Whistleblower

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 

Update: See also: Data is the New Oil

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Advertisement

Technocracy VIII: DARPA’s Technophilia (2)

“Twenty-five years from now, we may be to the point where the sensors are embedded in the skin and the person becomes the processor …

– Tod Lovell, a technology director at Raytheon


It is no secret that DARPA was at the forefront of electronically tagging US combat soldiers parallel to the initiative of tagging criminals in the prison industry currently making huge profits. The chipping project is called “Individual Force Protection System”, the manufacture of which was gleefully taken on by US defence contractor Science Applications International Corporation (SAIC). In January 2007, a presentation was delivered outlining IFPS details later found in a PDF document freely available on the internet. It described a 3-inch tag “without GPS” attached to a soldiers uniform with a “LOS range = 113 miles.” The wholesale cost is “$100 per tag.” [1]

As we have seen, Verichip and RIFD technology has its physical drawbacks aside from its ethical and civil liberty implications. From creating a “sixth sense” brain implant through which infrared light can be detected to implanting a chip that controls the brain; allowing thoughts, memory and behaviour to be transferred from one brain to another, these DARPA teamsters are riding high with possibilities. However, in the latter case it was scientists working at the University of Southern California, home of the Department of Homeland Security’s National Centre for Risk and Economic Analysis of Terrorism Events which came up with that little gem. Working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems,” chips which have been implanted into rats’ brains can be used as a storage device for long-term memories. Attempts to record, download and transfer memories into other rats with the same chip implanted.

A microchip implanted into a rat’s brain can take on the role of the hippocampus—the area responsible for long-term memories—encoding memory brain wave patterns and then sending that same electrical pattern of signals through the brain. Back in 2008, Berger told Scientific American, that if the brain patterns for the sentence, “See Spot Run,” or even an entire book could be deciphered, then we might make uploading instructions to the brain a reality.

In one study the scientists had rats learn a task, pressing one of two levers to receive a sip of water. Scientists inserted a microchip into the rat’s brain, with wires threaded into their hippocampus. The chip recorded electrical patterns from two specific areas labeled CA1 and CA3 that work together to learn and store the new information regarding which lever to press to obtain water. Scientists then shut down CA1 with a drug and built an artificial hippocampal part that could duplicate such electrical patterns between CA1 and CA3, and wihch was inserted it into the rat’s brain. With this artificial part, rats whose CA1 had been pharmacologically blocked, could still encode long-term memories. And in those rats who had normally functioning CA1, the new implant extended the length of time a memory could be held.

In terms of the new cyborg, it opens up huge potentials for brains training and entrainment. It also gives an extremely updated version of an Orwellian “thought Police” as an adjunct Pre-Crime technology, the fine tuning and enhancements of which are in parallel development.

According to a Los Angeles Times report in 2002, when Donald Rumsfeld was Secretary for Defence in the Bush-Cheney Administration he made it his priority to “… redesign the U.S. military to make ‘information warfare’ central to its functions.” [2] The strategy of “information dominance,” according to American military experts, consists of 1) Building up and protecting friendly information and degrading information received by your adversary. 2) The ability to deny, degrade, destroy and/or effectively blind enemy capabilities. [3]

ghost-recon-soldier

‘DARPA’s Squad X initiative seeks ‘innovative’ tech to enhance troops’ real-time situational awareness’ – DARPA’s Squad X initiative is inviting bright minds to submit their ideas for an integrated digital system to enhance situational awareness on the squad level. Squad X hopes to combine the cornucopia of different technologies into one grand “system of systems” to “organically extend squad awareness and influence” on the battlefield.”

PSYOPS and Information Dominance was ex-U.S. Secretary of Defence Donald Rumsfeld’s favourite playground. His enthusiasm gave rise to Revolution in Military Affairs (RMA) which encompasses everything from unmanned aerial vehicles (UAVs), to nanotechnology, robotics, and biotechnology. RMA is full of wild beliefs about the future of warfare, modern information, communications, and space technology. “Transformation” and “total systems integration” are keywords that make the military technophiles shudder with delight. The defeat of US foreign or domestic adversaries through surveillance technologies, advanced weaponry and the suppression and degradation of communications networks is all part of the RMA and DARPA vision of technological supremacy.

The project which has caught RMA and DARPA’s attention is the “network-centric warfare” designed to turn cities, any city, into a limitless “battlespace.” And the evolution of ID alongside information warfare:

As urbanization has changed the demographic landscape, potential enemies recognize the inherent danger and complexity of this environment to the attacker, and may view it as their best chance to negate the technological and firepower advantages of modernized opponents. Given the global population trends and the likely strategies and tactics of future threats, Army forces will likely conduct operations in, around, and over urban areas–not as a matter of fate, but as a deliberate choice linked to national security objectives and strategy, and at a time, place, and method of the commander’s choosing.  [4]

From DARPA’s own website at http://www.darpa.gov these include various programs and projects supported by millions of dollars of tax-payers money. We have the Information Processing Techniques Office (IPTO); Cognitive Systems Office working on a project called “Learning Applied to Ground Robots” and the Command & Control brief described as “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of a mission.” This comprises of “Deep Green” an “innovative approach to using simulation to support on-going military operations while they are being conducted.”

real-iron-man-suit-technologymilitary-plans-to-build-real-life-liquid-armor----iron-man----suit-yhcdfiso

Promotional still from Elysium (2013) in which the film’s protagonist is fused with cybernetic “enhancements” to carry out an important mission. DARPA’s dream on celluloid.

Then there is the Heterogeneous Airborne Reconnaissance Team (HART) which is due to:

“… the complexity of counter-insurgency operations especially in the urban combat environment demands multiple sensing modes for agility and for persistent, ubiquitous coverage. The HART system implements collaborative control of reconnaissance, surveillance and target acquisition (RSTA) assets, so that the information can be made available to warfighters at every echelon.”

Alongside this program are Persistent Operational Surface Surveillance and Engagement (POSSE), which involves:

“… building a real-time, all-source exploitation system to provide Indications and warnings of insurgent activity derived from airborne and ground-based sensors. Envisioning a day when our sensors can be integrated into a cohesive ‘ISR Force’, it’s building an integrated suite of signal processing, pattern analysis, and collection management software that will increase reliability, reduces manpower, and speed up responses.”

Ready to track those pesky dissidents fully integrated into SMART society?

UrbanScape offers the capability to “provide the warfighters patrolling an urban environment with an up-to-date, high resolution model of the urban terrain that can be viewed, manipulated and analyzed.” Whereas the Strategic Technology Office (STO) will “… focus on technologies that have a global or theater-wide impact and that involve multiple Services.”

Other programs well underway with funding from Lockheed Martin, Raytheon and Northrop Grumman include: Integrated Sensor Is Structure (ISIS) whose goal is to develop and deploy a “stratospheric airship based autonomous unmanned sensor with years of persistence in surveillance and tracking of air and ground targets;” and VisiBuilding, which will cater for “a pressing need in urban warfare [by] seeing inside buildings.” [5]

One of the main programs which DARPA provided for the TIAO was called “Combat Zones That See” (CTS). Journalist and author on police state surveillance Tom Burghardt reveals the details:

The plan was to install thousands of digital CCTV networks across occupied cities in the belief that once the system was deployed they would provide ‘warfighters’ with ‘motion-pattern analysis across whole city scales.’ CTS would create a nexus for mass tracking of individual cars and people through algorithms linked to the numeric recognition of license plate numbers and scanned-in human profiles.

The program was denounced by privacy and civil liberties advocates’ for its potential use as a mass surveillance system that could just as easily be deployed on the streets of American cities. In theory CTS, or a similar program could be further ‘enhanced’ by Scaleable Network Social Analysis (SSNA)… SSNA’s aim is ‘to model networks of connections like social interactions, financial transactions, telephone calls, and organizational memberships,’ according to the Electronic Frontier Foundation’s 2003 analysis. Once license plate numbers are ‘mined’ from raw CCTV footage, investigators could: a) identify a car’s owner; b) examine her/his web-surfing habits; c) scan e-mail accounts for traces of ‘inflammatory rhetoric;’ d) monitor recent purchases for ‘suspicious’ items. [6]

A check-point police state is hardly something that comes to the ordinary person’s mind as they go about their daily life but the end of privacy is fast approaching if governments continue to have their way. Location analysis, DNA, retinal scans, fingerprints and tagging and now chemical profiling of subject.

A laser-based “molecular strip-search” was the latest bright idea to be rolled out by the US government’s Homeland Security Agency and implemented across airports, check-points, large-scale venues and anyway that government sought an opportunity for surveillance. The technology has the capacity to instantly scan the bio-molecular structure of your body which includes the prescription drugs in your bag; cocaine residue on your dollar bills and any trace substance that we have come into contact with such as marijuana or gun powder. Ten million times faster and one million times more sensitive than any other system currently available, it can do all this invisibly and from a range of up to 50 metres.

tsascanner1The technology is a “scanner … called the Picosecond Programmable Laser. The device works by blasting its target with lasers which vibrate molecules that are then read by the machine that determine what substances a person has been exposed to. This could be Semtex explosives to the bacon and egg sandwich they had for breakfast that morning.” [7]

So, what will happen if you’ve been smoking pot that day or been down at the firing range? You will be tagged and “detained.” And in a climate of social unrest and false flag terrorism it is likely to be promoted as an unfortunate but necessary part of the world in which we live. We will have to be willing to give up some of our freedoms if the government is to protect us and retain the integrity of the greater good… And so the media will sell it …

By 2015 however there had been such a backlash against the privacy and health concerns that many of the x-ray scanners were taken out of airports and the hands of the The Transportation Security Administration (TSA). This is likely to be only a minor setback before the re-introduction of scanners which have been suitably modified.

As the government document: ‘Strengthening Federal Capacity for Behavioral Insights’ attests, the technocrats are losing no time in finding ways to merge technology and social engineering. Looking to make society much more “efficient,” we can add the latest bright idea by the federal government to hire a “Behavioural Insights Team” (BIT) to change US behaviour, taking its lead from the UK who spearheaded the initiative. Its own Behavioural Insight Team has been up and running for several years.

Commensurate with Common Core education the Obama administration took the opportunity to implement a new executive order in October 2011, after the Bradley/Chelsea Manning whistleblowing scandal. This Orwellian initiative aims to target future whistle-blowers, leaks and security violations by ordering federal employees to report suspicious actions of their colleagues, all of which is based on the very shaky science of BIT. It is part of what is called the “Insider Threat Program”, which covers every federal department and agency and where: “millions of federal officials, bureaucrats and contractors must keep their eyes peeled for watch “high-risk persons or behaviors” among co-workers. Failure to report could result in “penalties” or “criminal charges.” Such reports are bolstered by an integrated computer network monitoring system which detects “suspicious user behaviour” linked to Insider Threat personnel.

Seeing people as numbers in a Game Theory algorithm is bound to cause problems, not least the obvious flaws in trying to predict the future with unproven psychological techniques. Wide open to the usual privacy and civil liberty violations a National Research Council Report highlighted by McClatchy News on July 9 20013, was just one of many science bodies which saw no value in such initiatives stating in 2008: “There is no consensus in the relevant scientific community nor on the committee regarding whether any behavioral surveillance or physiological monitoring techniques are ready for use at all.” Quite apart from the fact that this executive order is on top of some of the most draconian legislation ever enacted in law and which continues to be rolled out in the face of continuing State violations against civil rights.

policestate2The marketing of the Obama myth has permitted the enactment of the National Defence Authorization Act (NDAA) which destroys due process and the Bill of Rights. Since your profile indicates dissension and disagreement with government policy then you will be labelled a “terrorist-sympathiser,” “terrorist enabler,” or prone to “incitement” or any other nonsense deemed subversive in order to detain you much longer, without any rights to a phone-call or access to a lawyer. Even if you are not a drug-user the laser will reveal what prescription drugs you are currently using to what stage you at in your ovulation cycle to the presence of cancer. A comprehensive bio-psychological profile will be created ready to be used against you should you become a non-compliant citizen able to think for him or herself. Used cocaine in the past? Then your civil action against the government for abuse of civil liberties is dead in the water. Since traces of cocaine exist on all forms of paper currency so theoretically anybody can be detained and charged with possession should it deemed expedient to do so. This technology will become a useful political tool with almost endless “Big Brother” applications.

As Noel Sharkey, professor of artificial intelligence and robotics at the University of Sheffield said of the new military “Cheetah” robot which can run faster than a human: “an incredible technical achievement, but it’s unfortunate that it’s going to be used to kill people”. [8]  The same could be said for the intention behind all the above technology. Put it all together with a rising Police State, social engineering and a SMART growth society, the outlook doesn’t look good for the ordinary citizen. It is however, a perfect direction for the technocratic psychopath to take and his intent to centralise and consolidate power through technology.


See also: Cyborgs 2030: The Military’s Vision of Remote Controlled Soldiers


Notes

[1] Individual Force Protection System (IFPS)Overview2007 Worldwide Personnel Recovery Conference. | http://proceedings.ndia.org/7040/11percent20IFPSpercent20bypercent20Marshall.pdf
[2] ‘The Office of Strategic Influence Is Gone, But Are Its Programs In Place?’ fair.org, November 27 2002.
[3] ‘Information dominance,’ by David Miller, The Guardian, January 8, 2004
[4] Urban Operations, Field Manual No. 3-06, Headquarters, Department of the Army, Washington, D.C.,October 26, 2006.
[5] http://www.darpra.gov
[6] ‘America’s Cyborg Warriors’ by Tom Burghardt, Global Research, July 23, 2008.
[7] ‘New Homeland Security Laser Scanner “Reads People At Molecular Level” declares a CBS News headline’ CBS local, via GIZMODO July 11, 2012.
[8] ‘Cheetah robot “’runs faster than Usain Bolt”’BBC News, September 6 2012.

Technocracy VI: The Technocrats Tap in (3)

“Surveillance induced morality: relics of cultural retardation”.
 .
– Marc Maron
.

How many times have we heard the response: “If you have nothing to hide, you have nothing to fear”?

This almost child-like wish to place faith in the unsullied purity of the authorities and Daddy State seems to know no bounds.

The success of mass surveillance is defined by the same gradualism. Endless new devices and gadgetry help to insulate our concerns about technology and how it can be used. It doesn’t matter how altruistic the intent is, whether it means to reduce suffering or create a more socially responsible culture, social justice is a concept struggling to keep its head above the water of pathogenic pollution. Whether biotech or nano-tech, since military, geo-political strategies and social pathologies dominate they will be pulled into the same codes of conduct mandated under Official Culture. Suffering will continue under flares of revolution until the psychopath is denied influence in ALL spheres. Access to technology which will disburse wealth and true freedom cannot take place until such a realisation manifests to the extent it dismantles traditional power structures. To think otherwise, will simply perpetuate the cover. Such a trajectory has only been possible due to the relatively rapid rise of the National Security State apparatus rooted in the 3EM riding high on updated myths propagated to ensure a smooth transition.

In combination with ECHELON and or MAIN CORE we have a global surveillance grid sitting on top of European and US intelligence mining that is the most invasive in history. This technological construct is imbued with power from a perception that can only multiply and augment in the same way we continually seek new “apps” and add-ons to our consumerist ethos.  A technocratic centralisation is the only direction. The promise of open source software will only prove liberating when the central mainframe of core influence is dismantled. Otherwise…Open source initiatives will operate within carefully defined parameters, in much the same way as our credit cards, cell phones and i-pads. Technology is not the culprit here – it is the reliance on the limited applications which is displacing our incredible, untapped creative power. This displacement only leads to the atrophying of our individual and collective creativity. And this is where artificial intelligence and transhumanist ideology offers an unprecedented threat.

But I’m getting ahead of myself. More on this later.

1024px-Menwith-hill-radomes

RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UKUSA Agreement. Photo Credit: Matt Crypto (wikipedia).

The International Campaign Against Mass Surveillance (ICAMS) produced the excellent document: ‘The Emergence of a Global Infrastructure for Mass Registration and Surveillance’ back in April 2005 which detailed in precise terms the nature of these myths, edited extracts of which will serve as an adequate summary of what this transition really means:

Myth #1: We are merely being asked to sacrifice some of our privacy and convenience for greater security.

“The object of the infrastructure that is being constructed is not ordinary police or intelligence work but, rather, mass surveillance of entire populations. In this infrastructure, everyone will be treated as a suspect, and state agents will maintain data profiles on all of us. […] The elimination of risk Indeed, it is now evident and documented that the United States and other countries are acting aggressively on information, seizing and detaining people without reasonable grounds, and “rendering” them to third countries or extraterritorial camps run by the U.S., where they face torture during interrogation and indefinite detention. Alongside the global system for mass registration and surveillance is emerging what some commentators are calling a “global gulag”,4 in which unknown numbers of people are languishing. What is at stake in this new world order is more than mere privacy, or even democratic processes, legal systems, and civil liberties. Basic human rights are in jeopardy.”

The document also lists the The Registrations of Populations as integral to the surveillance state with a long history of isolated test-runs across the world and with the shadow of abuse inherent in such data mining. Examples are given of Japanese internment in America the Second World War, the 1994 genocide that took place in Rwanda and the Pass Laws of apartheid South Africa. Such highly detailed information derived from Registration: “… is the tool by which those in power can easily single out and target certain kinds of people – not for what they have done, but for who they are.” And further: “By creating inclusion, the system also creates exclusion. For practical purposes, a person without a mandatory identity document will not exist – or will exist only as a risk to the state.”

Myth #2: These initiatives facilitate travel.

“But something else is happening, too. The private sector is being pressed into service as the state’s eyes and ears. Just as it has done with the acquisition of private-sector databases and airline passenger record systems, the state is using the private sector to exponentially increase its surveillance capacity in the realm of electronic communications and financial transactions. And, instead of relying on the inconsistent practices of businesses, governments are starting to tell businesses how to design their information systems, what information to gather, how long it must be stored, what must be checked and reported, and what must be given directly to state officials.

Compelling service providers to “build in” surveillance capacity to their systems means that within minutes of receiving a warrant from a court, real-time interception of a person’s Internet or voice over Internet use can be implemented with just a few computer strokes, making a connection between the computerized listening stations of law enforcement and the service provider’s system.”

The FBI’s various software can be used to search for keywords in the trillions of gigabytes of information that is continuously vacuumed up whether from your bank accounts or blogs. Data mining is the future of crime prevention which is already merging with the dubious practice of entrapment. In George Orwell’s 1984 Winston, the main protagonist in the novel appears to describe the present: “It was inconceivable that they watched everybody all the time. But at any rate, they could plug in your wire whenever they wanted to. You had to live – did live from the habit that became instinct – in the assumption that every sound you made was overheard.” The only difference in our world, our surveillance will comprise of various degrees of robot and artificial intelligence from the basic models already appearing in our malls to sophisticated androids capable of human simulation. They will assess are bio-signatures and voluminous data files and make mathematical probabilities of threats to the system which will slowly build itself around us.

Myth #3: If one has nothing to hide, one has nothing to worry about.

“An example of the many mistakes that were made in that era was the naming of academic Owen Lattimore as the Soviet Union’s top spy in the U.S. He later was fully cleared of the charges. In his account of the affair he noted that the F.B.I. and other agencies had ‘built up on him a dossier of ‘a man who might have existed’. Again, as a historian of the period has observed, ‘that phrase catches the very essence of the creation of the national insecurity state: a data world that shadows, mimics, and caricatures the real world’ We may think that anyone looking at our personal data with the proper explanation would conclude we are innocuous, but, in fact, in the data world we have no control over our “virtual identities” or the interpretations that others make of them.”

This goes to the central premise of conditioning that comes about from living under inverted totalitarianism and the necessary glut of authoritarian followers who allow its manifestation. We do not notice the dismantling of the foundation upon which are human values and ethics reside due to the buffering of our intuition and conscience. This is achieved through propaganda, psychic driving and memetic engineering of our consciousness all cemented with the human propensity for wishful thinking and denial.

We keep coming back to the uncomfortable fact that we naturally seek sanctuary in the delusion that there is nothing to worry about because we cannot entertain the possibility that we may have to alter our beliefs and attempt a deconstructive introspection. When such a painful process begins it can shatter the ego-mask that buffers us from the terror of the situation. When our personality is largely empty of substance this can be akin to inviting death of identity and belonging. So, having nothing to worry about is a preferable hook upon wish we can willingly attach.

In modern times, nothing comes closer to a collective seduction than the human races’ relationship to technology. We are firmly caught in its web of convenience, innovation and compliance in much the same way we are enthralled by the chemical hit of sex. In that sense, the surveillance state is just another compromise on the road to achieving the new nirvana of the post-human.

Have we really learned those lessons? Or have we merely changed our focus?

Boundless-heatmap-large-0001

“The worldwide heat map from the NSA’s data visualisation tool BOUNDLESSINFORMANT, showing that during a 30-day period, 97 billion internet data records (DNI) and 124 billion telephony data records (DNR) were collected.” (wikipedia, creative commons | Source http://jobkaster.com/ Author National Security Agency)

Myth# 4: The technology being used is objective and reliable.

“First, the factual base on which the technology rests is unreliable. The ‘best information available’ on which data mining or risk-scoring technology depend is often inaccurate, lacking context, dated, or incomplete. It might even be dirty information – extracted by torture, or offered by an informant who is vulnerable or is acting in bad faith. Secondly, the criteria used to sort masses of data will always be over-inclusive and mechanical. Data mining is like assessing ‘guilt by Google’ key-word search. And since these systems use broad markers for predicting terrorism, ethnic and religious profiling are endemic to them. … a precautionary principle is at work when human beings are making the risk assessments.”

A surveillance state is surely an oxymoron by virtue of the fact it is created not from the wish to protect but the incentive to control. Technology is only as trustworthy as its programmer and by extension, the context in which the capabilities of technology are applied. By the same token, human beings are fallible and since machines are born from the quality of our own minds they will mirror the glitches and unpredictable anomalies so much are part of a learning universe – despite protestations to the contrary. The more complicated and sophisticated machines become the more they will transcend their in-built limitations – that is spark that consciousness seeks. But the Surveillance State is linked to wider philosophical beliefs where development and trust in technology is based on the notion of an evolutionary salvation. Such a suggestion is usually rejected by transhumanists who insist that technology is merely the next stage in human evolution; our destiny is to embrace singularity and merge with the machine for optimum transcendence. By implication, the surveillance state will cease to exist since it will become superfluous to our needs.

Once again, this presupposes that such a system of malevolence will naturally evolve into one of benevolence and those at key nodal points of its power will simply transcend along with us. More likely is that the rooted dominance that gave rise to inversion will offer more of the same, where the worm-hole of singularity is really nothing more than a sublime devolution by delusion, the end result of which is absorption of all that is individual and original in exchange for group-think and technocratic compliance. Sophisticated, yes, even ecstatic at times, but like an addictive drug, when you realise you are hooked and seek to escape in search of authentic experience, it will be too late. From reliability and trust projected onto the machine will ultimately invite the law of repulsion.

Myth #5 and 6: Terrorist watch lists are a reliable product of international intelligence cooperation and consensus / Governments want to implement these systems to protect their citizens from terrorists.

“There is no due process afforded individuals or groups to allow them to challenge the inclusion of their names on a list. And, once the “terrorist” label is fastened to them, actions are taken against them without normal legal protections being afforded (protections such as presumption of innocence, the right to know the evidence and allegations against one and to respond, the right to remain silent, and habeas corpus). This is the essence of the risk assessment model: it treats as intolerable risks the very legal protections that are fundamental to free and democratic societies. In short, the U.S. lists have “been created haphazardly and without the carefully constructed checks and balances that such powerful instrument[s] demand.” And the lists are certainly bloated. At various times, news reports have put the numbers of names on the U.S. lists in the millions.”

Despite the fact that 99.9 per cent of those listed are largely innocent of any crimes at all, the Terrorist Watch List is drawn directly from the idea that al-Qaeda/ISIL and most terrorist atrocities are representative of a real, external threat. Such a disastrous policy has shown to be a cynical manipulation of the mass mind and comprehensively debunked if one reads the research from authors and experts in the field alongside the current geo-strategy and its outcomes in the last one hundred years.

The official story of global terrorism is a monumental fabrication – a product of a compartmentalised mutation of myth used to promote the economic and socio-cultural status quo. It is a cleverly disguised tool of opportunism for social control with the rise of police states and war without end as the norm. Indeed, such an inversion is truly insidious as the pathology begins to make inroads into the psyche of normal human beings. As the ICAMS authors state: “As people begin to realize that every transaction in their personal lives is potentially being watched – and that their innocent actions and beliefs can be easily misconstrued by risk assessors in their own and other countries, they will begin to internalize the social control that is being exerted by governments, watching what they say, what they criticize, who they associate with, and what they profess to believe in.”

DigiGes_PRISM_Yes_we_scan_-_Demo_am_Checkpoint_Charlie_June_2013

Germans protesting against the NSA surveillance program PRISM at Checkpoint Charlie in Berlin. (wikipedia,)

This is happening fast. The official culture of psychopathy requires these myths not only to keep populations in a state of fear and disempowerment but more importantly, so that the banking architecture and profits from the arms race, weapons manufacturing, narcotics, human and organ trafficking continues until nothing more can be squeezed out of the husk. Implosion is the only avenue left. Yet, from this breakdown, will we have a true community template of freedom which encourages a free-flowing exchange or will we walk as somnambulists into a mainframe of control from which comfort and efficiency is a high-resolution mask? This set of technocratic controls represent both the future safeguards against this implosion and the ultimate resource of future exploitation when machine-based society dominates over a depopulated world.

Other myths include that of “Western Democracies defending democracy and human rights around the world”; “such initiatives make us safer”; “Guaranteeing security is the paramount responsibility of governments” and the platitude that “at least, these initiatives are better than doing nothing.” All of which are much propagated lies within the MSM, think-tanks and PR outfits which prey on the naive and ill-informed. As ICAMS asserts:

“Careful examination shows that the global, mass registration and surveillance initiatives that have been described in this document are not “better than doing nothing”. They divert resources away from activities that would provide us with better security, they are not effective, and the harm they do to democracies, individuals, the rule of law, and global security is not proportional to their utility, or even to the risk they are supposedly addressing.”

Biotechnology and transhumanist discourse in general, is wholly identified with the idea of accelerating human design and manipulating the rate of perceived evolution. This is in accordance with a one-dimensional philosophy that discards the idea of natural rhythms and cycles that may have their own rates of change and which may not be immediately accessible to the fallible and very subjective human mind. This is hardly surprising due to the movement’s secular roots. However, what if – as a very rich tradition of often suppressed ancient wisdom suggests – there is indeed a precise symmetry and purpose in the way the planet, cosmos and Universe functions and organises itself? Most transhumanists appear to reject this possibility and assume that a “genetic designer label” can be stamped onto biology based on what they consider to be a sacred evolutionary direction. As with most strictly materialist perceptions, in true Baconian tradition the control of matter, mind and Nature is the objective divorced from the idea of consciousness existing outside the constraints of matter. A Masters-of-the-Universe mentality seeks to upstage Nature and the planet itself, bending it to their “post-human” will.

That is not to say there are not some great minds in the transhumanist movement and that there is nothing of value to be found there. But when there is no real discernment between what is considered to be pathology and normalcy and where beliefs are already predisposed to psychological corruption, then it just becomes yet another hijacked ideology. There is also the opportunity to ask questions as to whether we base our future on the lessons of the past or presume to forge ahead and base our decisions on a technological train of wishful thinking. Will we be downloading and uploading a reality that is sacrificing authenticity for artifice?

Can we say that the Elite families of the West have changed; that all is in the past and they have comprehensively turned over a new leaf? Evidence so far suggests that this particular mind-set has merely adapted and refined its methods. Depopulating the world, identifying, logging, tagging and micro-chipping the remaining populace and herding them into tightly controlled mega-cities via economic hardship is one future the Pathocrats envision. Meanwhile, buying up vast tracts of land under the banner of environmentalism will provide them with suitable means to live with the benefits of advanced bio-genetic/cyber technology at their fingertips – most likely with the view to extending their life-spans. Far-fetched or not, psychopaths and those drunk on power seldom think of failure. Vast amounts of money has been channelled for decades into massive underground bunkers presently dotted around the US and Europe some of which can house over 2 million people. To bring “Order out of Chaos” one must first introduce the Chaos to the extent that all manner of alternatives are wiped clean, leaving only one Singularity. They intend to be safe and warm away from all their created carnage and for as long as it takes.

The same vision that has hijacked the normal expressions of creativity for the last two hundred years or more has embraced the Information Age. If a virus goes unnoticed within all societal domains and even begins to define the nature of society, then any future innovations and apparent evolutionary surges will be made under the impetus of the same macro-social pathogen and thus subverted towards anti-human goals until such time it begins to lose its grip. The internet provides us with an immense opportunity to access massive amounts of information and turn it into knowledge through clusters of networks. We have the opportunity to develop and apply that knowledge/awareness in ways undreamt of. Consequently, a real battle for freedom is already taking place in various fields of technology between what we might call the entropic /machine consciousness which seeks to dominate and coerce reality into its tiny perceptions and the human / creative consciousness that seeks to co-create, disburse and expand alongside the Earth and Universe. As a very real human global brain awakens it remains to be seen how it will be wired up and if those “synapses” will be able to make unbreakable bonds based on freedom, truth, responsibility and love.

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

The Z Factor X: Chabad Lubavitch (3)

“The abuse and its cover-up are symptoms of wider political dysfunction—or, more precisely, symptoms of socially disastrous political control by religious elites.”

Journalist, Christopher Ketchum


While the cult of Chabad Lubavitch has considerable reach within the US government what is even more astonishing is the evidence that some sections of the movement may be nothing more than an organised crime syndicate acting as an ideological parasite accruing billions of dollars in the process. Leading Lubavitchers have on many occasions been convicted of money laundering, drug trafficking and connections to various Mafia. [1]

Then there is the matter of sexual abuse.

When you peruse certain extracts from the Talmud it is not an exaggeration to say that many forms of sexual abuse are not only condoned but encouraged within its pages. This may go some way in explaining why is it that so many Chabad house leaders and other Jewish Rabbis have been accused of paedophilia and sexual assault: there is a subconscious rationalisation that somehow this is sanctified.

Indeed, some District Attorney’s allow plea deals that keep them out of prison and off sex offender registries. Some rabbis act as gatekeepers to prevent awareness of the issue of abuse in Hasidic circles as soon as reports arrive at the police. Today there is still a media blackout on Jewish child abuse. Child abuse scandals in the Catholic Church get extensive media coverage, yet abuse from Hasidic / Chabad or Haredi children is wholly absent from most of the popular sources of the MSM. [2]

In Israel October of 2006, Rabbi Yoram Aberjil was accused of cult-like practices, sexual harassment of young women and threatening the lives of the survivors and those who support them. One witness who tried to escape the ultra-orthodox community with her family related a conversation she had had with the Rabbi in which he stated: “I want you to know that your children are precious to me,” he said. “I won’t let anyone pick the fruit I planted. The next conversation will be really painful. I will follow you. I have ways of making you disappear in a hit-and-run accident. I will curse your children. I’m telling you, I have powers. Your children will be orphans.” [3]

In October 12 2002 Rabbi Baruch Lanner was convicted of sexually abusing two teenage girls at a religious school where he was the principal. “Mr. Lanner was convicted on June 27 of charges that stem from incidents from 1992 to 1997, when he was principal of the Hillel Yeshiva High School in Ocean Township, Monmouth County.” [4]According to the website failedmessiah.com and their voluminous investigations of child rape and paedophilia within the Jewish religion, Lanner had been heavily protected by fellow Rabbis and his victims ignored: “Lanner stayed at NCSY. He was not reported to police. No provisions were made to protect the children in NCSY’s care… But victims went public. The Orthodox Union (OU) responded by smearing them.

After initial successes, including a rigged beit din (religious court) run by Yeshiva University’s Rabbi Modechai Willig, the OU’s attempts to smear victims failed. Lanner was arrested, tried and convicted. In the aftermath, a small number of Lanner’s enablers were forced out of the OU.” [5] By December 2008 Rabbi Lanner was honoured by both the OU and the NCSY and given a National Award for his services. The NCSY’s maxim of “inspiring the Jewish Future” takes on somewhat bizarre connatations in light of this fact.

Rabbi Aryeh Blaut AKA: Louis Steven Blaut of Seattle USA was: “… a past principal of a Jewish Day School in Seattle, WA. He was originally arrested in November 2003 for possession of child pornography. He pled guilty in July, 2004 and sentenced on Sept. 24, 2004. Rabbi Blaut spent 21 months in a federal prison in New Jersey.” According to the United States Department of Probation, “Blaut is not allowed contact with anyone under the age of eighteen on the internet or in person.” According to one blog for Jewish survivors of sexual abuse: “… there was no press coverage on this case, yet a reliable source stated that 1800 individuals in the community received a letter.” [6]
Other cases that are almost impossible to find in MSM and internet sources yet can be verified by state legislator and penitentiary records are the following from the awareness centre.org:

  • Case of Rabbi Lewis Brenner (AKA: Lippa Brenner) (Brooklyn, NY) Convicted of child molestation. The original charges included 14 counts of sodomy, sexual abuse and endangering the welfare of a child. He agreed to plead guilty to one count of sodomy in the third degree, a Class E felony, in exchange for a sentence of five years’ probation.
  • Case of Rabbi Yaakov Yitzhak Brizel (Jerusalem, Israel) Accused of child molestation.
  • Case of Rabbi Shlomo Carlebach There is a Call for Action on this case. Accused of several cases of child molestation, and sexual assault of young adult women.
  • Case of Rabbi Perry Ian Cohen – (Montreal and Toronto Canada) Accused of sexual abuse of a seventeen year old. Fired for sexual impropriety with congregants.
  • Case of Rabbi Yitzchak Cohen (Israel) Accused of sexually harassing students at Bar-Ilan University.
  • Case of Rabbi Asher Dahan, (Beersheva), Israel Arrested after being accused of raping and sexually abusing two 17-year-old girls after he offered “to redeem them of sin and evil inclinations.”
  • Case of Rabbi Anthony Dee (Blackpool England; Portsmouth, England) Former synagogue minister Reverend Anthony Dee found guilty of sexually abusing two boys and a girl in Blackpool and Portsmouth, England. This is the first set of convictions, there was a second set of convictions in 1997.
  • Case of Cantor Stuart Friedman (Halifax, -Philadelphia, Detroit, Boston, Los Angeles, Baltimore) Convicted and sentanced to 15 months in federal prison on one count of distributing child pornography. [7]

More recent reports include Christopher Ketcham’s expose on the Hasidic ritual bathhouses and the “Child Rape Assembly Line” published by online society and culture magazine vice.com in November 2013.

Ketchum interviewed one Rabbi Nuchem Rosenberg a member of Brooklyn’s Satmar Hasidim fundamentalist branch of Orthodox Judaism. His job is to design and repair mikvahs which are Jewish bathhouses used for ritualistic purification and cleansing. Rosenberg proceeds to divulge graphic details of systematic rape by spiritual elders within these establishments with such a ring of authenticity that it is hard to dispute.

large_rabbi-rosenbergWhistleblower Rabbi Nuchem Rosenberg, VICE.com © photo by Christian Storm.

Parallels to the Catholic Church are obvious as is the target for the “rites of passage” which are predominantly young boys from ages 7-14. In fact, according to Rosenberg: “… around half of young males in Brooklyn’s Hasidic community—the largest in the United States and one of the largest in the world—have been victims of sexual assault perpetrated by their elders.” Familiar to the discourse of disbelief in the face of authority, Ultra-Orthodox Jews have the same problems when they attempt to speak out about the abuse in their midst. They are ostracised and their careers are ruined. Rosenberg suffered the same consequences after he began blogging on the abuse and opened a New York City hotline for victims. As Ketchum describes, to go against what is seeded psychopathy inside what is masquerading as a societal vessel for spiritual purity and sustenance is no greater example of evil. As is the case time and time again, people will maintain the integrity of the initial message even if the structure that professed to house it has long since gone.

Rabbi Rosenberg is loathed and hated by his own community even feared as if he is a walking contagion:

“He receives death threats on a regular basis. In Yiddish and Hebrew newspapers, advertisements taken out by the self-described ‘great rabbis and rabbinical judges of the city of New York’ have denounced him as ‘a stumbling block for the House of Israel,’ ‘a public rebuker and preacher of ethics’ who ‘persists in his rebelliousness’ and whose ‘voice has been heard among many Jewish families, especially young people in their innocence… drawn to listen to his poisonous and revolting speeches.’

Cut off from practising his religion and ironically seen as a corrupter of Jewish youth regarding the true nature of Orthodox Jewish Establishment he remains an outcast. It is a classic example of ponerology where paramoralism becomes the norm leading to the lancing of those who have the temerity to give voice to their conscience.

Politics, privilege and related sweeteners which arise from both determine an unspoken acceptance of what must be. In the Catholic Church, religion and authority were used in order to in order to gain trust and thus access to the family and the children. In Chabad and Orthodox Jewish circles Ketchum’s research indicates that the goal of of the men-only Rabbinical Courts is to firstly: “… excise the mother from the child’s life,” with immediate effects which may be likened to a parental circumcision.

Just as we have seen with cases of abuse networks with procurers such as Jerry Sandusky, Jimmy Savile, Marc Dutroux and legion of others, it is the silence of denial that such a thing could be happening in the world at large and worst of all right at the heart of our most trusted institutions that allows such practices to continue.

When Rosenberg caught a Rabbi raping a seven year-old boy and intervened, he could not have known that he had dramatically changed his life. Yet, this is the result for so many whistleblowers within the Jewish community and who call out psychopathy when they see it. More often than not, it is the “pillars of the community” and those afforded the most respect and influence who are most guilty, which Rosenberg discovered to his horror. After all, is this not simply a mirroring of organised religion as a whole? A monolithic belief system which purports to represent God and His spiritual rule for living a spiritual life when in truth, it is nothing more than a mask for its opposite?

When Rosenberg took his complaint about his fellow rabbi to the rabbinate in Israel:

“… he was brought up on charges by the mishmeres hatznuis, the arch-conservative Orthodox ‘modesty squad,’ which regulates, often through threats of violence, proper moral conduct and dress in the relations between men and women. The modesty squad is a sort of Jewish Taliban. According to Rabbi Rosenberg, the rapist he caught in the act was a member of the modesty squad, which charged him with the unconscionable offense of having previously been seen walking down a street in Jerusalem with a married woman. ‘But it’s OK to molest children,’ he adds.

Ketchum then explains the reasons behind such actions and what underpins the central premise of this blog by stating: “The abuse and its cover-up are symptoms of wider political dysfunction—or, more precisely, symptoms of socially disastrous political control by religious elites.” Yet, psychological deviance traverses all societal domains using politics as a tool rather than the corruption of politics as the starting point. These are religious symptoms uniquely manifesting within a fertile field of psychopathy, the results of which feed into a further degradation of Orthodox Jewish religious authority – with Chabad Lubavitch at the zenith of corruption. It is no coincidence that this cult is at the centre of American political power brought up on the same endemic abuse.

Judaism’s roots as a monotheistic religion carved out by war, conquest and totalitarianism is simply attuning to its original extremes once again. Therefore, it is inevitable that such pathology will infect more moderate expression of Jewish identity as we have already seen. The same patterns of victim hood and blind faith will continue to imbue authority with Freudian hue of misplaced trust. And since nothing is done without the consent of the Rabbinical Authority the mental instability and social dysfunction will continue to rise just as Ketchum recounts:

Families saddled with an increasing number of children soon enter into a cycle of poverty. There is simultaneously an extreme separation of the sexes, which is unprecedented in the history of the Hasidim. There is limited general education, to the point that most men in the community are educated only to the third grade, and receive absolutely no sexual education. No secular newspapers are allowed, and internet access is forbidden. “The men in the community are undereducated by design,” Ben said. “You have a community that has been infantilized. They have been trained not to think. It’s a sort of totalitarian control.” [Emphasis mine]

The Jewish writers of chabad-mafia.com have drawn our attention to the criminal activities and complexities regarding Chabad Lubavitch and the infiltration into Hasidic clans. Quite apart from the lucre needed to fund the burgeoning Chabad Houses all over the globe, it does beg the question how it’s possible that Chabad Lubavitch can fund an average school intake of 400 students at roughly $10,000-$15,000 per year with thousands of schools the length and breadth of the United States and the world, most of which is offered for free? Where do they find millions of dollars needed for so vast an enterprise? Chabad-mafia.com offer up some possibilities:

“… most of these Chabad houses are located in remote places where there are no Jews, such as rural parts of South East Asia and South America. According to Chabad, the purpose of these Chabad houses is to provide kosher food and free housing to Jewish travelers if they go to those places. But once again, where do they get all the money for all these Chabad houses? And why would anyone want to build a free Kosher restaurant that also provides free housing to the occasional Jewish traveler, in a remote place where there are no Jews?

Chabad houses have been strategically located in areas where there is a high volume of illegal drugs activity. Take for example the city of Tijuana in Mexico, a city where there are no Jews. The Chabad house in Tijuana is the oldest Chabad house in Mexico, and Tijuana is the most important city for drug traffickers moving their drugs from Mexico to the USA. Chabad houses also provide money laundering services to drug dealers and other criminals. [8]

With over 3,600 Chabad-Lubavitch centres in over 70 countries and all continents of the world, it is no coincidence that international Chabad Houses are also strategically located on all of the major drug trafficking routes. One of the policies of the Chabad is to send Rabbis across the world to set up Chabad houses. This movement, known as “Shilchus”, has given Chabad a global support network. There is a long history of Chabad Houses not only being used as safe houses and logistics centres for Israeli intelligence but as storefronts for criminal activity. Investigative journalist Wayne Madsen reported that “Chabad Houses are fronts for Israeli military intelligence and Mafia activities in… Asian cities.” [9]  Judging by the copious crimes by Chabad rabbis over the last decade it seems this is just the overflow from an inner core of corruption.

In Bolivia, 2009, authorities conducted a raid on a Chabad House headed Rabbi Aharon Freiman and his wife who were “… convinced they had been sent to Rurrenabaque, by the deceased Lubavitcher Rebbe.” Amid rumours of drug trafficking and an assassination attempt against the country’s president, Bolivian police closed the House for several weeks. [10]

It seems the Chabad House in the Village of Kfar also had quite a reputation. In 2007 it was the centre of major tax fraud allegations against top level Chabad officials. Arrested at Ben-Gurion Airport upon returning from a fundraising tour in the United States, the “… airport intelligence unit received information that an association linked to young Chabad members was being used to cover up tax evasion.” The main target of an eight-year investigation “…used fictitious bank accounts for money laundering purposes” whereby “funds raised by the association in the past few years for education, aid and charity activities were transferred to ‘straw accounts’ in Israel and abroad and were withdrawn for private purposes, including payments to the association members.” [11]

In Israel, July 2010, Israeli District Police arrested “… three Jewish men suspected of smuggling over $1 million worth of cocaine. One of the suspects, a resident of Kfar Chabad, is suspected of orchestrating the deal.” [12] Four months later, an Israeli Chabad emissary was arrested at Madrid airport after being found to have hidden 4kg of cocaine in one of his suitcases. “Eliyahu Hecht, 57, a father of six who works for the global charity organization Kollel Chabad, was returning to Israel from Costa Rica, where he was fund-raising for a soup kitchen operated by Kollel Chabad in Safed.” [13] He was later vindicated of all charges, though suspicion remains.

Drugroutemap

Chabad Lubavitcher International centres are located on all the major trafficking routes – city by city.| Source: Princeton University/CIA source-Book

During the late 1980s in the United States, it was business as usual with the breaking up of a major international money laundering operation linked to drugs trafficking in Panama and Colombia. Rabbi Sholom Ber Levitin, a regional director of the Lubavitch Hasidic community in Seattle, several other Chabad House residents and Israeli nationals were arrested. The Assistant U.S. Attorney Ron Friedman who was prosecuting the defendants said:

“… they had been involved for at least 11/2 years in shipments of hundreds of thousands of dollars from New Jersey to Seattle …” with $350,000 to $400,000 a week … sent in cash to Seattle and converted to cashier’s checks that were hidden in magazines before being shipped by air freight to Panama and Colombia. […] federal prosecutors in New Jersey said as much as $25 million in cashier’s checks and money orders may have been sent to the two countries, as well as to banks in London, West Germany and Israel.” [14]

The authorities discovered that most of the cheques were finding their way to: “Banco Cafetero in Panama City or to Enrique Korc, the alleged kingpin of the operation in Cali, Colombia.”

What is noticeable in this and many other similar reports is the reaction from Hassidic leaders and the Jewish communities as a whole: Disbelief. Yet, this is the policy of messianic Chabad Lubavitch mandated by Rabbi Scheerson himself. The humanitarianism acts as a perfect cover. The religious intent may be genuine but the means used to fulfil prophecy appears to be without limit; yet another example of “the ends justify the means.” What makes it so easy is wilful blindness and inability to believe.

Some of the reactions to Chabad corruption:

“ ‘When I heard this, I couldn’t believe it,’ said Rabbi Anson Laytner, director of the Jewish Federation’s Community Relations Council. “ ‘This is totally out of keeping from the man that I know,’ he said. ‘To my mind he is a scholar and a very spiritual person, a community activist in terms of helping people in need.’ Levitin, the father of nine children, founded the Chabad House in the early 1970s. It is known as a place where Jewish people can seek emergency housing, food or money and receive outreach services. Several hundred Hasidic Jews live in Seattle, most in the area of Chabad House.’ ” [15]

That is not to say that there are not indeed great drug “outreach” centres that provide valuable outposts for care and support. Yet, there also remains strong evidence that many locations are anything but. Such is the nature of religious ponerisation: the genuine exist side by side with the pathological, the former proving a useful in denying the existence of the latter.

Rabbi Ronald Greenwald was a major example of political power meets Jewish mafia. Known to do business with mafia figures and the criminal underworld it was a coup d’état for such a man when offered a position in Richard Nixon’s administration allowing him to protect his mafia friends business interests and line his own pockets:

“Greenwald was a major player in CREEP, the re-election campaign for Richard Nixon in 1972. Greenwald was used heavily by Nixon and other Republicans to gain the Jewish vote, which he doubled for Nixon during that election… in the state of New York. Soon, the rabbi was given a post as an “advisor” to Nixon on “Jewish poverty programs,” a post which certainly made some snicker at the time, though it was clear that Nixon owed Greenwald, and the rabbi made quick use of his new found powers. He used his power to protect the mafia’s bilking of Medicaid programs and other crimes that were never investigated by the authorities. His post as head of the “Jewish poverty” initiative permitted him to shield those involved with such financial scams, as well as call off any and all FBI investigations of his friends. Part of the rise of Jewish mafia groups was the protection afforded it by Greenwald’s political connections. [16]

As we have seen, longstanding ties between Russian-Zionist oligarchs have also been well documented. Russian Jews were never disengaged from Jewish philanthropy. Throughout the 1990s, the oligarchs who made money quickly and in great quantities invested in resuscitating Jewish communal life, from establishing the Russian Jewish Congress, to building synagogue and community centres and sponsoring Chabad Lubavitch missions throughout the former Soviet Union. Indeed, it seems that the cult’s reach has overtaken mainstream Judaism and: “…continues to boom in Russia, dominating the Jewish scene in every Russian city.” [17]

David Shneer professor of History at Denver University recounts what he heard while attending a World Union for Progressive Judaism conference in Moscow: “I heard stories about Reform rabbis being driven out of their synagogues by Chabadniks, about how Chabad uses its cozy relationship with the federal government to take over Jewish institutions around the country. To the Union of Progressive Judaism, Chabad sounded like Al Capone’s mafia of 1920s Chicago.” Shneer is dismissive of this, putting it down to the fact that: “Chabad was already building an underground infrastructure for Jewish life in the Soviet Union” in the 1980s and believes it was more a product of the Chabad faithful’s work ethic and dedication than any nefarious designs for political power.

This seems woefully naive in respect of their longstanding association with crime, their messianic beliefs and racist values. It does explain why so much of the Jewish community is unaware of the danger that such extremism poses to their religion. It represents the same ignorance and naivety that exists in contemporary society about the nature of power brokers in general. No one is exempt from the effects of psychopathy “chosen” or not.

Away from media fears of anti-Semitism, the Russian, Ukrainian Mafia and the Jewish mafia are fairly synonymous. Scores of anti-Zionists in Russia have been murdered by car bombs or other devices, and none of the cases have been solved. The massive oil and mineral wealth in the country is just too big a bonanza and acts as a major ideological funding resource for Zionists and Israel. To keep the monopoly on Russia’s resources and the exploitation tributaries into other countries open the Russian Mafia has eclipsed other crime groups by becoming the most ruthless and cold blooded. There is no code of honour regarding other Mafia clans or families. They will kill men, women and children without hesitation while embarking on any methods suitable to remain ahead of the field. In other words, the Russian-Jewish Mafia is the closest you can get to the embodiment of the collective psychopath in crime.

With no conscience or codes, no limits need apply.

 


See also: Orthodox Advocates Push for Sex Abuse Reform in New York  |   In the Name of the Father Part I

For a similar example of mafia-like corruption within an ostensibly pious and religious movement see: The Mennonite Drug Connection by The Fifth Estate. Again, the purer the movement’s claims the greater the vulnerability ponerological infection.

 


Notes

[1] Internet website failedmessiah.com run by an ex-Lubavitcher has an enormous archive of Chabad crimes going back several years including child labour, sexual abuse, paedophilia and drug trafficking.[2] ‘Brooklyn DA Launches Push to Stop Sex Abuse in Haredi Community’ – Brooklyn DA Charles Hynes has 19 actives cases in haredi community. April 01, 2009.
[3] ‘Not-so-saintly Rabbi in Netivot’By Tamar Rotem , Haaretz, October 12 2006.
[4] ‘Rabbi Convicted of Sexual Abuse Is Freed on Bail Pending Appeal’ By Ronald Smothers, The New York Times, October 12, 2002.
[5] ‘OU-NCSY Honors Child Sexual Abuser Rabbi Baruch Lanner’s Chief Enabler – Committee Members Include Cream Of Modern Orthodox Leadership’ failedmessiah.com, December 2008.
[6] ‘Jewish Survivors of Sexual Abuse Speak Out’ theawarenesscenter.org.
[7] Ibid.
[8] http://www.chabad-mafia.com
[9] ‘Chabad House: Terror, Ecstasy, Heroine, Prostitution, Espionage & Money Laundry’ by Wayne Madsen, November 28 2008. The waynemadsenreport.com “In March 1989, U.S. law enfocement rounded up a criminal network in Seattle, Los Angeles, New Jersey, Colombia, and Israel that involved a Chabad House that was involved in money laundering and currency violations.”
[10] ‘Bolivian policemen close local Chabad house’ By Matthew Wagner, The Jerusalem Post, April 23, 2009.
[11] ‘Senior Chabad official suspected of evading millions in taxes’”Man arrested at Ben-Gurion Airport upon returning from fundraising tour in US. Simultaneously, dozens of detectives raid Kfar Chabad, detain several people for questioning.” By Eli Senyor, Israel News November 14, 2007.
[12] ‘Tel Aviv – Three Arrested in Drug Bust Smuggling $1M Worth of Cocaine’ http://www.vosizneias.comvia Haaretz, July 8 2010.
[13] ‘Israeli Chabad emissary nabbed in Madrid with 4kg of cocaine’ Friends of the arrested man say he was fooled into smuggling the cocaine as he was returning to Israel after a fund-raising trip to Costa Rica. By Eli Ashkenazi, Haaretz, Dec.07, 2010. | ‘Jailed Fundraiser is Vindicated’ http://www.collive.com/Jan 27, 2012.
[14] ‘Seattle Rabbi is Arrested 13 Acussed of an International Plot to Launder Money’ By Steve Miletich, Seattle PI, March 19, 1988. Section: News, Page: A1. http://www.seattlepi.com/archives/1988/8801080982.asp.
[15] Ibid.
[16] ‘The Judeo-Russian Mafia: From the Gulag to Brooklyn to World Dominion’, by Y M. Raphael Johnson, PH.D. Barnes Review, May 27, 2006,[17] ‘Why Chabad Excels in Russia, And Why Reform Judaism Doesn’t’ by David Shneer, April 16, 2007, jewcy.com.

Outsourcing Abuse II: Dyncorp Revealed

By M.K. Styllinski

“The people of DynCorp International (DI) leverage our global presence and reach, international business experience, language capabilities, and deep cultural understanding to benefit every mission. We provide the highest level of professional intelligence training, collection and analysis, and mission support to meet the intelligence needs of our customers. The team also delivers flexible and rapidly-deployable, integrated security solutions to suit any situation in any part of the world.”

– Dyncorp International  


The above quote can be summarised in a sentence: “We outsource American Empire”. And of course, since the Establishment in America is concerned with invading and stealing other nation’s resources under the pretext of democratic intervention, then it stands to reason that what “needs” Dyncorp is delivering to their “intelligence customers” is simply more of the same morally bankrupt dynamics employed by the World state psychopaths in power. I’m quite sure their “deep cultural understanding” helps intel operatives enormously as they find new ways to extend their reach.

Outsourcing and private security contracts have boomed over the last decade. The United Nations isn’t the only Establishment organisation to have suffered from the effects of institutional sexual abuse and expanded these pathologies via outsourced channels. A cross fertilization is taking place between Private securities companies (private armies) prisons, the military and intelligence agencies.

A revealing January 2002 article by Insight magazine’s Kelly Patricia O’Meara (below) was followed up in November of the same year with The Guardian’s piece on the American defence and security contractor DynCorp. This opend the proverbial can of beans…The corporation had branches in Salisbury, UK and dealt with the contracts of American officers working for the international police force in Bosnia. Dyncorp unfairly dismissed Kathryn Bolkovac, a UN police officer for reporting colleagues involved in the Bosnian sex trade and threatening their “lucrative contact” to supply officers to the UN mission. According to the report: “UN peacekeepers went to nightclubs where girls as young as 15 were forced to dance naked and have sex with customers, and those UN personnel and international aid workers were linked to prostitution rings in the Balkans. The employment tribunal accepted that Ms Bolkovac, an American who was employed by DynCorp and contracted to the UN, had been dismissed for whistle blowing.” [1]

dyncorp

‘US: DynCorp Disgrace’ by Kelly Patricia O’Meara, Insight Magazine January 14th, 2002

DynCorp had the contract to provide police officers for the 2,100-member UN international police task force in Bosnia which was supposedly created to restore law and order after the civil war. In the British tribunal Ms Bolkovac’s evidence highlighted the underground sex trade that was “thriving among the 21,000 NATO peacekeepers and thousands of international bureaucrats and aid workers” and that still remains one of the most extensive trades in the world. [2]

Dyncorp forged documents, trafficked women, aided illegal cross-border transports and tipped off sex club owners about imminent raids. Bolkovac also described how UN police, NATO troops and humanitarian, NGO employees were “regular customers.” [3] Bolkovac uncovered evidence “of girls being beaten and raped in bars by their pimps while peacekeepers stood and watched.” Even one UN policeman who was meant to be investigating the sex trade: “paid £700 to a bar owner for an underage girl who he kept captive in his apartment to use in his own prostitution racket.”[4] Ultimately, the company fired the eight employees for their alleged involvement in sex trafficking and illegal arms deals. Madeleine Rees, the head of the UN Human Rights Commission office in Sarajevo, was:  “… in no doubt that trafficking in women started with the arrival of the international peacekeepers in 1992.” [5]

Again we find that where sexual abuse is occurring the police are not far behind and unfortunately on the wrong side of the law. After a two year battle at an employment tribunal court, testimony was heard that one of the most senior UN officials Dennis Laducer, Deputy Commissioner of the International Police Task Force, was found to attending one of the most notorious brothels. He was subsequently sacked and Kathryn Bolkovac finally awarded $110.000 [some reports say $173,000] in 2002, with DynCorp forced to foot the bill. [6] Inspired by the story of Bolkovac, The Whistleblower hit the cinemas in 2010. Directed by Larysa Kondracki, written by Eilis Kirwan and Kondracki with Rachel Weisz playing Bolkovac, the film is a largely fictionalised dramatization of Bolkovac’s experiences in Bosnia though with enough mixing of fact and fiction to lend teeth to the film’s central premise: that sex trafficking, rape and murder took place under the eyes of the UN and with active involvement of an outsourced security firm Dyncorp (given the moniker “DemocraCorp” in the film). The end result is a motion picture which does an admirable job of raising awareness of the problem despite senior UN officials’ attempts to belittle it and play down the facts upon which the film is based. Similarly, rather than paying attention to one woman’s courage and the appalling suffering she brought to the world’s attention, the UN allowed the shutting down of anti-trafficking initiatives by its own gender affairs chief in Bosnia even though it was deemed to be producing tangible results. The chief in question Madeline Rees was then fired by the UN for “poor performance” but took her case to a UN disputes tribunal and won.  She is now General Secretary for the Women’s International League for Peace and Freedom.

Kathryn Bolkovac

Former police investigator Kathryn Bolkovac. | http://www.bolkovac.com/

One of Bolkovac’s allies during the ordeal and played by Vanessa Redgrave in the film, Rees had been the UN Officer for gender issues for many years and supported her attempts to raise awareness of what was taking place under the cover of UN humanitarian aid. Rees commented:  “I went to work with large numbers of women who had been the victims of rape during the war but I ended up working as much with women who were being trafficked and raped by soldiers and police officers sent to keep the peace.” [7]  She described the mechanisms by which such crimes and corruption was able to take place:

“Countries get rated by the US Trafficking in Persons report on their records in dealing with trafficking, for which you need to show results. If you don’t prosecute or repatriate enough people, your rating is downgraded, thereby your financial support. So when there were raids, the girls would be shipped home to Ukraine or wherever, probably to be retrafficked. It was a repatriation factory, run by people who had an anti-immigration approach, and didn’t want women to try to get into western Europe – no focus on the system or rights of the women. Our approach, by contrast, was slow and beginning to work, so it had to be killed off.” [8]

The Whistleblower

DVD and Poster promotion for The WhistleBlower

Former General Secretary Kofi Annan and successor Ban Ki-moon are fond of promoting the idea that these crimes are a result of a “few rotten apples” rather than the obvious endemic and systematic effects of a much deeper malaise. As Rees points out regarding the UN hierarchy: “They have to understand that this outrageous practice is endemic in the male hegemony of a militarised environment – it’s part of locker-room bravado and the high levels of testosterone in fighting armies. These crimes are perpetrated by individual men who rape and torture girls on mission, then go home to their wives. And it’ll carry on until there’s a knock at the door and they find themselves getting arrested in front of the wife and kids.” [9]

While the UN claimed to have dealt with the rotten apples and Dyncorp professed to have made a thorough and “aggressive” investigation into the crimes, the trafficking still continues right under the UN’s nose. As the film’s director stated in her address to the UN leadership at a screening which the organisation grudgingly agreed to:  “I know we are going to hear a lot about what has been done since the time depicted in this film, but rhetoric only goes so far. The situation has escalated.” [10] (In 2010 sexually related allegations against U.N. military forces rose by 12 percent with some of the allegations involving minors). [11]

The UN investigator was not the first to blow the whistle on the corporation. Ben Johnson, a former Texan helicopter mechanic won his lawsuit just hours after Bolkovac where his claims included allegations of men having sex with girls as young as 12. His claims also concerned a nightclub in Bosnia frequented by DynCorp employees, where young women were sold “hourly, daily or permanently”.[12] Johnson believes Dyncorp was not only dealing in illicit arms and fraud but heavily involved in the peddling and promoting of the burgeoning sex trade that was thriving precisely because this was a war torn region.

Where there is war there is a surplus of the vulnerable and a perfect cover for trafficking. The sex slaves were ordered from Russia, Romania and the primary trafficking hub of Moldova, being imported directly by Dyncorp and the Serbian Mafia working in concert:  “These guys would say ‘I gotta go to Serbia this weekend to pick up three girls.’ They talk about it and brag about how much they pay for them usually between $600 and $800. In fact, there was this one guy who had to be 60 years old who had a girl who couldn’t have been 14. DynCorp leadership was 100 % in bed with the mafia over there. I didn’t get any results from talking to DynCorp officials, so I went to Army CID and I drove around with them, pointing out everyone’s houses who owned women and weapons.’ ” [13]

Since 1998, several DynCorp employees have been sent home from Bosnia but none have been prosecuted. All this scandal led George W. Bush to respond by creating the US Immigration and Customs Enforcement (ICE) established in March 2003 “as the largest investigative arm of the Department of Homeland Security,… comprising of four integrated divisions that form a 21st century law enforcement agency with broad responsibilities for a number of key homeland security priorities.” [14] The amount of assets seized from human smugglers and human trafficking organizations totalled 27 million in 2005 and with no seizures at all for 2003.  Compared to the billions of dollars circulating, this is the equivalent of loose change. Far from suggesting a major improvement, it shows a dismal response on the part of the State Department even while it cheerfully reported with no hint of irony that: “Since ICE was created, more than a dozen child sex tourists seeking to exploit children in eight separate countries have been arrested and now face justice in the US.” [15]

With sex tourism proving to be a major problem in the West we are supposed to believe that the arrest of 12 child sex tourists since 2003 is an example of “significant law enforcement progress”?

We also have the proud declaration of “investigations into human trafficking and the related crime of human smuggling, [which] have resulted in more than 5,400 arrests, 2,800 criminal indictments, and 2,300 criminal convictions.” [16] These successes were diluted by contractors and security firms which are mostly extensions of the US government.

Indeed, the corporate-security complex aggressively lobbied for provision after provision until, according to a Chicago Tribune report: “…significant aspects of the Pentagon’s proposed policy might actually do more harm than good unless they’re changed. These experts have told the Pentagon that the policy would merely formalize practices that have allowed contractors working overseas to escape punishment for involvement in trafficking, the records show.” [17] And it was probably designed that way.

Capture

Human trafficking main origin, transit, and destinations

On March 11th 2005, in a House Hearing on FY06 Department of Defence Budget hearing Senator Cynthia McKinney focused on the Dyncorp scandal, taking then Secretary of Defence Donald Rumsfeld and General Carl Myers to task, in no uncertain terms. (see end of article). It was a rare opportunity to see a lone voice in politics trap Rumsfeld and place him firmly in the hot seat. The Neo-Con war hawk bridled as he was forced to listen to the facts.

Not only has the Pentagon yet to ban contractors from using forced labour, but the same corporations are being effectively rewarded for their past and present criminal behaviour, by obtaining contracts set far into the future. (As part of a consortium of bidders, the British government’s Ministry of Defence awarded the company a 60m contract to supply support services for military firing ranges. [18] With the help of lobbyists from Dyncorp and Halliburton, subsidiaries such as KBR has over 200 subcontractors carrying out the multibillion-dollar US Army contract for privatization of military support operations in the war zone. Trafficking and bonded labour appear inconsequential in the face of exorbitant profits. Yet the US military continue to deny responsibility for its out-sourcing of conflict even when there are continuing and numerous incidents that show the liability of its sub-contractors. [19]

Dyncorp represents the new breed of private contracts taking the place of traditional forces most recently employed by the United Nations itself. Once again we can see how sexual exploitation can be used as a political and corporate terrorism outside military and international law. But security firms also represent that same homogenization of the private sector funnelled into new forms of political control.

If we were to visit the California-based Computer Sciences Corporation website (csc.com) we might be forgiven for thinking this is a financial services company humbly dedicated to bettering the world as well as its investors. Unfortunately, the low key nature of the site design masks the meaning of this fortune 500 multi-national with its high-level enabling skills for U.S. Federal government. The corporation currently holds contracts with more than 40 federal agencies including the Pentagon, State Department, Drug Enforcement Administration, and the Energy and Justice Departments.

This giant government contractor bought Dyncorp on March 7th 2003, creating “a company that ranks as one of the top information technology and outsourcing services providers to the U.S. federal government.” The revenues from the federal sector alone were estimated to be around $6 billion at the end of that fiscal year, with projections in excess of $14.5 billion at the end of 2004. 2005 saw a steady increase in profits due to its monopoly on US Government contracts which are now expanding into Europe. This net profit was more than $810.2 million during fiscal year 2005, an increase of 56 percent over 2004. [20] The purchase of Dyncorp not only saved its bacon but allowed it to claim the dubious honour of being the third largest IT services provider behind Lockheed Martin and second place provider EDS Corp.

CSC Chief Executive Van B. Honeycutt gave a wonderful example of the art of masking with his comments on why the Dyncorp merger went ahead: “‘DynCorp, with approximately 98 percent of its total revenue coming from the U.S. federal government, complements our overall federal business, allowing a great breadth of end-to-end solutions and significantly increasing our exposure to the growth area of federal government, IT and functional outsourcing…”  He continued: “The capabilities of the new federal sector organization will allow CSC to provide more comprehensive services and solutions to our government customers…” These “customers” are none other than the US military and the Department of Homelands Security who will apparently benefit from: “… the resources and security expertise of CSC, coupled with those of DynCorp, will position us extremely well as the federal government expands and accelerates its efforts to enhance U.S. national security.’ ” [21]

No doubt.

It sounds reasonable enough if we don’t think about what this actually means. “The growth area of federal government” and “U.S. National Security” is intimately linked to the “War on Terrorism,” numerous examples of human rights abuses and the dismantling of the constitution from within.

When the United States created the Office of Homeland Security, CSC chairman Van B. Honeycutt was one of the first advisers to the new agency having already handled the position of Chair of the National Security Telecommunications Advisory Committee (NSTAC) under President Clinton. Effectively, the corporation is an extension of the government and its policies, with an incestual exchange of employees and profit, which the website tenderly calls “client intimate organizations.” With its headquarters in Reston, Virginia, close to the CIA and the Pentagon, there is no doubt that Dyncorp has a deeply intimate (and lucrative) connection that is mutually binding.

Dyncorp contractor in Afghanistan

Dyncorp contractor in Afghanistan

Prior to the merger, DynCorp was among the largest employee-owned technology and out-sourcing firms headquartered in the United States, with approximately 26,000 employees in some 550 locations throughout the world. According to CSC: “… the U.S. Department of Defense represented 49 percent of DynCorp’s revenue in 2001, which before the merger netted 2.3 billion.” [22]

During 2008–2010, CSC was heavily criticised for spending $4.39 million on lobbying and not paying any taxes which is nonetheless standard practice for most large corporations. In fact, the company received $305 million in tax rebates, on top of a profit of $1.67 billion. [23]

By the end of 2004 CSC had sold off units of Dyncorp to private equity firm Veritas Capital for $850 million. With Dyncorp International eventually dropping under the net of private equity investment firm Cerberus Capital Management $1 billion and finalised in the summer of 2010. CSC still retains the rights to the name “DynCorp” while the new company became DynCorp International now listed on the New York Stock Exchange despite receiving 96% of its more than $3 billion in annual revenues from the US federal government. [24] Dyncorp Inc. earned a whopping $2,398,874,000 from its “defence” contracts alone in 2011.

The number of lawsuits and scandals hitting Dyncorp International range from allegations of sex trafficking to a variety of human rights abuses and black operations involving drugs and military targets. This is largely due to the hiring of former Special Operations military personnel and CIA personnel. One would think that the screening of employees would have been stepped up after so much bad publicity. Yet why should they worry when the biggest contractors are the US and its war machine driven by the arms industry itself? Logistical and IT services may well be a great part of the civilised PR of Dyncorp but in reality, the real focus of this corporation could be categorized as “private mercenaries” which allows operations to be sub-contracted to the bidder that is most ideologically and professionally sound. It also conveniently abdicates responsibility for the US army and their civilian deaths while avoiding unnecessary media spotlights. Outsourcing their wars beyond the prying eyes of press and congress is an effective way to ensure the success of geo-political policies such as regime change.

Secrecy is obviously an important part of the company’s rules. If employees happen to get rubbed out on their various covert “missions” then the paper trail is as sparse as possible. Janet Wineriter, a spokeswoman at DynCorp’s headquarters frequently tells the media that she cannot discuss the company’s operations because of its contractual obligations to its client – the State Department. When this fails then black-outs are affected. Information regarding the real activities of these private mercenaries is intentionally obscure and shielded from investigations. There is no “right to know.” The last people they want to inform are Congress or the public. As a Guardian article stated “Today’s mercenaries in the drug war are provided by private companies selling a service and are used as a matter of course by both the state and defence.” [25]

Dyncorp has little to do with “Information Systems, Information Technology Outsourcing and Technical Services” though this certainly plays a part in extending its monopolistic war games. Controlling and monitoring information systems for federal agencies such as the FBI, DOJ and SEC, are within the corporation’s remit which is rather handy should any “impropriety” surface – which of course is the name of the game. Subversion and corruption is endorsed and legitimized via a corporate and federal relationship that gives the Cosa Nostra a run for its money.

dymcorprumsfeld

Cynthia McKinney does what she does best and grills Donald Rumsfeld over Dyncorp’s activities. This is the only time we are likely to see this psychopath get hauled over the coals for any of his state-sponsored crimes.

***

Update 2017: See: BOMBSHELL: Solving The Puzzle – “It’s DynCorp behind the mass shootings you see in America”


Notes

[1] ‘American firm in Bosnia sex trade row poised to win MoD contract’ by Jamie Wilson and Kevin Maguire, The Guardian, November 29, 2002.
[2] ‘British firm accused in UN ‘sex scandal’: International police in Bosnia face prostitution claims By Antony Barnett and Solomon Hughes, The Observer, London, 29th July 2001.
[3] Ibid.
[4] ‘Woman sacked for revealing UN links with sex trade’ By Daniel McGrory How a tribunal vindicated an investigator who blew whistle on workers in Bosnia, The Times, August 07, 2002.
[5] Ibid.
[6] ‘Sins of the peacekeepers’ Sunday Herald, 30 June 2002.
[7] ‘Has the UN learned lessons of Bosnian sex slavery revealed in Rachel Weisz film?’By Ed VulliamyThe Observer, January 15, 2012.
[8] Ibid.
[9]   Ibid.
[10]    Ibid.
[11]  ‘U.N. Mum on Probes of Sex-Abuse Allegations’ By Steve Stecklow and Joe Lauria, Africa News, March 21, 2010.
[12] ‘American firm in Bosnia sex trade row poised to win MoD contract’ by Jamie Wilson and Kevin Maguire, The Guardian, November 29, 2002.
[13] ‘DynCorp Disgrace’ Jan. 14, 2002, Insight magazine, By Kelly Patricia O Meara. http://www.insightmag.com
[14]  Bureau of International Information Programs, US Department of State. Web site: http://www.usinfo.state.gov
[15] ‘US Law Enforcement Steps Up Hunt for Human Traffickers’ 11 January, 2006 http://www.usinfo.state.gov/washfile
[16] Ibid.
[17] ‘US stalls on human trafficking – Pentagon has yet to ban contractors’ from using forced labor By Cam Simpson December 27, 2005.
[19] But one example from The Chicago Tribune which: “retraced the journey of 12 Nepali men recruited from poor villages in one of the most remote and impoverished corners of the world and documented a trail of deceit, fraud and negligence stretching into Iraq. The men were kidnapped from an unprotected caravan and executed en route to jobs at an American military base in 2004.”“Dyncorp and Friends: Securing Private Politics” (2007) an article written by the author which fleshes out Dyncorp and other UK and US private companies.
[20] Data Monitor /Computer Wire / http://www.computerwire.com/ 2005.
[21] ‘CSC and DynCorp Combine to Create Federal IT Powerhouse’ – http://www.csc.com/
[23] ‘30 Major U.S. Corporations Paid More to Lobby Congress Than Income Taxes, 2008-2010’ By Ashley Portero, International Business Times, http://www.webcitation.org, December 9, 2011.
[24] ‘Cerberus completes DynCorp acquisition’ Washington Business Journal, July 7, 2010.| Washington Tech. Top 100: http://www.washingtontechnology.com/toplists/top-100-lists/2011/dyncorp.aspx
[25] ‘A Plane is Shot Down and the US Proxy War on Drugs Unravels’ by Julian Borger, The Guardian, June 2, 2001.

Save

Save

Save

Save

Save

Save