security

Technocracy XI: Social (SMART) Grid and “Cognitive Infiltration”

“A really efficient totalitarian state would be one in which the all-powerful executive of political bosses and their army of managers control a population of slaves who do not have to be coerced, because they love their servitude.”

Aldous Huxley, Brave New World


thSocial networking websites like Facebook, Twitter, Tumblr, Yahoo! and others have offered new ways to chat, make friends, speed-date and keep in touch with family wherever you are. It has revolutionized information in ways which we are only just beginning to understand. The networks have become such a normal part of our daily lives in such a short time that it is only recently that serious questions about privacy and surveillance have filtered through to the MSM. But ethical questions are being left behind as the Information Age surges ahead. Indeed, if you don’t have a Facebook account then you have already consigned yourself to the hinterlands of suspicion and abnormality. According to some, this may even be a red-flag for suspected terrorist or paedophile. Such is the power of social networking websites on society and the ridiculous assumptions now circulating. [1] $billion companies like Twitter and Facebook have become the largest database on the global population, representing a free and easy resource for intelligence agencies to data-mine. With over 900 million active users it is not difficult to see how useful data catchment could be.

Growing awareness that social networks are being used by intelligence agencies to monitor citizens’ activities prompted cyber-consumer advocate Electronic Frontier foundation (EFF) to file requests in October 2009 to provide records about federal guidelines on the use of social networking sites for investigative or data-gathering purposes. Among other issues related to surveillance as discussed previously, they sued the CIA, the US Department of Defence, Department of Justice and three other government agencies for allegedly refusing to release information on their involvement in social networks. The cases are on-going.

There are so many dubious aspects to Facebook aside from its intelligence connections and origins it is hard to know where to start. We will pinpoint a few however.

The company makes no secret of is its drive to know everything about its members. It wants to extract and mine as much the data from them as is humanely possible and then make it available to all kinds of interested parties. The implications of their drive to happily make your social life – including information you might not ordinarily reveal – fully integrated into the net experience is of course, never discussed. Facebook has been busily creating “Shadow Profiles” in a bid to extract even more information. Using various functions on the software interface which encourages users to share personal data of other users and non-users of Facebook such as mobile phone synchronization, search queries, friend invitations, email-provider imports and instant messaging means that even if you don’t use Facebook you may have a profile nonetheless. [2]

Since Facebook is such a fan of being “social by default” then it shouldn’t be concerned when the tables are turned. Since Facebook revealed in 2012 that more than 83 million Facebook accounts (8.7% of total users) were fake accounts, ongoing controversies with privacy issues, class action lawsuits and litigation as well as the virtual ownership of members’ profiles, it is hardly surprising this was reflected in the stock value which dropped below $20 in the same year. [3]


th“You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”

– Facebook Terms of Service. (It has since been updated yet protests groups claim little has changed).


When independent software developer Pete Warden crawled all the data that Facebook’s privacy settings changes had made public, the company sued him. This occurred before the Open Graph API system which means they were planning to make the data publicly available anyway. As Vice President of Engineering at Border Stylo Dan Yoder comments: “Their real agenda is pretty clear: they don’t want their membership to know how much data is really available,” stating further: “It’s one thing to talk to developers about how great all this sharing is going to be; quite another to actually see what that means in the form of files anyone can download and load into MatLab.” [4]

In 2010, a Canadian security researcher Ron Bowes created a specific crawler script which he then used to take information from Facebook’s open access directory. He managed to download 2.8Gb of personal details including credit card numbers, account names, profile URLs and contact details; names of those users’ friends, (even with hidden profiles) and more intimate photos of over 100 million Facebook users. This cache of private information gold was then dumped on P2P file-sharing service BitTorrent, which was subsequently downloaded by scores of major corporations many hundreds of times. The point was not the relative ease by which such data was “stolen,” though this is an important issue, it was the fact that the data is already publicly available, provided Facebook members have not chosen to hide their profile from search results. [5]

As of 2012, there are now a raft of members, celebrities, underwriters and advertisers all taking a cut of Facebook profits. On the management board is co-founder and CEO Mark Zuckerberg with the largest ownership percentage of an individual at 28% (he is worth $33.1Billion) with co-founders Eduardo Saverin, Dustin Moskovitz, Sean Parker taking between 6-4%.  Venture capital company Accel Partners, Russian internet firm Mail du Ru take 10% repsectively and former PayPal CEO and venture capitalist Peter Thiel 3%. Thiel sums up Facebook’s history of double-dealing and entrepreneurship very well.

mark-zuckerbergCEO Mark Zuckerberg

The first lump sum from his venture capital funding amounted to $500,000 – a tidy sum no doubt drawn from his £3bn hedge fund Clarium Capital Management and a venture capital fund called Founders Fund. Thiel is the Author of an anti-multicultural missive The Diversity Myth and on the board of VanguardPAC a radical internet-based Neo-Conservative pressure group that was apparently set up to attack MoveOn.org, a left-liberal pressure group website. VanguardPAC’s mission is to “reshape America and the globe” according to Neo-Conservative values – the type of values which are still carving up the Middle East. Thiel is certainly not the shy and retiring type and promotes a New World Technocracy laced with transhumanist and right-wing conservatism. The Guardian’s Tom Hodgkinson summarises Thiel’s curious mélange of fascist views: “… since the 17th century, certain enlightened thinkers have been taking the world away from the old-fashioned nature-bound life, and here he quotes Thomas Hobbes’ famous characterisation of life as ‘nasty, brutish and short’, and towards a new virtual world where we have conquered nature. Value now exists in imaginary things.” [6]

pthiel1

Peter Thiel: Technocratic Neo-Conservative

From where did Theil obtain his inspiration? Stanford’s University’s René Girard and his mimetic theory that states all cultures and ancient societies were built on the victimisation and an eventual sacrifice of the innocent, even though they believed they were guilty. Mythology was used to legitimise and rationalise the fact that society was founded on violence. If Girard believes that people are sheep and will follow the one strongest in the herd then according to Hodgkinson:

“The theory would also seem to be proved correct in the case of Thiel’s virtual worlds: the desired object is irrelevant; all you need to know is that human beings will tend to move in flocks. Hence financial bubbles. Hence the enormous popularity of Facebook. Girard is a regular at Thiel’s intellectual soirees. What you don’t hear about in Thiel’s philosophy, by the way, are old-fashioned real-world concepts such as art, beauty, love, pleasure and truth.” [7]

Perhaps this is something that may be said for much of the neo-feudalist collectives currently infiltrating our social systems?

Consider the other board member of Facebook, Jim Breyer a partner in the venture capital firm Accel Partners who put $12.7m into Facebook in April 2005:

“…. On the board of such US giants as Wal-Mart and Marvel Entertainment, he is also a former chairman of the National Venture Capital Association (NVCA). Now these are the people who are really making things happen in America, because they invest in the new young talent, the Zuckerbergs and the like. Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which “identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions”. [8] [Emphasis mine]

With significant lobbying costs totalling over $41,000 in just one quarter of 2010 the focus of their expenditure was primarily intelligence agencies such as the Office of the Director of National Intelligence (DNI) and the Defence Intelligence Agency (DIA). It was the only internet company to do so out of Google, Amazon, eBay, Microsoft, Yahoo and Apple. The DNI is an umbrella office founded in the wake of 9/11 synthesizing intelligence from 17 agencies (including the CIA) and advises the President on privacy and federal cyber-security policy.

Which begs the question: Is Facebook lobbying merely to keep their operations free from interference for their Intel handlers?

Meanwhile, Facebook, Blogs, newspapers, radio TV channels, and internet chat rooms are poured over and monitored by the Open Source Centre or “vengeful librarians” – even the constant “tweets” from the Twitter network reaching over 5 million per day. Information is gathered by an army of analysts to find the low-down on the emotional level of a certain city demographic or whether a country is ready to be invaded or …”Democratised.”

facebooklogin1


 “Facebook is not your friend, it is a surveillance engine.”

– Richard Stallman, software freedom activist


It is now common knowledge that The U.S. Department of Homeland Security’s command centre monitors blogs, forums newsgroups and message boards on a daily basis. Scores of popular websites, including Twitter, Facebook, WikiLeaks, Hulu, and many alternative and left-leaning news sites also come under the umbrella of US surveillance.

Among the many examples that the Obama Administration has provided and which go above and the beyond the Neo-Conservative crimes of the Bush-Cheney cabal is President Obama’s regulatory Czar and legal scholar Cass Sunstein. Just before his appointment as Administrator of the White House Office of Information and Regulatory Affairs, this gentleman managed to add to the grand façade that is American democracy by writing a 30-page academic paper co-authored with Adrian Vermule entitled: “Conspiracy Theories.” In the paper he suggested the government should “infiltrate” social network websites, chat rooms and message boards. This “cognitive infiltration,” according to Sunstein, should be used to enforce a U.S. government ban on “conspiracy theorizing.” This ban would be imposed on such heresies as anti-anthropocentric global warming; the World Trade Centre attacks on 911 were an inside job; Al-Qaeda is a US government-created mercenary unit for hire and a range of other proven conspiracy facts, most of which feature on this blog. By “conspiracy theory” Sunstein defines it as “an effort to explain some event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Heaven forbid we should try to expose that …

And of course, Sunstein implies that that there are no conspiracies operating in government, banking and corporate activities and if you are one of the mentally deranged few that believe so, then medical help and a good psychologist is the only path open to you. It seems everyone is a potential extremist if you are aren’t giving the government a virtual back-rub. He further suggests: ““… a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity.” [9]

Cass SunsteinCass Sunstein 2011, (AP Photo)

Sunstein’s objective is to raise: “… doubts about their factual premises, causal logic or implications for political action,” which places a whole new angle on some of many trolls and trouble-makers who periodically appear on website forums to sow seeds of discontent in ways which follow distinct patterns of emotional programming indicative of paid disinformation agents. Indeed, PSYOPS targeting the web have been in operation for several years, possibly since the internet’s inception in some form or another.  Sunstein’s suggestions are merely an updating of the US Dept. Defence’s Information Operations Road Map of the future. [10]

To make sure such a future – and the mass mind – is firmly where it should be DARPA means to keep biometrics and the internet connected to the same port (which, one day soon, may be located at the back of our skulls). Pentagon scientists are helpfully creating a program to use biometrics as a platform for creating a “cognitive fingerprint” which would dispense with all those passwords building up in our little black books. Which means, according to their website: “… validating any potential new biometrics with empirical tests to ensure they would be effective in large scale deployments.” Named the Active Authorisation Program (AAP) it offers deep analysis of the user’s cognitive processes and thus their online behaviour in the hope of inventing new forms of biometrics so that your identity can be ascertained.

Parallel to this grateful assistance in making our lives so much more efficient and safe, online tech journal Security Ledger reported in April 2013 on one time hacker and DARPA’s cyber chief Peiter “Mudge” Zatko heading to Google Inc. Joining Google’s Motorola Mobility’s Advanced Technology & Projects (ATAP) group, it has a mission to deliver “breakthrough innovations to the company’s product line on seemingly impossible short time-frames.” While Microsoft continues to track users of the Windows phones which have a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and really any of the big internet companies. Google knows the password of every Android device (phone or tablet) which has ever logged on to a particular Wi-Fi network. (Android accounts for 79 per cent of phones shipped worldwide).

Business Insider’s article of August 14th, 2013 alerted us to the fact that if you are one of 400 million persons who chose Gmail then you can also expect no privacy at all. In a class action complaint of 2013 Google responded by claiming “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” So, be warned, even though it is unlikely you’ll be able to avoid Google even if you wanted to.

It seems Google and DARPA are courting each other for good reason.

 


Notes

[1] Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’ Daily Mail, 6 August 2012.
[2] ‘Facebook Is Building Shadow Profiles of Non-Users’ October 18 2011, http://www.slashdot.org
[3] “Facebook: About 83 million accounts are fake”. USA Today. August 3, 2012.
[4] ‘Top Ten Reasons You Should Quit Facebook’ by Dan Yoder http://www.gizmodo.com May 3 2010.
[5] ‘How 100 million Facebook users ended up in a list on BitTorrent’ Jemima Kiss, The Guardian, 29 July 2010.
[6] ‘With friends like these …’ by Tom Hodgkinson, The Guardian May 2010.
[7] Ibid.
[8] Ibid.
[9] ‘Conspiracy Theories’ by Cass R. Sunstein (Harvard Law School) and Adrian Vermeule (Harvard Law School) January 15, 2008, Harvard Public Law Working Paper No. 08-03, U of Chicago, Public Law Working Paper No. 199 U of Chicago Law & Economics, Olin Working Paper No. 387. [ During my own experience in working for several alternative news websites there was no question that persistent problems from site “trolls” on the relevant forums fell into this category. Some exhibited high knowledge on certain specialist subjects and exhibited a standard formula for contouring ideas and concepts which included the very same “cognitive infiltration” tactics cited by Sunstein and often in a highly elaborate form. Once “outed” they were gone but often the damage was already done].
[10] As part of the “Information Dominance” strategy of the Pentagon, ‘The Information Operation Road Map’ was a paper commissioned in 2003 and declassified in 2006. It was personally approved by the then Secretary of Defence Donald Rumsfeld. It included details of major PSYOPS disinformation campaigns to place false stories in newspapers and the internet as well as the kind of beginings of “cognitive infiltration” that Sunstein was so keen to see materialise.

Save

Advertisements

Technocracy III: Tagged (and Bagged?)

“The lessons learned from the adoption of other technologies suggest that radio frequency identification will be more important than anyone currently imagines.”

– Mark Roberti, founder and editor of RFID Journal


RFIDChip

© infrakshun

As American infrastructure crumbles under the weight of trillions of dollars of debt accumulated from largely illegal and spurious wars abroad, automation is biting further into the human labour market. Parallel advances in data-collection, surveillance and monitoring continue to build a “soft” police state, all of which must be paid for. New ways of fleecing the populace must be found which means we will be seeing more examples of SMART applications roll-out across a broad range of societal domains.

Hot on the heels of issuing digital licence plates in California, a little black box has made an appearance that will fit neatly by the dashboard of your car. An October 2013 Los Angeles Times report: ‘A black box in your car? Some see a source of tax revenue’ Evan Halper tell us: “The devices, which track every mile a motorist drives and transmit that information to bureaucrats, are at the center of a controversial attempt in Washington and state planning offices to overhaul the outdated system for funding America’s major roads.” The idea is to extract more money out of the hapless US citizen by allowing the government to keep track of the miles they drive in order to draw up yet another tax bill.

No doubt when this is integrated into “the internet of things” then every little iota of information about where you go and what you spend your money and who you decide to see will be factored in to the bill with increases, decreases and penalties and pluses accordingly. This initiative has its blessing from libertarians and lobbying from environmental groups. The former has a SMART techtopia informing its idealism while the latter sees Agenda 21 and sustainable development as the medium by which their own complimentary ecotopia can manifest. Despite protestations from the American Civil Liberties Union, both camps are blind to the undercurrents of Pathocracy in this context.

Keen to do its part for the SMART revolution the European Union has proposed a scheme which would see cars fitted with camera systems that ‘read’ the limits displayed on road signs and automatically apply the brakes. Supposedly in a bid to cut the number of deaths in car accidents the scheme labelled ‘Intelligent Speed Adaptation’ would use GPS satellites to transmit data to automatically limit the driver’s speed along with verbal computer commands to slow down. Or, according to The Telegraph’s September 2013 report: ‘EU plans to fit all cars with speed limiters,’ drivers can be given “… a warning of the speed limit, or their speed could be controlled automatically under the new measures.” [1]

RFID-TagsVariety of RFID retail tags

microchip1

The merging of SMART society and surveillance already has a formidable momentum in America. These examples are the tip of an emerging philosophy of data collection and surveillance which is making inroads into every facet of our once relatively free existence. For instance, just in case you were in any doubt that vaccinations are always a gift from God, registry systems have been set up to track your vaccination status so that you can continue to do as you’re told. Or perhaps you’ve come across the biometrics programs currently be tinkered with in US schools which will “… track students’ eye movements, monitor their conversations or even measure their smiles.” Turning the classroom into a tech-lab paradise of attentive drones is easy – and profitable. In the same month, online journal The Future Is Now ran an article entitled: ‘Biometrics Help Teachers Track Students’ Every Move.’ Sheila Dharmarajan writes: “When the student is looking up at the teacher, the teacher score goes up. If she looks down at the computer, the computer score goes up. So we’re tracking facial expressions. If she makes a smile, it might be indicative that is enthusiastic about the topic.” [2]

Ah, the simple world of binary perception …

But it isn’t only in the US. While the UK’s ID scheme has been temporarily jettisoned, other countries are pushing ahead. Journalist Katitza Rodriguez, writing for the Electronic Frontier Foundation on January 10, 2012 highlighted Argentina’s resurrected and mandatory National Registry of Persons (RENAPER) which had lain dormant from the era of military dictatorship. Facial recognition and finger-printing are part of a security-surveillance system which is about to be integrated into the Federal System of Biometric Identification (SIBIOS) used by existing police and military networks. The registration of new-born babies’ biometric information has taken place since 2012 with projections that the SIBOS database will reach over 40 million within the next two years.

In January 2012, all 1.2 billion residents of India were the lucky beneficiaries of a nationwide program overseeing the allocation of a Unique Identification Number (UID). Each number will be fixed to the biometric data of the recipient utilizing using three different modes of information detection: fingerprints, iris scans, and face recognition. The implementation of RFID (radio-frequency identification) is the next stage for India’s flourishing biometric industry.

RFID stands for “Radio Frequency Identification”. With the advent of Wi-Fi and SMART applications the platform for RFID is expanding to include SMART labels for consumer products, assest tracking, secuirity and data retrieval for business. Then we have the more invasive tagging  with computer chips implanted into physical objects, animals, livestock and human beings. The Electronic Product Code that lies within the chip can be “read” when the device emits a radio signal. The chips contain electronically stored information which can be read up to several meters away. Active tags are self-powered and have a long range, particularly useful for surveillance. Passive tags are without battery source and use a local power source, the range being variable.

Some Christians have long been frothing at the mouth at the prospect of micro-chipping and what they consider to be the proverbial “Mark of the Beast” from The Book of Revelations, without which: “no man might buy or sell save he that had the Mark.” To be fair, it does sound remarkably similar. The Association for Automatic Identification and Mobility (AIM) sees biometric identification in true technocratic form where federal, state, local governments, military and commercial applications should join together and embrace the SMART culture without a care in the world. According to AIM, the RFID-chipped “SMART cards” and the biometric revolution “are set to pervade nearly all aspects of the economy and our daily lives.”  [3]The selling pitch goes like this: The tagging of products from razor blades to underwear represents enormous benefits to consumers, protecting us against fraud and theft as well as providing cost reduction and convenience. What could be simpler? And because it is so simple and so convenient given the fast-paced nature of our modern society, doesn’t it make sense to get yourself tagged too? Efficiency, efficiency and more efficiency …

As a precursor to this we have contactless technology being pushed by companies such as Google, with the majority of mobile network companies getting in on the act because data – your data – is king. Disney’s electronic “MagicBand” illustrates why. In the summer of 2013, the Disney corporation announced the use of an electronic wristband for all visitors to its theme parks. First introduced at Disney World in Florida it can be used at rides, hotel doors, stores and allow Disney staff to greet you using your first name. Who needs a wallet when everything is done for you? The downside to this of course, is a marketing coup d’état where Disney will be able to track what you purchased, which stores you visited, which rides you enjoyed and when, at which hotel you stayed and a vast collection of data to provide valuable insights into social psychology of visitors.

So, what’s a little data between friends and theme parks? Quite a lot actually.

RFID_Wristband_braceletmickeyRFID Tracking bracelets for amusement parks, hospitals and children’s playgrounds. It’s all good clean fun kids!

If you really want to take technology to the heights of efficiency in order to go about your business without a care in the world then your very heart might offer the ultimate hub for hands-free, contactless connection to the New Synthetic World. Canadian biometric company Bionym introduced us to the unnerving offer that: ”Your pulse could be your new Password.” Indeed, every number and code that you currently use to live your life could be distant memory if people such as Bionym chief executive officer Karl Martin has his way. “Pulse passwords” could be the new ultra-convenience. [4]

The heart has unique characteristics relating to size, position and physiology so those clever bods at Bionym have developed a wristband which recognises the pattern of an individual pulse. The transmission of information allows the user to carry out all the usual transactions and internet-based activities which require a password. And it also pleases those worried about security as heartbeats cannot be replicated. Furthermore, as every heartbeat is unique, should the wristband become lost or stolen, it would not function for another user. And on the market in 2014 at $100 many will see the benefits of such an appendage.

Tattoos used to be a tribal marking of religious or sacred significance. In Western culture gangs, dockers and truckers were some of the groups who took to marking themselves to tell their peers who they were and what they’d been through. Now, tattoos are big business and a fashion statement for the young. As luck would have it, electronic tattoos are now appearing from telecommunications companies like Motorola who are working on a version that contains a computer chip and an antenna. Just to give us an idea what to expect in the new future to complement these tattoos there is also: “A pill that dissolves and turns the entire body into a transmitter …” If they can be used to replace all those dozens of pesky passwords then there is money to be made and an interaction with the internet of things (IOT).

We will not need to identify ourselves because we will be integrated into the system.

As discussed previously, Mike Orcutt’s March 2013 article for MIT Technology Review explored John Roger’s work as a materials scientist at the University of Illinois at Urbana-Champaign. He is one of those experimenting with “epidermal electronics” where applications can be printed directly onto the skin. Rogers tells us that these new devices will be very useful to the medical industry and explains: “You can use a rubber stamp to just deliver the ultrathin mesh electronics directly to the surface of the skin.” And by using “spray-on bandage” products a thin protective layer acts to “… bond the system to the skin in a ‘very robust way.’”

Smart-skin-1Back in November 2003, The Privacy Rights Clearinghouse – a non-profit, grant-supported advocacy and consultancy organisation for consumer awareness – had already produced the “Position Statement on the Use of RFID on Consumer Products.” In the study, they concluded the following:

  • Hidden placement of tags. RFID tags can be embedded into/onto objects and documents without the knowledge of the individual who obtains those items. As radio waves travel easily and silently through fabric, plastic, and other materials, it is possible to read RFID tags sewn into clothing or affixed to objects contained in purses, shopping bags, suitcases, and more.
  • Unique identifiers for all objects worldwide. The Electronic Product Code potentially enables every object on earth to have its own unique ID. The use of unique ID numbers could lead to the creation of a global item registration system in which every physical object is identified and linked to its purchaser or owner at the point of sale or transfer.
  • Massive data aggregation. RFID deployment requires the creation of massive databases containing unique tag data. These records could be linked with personal identifying data, especially as computer memory and processing capacities expand.
  • Hidden readers. Tags can be read from a distance, not restricted to line of sight, by readers that can be incorporated invisibly into nearly any environment where human beings or items congregate. RFID readers have already been experimentally embedded into floor tiles, woven into carpeting and floor mats, hidden in doorways, and seamlessly incorporated into retail shelving and counters, making it virtually impossible for a consumer to know when or if he or she was being “scanned.”
  • Individual tracking and profiling. If personal identity were linked with unique RFID tag numbers, individuals could be profiled and tracked without their knowledge or consent. For example, a tag embedded in a shoe could serve as a de facto identifier for the person wearing it. Even if item-level information remains generic, identifying items people wear or carry could associate them with, for example, particular events like political rallies. [5]

Not that these warnings have made a whole lot of difference to the momentum of such technology.

American and European governments’ expenditure of billions of taxpayer’s money on creating these new systems “for our protection” is unjustified for a multitude of reasons. One of these shows how particularly ridiculous the whole scenario really is. If someone wishes to read the biometric information from our passport, driving licence or ID card they need only to purchase a reader device and scan the information without the individual ever knowing. Of course, the government and their spooks have been extracting information in a similar fashion from so called “secure” systems of information for decades. As outsourcing of the state to private companies is becomes the norm, it is hardly likely that governments could stem the tide of information theft should they even want to.

In February 2007, the electronics corporation Hitachi proudly revealed the development and successful testing of the world’s smallest and thinnest class of “non-contact RFID Powder IC (integrated circuit) Chip.” It measures just 0.05 x 0.05 millimetres, which is about the size of a pin-head or less. We read on their website in a Research & Development report that their aim is: “… to embed the chip in thin paper, a practice that is already in general use,” informing us that: “These technologies are expected to be seen in a wider range of applications.” [6]

In 2015 this became a reality. The chips have a 128-bit ROM for storing a unique 38 digit number and can indeed be worked into any product at all. Since these chips are “already in use” it begs the question: what other applications are they thinking about? The military surveillance uses are well ahead of the consumer game. As one writer on the chips mused: “… suppose you participated in some sort of protest or other organized activity. If police agencies sprinkled these tags around, every individual could be tracked and later identified at leisure, with powerful enough tag scanners.” [7]

This echoes trans-national corporation IBM and their business relationship with Nazi Germany’s Third Reich in the 1930s and their subsequent collaboration during World War II. Investigative journalist and author Edwin Black explained how IBM’s technology helped facilitate Nazi genocide against Jews and other undesirables through the creation and tabulation of punch cards based upon national census data. Aside from administrative and logistical support, IBM machines were used in concentration camps. Many prisoners had their details passed through the Labour Assignment Office and assigned a characteristic five-digit IBM Hollerith machine number, 44673. This five-digit number in the punch card system was designed to track prisoners in the camps, most notably the slave labour camp at Auschwitz. The number was the precursor to the numerical tattoo stamped upon the arm of an individual and deemed more cost-effective and efficient.

ibmachineIBM Hollerith Card Processing Machine used by the Nazis circa 1940s

There is no doubt that the targeted identification of Jews and other racial groupings for: “… asset confiscation, ghettoisation, deportation, and ultimately extermination” took place in a way that is logistically and insanely ambitious. The Nazis were able to kill as many as they did with the help of IBM’s pioneering computer work which required: “… generations of communal, church, and governmental records all across Germany—and later throughout Europe—[to be cross-indexed] a task so monumental, it called for a computer. But in 1933, no computer existed.” [8] That’s where IBM came in. And its legacy for number crunching computation has remained, the profits of its participation in the logistical side of the holocaust having kept it afloat for all these years.

So, what has IBM been up to recently?

Harking back to their darker history, the corporation has finished patenting their “Identification and Tracking of Persons Using RFID-Tagged Items in Store Environments.” Security and Privacy analyst Katherine Albrecht, founder of the consumer pressure group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) writes about RFID’s potential for surveillance: “… where networked RFID readers called ‘person tracking units’ would be incorporated virtually everywhere people go – in “shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, restrooms, sports arenas, libraries, theaters, museums, to closely monitor people’s movements.”

You can already see the acclimatisation taking place with i-phone apps scanning capabilities in billboard ads in bus shelters and shopping malls. When RFID tag scanners are located in the required locations, they scan the RIFID tags on a person. Albrecht continues: “As that person moves around the store, different RFID tag scanners located throughout the store can pick up radio signals from the RFID tags carried on that person and the movement of that person is tracked based on these detections … The person tracking unit may keep records of different locations where the person has visited, as well as the visitation times.” What is more, if personal data does not register on the tag, no problem, IBM tells us: “the personal information will be obtained when the person uses his or her credit card, bank card, shopper card or the like.” [9] Which means a person’s unique RFID number and his or her identity will merge into the overall techno-identity of our SMART society.

Although slower than the technocrats would like, the implantation of RFID’s in the global population is making progress. Alongside marketing tattoos a much vaunted fashion statement, another method of gradualism was to implant pets and farmyard animals as part of an agribusiness efficiency and as a prelude to human implantation.

In January 2007 Business Week reported on the Federal mandated National Animal Identification System (NAIS) and their desire to digitally tag “… 40 million farm animals to enable regulators to track and respond quickly to disease, bioterrorism, and other calamities.” The report rightly highlights the fears of the more informed which it summarises thusly: “You test it on the animals first, demonstrating the viability of the radio frequency identification devices (RFIDs) to monitor each and every animal’s movements and health history from birth to death, and then move on to people.”  The report mentions the ambitions of one Scott Silverman who runs a: “… company that sells the rice-size people chips, which are the only ones with Food & Drug Administration (FDA) approval, for implantation in an individual’s right biceps. They carry an identity marker that would be linked to medical records. His goal is to create ‘the first RFID company for people.’” [10] More from Mr. Silverman presently.

cow1© infrakshun

Things have progressed since 2007 and we can now see implementation of Bluetooth, Wi-Fi and RFID chips in a fusion of agribusiness and SMART technology called by French technocrats as “SMART Agrimatics”. A paper hot of the press at the time of writing is about as innovative as you are going to get on the subject of agribusiness and technocracy. The culmination of a pilot project research, it involves the application and use of RFID tags for “ruminants” (cows, sheep and goats to you and me) the studies of which were conducted between 2005 and 2010. This includes discussions on the relevant use of RFID; use of RFID for feeding automates on farm; use of RFID for performances control; use of RFID for animal trade; use of RFID for slaughter chain and supervision for RFID devices.

The paper reads like a machine mind designing for another machine mind, except there are – inconveniently it seems – sentient beings involved. For the farmer scratching his head as to whether he is a human being raising animals or an engineer maintaining “automated consumption units” and keen to make the leap to SMART-Agrimatics, then obviously this dossier would be invaluable for setting his mind straight – one way or another.

With “ear-tag and detection cell” and “fixed readers integrated in the environment” agri-business and GM technology are well placed to maximize their efficiency ratios. Once all cattle have been tagged logged and every aspect of their cellular structure analysed then the collection and transfer of said data can be uploaded to the national database “… the weight linked to the official animal identification number from RFID reading.” [11] Driven by economic incentives and inventory control, larger farms all over Europe and the US are signing on to RFID.

Now, how would that play out for humans?

If we were learn from automated factory farming and now SMART-Agrimatics, the key term here, once again, is efficiency.

How does one maximize the efficiency in automated methods of keeping an awakening population asleep to a minority of psychopaths?  The technocratic, sensual and pharmaceutical amusements of Huxley’s Brave New World should give you some idea. The following picture from the above report might easily apply to the “sheep” in the human population who believe in the authoritarian structures they have grown up with. Wolves come in many disguises.

clip_image002.gif“The Future Sheeple?”

Over in the UK, after a series of well reported dangerous dog attacks new legislation has gone ahead that forces dog owners to pay between £20 – £30 to have a RFID chip injected under the skin of their pooch while still a puppy. As one animal welfare spokesman mentioned: “It’s not so much the dogs that should be targeted, but the owners who train them to be vicious.” (A metaphor for psychopaths and their societies perhaps?) Implantation of RFIDs has predominantly taken place within security firms, the military and various dance clubs in European countries whose clientele find it convenient to speed their entry. These are the voluntary lab-rats.

The Verichip Corporation and their various subsidiaries has been one of the leaders in RFID technology with their flagship product the Verichip ™ manufactured by Digital Angel. PositiveID, a developer of medical technologies for diabetes management, clinical diagnostics and bio-threat detection is the company that uses its patented VeriPay system where the chip can be used like a credit card to authorise financial transactions. It is currently being used by the Baja Beach Club in Spain to the delight of many happy party goers.

PositiveID-logo

The Verichip was initially foreseen as a device for retrieving medical records, having received FDA approval for medical use in 2004. But the vision was never designed to stop there. The size of a grain of rice it is easily implanted just under the skin in the arm or hand so that the device can monitor human biometric functions and transmit the data with GPS technology. Thousands of Mexicans have since been implanted, from law enforcement workers to ordinary citizens. The latter are doing so in increasing numbers due to a 317 per cent rise in kidnappings, 20 per cent of which has involved corrupt police officers. Many US companies are dubious that the chips actually work in combination with GPS devices but payments of up $2000 are being handed over nonetheless. One slight wrinkle in the chip means that confirmation of identity can only be confirmed when the body has been found. [12]

Currently in talks with the Pentagon to implant Verichip into all 1.4 million US soldiers, PositiveID has also been delighted to receive bulk orders from the Israeli military not wishing to be left out of technocratic party. Marc Poulshock, PositiveID’s Vice President of Business Development, said: “We believe there are many important applications for the VeriChip and our associated intellectual property including next-generation identification and bio-sensing capabilities. Our partner is looking to help healthcare organizations, militaries including the IDF, and governments with their disaster preparedness and emergency response needs.” [13]

VeriCorp insists that the Verichip is very difficult to steal despite two hackers showing just how easy it really was to steal a person’s identity via the RFID. Annalee Newitz and Jonathan Westhues gave a special demonstration at the HOPE Number Six conference in New York City in July 2008. Newitz had the VeriChip RFID implanted in her right arm. Westhues then proceeded to clone the chip by reading Newitz’s arm with an RFID reader, scanning it with a homemade antenna connected to his laptop which recorded the signal from the chip. Finally, he used the same RFID reader to obtain the signal from his laptop, which then gave Newitz’s “unique” ID. Verichip had no comment to make other than they had been too busy to look at their evidence.

That hasn’t prevented the idea that new-borns should be protected from nefarious activities of the public. Ronald Kane, Vice President of CUBIC Corp., a major manufacturer of implantable chips, while discussing the profit margins on RFID tags enthusiastically stated: “If we had our way, we’d implant a chip behind everyone’s ear in the maternity ward.” [14]

According to RFID News Student ID cards equipped with RFID chips are becoming more common sight on schools and college campuses. Education officials are “… adopting RFID technology to track everything from student attendance to valuable assets.” [15]It is part of a wide-ranging rollout of SMART technology including Iris recognition software and cameras which monitor the emotional states of students, both of which have caused considerable controversy, not least at the idea of turning schools into virtual prisons.

A similar efficiency-ratio mentality is being employed in business training software offered by online technology company Mindflash. FocusAssist is a new feature designed for i-Pad which tracks the user’s eye movements via the tablet’s on-board camera. When you’ve looked away for several seconds the course is paused. This apparently forces you to pay attention so that you can finish the assignment. One wonders how long it will be before computers are teaching children and adopting a similar attention mechanism.

The contradictions and double-speak that are on display from the Verichip advocates is quite a show. The US Food and Drug Administration (FDA) gave a 2002 ruling that that: “VeriChip is not a regulated device with regard to its security, financial, personal identification/safety applications … VeriChip’s healthcare information applications are subject to regulation by the FDA in the United States.’ As author and journalist Uri Dowbenko mentions: “It’s OK if the VeriChip tracks your credit report history, but not OK if it’s used to inform doctors you’re diabetic? This will undoubtedly be used as an argument to justify the VeriChip as a so-called ‘medical device’ in the future.” [16]

verichipmicrochip / verichip ™

The stages which the RFID tags have followed have moved through: pets = cattle = criminals = military = business workers towards the longer more drawn out process of finally chipping the mass population. Biometric passports, national ID cards and then gracefully having your palm over the supermarket scanner will make things so easy! So easy in fact, that perception management will tell you the next logical step in this New World of SMART design is to be “SMART” yourself and integrate your body into the system, and then you will be “free.” Notwithstanding the potency of such an illusion, there is another problem. Verichip and other companies love to tell us about the medical and community benefits of tagging which include the monitoring of heart troubles, children safety, pet protection and the like, what of the health issues related to RFID tags?

In 2007 the Verichip Corporation and other related companies were dealt a severe blow to their credibility when Katherine Albrecht’s CASPIAN consumer pressure group released a 48-page paper entitled “Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006”. Based on a dense review of academic research on the subject, the causal link between implanted radio-frequency (RFID) microchip transponders and cancer in laboratory rodents and dogs could not be clearer. Dr. Robert Benezra, head of the Cancer Biology Genetics Program at the Memorial Sloan-Kettering Cancer Centre in New York, said: “There’s no way in the world, having read this information, that I would have one of those chips implanted in my skin, or in one of my family members.” Given the preliminary animal data it looks to me that there is definitely cause for concern.” [17]

CEO and Chairman of Verichip Corporation Scott R. Silverman played his part in a disinformation campaign launched by RFID companies in response to the findings. Silverman is quoted in a Time article as saying that in the “… second study, conducted in France in 2006, two years after VeriChip’s FDA application was approved, found that while 4 per cent of the 1,260 mice in the study developed tumors, none of them were malignant.” [18]The truth is a little different. The tumours were indeed malignant sarcomas and most of the animals in question died prematurely as a result of the microchip-associated tumours. Destron Fearing, makers of the HomeAgain pet implant came in a close second when they ignored a finding of fibrosarcoma – a highly lethal cancer – as “benign” in a recent report. Katherine Albrecht stated: “Either VeriChip and the makers of HomeAgain actually don’t understand the difference between a benign fibroma and a malignant fibrosarcoma, or they’re deliberately lying to the public. Either way, it’s clear they can’t be trusted. We hope our new report will set the record straight.” [19]

Despite this, Silverman was correct in that overall, the incidences of cancer in dogs after over 10 million injections is relatively small, which means that this scare is not enough to put off either the medical establishment, security companies and the potential benefits to consumers in a variety of social situations.

russo-nick-rockefellerAaron Russo (left) and Nicholas Rockefeller

“The goal is to get everyone in this world chipped with this RFID chip and have all money and information be on these chips. And if anyone wants to protest what we do or violate what we want, we just turn off their chip.”

From Russo’s film: America: Freedom to Fascism


The above quote is lifted from the late Hollywood producer and film-maker Aaron Russo’s now classic America: Freedom to Fascism (2006) in which he details a conversation he had with also now deceased California Attorney Nicholas Rockefeller. Russo, who was frequently around the elite and their antics and was rather bemused by their beliefs asked Rockefeller:  “… what’s the point of all this,” …“you have all the money in the world you need, you have all the power you need, what’s the point, what’s the end goal?” The answer was the above quote. Does it sound too hackneyed and outrageous? Watch the film to discover more of Russo’s discoveries. Made almost ten years ago, one realises what a warning this film truly was.

This brings us back to the National Security State; the various World State advocates that would like to see the global population “culled” and the war on terror tool that has allowed a technocratic Police State infrastructure to rise up virtually unopposed. When SMART, surveillance society arrives on the back of a few more mini-911-type scenarios, there may come a stage where, if you want to eat, you must acquire a chip. It’s a logical step that once mass acceptance of RFID tagging has gradually taken place anyone that is deemed a “terrorist”, “subversive” or merely suspiciously expressing a “radical” opinion on Facebook can be easily tracked and controlled. (See Police State Amerika I: Facebook Thought Police). The next step from targeting dissidents is the expansion of powers to include a wide range of groups or organisations that come under the vague and nebulous definitions of terrorism. Everything that doesn’t fit into that SMART design will be well … switched off.

Technocracy is essential to the smooth running of the Elite-collectivist model and as we have seen so far in this series, the younger generations are the primary targets for social engineering. With a sizable marketing drive underway headed by the Verichip slogan: “Get chipped,” RFID tags are being marketed as chic and trendy, cool and desirable. If the recent surge in tattoos is anything to go by, the microchip might be the next fashion statement for those too young (or programmed) to have awareness of the implications.

Despite loud mutterings of discontent in the US and the European Union the advances in SMART tech will not be going away. Ideologically driven technology and enormous amounts of money to be made will mean that regulations are unlikely to be enforced. The health hazards of mobile phone use and GMOs are well known but we still use them because society itself is being redesigned to make life unlivable without them. It seems we are no longer human beings but living bar-codes programmed to proffer feedback loops of data in a vast auto-matrix of supply and demand. It should come as no surprise that corporations and their governments are seeking ways to extract more profits from the New Technological Order that is rising up from the shopping mall.

See also: They’re Spending Billions to Chip Our Brains


Notes

[1] ‘EU plans to fit all cars with speed limiters’ By Claire Carter, The Telegraph, Sep 2013.
[2] ‘Biometrics Help Teachers Track Students’ Every Move’ By Sheila Dharmarajan, The Future Is Now,September 17, 2013.
[3] aimglobal.org
[4] http://www.privacyrights.org/
[5] ‘Seen At 11: Getting Personal – Your Pulse Could Be Your New Password’ Pin Numbers, Credit Cards, And Passwords Could Soon Be A Thing Of The Past, CBS News, September 16, 2013.
[6]‘Operation of World’s Smallest Class Noncontact RFID Powder IC Chip Successfully Tested’ hitachi.com 2008/2009 Research & Development paper: http://www.hitachi.com/rev/archive/2008/__icsFiles/afieldfile/2008/07/24/r2008_technology_rd.pdf
[7] ‘RFID ‘Powder’ – World’s Smallest RFID Tag’ by Bill Christensen, technovelgy.com February 14, 2007.
[8] IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America’s Most Powerful Corporation. By Edwin Black, Second paperback edition. Washington, DC: Dialog Press, 2009; (introduction).
[9] ‘How RFID Tags Could Be Used to Track Unsuspecting People’ by Katherine Albrecht, Scientific American, August 21, 2008.
[10] Animal Tags for People? by David E. Gumpert, Business Week, January 11, 2007.
[11] ‘Conclusions from the French pilot projects for the use of RFID for ruminants’ by the Institut de l’élevage-France Louise Marguin, Marion Dang. June 14, 2012. | http://www.smartagrimatics.eu/Portals/66/Smartpercent20AgriMaticspercent205_3_RFID_Paris_2012-MD.pdf
[12] ‘Thousands of Mexicans Implanting Tracking Devices- But experts say they are not likely to work’By Evann Gastaldo, newser.com, Aug 22, 2011.
[13] ‘positiveID Corporation Receives VeriChip Order for Use With Israeli Military’ MarketWatch, October 11, 2011.
[12] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997.
[14] ‘Schools add RFID tagging to student IDs’ RFID News / CR80 News June 18 2012.
[15] ‘VeriChip: RFID Microchip Implants for Humans’ by Uri Dowbenko, conspiracyplanet.com
[16] ‘Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006’ by Katherine Albrecht, Ed.D. November 19, 2007.
[17] ‘Are Microchip Tags Safe?’ By Siobhan Morrissey Time Magazine, http://www.time.com, Oct. 18, 2007.
[18] ‘CASPIAN Releases Microchip Cancer Report’ antichips.com November 19 2007.
[19] op.cit Albrecht

Outsourcing Abuse II: Dyncorp Revealed

By M.K. Styllinski

“The people of DynCorp International (DI) leverage our global presence and reach, international business experience, language capabilities, and deep cultural understanding to benefit every mission. We provide the highest level of professional intelligence training, collection and analysis, and mission support to meet the intelligence needs of our customers. The team also delivers flexible and rapidly-deployable, integrated security solutions to suit any situation in any part of the world.”

– Dyncorp International  


The above quote can be summarised in a sentence: “We outsource American Empire”. And of course, since the Establishment in America is concerned with invading and stealing other nation’s resources under the pretext of democratic intervention, then it stands to reason that what “needs” Dyncorp is delivering to their “intelligence customers” is simply more of the same morally bankrupt dynamics employed by the World state psychopaths in power. I’m quite sure their “deep cultural understanding” helps intel operatives enormously as they find new ways to extend their reach.

Outsourcing and private security contracts have boomed over the last decade. The United Nations isn’t the only Establishment organisation to have suffered from the effects of institutional sexual abuse and expanded these pathologies via outsourced channels. A cross fertilization is taking place between Private securities companies (private armies) prisons, the military and intelligence agencies.

A revealing January 2002 article by Insight magazine’s Kelly Patricia O’Meara (below) was followed up in November of the same year with The Guardian’s piece on the American defence and security contractor DynCorp. This opend the proverbial can of beans…The corporation had branches in Salisbury, UK and dealt with the contracts of American officers working for the international police force in Bosnia. Dyncorp unfairly dismissed Kathryn Bolkovac, a UN police officer for reporting colleagues involved in the Bosnian sex trade and threatening their “lucrative contact” to supply officers to the UN mission. According to the report: “UN peacekeepers went to nightclubs where girls as young as 15 were forced to dance naked and have sex with customers, and those UN personnel and international aid workers were linked to prostitution rings in the Balkans. The employment tribunal accepted that Ms Bolkovac, an American who was employed by DynCorp and contracted to the UN, had been dismissed for whistle blowing.” [1]

dyncorp

‘US: DynCorp Disgrace’ by Kelly Patricia O’Meara, Insight Magazine January 14th, 2002

DynCorp had the contract to provide police officers for the 2,100-member UN international police task force in Bosnia which was supposedly created to restore law and order after the civil war. In the British tribunal Ms Bolkovac’s evidence highlighted the underground sex trade that was “thriving among the 21,000 NATO peacekeepers and thousands of international bureaucrats and aid workers” and that still remains one of the most extensive trades in the world. [2]

Dyncorp forged documents, trafficked women, aided illegal cross-border transports and tipped off sex club owners about imminent raids. Bolkovac also described how UN police, NATO troops and humanitarian, NGO employees were “regular customers.” [3] Bolkovac uncovered evidence “of girls being beaten and raped in bars by their pimps while peacekeepers stood and watched.” Even one UN policeman who was meant to be investigating the sex trade: “paid £700 to a bar owner for an underage girl who he kept captive in his apartment to use in his own prostitution racket.”[4] Ultimately, the company fired the eight employees for their alleged involvement in sex trafficking and illegal arms deals. Madeleine Rees, the head of the UN Human Rights Commission office in Sarajevo, was:  “… in no doubt that trafficking in women started with the arrival of the international peacekeepers in 1992.” [5]

Again we find that where sexual abuse is occurring the police are not far behind and unfortunately on the wrong side of the law. After a two year battle at an employment tribunal court, testimony was heard that one of the most senior UN officials Dennis Laducer, Deputy Commissioner of the International Police Task Force, was found to attending one of the most notorious brothels. He was subsequently sacked and Kathryn Bolkovac finally awarded $110.000 [some reports say $173,000] in 2002, with DynCorp forced to foot the bill. [6] Inspired by the story of Bolkovac, The Whistleblower hit the cinemas in 2010. Directed by Larysa Kondracki, written by Eilis Kirwan and Kondracki with Rachel Weisz playing Bolkovac, the film is a largely fictionalised dramatization of Bolkovac’s experiences in Bosnia though with enough mixing of fact and fiction to lend teeth to the film’s central premise: that sex trafficking, rape and murder took place under the eyes of the UN and with active involvement of an outsourced security firm Dyncorp (given the moniker “DemocraCorp” in the film). The end result is a motion picture which does an admirable job of raising awareness of the problem despite senior UN officials’ attempts to belittle it and play down the facts upon which the film is based. Similarly, rather than paying attention to one woman’s courage and the appalling suffering she brought to the world’s attention, the UN allowed the shutting down of anti-trafficking initiatives by its own gender affairs chief in Bosnia even though it was deemed to be producing tangible results. The chief in question Madeline Rees was then fired by the UN for “poor performance” but took her case to a UN disputes tribunal and won.  She is now General Secretary for the Women’s International League for Peace and Freedom.

Kathryn Bolkovac

Former police investigator Kathryn Bolkovac. | http://www.bolkovac.com/

One of Bolkovac’s allies during the ordeal and played by Vanessa Redgrave in the film, Rees had been the UN Officer for gender issues for many years and supported her attempts to raise awareness of what was taking place under the cover of UN humanitarian aid. Rees commented:  “I went to work with large numbers of women who had been the victims of rape during the war but I ended up working as much with women who were being trafficked and raped by soldiers and police officers sent to keep the peace.” [7]  She described the mechanisms by which such crimes and corruption was able to take place:

“Countries get rated by the US Trafficking in Persons report on their records in dealing with trafficking, for which you need to show results. If you don’t prosecute or repatriate enough people, your rating is downgraded, thereby your financial support. So when there were raids, the girls would be shipped home to Ukraine or wherever, probably to be retrafficked. It was a repatriation factory, run by people who had an anti-immigration approach, and didn’t want women to try to get into western Europe – no focus on the system or rights of the women. Our approach, by contrast, was slow and beginning to work, so it had to be killed off.” [8]

The Whistleblower

DVD and Poster promotion for The WhistleBlower

Former General Secretary Kofi Annan and successor Ban Ki-moon are fond of promoting the idea that these crimes are a result of a “few rotten apples” rather than the obvious endemic and systematic effects of a much deeper malaise. As Rees points out regarding the UN hierarchy: “They have to understand that this outrageous practice is endemic in the male hegemony of a militarised environment – it’s part of locker-room bravado and the high levels of testosterone in fighting armies. These crimes are perpetrated by individual men who rape and torture girls on mission, then go home to their wives. And it’ll carry on until there’s a knock at the door and they find themselves getting arrested in front of the wife and kids.” [9]

While the UN claimed to have dealt with the rotten apples and Dyncorp professed to have made a thorough and “aggressive” investigation into the crimes, the trafficking still continues right under the UN’s nose. As the film’s director stated in her address to the UN leadership at a screening which the organisation grudgingly agreed to:  “I know we are going to hear a lot about what has been done since the time depicted in this film, but rhetoric only goes so far. The situation has escalated.” [10] (In 2010 sexually related allegations against U.N. military forces rose by 12 percent with some of the allegations involving minors). [11]

The UN investigator was not the first to blow the whistle on the corporation. Ben Johnson, a former Texan helicopter mechanic won his lawsuit just hours after Bolkovac where his claims included allegations of men having sex with girls as young as 12. His claims also concerned a nightclub in Bosnia frequented by DynCorp employees, where young women were sold “hourly, daily or permanently”.[12] Johnson believes Dyncorp was not only dealing in illicit arms and fraud but heavily involved in the peddling and promoting of the burgeoning sex trade that was thriving precisely because this was a war torn region.

Where there is war there is a surplus of the vulnerable and a perfect cover for trafficking. The sex slaves were ordered from Russia, Romania and the primary trafficking hub of Moldova, being imported directly by Dyncorp and the Serbian Mafia working in concert:  “These guys would say ‘I gotta go to Serbia this weekend to pick up three girls.’ They talk about it and brag about how much they pay for them usually between $600 and $800. In fact, there was this one guy who had to be 60 years old who had a girl who couldn’t have been 14. DynCorp leadership was 100 % in bed with the mafia over there. I didn’t get any results from talking to DynCorp officials, so I went to Army CID and I drove around with them, pointing out everyone’s houses who owned women and weapons.’ ” [13]

Since 1998, several DynCorp employees have been sent home from Bosnia but none have been prosecuted. All this scandal led George W. Bush to respond by creating the US Immigration and Customs Enforcement (ICE) established in March 2003 “as the largest investigative arm of the Department of Homeland Security,… comprising of four integrated divisions that form a 21st century law enforcement agency with broad responsibilities for a number of key homeland security priorities.” [14] The amount of assets seized from human smugglers and human trafficking organizations totalled 27 million in 2005 and with no seizures at all for 2003.  Compared to the billions of dollars circulating, this is the equivalent of loose change. Far from suggesting a major improvement, it shows a dismal response on the part of the State Department even while it cheerfully reported with no hint of irony that: “Since ICE was created, more than a dozen child sex tourists seeking to exploit children in eight separate countries have been arrested and now face justice in the US.” [15]

With sex tourism proving to be a major problem in the West we are supposed to believe that the arrest of 12 child sex tourists since 2003 is an example of “significant law enforcement progress”?

We also have the proud declaration of “investigations into human trafficking and the related crime of human smuggling, [which] have resulted in more than 5,400 arrests, 2,800 criminal indictments, and 2,300 criminal convictions.” [16] These successes were diluted by contractors and security firms which are mostly extensions of the US government.

Indeed, the corporate-security complex aggressively lobbied for provision after provision until, according to a Chicago Tribune report: “…significant aspects of the Pentagon’s proposed policy might actually do more harm than good unless they’re changed. These experts have told the Pentagon that the policy would merely formalize practices that have allowed contractors working overseas to escape punishment for involvement in trafficking, the records show.” [17] And it was probably designed that way.

Capture

Human trafficking main origin, transit, and destinations

On March 11th 2005, in a House Hearing on FY06 Department of Defence Budget hearing Senator Cynthia McKinney focused on the Dyncorp scandal, taking then Secretary of Defence Donald Rumsfeld and General Carl Myers to task, in no uncertain terms. (see end of article). It was a rare opportunity to see a lone voice in politics trap Rumsfeld and place him firmly in the hot seat. The Neo-Con war hawk bridled as he was forced to listen to the facts.

Not only has the Pentagon yet to ban contractors from using forced labour, but the same corporations are being effectively rewarded for their past and present criminal behaviour, by obtaining contracts set far into the future. (As part of a consortium of bidders, the British government’s Ministry of Defence awarded the company a 60m contract to supply support services for military firing ranges. [18] With the help of lobbyists from Dyncorp and Halliburton, subsidiaries such as KBR has over 200 subcontractors carrying out the multibillion-dollar US Army contract for privatization of military support operations in the war zone. Trafficking and bonded labour appear inconsequential in the face of exorbitant profits. Yet the US military continue to deny responsibility for its out-sourcing of conflict even when there are continuing and numerous incidents that show the liability of its sub-contractors. [19]

Dyncorp represents the new breed of private contracts taking the place of traditional forces most recently employed by the United Nations itself. Once again we can see how sexual exploitation can be used as a political and corporate terrorism outside military and international law. But security firms also represent that same homogenization of the private sector funnelled into new forms of political control.

If we were to visit the California-based Computer Sciences Corporation website (csc.com) we might be forgiven for thinking this is a financial services company humbly dedicated to bettering the world as well as its investors. Unfortunately, the low key nature of the site design masks the meaning of this fortune 500 multi-national with its high-level enabling skills for U.S. Federal government. The corporation currently holds contracts with more than 40 federal agencies including the Pentagon, State Department, Drug Enforcement Administration, and the Energy and Justice Departments.

This giant government contractor bought Dyncorp on March 7th 2003, creating “a company that ranks as one of the top information technology and outsourcing services providers to the U.S. federal government.” The revenues from the federal sector alone were estimated to be around $6 billion at the end of that fiscal year, with projections in excess of $14.5 billion at the end of 2004. 2005 saw a steady increase in profits due to its monopoly on US Government contracts which are now expanding into Europe. This net profit was more than $810.2 million during fiscal year 2005, an increase of 56 percent over 2004. [20] The purchase of Dyncorp not only saved its bacon but allowed it to claim the dubious honour of being the third largest IT services provider behind Lockheed Martin and second place provider EDS Corp.

CSC Chief Executive Van B. Honeycutt gave a wonderful example of the art of masking with his comments on why the Dyncorp merger went ahead: “‘DynCorp, with approximately 98 percent of its total revenue coming from the U.S. federal government, complements our overall federal business, allowing a great breadth of end-to-end solutions and significantly increasing our exposure to the growth area of federal government, IT and functional outsourcing…”  He continued: “The capabilities of the new federal sector organization will allow CSC to provide more comprehensive services and solutions to our government customers…” These “customers” are none other than the US military and the Department of Homelands Security who will apparently benefit from: “… the resources and security expertise of CSC, coupled with those of DynCorp, will position us extremely well as the federal government expands and accelerates its efforts to enhance U.S. national security.’ ” [21]

No doubt.

It sounds reasonable enough if we don’t think about what this actually means. “The growth area of federal government” and “U.S. National Security” is intimately linked to the “War on Terrorism,” numerous examples of human rights abuses and the dismantling of the constitution from within.

When the United States created the Office of Homeland Security, CSC chairman Van B. Honeycutt was one of the first advisers to the new agency having already handled the position of Chair of the National Security Telecommunications Advisory Committee (NSTAC) under President Clinton. Effectively, the corporation is an extension of the government and its policies, with an incestual exchange of employees and profit, which the website tenderly calls “client intimate organizations.” With its headquarters in Reston, Virginia, close to the CIA and the Pentagon, there is no doubt that Dyncorp has a deeply intimate (and lucrative) connection that is mutually binding.

Dyncorp contractor in Afghanistan

Dyncorp contractor in Afghanistan

Prior to the merger, DynCorp was among the largest employee-owned technology and out-sourcing firms headquartered in the United States, with approximately 26,000 employees in some 550 locations throughout the world. According to CSC: “… the U.S. Department of Defense represented 49 percent of DynCorp’s revenue in 2001, which before the merger netted 2.3 billion.” [22]

During 2008–2010, CSC was heavily criticised for spending $4.39 million on lobbying and not paying any taxes which is nonetheless standard practice for most large corporations. In fact, the company received $305 million in tax rebates, on top of a profit of $1.67 billion. [23]

By the end of 2004 CSC had sold off units of Dyncorp to private equity firm Veritas Capital for $850 million. With Dyncorp International eventually dropping under the net of private equity investment firm Cerberus Capital Management $1 billion and finalised in the summer of 2010. CSC still retains the rights to the name “DynCorp” while the new company became DynCorp International now listed on the New York Stock Exchange despite receiving 96% of its more than $3 billion in annual revenues from the US federal government. [24] Dyncorp Inc. earned a whopping $2,398,874,000 from its “defence” contracts alone in 2011.

The number of lawsuits and scandals hitting Dyncorp International range from allegations of sex trafficking to a variety of human rights abuses and black operations involving drugs and military targets. This is largely due to the hiring of former Special Operations military personnel and CIA personnel. One would think that the screening of employees would have been stepped up after so much bad publicity. Yet why should they worry when the biggest contractors are the US and its war machine driven by the arms industry itself? Logistical and IT services may well be a great part of the civilised PR of Dyncorp but in reality, the real focus of this corporation could be categorized as “private mercenaries” which allows operations to be sub-contracted to the bidder that is most ideologically and professionally sound. It also conveniently abdicates responsibility for the US army and their civilian deaths while avoiding unnecessary media spotlights. Outsourcing their wars beyond the prying eyes of press and congress is an effective way to ensure the success of geo-political policies such as regime change.

Secrecy is obviously an important part of the company’s rules. If employees happen to get rubbed out on their various covert “missions” then the paper trail is as sparse as possible. Janet Wineriter, a spokeswoman at DynCorp’s headquarters frequently tells the media that she cannot discuss the company’s operations because of its contractual obligations to its client – the State Department. When this fails then black-outs are affected. Information regarding the real activities of these private mercenaries is intentionally obscure and shielded from investigations. There is no “right to know.” The last people they want to inform are Congress or the public. As a Guardian article stated “Today’s mercenaries in the drug war are provided by private companies selling a service and are used as a matter of course by both the state and defence.” [25]

Dyncorp has little to do with “Information Systems, Information Technology Outsourcing and Technical Services” though this certainly plays a part in extending its monopolistic war games. Controlling and monitoring information systems for federal agencies such as the FBI, DOJ and SEC, are within the corporation’s remit which is rather handy should any “impropriety” surface – which of course is the name of the game. Subversion and corruption is endorsed and legitimized via a corporate and federal relationship that gives the Cosa Nostra a run for its money.

dymcorprumsfeld

Cynthia McKinney does what she does best and grills Donald Rumsfeld over Dyncorp’s activities. This is the only time we are likely to see this psychopath get hauled over the coals for any of his state-sponsored crimes.

***

Update 2017: See: BOMBSHELL: Solving The Puzzle – “It’s DynCorp behind the mass shootings you see in America”


Notes

[1] ‘American firm in Bosnia sex trade row poised to win MoD contract’ by Jamie Wilson and Kevin Maguire, The Guardian, November 29, 2002.
[2] ‘British firm accused in UN ‘sex scandal’: International police in Bosnia face prostitution claims By Antony Barnett and Solomon Hughes, The Observer, London, 29th July 2001.
[3] Ibid.
[4] ‘Woman sacked for revealing UN links with sex trade’ By Daniel McGrory How a tribunal vindicated an investigator who blew whistle on workers in Bosnia, The Times, August 07, 2002.
[5] Ibid.
[6] ‘Sins of the peacekeepers’ Sunday Herald, 30 June 2002.
[7] ‘Has the UN learned lessons of Bosnian sex slavery revealed in Rachel Weisz film?’By Ed VulliamyThe Observer, January 15, 2012.
[8] Ibid.
[9]   Ibid.
[10]    Ibid.
[11]  ‘U.N. Mum on Probes of Sex-Abuse Allegations’ By Steve Stecklow and Joe Lauria, Africa News, March 21, 2010.
[12] ‘American firm in Bosnia sex trade row poised to win MoD contract’ by Jamie Wilson and Kevin Maguire, The Guardian, November 29, 2002.
[13] ‘DynCorp Disgrace’ Jan. 14, 2002, Insight magazine, By Kelly Patricia O Meara. http://www.insightmag.com
[14]  Bureau of International Information Programs, US Department of State. Web site: http://www.usinfo.state.gov
[15] ‘US Law Enforcement Steps Up Hunt for Human Traffickers’ 11 January, 2006 http://www.usinfo.state.gov/washfile
[16] Ibid.
[17] ‘US stalls on human trafficking – Pentagon has yet to ban contractors’ from using forced labor By Cam Simpson December 27, 2005.
[19] But one example from The Chicago Tribune which: “retraced the journey of 12 Nepali men recruited from poor villages in one of the most remote and impoverished corners of the world and documented a trail of deceit, fraud and negligence stretching into Iraq. The men were kidnapped from an unprotected caravan and executed en route to jobs at an American military base in 2004.”“Dyncorp and Friends: Securing Private Politics” (2007) an article written by the author which fleshes out Dyncorp and other UK and US private companies.
[20] Data Monitor /Computer Wire / http://www.computerwire.com/ 2005.
[21] ‘CSC and DynCorp Combine to Create Federal IT Powerhouse’ – http://www.csc.com/
[23] ‘30 Major U.S. Corporations Paid More to Lobby Congress Than Income Taxes, 2008-2010’ By Ashley Portero, International Business Times, http://www.webcitation.org, December 9, 2011.
[24] ‘Cerberus completes DynCorp acquisition’ Washington Business Journal, July 7, 2010.| Washington Tech. Top 100: http://www.washingtontechnology.com/toplists/top-100-lists/2011/dyncorp.aspx
[25] ‘A Plane is Shot Down and the US Proxy War on Drugs Unravels’ by Julian Borger, The Guardian, June 2, 2001.

Save

Save

Save

Save

Save

Save