PROMIS

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

The Z Factor III: The (Welfare) State and Surveillance

Israel is the country that has received more cumulative American aid than any other country since the end of World War II.”

–  ‘U.S. military aid to Israel exceeds $100 billion.’ Haaretz, 2014.


The financial ties between the U.S. and Israel represent an extraordinary long term policy in double standards and favouritism which has extended across successive administrations and stretched the idea of aid to its limits. For most members of Congress, let alone for most Americans, the sheer scale of this monetary support is not known, nor is the MSM keen to trumpet this caricature of expenditure.

Israel has been the beneficiary of aid totalling more than $84,854,827,200 from 1949–1997. This little state still receives $3 billion of US aid each year which is a truly staggering sum of money. Not bad for a country which comprises only 0.001 per cent of the world’s population and boasts a GNP higher than Egypt, Lebanon, Syria, Jordan and the West Bank and Gaza. The majority of this money has come from loan guarantees converted to grants with any outstanding loans “forgiven” by Congress, which is not a little insulting to Latin American and African countries still pounded by debt repayments keeping them in a state of perpetual economic subservience. [1]

Israel is a very special case, it seems. Other countries receive aid in quarterly instalments whereas Israel is fed its substantial booty at the beginning of the fiscal year. We must also include the annual $1.5 billion banquet from private U.S. funds in the form of tax deductible donations and Israeli bonds under the umbrella protection of a considerable number of powerful Jewish charities, a well-oiled process that once again sets an international precedent.

According to Richard Curtiss of the Washington Report on Middle East Affairs the total cost to the U.S. taxpayer has reached an astonishing 134.8 billion since 1949 not adjusted for inflation. Put another way, the 5.8 million Israelis received nearly $14,630 from the U.S. government by Oct. 31, 1997 which “… cost American taxpayers $23,240 per Israeli.” [2] Though Israel is one of the world’s smallest nations it is one of the richest. The latest figures show that American taxpayers are handing over away over $8 million per day into Israel’s coffers costing average Americans over $15 million per day. [3]

Economic researcher and teacher Thomas R. Stauffer produced an extensive June 2003 report entitled: “The Costs to American Taxpayers of the Israeli-Palestinian Conflict: $3 Trillion” published by The Washington Report on Middle East Affairs. Having taught at Harvard University and Georgetown University’s School of Foreign Service Stauffer is highly experienced in his field. His findings found that: “Total identifiable costs come to almost $3 trillion,” Stauffer says. “About 60 per cent, well over half, of those costs – about $1.7 trillion – arose from the U.S. defence of Israel, where most of that amount has been incurred since 1973.” Stauffer also stated that the support for Israel: “… comes to $1.8 trillion, including special trade advantages, preferential contracts, or aid buried in other accounts. In addition to the financial outlay, U.S. aid to Israel costs some 275,000 American jobs each year.” [4]


 The U.S. provides Israel $8.5 million* in military aid each day, while it gives the Palestinians $0** in military aid.

isrealaidgraph“Since the October War in 1973, Washington has provided Israel with a level of support dwarfing the amounts provided to any other state. It has been the largest annual recipient of direct U.S. economic and military assistance since 1976 and the largest total recipient since World War ll. Total direct U.S. aid to Israel amounts to well over $140 billion in 2003 dollars. Israel receives about $3 billion in direct foreign assistance each year, which is roughly one-fifth of America’s entire foreign aid budget. In per capita terms, the United States gives each Israeli a direct subsidy worth about $500 per year. This largesse is especially striking when one realizes that Israel is now a wealthy industrial state with a per capita income roughly equal to South Korea or Spain.”

— John J. Mearsheimer and Stephen M. Walt,“The Israel Lobby and U.S. Foreign Policy”– From: www.ifamericansknew.org


It is the powerful leverage of Jewish lobby organizations operating on behalf of Israel which command enormous funds which Congress meekly approves and never cuts. American Israel Public Affairs Committee (AIPAC) coordinates the campaigns for donations and has over a $15 million dollar budget and some 52 national Jewish charities from which to rally to the cause, some of whom appear to be adopting nothing more than a platform for denigration of all things Arabic spun at the edges with conciliatory platitudes. While a registered lobby for Israel, it does not have to register as a foreign lobby. Moreover, they can sit on every hearing in the US Congress that involves Middle Eastern issues which gives it a unique and exceptional advantage. As Jewish-American and anti-Zionist journalist Jeffrey Blankfort reminds us: “… they also write the legislation that Congress passes regarding the Middle East. For example, the recent ‘Syrian Accountability and Lebanese Sovereignty Restoration Act,’ which was passed a couple of years ago, and which lead to what we see in Lebanon and Syria today, was written by AIPAC which later bragged about it. It is not a secret. The only people that pretend they don’t know it is the Left.” [5]

Although Palestinians have received humanitarian and development assistance it has never received military aid unlike Israel which uses its enormous financial and military support to further undermine and erode the civil, cultural and human rights of Palestine people. The result is a perpetual human rights disaster in the in the occupied territories, though you would never believe it if you paid attention to the MSM in US and most of Europe which is generally heavily biased in favour of Israel.

American businessmen and Zionists also grabbed a slice of the neo-colonial pie under the shroud of “reconstruction” still taking place within the open wound of Iraq. One example comes from The Iraqi International Law Group (IILG) which was set up last July by Salem “Sam” Chalabi the nephew of the head of the Iraqi National Congress Ahmad Chalabi a Pentagon favourite and leading member of Iraq’s (read U.S.) governing council. Mr Marc Zell, who was a one time member of the Likud party and campaigned for Prime Minister Benjamin Netanyahu, has the onerous responsibility of finding Israeli/American companies to do business in Iraq. Zell, who has offices in Jerusalem and Washington ran a law practice with none other than Zio-Con Douglas Feith who was assigned the task of “reconstruction” in Iraq, a euphemism for assigning no-bid contracts to Anglo-American-Israeli corporations such as Halliburton and KBR Company. [6]

Zell has outspoken  views on the rights of settlers to occupy Palestinian land as well as promoting the idea of supplying Iraqi oil to Israel via a pipeline, something which the late Ariel Sharon was enthusiastically pursuing while visiting Iraq in 2005. Having extremely strong ties to the Pentagon before and after the invasion it comes as no surprise that Zell and others of his ilk represent a piece in an overall strategy of Israel to drain Iraq if its life-blood in more ways than one.

Biased business opportunities have nothing to do with establishing a cohesive and sustainable infra-structure, rather, this represents the future “glories” of capitalism and an open door to the basic ingredients of this form of extreme consumerism and MTV culture. A black market, mafia driven exploitation is thriving in Iraq. It was in 2005 that the new market for pornography really took off supplying the demand in some hastily revamped cinemas and living rooms of Iraqi citizens as one indication of Western alliance influences.  [7]

Big money pouring into Israel – particularly after the ransacking of Iraq – has meant Israel’s military capability has been enhanced to a significant degree, due in part, to illicit arms technology transfers and the sharing of weapons systems software technology. What is more economically incestuous is that much of the military aid to Israel is used to buy weapons from the U.S. and heavily subsidized by the same, thus furthering the demand for more weaponry in the Arab states. 80 per cent of arms to Arab countries is sourced from the U.S. (It is also true that many European arms manufacturers have been keen to provide weapons for Israeli, most notably the United Kingdom).

A prime example of stunning hypocrisy is evident from the U.S. Foreign Assistance Act which prohibits military assistance to any country “which engages in a consistent pattern of gross violations of internationally recognized human rights.” We can also include the Proxmire Amendment which bans military assistance to any government that refuses to sign the Nuclear Non-Proliferation Treaty and to allow inspections of its nuclear facilities. And here we have the U.S. happily flouting such laws with Israel continuing its own nuclear capability while crying foul against any other nation attempting to do the same.

Reports of the Israeli’s developing ethnic specific weaponry becomes less of a rumour and more of reality when we cast an eye over the 200 companies and corporations listed as “recipients for grants from U.S./Israel binominal foundations” at the Jewish Virtual Library (a division of American Israeli cooperative Enterprise). The text goes into a romantic, hand in hand explanation of the two countries with “shared value initiatives” and as “partners for change.” One may take a shrewd guess that the kind of “change” and “initiatives” are very different to the flowery image of participation and renewal depicted here.

The Israeli network within the US Government would suggest that American/Jewish interests are so intertwined that is hard to know just where America ends and Israel begins. Most of the American public are not remotely aware of how Zionist influence has infiltrated the American Establishment largely due to preferential immigration and the consequent embedded intelligence assets of varying degrees of importance. The Israel lobby now effectively directs American foreign policy via Zio-Conservatives and religious extremism. Its origin is in Revisionist Zionism whose principles were to take by force not only Palestine but to maintain political control by co-opting the politics of the Anglo-American Establishment and their media outlets.

Another less well known building block in the formation of political Zionist control in Britain and America was the Parushim (Hebrew word for ‘Pharisees’ and ‘separate,’) a secret fraternity founded around 1912 which grew out of the University of Harvard’s Menorah Society. “As the Harvard men spread out across the land in their professional pursuits, their interests in Zionism were kept alive by secretive exchanges and the trappings of a fraternal order. Each invited initiate underwent a solemn ceremony, swearing the oath ‘to guard and to obey and to keep secret the laws and the labor of the fellowship, its existence and its aims.’” [8]

The creator of the Parushim was Jewish American attorney Louis Brandeis, who was a close, personal friend of British Prime Minister Woodrow Wilson who became an ardent Zionist for the cause: “The members set about meeting people of influence here and there, casually, on a friendly basis. They planted suggestions for action to further the Zionist cause long before official government planners had come up with anything. For example, as early as November 1915, a leader of the Parushim went around suggesting that the British might gain some benefit from a former declaration in support of a Jewish national homeland in Palestine.”  [9]

From then on, the branches of influences have extended into the heart of the US administration federal agencies, media and “info-tainment” industries, exerting often obvious intimidation in the press and subtle control over content and narrative in the fields of entertainment. Academia often serves as gate-keepers for Zionist and Jewish interests. Psychologist and historian Kevin MacDonald commented on this point in his 2005 book The Culture of Critique where he states: “… ethnic Jews have a powerful influence in the American media-far larger than any other identifiable group. The extent of Jewish ownership and influence on the popular media in the United States is remarkable given the relatively small proportion of the population that is Jewish.” It would be a grave mistake to underestimate the slice of the social engineering pie that Zionists have carved out for their aggressive interests.  [10]

***

There appears to be an historical sharing of intelligence between the CIA and MOSSAD, from bio warfare to surveillance technology, though this alliance may be somewhat factional and very far from “cosy.” One category of this shared intelligence came under the little known name of PROMIS (Prosecutor’s Management Information System) developed by former employees of the National Security Agency (NSA) and now used by everyone (with suitable 21st Century enhancements). Its purpose was to track individuals pursued or prosecuted by the U.S. Justice Department by interfacing with other databases. Further modifications took place over the years via stolen copies and a complex web of interested parties with heavy links to chemical and bio weaponry production.

According to an Israeli operative Ari Ben-Menashe of the Israeli Defence Force (IDF) he had been personally involved in a multi-billion dollar arms deal between Iraq/Iran the purpose of which was to exacerbate tensions between the two countries. In 1987 Ben-Menashe claims to have attended a meeting in Tel Aviv where the CIA, NSA and the Defence Intelligence Agency (DIA) all used PROMIS and gave it to Israeli Intelligence. He further described that American operators had the key to back door access modifications carried out on now expanding bootleg versions of PROMIS. However, the most intriguing sign of “shared value interests” comes from Ben Menashe’s insistence that during the Reagan administration some officials had hoped to use Israelis to sell PROMIS to police and intelligence agencies globally.

In Ari Ben-Menashe’s memoir Profits of War (1992) he quotes Rafi Eitan the anti-terrorist advisor to Israel’s Prime minister during the eighties: “We can use this program to stamp out terrorism by keeping track of everyone. But not only that we can find out what our enemies know too.” This allowed Israelis to enter via a “back door” into any other intelligence agency network birthed initially by the NSA and no doubt being perfected still further within its catacombs.

In December 2001 Executive Intelligence Review reported on the suspicion that then Prime Minister Ariel Sharon had: “… dispatched special operations teams into North America…Portions of the funds garnered from the illegal operations according to sources, are funnelled to offshore bank accounts of the late Ariel Sharon. Some of these dirty funds were reportedly diverted to Sharon’s election campaigns. This Israeli mafia apparatus receives technical support with major American telephone companies and government law enforcement agencies.”  [11]

It is evident that telecommunications technology is part and parcel of Israeli business and covert operations which has been grafted onto a fertile ground for socio-cultural programming where Israel’s Statehood and Jewish victimisation have become an industry in its own right. This acts as a shield to applying any kind of objectivity and critical analysis to Israel’s role in global terrorism.

If we keep in mind the details of PROMIS and other hybrid spy systems of monitoring surveillance currently used by Israel it comes as no surprise that that corporate America and its media is effectively controlled from top to bottom by Zionist influences heavily populated with MOSSAD agents in every sector of American life. The advanced PROMIS system and others since developed which are more sophisticated (you only have to remember the Edward Snowden revelations) are being used to eavesdrop on ordinary Americans and those who have in the merest whisper of a “terrorist” connection as part of the “above board” U.S./Israeli joint intelligence venture.

Returning to the Israeli company Amdocs Inc., presently headed by Eli Gelman, it has rapidly evolved into the leading market provider for sub-contracted billing and directory services straddling 90 per cent of American phone companies. In 1997, Amdocs was implicated in the leaking of police phone data which in turn led to the collapse of an investigation into drug and credit card fraud – also with Israeli mob connections, a pattern which has occurred many times since with various Israeli-owned telecommunications and software companies firmly integrated into the US communications infrastructure. [12]It just so happens that Amdocs has “won” major deals over the years with American communications giants such as AT&T, one of the world leaders in data and voice communications with an annual turnover of $41 billion and serving over 40 million private clients. Additional deals followed. [12]

Israeli owned Comverse Infosystems was also had a cloud of suspicion hanging over its business dealings where versions of PROMIS may have surfaced within its applications but these companies have nonetheless surged ahead with lucrative trade deals and major investments from U.S. companies. According to the American-Israeli Chamber of Commerce South region E-newsletter: “… there has been a surge in demand for Israeli security products and expertise since the September 11th attacks. From gas masks to anthrax drugs to security training centers and information security, Israeli companies are taking advantage of the expertise they’ve developed over the years to respond to this world-wide crisis.” Since evidence has been found that Israel may have managed to slip agents into the telephone systems at the highest levels of U.S. Government, it is hardly surprising that US intelligence agents are becoming uneasy about the sanctioned presence of MOSSAD. [13]

For Spanish version: See La Verdad Nos Espera


Notes

[1] ‘A Conservative Estimate of Total Direct U.S. Aid to Israel: Almost $114 Billion’ By Shirl McArthur (It does not include money from the DOD and other agencies. Nor does it include estimated interest on the early disbursement of aid).
[2] By Richard H. Curtiss Former U.S. Foreign Service Officer Speech at the Al Hewar Center for Arab Culture and Dialogue May 20, 1998.
[3] Ibid.
[4] ‘The Costs to American Taxpayers of the Israeli-Palestinian Conflict: $3 Trillion’ By Thomas R. Stauffer, Ph.D. Washington Report on Middle East Affairs, June 2003. | http://www.ifamericansknew.org/stats/stauffer.html
[5] The Chomsky/Blankfort Polemic: ‘The anti-war movement has failed’ Interview with Jeffrey Blankfort by Silvia Cattori, Febuary 17, 2006.
[6] ‘Corporate oil giants scramble to plunder Iraq’s energy reserves’ By James Cogan. WSWS, 18 December 2007. / ‘They plundered Iraq for fun and profit’by Froma Harrop, The Seattle Times, July 26, 2006. See also “Iraq for Sale: The War Profiteers” by Robert Greenwald (2005). “Acclaimed director Robert Greenwald (Wal-Mart: The High Cost of Low Price, Outfoxed and Uncovered) takes you inside the lives of soldiers, truck drivers, widows and children who have been changed forever as a result of profiteering in the reconstruction of Iraq. Iraq for Sale uncovers the connections between private corporations making a killing in Iraq and the decision makers who allow them to do so.”
[7] ‘American freedoms bring porn to Baghdad’ AP, August 23, 2010.
[8] p.53; Israel in the Mind of America, by Peter Grose, New York: Knopf, 1984.
[9] Op. cit. Grose, (p. 54).
[10] The Culture of Critique: An Evolutionary Analysis of Jewish Involvement in Twentieth Century Intellectual and Political Movements, by Kevin MacDonald, Dept.of Psychology, California State University 1998, 2002 | ISBN: 0-7596-7221-0.
[11] ‘A Sharon spy network in the Americas?’ Executive Intelligence Review, December 13, 2001.
[12] ‘Is Israel Blackmailing America?’ By Mike Rivero | http://www.whatreallyhappened.com/
[13] ‘AT&T’ Market Watch |ww.marketwatch.com/investing/stock/t/financials | ‘U.S. Police and Intelligence Hit by Spy Network’ Charles R. Smith, Dec. 19, 2001, News Max.