surveillance

Neuro-Hacking the Mass Mind (II)

Conférence Neuro-Pirates, Neuro-Esclaves partie 1 : Intervention de Lucien Cerise (Neuro-Hackers Conference – Neuro-Slaves Part I: A Talk by Lucien Cerise)


Continuing our exploration of Lucien Cerise’s collection of essays entitled Neuro-Hackers: Reflections on Social Engineering (2016) (Neuro-Pirates Reflexions Sur L’Ingenierie Sociale) published by Kontre Kulture.

Neuro-Hackers provides an overview of a neurological “hacking” that has been taking place in the modern age and imposed upon global populations. It seeks a “maximum efficacy” in the elimination of the seeds of revolt and if such a revolutions manifest they are to be of the Establishment’s choosing – not ours. More alarmingly, since we are no more than cattle or sheep for these self-elected Masters, it is of the utmost importance to their objectives that the collective herd does not awaken to its own power. It seems at the end of every route to true freedom they have prepared for it, anticipated it and created avenues by which we will be “entertained.”

As Cerise states:

In our age of increasing labour automation the master no longer depends on his slave for production and can therefore begin to physically suppress him. But in order not to provoke a reaction, he must do so stealthily, without striking it him thus, by stages plunging him into a globally anxiogenic, pathogenic, depressing and morbid environment where everything is polluted and toxic to the body and mind, from ambient chemical molecules to the ideas and representations disseminated in public opinion. Thus it is that a whole population is murdered by a small fire without being aware of it, as in the manner of the “boiled frog.” * [1]

In other words, the real battle is not external but through our very minds and the plasticity of our brain and epigenetic inheritance. Hence, the Elite seek to extinguish the very spark of a mental condition that might give rise to a genuine individual and collective awakening. The author mentions the role of the neuro-hackers is to induce a collective suicide and the suppression of creativity through such mental illness so that tribalism is invoked and maintained as camouflage for globalist authorities. Further, he has reminded us of a strata of three social engineering applications currently at play in Western societies in particular, each of which emboldens the other. As an illustration to this idea, we might liken this to the stages required for the erection of a prison for the mind: the ground work or foundation is laid, the building blocks or façade erected and finally the roof under which societies are housed is fixed in place, a container for the mind to which we are all subject.

(more…)

Advertisements

Neuro-Hacking the Mass Mind (I)

By M.K. Styllinski

“…brain-hacking through social engineering and other processes is already a reality, and hackers are our brains. This ‘neuro-hacking’ can involve acting on the hardware, that is to say on the biological and genetic substrate of the brain, but it can also involve acting on the software, that is to say, on the communication code that we learn from society.” – Lucien Cerise


One of the breakthroughs in understanding the level of influence of the Deep State and Overworld dynamics has been through the recent revelations from Wikileaks’ Podesta emails. A veritable Pandora’s Box of connections has led to Pizzagate – now Pedogate – blackmail, corruption, child pornography, sex trafficking, black magick rituals and a plethora of other sordid revelations fanning out from the quest for regime change and the battle for resources in the Middle East. After researchers from all political persuasions and beliefs had been highlighting these horrors for years, these leaked emails, now being sat on by the FBI, are the closest yet to offering proof of the mechanisms which are passed from one Establishment/Deep State generation to the next like a dark baton slippery with blood.

Slowly but surely the why, who and how of our Official Culture and the drivers which ensure that humanity remains under the yoke of  World State cartels is being revealed in a way that hasn’t been seen before. Oil/Gas, weapons, drugs, and sex/organ trafficking lie at the top of multi-tiered resource pyramid. The financial architecture that perpetuates these unimaginably toxic channels is achieved through a long tradition of social engineering by Elite factions, the puppets & players of which follow a revolving door of power, irrespective of a President and his administration. This is the facade, the entrenched and inevitable outgrowth of the State that permits a shadow government to remain forever at the control panel of perpetual war and social disruption. As top-level power brokers between the CIA, the NSA and FBI jostle for supremacy let’s not forget that overall, these agencies are primarily engaged in a war for our minds as their primary reason for being.

However, let’s not imagine that the Wikileaks organisation and their poster-child Edward Snowden are somehow working for the greater good, although many in their staff may think so. I suspect that this period of permitted leaks is very probably nothing more than a psychological operation, a limited hangout of the CIA and thus an attempt to acclimatize populations to the ubiquity of surveillance and intelligence that is literally inside your home, phone, T.V. and anything else connected to the internet and the emerging SMART society.  This is one facet of the same social engineering project that we’ll discuss below.

It’s a risky game managing the flow of “leaks.” Allow too much information to seep into public consciousness and a momentum begins to emerge, not enough information and they can’t pursue their time-table of phased objectives. Which is why the hacking of lap-tops, smart phones and T.V.’s merely mirrors the hacking of our minds and beliefs – a potentially far more dangerous state of affairs then data mining. For example, the core roots of progressivism and the left have now been infected by ponerological streams of political correctness and narcissism, working in concert with CoIntelpro agents in much the same way as the New Age or Human potential movement as a whole. Thus, social movements such as LGBT, Black Lives Matter and Soros-led “social justice” organisations such as Moveon.org tune into a genuine desire for social equity and “rights” but are created or hijacked early on, driven by Deep State directives that desire the chaos of tribalism as a default setting for society. The younger generation of Millennials – who should be the hope of the world – appear incapable of exploring this dichotomy because they have already been programmed to embody and act out these inverted social-cultural beliefs, ethics and activism. The rise in an epidemic of narcissism in this demographic further encourages feel-good sensation, and a technology-driven buffer to the acknowledgement of nuance, complexity and attention to objective reality. The ability to think outside the box against ingrained conditioning becomes severely limited because it is perceived as an attack against the collective ego mask of self-entitlement.

Thus, Millennials and older generations of the well-intentioned (and not so well-intentioned) are already falling into the many traps, the escape from which will be extremely difficult since the these info-tainment led emotional hooks of manipulation offer benign moral imperatives to seduce a collective projection of unresolved shadows out into the world, thus turning ideology and justice on its head. Controlled opposition has therefore been easy to manufacture, backed up as it is by fake news of the corporate media. Those that are paying attention can see this formula everywhere you look: whether it is the BBC or CNN that promote the Establishment’s agenda of anti-Russian rhetoric to University Campuses engaging in an Orwellian re-branding of vocabulary in an tragi-comic and painfully ironic stand against racsim and bigotry.  Such tactics focus away from what really matters and into the realm of skin-deep analysis of feeling and sensation. This bio-chemical template that is burned into the young brains of new generations is the neural pathway upon which social engineering functions and thrives. Indeed, it seems much of the left, new age/green and “socially aware” are now the unconscious cultural foot-soldiers of the Deep State. This is why social engineering has been adopted with such pin-pointed skill and precision over the years and why it needs to be confronted and thoroughly explored.

The awakening to the nature of the MSM as a monolithic exercise in propaganda and thought control is gaining ground, thanks largely to the internet. It is becoming less easy to monopolise information and applied knowledge in this age of independent news feeds, FOI requests, forum research, whistle-blowers and leaked documents, despite the signs of psyops constantly filtering the truth. There is a real chance for moderates from the left and right (and many shades inbetween) to turn down the volume of their beliefs and collaborate against a common foe – that of institutionalised psychopathy. Which is why the war is being fought through the inner shadows and unresolved issues that we all have. These weaknesses can be exploited and used by the Elite through suitably prolonged exposure to new forms of social engineering. It is for this reason that lines between awareness, knowledge and apathy and ignorance are being drawn.

And so to neuro-hacking…

(more…)

Police State Amerika II: No-Knock Raids

“Police violently broke in on a couple of men watching television, exploded concussion grenades, and shot one man roughly a second after entry. The fatal, under-investigated raid yielded no arrests and led to the shooter being named “Officer of the Year.” All because someone was suspected of getting high without government permission.”

– Police State USA


During the April 2013 Boston Bombings and the hunt for Dzhokhar Tsarnaev, Boston suburbia was effectively in lock-down with thousands of National Guard troops, FBI and other federal agents, state and local police, all creating virtual martial law in a matter of hours. Units conducted house to house searches, often heavily armed whilst residents were told to stay inside with their doors locked and not open them to anyone but identified police officers. This was part of an official order called “shelter in place” enacted by Massachusetts Governor Deval Patrick and which was gradually extended over 100 square miles of the Boston metropolitan area, housing over 1 million people. Local reporters compared the scene to videos of US-occupied Baghdad.  [1]

It seems this was a taste of what was to come. With an operation such as this, following hot on the heels of a so-called terrorist attacks with a tragic loss of life, one might say that such martial law was justified in order to catch the perpetrators. Yet, even if we were to discard evidence that the Tasarnaev brothers were set up, the same patterns of deception found similar to every false flag operation, we would surely have to arrive at the conclusion that this was an utterly over-the-top response. What this military deployment did achieve, was to stoke the fear of authority and its capabilities. There has never been a more dangerous time to be poor, elderly or the recipient of SWAT teams’ persistent encroachment into civilian life. For every one of these examples – whether black, white, Army veteran, elderly man or woman, babies, children or the mentally disabled – there are hundreds of similar cases.

SWAT raids are truly terrifying for those unfortunate enough to experiences them. Arriving in armoured personnel carriers, usually in the dead of night or early morning, a team of 8-10 heavily armed, andrenalin-pumped young men break down your door, and/or smash your windows, hurl incendiary devices into the interior regardless of the presence of children or elderly folk and frequently move to kill your pets.  Whilst securing the house and if you are not dead already, you are made to lie face down in blood and glass with your arms tied behind your back. Armour-clad soldiers carrying sub-machine guns shout at you to remain where you are, often during the aftermath of a violent physical assault. It is not uncommon for SWAT members to brutalise homeowners in their search for suspects.

But what of the individual cases? How far has this phenomena encroached into everyday American lives?

swat1

SWAT team smashes into a grandmother’s home Image credit: offthegridnews.com

“Not having proper security on your Wi-Fi router can lead to a SWAT team raid on your house, as one family in Evansville, Indiana, discovered. Louise Milan learned this the hard way when SWAT officers smashed through her door and threw flash-bang grenades into her house in a case that is getting attention again because of court action this month in a lawsuit.” – David Jennings, Off the Grid News, August 2014.

We will start off this brief survey with a tragedy that occurred in 2008, when homeowner Ronald Terebesi was relaxing in his living room with friend, 33-year-old Gonzalo Guizan. The peace was shattered by a nine man SWAT team with a “no-knock search warrant for narcotics”. After police had tossed in three flash-bang grenades through the windows the team battered down the door and after almost 2 seconds inside Mr. Guizan had been shot six times and Terebesi hit with a rifle butt and pinned to the floor. The rest of the team trashed the house looking for concealed drugs.

It became apparent that the SWAT team had burst in so quickly that a grenade denoted in close proximity to the officers causing its fragments to hit Officer Sweeney who claimied he’d been hit, therey firing a volley of bullets into Guizan. According to later testimonies by Sweeny, Terebesi and Guizan had tried to attack him despite the absence of any corroborating evidence. Since the whole event lasted less around 2 seconds it seems like a feeble allegation to cover up incompetence. The Connecticut Post reported attorney for Terebesi Gary Mastronardi stating: “There is undisputed evidence Guizan and Terebesi were huddled in a corner when police shot,” which makes Sweeney’s claims even more unlikely.

Neither man had criminal records. Their only “crime” was to enjoy a small quantity of drugs for personal use, but it was enough to cause a SWAT team to burst into their own home, murder one man and assault another. Terebesi is still seeking compensation for “emotional suffering” while Guizan’s family received a $3.5 million pay out in February 2013.  [2]


“It looked like the Russian army had approached,” … “This was overkill.”

neighbor of Terebsi, Drew Clark


If a police team is out and about and your house has been targeted – prepare to pray.

In 2013, an 80 year-old retiree barely had time to do that before being shot six times as he lay in his bed. The reason? Los Angeles County Sheriffs Department deputies thought they could smell a meth lab. In fact, when no meth operation was found they decided to clutch at the fact that a small quantity of marijuana was discovered in another part of the property. A $50 million civil lawsuit was served by the widow Tonya Pate and her attorney James Bergener. County sheriffs say that the deceased, Eugene Mallory had raised a gun at deputies whilst his wife is adamant that her husband, a former engineer at Lockheed Martin would never have taken such action. “He was shot in his bed before there was any warning given,” Bergener said. [3]

From an old age pensioner to a mentally disabled youth found dead after strong-arm tactics by police officers.

Robert Ethan Saylor was found to have suffered a fractured throat cartilage after being suffocated to death by police officers who sought to remove him from a cinema. Saylor, who had Downs Syndrome and a low IQ had thoroughly enjoyed the film he had been watching and wanted a repeat performance. Saylor and his caretaker did not have enough money and since he did not understand the concept of tickets, he became upset and refused to leave. Though the caretaker pleaded for patience and warned that he was very sensitive to being touched, in the end police moved in. As he was wrestled to the ground not understanding what was going on, there were reports from witnesses that officers told Saylor that he was going to jail, as he struggled in obvious pain. He last words were: “Mommy! It hurt!” as he died of asphyxiation.  [4]

Although the death was ruled a homicide, the 3 police deputies in question received no criminal charges and remained on active duty. They were however, enrolled on a training class to learn how to interact with people with low intelligence. Somehow such a move won’t be much consolation for Saylor’s mother nor will it make the slightest difference to the police in question.

Iraq veterans are also at risk.

We go back a few years to May 5, 2011 and the case of Jose Guerena. The former marine was shot and killed by SWAT team members when they raided his house.

After working the night shift at the local copper mine he and his wife were awakened by voices and loud noises. Assuming that there were intruders he retrieved his rifle and hid his wife Vanessa and his 4-year old son in the closet. He then checked the house. As he stood in the hallway the SWAT team fired off 71 rounds and hit Guerena 22 times. His wife and child were unharmed. No drugs were found.

dreamstime_m_40957630© Zabelin | Dreamstime.com – SWAT Team Photo

Fancy meeting these guys in your living room? Your friendly neighbourhood SWAT team on a street or home near you.

By all accounts, Guerena had no idea that this was the police, nor did he realise that the detonation of concussion grenades in their back yard were the cause of his awakening. Seconds before an armoured truck had arrived in their front yard and a SWAT team was already preparing to break down his door. To compound the tragedy, as he lay  bleeding in the hallway, it appears the police did everything they could to prevent ambulance services from reaching Guerena. According to an ABC News report his wife claimed she called 9-1-1 for an ambulance yet it was over one hour 14 minutes before any paramedics could get to Guerena. This was due to the evacuation of neighbouring houses and the deployment of two robotic drones to check the house interior. One wasn’t enough it seems. The clock ticked by. After that, the bomb squad was called in and the deployment of robotic scouts was set in motion. Only then did the SWAT team re-enter the house to sweep the rooms. By this time, Jose Guerena had bled to death. Deputy Tracy Suitt on behalf of the The Pima County Sheriff’s Department strongly believed: “… the events of May 5, 2011, were unfortunate and tragic, but the officers performed that day in accordance with their training and nationally recognized standards…”.  [5]

These “Nationally recognised standards” were employed with the shooting of two members of Vanessa Guerena’s sister-in-law’s family, Cynthia and Manny Orozco, last year. A small bag of pot was discovered along with $94,000. Though members of the family were allegedly involved with the smuggling of marijuana, such a case requires due diligence and extreme caution which was clearly not the case here. Raids with trigger-happy teams of paramilitary men storming suburbia is common place. Once again, no reprimands or arrests were forthcoming. The Guerena family proceeded with a civil lawsuit and settled at $3.4 million dollars. It seems one can survive two tours in Iraq but not your own law enforcement.

Next in line for raid treatment were two grand-parents shot by DEA agents in their own homes, one fatally and within one month of each other.

In August 2014, New Hampshire Grandmother Lilian Alonzo was looking after her grandchildren aged, 1, 4 and 10 years old. At around 7.00pm the door was opened by a family member and the DEA raided the third story apartment looking for drugs. Alonzo was fired at twice by an agent and was hit in the torso by one of the bullets. The Grandmother’s son later told reporters that all she had been attempting to do was to pick up the baby, a natural reaction one might think when a group of strangers barge into your home. Ms. Alonso had no criminal or previous arrest record and was not arrested or charged following the raid.

Why was this grandmother put in hospital?

It was apparently part of a series of 13 raids carried out: “… to investigate several people allegedly selling prescription painkillers without government authorization.” [6]

Painkillers.

Nor is this an isolated incident. From one of many incidences, Three people were killed and four wounded in October 2013 when yet another no-knock raid turned to tragedy. Reason? The illegal distribution of prescription pills.

From tracking those dastardly crimes of painkiller users, to taking the word of a meth addict and thief in order to raid a Grandfathers home, unannounced.

In September 2014, David Hooks, 59, was awakened by his wife who said the thieves who had earlier stolen their SUV were back. Hooks picked up his gun in order to protect his wife and his home from further intruders. Little did he know that Rodney Garrett had stolen their vehicle, the same man who had tipped off the police that he had seen illegal drugs on the Hooks’ property. Meanwhile, a SWAT team of sheriff deputies broke down the door, firing sixteen shots leaving David Hooks dead. No drugs were found. According to the widow’s lawyer, the Sheriff’s Department then “mislead the public” about the shooting and raid. [7]

Finally, the killing of a 7 year-old girl in a raid by the Detroit Police Department in May, 2010.

Looking for a wanted man on the evening of May 16, 2010, the Detroit Police Department’s Special Response Team (SRT) were preparing for a dawn no-knock raid on a duplex where the man was said to live. The house having been under close surveillance throughout the day, the police nonetheless disregarded any safety measures for the likelihood of children being present at the address, even though children’s toys were littered around the front of the residence. With a warrant to arrest Chauncey Owens and armed with MP5 sub-machine guns and even a Reality TV crew, the SRT team approached the house.

A pedestrian out walking his dog was held back by police and unnecessarily pinned to the ground with police boots on his neck and back. (Gosh, those brave, virile policeman putting on a real show for reality TV). Despite this, he repeatedly told officers that there were children in the house. Bizarrely, officers broke into two locations: the suspect’s and the next door neighbour’s downstairs apartment. Windows were smashed, a concussion grenade thrown which lit up the porch. The door was kicked down and after just over 30 seconds from the start of the raid, a gunshot was heard and Aiyana Stanley-Jones lay dead from a bullet through he neck. It took only six seconds for the girl to be killed from the moment the police entered the home.


 “They blew my granddaughter’s brains out,” …  “They killed her right before my eyes. I watched the light go out of her eyes.”

Ms. Mertilla Jones, Grandmother of  Aiyana Stanley-Jones


She had been sleeping on a couch next to her Grandmother Mertilla Jones who had dived to the floor when the grenade had hit the couch, scorching it in the process. It is then that the police began to lie about the events of that early morning preferring to blame the Grandmother by saying that the man responsible for discharging his weapon – 37-year-old Officer Joseph Weekley – had lost control of his weapon due to contact with Ms. Jones whom, he said, had tried to grab the gun. The Grandmother’s story is the exact opposite to the officer’s and much more believable. She explained that she tried to protect Aiyana after being shocked awake by the grenade and the sound of broken glass. She reached for the girl and made no contact with the officer or his gun. This was later corroborated by the absence of Jones’ fingerprints on the weapon.

Although Weekly had a dubious record of hyper-aggression against children and the shooting of animals during no-knock raids, he was to escape any punishment for this latest tragedy. Both trials in 2013 and 2014 were eventually declared mistrials, as the juries on both occasions were unable to reach unanimity. Finally, in January 2015, the case was dismissed and the Jones family had to pay costs. A civil suit has been filed and an appeal to the U.S. attorney general. [8]

Family spokesman Ron Scott commented on the injustice of the law: “Weekley doesn’t have to pay but the family that lost a child has to pay,” I think it’s abominable. I think it’s evil. I think it’s one of the lowest things I have ever seen.” [9]

(For more on this story go here.)

aiyana-stanley-jones1

7 year-old Aiyana Stanley-Jones killed by Detroit Police Department’s Special Response Team (SRT)

DominikaStanleycharlesJones1

In a photograph from May 2010, Dominika Stanley and Charles Jones hold a picture of their daughter, Aiyana Stanley-Jones, in a Detroit courtroom.” Source: Guardian|Photograph: Mandi Wright/AP.

As you can now imagine, there are hundreds of these stories. The following are just a selection of “no-knock raids”  conducted by police, SWAT, SRT’s and DEA teams taken from the last two years with similar catastrophic results.

No-knock SWAT raid leaves Texas father dead, family traumatized

“When they came in, they had their weapons drawn like we were members of a drug cartel.”

Police burst into wrong apartment, shoot innocent woman hiding in closet

“I told them I was afraid and do not shoot me, and one officer screamed at me to put my hands above my head… That’s when I heard the shot.”

Innocent homeless family’s wooden shack raided by police

Victim, shot at 15 times: ‘They just continued to fire’

Trooper cleared after stomping on innocent man’s skull while handcuffed

“I saw him lift his head and spit blood and teeth onto the kitchen floor.”

Mother and 4 children terrified during late night police raid on wrong apartment

A young mother explains how her evening bath was disturbed by armed men who forced her to the floor half-naked.

Empty home destroyed in 4-hour SWAT siege, innocent woman left with $100,000 in damages

“They wiped my whole life from underneath me and now I’m trying to pick it up and move on.”

SWAT team throws concussion grenade into baby playpen during no-knock raid

“Bad things happen to good people,” says the Sheriff, with every intention of continuing the raids.

Feds perform guns-drawn SWAT raid while investigating campaign finance allegation

“If they’ll do it to me, they’ll do it to anybody,” said the former attorney general.

Texas grandmother, autistic man held at gunpoint in wrong-door police raid

“They had guns directly at me and my son…There were guns everywhere. I mean, the long guns with lights on them. I was crying hysterically.”

DHS ransacks Florida couple’s home without explanation, strips woman naked

“They busted in like I was a terrorist or something.”

Texas SWAT team brutalizes innocent man in no-knock wellness check, concocts charges

“These cops are out of control. They are ruining good people’s lives.”

Utah rave party raided by SWAT team, helicopter, police dogs

A chopper hovered overhead as soldier-wannabes violently shut down the “illegal mass gathering.”


“They told me that they had taken my baby to the hospital. They said he was fine he had only lost a tooth, but they wanted him in for observation,” Phonesavanh said. When she got to the hospital she was horrified by what she saw. Bou Bou was in a medically-induced coma in the intensive care unit of Brady Memorial hospital. “His face was blown open. He had a hole in his chest that left his rib-cage visible.”

victim of SWAT raid Alecia Phonesavanh whose baby, 18-month-old Bou-Bou was on the receiving end of flash-bomb which was thrown into his cot. TheSWAT team who executed a no-knock warrant on their Georgia property on May 28 will face no charges. | Source: ‘Outrage as SWAT officers who disfigured toddler with grenade in botched drug raid will face NO charges’ Daily Mail.

bou-phonesavanh

Bou Bou Phonesavanh who is now thankfully recovering image credit: Justiceforbabyboubou.com


Rather than some overseas combat zone Americans can expect this ordeal to occur all over the United States an estimated 45,000 times every year, mostly in the search for drugs and disproportionately focused within minorities. [10]  Although the failure of the “War on Drugs” was always a certainty and remains deeply unpopular, it was never designed to be a genuine solution to a criminal enterprise, since the traditional role of intelligence agencies and law enforcement has been to profit from the support and sale of drugs on the street. 

swat-search-warrants

The creation of SWAT teams originated in the 1960s, the brainchild of the Los Angeles Police Department who were seeking ways to assist officers in high-risk situations such as a lone shooter, riots and hostage-taking. In the 21st Century they are no longer used for such specialised situations but for the average citizen and the search for drugs. According to a new study of 800 such raids conducted by the American Civil Liberties Union (ACLU) 79% of raids were focused on private homes and: “… only 7% of the time were heavily armed SWAT teams used for their original purposes: hostage and barricade situations.” [12]

And the reason for this explosion in state-mandated home invasions?

Aside from the aforementioned militarisation of law enforcement [8] it is partly to habituate the idea of the State as ultimate authority and the acquiescence required to justify its existence. It isn’t about finding a solution as we have surely surmised by now, it is about extending conflict in perpetuity so that the human spirit is further fragmented and broken. Secondly, as the ACLU points out, Departments of Justice, Defence, and Homeland Security make sure billions of dollars are lavished on law enforcement in order for it to complete the loop of weapons and associated military hardware contracts. The government is now merely another corporation, after all.

Tragedy and brutalisation breeds fear and compliance for some sectors of the population. For others, it ensures the propagation of the revolution meme which in turn, demands martial law and unleashing of the power of the state to enforce a return to “social cohesion.”

Continuing our look at post-9/11 rise of the police state in America, the next post will explore the use of tasers and the fallacy of non-lethality.

 


Notes

[1] ‘Bombing suspect captured after military-police lockdown of Boston’ By Alex Lantier and Kate Randall WSWS, 20 April 2013.
[2] ‘$3.4M settlement in deadly 2011 SWAT raid near Tucson’ By Joe Ferguson, Arizona Daily Star, September 20, 2013.
[3] ‘Widow to Sue Over Fatal Shooting of Husband, 80, by Sheriff’s Deputies’ KTLA, October 10 2013.

[4] ‘Grand jury rejects criminal charges in death of Robert Saylor, man with Down syndrome’ Washington Post, By Theresa Vargas March 22, 2013.
[5] ‘Arizona SWAT Team Defends Shooting Iraq Vet 60 Times’, By Ellen Tumposky, ABC News, May 20, 2011.

[6] ‘Woman Shot during Beech Street drug raid’ by: Carol Robidoux, August 29, 2014. Manchester inklink.com
[7] ‘SWAT Team Shot David Hooks At Home After Tip From Meth Addict’ by Michael McLaughlin The Huffington Post, 10 August, 2014.
[8] Family grieves death of girl, 7, in police raid’  Doug Guthrie and Valerie Olander, The Detroit News, May 17, 2010.
[9] ‘’She was only a baby’: last charge dropped in police raid that killed sleeping Detroit child, The Guardian,  “Aiyana Stanley-Jones was 7 years old when she was killed by a single bullet to the head. As officer Joseph Weekley walks free, another community is demanding answers about the increasing militarisation of law enforcement.” By Rose Hackman, Saturday 31 January 2015.
[10] ‘Another Day, Another 124 Violent SWAT Raids’ By Kara Dansky, American Civil Liberties Union, http://www.aclu.org/ June 26, 2014.
[11] Cocaine Politics: Drugs, Armies, and the CIA in Central America By Peter Dale-Scott (Updated Edition Paperback – April 10, 1998) University of California Press. ISBN-10: 0520214498. |Gary Webb’s Dark Alliance Stories on Establishment drug corruption: http://www.narconews.com/darkalliance/drugs/start.htm |’CIA funnels drugs into poor US neighborhoods’: http://rt.com/usa/usa-cia-drugs-poor-americas/
[12] op.cit Dansky.

[13] ‘War Comes Home: The Excessive Militarization of American Police June 2014: Report: https://www.aclu.org/criminal-law-reform/war-comes-home-excessive-militarization-american-police-report

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

The Politics of Entrapment IV: Peverted Justice and Porn Bombing

“We are the Perverted-Justice Foundation. Of course, those new to our foundation likely have no idea what that means. This is a foundation unlike most, if any, other foundations you’ll ever run across. We’re a foundation that does not simply thunder about a problem, we don’t merely advocate or preach against an issue from a distance. No, our foundation is a pro-active endeavor. We’re aggressive. We’re confrontational. We believe you have to be to make a difference in the fight against predators and pedophiles. We don’t wring our hands and say “they’re so evil, what can be done!” We find a way to get things done.”

pervertedjustice.com


Whether that “aggression”, “confrontation” and “getting things done” amounts to truly improving the situation or perpetuating the crimes is a question at least some who can still think attempting to ask amid all the gnashing of teeth. History tells us that vigilantism – whether in the street on the internet – is a cathartic experience for the ones doing the perceived purging, but less objective when it comes to targeting who is innocent and who is guilty. Indeed, with this kind of mindset it seldom seems to matter. It is the same ruinous, neo-conservative reflex to cleanse the world of complicated issues by using a sledgehammer to crack a nut.

The internet has already spawned its own version of reflexive and ill-informed initiatives which serve to increase the peripheral ability for psychopaths to extort and control. The distortion of facts, the suppression of real issues and possible solutions are thus kept out of reach. Seemingly with the help of the public, those that are willing to seek retributive justice and project their own fears into the emotional maelstrom can find all they need with Perverted Justice.com. This particular website is but one example of vigilantism and police entrapment American style. It has formed a “gateway” for recruiting “volunteer contributors who pose as underage children in chat rooms. Posing from a variety of ages (standard ages are 10-15), these contributors simply go into chat rooms with fake online screen names and wait for predators to instigate conversation with them.”

Xavier Von Erck, the website owner, claims to target and expose “wannabe pedos” from online chats which have been recorded after the fact and where many have been arrested, convicted and placed on the California sex register. You are able to send the target an email (assuming he still has an account which is unlikely) and: “… If no police agency expresses interest in prosecuting those adults, we post them publicly on our website … Regardless of past interaction with police, we make an effort to present each case to police so that there is an opportunity to prosecute before the log is posted on this site.” [1]

images

Xavier Von Erck, 2006

Once the wannabe predator has been sufficiently stimulated and worked up into a frenzy of deviancy, phone numbers are taken and addresses given, ready for the police show down. The chat room dialogue is then posted on the website with a photo for all to see. Votes are then offered on how “slimy” the person is considered to be. Though this kind of puerile behaviour is the least of the problems on the site, it gives an indication of the intent of the website owner and the people he has employed to run it. Some believe that responses such as these, far from helping to address society’s problem of paedophilia and child rape crime, actually help to create it.

Von Erck provides an extensive FAQ section where all seems above order and meticulously thought out. There are a few problems with this set up however. It appears “Xavier Von Erck” or real name: Phillip Eide, a 26 year old computer gamer of Portland, Oregon, the owner and “director of operations” set up Perverted-Justice over 12 years ago with a strict “Rule of No First Contact” which was observed for the first 2 years. An immediate ban from the site would follow if any member contacted the police or news outlet regarding their ensnarement.

Several years ago the rule was “relaxed” largely due to pressure from ex-members who formed an alternative site corruptedjustice.com (which is no longer in existence) to alert the public that all was not rosy in the land of alleged paedophile busting. Since the PJ’s inception they have claimed to have “busted” over 600 men (as of 2005) with no police involvement. Since then, from the wikipedia listing we learn: “… online operations have led to 314 convictions as of March 28, 2009, with over 200 more currently awaiting trial, and an average of 25 arrests a month for the year of 2006.”

Corrupted Justice (CJ) raised some vital points when they asked:

“How many of those 600 were actual predators who were [allowed to] walk free because the vigilantes didn’t involve police? How many of those people were actually innocent and mistakenly ruined as a result of being targeted by untrained, anonymous Internet cop-wannabes?” The answers are less than encouraging.

Of the 15 plus “group media busts” in which they involve the television media in their stings is minimal at best, with the end result that the predators walk away suitably embarrassed and angry and no doubt still at large. According to CJ: “Out of 1106 men they have ‘busted’, only 42 convictions have resulted.” What is even more disturbing is that very few of the alleged ‘busts’ do not have much to do with child solicitation. On the CJ website it states: “The tiny percentage of their “busts” which have resulted in an arrest were virtually all a result of media reports, phone calls to police from neighbors, etc. after the fact. – The result – Mostly plea-bargains to minor charges because of a lack of usable evidence. Since the taping for February 3rd’s Dateline program, Perverted-Justice has resumed ‘busting’ people with absolutely no law enforcement involvement, preferring instead to let their anonymous members dish out their own form of ‘justice’ ”. [2]

True to form this has inevitably led once again to a number of recent cases since the Dateline taping which have: “… mistakenly begun anonymously threatening completely innocent, non-involved people by telephone and e-mail…”

This is akin to rattling a hornet’s nest and then running for cover. CJ asked in their editorial last year: “…what ever happened to the One Thousand and Sixty Four potential predators they busted but for which they didn’t contact the police? They are living in your community instead of sitting in jail where many of them may belong…”

medium_pj(Wikipedia)

Other substantiated claims against Perverted Justice include:

  • The employment of minors in explicit online sex chats.
  • Anonymous harassment and terrorization campaigns against those targeted.
  • Identity theft against critics of Perverted Justice.
  • Serious threats, defamation against journalists, attorneys and other child-protection organizations who have voiced concerns regarding the group’s vigilante tactics.
  • Classic psychopath tactics of denigrating critics by conversive thinking, paramoralisms and paralogical conclusions
  • No evidence of any actual recognized or legitimate law enforcement training for Perverted-Justice members has been made public other than the “extensive training” claimed by present members.

Though the intent may be to inform and defend children, the route taken to convictions are dangerously close to vigilantism dispensing with the “rule of law” however inadequate this may seem. Once “adult citizens” follow the already extremely suspect version of entrapment then the concept of law and justice becomes less than meaningless where a judge and jury are simultaneously acting as creators and instigators of crimes.

Media mogul Rupert Murdoch and his tabloid news corporation MSNBC screened the “Dateline” show “To Catch a Predator” and paid Perverted Justice over $100,000 to participate in the programme. This is understandable, as the level of trashy voyeurism is matched by the other. However a “reputable” news corporation is not usually so up front about paying for stories and compensating sources, yet this is exactly what they did while watching the ratings climb, pandering to the same old propaganda which enraptured over 8 million viewers. It is tabloid T.V. at its worst yet remains a sure-fire winner for those seeking short-term profits from long-term misery.

In combination with PJ’s activities such exploitative programming merely make predators far more aware of legitimate police stings (a term to be used loosely) and to make the field of child molestation and paedophilia reduced down to nothing more than pop-corn entertainment. All this feeds into the overall impression that PJ and other sites and TV programmes are something other than an altruistic community protection. More likely it is part of a further operation to muddy the issues involved in sexual exploitation. Think War on Terror and we have the same programme – different channel.

Having originally wrote notes for this piece in 2005, it is perhaps most significant that no more than a year later a report from 2007 which gave a powerful indication that this was a police/FBI entrapment scam designed to create predators in much the same way that the FBI create terrorists. (See The Terror Industry). In an article by now defunct operationawareness.com it highlights reports filed to the FBI and the National Center for Missing and Exploited Children’s Cyber-tipline, that  members of PJ were possessing and disseminating images of child pornography. The article observed:

“NBC Universal, which airs the Dateline show is currently facing two lawsuits for numerous improprieties. The first lawsuit filed by a former NBC producer  is seeking $1 million in damages for the wrongful termination. The firing came after the producer questioned the shows ethics and legalities. The second lawsuit seeks $100 million in damages and is brought by the surviving family members of one of the shows “targets”, who committed suicide as the NBC Dateline and Perverted Justice crew descended upon his home when he failed to show up at the “sting house”. Initial reports are that there was no valid arrest warrant for the man and one police officer on the scene was quoted as saying “that’ll make some good tv” after the man took his life.

Trouble has been circulating around the Perverted-Justice group almost from the beginning for working in tandem with NBC. They have been accused as “staging the news” and NBC reportedly pays Perverted Justice $100,000 per episode. Critics worry that this is a big incentive to do whatever possible to create a sting scenario – anything from false accusations to manufacturing evidence. Perverted Justice, is the group responsible for baiting what they term “would be child molesters” online by posing as minors. Although it is also being reported that they use real minors to lure their targets- raising concerns that Perverted Justice is exploiting minors to achieve their goals.” [3]

Unfortunately, letting the authorities know about one of their pet entrapment projects is a little like alterting the wolf that one of his lambs has wriggled through the fence. Sure enough, the presence of Perverted Justice remains as strong as ever and is still mining the internet for innocent and guilty alike. The title of this website is of course extremely apt: a perversion of justice is most certainly taking place and which will boost the child porn entrapment industry whilst feeding into the worst forms of vigilantism buttressed by superficial training schemes. What hope can we have from amateur law enforcement wannabees when the law and justice itself is fully compromised? The upshot of this, yet again, is a public concentration on the effects rather than the root cause, and clever displacement of focus away from Establishment abuse. Moreover, it means real predators will go further underground while true paedophiles seeking help for their condition can be assured of a climate of demonisation and ostricisation from such outfits. You will seldom see a more egotistical, righteous and dangerous forum for self-appointed judge and jury than this entrapment model.

***

Way back in August 2004, KenoshaOnline, a news portal for Kenosha and Wisconsin was forced to shut down its anonymous forum due to repeated spamming from a Defence Department source with “links to incest, bestiality, gay sex and other inappropriate media.” [4] KenoshaOnline’s John Norquist contacted the Pentagon regarding the “porn bombs” but the Department of Defence refused to comment. The site’s traffic saw a significant fall once the forum was disconnected. Perhaps this has a connection the fact that our beloved government workers at the Pentagon were investigated by Immigration and Customs Enforcement (ICE) in 2006 concerning the purchase of child pornography online and discovered: “… more than 250 civilian and military employees of the Defense Department — including some with the highest available security clearance — who  used credit cards or PayPal to purchase images of children in sexual situations.” With assistance from the Pentagon’s Defense Criminal Investigative Service (DCIS) it was found that at least 30 Defence Department employees “… staffers for the secretary of defense, contractors for the ultra-secretive National Security Agency, and a program manager at the Defense Advanced Research Projects Agency” were all in possession of child pornography.” However not only did the DCIS open investigations into just 20 percent of the individuals identified, it prosecuted “… just a handful.” [5]

According to John Cook of The Upshot:

“… new Project Flicker investigative reports obtained by The Upshot through the Freedom of Information Act, which you can read here, show that DCIS investigators identified 264 Defense employees or contractors who had purchased child pornography online. Astonishingly, nine of those had “Top Secret Sensitive Compartmentalized Information” security clearances, meaning they had access to the nation’s most sensitive secrets. All told, 76 of the individuals had Secret or higher clearances. But DCIS investigated only 52 of the suspects, and just 10 were ever charged with viewing or purchasing child pornography.” [6]

Meantime, the American public has 24 hr warrantless wire-tapping, intrusive searches at the airport, No knock SWAT raids, unlawful take-down of websites and numerous other unconstitutional actions, whilst government employees have a great deal of immunity from this encroaching police state.  Which brings us back once again, to the presence of blackmail and sexpionage as another reason why over 80% of cases were not investigated. While as of 2015, the case “remains open” it seems it hasn’t stopped Pentagon employees appetite for child porn, in whatever guise that maybe. Indeed, one individual attempted to do so 12,000 times. [7]

In 2013, the National Security Agency offers evidence that it had the same ultra-hypocrisy as the Pentagon in that it sees nothing wrong with accruing vast amounts of information from its citizens internet browsing history – most importantly, what pornography websites they visit – while their many of their employees enjoy viewing a deviant brand of the same. Indeed, targeting muslims in this context, is all part of the war on terror, they explain. But if you think that such practices are restricted to the terror industry, think again. This is surveillance which affects everyone. Using pornography and entrapment operations have multiple purposes to that end.

amateurThe pornography business can be used as a means of social control for a variety of purposes. Even Google has had to defend itself since August 2004 from the likes of US Attorney General Alberto Gonzales who had been pressing the search engine giant to release data about people’s searching habits on the internet. [8] The Justice Department was keen to view specific information, including the types of queries submitted by users and the websites in its index. Not one to be accused of worrying too much about the privacy of its users, Google believes the criteria is too broad and “threatens trade secrets.” It fell to privacy groups to warn that user identities could be indirectly revealed, especially with the government’s new drive to collect data for “fighting crime and terrorism.” Their justification was the enforcement of pornography laws with special attention to the 1998 Child Protection Act which was blocked by the Supreme Court due to legal challenges regarding how it was enforced. Gonzales sought a court order to force the company to part with the records. (This is strangely hypocritical since the search engine is already in bed with the CIA).[9]

Over eleven years later and things haven’t improved. Amid the scandal of illegal surveillance by the UK’s GCHQ and America’s NSA revealed by whistleblower Edward J. Snowden the public is getting an idea just how bad it really is under the well-marketed, Goldman Sacs-funded Presidency of Barack Obama. (Although whether this is just a sophisticated psychological operations pantomime is anyone’s guess). Care of his confidente Glenn Greenwald, Snowden’s Leaked documents have shown that porn still plays a part in mass surveillance and intelligence tools. The latest leak has the NSA targeting activists’ and dissidents’ web history in order to locate visits to pornography sites in order to launch a future smear campaign. The claimed target of the social engineering initiative were Muslim radicals but in actual fact were only those critical of government policies.

In an appendix to the leaked document published by the Huffington Post Mr. Greenwald and his fellow journalists describe these individuals stating:

One target’s offending argument is that ‘Non-Muslims are a threat to Islam,’ and a vulnerability listed against him is ‘online promiscuity.’ Another target, a foreign citizen the NSA describes as a ‘respected academic,’ holds the offending view that ‘offensive jihad is justified,” and his vulnerabilities are listed as ‘online promiscuity’ and ‘publishes articles without checking facts.’ A third targeted radical is described as a ‘well-known media celebrity’ based in the Middle East who argues that ‘the U.S perpetrated the 9/11 attack.’ Under vulnerabilities, he is said to lead ‘a glamorous lifestyle.’ A fourth target, who argues that ‘the U.S. brought the 9/11 attacks on itself” is said to be vulnerable to accusations of ‘deceitful use of funds.’ The document expresses the hope that revealing damaging information about the individuals could undermine their perceived ‘devotion to the jihadist cause.’  [10]

When we know that mass surveillance has been in operation for decades, and there is a high probability that most sting operations on child pornography are police entrapments then this is merely confirmation that targets are compromised by monitoring and recording their browsing history. These operations successfully make the final case for blackmail and/or to discredit individuals by a sophisticated process of leakage via social networks and media.  Or as the appendix states: by “viewing sexually explicit material online or using sexually explicit persuasive language when communicating with inexperienced young girls.”

As multiple agencies are cited in the memo it is obvious that they had full awareness of the program and supported its objectives. This should not be anything other than business as usual since US intelligence used the same tactics to discredit so-called members of Al-Qaeda and even Osama bin Laden himself. Recall the juvenile allegations of USB sticks “filled” with pornography and jars of vasoline found at Osama bin Laden’s compound, following the U.S. deathstrike on him in May 2011. This was all part of the same propaganda exercise to revitalise the mythos of Osama as a depraved pervert as well as an evil head of the War on Terror. It’s merely another example of a familiar tactic that is used to eliminate critics.

Keep in mind that if you use the internet then your personal data is up for grabs. If you have the temerity to speak out against the surveillance state and if you have a history of looking at pornographic websites then you can be sure that this is all logged, recorded and filed for future use. Just make sure you don’t become too vocal against your beloved government who only has your protection at heart …

The internet-based Inquisition21 group which we looked at briefly in a previous post were seeking to bring a class action law suit against UK police for the Landslide/Operation Ore scandal and were subsequently delisted by Google. They believed this was due to the nature of the evidence they were sharing concerning child porn police corruption. After refusing to comment on the action Google issued a general statement yet failed to confirm that the Inquisition21 website had breached any of the guidelines. The censorship came just as the site was about to make potentially damaging disclosures about the handling of the Operation Ore investigations. [11]

While a reform of sex laws are periodically needed for improvement on a variety of bills and clauses, the introduction of measures, in effect, hand over responsibility to government bit by bit and decreases our own response-ability, often without the relevant information as to why such laws are considered so essential for our children’s protection and safety. In reality, freedom and responsibility are deeply connected and if one is curtailed the other will inevitably follow. The end result (and purpose) is that governments leverage greater and greater control under the prextexts of child pornography, the War on Terror and the War on Drugs, while its citizens scratch their heads and wonder how on earth it could have happened.

 


Notes

[1] http://www.pervertedjustice.com
[2] Ibid.
[3] https://web.archive.org/web/20121102181540/http://www.operationawareness.com/custom3_1.html
[4] ‘Pentagon declined to investigate hundreds of purchases of child pornography’The Upshot By John Cook September 3, 2010.
[5] Ibid.
[6] ‘Pentagon employee tried to access porn sites at work more than 12k times last year’ Russia Today,
January 07, 2015.
[7] See also: ‘Is Pentagon flooding Kenosha site with porn?’ By Rachel Campbell, The Journal Times , Racine WI, August 26, 2004.
[8] ‘Google defies US over search data’ BBC News, Friday, 20 January 2006.
[9] Former CIA agent and computer expert Robert David Steele, who has close connections with top Google directors, suggested that Google co-operated with the CIA. Steele is was the second-ranking civilian (GS-14) in U.S. Marine Corps Intelligence from 1988-1992 and a former clandestine services case officer for the CIA. His latest accusations against Google have raised the possibility that other accusations are now credible and that Google is truly censoring in places far from China and much nearer home. For example, Google has been caught censoring recent programmes and critiques critical of the Iraq war. On the October 2006 Alex Jones radio programme, Steele said, “I think that Google has made a very important strategic mistake in dealing with the secret elements of the U.S. government – that is a huge mistake and I’m hoping they’ll work their way out of it and basically cut that relationship off. Google was a little hypocritical when they were refusing to honor a Department of Justice request for information because they were heavily in bed with the Central Intelligence Agency, the office of research and development.”
[10] Document 3RA/501518-12 “Terrorism/Islamic Radicalization Global Radicalizers vulnerable in terms of Authority.” – ‘NSA spied on ‘radicalisers’ porn surfing so as to discredit them, reveals Snowden,’ By John Leyden, The Register, November 27th 20013.
[11] ‘Google erases Operation Ore campaign site’ by Lucy Sheriff, The Register, September 21, 2006.