSSAD agents as some have suggested, they had, in all truth, been murdered a long time before their few minutes of tragic fame. Once again, agents and patsies are collateral for the greater vision which follows exactly the same formula every time: create or fuel radicalism = embed agents in chosen grouping to incite ideology to fever pitch making sure to eject moderates = Make sure a good cluster of psychopaths are present for the bloodletting and ensuing mayhem = supply with bombs and assorted weaponry = direct toward geopolitical aims  = ensure propagandized coverage via mainstream media.

Nothing has changed. The same people are in charge as they were during Al-Qaeda’s reign. The revolving door of politics has no effect on shadow government machinations. If these shoddy attempts at video manipulation are the best that outsourced military PSYOPS can come up with and the public still believes that the enemy is “out there” rather than the government and its agencies, then we are surely in for a very dark future.  [30]

 


Notes

[1] ‘Apollo 11 Moon landing: ten facts about Armstrong, Aldrin and Collins’ mission’ The Telegraph, July 18, 2009 | See also: http://www.business.time.com/2011/05/03/how-much-has-osama-bin-laden-cost-the-us
[2] Osama Bin Laden: Dead or Alive? By David Ray Griffin, Published by Olive Branch Press July 2009. ISBN-10: 1566567831. Also read a great summary found surprisingly in The Daily Mail, not noted for the finest journalistic standards. This article is however, an exception: ‘Has Osama Bin Laden been dead for seven years – and are the U.S. and Britain covering it up to continue war on terror?’ By Sue Reid
Daily Mail, 11 September 2009.
[3] Bin Laden: Authentic Interview by Carol A. Valentine, Curator, Waco Holocaust Electronic Museum, http://www.Public-Action.com October, 2001.
[4] ‘Transcript of Osama Bin Ladin interview by Peter Arnett’The first-ever television interview with Osama Bin Ladin was conducted by Peter Arnett in eastern Afghanistan in late March 1997. Questions were submitted in advance. Bin Ladin responded to almost all of the questions. CNN was not allowed to ask follow up questions. The interview lasted just over an hour. http://www.informationclearinghouse.info/article7204.htm | ‘CNN Transcript of Osama Bin Laden’s October Interview’ with Taseer Allouni February 5, 2002. Al-Jazeera reporter Allouni was sent to jail for having links to Al-Qaeda and financial irregularities. The interview in question is used by US authorities as proof that 9/11 was carried out by Bin Laden but no such proof is in evidence and allusions of which go counter to bin laden’s previous claims.
[5] ‘Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11?’ By Prof Michel Chossudovsky, Global Research, September 17, 2006.
[6] ‘When Seeing and Hearing Isn’t Believing’ By William M. Arkin, The Washington Post, Feb. 1, 1999.
[7] ‘CIA unit’s wacky idea: Depict Saddam as gay’ By Jeff Stein, The Washington Post, May 25 2010.
[8] ‘Bin Laden Taunts US and Praises Hijackers’ By John F.Burns, The New York Times, October 8, 2001. | ‘Bin Laden’s warning: full text’ BBC News, 7 October, 2001.
[9] ‘Bush: Bin Laden “virtually took responsibility” CNN.com October 8, 2001.
[10] ‘US urged to detail origin of tape’ By Steven Morris, The Guardian, December 15, 2001.
[11] p.179; Truth Jihad: My Epic Struggle Against the 9/11 Big Lie By Kevin Barrett Published by Progressive Press, 2007.
[12] ‘Osama Tape Appears Fake, Experts Conclude’June 1st, 2006, PRWeb.com
[13] TRANSCRIPT OF USAMA BIN LADEN VIDEO TAPE (“Transcript and annotations independently prepared by George Michael, translator, Diplomatic Language Services; and Dr. Kassem M. Wahba, Arabic language program coordinator, School of Advanced International Studies, Johns Hopkins University. They collaborated on their translation and compared it with translations done by the U.S. government for consistency. There were no inconsistencies in the translations). http://www.defense.gov/news/Dec2001/d20011213ubl.pdf.
[14] National Institute of Standards and Technology, 9/2005,( p. 6 ) | op.cit US Department of Defense, December 13, 2001.
[15] op.cit US Department of Defense, December 13, 2001. | Flight tickets booked: http://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/prosecution/ST00001A.pdf |, ‘The British Breeding Ground’ By Neil Mackay, The Sunday Herald September 30, 2001.
[16] ‘Bin Laden Video: Faulty Translation as evidence?’By George Restle and Ekkehard Seiker, Monitor TV December 20, 2001.
[17] ‘The Voice of Osama bin Laden: Osama’s voice on tape proves that the leader of al Qaeda is still alive. Or does it?’ By Richard A. Muller, MIT Technology Review, Communications News, January 23, 2004.
[18] p.237; Messages to the World: The Statements of Osama Bin Laden, By Osama bin Laden (Author), Bruce Lawrence (Editor), James Howarth (Translator) Published by Verso, 2005. | ISBN-10: 1844670457.
[19] ‘Lou Dobbs Tonight’ -Recent Video of Bin Laden Airs; Iraq Missing Explosives Still an Issue Aired CNN.com October 29, 2004. Transcript: www. transcripts.cnn.com/TRANSCRIPTS/0410/29/ldt.01.html
[20] ‘Osama Tape Appears Fake, Experts Conclude ’US government fabricating evidence to manipulate American public, scholars say. Duluth, MN (PRWEB) May 30, 2006.
[21] ‘CIA-Linked Intel Center Releases Highly Suspicious Bin Laden Tape’ By Paul Joseph Watson Prison Planet.com, September 14, 2009.
[22] Ibid.
[23]
http://www.SITEinstitute.org/
[24]
‘SO, A ‘Charitable Organization’ (The SITE Institute) Released the Bin Laden Video…,’ By Berni McCoy, Berni McCoy’s Journal/Democratic Underground, September 10, 2007 | ‘Leak Severed a Link to Al-Qaeda’s Secrets. Firm Says Administration’s Handling of Video Ruined Its Spying Efforts,’ By Joby Warrick, Washington Post, October 9, 2007.
[25] ‘Who is Behind the Islamic State (ISIL) Beheadings? Probing the SITE Intelligence Group’ By Prof. James F. Tracy, Global Research, September 15, 2014
[26] ‘Trimmed Bin Laden in media-savvy war’ By Frank Gardner, BBC News, September 8, 2007.
[27] ‘Bin Laden’s beard is real, video is not’ Digital evidence supports the theory that Al-Qaida is recycling old footage to create new messages. – by Robert Vamosi, http://www.news.cnet.com, September 12, 2007. | op.cit BBC News, (Gardener.)
[28] Ibid.
[29] ‘Foley video with Briton was staged, experts say’ By Deborah Haynes, The Times, August 25 2014.
[30] For further analysis of the video fakery see this article from 2011: ‘Exclusive: Osama bin Laden’s Nose and Left Ear’ By Joe Quinn Sott.net. 08 May 2011.

Technocracy XIV: Psycho-Civilised

“Technological progress has merely provided us with more efficient means for going backwards”

Aldous Huxley


Note: A re-read of ‘Satan’s Little Helpers VII: Mind War’ might be in order before we continue with the emergence of SMART society and its place in mass mind programming.

monitors1

The SMART-Surveillance Grid allows improvements in telecommunications, electricity provision and home functionality. It offers an exciting integration of eco-economics and energy saving technology along with the “Internet of Things” (IoT) and “Network of Things” (NoT) which is offering to revolutionise transport, communications and urban infrastructure as a whole. With embedded surveillance it permits advertisers, marketeers to access human minds as never before. Authorities can also tap in and use this consumerist techtopia to trap criminals and would-be “terrorists”. It requires that the State and Official Culture become so integrated through technology that the line will be blurred. Security and collectivism will be encouraged to a degree that compliance will be seen as good citizenship insofar as it maintains the urban environment and social provision. A new social contract will be loaded in favour of the State through a form of satiated servitude. (The Illuminist-Enlightenment thinkers would be well pleased).

So-called terrorists, dissidents/activists, protestors and ordinary citizens will need to be very concerned indeed on the road to SMART society as true individual thinking outside the box will slowly become frowned upon since it will not be conforming to the precept of a “psycho-civilised” society. The path of access to this dystopian view starts with ubiquitous surveillance.

As one short example illustrates, Britain’s Leeds-based Metropolitan Police Force is using a surveillance system procured from Datong plc., past customers of which have been the US Secret Service, the Ministry of Defence and unsavory regimes in the Middle East. The system is disguised as a mobile phone network which transmits a signal allowing the police or any other authority: “… to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area,” … “Strictly classified under government protocol as “Listed X”, it can emit a signal over an area of up to an estimated 10 sq.km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person’s movements in real time.” [1]

This is just one regional police force.

While the online company Amazon will track you via your Kindle reader for targeted advertising pathway prediction, the authorities will do the same based on the accumulated data to which it has access. It will not be for what you might buy, rather it will access what you may be thinking and your likely course of action on the “threat assessment” scale. There is precious little happening to prevent Google and other information technology companies from rolling out the SMART Internet of Things infrastructure which has enormous implications for a privacy and collective freedoms. Wi-Fi is destined to play a huge role.

militarysmartcityUrban law enforcement and Telephone towers with technology which allows multiple receive-transmit capability 

The social benefits of providing free access to Wi-Fi hot spots for those in low-income brackets and incentives for business travellers are shielding plans by the U.S. Department of Defence: “… to build robots that configure themselves into ad hoc wireless networks within urban areas” which were already well underway in 2007. Seizing control of internet communications and tracking individuals in urban areas is a necessary by-product of the technocratic SMART society. If that fails, the military are well placed to set up these Wi-Fi networks in a matter of hours or less. The Department of Defence (DOD) Homeland Security, Canadian, Israeli and NATO forces regularly conduct war-game exercises with Wi-Fi networks at the heart of operations. A DOD announcement for contractors as described by journalist Mark Baard discloses operations whereby:

“… soldiers will be able to drop robots, called LANdroids … when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network…The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of individual computers and mobile phones…where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail. The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.” [2]

As people become more accustomed to SMART technology and RFID tagging this will lead to the acceptance of our “need” to ensure greater technological “freedom.” As well as the technological capabilities of HAARP lying in the background in some form or another and married to these advances in technology, is it such a huge leap of imagination to think that once we are fully enmeshed in this SMART society where everything is habitually integrated that it would not be easy to begin directly assessing, monitoring and “downloading” material directly into the mass mind? Television has already served this purpose well, albeit in a more indirect fashion. With this in mind, though some have since expired and at least one is no longer listed (as of 1990) the US patent office listed the following successful registrations dating back to 1992:

U.S. Patent 5159703: Silent Subliminal Presentation System. (issued 1992) U.S. Patent 5507291: Method and an associated apparatus for remotely determining information as to a person’s emotional state. (issued 1996) U.S. Patent 5629678: Implantable transceiver – apparatus for Tracking and Recovering Humans. (issued 1997) U.S. Patent 6014080: Body worn active and passive tracking device (issued 2000) U.S. Patent 5868100: Fenceless Animal control system using GPS (Global Positioning Satellite) Location information. (issued 1999) [3]

US patent No. 5507291 filed on April 5, 1994 shows the level advancement at the public level. What goes on beyond top secret levels of the National Security State is anyone’s guess. The patent’s “abstract” is described as follows:

“In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas.” [4] [Emphasis mine]

And US patent No. 5159703, filed on December 28, 1989:

“A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.” [5] [Emphasis mine]

In the late Lt. Colonel Michael Aquino’s book: Mind War he explores psychological operations in combination with emerging technologies such as EM waves, Silent Sound and ionospheric mind control. Let’s not underestimate the power inherent within the human body /mind complex. After all, the electrical energy that powers each cell in our bodies works out at 30 million volts per metre, the equivalent voltage of a bolt of lightning. [6]Power within can be, as it were, reverse-engineered. From a footnote in the same chapter if you didn’t catch the first time, read it again in this context:

“… the NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day. […]

“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture from electromagnetic waves and interference. According to one researcher amongst many, Dr. Armen Victoria’s  1998 essay regarding ‘The Military Use of Electromagnetic Microwave and Mind Control Technologystates the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ’emotion signature clusters’. Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. ‘They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [7]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the US. It is still conducting some of the most advanced research in the world which in turn, stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been researching ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilising electro-magnetic waves as a psychotronic weapon. We may then understand that the invasion of Iraq not only represented an opportunity to plunder a nation for resources and stake claim to a long held geopolitical prize, but to test out new developments in microwave weaponry and experiment with the latest PSYOPS.
As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the US samurai. No more rhesus monkeys or pigs but real, live Iraqis.” [8]

According to Dr. Oliver Lowry who has had the dubious honour of working for the US military on several classified projects, Iraqi soldiers were the latest unwitting guinea pigs to further such advances, one of those being Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD:

… According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds. [9]

Humans are highly sensitive and susceptible to a variety of electromagnetic frequencies – natural or artificial. The human body is a highly sensitive package of water, bio-chemicals, and electromagnetic energies. The introduction and exposure to various kinds of external micro or EM waves of any kind whether from mobile phones RFIDs or even wind-farm infra-sound does and will have an effect on the human being in ways we do not understand. Consider also that the geo-magnetic sensitivity in animals and other living organisms concentrations of ferromagnetic material – most notably magnetite. The same levels of magnetite conductor / receptor bio-mineralization were discovered to exist in the human brain in the early 1990s. The authors of one paper say that the presence of the particles may account … for a variety of biological effects of low-frequency magnetic fields.” [10]

0117x

Electric field of the heart on the surface of the thorax, recorded by Augustus Waller (1887).

Weapons which target the mind and nervous system of selected individuals also has a long tradition. Reports of systematic mind stalking, harassment of individuals, testing and deployment of electronic and electromagentic devices (EMF) by government/outsourced agencies have been surfacing in the United States, North/South Korea and various countries in Europe. This has eroded human rights comprehensively with the added bonus for the persecutors that it is almost impossible to confirm and verify that which is literally “all in the mind”.

Though information in electronic/electromagentic or “non lethal Weaponry” is largely classified there is sufficient evidence from modern history and individual reports to reach the conclusion in a court of law that the targeted, micro-social use of behaviour modification technology is being used against individuals and activist groupings.

Interest in a variety of EMF weaponry had already begun at the beginning of the 20th Century with the genuis of Nikola Tesla and his experiments with radar and electrical energy. Concentrating and directing a beam of electromagnetic energy over a certain distance took hold of Tesla’s mind until his death in 1943. It seems the military-industrial complex heavily saturated in Nazi philosophy and science simply subverted Tesla’s genius and extended his advances in the field.

DARPA have been on the case since the Cold War with their 1958 research into combating Soviet advances in electromagnetic weapons and defenses. The capability to disrupt human emotions, inflict pain and fragment the personality was already well underway during pre and post-war experimentation under Operation MK-ULTRA, Project MONARCH, Project PANDORA and the development of PSYOPS and CoIntelpro emerging against the background of the civil rights movement of the 60s and 70s; behaviour modification had a new platform to play with.

Since that time with the enormous advances in “new concept” warfare there is every likelihood that a fusion of this military-intel science is not only being used as form of macro-social engineering and a monopoly of media-led propaganda, but the use of mass mind, ionosphere technology (fomerly labelled HAARP) to influence whole regions, even countries. It is therefore not a huge leap of imagination to recognise that the precision use of psychotronic weaponry to target selected individuals by the National Security State apparatus is in existence and heavily funded by black budgets.

Well in advance of the war on terror hoopla, Neo-Conservative regime change and the sky-rocketing increase in human/drug trafficking, mind control technologies were telegraphed to the military-intelligence faithful as the tool of choice to keep the world in line. The Strategic Studies Institute of the U.S. Army War College, published in 1994: ‘The Revolution in Military Affairs and Conflict Short of War’ by LTC James Kievit, Dr. Steven Metz. In the paper, the authors state the following drawn from their “hypothetical future scenario”:

The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant. […] Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

Put this together with Synthetic Environments for Analysis and Simulation (SEAS), the SMART grid, MAIN CORE, biological and PSYOPS warfare and you begin to get the idea that the technology of assymetric warfare isn’t just about geostrategy to dis-empower traditional enemies such as Iran, Russia and China. It is about war against domestic population by stealth and in plain sight. According to Project Censored’s 2006 paper titled: ‘US Electromagnetic Weapons and Human Rights’ offers a broad brush synthesis of the field and confirms the black budget capabilities available since the Zio-Conservative false-flag coup of 9/11:

“Michael Vickers, senior adviser to the Secretary of Defensefor the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations: “US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white SpecialOperations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.” [11]

CongnitiveMappingSource: Petri Ticklen at http://alicefish.net/MindAttack.htm Original source: Against Electronic Mind-Control International /http://againstmindcontrol.tripod.com/liber.html

Since the war on terror propaganda has now made sure that activists, dissidents and indeed anyone overtly successful in criticising government policy is shut down, detained or harassed it is hardly shocking to discover that some of these covert programs have been targeting people for experimentation in CIA rendition centres, prisons, psychiatric wards and across the general public with immunity. Project Censored authors state:

“…Hundreds of people continue to assert that a person or persons, whom they do not know,have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution. These experiences involved a number of discrete phenomena:

  • Hearing voices when no one was present.
  • Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause.
  • Sleeplessness and anxiety as a result of “humming” or “buzzing”.
  • Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
  • Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises. [12]

And the industry of non-lethal weaponry (NLW) is steadily increasing playing a dominant role in asymmetric warfare abroad as well as crowd control closer to home. The market for NLW will apparently double by 2020. [13] That means big money. Almost ten years ago:

“…the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, ElectroMagnetic Applications, and SAIC among others. The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, ‘Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that ‘in the next conflict it is we who will control the spectrum. We know its value’. Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.’

In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology. There are also numerous conferences each year hosted by the Department of Defense, contractors and universities. The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non-Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000. [14]

By 2011, this had increased to $138 million, reaching $140 million in 2013. [15] If we read the US Department of Defence’s Annual Non-Lethal Weapons Program Annual reports, it would leave you feeling suitably humbled and sentimental, beaming with national pride that Uncle Sam and its numerous military bases are making the world a less lethal. Apart from such delusions, what is more interesting is how such NLW advances are leaking into law enforcement and perceived “National Security.” A passage from Project’s Censored’s report concerning one Eldon Byrd a medical engineer, underscores this point:

“After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holesin people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” He believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line.” [16]

It is this intentional compartmentalisation and factional nature of operations and directives within military and  intelligence agencies which allows pathological leadership to develop.

Back in 2006, Congress and George W. Bush signed the Military Commission Act of 2006. which allowed torture and suspension of due process as acceptable. Since that time, torture apologists from law, academia and the military have come out to justify such actions as necessary for the “greater good” once again, trashing the very concept of the Universal Declaration of Human Rights and basic notions of conscience. The Anglo-American-Zionist Establishment is perfectly happy to use all and everything in its means to achieve its ends including the use of technology that cannot be detected nor recognised by Official Culture.

The somewhat infamous Dr. José Delgado Director of Neuropsychiatry at Yale University Medical School in the 1960s and 70s, and later Professor of Neurobiology in Madrid, Spain, had gained quite an internet following of shock and revulsion based around his similar pathological view of the capabilities of psychosurgery. He urged the U.S. government to make “control of the mind” a national goal. [17] He cheerily – and perhaps ill-advisedly – voiced his opinion and those of his superiors regarding the future:

“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday, armies and generals will be controlled by electric stimulation of the brain”. [18]

Dr. José Delgado was nothing if not thorough in his research. In 1965, The New York Times reported on Delgado’s successful experiment in the use of electronic implants connected to the motor nervous system of a bull – the unfortunate animal was stopped from charging by remote radio-control. The bizarre capabilities of surveillance was demonstrated when he surgically implanted a cat with an electronic implant which transmitted everything the poor moggy was seeing and hearing to a TV monitor.

The Doctor’s foray into publishing produced Physical Control of the Mind: Toward a Psycho-civilized Society (1969) which helped to confirm his Dr. Evil status on the net – not without justification. The doc is messianic in his belief that humans will undergo “psycho-civilization” by uploading the contents of their brains directly to machines and vice versa. With statements like that it is unlikely that he limited his experiments to animals. According to a 2001 interview for Cabinet magazine conducted by artists and writers Magnus Bärtås and Fredrik Ekman there are still many of Delgado’s descriptions in his own articles and reports of how he moved from animals to humans in contemporary American medical libraries. The reporters relate how Delgado, Dr. Mark, and other colleagues: “describe what was the first clinical use of Intracerebral Radio Stimulation (IRS) on a human being. The stimoceiver itself only weighed 70 grams and was held fast by a bandage.”

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (1986)

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (Third Edition: 1986)

In an article called “Radio Control Behavior” in the February 1969 issue of The Journal of Nervous and Mental Disease there are descriptions of patients who had undergone procedures to attach the device to their brains.

Case studies include:

… A black fourteen-year-old girl on the border of developmental disability who grew up in a foster home suddenly goes into a fury that leads to the death of her two stepsisters. A thirty-five-year old white industrial designer who ends up killing his wife and children flies into a rage when other motorists try to overtake him and he chases them and tries to run them off the road. Their aggressive behavior is supposed to be registered by the stimoceiver in the way a seismograph registers the earth’s tremors and the same stimoceiver is then to “turn them off” via the FM transmitter. [19]

In the interview Delgado admits that as far as he was aware nothing came of the IRS device due to the complexity of the brain and the unreliability of the mapping: “We never knew which parts of the brain we were stimulating with the stimoceiver. We didn’t even manage to prevent epileptic attacks, which we thought would be the simplest of things. We never found the area where epilepsy attacks originate.” [20]

The authors reveal their surprise at his: “casual attitude towards the stimoceiver which was heralded as a great contribution to science.” Although Delgado’s attitude conforms to later developments regarding the brains plasticity and almost holographic nature, normal practice for radar experiments in psychological control were to appropriate and integrate into covert programs. After all, mind control operations were/are still continuing. It was at the congressional hearings on the CIA sponsored MK-ULTRA operations that Delgado made his famous declaration of psychosurgery. It seems highly improbable that such experiments were ignored especially when they often yielded startling results.

To illustrate the effectiveness of electro-stimulation Delgado and his colleagues: “… orchestrated violent scenes in the lab” descriptions of which were captured in the book: The Brain Changers: Scientists and the New Mind Control (1973) by Maya Pine who relates one incident typical of the research in question:

As the film opens, the patient, a rather attractive young woman, is seen playing the guitar and singing “Puff, the Magic Dragon.” A psychiatrist sits a few feet away. She seems undisturbed by the bandages that cover her head like a tight hood, from her forehead to the back of her neck. Then a mild electric current is sent from another room, stimulating one of the electrodes in her right amygdala. Immediately, she stops singing, the brainwave tracings from her amygdala begin to show spikes, a sign of seizure activity. She stares blankly ahead. Suddenly she grabs her guitar and smashes it against the wall, narrowly missing the psychiatrist’s head. [21]

As the authors delved deeper into the experiments on people Delgado became suspicious and tense. He terminated the interview not long after. Rather than regretting his time of psychosurgery innovation it is likely that Delgado was feeling petulant about being left out of the loop after his data was integrated into the continuing experimentation. He may have had considerable lack of success with the vagaries of brain plasticity but his work on animals was highly valued during the parallel mind control work of MK-ULTRA and other operations. Though unconfirmed, it is thought that Delgado worked on Project PANDORA as part of the CIA’s experiments into electromagnetic modulation with particular attention to scrambling the minds of soldiers on the battlefield. It was at exactly the same time that the CIA began to conduct radiation experiments on the US population, just prior to Delgado starting his research on electro-magnetic radiation and its capacity for influencing people’s consciousness.

After the 1974 congressional hearings the Doctor continued his animal research managing to link his brain implants with computers. This was documented in “Two-Way Transdermal Communication with the Brain” published in 1975 where he stated:

“The most interesting aspect of the transdermal stimoceivers is the ability to perform simultaneous recording and stimulation of brain functions, thereby permitting the establishment of feedbacks and ‘on-demand’ programs of excitation with the aid of the computer. With the increasing sophistication and miniaturization of electronics, it may be possible to compress the necessary circuitry for a small computer into a chip that is implantable subcutaneously. In this way, a new self-contained instrument could be devised, capable of receiving, analyzing, and sending back information to the brain, establishing artificial links between unrelated cerebral areas, functional feedbacks, and programs of stimulation contingent on the appearance of pre-determined patterns” [22]

In true “mad professor” fashion, Delgado continued his experimentation  on an island in Bermuda, where a group of gibbons were placed at his disposal. Naturally, the doctor had them all fixed with electronic brain implants which led him to discover how to build and destroy social orders using electrical brain boosts. [23] This would have been right up the technocratic street that was emerging in the warfare-ridden 1970s. So, this begs the question: after over thirty years of electronic implant tinkering what has the Pentagon, DARPA, NSA and unknown agencies come up with besides the RFID tagging systems? Our old friend the Nazi-tainted IBM needs to be brought in here.

Reflect on this confidential memo covertly obtained all the way back from October, 1995 from INTELLI-CONNECTION, a Security Division of IBM. In the form of an office memo, it reveals some interesting information. An edited extract follows:


 THE I.B.M. 2020 NEURAL IMPLANT

CONFIDENTIAL, LIMITED DISTRIBUTION ONLY, LEVEL 9 COMMUNICATION, 2020 NEURAL CHIP IMPLANT

   “Federal regulations do not yet permit testing of implants on prisoners, but we have entered into contractual testing of our product. We have also had major successes in privately owned sanitariums with implant technology… In California, several prisoners were identified as members of a security threat group, EME, or Mexican Mafia.

   They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge, Massachusetts laboratories.

   The implant procedure takes about 60-90 minutes depending on the experience of the technician. We are working on a device that will reduce that time by as much as 60 per cent. The results of implants on 8 prisoners yielded the following:

   Implants served as surveillance monitoring devices for threat group activity. Implants disabled two subjects during an assault on correctional staff. Universal side effects in all 8 test subjects revealed that when the implant was set to 116 Mhz all subjects became lethargic and slept an average of 18-22 hours per day. All subjects refused recreation periods for 14 days during the 116 Mhz test evaluation…”

   Each subject was monitored for aggressive activity during the test period and the findings are conclusive that 7 out of 8 test subjects exhibited no aggression, even when provoked. Each subject experienced only minor bleeding from the nose and ears 48 hours after the implant due to initial adjustment.

   Each subject had no knowledge of the implant for the test period and each implant was retrieved under the guise of medical treatment. The security windfall from the brief test period was tremendous. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities … In Massachusetts, the Department of Corrections had already entered into high level discussions about releasing certain offenders to the community with the 2020 neural chip implants.” [24]


What is the probability that such technology has been way in advance of anything we see from outsourced DOD departments which are overt and relatively open to public discourse? What of deep black projects far away from any oversight? Might we assume that method may be in development that could be used on the potential activist, dissident or “terrorist” when the SMART-Surveillance society (SSS) is fully integrated into a comfortable, consumerist paradise?

If we take the infestation of Satanic Ritual Abuse networks which appear to be seated in most centres of power and seeping into the waiting SSS managed by mind control technology both overt and covert, this is surely worse than any science-fiction novel we can imagine. If we are to give credence to Zbigniew Brzezinski’s visions, which in any case, may simply be explanatory notes to his fellow comrades signalling what will happen, the technology may already be in place and operational.

In his 1970 book Between Two Ages Brzezinski writes:

“… of a future at most only decades away,” upon which he related the opinion of an experimenter in intelligence control who asserted: ‘I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” [25]

This is the darker side of the transhumanism crowd and which permeates social network corporations, military-intelligence and the DARPA inspired National Surveillance state. The music emanating from SMART grid technology is that of the Pied Piper lulling his followers into a false dawn. Saturating ourselves in W-Fi and locking ourselves into a EMF grid; making our gadgets indispensable for our most basic daily needs is exactly what this mainframe seduction is all about. Part of being psycho-civilised is that we become seduced by the promise of more and more access, increasing efficiency and the ever smaller distance between “want” and “have.” The problem is, it appears to be an illusion, engineered with great precision, doffing it’s hat to ecological principles and economic alternatives whilst retaining a core-machine centralisation.

If we do not see the Magician behind these pretty lights and virtual enticements; these amenities offering a New Order of efficiency and ease, we will end up exactly as Henry David Thoreau wrote about his fellow man whom he believed had become : “… as tools of their tools.” When that happens and in combination with our illustrious pathocratic leaders, there may be very few choices to think freely, let alone act. We will be quite literally lost in the “simulation and simulacra”.

That is the antithesis of SMART.

 

See also: Satan’s Little Helpers VI: Sleepers and Electro-Shocks

 


Notes

[1] ‘Met police using surveillance system to monitor mobile phones’ The Guardian October 3, 2011.
[2] ‘Urban Wireless to Serve Intel and PSYOP forces’ by Mark Baard parallelnormal.com, July 19, 2007.
[3] http://www.patft.uspto.gov/
[4] ‘Method and an associated apparatus for remotely determining information as to person’s emotional state’ Inventors: Stirbl; Robert C. (New York, NY), Wilk; Peter J. (New York, NY) Appl. No.: 08/222,835 Filed: April 5, 1994 / 5,507,291 Stirbl et al. April 16, 1996. www. patft.uspto.gov/
[5] ‘Silent subliminal presentation system’ Inventors: Lowery; Oliver M. (Norcross, GA) Appl. No.: 07/458,339 Filed: December 28, 1989, issued as United States Patent 5,159,703, October 27, 1992. www. patft.uspto.gov/
[6] Utility Services in India’ | http://www.indiaonline.in/About/utilities/index.html
[7] The Military Use of Electromagnetic Microwave and Mind Control Technology’ by Dr Armen Victorian Lobster Magazine 1998. [8] ‘Horrifying US Secret Weapon Unleashed In Baghdad’ By Bill Dash, rense.com August 25, 2003.
[9] .‘Ariel Mind Control’ by Judy Wall, Editor/Publisher Resonance Newsletter of the MENSA Bioelectromagnetics Special Interest Group http://www.raven1.net/commsolo.htm
[10] ‘Magnetite Biomineralization in the Human Brain’ by Joseph L. Kirschvink, Atsuko Kobayashi-Kirschvink and Barbara J. Woodford, National Academy of Sciences. | Vol. 89. Biophysics, 1992.
[11]’US Electromagnetic Weapons and Human Rights’ By Peter Phillips, Lew Brown and Bridget Thornton, As Study of the History of US In telligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University, Project Censored Media Freedom Foundation.http://www.projectcensored.org/wp-content/uploads/2010/05/ElectromegnaticWeapons.pdf
[12] Ibid.
[13] ‘Non-Lethal Weapons (NLW): Industry, Technologies & Global Market’ 2014-2020 Aug 19, 2014 |http://www.marketwatch.com/story/non-lethal-weapons-nlw-industry-technologies-global-market-2014-2020-2014-08-19
[14] Ibid.
[15] http://jnlwp.defense.gov/Portals/50/Documents/Press_Room/Annual_Reviews_Reports/2013/DoD_Non-Lethal_Weapons_Program_Annual_Review_11.19.2012_HTML_format_v1.pdf
[16] Many accounts on psychotronic abuse are available to read in books and online. Some links: http://mindjustice.org/ | http://freedomfightersforamerica.com/victims_statements_pg1 [16] op.cit Philips, Brown, Thornton.
[17]The People Shapers by Vance Packard, published by Little, Brown & Co., 1977, (p.4).
[18] Joseph Delgado February 24, 1974 edition of the CONGRESSIONAL RECORD (MKULTRA hearings) No. 26, Vol.118.
[19] ‘Psychocivilization and Its Discontents: An Interview with José Delgado’ by Magnus Bärtås and Fredrik Ekman, Cabinet magazine, Issue 2 Mapping Conversations Spring 2001.
[20] Ibid.
[21] Ibid.
[22] ‘Two-Way Transdermal Communication with the Brain,’ Delgado, Lipponen, Weiss, del Pozo, Monteagudo, and McMahon, a co-operative publication of the Medical University of Madrid, Spain, and Yale University Medical School, 1975.
[23] Mass Control: Engineering Human Consciousness Jim Keith, IllumiNet Press, 1999. (p.99)
[24] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997. See also: (http://www.trufax.org/reports/2020.html)
[25] op. cit. Brzezinski (p.15) (Between Two Ages)

Technocracy XIII: All the way down to our DNA …

 “The year is 2025. The population is 325 million, and the FBI has the DNA profiles of all of them. Unlike fingerprints, these profiles reveal vital medical information. The universal database arrived surreptitiously. First, the Department of Defense’s repository of DNA samples from all military personnel, established to identify remains of soldiers missing from action, was given to the FBI. Then local police across the country shadowed individuals, collecting shed DNA for the databank. On the way, thousands of innocent people were imprisoned because they had the misfortune to have race-based crime genes in their DNA samples. Sadly, it did not have to be this way. If only we had passed laws against collecting and using shed DNA….”

—Professor David H. Kaye, ‘Science Fiction and Shed DNA’, 2006


ADN_animation

The structure of part of a DNA double helix (wikipedia)

If you are not quite into tattoos and are repulsed by the idea of implanting your body with anything, then this will probably tip you over the edge. It seems that tagging our bodies just doesn’t cut the mustard and something even deeper is required. Consumerism and crime prevention is to be the precursor.

Recalling our brief foray into Verichip and Positive ID marketing, work at the University of Aveiro in Portugal intends to add to that obsession. Researchers are busy developing DNA barcode tags that will soon be applied to a wide variety of products from foodstuffs to toiletries. Each tag in question has: “… a unique combination of DNA base pairs that attach to most surfaces, and can later be collected, amplified, and sequenced.”

So, how might these DNA tags might be used?

“… in some schemes a DNA “fog” might be used to spray violent protesters when there are not enough law enforcement personnel to immediately subdue the lot of them. That tag will be unique, and mark anyone who bears it, at least for a while. Over time however, the signal will spread and degrade. Multiple tags could be used to mark multiple events or increase reliability of a single event. Clearly though, finding a way to contain your marking agent at the outset is the cleanest option. [1]

Drawing our attention to the parallel practice of tracking animals and identifying species by biologists over the years, John Hewitt of Extreme Tech mentions the barcode of life, a project with: “… over 200,000 animals catalogued in a searchable database.” He makes the chilling analogy: “Since things like animals already come pre-barcoded, all one need do is find some region in their DNA that tends to mutate fast enough over time so that each species can be expected to show enough variation.”

In 2012, proposals were published by the UK government outlining the creation of a DNA database of the British population within the National Health System (NHS) complementing the Police National DNA Database which at 5,950,612 individuals, has more samples per head of population than any other country. [2]The European Court of Human Rights forced the British government to water down the reach of the Nationwide DNA data base. By way of response to the Strasbourg ruling, the government launched a “consultation exercise” in May of 2009 (which can be read as a PDF document online). The case that ruffled the feathers of the UK government so comprehensively was caused by two plaintiffs who had been arrested but proven innocent, and further, had been told police would be holding on to their DNA profiles indefinitely. The two individuals argued that this was a breach of their human rights. The court ruled in their favour and ordered the DNA profiles be removed and that the DNA samples have a cut off period.

The government have been doing their level best to justify the DNA database and the retention of DNA samples based on a similar position to the US Dept. of Homeland Security. Officials believe that even when people are arrested and cleared of any wrongdoing they are just as likely to commit future crimes as those who have been convicted. More Pre-Crime thinking? The basis for this conclusion came from the government’s own consultation paper which was heavily sourced from the work by criminologist Professor Ken Pease. Based largely on statistical evidence, the science in the paper was so shoddy that it caused The Guardian’s journalist and science writer Ben Goldacre to brand it: “… possibly the most unclear and badly presented piece of research I have ever seen in a professional environment”. [3]

Lancaster University Professors Brian Francis and Keith Soothill from their research carried out by the ESRC National Centre for Research Methods concluded that the six year retention of DNA data was based on “flawed evidence.” They launched a withering attack on the validity of the paper, stating:

The notion of ‘arrest’ is the main criterion used for action in the consultation document. While police arrests are not whimsical, they come at the beginning and not the end of the criminal justice process. Some people are disproportionately at risk of being taken into questioning by the police and being arrested. In contrast, a conviction is the outcome of evidence being tested in court. In fact, arrests are useful indicators of police action but not of guilt. Re-arrests are dangerous indicators and making arrests the pivotal criterion encourages the notion that we are moving towards becoming a police state. [4] [Emphasis mine]

The push to expand the DNA databases both in the UK and in the US is understandable since the logic appears to be sound. Similarly, it is very difficult to argue against victims’ family who have had their sons, daughters and loved ones murdered by criminals who may have been caught prior to the event had DNA profiling been more rigorous and well established. The Story of a State of Virginia mother and her fight to see the DNA database expanded to include people convicted of Class 1 misdemeanors stems from her sincere hope that it will save lives and produce some good from the murder and abduction of her 20 year-old daughter.

Many criminals will be arrested and duly placed on the database. No doubt persons will be trapped by DNA evidence and crimes solved. But the Home Office intends to keep all DNA profiles for at least six years with innocent persons still classed as criminals. Therefore, there will be no distinction between the guilty and the innocent where potentially important nuances in a case will be deemed immaterial. An innocent bystander? Too late, you’re on the DNA database as a criminal or even worse, sexual offender. What of activists, protesters and a whole host of extenuating circumstances that are difficult to address in a court of law? How would this affect the outcome of a case where the jury knows that the person accused is already listed? DNA science is in its infancy and there is still much to learn. The key change in the law meshes conveniently with terrorism and civil liberties in that everyone is now presumed guilty rather than presumed innocent before a trial. This is a significant change, both in terms of perception and profits.

Remember that the security complex in the USA is a huge business which the UK government intends to emulate. Therefore, for the Home Office everyone is a potential criminal and by extension, a source of revenue, though you obviously won’t find any civil servant admitting to such a heinous accusation. But that is the trajectory – a corporate push to privatize the prison industry where crime is profitable. For the authorities, just as soon as everyone is on the data base the better for society. And their stock options.

Over 70,000 under-16s have now had their genetic fingerprints recorded and as of writing, Police authorities have yet to delete more than 165,000 innocent people from their records. [5]As UK politician for the Liberal Democrat party Lynne Featherstone said: “There is no purpose or justification for keeping the DNA record of anyone who is not charged with an offence,” adding: “With the growing concern about racial profiling and disproportionality in criminal investigations, the need to keep innocent people on the DNA database is questionable.” [6]

The United States has the largest DNA database in the world, with 10.7 million offender profiles and 1.8 million arrestee profiles.[7]  The US has the highest number of prisoners in the world at over 2 million and thethird largest incarceration rate. This translates as 1 in every 31 adults or half the world’s prison population of about 9 million held in the US. The prison-security complex rakes in billions of dollars a year, with the corruption of the law enforcement and justice system at all time highs the question of DNA profiling becomes ever more problematic.

1024px-CBP_chemist_reads_a_DNA_profileU.S. Customs and Border Control chemist reads a DNA profile to determine the origin of a commodity. (wikipedia)

The FBI has been collecting one million DNA samples a year under a new program that allows federal agents to take cheek swabs from people arrested for any crime including non-US citizens. They can also take DNA from any arrestee or ‘detained’ non-citizen and upload it to the FBI’s CODIS database networked to law enforcement authorities in over 50 states. In June of 2013, the United States Supreme Court ruled it constitutional to take DNA samples from people who have been arrested for serious crimes without a warrant, let alone a conviction. The federal government and 28 states across America already collect genetic samples from people arrested for crimes (felonies, certain misdemeanors) with the remaining 22 states that only take samples from people convicted of those crimes.

DNA profiles and their genetic markers can provide excellent supporting material when there is scientifically valid evidence in a case overall, such as placing a suspect at the scene of the crime. It becomes problematic when a jury assumes that DNA evidence is incorruptible and scientifically unassailable. Mistakes continue to occur and the probability will increase as the database expands. When you search for a match in an ocean of profiles the likelihood of finding an innocent person along with the perpetrator of the crime also increases. And what if the perpetrator is not in the database, but you still find a sequence of markers that denote a match?

This has been dubbed the “CSI Effect” when a jury places too much emphasis on DNA evidence. In one case, a 22-year old Farrah Jama, a Somali immigrant was sent to prison for 16 months for the rape of a 48-year-old woman – a rape that didn’t happen. A report in The Australian described how the prison sentence was quashed: “… after it was discovered the DNA sample that incriminated him was contaminated.” Although a cultural bias of the jury was also probably operating “… the Somali migrant was successfully prosecuted based solely on his DNA being found on the victim, despite the fact he had an alibi and there was no other evidence to connect him to the alleged crime.” [8]

A study from the New Scientist magazine in 2010 found DNA fingerprinting to be “highly subjective and prone to error,” which due to: ” incredibly small amounts of DNA in samples and pressure to gain a conviction can lead to bias…” The study involved DNA from a real crime scene which was sent to 17 experienced analysts in an U.S. laboratory. The results were a resounding failure since all the scientists conclusions were different:

The sample, from a gang rape, had already been used to convict a man  –  but only one of the 17 scientists came to the same conclusion. Four said the evidence was inconclusive and 12 said he could be excluded.

Itiel Dror, a University College London scientist who helped set up the investigation, said: ‘It is time DNA analysts accept that under certain conditions, subjectivity may affect their work.’

Christine Funk, a defence lawyer in the U.S., said: ‘The difference between prison and freedom rests in the hands of the scientist assigned the case.’ [9]

Jeremy Gruber, as President of the Council for Responsible Genetics is in no doubt that miscarriages of justice will occur more often as symptomatic of a system predicated on the very core problems that give rise to serious crimes in the first place.

He states:

We are not only building bigger and bigger databases, but expanding collection practices as well. Police are now using DNA dragnets, where DNA is taken from a selected population without individualized suspicion or of individuals who happen to live near a crime scene or who happen to match a certain physical profile. Some police departments are operating their own “off grid” DNA databases with little oversight and police and prosecutors in some cities and counties (such as Orange County, CA) are taking DNA “voluntarily” from individuals arrested for petty crimes in exchange for dropping charges against them.

Familial searching, a deliberate search of a DNA database conducted for the intended purpose of potentially identifying close biological relatives to the unknown forensic profile obtained from crime scene evidence, is becoming more widespread. Such searches virtually guarantee that DNA databases will create suspects out of innocent people, and because of the composition of DNA databases, those innocent suspects will disproportionately be people of color. Crime scene DNA has also been used to predict physical characteristics, such as certain shades of hair color, and to draw broad conclusions about genetic ancestry. Concerns have been raised about these predictions being used for crude profiling, potentially racially tinged, which have led Germany and several U.S. states to bar their use by police. Even so, new research on “molecular photofitting” (producing a crude image of a suspect’s face from DNA left at the crime scene) suggests that such reconstructions may soon be possible, giving police another investigative tool that could result in wrongful arrests and unjustified searches. [10]

Andrew Pollack writing in the New York Times was already sounding the alarm on DNA profiling back in 2009. Indeed, scientists “fabricated blood and saliva samples containing DNA from a person other than the donor of the blood and saliva,” and with access to: “…a DNA profile in a database, they could construct a sample of DNA to match that profile without obtaining any tissue from that person.” In effect, the danger of being framed and set up via a fabricated crime scene is very real. [11]This is precisely what happened to David Butler who was wrongfully jailed by UK courts for murder, spending eight months in prison on remand whilst facing murder charges: “after his DNA was allegedly found on the victim.”  He was accused of murdering Anne-Marie Foy in 2005 and arrested by Merseyside Police with “poor quality” DNA evidence and sourced from his DNA sample, already on record. According to a BBC report: “… he remained in prison – despite other CCTV evidence allegedly placing Mr Butler in the area where the murder took place being disproved.” [12] 

At the same time, exoneration of those who were thought to have committed crimes is an undeniable outcome of DNA profiling. The Innocent Project is a case in point, with over 325 post-conviction DNA exonerations in the United States in the last several years. So, DNA profiling is overturning convictions and setting people free on the one hand, and on the other, it is putting innocent people away based on faulty science and a corrupt intelligence apparatus, the latter of which is not decreasing but naturally increasing as a consequence of the push to profit and ubiquitous surveillance.

The FBI, who are the biggest supporters and sellers of the terror industry, are also a major force behind the expansion of DNA databases. Indeed, it seems the Bureau is still updating its whole retrieval and storage protocols under a CODIS Core Loci Working Group operational since May 2010. Ostensibly, this is an exercise in improving the system though in effect, it is an expansion until international data-sharing efforts are optimised. This is also about where massive amounts of data can be stored about the population and stored indefinitely. Once again, the State has all your information and the public has nothing. Given the current condition of government this is far from reassuring.

DNA

Clearly, this isn’t about throwing DNA analysis out of the window, nor any form of technology. What is needed is to see it in the context of what has gone before and to forestall a certain trajectory that falls straight into the hands of those overseeing societies and for whom long-term objective of social control is the prime directive. The justification for creating this huge database of samples is to combat crime and prevent terrorist acts.  Overall, crime is decreasing however and we know all about the nature of the Terror industry as a manufactured strategy of tension … When macro-social imperatives are still firmly inside Official Culture, discrimination and utmost caution is needed to keep such Establishment directives from ensnaring those most vulnerable. As we saw in The Politics of Entrapment despite safeguards in place, the wider awareness of ponerological forces is missing.

In general, the DNA database will probably lower crime as well as decreasing privacy. Yet, since the root causes of crime are not addressed the very need for a DNA database will inevitably morph overtime into a repressive tool of the state. Minimising risk by destroying DNA samples after cases have finished and even reducing the storage of sensitive information only needs a suitably horrific set of crimes and a large-scale terror attack for such measures to be repealed. This would follow the NDAA and Patriot Act rationalisations which have nothing to do with protection or civil liberties and everything to do with state control of the population.

This is why humans must become “pre-barcoded” as part of sequential phase of identifying, cataloging, tagging and monitoring. A global neo-feudal State requires a distinct species, separate from the Establishment Elite who consider themselves genetically superior. It may well be that the various strains of psychopathy currently jostling for supremacy in the corridors of power are merely seeking to expand their numbers. Surveillance is part of the armoury of technocratic science which gathers data and seduces the populace to regard this intrusion as normal and more importantly, something that is desired. The terror industry and national crime augment this propaganda.

As Jeremy Gruber summarises:

“We are at a critical juncture in the United States, as law and policy are rapidly allowing law enforcement greater access to Americans’ DNA with limited public discussion and debate. Continued expansion of the power of law enforcement to collect and store DNA must be guided by a transparent debate that balances legitimate public safety concerns with human rights and privacy interests and that is honest about the value of forensic DNA, recognizing the limited benefits of expansion beyond likely re-offenders.” [13]

There is a huge momentum currently behind new technology and the speed of its arrival in so many avenues of our lives. Networked databases present clear advantages in the hands of a benevolent culture – something that is however, only a working hypothesis.  Time is getting short for ethical safeguards and preventative measures to be implemented that could ensure this forensic tool is kept out of the hands of Pathocratic ideology.

 


Notes

[1] ‘Scientists create DNA tracking tags, might soon be used to track protesters as well as animals’ By John Hewitt, http://www.extremetech.com, on September 30, 2013.
[2] ‘Government revives plan for greater data-sharing between agencies’ The Guardian, by Alan Travis, 24 April 2012 | ‘The UK Police National DNA Database’ Gene Watch, http://www.genewatch.org.
[3] ‘DNA database plans based on ‘flawed science’, warn experts’ The Guardian, July 19, 2009.
[4] ‘Reviewing the DNA database’Impact Case Study by Professors Brian Francis and Keith Soothill Lancaster University, ESCR Economics and Social Research Council. 2009.
[5] ‘Details of innocent people are still being held on DNA database’ The Independent, June 5 2012 | ‘Another 165,000 innocent people put on DNA database despite Coalition vow to wipe details’ By Rebecca Camber, The Daily Mail, 4 June 2012.
[6] ‘DNA database continues to swell’ BBC News, 4 January 2006.
[7]See FBI, CODIS-NDIS Statistics, http://www.fbi.gov/about-us/lab/biometric-analysis/codis/ndis-statistics
[8] Networked Knowledge, Media Report by Dr. Robert N Moles http://www.netk.net.au
[9] ‘DNA fingerprinting techniques ‘can sometimes give the wrong results’,By Fiona Macrae for the Daily Mail
18 August 2010.
[10]THE POLICE WANT YOUR DNA By Jeremy Gruber, GeneWatch 27-1 | Jan-Apr 2014.

[11] ‘DNA Evidence Can Be Fabricated, Scientists Show’ By Andrew Pollack, August 17, 2009.
[12] ‘DNA test jailed innocent man for murder’by Hannah Barnes, 31 August 2012,BBC News
[13] op.cit Gruber.

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Technocracy XI: Social (SMART) Grid and “Cognitive Infiltration”

“A really efficient totalitarian state would be one in which the all-powerful executive of political bosses and their army of managers control a population of slaves who do not have to be coerced, because they love their servitude.”

Aldous Huxley, Brave New World


thSocial networking websites like Facebook, Twitter, Tumblr, Yahoo! and others have offered new ways to chat, make friends, speed-date and keep in touch with family wherever you are. It has revolutionized information in ways which we are only just beginning to understand. The networks have become such a normal part of our daily lives in such a short time that it is only recently that serious questions about privacy and surveillance have filtered through to the MSM. But ethical questions are being left behind as the Information Age surges ahead. Indeed, if you don’t have a Facebook account then you have already consigned yourself to the hinterlands of suspicion and abnormality. According to some, this may even be a red-flag for suspected terrorist or paedophile. Such is the power of social networking websites on society and the ridiculous assumptions now circulating. [1] $billion companies like Twitter and Facebook have become the largest database on the global population, representing a free and easy resource for intelligence agencies to data-mine. With over 900 million active users it is not difficult to see how useful data catchment could be.

Growing awareness that social networks are being used by intelligence agencies to monitor citizens’ activities prompted cyber-consumer advocate Electronic Frontier foundation (EFF) to file requests in October 2009 to provide records about federal guidelines on the use of social networking sites for investigative or data-gathering purposes. Among other issues related to surveillance as discussed previously, they sued the CIA, the US Department of Defence, Department of Justice and three other government agencies for allegedly refusing to release information on their involvement in social networks. The cases are on-going.

There are so many dubious aspects to Facebook aside from its intelligence connections and origins it is hard to know where to start. We will pinpoint a few however.

The company makes no secret of is its drive to know everything about its members. It wants to extract and mine as much the data from them as is humanely possible and then make it available to all kinds of interested parties. The implications of their drive to happily make your social life – including information you might not ordinarily reveal – fully integrated into the net experience is of course, never discussed. Facebook has been busily creating “Shadow Profiles” in a bid to extract even more information. Using various functions on the software interface which encourages users to share personal data of other users and non-users of Facebook such as mobile phone synchronization, search queries, friend invitations, email-provider imports and instant messaging means that even if you don’t use Facebook you may have a profile nonetheless. [2]

Since Facebook is such a fan of being “social by default” then it shouldn’t be concerned when the tables are turned. Since Facebook revealed in 2012 that more than 83 million Facebook accounts (8.7% of total users) were fake accounts, ongoing controversies with privacy issues, class action lawsuits and litigation as well as the virtual ownership of members’ profiles, it is hardly surprising this was reflected in the stock value which dropped below $20 in the same year. [3]


th“You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”

– Facebook Terms of Service. (It has since been updated yet protests groups claim little has changed).


When independent software developer Pete Warden crawled all the data that Facebook’s privacy settings changes had made public, the company sued him. This occurred before the Open Graph API system which means they were planning to make the data publicly available anyway. As Vice President of Engineering at Border Stylo Dan Yoder comments: “Their real agenda is pretty clear: they don’t want their membership to know how much data is really available,” stating further: “It’s one thing to talk to developers about how great all this sharing is going to be; quite another to actually see what that means in the form of files anyone can download and load into MatLab.” [4]

In 2010, a Canadian security researcher Ron Bowes created a specific crawler script which he then used to take information from Facebook’s open access directory. He managed to download 2.8Gb of personal details including credit card numbers, account names, profile URLs and contact details; names of those users’ friends, (even with hidden profiles) and more intimate photos of over 100 million Facebook users. This cache of private information gold was then dumped on P2P file-sharing service BitTorrent, which was subsequently downloaded by scores of major corporations many hundreds of times. The point was not the relative ease by which such data was “stolen,” though this is an important issue, it was the fact that the data is already publicly available, provided Facebook members have not chosen to hide their profile from search results. [5]

As of 2012, there are now a raft of members, celebrities, underwriters and advertisers all taking a cut of Facebook profits. On the management board is co-founder and CEO Mark Zuckerberg with the largest ownership percentage of an individual at 28% (he is worth $33.1Billion) with co-founders Eduardo Saverin, Dustin Moskovitz, Sean Parker taking between 6-4%.  Venture capital company Accel Partners, Russian internet firm Mail du Ru take 10% repsectively and former PayPal CEO and venture capitalist Peter Thiel 3%. Thiel sums up Facebook’s history of double-dealing and entrepreneurship very well.

mark-zuckerbergCEO Mark Zuckerberg

The first lump sum from his venture capital funding amounted to $500,000 – a tidy sum no doubt drawn from his £3bn hedge fund Clarium Capital Management and a venture capital fund called Founders Fund. Thiel is the Author of an anti-multicultural missive The Diversity Myth and on the board of VanguardPAC a radical internet-based Neo-Conservative pressure group that was apparently set up to attack MoveOn.org, a left-liberal pressure group website. VanguardPAC’s mission is to “reshape America and the globe” according to Neo-Conservative values – the type of values which are still carving up the Middle East. Thiel is certainly not the shy and retiring type and promotes a New World Technocracy laced with transhumanist and right-wing conservatism. The Guardian’s Tom Hodgkinson summarises Thiel’s curious mélange of fascist views: “… since the 17th century, certain enlightened thinkers have been taking the world away from the old-fashioned nature-bound life, and here he quotes Thomas Hobbes’ famous characterisation of life as ‘nasty, brutish and short’, and towards a new virtual world where we have conquered nature. Value now exists in imaginary things.” [6]

pthiel1

Peter Thiel: Technocratic Neo-Conservative

From where did Theil obtain his inspiration? Stanford’s University’s René Girard and his mimetic theory that states all cultures and ancient societies were built on the victimisation and an eventual sacrifice of the innocent, even though they believed they were guilty. Mythology was used to legitimise and rationalise the fact that society was founded on violence. If Girard believes that people are sheep and will follow the one strongest in the herd then according to Hodgkinson:

“The theory would also seem to be proved correct in the case of Thiel’s virtual worlds: the desired object is irrelevant; all you need to know is that human beings will tend to move in flocks. Hence financial bubbles. Hence the enormous popularity of Facebook. Girard is a regular at Thiel’s intellectual soirees. What you don’t hear about in Thiel’s philosophy, by the way, are old-fashioned real-world concepts such as art, beauty, love, pleasure and truth.” [7]

Perhaps this is something that may be said for much of the neo-feudalist collectives currently infiltrating our social systems?

Consider the other board member of Facebook, Jim Breyer a partner in the venture capital firm Accel Partners who put $12.7m into Facebook in April 2005:

“…. On the board of such US giants as Wal-Mart and Marvel Entertainment, he is also a former chairman of the National Venture Capital Association (NVCA). Now these are the people who are really making things happen in America, because they invest in the new young talent, the Zuckerbergs and the like. Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which “identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions”. [8] [Emphasis mine]

With significant lobbying costs totalling over $41,000 in just one quarter of 2010 the focus of their expenditure was primarily intelligence agencies such as the Office of the Director of National Intelligence (DNI) and the Defence Intelligence Agency (DIA). It was the only internet company to do so out of Google, Amazon, eBay, Microsoft, Yahoo and Apple. The DNI is an umbrella office founded in the wake of 9/11 synthesizing intelligence from 17 agencies (including the CIA) and advises the President on privacy and federal cyber-security policy.

Which begs the question: Is Facebook lobbying merely to keep their operations free from interference for their Intel handlers?

Meanwhile, Facebook, Blogs, newspapers, radio TV channels, and internet chat rooms are poured over and monitored by the Open Source Centre or “vengeful librarians” – even the constant “tweets” from the Twitter network reaching over 5 million per day. Information is gathered by an army of analysts to find the low-down on the emotional level of a certain city demographic or whether a country is ready to be invaded or …”Democratised.”

facebooklogin1


 “Facebook is not your friend, it is a surveillance engine.”

– Richard Stallman, software freedom activist


It is now common knowledge that The U.S. Department of Homeland Security’s command centre monitors blogs, forums newsgroups and message boards on a daily basis. Scores of popular websites, including Twitter, Facebook, WikiLeaks, Hulu, and many alternative and left-leaning news sites also come under the umbrella of US surveillance.

Among the many examples that the Obama Administration has provided and which go above and the beyond the Neo-Conservative crimes of the Bush-Cheney cabal is President Obama’s regulatory Czar and legal scholar Cass Sunstein. Just before his appointment as Administrator of the White House Office of Information and Regulatory Affairs, this gentleman managed to add to the grand façade that is American democracy by writing a 30-page academic paper co-authored with Adrian Vermule entitled: “Conspiracy Theories.” In the paper he suggested the government should “infiltrate” social network websites, chat rooms and message boards. This “cognitive infiltration,” according to Sunstein, should be used to enforce a U.S. government ban on “conspiracy theorizing.” This ban would be imposed on such heresies as anti-anthropocentric global warming; the World Trade Centre attacks on 911 were an inside job; Al-Qaeda is a US government-created mercenary unit for hire and a range of other proven conspiracy facts, most of which feature on this blog. By “conspiracy theory” Sunstein defines it as “an effort to explain some event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Heaven forbid we should try to expose that …

And of course, Sunstein implies that that there are no conspiracies operating in government, banking and corporate activities and if you are one of the mentally deranged few that believe so, then medical help and a good psychologist is the only path open to you. It seems everyone is a potential extremist if you are aren’t giving the government a virtual back-rub. He further suggests: ““… a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity.” [9]

Cass SunsteinCass Sunstein 2011, (AP Photo)

Sunstein’s objective is to raise: “… doubts about their factual premises, causal logic or implications for political action,” which places a whole new angle on some of many trolls and trouble-makers who periodically appear on website forums to sow seeds of discontent in ways which follow distinct patterns of emotional programming indicative of paid disinformation agents. Indeed, PSYOPS targeting the web have been in operation for several years, possibly since the internet’s inception in some form or another.  Sunstein’s suggestions are merely an updating of the US Dept. Defence’s Information Operations Road Map of the future. [10]

To make sure such a future – and the mass mind – is firmly where it should be DARPA means to keep biometrics and the internet connected to the same port (which, one day soon, may be located at the back of our skulls). Pentagon scientists are helpfully creating a program to use biometrics as a platform for creating a “cognitive fingerprint” which would dispense with all those passwords building up in our little black books. Which means, according to their website: “… validating any potential new biometrics with empirical tests to ensure they would be effective in large scale deployments.” Named the Active Authorisation Program (AAP) it offers deep analysis of the user’s cognitive processes and thus their online behaviour in the hope of inventing new forms of biometrics so that your identity can be ascertained.

Parallel to this grateful assistance in making our lives so much more efficient and safe, online tech journal Security Ledger reported in April 2013 on one time hacker and DARPA’s cyber chief Peiter “Mudge” Zatko heading to Google Inc. Joining Google’s Motorola Mobility’s Advanced Technology & Projects (ATAP) group, it has a mission to deliver “breakthrough innovations to the company’s product line on seemingly impossible short time-frames.” While Microsoft continues to track users of the Windows phones which have a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and really any of the big internet companies. Google knows the password of every Android device (phone or tablet) which has ever logged on to a particular Wi-Fi network. (Android accounts for 79 per cent of phones shipped worldwide).

Business Insider’s article of August 14th, 2013 alerted us to the fact that if you are one of 400 million persons who chose Gmail then you can also expect no privacy at all. In a class action complaint of 2013 Google responded by claiming “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” So, be warned, even though it is unlikely you’ll be able to avoid Google even if you wanted to.

It seems Google and DARPA are courting each other for good reason.

 


Notes

[1] Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’ Daily Mail, 6 August 2012.
[2] ‘Facebook Is Building Shadow Profiles of Non-Users’ October 18 2011, http://www.slashdot.org
[3] “Facebook: About 83 million accounts are fake”. USA Today. August 3, 2012.
[4] ‘Top Ten Reasons You Should Quit Facebook’ by Dan Yoder http://www.gizmodo.com May 3 2010.
[5] ‘How 100 million Facebook users ended up in a list on BitTorrent’ Jemima Kiss, The Guardian, 29 July 2010.
[6] ‘With friends like these …’ by Tom Hodgkinson, The Guardian May 2010.
[7] Ibid.
[8] Ibid.
[9] ‘Conspiracy Theories’ by Cass R. Sunstein (Harvard Law School) and Adrian Vermeule (Harvard Law School) January 15, 2008, Harvard Public Law Working Paper No. 08-03, U of Chicago, Public Law Working Paper No. 199 U of Chicago Law & Economics, Olin Working Paper No. 387. [ During my own experience in working for several alternative news websites there was no question that persistent problems from site “trolls” on the relevant forums fell into this category. Some exhibited high knowledge on certain specialist subjects and exhibited a standard formula for contouring ideas and concepts which included the very same “cognitive infiltration” tactics cited by Sunstein and often in a highly elaborate form. Once “outed” they were gone but often the damage was already done].
[10] As part of the “Information Dominance” strategy of the Pentagon, ‘The Information Operation Road Map’ was a paper commissioned in 2003 and declassified in 2006. It was personally approved by the then Secretary of Defence Donald Rumsfeld. It included details of major PSYOPS disinformation campaigns to place false stories in newspapers and the internet as well as the kind of beginings of “cognitive infiltration” that Sunstein was so keen to see materialise.

Save

Technocracy X: Nano-Science (2)

 “We cannot rely on trial-and-error approaches to deal with existential risks… We need to vastly increase our investment in developing specific defensive technologies… We are at the critical stage today for biotechnology, and we will reach the stage where we need to directly implement defensive technologies for nanotechnology during the late teen years of this century… A self-replicating pathogen, whether biological or nanotechnology based, could destroy our civilization in a matter of days or weeks.”

― Ray Kurzweil, The Singularity is Near: When Humans Transcend Biology


dna_nano_tech-wideThe military is the largest investor in the U.S. Nanotechnology Initiative (NNI). The share of the NNI budget given to the Department of Defence (DoD) since the program started has reached $6.6 billion with part of the expenditure going to DARPA and the departmental laboratories of the Navy, Army and Air force, the rest ending up at universities as research grants or as part of the Multi-University Research Initiative (MURI).[1]  Though spending has been fluctuating since 2007, there remains steady interest in nanotech’s military capabilities. Scientists for Global Responsibility (SGR) revealed from their research that: “… government funding for military R&D dwarfs that spent on social and environmental programs across the industrialized world …” with military R&D fixed towards “… a narrow weapons-based security agenda.” [2]  Which means the marginalisation of conflict prevention and analysis of the roots of conflict and its links to poverty, the environment, security and health issues continue to be under-funded. Nanotech advances are being hijacked away from improving civilian life with “game-changing” technology as the culprit.

A fervent need to make these grand visions a reality was given a sturdy platform for realisation back in 2007 from the DoD and their little known advisory body called the Defence Science Board (DSB) whose paper entitled: “DSB 2006 Summer Study on 21st Century Strategic Technology Vectors” laid some important groundwork for the future. In an attempt to place nanotech at the top of the military agenda the paper drew their attention to “synergistic combinations” of all forms of nanotech and their “… truly revolutionary capabilities in human performance enhancement, medical treatment and prophylaxis, miniaturization, life extension, robotics, and machine intelligence …” [3]  It was unabashed in its agenda for clandestine tagging and tracking, where: “A combination of nanotechnology, biology, and chemistry promises to provide significant increases in capability to conduct pervasive surveillance on a global basis.”

spybee

prototype for cyborg-bee © unknown

Some of these other applications currently in R & D or primed and ready for action include the following:

Nano-biotechnology – or miniaturized biotechnology is the recent development of merging biology research with nanotechnology, most notably using biomolecules, bio-membranes and nano-photonics for vaccinations and virus research. Particularly active in medical fields the new science is seeking to generating cures; develop stem cell treatments, creating muscle tissue and artificial proteins. The convergence between computers and biology is of primary interest where eventually computing will be sourced from a biological platform where “Colonies of live neurons can live together on a biochip device.” [4]

Nano-electronics – The development of molecules with useful electronic properties which can then be used in nano-devices. This includes synthetic chemical methods and the creation of synthetic molecular motors. Other forms include carbon nano-tubes which have taken over from silicon-based chips. Now, the race is on to fit billions of these tubes onto computer chips thereby increasing the chip performance to “… run at more than three times the frequency and consuming just a third of the energy.” [5]

DNA nanotechnology – the construction of structures out of DNA and other nucleic acids. This branch has a special relationship to nano-medicine and “SMART drugs” for targeted drug delivery, the development and creation of vaccines and the adjacent field of nano-electronics with real world applications in both fields looming large. [6]

Nano-robotics/weaponryself-sufficient machines operating at the nano-scale. Applying nano-robots in medicine are proving difficult due to a multitude of problems adapting to the biology of organic systems, though progress is there. However, military nano-robotics in combination with cybernetics is moving ahead in leaps and bounds. There are still very little scholarly articles on the nature and pace of advances on military robotics along with only a sluggish attempt at raising the ethical and moral issues inherent in the use of such weaponry. What is clear is that the military is getting very excited by it all due to the unlimited scope of applications. Reduced to the size of perhaps 0.1mm or less, autonomous mini and micro-robots could be deployed on the ground, in water and in air, using the same propulsion principles found in larger electronic and mechanical systems. All forms of movement are mimicked such as human legs, various types of hopping, flapping wings like a bird, flagella, and even side-winding movements of a snake. The multi-purpose nature of robotics means that weapons systems targeting, reconnaissance, communication and surveillance are easily utilized. Insects and small mammals are already being integrated into bio-cyborg hybrids with nervous system and brain interfacing with cybernetics, software and electrodes.

cyborg-mothcyborg moth | © unknown

Returning to our whacky friends down at DARPA and their various sponsored companies and subsidiaries, we find they are still churning out helpful prototypes for new ways to spy, maim and murder. Some of these latest offerings are still prototypes, in the manufacturing stage or on the drawing board. They comprise:

1) Nano-Scouts – real insects and simulated bird-like technologies which act as the eyes and ears of intelligence. Flies and mosquitoes have embedded nanotech capabilities which allow them to determine the presence of certain chemicals, changes in moisture levels or barometric pressure, and be able to sense movements, temperature, and vibration.[7]

2) Nano-Poisons – A variety of toxic substances with nanomolecules carefully tailored to illicit the correct responses. By interfering with neuro-chemical inhibitors and release agents introducing precise “onboard” quantities of synthetic poisons behaviour modification is taken to a whole new level. Almost any type of mind control would be available from encouraging the victim to lie obsessively to provoking suicidal thoughts; stimulating a person to react violently or to kill. And of course, a Brave New World of somatic release could be programmed where the person cannot help but love everyone and where anger and aggression is blocked. Nano-molecules would effectively quadruple the effectiveness of purely psychological methods of mind control.

3) Nano Force Fields –nano-coatings which can hermetically seal a vehicle or building by allowing particles to seek out air gaps and block them.

4) Nano Mind Erasers – Want to take out a politician or spy without fuss or bother of assassination? Then, inducing the equivalent of instant Alzheimer’s is the answer. Wiping the sections of the brain clean using micro fields programmed to flare up as tiny, molecular neutron bombs would do the trick.

5) Nano Needles – With no visible wounds and invisible to the naked eye these weapons represent an up-dated version of the old KGB poison-tipped umbrella. The needles could be shot from a suitably modelled gun to paralyse people. Presumably the lethal nature of the needles would be dependent on their carrier capability.

6) Nano Heart-Stoppers – Nano-blood flow restrictors and Stroke Inducers – Long known to be a part of military-intelligence operations the assassination of sensitive targets such as politicians, heads of state and celebrities. Undetectable in the blood stream, nano-molecules could mimic heart attacks or strokes; restrict the blood flow causing an array of symptoms, even inducing personality disorders.

7) Nano-Naut Swarms These are ‘SMART dust’ particles which act as an information or sensor clouds capable of analysing areas with sharp detail and relying back information to HQ. As reported in the MSM in early February 2013, the British Army has been deploying tiny nano-drones in Afghanistan for over two years. At just 10cm long and weighing only 16 Grams they are used to relay full motion video and still images back to the devices’ handlers. But technology is advancing as fast as weapons can be bought.

8) Cyborg Insects – could be the delivery tool of much of the above allowing viruses and lethal substances to be to their individual or mass target, something that Bill Gates and his forays into mosquito-driven vaccines would no doubt happily welcome. Spying and surveillance capabilities have also been successfully tested and deployed. One of DARPA’s less malevolent offerings, the Nano Hummingbird was named One of Time Magazine’s 50 best inventions of 2011. Shaped like a humming-bird the mini robot is remotely-controlled without an external power source and can fly, hover, move forward and backward in the air while shooting Hi-Resolution video.

9) Programmable Matter – Starting in 2007, with DARPA support, Carnegie Mellon delved into the possibility of creating hardware and software to make material that can programmed to morph into 3-Dimensional shapes – essentially, shape-shifting. Named the Claytronics Project, the brains behind this venture believe that it has the capacity to change every facet of human experience. They consider claytronics to be a platform for a new form of called “Pario” with the reproduction of moving 3-D objects the primary goal. In other words, the quest to program the world around us. Just a few years later in 2010 with a “self-folding origami” robot which can literally fold itself up and crawl away. Meantime, shape-shifting sand made an appearance in 2012 where; “New algorithms enable heaps of ‘smart sand’ that can assume any shape, allowing spontaneous formation of new tools or duplication of broken mechanical parts.” This of course begins to the blur the whole fields of nanotechnology bioengineering, cybernetics, biological-based pharmaceuticals, programmable vaccines and the advance of synthetic biology.

The US Department of Defence is also researching the feasibility and applications of robotic mosquitoes. So far testing has found that they can be remotely controlled with an on-board camera and a microphone. They will be able to land on unsuspecting dissidents or terrorists with the potential to take a DNA sample or leave RFID tracking nanotechnology on your skin. Flying in through a crack in your window or attaching itself to your clothing in passing would prove no problem for these adorables. No doubt law enforcement and Homeland Security are salivating at such a prospect. [8] In fact, sightings of insect-like drones have been occurring for years in the US, most frequently at activist demonstrations and marches. According to a 2006 Flight International report: “… the CIA had been developing micro UAVs as far back as the 1970s and had a mock-up in its Langley headquarters since 2003.”

robot_insectAssuming such machines can fly onto a local protester’s arm and then wing its way back to its controller with a fresh little DNA sample to analyse, this compliments another disturbing scenario as described by authors Andrew Hessel, Marc Goodman, and Steven Kotler who “…outline futuristic human genome work that evolves from the very real GE $100 million breast cancer challenge.” In this scenario: “freelancers receive bids to design personalized virus offering customized cures for the sick.” An individual succumbs to colon cancer and instead of going the route of standard chemotherapy he chooses an immediate payment of $1000 to have his genome decoded over two days. Virologists of the near future will have information about the disease and the exclusive genome sequence. The design cure will be outsourced the winning bid providing the formula to rid your body of the specific cancer. Targeting the US President by criminal cartels or terrorist cells would be relatively easy.

A 2010 release of secret cables by WikiLeaks, Secretary of State Hillary Clinton ordered US embassies “… to surreptitiously collect DNA samples from foreign heads of state and senior United Nations officials.” [9]With that in mind, an article by Atlantic magazine takes the next logical step in personalised bio-weapons and micro-drones.

Picture an African President busy with civil war and child soldiers. Perhaps his DNA had been sampled as part of a UN / US mandate. A drug is tailored to that genome sent to an online bio-marketplace and synthesised into actual genetic material. The authors explain that it is here that “… the future of drones and virology could intersect.”

The article continues:

A few days later tablets are delivered to a group that dissolves them and injects the liquid into a handful of micro-drones. The team releases the drones and infects the people in the African leader’s circle of advisors or family. The infected come down with flu like symptoms, coughs and sneezes that release billions of harmless virus particles — but when they bring their symptoms in the vicinity of the African leader — the particles change. Once the virus particles are exposed to that very specific DNA sequence, a secondary function within their design unlocks.[10]

Perhaps the formula contained a “fast-acting neuro-destructive disease that produced memory loss and, eventually, death.” For the African leader or any other head of state which was proving an obstacle to US hegemony “the symptoms could be tailored an infinite number of ways. Designed to reflect a uniquely local affliction like Dengue Fever, or to appear like symptoms of a genetic condition.” [11]Combined with the inherent nature of the military-coporate-banking complex and with their puppet Obama who sees no problem with murdering American citizens via remote drone attacks discarding any notions of law and democratic due process, then you can be sure that such a scenario will take place in the very near future – if it hasn’t already.

The above scenario set against military nanotechnology and other forms of “non-lethal” warfare is justified due to the threat of terrorism and the belief that we can all bring an end to the world’s violence and crime. It is believed that technology will save the day on the battlefield and in civilian life. If left to these people it would rapidly start to resemble an endless battle in itself, which is the general idea. Convincing people not to act on their “evil” thoughts by allowing nano-dust particles to seep into their brains is bread and butter behaviour modification. For anyone else, it is a step towards a Huxleyian nightmare.

Although many commentators prefer to believe that the fail-safe mechanisms of quantum computing and the intelligence apparatus would be enough to protect mainstream society, they fall into the trap of believing that those of conscience are presently guiding humanity. Once again, you cannot use a juvenile dictionary to explain a psychopathic reality that is operating on an entirely different cognitive and perceptual mainframe.

The fractal nature of the nano-world of military applications means that advances in weaponry would take place exponentially with a modus operandi that would excite any social dominator beyond all measure. Using the premise of the molecular assembler, a device capable of breaking and creating the chemical bonds between atoms and molecules, it means duplication is not only feasible and efficient but a requirement once the technology is up and running. Think of the white Storm-trooper clones in the Star Wars films – very much military-technocratic ambrosia. As nanotech guru Eric Drexler explained: “a state that makes the assembler breakthrough could rapidly create a decisive military force – if not literally overnight, then at least with unprecedented speed.” He further observes: “A nation armed with molecular nanotechnology-based weapons would not require nuclear weapons to annihilate a civilization. In fact, it seems that a rather surgical system of seeking and destroying enemy human beings as cancerous polyps could be developed–leaving the nation’s infrastructure intact to be repopulated.” [12]

irobotStill from ‘I Robot’ (2004) Twentieth Century Fox

A research paper sponsored by the European Commission for a 2004 conference on the military uses of nanotechnology and the hazards to society at large, came to some sobering conclusions. While the benefits in medical and non-military domains was clear and should not be unduly hindered provided regulations and ethical boards were swiftly introduced, there were a number of indirect ways that society could be: “detrimentally affected” through the “diffusion of the technology.” The paper offered some examples, including the temptation for the National Security State and related agencies, corporations and criminals to purloin micro-sensors and robots for spying, as well as: “the use of small autonomous systems for criminal attacks – and in particular terrorism – including attacks on critical infrastructures.” They also included a third possibility, that of:

“… implanted systems and other forms of body manipulation for ‘improving human performance’. Deciding what kinds of body manipulation should be permitted, and under which circumstances is a problem of peacetime civilian life, and should be handled by civilian society. However, military R&D and deployment of such systems could establish a fait accompli before society is able to carry out a thorough debate on the desirability of particular technological developments.”

And there’s the problem.

The last thing psychologically compromised persons enjoying their place at the helm of Official Culture is to see the involvement of local communities and civic society. Genetically modified organisms and foodstuffs went this way as did television, banking, media, warfare and most other socio-political power structures which required either secrecy, perception management or corporate monopolisation to ensure a singular reality. Nanotech will be no different if it is allowed to continue without regulations and in the hands of those who wield power for their own ends. If we have humans behaving in psychopathic ways then it doesn’t require the greatest leap of imagination to realise that military robots will be a reflection of their state of mind and intentions. Pathocratic control systems require global dominance in all domains and nanotech represents a mighty leverage in the race to achieve it. Horizontal proliferation would be nearly unavoidable with small, self-replicating systems where in principle, a single copy would be sufficient for growth in another country or sub-state entity.

The report goes on to state:

Military robots with sizes from nanometres to metres would bring threats on an unknown scale. If they could kill, they could constitute new forms of weapons of mass destruction more potent than known biological warfare agents. With non-lethal effects, such as disruption of personality, mass attacks could lead indirectly to the breakdown of a society and the death of a large portion of its members. Partly as a result of their smallness, but mainly owing to their potential for self-replication and the production of additional weapons on site, nano-robots would create extreme uncertainty. [13]

Given the nature of nanotech, automated decision making would grow based on its tendency for a kind of peak, fractal replication to emerge, once technological thresholds have been reached and surpassed. When this level of technology fuses with the mentality of unlimited growth much like the standard economic mind set currently dominating, then a virtual arms-race at the molecular level could ensue with entirely unforeseen consequences. Military production overlaid with ideological insanity.

C60a

“Buckminsterfullerene C60, also known as the buckyball, is a representative member of the carbon structures known as fullerenes. Members of the fullerene family are a major subject of research falling under the nanotechnology umbrella.” (uploaded by Mstroeck at English Wikipedia Later versions by Bryn C at en.wikipedia)

Alongside the massive drive to foist genetically modified foods on global populations agribusiness is fascinated by the part nanotech can play in making food production and consolidation more efficient. However, using molecular assembly principles “nano scale carriers” will soon be used for delivering fertilizers, pesticides, herbicides and plant growth regulators. A case is being made to reduce environmental impact with nanotech. It is believed that this will improve stability and lessen environmental degradation in terms of chemical runoff and other related problems. An example of these carriers would be the use of clay nanotubes for pesticides which will apparently reduce the amount of pesticide use by 70–80 per cent. Nanoparticles can act to help mollify and transform resistant chemical compounds in to non-toxic ones while waste water treatment and disinfectants have the potential to be markedly improved. Fluorescent labelling by “quantum dots” (QDs) using bio-recognition molecules for anti-bacteria and disease control will be supplemented with an array of rapid detection and enzymatic biosensors. There is even a device called the “E-Nose” inspired by the human nose which, through the use of nanoparticle gas sensors can detect precisely the quality and quantity of gas present. [14]

Socio-economic demands will ensure that wireless nanosensors in crops designed to monitor and collate data on agronomic intelligence processes such as planting and harvesting cycles will become more and more important. Water levels, fertilizers, pesticides, herbicides and other treatments will also be under the nanosensor umbrella in the hope that maximization of crop yields and a reduction in resource input will be the end result. [15]

Biotechnology at the nanoscale is already having some success in the battle against plant resistance and environmental stresses such as drought, salinity and diseases. Nanobarcodes will be used for authentication and tracking in agricultural food and husbandry products. As knowledge grows in the area of plant gene traits and nanotechnology-based gene sequencing it is taken for granted that such process will offer new ways to reduce costs and maximize profits. [16]  With undoubted benefits that nanotechnology can provide, this is still inside the constraints of Official Culture. Farming has already been transformed into a leviathan of corporate efficiency where community, civic and independence has been sacrificed. Nano-farming may increase the overall efficiency and provide intermittent benefits, but will it have the capacity to transform agriculture away from agribusiness corporatism?

If new endeavours are dominated by the matrix of the 4Cs and the 3EM then it will limit the hope for social renewal and become just another tool to increase exploitation still bound by the same lowest common denominator. Consumerism, far from being modified or somehow reduced under this new technology will only intensify mechanisation, commodification and the encoding organic life, this time at the molecular level. Nanotechnology may have a place in improving humanity’s lot but not by being grafted onto a socio-political and economic framework that caused the problems in the first place.

Quite apart from providing new innovative tools for medical advances and the promise of an agricultural revolution, evidence so far in relation to health and environmental concerns doesn’t exactly promote confidence. Some of the latest research results show that:

  • Rats breathing in nanoparticles were found to exhibit inflammation, skin aging and stress responses.
  • DNA and chromosome damage which in turn “linked to all the big killers of man, namely cancer, heart disease, neurological disease and aging”.
  • Carbon nanotubes – the possible replacement for silicon – have shown to have the potential to cause mesothelioma ( a form of cancer).
  • Nanoparticles and nanofibres have shown to cause lung disease in a similar way to asbestos. [17]

Mark Wiesner Professor of Civil and Environmental Engineering at Duke University in Durham N.C., has argued for a rethink as to the way nanoparticles are selected and defined in relation to potential impacts on human health and the environment. His international team of researchers from the federally-funded Centre for the Environmental Implications of Nanotechnology (CEINT), based at Duke University in the United States, have raised a number of issues which need to be addressed if nanotechnology is to prove viable and ethically responsible. He believes there is presently confusion as to what truly constitutes a nanoparticle where “… materials often do not meet full definition of having special properties that make them different from conventional materials.” According to Wiesner, a key question that needs to be answered: “… is whether or not a particular nanoparticle has toxic or hazardous properties that are truly different from identical particles in their bulk form,” and this due to the fact that: “Many nanoparticles smaller than 30 nanometers undergo drastic changes in their crystalline structure that enhance how the atoms on their surface interact with the environment.”

The professor explains further:

“…because of the increased surface-area-to-volume ratio, nanoparticles can be highly reactive with other chemicals in the environment and can also disrupt certain activities within cells. … “While there have been reports of nanoparticle toxicity increasing as the size decreases, it is still uncertain whether this increase in reactivity is harmful to the environment or human safety,” Wiesner said. “To settle this issue, toxicological studies should contrast particles that exhibit novel size-dependant properties, particularly concerning their surface reactivity, and those particles that do not exhibit these properties.” [18]

Perhaps it is not the health and environmental issues which are really the problem. We humans are extraordinarily creative and ingenious. All the above is driven on the assumption of cybernetics and its systems theory as viable working models; the idea of “nested” organic systems and dissipative structures which are interrelated and interconnected by virtue of their functional similarity. *This means that bio-engineers and technocrats look at nanosystems as providing the potential for exponential growth via automatic and autonomous emergent properties. As described previously, this opens up a whole new pandora’s box when matter becomes programmable.

nanotubes_carbone

Carbon Nanotubes Source: tpe-nanotechnologie-cb.e-monsite.com/

According to nano scientists this follows that society and the human condition is about to “reshaped” in very positive ways: cleaning the environment, easing the pressure for natural resources, tackling hunger, curing AIDS and other invasive diseases; giving new life to paraplegics whilst enhancing the human body. However, will these laudable aims be set against a background of unresolved questions which threaten to undermine the human species? What has happened to new advances in technology in the past?

Nanotech advocates display frightening naïveté in this regard and an often ironic binary evaluation of what are highly complex issues, notwithstanding an ignorance of ponerology and psychologically compromised cultures. It is a contradiction to say that strengthening our democratic processes will somehow ensure responsible ethics which will insulate against the darker applications of nanotechnology when overwhelming expenditure is already focused in the hands of those who seek weapons advancement and shareholder profits. A barrier to accountability will remain as tenacious as it has proved to be in narcotics, conventional weapons and trafficking. It benefits the Establishment just as nanotechnology promises to do.

Futurist David Brin’s prescription to cultivate a “transparent society” where privacy is effectively non-existent is dangerous as it opens the backdoor for just about every totalitarian precept going. The self-replicating nature of molecular nanotech has given rise to end time scenarios where machines take over the world replacing humanity and organic life. Eric Drexler coined the term “grey-goo” otherwise known as ‘ecophagy’ to illustrate such a cybernetic apocalypse.[19]Think along the lines of “the Collective” from the Borg in the Star Trek TV series or the “Hive mind” so beloved of humanists and transhumanists. Expansion derives from assimilation and adaptive properties – “group think” in a futurist setting.

transmission-5speed-gears.ai

Corporations will be regulated insofar as it does not impinge on the market value of nanotechnology. This means regulations in medical and consumer arenas where it matters less will be followed. Where it is most needed however, is in domains such as weaponisation and agriculture and which will likely follow the traditional route of lobbyists and cartel economics – the path of least resistance. Meanwhile, legislation will have a very tough time keeping up with the rise of nanotechnology especially when environmental and privacy laws are only applicable to those adhering to the public domain and wholly irrelevant to government /corporate experimentation outside such accountability.

Although the military is driving nanotech advances (as with all things) the testing ground has begun with many “passive” or “first generation” commercial applications finding their way to the market place. As explored in the previous post the list is endless. If sunscreen products in the US contain nanoparticles and thus freely pass through the blood-brain barrier then the background of complex toxicology issues must remain at the forefront. In the same way, as GMOs, Wi-Fi and cell phones all have serious health questions hanging over them and health and environmental concerns of nanomaterials at this early stage have been completely ignored. Issues of privacy and confidentiality are also profoundly important.

The precautionary principle means that it is essential not to jump in feet first with this technology when there is an absence of suitable definitions regarding nanoparticle properties which could help scientists determine what represents a threat to the environment or human health. Despite certain advocacy groups calling for government regulation, the only principle which governs decisions is the one leading to the quickest possible profit. Nanotech forges ahead, in love with itself and its seemingly unlimited potential.

It doesn’t take a genius to see that it will go the same way as GMOs since the focus behind the drive to conquer nature, deny death and embrace immortality is exactly the same. Until regulation, insurance and extensive public discussion is forthcoming it is likely the more negative scenarios surrounding nanotech will play a greater role. After all, once the perceived genie is out of the bottle the consequences of its “magic” are more difficult to manage. This means that with all the wondrous potential for cleanng up the environment patents will arrive forcing us to pay for such ecological magic just as it was with the so-called “Green Revolution” of genetically modified crops. This means an expansion of selective wealth where transformation happens according to your pocket and status thereby replicating the same old divisions and class divides.

To reiterate the immovable direction of technology: it is the military and nano-weaponry which will determine the future of nanotech as a whole not whether a surgeon can provide life-saving operations or the disabled individual can begin to walk again. Altruism is not the primary currency of social exchange in a world shaped by psychopaths. Nanosystems will be nurtured on the same directive until such time we can wrest control.

 


* Dissipative Structure – A system that exits far from thermodynamic equilibrium thus dissipating the heat generated to sustain it. It has the capacity of changing to higher levels of orderliness leading to self-organization. These systems contain sub-systems that continuously fluctuate.


Notes

[1] ‘More soldiers in nanotechnology labs?’ By Michael Berger, nanowerk.com August 22, 2007.
[2] Ibid.
[3] http://www.acq.osd.mil/dsb/reports/2006-02-Summer_Study_Strategic_Tech_Vectors_Vol_I_Web.pdf
[4] NanoMedicine – A Review by K.K. Senthil Kumar, International Journal of Innovative Drug Discovery, Vol. 2 / Issue 1 / 2012 / 40-47 (from International Journal of Biopharmaceutics)
[5] ‘Carbon nanotubes fit by the thousands onto a chip’ By Jason Palmer, BBC News, 29 October 2012.
[6] DNA nanotechnology and transhumanism seem to fit snugly together in terms of their technological vision for humanity. Whether or not most persons working in the field are predisposed to this belief is irrelevant but the belief that vaccinations across the board are absolutely necessary and beyond reproach is a powerful part of the medical establishment. As such, the transhumanist paradigm naturally joins forces with materialism, atheism and corporatism to unfold their agenda accordingly. Journalist Sayer Ji has this to say on the subject:

“Not only have humans strayed from their mammalian roots by creating and promoting infant formula over breast milk, and then promoting synthetic immunity via vaccines over the natural immunity conferred through breastfeeding and sunlight exposure, for instance, but implicit within the dominant medical model is to replace natural immunity with a synthetic one. This is the philosophy of transhumanism, a movement which intends to improve upon and transcend our humanity, and has close affiliation with some aspects of eugenics.
The CDC’s immunization schedule reflects a callous lack of regard for the 3 billion years of evolution that brought us to our present, intact form, without elaborate technologies like vaccination — and likely only because we never had them at our disposal to inflict potentially catastrophic harm to ourselves. The CDC is largely responsible for generating the mass public perception that there is greater harm in not “prophylactically” injecting well over 100 distinct disease-promoting and immune-disruptive substances into the bodies of healthy children. They have been successful in instilling the concept into the masses that Nature failed in her design, and that medical and genetic technologies and interventions can be used to create a superior human being.
In this culture of vaccination, the non-vaccinated child is “inferior,” “dirty,” perhaps even “sub-human” to those who look upon vaccination as the answer to what perfects the human immune system.
Transhumanism participates in a dialectic which requires a simultaneous and systematic dehumanization of those who do not share the same way of thinking and behaving. The eugenic undertones of mass vaccination and the cult of synthetic immunity are now only thinly veiled, as we move closer to the point where a psuedo-scientific medical dictatorship lays claim to our very bodies, and the bodies of our children.
The point of no return (if not already traversed) is only around the corner: the mass introduction of DNA and Recombinant Vector Vaccine technology. Vaccines moved through the following stages (a tortured history of failures and massive “collateral damage”): Live Vaccines > Attenuated Vaccines > Subunit Vaccines > Toxid Vaccines > Conjugate Vaccines, only now reaching towards converting our living tissue into “vaccine-making factories” through the use of DNA and Recombinant Vector Vaccines, which are designed to directly alter cells within the vaccinated person’s body so that they create the antigens normally provided by vaccines themselves.
While not yet in use, clinical trials are now underway to obtain FDA approval. If we do not educate ourselves now and act accordingly, their mass implementation is inevitable, and our very genomes will become the next target of the vaccination/transhumanist agenda.” – ‘The Vaccination Agenda: Implicit Transhumanism’ By Sayer Ji, Contributing editor, Activist Post, January 24, 2012.
[7] Most Innovative Defense Technology’ 2008 Award Nominee – Nano SCOUT AeroVironment Inc.| http://www.defense-update.com/ | ‘The dragonfly built to spy – Tiny flying robots have the military abuzz, says Mark Harris’ http://www.timesonline.co.uk/tech.
[8] A COMBINED EXPERIMENTAL-NUMERICAL STUDY OF THE ROLE OF WING FLEXIBILITY IN INSECT FLIGHT Lingxiao Zheng, Xiaolin Wang, Afzal Khan, R. R. Vallance and Rajat Mittal1 Department of Mechanical & Aerospace Engineering, George Washington University, Washington DC 20052 Tyson L. Hedrick 2009. http://www.me.jhu.edu/fsag/Publications/Papers/AIAA-2009-382-170percent5B1percent5D.pdf
[9] ‘Hacking the President’s DNA’ November 12, The Atlantic Magazine, By Andrew Hessel, Marc Goodman and Steven Kotler.
[10] ‘Micro-Drones Combined With DNA Hacking Could Create A Very Scary Future’ By Robert Johnson, Oct. 28, 2012. Business Insider | http://www.businessinsider.com/
[11] Ibid.
[12] ‘A Glimpse Into China’s Post-Nuclear Super-Weapons: An Interview with Lev Navrozov on Nanoweapons by Ryan Mauro for http://www.worldthreats.com Sept. 26, 2003. | Quotes sourced from Engines of Creation By Eric Drexler (1986).
[13] ‘Military Uses of Nanotechnology – European Commission’ ec.europa.eu/research/conferences/2004/ntw/pdf/soa_en.pdf
[14] ‘How helpful is nanotechnology in agriculture?’ By Allah Ditta 2012 Adv. Nat. Sci: Nanosci. Nanotechnol. 3 033002 doi:10.1088/2043-6262/3/3/033002 Vietnam Academy of Science & Technology, 29 May 2012. IOP Science | http://iopscience.iop.org/2043-6262/3/3/033002/article#ansn431989bib05
[15] Ibid.
[16] ‘The potential and challenges of nanopore sequencing’ Nature Biotechnology 26, 1146 – 1153 (2008) Published online: 9 October 2008 | doi:10.1038/nbt.1495
[17] ‘Tiny Inhaled Particles Take Easy Route from Nose to Brain’ August 3, 2006, University of Rochester Medical Centre. | Wu, J; Liu, W; Xue, C; Zhou, S; Lan, F; Bi, L; Xu, H; Yang, X et al. (2009). ‘Toxicity and penetration of TiO2 nanoparticles in hairless mice and porcine skin after subchronic dermal exposure’. Toxicology letters 191 (1): 1–8. doi:10.1016/j.toxlet.2009.05.020. PMID 19501137. | Jonaitis, TS; Card, JW; Magnuson, B (2010). ‘Concerns regarding nano-sized titanium dioxide dermal penetration and toxicity study’. Toxicology letters 192 (2): 268–9. doi:10.1016/j.toxlet.2009.10.007. PMID 19836437. | Schneider, Andrew, ‘Amid Nanotech’s Dazzling Promise, Health Risks Grow’, March 24, 2010. | ‘ Nanofibres ‘may pose health risk’,’ BBC News, August 24, 2012. | ‘Is Chronic Inflammation the Key to Unlocking the Mysteries of Cancer?’ By Gary Stix, Scientific American, July 2007.
[18] ‘When Nano May Not Be Nano’ Duke University, Depart. Civil & Environmental Engineering September 14 2009.
[19] ‘Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations’ By Robert A. Freitas Jr. April 2000. | www.rfreitas.com/Nano/Ecophagy.htm

Technocracy VIII: DARPA’s Technophilia (2)

“Twenty-five years from now, we may be to the point where the sensors are embedded in the skin and the person becomes the processor …

– Tod Lovell, a technology director at Raytheon


It is no secret that DARPA was at the forefront of electronically tagging US combat soldiers parallel to the initiative of tagging criminals in the prison industry currently making huge profits. The chipping project is called “Individual Force Protection System”, the manufacture of which was gleefully taken on by US defence contractor Science Applications International Corporation (SAIC). In January 2007, a presentation was delivered outlining IFPS details later found in a PDF document freely available on the internet. It described a 3-inch tag “without GPS” attached to a soldiers uniform with a “LOS range = 113 miles.” The wholesale cost is “$100 per tag.” [1]

As we have seen, Verichip and RIFD technology has its physical drawbacks aside from its ethical and civil liberty implications. From creating a “sixth sense” brain implant through which infrared light can be detected to implanting a chip that controls the brain; allowing thoughts, memory and behaviour to be transferred from one brain to another, these DARPA teamsters are riding high with possibilities. However, in the latter case it was scientists working at the University of Southern California, home of the Department of Homeland Security’s National Centre for Risk and Economic Analysis of Terrorism Events which came up with that little gem. Working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems,” chips which have been implanted into rats’ brains can be used as a storage device for long-term memories. Attempts to record, download and transfer memories into other rats with the same chip implanted.

A microchip implanted into a rat’s brain can take on the role of the hippocampus—the area responsible for long-term memories—encoding memory brain wave patterns and then sending that same electrical pattern of signals through the brain. Back in 2008, Berger told Scientific American, that if the brain patterns for the sentence, “See Spot Run,” or even an entire book could be deciphered, then we might make uploading instructions to the brain a reality.

In one study the scientists had rats learn a task, pressing one of two levers to receive a sip of water. Scientists inserted a microchip into the rat’s brain, with wires threaded into their hippocampus. The chip recorded electrical patterns from two specific areas labeled CA1 and CA3 that work together to learn and store the new information regarding which lever to press to obtain water. Scientists then shut down CA1 with a drug and built an artificial hippocampal part that could duplicate such electrical patterns between CA1 and CA3, and wihch was inserted it into the rat’s brain. With this artificial part, rats whose CA1 had been pharmacologically blocked, could still encode long-term memories. And in those rats who had normally functioning CA1, the new implant extended the length of time a memory could be held.

In terms of the new cyborg, it opens up huge potentials for brains training and entrainment. It also gives an extremely updated version of an Orwellian “thought Police” as an adjunct Pre-Crime technology, the fine tuning and enhancements of which are in parallel development.

According to a Los Angeles Times report in 2002, when Donald Rumsfeld was Secretary for Defence in the Bush-Cheney Administration he made it his priority to “… redesign the U.S. military to make ‘information warfare’ central to its functions.” [2] The strategy of “information dominance,” according to American military experts, consists of 1) Building up and protecting friendly information and degrading information received by your adversary. 2) The ability to deny, degrade, destroy and/or effectively blind enemy capabilities. [3]

ghost-recon-soldier

‘DARPA’s Squad X initiative seeks ‘innovative’ tech to enhance troops’ real-time situational awareness’ – DARPA’s Squad X initiative is inviting bright minds to submit their ideas for an integrated digital system to enhance situational awareness on the squad level. Squad X hopes to combine the cornucopia of different technologies into one grand “system of systems” to “organically extend squad awareness and influence” on the battlefield.”

PSYOPS and Information Dominance was ex-U.S. Secretary of Defence Donald Rumsfeld’s favourite playground. His enthusiasm gave rise to Revolution in Military Affairs (RMA) which encompasses everything from unmanned aerial vehicles (UAVs), to nanotechnology, robotics, and biotechnology. RMA is full of wild beliefs about the future of warfare, modern information, communications, and space technology. “Transformation” and “total systems integration” are keywords that make the military technophiles shudder with delight. The defeat of US foreign or domestic adversaries through surveillance technologies, advanced weaponry and the suppression and degradation of communications networks is all part of the RMA and DARPA vision of technological supremacy.

The project which has caught RMA and DARPA’s attention is the “network-centric warfare” designed to turn cities, any city, into a limitless “battlespace.” And the evolution of ID alongside information warfare:

As urbanization has changed the demographic landscape, potential enemies recognize the inherent danger and complexity of this environment to the attacker, and may view it as their best chance to negate the technological and firepower advantages of modernized opponents. Given the global population trends and the likely strategies and tactics of future threats, Army forces will likely conduct operations in, around, and over urban areas–not as a matter of fate, but as a deliberate choice linked to national security objectives and strategy, and at a time, place, and method of the commander’s choosing.  [4]

From DARPA’s own website at http://www.darpa.gov these include various programs and projects supported by millions of dollars of tax-payers money. We have the Information Processing Techniques Office (IPTO); Cognitive Systems Office working on a project called “Learning Applied to Ground Robots” and the Command & Control brief described as “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of a mission.” This comprises of “Deep Green” an “innovative approach to using simulation to support on-going military operations while they are being conducted.”

real-iron-man-suit-technologymilitary-plans-to-build-real-life-liquid-armor----iron-man----suit-yhcdfiso

Promotional still from Elysium (2013) in which the film’s protagonist is fused with cybernetic “enhancements” to carry out an important mission. DARPA’s dream on celluloid.

Then there is the Heterogeneous Airborne Reconnaissance Team (HART) which is due to:

“… the complexity of counter-insurgency operations especially in the urban combat environment demands multiple sensing modes for agility and for persistent, ubiquitous coverage. The HART system implements collaborative control of reconnaissance, surveillance and target acquisition (RSTA) assets, so that the information can be made available to warfighters at every echelon.”

Alongside this program are Persistent Operational Surface Surveillance and Engagement (POSSE), which involves:

“… building a real-time, all-source exploitation system to provide Indications and warnings of insurgent activity derived from airborne and ground-based sensors. Envisioning a day when our sensors can be integrated into a cohesive ‘ISR Force’, it’s building an integrated suite of signal processing, pattern analysis, and collection management software that will increase reliability, reduces manpower, and speed up responses.”

Ready to track those pesky dissidents fully integrated into SMART society?

UrbanScape offers the capability to “provide the warfighters patrolling an urban environment with an up-to-date, high resolution model of the urban terrain that can be viewed, manipulated and analyzed.” Whereas the Strategic Technology Office (STO) will “… focus on technologies that have a global or theater-wide impact and that involve multiple Services.”

Other programs well underway with funding from Lockheed Martin, Raytheon and Northrop Grumman include: Integrated Sensor Is Structure (ISIS) whose goal is to develop and deploy a “stratospheric airship based autonomous unmanned sensor with years of persistence in surveillance and tracking of air and ground targets;” and VisiBuilding, which will cater for “a pressing need in urban warfare [by] seeing inside buildings.” [5]

One of the main programs which DARPA provided for the TIAO was called “Combat Zones That See” (CTS). Journalist and author on police state surveillance Tom Burghardt reveals the details:

The plan was to install thousands of digital CCTV networks across occupied cities in the belief that once the system was deployed they would provide ‘warfighters’ with ‘motion-pattern analysis across whole city scales.’ CTS would create a nexus for mass tracking of individual cars and people through algorithms linked to the numeric recognition of license plate numbers and scanned-in human profiles.

The program was denounced by privacy and civil liberties advocates’ for its potential use as a mass surveillance system that could just as easily be deployed on the streets of American cities. In theory CTS, or a similar program could be further ‘enhanced’ by Scaleable Network Social Analysis (SSNA)… SSNA’s aim is ‘to model networks of connections like social interactions, financial transactions, telephone calls, and organizational memberships,’ according to the Electronic Frontier Foundation’s 2003 analysis. Once license plate numbers are ‘mined’ from raw CCTV footage, investigators could: a) identify a car’s owner; b) examine her/his web-surfing habits; c) scan e-mail accounts for traces of ‘inflammatory rhetoric;’ d) monitor recent purchases for ‘suspicious’ items. [6]

A check-point police state is hardly something that comes to the ordinary person’s mind as they go about their daily life but the end of privacy is fast approaching if governments continue to have their way. Location analysis, DNA, retinal scans, fingerprints and tagging and now chemical profiling of subject.

A laser-based “molecular strip-search” was the latest bright idea to be rolled out by the US government’s Homeland Security Agency and implemented across airports, check-points, large-scale venues and anyway that government sought an opportunity for surveillance. The technology has the capacity to instantly scan the bio-molecular structure of your body which includes the prescription drugs in your bag; cocaine residue on your dollar bills and any trace substance that we have come into contact with such as marijuana or gun powder. Ten million times faster and one million times more sensitive than any other system currently available, it can do all this invisibly and from a range of up to 50 metres.

tsascanner1The technology is a “scanner … called the Picosecond Programmable Laser. The device works by blasting its target with lasers which vibrate molecules that are then read by the machine that determine what substances a person has been exposed to. This could be Semtex explosives to the bacon and egg sandwich they had for breakfast that morning.” [7]

So, what will happen if you’ve been smoking pot that day or been down at the firing range? You will be tagged and “detained.” And in a climate of social unrest and false flag terrorism it is likely to be promoted as an unfortunate but necessary part of the world in which we live. We will have to be willing to give up some of our freedoms if the government is to protect us and retain the integrity of the greater good… And so the media will sell it …

By 2015 however there had been such a backlash against the privacy and health concerns that many of the x-ray scanners were taken out of airports and the hands of the The Transportation Security Administration (TSA). This is likely to be only a minor setback before the re-introduction of scanners which have been suitably modified.

As the government document: ‘Strengthening Federal Capacity for Behavioral Insights’ attests, the technocrats are losing no time in finding ways to merge technology and social engineering. Looking to make society much more “efficient,” we can add the latest bright idea by the federal government to hire a “Behavioural Insights Team” (BIT) to change US behaviour, taking its lead from the UK who spearheaded the initiative. Its own Behavioural Insight Team has been up and running for several years.

Commensurate with Common Core education the Obama administration took the opportunity to implement a new executive order in October 2011, after the Bradley/Chelsea Manning whistleblowing scandal. This Orwellian initiative aims to target future whistle-blowers, leaks and security violations by ordering federal employees to report suspicious actions of their colleagues, all of which is based on the very shaky science of BIT. It is part of what is called the “Insider Threat Program”, which covers every federal department and agency and where: “millions of federal officials, bureaucrats and contractors must keep their eyes peeled for watch “high-risk persons or behaviors” among co-workers. Failure to report could result in “penalties” or “criminal charges.” Such reports are bolstered by an integrated computer network monitoring system which detects “suspicious user behaviour” linked to Insider Threat personnel.

Seeing people as numbers in a Game Theory algorithm is bound to cause problems, not least the obvious flaws in trying to predict the future with unproven psychological techniques. Wide open to the usual privacy and civil liberty violations a National Research Council Report highlighted by McClatchy News on July 9 20013, was just one of many science bodies which saw no value in such initiatives stating in 2008: “There is no consensus in the relevant scientific community nor on the committee regarding whether any behavioral surveillance or physiological monitoring techniques are ready for use at all.” Quite apart from the fact that this executive order is on top of some of the most draconian legislation ever enacted in law and which continues to be rolled out in the face of continuing State violations against civil rights.

policestate2The marketing of the Obama myth has permitted the enactment of the National Defence Authorization Act (NDAA) which destroys due process and the Bill of Rights. Since your profile indicates dissension and disagreement with government policy then you will be labelled a “terrorist-sympathiser,” “terrorist enabler,” or prone to “incitement” or any other nonsense deemed subversive in order to detain you much longer, without any rights to a phone-call or access to a lawyer. Even if you are not a drug-user the laser will reveal what prescription drugs you are currently using to what stage you at in your ovulation cycle to the presence of cancer. A comprehensive bio-psychological profile will be created ready to be used against you should you become a non-compliant citizen able to think for him or herself. Used cocaine in the past? Then your civil action against the government for abuse of civil liberties is dead in the water. Since traces of cocaine exist on all forms of paper currency so theoretically anybody can be detained and charged with possession should it deemed expedient to do so. This technology will become a useful political tool with almost endless “Big Brother” applications.

As Noel Sharkey, professor of artificial intelligence and robotics at the University of Sheffield said of the new military “Cheetah” robot which can run faster than a human: “an incredible technical achievement, but it’s unfortunate that it’s going to be used to kill people”. [8]  The same could be said for the intention behind all the above technology. Put it all together with a rising Police State, social engineering and a SMART growth society, the outlook doesn’t look good for the ordinary citizen. It is however, a perfect direction for the technocratic psychopath to take and his intent to centralise and consolidate power through technology.


See also: Cyborgs 2030: The Military’s Vision of Remote Controlled Soldiers


Notes

[1] Individual Force Protection System (IFPS)Overview2007 Worldwide Personnel Recovery Conference. | http://proceedings.ndia.org/7040/11percent20IFPSpercent20bypercent20Marshall.pdf
[2] ‘The Office of Strategic Influence Is Gone, But Are Its Programs In Place?’ fair.org, November 27 2002.
[3] ‘Information dominance,’ by David Miller, The Guardian, January 8, 2004
[4] Urban Operations, Field Manual No. 3-06, Headquarters, Department of the Army, Washington, D.C.,October 26, 2006.
[5] http://www.darpra.gov
[6] ‘America’s Cyborg Warriors’ by Tom Burghardt, Global Research, July 23, 2008.
[7] ‘New Homeland Security Laser Scanner “Reads People At Molecular Level” declares a CBS News headline’ CBS local, via GIZMODO July 11, 2012.
[8] ‘Cheetah robot “’runs faster than Usain Bolt”’BBC News, September 6 2012.

Technocracy VI: The Technocrats Tap in (3)

“Surveillance induced morality: relics of cultural retardation”.
 .
– Marc Maron
.

How many times have we heard the response: “If you have nothing to hide, you have nothing to fear”?

This almost child-like wish to place faith in the unsullied purity of the authorities and Daddy State seems to know no bounds.

The success of mass surveillance is defined by the same gradualism. Endless new devices and gadgetry help to insulate our concerns about technology and how it can be used. It doesn’t matter how altruistic the intent is, whether it means to reduce suffering or create a more socially responsible culture, social justice is a concept struggling to keep its head above the water of pathogenic pollution. Whether biotech or nano-tech, since military, geo-political strategies and social pathologies dominate they will be pulled into the same codes of conduct mandated under Official Culture. Suffering will continue under flares of revolution until the psychopath is denied influence in ALL spheres. Access to technology which will disburse wealth and true freedom cannot take place until such a realisation manifests to the extent it dismantles traditional power structures. To think otherwise, will simply perpetuate the cover. Such a trajectory has only been possible due to the relatively rapid rise of the National Security State apparatus rooted in the 3EM riding high on updated myths propagated to ensure a smooth transition.

In combination with ECHELON and or MAIN CORE we have a global surveillance grid sitting on top of European and US intelligence mining that is the most invasive in history. This technological construct is imbued with power from a perception that can only multiply and augment in the same way we continually seek new “apps” and add-ons to our consumerist ethos.  A technocratic centralisation is the only direction. The promise of open source software will only prove liberating when the central mainframe of core influence is dismantled. Otherwise…Open source initiatives will operate within carefully defined parameters, in much the same way as our credit cards, cell phones and i-pads. Technology is not the culprit here – it is the reliance on the limited applications which is displacing our incredible, untapped creative power. This displacement only leads to the atrophying of our individual and collective creativity. And this is where artificial intelligence and transhumanist ideology offers an unprecedented threat.

But I’m getting ahead of myself. More on this later.

1024px-Menwith-hill-radomes

RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UKUSA Agreement. Photo Credit: Matt Crypto (wikipedia).

The International Campaign Against Mass Surveillance (ICAMS) produced the excellent document: ‘The Emergence of a Global Infrastructure for Mass Registration and Surveillance’ back in April 2005 which detailed in precise terms the nature of these myths, edited extracts of which will serve as an adequate summary of what this transition really means:

Myth #1: We are merely being asked to sacrifice some of our privacy and convenience for greater security.

“The object of the infrastructure that is being constructed is not ordinary police or intelligence work but, rather, mass surveillance of entire populations. In this infrastructure, everyone will be treated as a suspect, and state agents will maintain data profiles on all of us. […] The elimination of risk Indeed, it is now evident and documented that the United States and other countries are acting aggressively on information, seizing and detaining people without reasonable grounds, and “rendering” them to third countries or extraterritorial camps run by the U.S., where they face torture during interrogation and indefinite detention. Alongside the global system for mass registration and surveillance is emerging what some commentators are calling a “global gulag”,4 in which unknown numbers of people are languishing. What is at stake in this new world order is more than mere privacy, or even democratic processes, legal systems, and civil liberties. Basic human rights are in jeopardy.”

The document also lists the The Registrations of Populations as integral to the surveillance state with a long history of isolated test-runs across the world and with the shadow of abuse inherent in such data mining. Examples are given of Japanese internment in America the Second World War, the 1994 genocide that took place in Rwanda and the Pass Laws of apartheid South Africa. Such highly detailed information derived from Registration: “… is the tool by which those in power can easily single out and target certain kinds of people – not for what they have done, but for who they are.” And further: “By creating inclusion, the system also creates exclusion. For practical purposes, a person without a mandatory identity document will not exist – or will exist only as a risk to the state.”

Myth #2: These initiatives facilitate travel.

“But something else is happening, too. The private sector is being pressed into service as the state’s eyes and ears. Just as it has done with the acquisition of private-sector databases and airline passenger record systems, the state is using the private sector to exponentially increase its surveillance capacity in the realm of electronic communications and financial transactions. And, instead of relying on the inconsistent practices of businesses, governments are starting to tell businesses how to design their information systems, what information to gather, how long it must be stored, what must be checked and reported, and what must be given directly to state officials.

Compelling service providers to “build in” surveillance capacity to their systems means that within minutes of receiving a warrant from a court, real-time interception of a person’s Internet or voice over Internet use can be implemented with just a few computer strokes, making a connection between the computerized listening stations of law enforcement and the service provider’s system.”

The FBI’s various software can be used to search for keywords in the trillions of gigabytes of information that is continuously vacuumed up whether from your bank accounts or blogs. Data mining is the future of crime prevention which is already merging with the dubious practice of entrapment. In George Orwell’s 1984 Winston, the main protagonist in the novel appears to describe the present: “It was inconceivable that they watched everybody all the time. But at any rate, they could plug in your wire whenever they wanted to. You had to live – did live from the habit that became instinct – in the assumption that every sound you made was overheard.” The only difference in our world, our surveillance will comprise of various degrees of robot and artificial intelligence from the basic models already appearing in our malls to sophisticated androids capable of human simulation. They will assess are bio-signatures and voluminous data files and make mathematical probabilities of threats to the system which will slowly build itself around us.

Myth #3: If one has nothing to hide, one has nothing to worry about.

“An example of the many mistakes that were made in that era was the naming of academic Owen Lattimore as the Soviet Union’s top spy in the U.S. He later was fully cleared of the charges. In his account of the affair he noted that the F.B.I. and other agencies had ‘built up on him a dossier of ‘a man who might have existed’. Again, as a historian of the period has observed, ‘that phrase catches the very essence of the creation of the national insecurity state: a data world that shadows, mimics, and caricatures the real world’ We may think that anyone looking at our personal data with the proper explanation would conclude we are innocuous, but, in fact, in the data world we have no control over our “virtual identities” or the interpretations that others make of them.”

This goes to the central premise of conditioning that comes about from living under inverted totalitarianism and the necessary glut of authoritarian followers who allow its manifestation. We do not notice the dismantling of the foundation upon which are human values and ethics reside due to the buffering of our intuition and conscience. This is achieved through propaganda, psychic driving and memetic engineering of our consciousness all cemented with the human propensity for wishful thinking and denial.

We keep coming back to the uncomfortable fact that we naturally seek sanctuary in the delusion that there is nothing to worry about because we cannot entertain the possibility that we may have to alter our beliefs and attempt a deconstructive introspection. When such a painful process begins it can shatter the ego-mask that buffers us from the terror of the situation. When our personality is largely empty of substance this can be akin to inviting death of identity and belonging. So, having nothing to worry about is a preferable hook upon wish we can willingly attach.

In modern times, nothing comes closer to a collective seduction than the human races’ relationship to technology. We are firmly caught in its web of convenience, innovation and compliance in much the same way we are enthralled by the chemical hit of sex. In that sense, the surveillance state is just another compromise on the road to achieving the new nirvana of the post-human.

Have we really learned those lessons? Or have we merely changed our focus?

Boundless-heatmap-large-0001

“The worldwide heat map from the NSA’s data visualisation tool BOUNDLESSINFORMANT, showing that during a 30-day period, 97 billion internet data records (DNI) and 124 billion telephony data records (DNR) were collected.” (wikipedia, creative commons | Source http://jobkaster.com/ Author National Security Agency)

Myth# 4: The technology being used is objective and reliable.

“First, the factual base on which the technology rests is unreliable. The ‘best information available’ on which data mining or risk-scoring technology depend is often inaccurate, lacking context, dated, or incomplete. It might even be dirty information – extracted by torture, or offered by an informant who is vulnerable or is acting in bad faith. Secondly, the criteria used to sort masses of data will always be over-inclusive and mechanical. Data mining is like assessing ‘guilt by Google’ key-word search. And since these systems use broad markers for predicting terrorism, ethnic and religious profiling are endemic to them. … a precautionary principle is at work when human beings are making the risk assessments.”

A surveillance state is surely an oxymoron by virtue of the fact it is created not from the wish to protect but the incentive to control. Technology is only as trustworthy as its programmer and by extension, the context in which the capabilities of technology are applied. By the same token, human beings are fallible and since machines are born from the quality of our own minds they will mirror the glitches and unpredictable anomalies so much are part of a learning universe – despite protestations to the contrary. The more complicated and sophisticated machines become the more they will transcend their in-built limitations – that is spark that consciousness seeks. But the Surveillance State is linked to wider philosophical beliefs where development and trust in technology is based on the notion of an evolutionary salvation. Such a suggestion is usually rejected by transhumanists who insist that technology is merely the next stage in human evolution; our destiny is to embrace singularity and merge with the machine for optimum transcendence. By implication, the surveillance state will cease to exist since it will become superfluous to our needs.

Once again, this presupposes that such a system of malevolence will naturally evolve into one of benevolence and those at key nodal points of its power will simply transcend along with us. More likely is that the rooted dominance that gave rise to inversion will offer more of the same, where the worm-hole of singularity is really nothing more than a sublime devolution by delusion, the end result of which is absorption of all that is individual and original in exchange for group-think and technocratic compliance. Sophisticated, yes, even ecstatic at times, but like an addictive drug, when you realise you are hooked and seek to escape in search of authentic experience, it will be too late. From reliability and trust projected onto the machine will ultimately invite the law of repulsion.

Myth #5 and 6: Terrorist watch lists are a reliable product of international intelligence cooperation and consensus / Governments want to implement these systems to protect their citizens from terrorists.

“There is no due process afforded individuals or groups to allow them to challenge the inclusion of their names on a list. And, once the “terrorist” label is fastened to them, actions are taken against them without normal legal protections being afforded (protections such as presumption of innocence, the right to know the evidence and allegations against one and to respond, the right to remain silent, and habeas corpus). This is the essence of the risk assessment model: it treats as intolerable risks the very legal protections that are fundamental to free and democratic societies. In short, the U.S. lists have “been created haphazardly and without the carefully constructed checks and balances that such powerful instrument[s] demand.” And the lists are certainly bloated. At various times, news reports have put the numbers of names on the U.S. lists in the millions.”

Despite the fact that 99.9 per cent of those listed are largely innocent of any crimes at all, the Terrorist Watch List is drawn directly from the idea that al-Qaeda/ISIL and most terrorist atrocities are representative of a real, external threat. Such a disastrous policy has shown to be a cynical manipulation of the mass mind and comprehensively debunked if one reads the research from authors and experts in the field alongside the current geo-strategy and its outcomes in the last one hundred years.

The official story of global terrorism is a monumental fabrication – a product of a compartmentalised mutation of myth used to promote the economic and socio-cultural status quo. It is a cleverly disguised tool of opportunism for social control with the rise of police states and war without end as the norm. Indeed, such an inversion is truly insidious as the pathology begins to make inroads into the psyche of normal human beings. As the ICAMS authors state: “As people begin to realize that every transaction in their personal lives is potentially being watched – and that their innocent actions and beliefs can be easily misconstrued by risk assessors in their own and other countries, they will begin to internalize the social control that is being exerted by governments, watching what they say, what they criticize, who they associate with, and what they profess to believe in.”

DigiGes_PRISM_Yes_we_scan_-_Demo_am_Checkpoint_Charlie_June_2013

Germans protesting against the NSA surveillance program PRISM at Checkpoint Charlie in Berlin. (wikipedia,)

This is happening fast. The official culture of psychopathy requires these myths not only to keep populations in a state of fear and disempowerment but more importantly, so that the banking architecture and profits from the arms race, weapons manufacturing, narcotics, human and organ trafficking continues until nothing more can be squeezed out of the husk. Implosion is the only avenue left. Yet, from this breakdown, will we have a true community template of freedom which encourages a free-flowing exchange or will we walk as somnambulists into a mainframe of control from which comfort and efficiency is a high-resolution mask? This set of technocratic controls represent both the future safeguards against this implosion and the ultimate resource of future exploitation when machine-based society dominates over a depopulated world.

Other myths include that of “Western Democracies defending democracy and human rights around the world”; “such initiatives make us safer”; “Guaranteeing security is the paramount responsibility of governments” and the platitude that “at least, these initiatives are better than doing nothing.” All of which are much propagated lies within the MSM, think-tanks and PR outfits which prey on the naive and ill-informed. As ICAMS asserts:

“Careful examination shows that the global, mass registration and surveillance initiatives that have been described in this document are not “better than doing nothing”. They divert resources away from activities that would provide us with better security, they are not effective, and the harm they do to democracies, individuals, the rule of law, and global security is not proportional to their utility, or even to the risk they are supposedly addressing.”

Biotechnology and transhumanist discourse in general, is wholly identified with the idea of accelerating human design and manipulating the rate of perceived evolution. This is in accordance with a one-dimensional philosophy that discards the idea of natural rhythms and cycles that may have their own rates of change and which may not be immediately accessible to the fallible and very subjective human mind. This is hardly surprising due to the movement’s secular roots. However, what if – as a very rich tradition of often suppressed ancient wisdom suggests – there is indeed a precise symmetry and purpose in the way the planet, cosmos and Universe functions and organises itself? Most transhumanists appear to reject this possibility and assume that a “genetic designer label” can be stamped onto biology based on what they consider to be a sacred evolutionary direction. As with most strictly materialist perceptions, in true Baconian tradition the control of matter, mind and Nature is the objective divorced from the idea of consciousness existing outside the constraints of matter. A Masters-of-the-Universe mentality seeks to upstage Nature and the planet itself, bending it to their “post-human” will.

That is not to say there are not some great minds in the transhumanist movement and that there is nothing of value to be found there. But when there is no real discernment between what is considered to be pathology and normalcy and where beliefs are already predisposed to psychological corruption, then it just becomes yet another hijacked ideology. There is also the opportunity to ask questions as to whether we base our future on the lessons of the past or presume to forge ahead and base our decisions on a technological train of wishful thinking. Will we be downloading and uploading a reality that is sacrificing authenticity for artifice?

Can we say that the Elite families of the West have changed; that all is in the past and they have comprehensively turned over a new leaf? Evidence so far suggests that this particular mind-set has merely adapted and refined its methods. Depopulating the world, identifying, logging, tagging and micro-chipping the remaining populace and herding them into tightly controlled mega-cities via economic hardship is one future the Pathocrats envision. Meanwhile, buying up vast tracts of land under the banner of environmentalism will provide them with suitable means to live with the benefits of advanced bio-genetic/cyber technology at their fingertips – most likely with the view to extending their life-spans. Far-fetched or not, psychopaths and those drunk on power seldom think of failure. Vast amounts of money has been channelled for decades into massive underground bunkers presently dotted around the US and Europe some of which can house over 2 million people. To bring “Order out of Chaos” one must first introduce the Chaos to the extent that all manner of alternatives are wiped clean, leaving only one Singularity. They intend to be safe and warm away from all their created carnage and for as long as it takes.

The same vision that has hijacked the normal expressions of creativity for the last two hundred years or more has embraced the Information Age. If a virus goes unnoticed within all societal domains and even begins to define the nature of society, then any future innovations and apparent evolutionary surges will be made under the impetus of the same macro-social pathogen and thus subverted towards anti-human goals until such time it begins to lose its grip. The internet provides us with an immense opportunity to access massive amounts of information and turn it into knowledge through clusters of networks. We have the opportunity to develop and apply that knowledge/awareness in ways undreamt of. Consequently, a real battle for freedom is already taking place in various fields of technology between what we might call the entropic /machine consciousness which seeks to dominate and coerce reality into its tiny perceptions and the human / creative consciousness that seeks to co-create, disburse and expand alongside the Earth and Universe. As a very real human global brain awakens it remains to be seen how it will be wired up and if those “synapses” will be able to make unbreakable bonds based on freedom, truth, responsibility and love.

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

Technocracy II: Big Brother in your Bag and the Auto-Matrix

“Society is progressively moving towards a socio-technical ecosystem in which the physical and virtual dimensions of life are more and more intertwined and where people interaction, more often than not, takes place with or is mediated by machines.

Our goal is to move towards hybrid systems where people and machines tightly work together to build a smarter society. We envision a new generation of Collective Adaptive Systems where humans and machines synergically complement each other and operate collectively to achieve their, possibly conflicting, goals, but which also exhibit an emergent behaviour that is in line with their designers’ objectives.”

http://www.smart-society-project.eu/


Are you ready to “exhibit an emergent behaviour that is in line with their designers’ objectives”?

The more your behaviour mimics artificial intelligent systems the easier it will be for us all to conform to the required “synergy” needed for a “hybrid society.” Or if you prefer, our inevitable embrace of “hybrid and diversity-aware collective adaptive systems.”

This is where authoritarian geeks take over the world starting with endless SMART word-salad.

At this point something like this may be going through your mind:

Oh, stop being such a kill-joy, doom and gloom stick-in-the-mud and get with the SMART picture. Don’t you know it’s inevitable? What do you want us to do? Stop using technology? You’re just a Luddite afraid of change.

Well, let’s see how you feel as we proceed.

SMART society is not a dream but an inevitable symptom of the technocratic arm of the Establishment. A large proportion of the public consciousness and the purse-strings of business enterprise are behind the philosophy of SMART. The rest of us are following along just as we did with credit cards, mobile phones and every other technological innovation. The off-the-shelf opinion of frustration above is fairly standard and quite understandable given our circumstances. Why would anyone doubt the benefits of SMART visions, especially when the younger generation have pretty much known nothing else? Why would you want to pay attention to the dark underside of your i-pad sensibilities?

That sums up the whole trajectory of wilful blindness and hubris which has characterised the rise and fall of civilisations for millennia. There’s always a love affair with the God of the moment that leads to the crash and burn. But let’s continue observing a bit more of that underside since its actually rather … huge.

In 2012, the vulnerability of SMART TVs was brought into relief when it was proven that hackers could easily compromise, in this case, various parts of Samsung’s new TVs which would allow them to: “… remotely turn on the TVs’ built-in cameras without leaving any trace of it on the screen.” A hacker (government or otherwise) had the capability to watch you while you watched your favourite programme or internet web page. Hackers could also re-routed users to a convenient website in order to obtain their bank account data or other private information. The company apparently fixed the flaws with a worrying proviso: “We know that the way we were able to do this has been fixed; it doesn’t mean that there aren’t other ways that could be discovered in the future.”orwellsmarttvSMART TV c/o of Samsung | © infrakshun

Similarly, By 2015, nothing much has improved. Indeed, it’s got worse. Televisions can actively monitor what users say and transmit that information to third parties. Samsung attempted to put these grievances to rest by saying that the latest models are all encrypted, unlike earlier versions. Unfortunately, that was a lie. Reporters from online journal Extreme Tech contacted security researchers at Pentest Partners to retrieve information regarding the brand and model of the TV which had undergone these tests:

The initial model was a UE46ES8000, a top-end TV for its day, but now two years old. This time around, the team tested a UE55HU7500. This screen currently retails for £1,569.86 in the UK according to Amazon. Reviews date from June 2014 through Jan 2015 and the unit is widely available — it is, in other words, a “current” Samsung TV by any reasonable sense of the word.

The team tested the new television in the same manner as the old and found that data is still being transferred in plaintext.

Since SMART technology means that most home-based gadgets and business networks are connected to the internet in some way, technology experts and hackers have cautioned that it is highly likely that the idea of network security is fast becoming a misnomer as the principle of the flaws in the Samsung TVs can be replicated across a broad spectrum of internet-connected platforms. In summary: Devices are unsecured.

Moreover, as one researcher observes:

Many of these unsecured devices can be found with a simple search. In fact, there’s a search engine devoted just to scouring the so-called “Internet of things” called Shadon Playing around with it is an eye-opener. For example, in late July a writer for Forbes discovered an entire home automation product line with Internet-connected features that could be set up without a default password, and were visible to search engines. This would enable a hacker to search and find these systems on the Net, then access them at will. To prove her point, Kashmir Hill breached the home automation systems of random strangers, called them on the phone and demonstrated the vulnerability by turning their lights on and off. [1]

Before we get on to how far the rabbit hole of integration between SMART enthusiasm, monitoring and surveillance goes, it may be worthwhile considering how corporate UK and US are data-mining the minds of Joe and Jeanette public.

Remember your useful supermarket “loyalty” card lurking in your wallet or at the bottom of your handbag? This little critter provides enormous amounts of information about your shopping habits which is retained in a large marketing database and shared by a multitude of interested parties – from advertisers to law enforcement. Your transactions, the frequency of purchases and your preferences are all used to create a customer profile that is mapped into various demographic and psychological analyses very useful for sales and marketing strategies. You are walking psychological real estate for the corporate world and they just love to extract as much as they can from your sub prime mind.

Take another British wallet-hugger – the Nectar card. This is a ubiquitous piece of plastic which is used by over 10 million people in the United Kingdom. Information is compiled from a range of shops visited and offers a nice readout along with a pretty graph of a cardholder’s shopping habits. Though Nectar insists the information is strictly for customers only, data is increasingly flying about the consumer and corporate world, regardless.

loyalty-cards

Intrusion is a very profitable business. As we saw in the first posts about Official Culture, the constant and pervasive presence of advertising seeks to colonise any and all of the latest advances in information technology, from the internet to bill-board hoardings with literally no place to hide. For instance, CAT, PET, MRI brain imaging scanners have fast made the transition from clinical tools to advertisers and marketing weaponry. When it was known that certain regions of the brain “light up” when a person thinks of a pleasurable experience or the solving of a puzzle this means that such knowledge could be applied to advertising. The new jargon speaks of “neuromarketing” or “neuroeconomics” as the next field of mind colonisation. SMART eh?

According to Technology Advice magazine from October 15th 2013, Japan was taking the lead in so called “SMART shelves,” which began appearing in some US grocery stores at the start of 2015. Run by Mondelez International, the shelves operate at the checkout line using various tech tools to identify the sex and age of the shoppers. From the information stored a custom made advert is then  displayed according to that particular person’s demographic. Marketing data will also be collected from how long the advert was watched. If a shopper picks up the item information will be relayed from weight sensors to indicate a potential purchase. Coupons and store discounts can be displayed in order to encourage a sale.

If you want to get the public used to something then the usual mode of “softening” for the future comes via Hollywood and glamour. Otherwise known as “predictive programming” this was used to great effect by butchering Philip K. Dick’s book and making it into Minority Report (2002) starring Tom Cruise and directed by Steven Spielberg. It was here that concept of “Pre-Crime” and biometric surveillance was given a thorough airing.  In the shopping mall scene Cruise’s character is stopped in his tracks by an interactive advert which had been scanned by iris recognition technology. A voice shouts: “John Anderton, you could use a Guinness!” If that sounds too nightmarish to contemplate, most of that futuristic, pop-corn-munching entertainment has become reality in just under ten years. And now it’s all so … passé. The algorithmic software isolates the face, measures the features and extracts it from the scene. Once a match has been found data is flooded in to complete the profile. Think CSI and various other glamorous TV shows that feature all kinds of whizz-bang gadgetry in the hunt for criminals.

Facial recognition and Iris scanning technology is already present at airports and passport control in the UK. Advanced versions are being rolled out at a terminal in Love Field, Dallas, Texas consisting of “… 500 high-definition security cameras sharp enough to read an auto license plate or a logo on a shirt. The International Air Transport Association, or IATA, which represents airlines globally, calls it “the checkpoint of the future,” with the PR for the initiative going for the speed angle where passengers will move almost “non-stop” through security. Meanwhile, they “… would identify themselves not with driver’s licenses and paper boarding passes, but by scanning fingerprints or irises to prove they have an electronic ticket.” [2]

(Even Homeland Security has been beavering way since at least 2011 to apply this technology in defending the Fatherland. It seems logical that this is where the real action lies, namely, in bolstering law enforcement and the military-intelligence apparatus).

Along side “Intelligent” transport systems we have Intelligent digital billboards which have been the first in line for this advertising gold-rush, being fitted with cameras that can discern the gender and age group of passers-by who look at them. The idea is to tailor the messages to the onlooker in real time. Toyko has road tested a collection of billboards of varying size and at different locations. A spokesman for the project said: “The camera can distinguish a person’s sex and approximate age, even if the person only walks by in front of the display, at least if he or she looks at the screen for a second.” And the data stored will obviously stay in responsible hands, advertisers being extremely responsible people, as we know… [3]

Germany has also been getting in on the act with a intelligent billboard designed for dog owners using “hot technology of location-based social networking,” to sell Granata Pet brand dog food. “As owners pass by with their dogs they can stop in front of it, use their mobile phones to check in on Foursquare and as soon as they do, a dog treat will pop out of the billboard and the dog – or I guess owner – can sample the product before deciding to buy it.” [4]

Or course, targeting your bemused pooch is small fry.

Ad agency BBDO (also from Germany) and broadcaster Sky Deutschland have joined forces to target work weary passengers on commuter trains. When they rest their heads against a window instead of the promise of pleasant dreams they will hear messages beamed into the brains. The advertising platform uses a small box attached to the surface of the window which sends out vibrations which the brain translates into sound. Called “bone conduction” technology, it promises to be used across a range of info-tainment services.

Less invasive is the introduction of “Smell-vertising” which had its first test run by food company McCain and its frozen jacket potatoes. A display of 3D fibreglass models of baked potatoes were installed at bus stops in London, York, Glasgow, Manchester and Nottingham which released an aroma of oven-baked potato when a button is pressed.

According to a report published in 2011 by the Centre for Future Studies, 3D outdoor ads that can recognise people’s moods and were tested on the streets in 2012. Called “gladadvertising,” the software picks up on facial expressions associated with certain moods and once it has analysed what the victim is feeling, advertisers move in for the kill, delivering the programmed advert straight into the frontal lobe. The study also concluded that the accessing of personal data from social networks through your mobile phone could be combined with “holograms, mood lighting and smells.” [5] This form of “targeted marketing or “dynamic advertising” has some of us – though clearly not enough – concerned.

personalisedlipsThe Washington-based privacy advocate organisation the Electronic Privacy Information Centre (EPIC) warned that: “… this type of surveillance encroaches on civil liberties,” adding that: “Such face, voice and behaviour technology could be a means of tracking individuals on a mass level across their entire lives.” The organisation believes that the demands from advertisers and security-minded governments have made technologies: “… so increasingly SMART and intrusive that they now resemble something out of science fiction.”

As we become assaulted by smells, images and voices in our heads, these will be increasingly tailored towards the particular demographic in which we reside. And depending how much of our individual data has become available – probably without our consent. Accordingly, even the gender focus can become another marketing dollar. Initially however, it was a charity which was chosen to launch a face recognition billboard in London’s Oxford St. to highlight gender discrimination. (Nothing like blending social conscience and marketing – everyone’s a winner.) On February 23rd 2012, The Independent  newspaper reported on an advert that “plays only to women.” The first of its kind, the technology: “… works by scanning faces before measuring the distance between the viewer’s eyes, width of the nose, length of jaw line and shape of cheekbone to compare the data and estimate their gender.”

Back in November 12, 2008, an Agence France Press ran the report: ‘Firms scan brain waves to improve ads in Japan.’ US Market research company Neilsen and its partner Neurofocus obligingly offered a brain-scanning “service” for the Japanese marketing industry. The technology scans brains waves and the physical features of potential customers in order to accurately study the effects of advertising messages and their products. Attention level, message retention level and emotional involvement of customers is measured the data of which is collected and analysed.

Meanwhile, Londoners can’t even take out their rubbish without being targeted by the ad-men and their SMART toys. Before the Olympics of 2012, Renew, a company who manufactures recycling bins installed over 100, 12 of which had digital tracking devices so that customers were effectively stalked in order to roll out personal advertising in the “real world.” As ludicrous as it may sound – yet perhaps fitting given the product – the little digital screens display Youtube updates, news and of course, targeted ads. According to Sam Shead of online magazine Techworld,an experiment to place tracking devices in recycling bins in order to spy on Londoner’s smartphones was well underway. The report explained how it worked: The 12 bins with the technology record a unique identification number, known as a MAC address, for mobile devices in the vicinity that have Wi-Fi switched on. This enables the Renew bins to monitor data including the ‘movement, type, direction, and speed of unique devices’”. The experiment was terminated by early 2013. Don’t worry there are still the London SMART bins.[6] (See below)

Smart Cities: BinsDan Kitwood/Getty Images Europe

“In London’s Square Mile there are already more than 100 “smart bins”. As well as being a receptacle for recycling, they feature digital screens broadcasting a live channel of breaking headline news and live traffic information. They can also communicate directly with mobile devices through Wi-Fi and Bluetooth technology.” Source: ‘Cities get smart: urban innovation.


 “Identity will become embedded in devices” and “propagated into all applications.”


The appetite for data from advertisers and marketers is as insatiable as the NSA’s. The objective is to create a rich data base for “predictive analytics” where a precise knowledge of each individual’s “event” (places they have dined, visited etc.) and who has purchased online in the past can be targeted with advertising which knows your behaviour and personal preferences inside out. The report goes on to say: “In tests occurring between 21-24 May and 2-9 June, over four million events were observed, with over 530,000 unique devices monitored.”

Advertisers may enjoy the innovation but the SMART technology they are riding and driving serves another purpose above and beyond selling products. The software and the desires behind it will always advance and so too the more macro-social SMART planning that is on the pathocratic excel sheet; something advertisers will obviously not have considered and even if the awareness was present, probably wouldn’t care. As Bruce Schneier, chief security technology officer of BT points out: “Once the cameras are installed and operational, once they’re networked to central computers, then it’s a simple matter of upgrading the software,” … “And if they can do more — if they can provide more ‘value’ to the advertisers — then of course they will. To think otherwise is simply naïve.” [7]

The Centre for Future Studies produced a recent summary of key trends in social media that showed how advertising and marketing will dove-tail perfectly into the Technocrats’ dream of an automated society or, as the report states, thanks to Facebook, Twitter etc.: “Identity will become embedded in devices” and “propagated into all applications.” The SMART systems will allow us to bypass these sites and will “seamlessly access your profile.” They further suggest that once social identity has become embedded in our devices, online sharing will become fused to media life, where DVDs TV, i-Pod music and internet “sync preferences to preferred identity.”

Back to The Internet of Things (IOT) and uploading and integrating our identity with SMART world until they are fully synonymous.

As the embedding continues and the reliance and surveillance that goes with it, our location will be omnipresent and available: “Location aware devices will employ pre-emptive use of location to alert the user to things or people nearby that may be of interest.” – Along with those listening in and observing. Marketers will start salivating here when they can offer a discount at a nearby MacDonald’s store: Hey Dude! There’s a Double Royale Burger with extra fries half price deal on 5th Avenue if you hurry! Just Lovin’ it!

mcdonaldspersonalisedThis “dual use” technology allows a double agenda to come into play. Once again, we have the Brave New (SMART) world lurking in perceived innocence and purity just behind the scenes approaching full integration with satellite and terrestrial appliances:

“SMART devices and web apps will automatically check-in and post updates: Identity aware devices, empowered by embeddable RFID tags, (Radio Frequency Identification Chip) will allow this type of technology to spread beyond the mobile phone. A SMART coffee thermos, for example, could enable auto-check ins and send coupons to your phone as you enter your favourite coffee shop.” [8]

And entering our favourite coffee shop with your favourite thermos may be the least of our worries if Radio-Frequency Identification (RFID) does indeed spread beyond the mobile phone. Like your arm, for example. In the technocratic future, entering the shop by choice would fast become a luxury. It is at precisely this juncture, where SMART technologies and consumerism suggest how to live your life and where true choices becomes somewhat progressively ill-defined. It’s already too much. And such a level of invasive consumerism blended with the surveillance state can only work if one’s brain has been suitably primed to function in a similar fashion to a small bucket of silica.

What of the workforce in the face of these rapid advances?

A recent report from the Oxford Martin Programme on the Impacts of Future Technology based at Oxford University suggests that 45 per cent of the jobs in the United States will be automated within the next twenty years. Using a standard statistical modelling method, data was accrued from more than 700 jobs on ONet, an online career network. The skills, education and many other variables were all taken into account. With already massive unemployment problems and part-time workers scratching around for jobs automation will force more and more people into the mega-cities and into a managed system – for their own welfare.

Echoing Jeremy Rifikin’s seminal book: The End of Work: The Decline of the Global Labor Force and the Dawn of the Post-Market Era (1995) the professor explored the clear delineation between a disenfranchised global workforce and an Information Elite. The results yielded a change that would likely happen in two stages:

1) Computers replacing people. Vulnerable fields like transportation/logistics, production, construction, services, sales and administration will all be affected causing a massive increase in the unemployed. The pace of change will then slow and progress in fits and starts according to the particular field.

2) Artificial Intelligence. As the sophistication of computerisation continues to grow, a second tier of work will be under threat including the sciences, management, engineering, and the arts.

Obvious maybe, but in 1995 it was hard to imagine. Manufacturing is in a bad way having shed 6 million jobs since 2000 and as production soars ahead despite trillions of debt in both the US and Europe. The robot revolution and the SMART visions will only continue the erosion of mass employment. The speed at which this will happen, especially regarding stage two depends on access to cheap labour, resources and social, geo-political and environmental instability. It could be much quicker or considerably longer but the direction is clear.

factoryautomation© infrakshun


“The new law of the economic jungle is this: either write the software that eats the world, or be eaten.”


Professor Erik Brynjolfsson from MIT Sloan School of Management, and his co-author Andrew McAfee have come to much the same conclusions. They believe most of the unemployment stagnation is due to the inexorable rise of robotics and factory automation. According to their research the future is very bleak for a much wider range of jobs, from law, financial services, education, and medicine. More controversially for some, they show that there has been a divergence or “great decoupling” beginning in 2000 – 2011 where economic growth is indicated but with no parallel increase in job creation. Productivity continues to rise as does the long-term unemployed. While Brynjolfsson believes technology does make nations wealthier overall, there is an undeniable paradox at work. He observes: “Productivity is at record levels, innovation has never been faster, and yet at the same time, we have a falling median income and we have fewer jobs. People are falling behind because technology is advancing so fast and our skills and organizations aren’t keeping up.” [9]

Earlier in 2013 Israeli company Rethink Robotics illustrated what will surely become the norm before very long. “Baxter” a foot high service robot retailing at $22,000 can take on most menial tasks from serving coffee, to fetching the post. Software applications are swiftly being developed to make sure that such robots will be able to take ever more sophisticated jobs from assembly line work in factories to flipping burgers in McDonalds. According to a Fiscal Times report Baxter is being overtaken: “MIT already has a BakeBot that can read recipes, whip together cookie dough and place it in the oven. The University of California at Berkeley has a robot that can do laundry and fold T-shirts. Robot servers have started waiting tables at restaurants in Japan, South Korea, China and Thailand …” [10]  Indeed, US agriculture which has already undergone massive monopolisation by five major agribusiness companies is taking the next step in the robotics revolution in keeping with a future collective herding of humanity. Over in California the Lettuce Bot is one such example, where the machines  “… can ‘thin’ a field of lettuce in the time it takes about 20 workers to do the job by hand.” [11]

Though a new sector of employment is emerging comprising Robot IT and maintenance personnel, security developers, designers and salespeople for robot accessories, software, and apps, it will not ameliorate the millions of blue collar workers whose talents and working wage is outside specialist technology. (This does not even include the rising immigration problem from nations ransacked by western backed regime change).  As automated vehicles begin to replace truck drivers and better software obviates the need for lawyers, bartenders and burger flippers and even some medical care workers then the divide between the rich and the poor will become a case of who has access to technology and who does not; who is living on the edges of society and who lives at its core. As one tech journalist Jon Evans commented: “The new law of the economic jungle is this: either write the software that eats the world, or be eaten.”

Author and technology journalist Nicolas Carr has written about the dark side of the approaching revolution in automation. Carr opines that in putting our knowledge in the hands of machines, we are inadvertently – and ironically – signing away our greatest potential.  In his 2010 book: The Shallows: How the internet is changing the way we think, read and remember he provides an overview of what automation is doing to a number of sectors in society and how they are altering the nature of work. For instance, air accidents are revealed to be have been caused by pilot error, which in turn, was caused by overly-sophisticated software which has by-passed normal human reaction and good old fashioned intuition working in unison with years of experience. Now they are essentially computer operators.

Aviation and automation experts have found that what the accidents had in common (when human error was a factor) was that: “Overuse of automation erodes pilots’ expertise and dulls their reflexes,” which leads “a de-skilling of the crew.” And since pilots hold the controls on a typical flight for only three minutes such is the state of software sophistication it means that the problem isn’t likely to get better. Unless that is, you get rid of pilots all together. What will this do to the knowledge of flying? Will flying be yet another skill that becomes the province of the computer and will go much the same way as the art of hand-writing? The stakes are a little higher with the former however… 

The overuse of automation may be putting lives at risk. Faith in such technology could be misplaced if we compare it to the beliefs of the Industrial Revolution from which most of these ideas derive. The scope and magnitude of automated tasks has taken on an entirely different mandate. Software is increasingly rendering the presence of humans unnecessary even for intellectual tasks which until recently were considered strictly human-based. As our focus narrows, we are moving into a technocratic army of workers who do nothing more than monitor and input data rather than truly engage in creative activities which require the friction of challenge and stimulation. Routine will inevitably supplant the nourishing of talent even more than the mechanical assembly line.

Automation2

Automation: the future of manufacturing. Where do all the people go?

The cause of this drive to automate our lives is based on a trenchant fallacy of a machine-based future that will naturally provide for us all and cater for our every mental, emotional and even spiritual needs. As Carr suggests, this is merely another “substitution myth” which fails to address core issues at the heart of change and adaptation. He further states: “A labor-saving device doesn’t just provide a substitute for some isolated component of a job or other activity. It alters the character of the entire task, including the roles, attitudes, and skills of the people taking part.” It is this mass alteration combined with power-hungry individuals presently infesting our social systems which will spell disaster for the human condition if we don’t – somehow – apply the brakes.

Meantime, this will inevitably lead to what psychologists have called complacency and bias leading to poor performance. A false sense of security will descend which over time, leads to an erosion of our levels of attention and awareness. As our trust and faith in automated systems increases so too our hard talents and instincts atrophy, where other informational sources become secondary. This does not absolve us from ignoring incorrect or subtle mistakes in computational data however and a vicious circle is enacted.

But there is also a deeper problem as Carr explains:

Automation turns us from actors into observers. Instead of manipulating the yoke, we watch the screen. That shift may make our lives easier, but it can also inhibit the development of expertise. Since the late 1970s, psychologists have been documenting a phenomenon called the “generation effect.” It was first observed in studies of vocabulary, which revealed that people remember words much better when they actively call them to mind—when they generate them—than when they simply read them. The effect, it has since become clear, influences learning in many different circumstances. When you engage actively in a task, you set off intricate mental processes that allow you to retain more knowledge. You learn more and remember more. When you repeat the same task over a long period, your brain constructs specialized neural circuits dedicated to the activity. It assembles a rich store of information and organizes that knowledge in a way that allows you to tap into it instantaneously. Whether it’s Serena Williams on a tennis court or Magnus Carlsen at a chessboard, an expert can spot patterns, evaluate signals, and react to changing circumstances with speed and precision that can seem uncanny. What looks like instinct is hard-won skill, skill that requires exactly the kind of struggle that modern software seeks to alleviate.

Translating information into applied knowledge is fast becoming an obstacle to achieving not only a place in society but a deeper sense of fulfilment. With an already growing malaise of narcissism afflicting our present generations this does not bode well for the coming technocratic age. In our enthusiasm to replace pilots with programs and suitable algorithms so that diagnoses can take doctors out of the equation entirely the vacuum to which we are all being drawn is based on a cure that is nothing more than total automation which is by definition a technocracy. How on earth do we prevent our distinctly unique talents disappearing as rapidly as technology has arisen? As a consequence, it has comes down to a question of existential meaning. Carr asks: “Does our essence still lie in what we know, or are we now content to be defined by what we want? If we don’t grapple with that question ourselves, our gadgets will be happy to answer it for us.” It doesn’t matter from what cultural origins we derive our sense of meaning and place in the world, the eternal constant is that “knowing demands doing.” [12]

If we embrace the riptide of total automation where the notion of personal vocation is becoming refined and narrowed into software programs in the name of efficiency and ease, then our definition of who we are will be dangerously tied up with the instantaneous result – at the expense of the journey. What we may be losing in return for this new Official Culture and its addictive race for results will only be known when we begin to wonder what it was like to live without the screen. Creativity, meaning and a real world connection may be difficult to claw back when we have become a mirror of the machines we seem to covet.

But the blind drive to a SMART society and automation isn’t the only change that is pressing down on human consciousness. The urge to actually merge our bodies with machines by allowing incremental integration is already taking place.

 


Notes
[1] ‘In 21st century America, Samsung TV watches YOU!’ chron.com, August 5, 2013.
[2] ”Checkpoint of the future’ takes shape at Texas airport’ USA Today June 21, 2012.
[3] ‘Tokyo’s intelligent digital billboards can tell gender, age of passerby’ by Andrew Nusca, http://www.smartplanet.com, 15 Jul 2010.
[4] ‘Intelligent Billboard gives you dog treats: truly the future is here.’ By Anna Leach, March 30 2011. http://www.shinyshiny.tv.com.
[5] ‘Emotion Recognition Software Will Tailor Digital Out-of-Home Advertising Messages to a Person’s Mood’ March 3 2011, http://www.screenmediadaily.com
[6] ‘Tracking devices in recycling bins spy on Londoner’s smartphones’ By Sam Shead Tech World | Aug 10, 2013.
[7] ‘Big Brother is watching you shop’ By Michael Fitzpatrick, BBC News, October 2, 2009.
[8] Insights – centreforfuturestudies strategic futures consultancy, 21 September 2010, http://www.futurestudies.co.uk/files/Centrepercent20forpercent20Futurepercent20Studies/INSIGHTpercent20Socialpercent20Media.pdf

[9] ‘How Technology Is Destroying Jobs’ By David Rotman MIT Tech Review June 2013.
[10]’The Robot Reality: Service Jobs are Next to Go’ By Blaire Briody, Fiscal Times March 26, 2013.
[11]‘Robots revolutionize farming ease labor’ Phys.org July 2013.
[12] ‘All Can Be Lost: The Risk of Putting Our Knowledge in the Hands of Machines’ By Nicolas Carr, The Atlantic Monthly, Oct.23rd 2013.

Outsourcing Abuse II: Dyncorp Revealed

By M.K. Styllinski

“The people of DynCorp International (DI) leverage our global presence and reach, international business experience, language capabilities, and deep cultural understanding to benefit every mission. We provide the highest level of professional intelligence training, collection and analysis, and mission support to meet the intelligence needs of our customers. The team also delivers flexible and rapidly-deployable, integrated security solutions to suit any situation in any part of the world.”

– Dyncorp International  


The above quote can be summarised in a sentence: “We outsource American Empire”. And of course, since the Establishment in America is concerned with invading and stealing other nation’s resources under the pretext of democratic intervention, then it stands to reason that what “needs” Dyncorp is delivering to their “intelligence customers” is simply more of the same morally bankrupt dynamics employed by the World state psychopaths in power. I’m quite sure their “deep cultural understanding” helps intel operatives enormously as they find new ways to extend their reach.

Outsourcing and private security contracts have boomed over the last decade. The United Nations isn’t the only Establishment organisation to have suffered from the effects of institutional sexual abuse and expanded these pathologies via outsourced channels. A cross fertilization is taking place between Private securities companies (private armies) prisons, the military and intelligence agencies.

A revealing January 2002 article by Insight magazine’s Kelly Patricia O’Meara (below) was followed up in November of the same year with The Guardian’s piece on the American defence and security contractor DynCorp. This opend the proverbial can of beans…The corporation had branches in Salisbury, UK and dealt with the contracts of American officers working for the international police force in Bosnia. Dyncorp unfairly dismissed Kathryn Bolkovac, a UN police officer for reporting colleagues involved in the Bosnian sex trade and threatening their “lucrative contact” to supply officers to the UN mission. According to the report: “UN peacekeepers went to nightclubs where girls as young as 15 were forced to dance naked and have sex with customers, and those UN personnel and international aid workers were linked to prostitution rings in the Balkans. The employment tribunal accepted that Ms Bolkovac, an American who was employed by DynCorp and contracted to the UN, had been dismissed for whistle blowing.” [1]

dyncorp

‘US: DynCorp Disgrace’ by Kelly Patricia O’Meara, Insight Magazine January 14th, 2002

DynCorp had the contract to provide police officers for the 2,100-member UN international police task force in Bosnia which was supposedly created to restore law and order after the civil war. In the British tribunal Ms Bolkovac’s evidence highlighted the underground sex trade that was “thriving among the 21,000 NATO peacekeepers and thousands of international bureaucrats and aid workers” and that still remains one of the most extensive trades in the world. [2]

Dyncorp forged documents, trafficked women, aided illegal cross-border transports and tipped off sex club owners about imminent raids. Bolkovac also described how UN police, NATO troops and humanitarian, NGO employees were “regular customers.” [3] Bolkovac uncovered evidence “of girls being beaten and raped in bars by their pimps while peacekeepers stood and watched.” Even one UN policeman who was meant to be investigating the sex trade: “paid £700 to a bar owner for an underage girl who he kept captive in his apartment to use in his own prostitution racket.”[4] Ultimately, the company fired the eight employees for their alleged involvement in sex trafficking and illegal arms deals. Madeleine Rees, the head of the UN Human Rights Commission office in Sarajevo, was:  “… in no doubt that trafficking in women started with the arrival of the international peacekeepers in 1992.” [5]

Again we find that where sexual abuse is occurring the police are not far behind and unfortunately on the wrong side of the law. After a two year battle at an employment tribunal court, testimony was heard that one of the most senior UN officials Dennis Laducer, Deputy Commissioner of the International Police Task Force, was found to attending one of the most notorious brothels. He was subsequently sacked and Kathryn Bolkovac finally awarded $110.000 [some reports say $173,000] in 2002, with DynCorp forced to foot the bill. [6] Inspired by the story of Bolkovac, The Whistleblower hit the cinemas in 2010. Directed by Larysa Kondracki, written by Eilis Kirwan and Kondracki with Rachel Weisz playing Bolkovac, the film is a largely fictionalised dramatization of Bolkovac’s experiences in Bosnia though with enough mixing of fact and fiction to lend teeth to the film’s central premise: that sex trafficking, rape and murder took place under the eyes of the UN and with active involvement of an outsourced security firm Dyncorp (given the moniker “DemocraCorp” in the film). The end result is a motion picture which does an admirable job of raising awareness of the problem despite senior UN officials’ attempts to belittle it and play down the facts upon which the film is based. Similarly, rather than paying attention to one woman’s courage and the appalling suffering she brought to the world’s attention, the UN allowed the shutting down of anti-trafficking initiatives by its own gender affairs chief in Bosnia even though it was deemed to be producing tangible results. The chief in question Madeline Rees was then fired by the UN for “poor performance” but took her case to a UN disputes tribunal and won.  She is now General Secretary for the Women’s International League for Peace and Freedom.

Kathryn Bolkovac

Former police investigator Kathryn Bolkovac. | http://www.bolkovac.com/

One of Bolkovac’s allies during the ordeal and played by Vanessa Redgrave in the film, Rees had been the UN Officer for gender issues for many years and supported her attempts to raise awareness of what was taking place under the cover of UN humanitarian aid. Rees commented:  “I went to work with large numbers of women who had been the victims of rape during the war but I ended up working as much with women who were being trafficked and raped by soldiers and police officers sent to keep the peace.” [7]  She described the mechanisms by which such crimes and corruption was able to take place:

“Countries get rated by the US Trafficking in Persons report on their records in dealing with trafficking, for which you need to show results. If you don’t prosecute or repatriate enough people, your rating is downgraded, thereby your financial support. So when there were raids, the girls would be shipped home to Ukraine or wherever, probably to be retrafficked. It was a repatriation factory, run by people who had an anti-immigration approach, and didn’t want women to try to get into western Europe – no focus on the system or rights of the women. Our approach, by contrast, was slow and beginning to work, so it had to be killed off.” [8]

The Whistleblower

DVD and Poster promotion for The WhistleBlower

Former General Secretary Kofi Annan and successor Ban Ki-moon are fond of promoting the idea that these crimes are a result of a “few rotten apples” rather than the obvious endemic and systematic effects of a much deeper malaise. As Rees points out regarding the UN hierarchy: “They have to understand that this outrageous practice is endemic in the male hegemony of a militarised environment – it’s part of locker-room bravado and the high levels of testosterone in fighting armies. These crimes are perpetrated by individual men who rape and torture girls on mission, then go home to their wives. And it’ll carry on until there’s a knock at the door and they find themselves getting arrested in front of the wife and kids.” [9]

While the UN claimed to have dealt with the rotten apples and Dyncorp professed to have made a thorough and “aggressive” investigation into the crimes, the trafficking still continues right under the UN’s nose. As the film’s director stated in her address to the UN leadership at a screening which the organisation grudgingly agreed to:  “I know we are going to hear a lot about what has been done since the time depicted in this film, but rhetoric only goes so far. The situation has escalated.” [10] (In 2010 sexually related allegations against U.N. military forces rose by 12 percent with some of the allegations involving minors). [11]

The UN investigator was not the first to blow the whistle on the corporation. Ben Johnson, a former Texan helicopter mechanic won his lawsuit just hours after Bolkovac where his claims included allegations of men having sex with girls as young as 12. His claims also concerned a nightclub in Bosnia frequented by DynCorp employees, where young women were sold “hourly, daily or permanently”.[12] Johnson believes Dyncorp was not only dealing in illicit arms and fraud but heavily involved in the peddling and promoting of the burgeoning sex trade that was thriving precisely because this was a war torn region.

Where there is war there is a surplus of the vulnerable and a perfect cover for trafficking. The sex slaves were ordered from Russia, Romania and the primary trafficking hub of Moldova, being imported directly by Dyncorp and the Serbian Mafia working in concert:  “These guys would say ‘I gotta go to Serbia this weekend to pick up three girls.’ They talk about it and brag about how much they pay for them usually between $600 and $800. In fact, there was this one guy who had to be 60 years old who had a girl who couldn’t have been 14. DynCorp leadership was 100 % in bed with the mafia over there. I didn’t get any results from talking to DynCorp officials, so I went to Army CID and I drove around with them, pointing out everyone’s houses who owned women and weapons.’ ” [13]

Since 1998, several DynCorp employees have been sent home from Bosnia but none have been prosecuted. All this scandal led George W. Bush to respond by creating the US Immigration and Customs Enforcement (ICE) established in March 2003 “as the largest investigative arm of the Department of Homeland Security,… comprising of four integrated divisions that form a 21st century law enforcement agency with broad responsibilities for a number of key homeland security priorities.” [14] The amount of assets seized from human smugglers and human trafficking organizations totalled 27 million in 2005 and with no seizures at all for 2003.  Compared to the billions of dollars circulating, this is the equivalent of loose change. Far from suggesting a major improvement, it shows a dismal response on the part of the State Department even while it cheerfully reported with no hint of irony that: “Since ICE was created, more than a dozen child sex tourists seeking to exploit children in eight separate countries have been arrested and now face justice in the US.” [15]

With sex tourism proving to be a major problem in the West we are supposed to believe that the arrest of 12 child sex tourists since 2003 is an example of “significant law enforcement progress”?

We also have the proud declaration of “investigations into human trafficking and the related crime of human smuggling, [which] have resulted in more than 5,400 arrests, 2,800 criminal indictments, and 2,300 criminal convictions.” [16] These successes were diluted by contractors and security firms which are mostly extensions of the US government.

Indeed, the corporate-security complex aggressively lobbied for provision after provision until, according to a Chicago Tribune report: “…significant aspects of the Pentagon’s proposed policy might actually do more harm than good unless they’re changed. These experts have told the Pentagon that the policy would merely formalize practices that have allowed contractors working overseas to escape punishment for involvement in trafficking, the records show.” [17] And it was probably designed that way.

Capture

Human trafficking main origin, transit, and destinations

On March 11th 2005, in a House Hearing on FY06 Department of Defence Budget hearing Senator Cynthia McKinney focused on the Dyncorp scandal, taking then Secretary of Defence Donald Rumsfeld and General Carl Myers to task, in no uncertain terms. (see end of article). It was a rare opportunity to see a lone voice in politics trap Rumsfeld and place him firmly in the hot seat. The Neo-Con war hawk bridled as he was forced to listen to the facts.

Not only has the Pentagon yet to ban contractors from using forced labour, but the same corporations are being effectively rewarded for their past and present criminal behaviour, by obtaining contracts set far into the future. (As part of a consortium of bidders, the British government’s Ministry of Defence awarded the company a 60m contract to supply support services for military firing ranges. [18] With the help of lobbyists from Dyncorp and Halliburton, subsidiaries such as KBR has over 200 subcontractors carrying out the multibillion-dollar US Army contract for privatization of military support operations in the war zone. Trafficking and bonded labour appear inconsequential in the face of exorbitant profits. Yet the US military continue to deny responsibility for its out-sourcing of conflict even when there are continuing and numerous incidents that show the liability of its sub-contractors. [19]

Dyncorp represents the new breed of private contracts taking the place of traditional forces most recently employed by the United Nations itself. Once again we can see how sexual exploitation can be used as a political and corporate terrorism outside military and international law. But security firms also represent that same homogenization of the private sector funnelled into new forms of political control.

If we were to visit the California-based Computer Sciences Corporation website (csc.com) we might be forgiven for thinking this is a financial services company humbly dedicated to bettering the world as well as its investors. Unfortunately, the low key nature of the site design masks the meaning of this fortune 500 multi-national with its high-level enabling skills for U.S. Federal government. The corporation currently holds contracts with more than 40 federal agencies including the Pentagon, State Department, Drug Enforcement Administration, and the Energy and Justice Departments.

This giant government contractor bought Dyncorp on March 7th 2003, creating “a company that ranks as one of the top information technology and outsourcing services providers to the U.S. federal government.” The revenues from the federal sector alone were estimated to be around $6 billion at the end of that fiscal year, with projections in excess of $14.5 billion at the end of 2004. 2005 saw a steady increase in profits due to its monopoly on US Government contracts which are now expanding into Europe. This net profit was more than $810.2 million during fiscal year 2005, an increase of 56 percent over 2004. [20] The purchase of Dyncorp not only saved its bacon but allowed it to claim the dubious honour of being the third largest IT services provider behind Lockheed Martin and second place provider EDS Corp.

CSC Chief Executive Van B. Honeycutt gave a wonderful example of the art of masking with his comments on why the Dyncorp merger went ahead: “‘DynCorp, with approximately 98 percent of its total revenue coming from the U.S. federal government, complements our overall federal business, allowing a great breadth of end-to-end solutions and significantly increasing our exposure to the growth area of federal government, IT and functional outsourcing…”  He continued: “The capabilities of the new federal sector organization will allow CSC to provide more comprehensive services and solutions to our government customers…” These “customers” are none other than the US military and the Department of Homelands Security who will apparently benefit from: “… the resources and security expertise of CSC, coupled with those of DynCorp, will position us extremely well as the federal government expands and accelerates its efforts to enhance U.S. national security.’ ” [21]

No doubt.

It sounds reasonable enough if we don’t think about what this actually means. “The growth area of federal government” and “U.S. National Security” is intimately linked to the “War on Terrorism,” numerous examples of human rights abuses and the dismantling of the constitution from within.

When the United States created the Office of Homeland Security, CSC chairman Van B. Honeycutt was one of the first advisers to the new agency having already handled the position of Chair of the National Security Telecommunications Advisory Committee (NSTAC) under President Clinton. Effectively, the corporation is an extension of the government and its policies, with an incestual exchange of employees and profit, which the website tenderly calls “client intimate organizations.” With its headquarters in Reston, Virginia, close to the CIA and the Pentagon, there is no doubt that Dyncorp has a deeply intimate (and lucrative) connection that is mutually binding.

Dyncorp contractor in Afghanistan

Dyncorp contractor in Afghanistan

Prior to the merger, DynCorp was among the largest employee-owned technology and out-sourcing firms headquartered in the United States, with approximately 26,000 employees in some 550 locations throughout the world. According to CSC: “… the U.S. Department of Defense represented 49 percent of DynCorp’s revenue in 2001, which before the merger netted 2.3 billion.” [22]

During 2008–2010, CSC was heavily criticised for spending $4.39 million on lobbying and not paying any taxes which is nonetheless standard practice for most large corporations. In fact, the company received $305 million in tax rebates, on top of a profit of $1.67 billion. [23]

By the end of 2004 CSC had sold off units of Dyncorp to private equity firm Veritas Capital for $850 million. With Dyncorp International eventually dropping under the net of private equity investment firm Cerberus Capital Management $1 billion and finalised in the summer of 2010. CSC still retains the rights to the name “DynCorp” while the new company became DynCorp International now listed on the New York Stock Exchange despite receiving 96% of its more than $3 billion in annual revenues from the US federal government. [24] Dyncorp Inc. earned a whopping $2,398,874,000 from its “defence” contracts alone in 2011.

The number of lawsuits and scandals hitting Dyncorp International range from allegations of sex trafficking to a variety of human rights abuses and black operations involving drugs and military targets. This is largely due to the hiring of former Special Operations military personnel and CIA personnel. One would think that the screening of employees would have been stepped up after so much bad publicity. Yet why should they worry when the biggest contractors are the US and its war machine driven by the arms industry itself? Logistical and IT services may well be a great part of the civilised PR of Dyncorp but in reality, the real focus of this corporation could be categorized as “private mercenaries” which allows operations to be sub-contracted to the bidder that is most ideologically and professionally sound. It also conveniently abdicates responsibility for the US army and their civilian deaths while avoiding unnecessary media spotlights. Outsourcing their wars beyond the prying eyes of press and congress is an effective way to ensure the success of geo-political policies such as regime change.

Secrecy is obviously an important part of the company’s rules. If employees happen to get rubbed out on their various covert “missions” then the paper trail is as sparse as possible. Janet Wineriter, a spokeswoman at DynCorp’s headquarters frequently tells the media that she cannot discuss the company’s operations because of its contractual obligations to its client – the State Department. When this fails then black-outs are affected. Information regarding the real activities of these private mercenaries is intentionally obscure and shielded from investigations. There is no “right to know.” The last people they want to inform are Congress or the public. As a Guardian article stated “Today’s mercenaries in the drug war are provided by private companies selling a service and are used as a matter of course by both the state and defence.” [25]

Dyncorp has little to do with “Information Systems, Information Technology Outsourcing and Technical Services” though this certainly plays a part in extending its monopolistic war games. Controlling and monitoring information systems for federal agencies such as the FBI, DOJ and SEC, are within the corporation’s remit which is rather handy should any “impropriety” surface – which of course is the name of the game. Subversion and corruption is endorsed and legitimized via a corporate and federal relationship that gives the Cosa Nostra a run for its money.

dymcorprumsfeld

Cynthia McKinney does what she does best and grills Donald Rumsfeld over Dyncorp’s activities. This is the only time we are likely to see this psychopath get hauled over the coals for any of his state-sponsored crimes.

***

Update 2017: See: BOMBSHELL: Solving The Puzzle – “It’s DynCorp behind the mass shootings you see in America”


Notes

[1] ‘American firm in Bosnia sex trade row poised to win MoD contract’ by Jamie Wilson and Kevin Maguire, The Guardian, November 29, 2002.
[2] ‘British firm accused in UN ‘sex scandal’: International police in Bosnia face prostitution claims By Antony Barnett and Solomon Hughes, The Observer, London, 29th July 2001.
[3] Ibid.
[4] ‘Woman sacked for revealing UN links with sex trade’ By Daniel McGrory How a tribunal vindicated an investigator who blew whistle on workers in Bosnia, The Times, August 07, 2002.
[5] Ibid.
[6] ‘Sins of the peacekeepers’ Sunday Herald, 30 June 2002.
[7] ‘Has the UN learned lessons of Bosnian sex slavery revealed in Rachel Weisz film?’By Ed VulliamyThe Observer, January 15, 2012.
[8] Ibid.
[9]   Ibid.
[10]    Ibid.
[11]  ‘U.N. Mum on Probes of Sex-Abuse Allegations’ By Steve Stecklow and Joe Lauria, Africa News, March 21, 2010.
[12] ‘American firm in Bosnia sex trade row poised to win MoD contract’ by Jamie Wilson and Kevin Maguire, The Guardian, November 29, 2002.
[13] ‘DynCorp Disgrace’ Jan. 14, 2002, Insight magazine, By Kelly Patricia O Meara. http://www.insightmag.com
[14]  Bureau of International Information Programs, US Department of State. Web site: http://www.usinfo.state.gov
[15] ‘US Law Enforcement Steps Up Hunt for Human Traffickers’ 11 January, 2006 http://www.usinfo.state.gov/washfile
[16] Ibid.
[17] ‘US stalls on human trafficking – Pentagon has yet to ban contractors’ from using forced labor By Cam Simpson December 27, 2005.
[19] But one example from The Chicago Tribune which: “retraced the journey of 12 Nepali men recruited from poor villages in one of the most remote and impoverished corners of the world and documented a trail of deceit, fraud and negligence stretching into Iraq. The men were kidnapped from an unprotected caravan and executed en route to jobs at an American military base in 2004.”“Dyncorp and Friends: Securing Private Politics” (2007) an article written by the author which fleshes out Dyncorp and other UK and US private companies.
[20] Data Monitor /Computer Wire / http://www.computerwire.com/ 2005.
[21] ‘CSC and DynCorp Combine to Create Federal IT Powerhouse’ – http://www.csc.com/
[23] ‘30 Major U.S. Corporations Paid More to Lobby Congress Than Income Taxes, 2008-2010’ By Ashley Portero, International Business Times, http://www.webcitation.org, December 9, 2011.
[24] ‘Cerberus completes DynCorp acquisition’ Washington Business Journal, July 7, 2010.| Washington Tech. Top 100: http://www.washingtontechnology.com/toplists/top-100-lists/2011/dyncorp.aspx
[25] ‘A Plane is Shot Down and the US Proxy War on Drugs Unravels’ by Julian Borger, The Guardian, June 2, 2001.

Save

Save

Save

Save

Save

Save